Writer instructions | |
---|---|
Page title | For most spaces, this page must be titled Space announcements. For spaces with localized content, this page must be titled Space announcements l10n. |
Purpose | Provide an announcement banner on every page of your space. |
Location | Move this page outside of your home branch. |
Guidelines |
Using audit logs to manage and maintain the product
Audited actions
Audited actions include policy actions, agent-related actions, and MQ actions. Except for MQ actions, all actions always have auditing enabled.
For MQ Actions, you can enable audit logging on a group level, enabling administrators to specify which user groups to log. MainView Middleware Monitor administrators define the groups to log, and whether a failure to log an event causes the loggable action to fail or proceed. If the audit log information cannot be updated for any reason, an error is issued and the action the user was attempting will either fail or proceed. If logging is configured to proceed on failure, an error is displayed but the item is not written to the log and, therefore, is lost from the audit log.
Best practices for maintaining audit logging in the database
- Secure audit database/tables from unauthorized use: Database security for the audit information is beyond the scope of MainView Middleware Monitor; it is the responsibility of your system or database administrator. To prevent users from modifying or deleting information, administrators must apply database or table security to the audit database to ensure that appropriate security levels are maintained.
- Manage the size of audit database: Make sure to allocate enough space for the database. If the database runs out of space and the security option Abort user action on audit error is checked, the action fails.
If the database and/or table size is a concern, you might need to establish a method for archiving the information in the audit tables.
Audit logging uses the following database tables: AUDITENDEVENT, AUDITINTPROPS, AUDITSTARTEVENT, AUDITSTRINGPROPS, and AUDITSYS.
- Backup audit database: Back up and archive the appropriate pieces of the audit log database on a regular basis in case of database corruption.
- Query and review audit data: Use the audittool CLI to query audit data. See Testing-and-querying-audit-records.
Log data written to the database
The following list is part of the audit log information that is written to the database in appropriate table columns. The actual message text is not part of the audit log information.
- Event ID: A unique numeric field that identifies an event
- Event Type: The type of action the event describes
- Event Status: Completed, Failed
- User ID
- System Time: This is the database server time for start and end of action
The System Time column holds the server date/time. The column type is Date on Oracle, DateTime on SQL Server and Timestamp on DB2. Note that this value is expressed in the local server time (not GMT). Therefore, if you want to record this as GMT time, you must appropriately modify the DateSQL column to reflect the addition or subtraction of time as required.
- Local User Time: The local system time for start and end of action
- Description Text
- Object Type
- Object Name
- Host: The computer where the Application Service is running.
Loggable user actions
Actions are logged by object. The following table highlights the event type that applies to each type of object.