JDBC log source parameters for IBM Security Identity Governance

If QRadar® does not automatically detect the log source, add a IBM® Security Identity Governance log source on the QRadar Console by using the JDBC protocol.

When using the JDBC protocol, there are specific parameters that you must use.

The following table describes the parameters that require specific values to collect JDBC events from IBM Security Identity Governance:
Table 1. JDBC log source parameters for the IBM Security Identity Governance DSM
Parameter Value
Log Source type IBM Security Identity Governance
Protocol Configuration JDBC
Table Name AUDIT_LOG
Compare Field ID

For a complete list of JDBC protocol parameters and their values, see JDBC protocol configuration options.