JDBC log source parameters for IBM Security Identity Governance
If QRadar does not automatically detect the log source, add a IBM® Security Identity Governance log source on the QRadar Console by using the JDBC protocol.
When using the JDBC protocol, there are specific parameters that you must use.
The following table describes the parameters that require specific values to collect JDBC events
from IBM Security Identity Governance:
Parameter | Value |
---|---|
Log Source type | IBM Security Identity Governance |
Protocol Configuration | JDBC |
Table Name | AUDIT_LOG |
Compare Field | ID |
For a complete list of JDBC protocol parameters and their values, see JDBC protocol configuration options.