Audit log
An audit log documents user actions that are submitted through the different management interfaces that run commands on the system, such as the management GUI.
You can use the audit log to monitor user activity on all supported interfaces.
The audit log entries provide the following information:
- The time and date when the action or command was submitted on the system.Note: When logs are displayed in the command-line interface, the time stamps for the logs in CLI are the system time. However, when logs are displayed in the management GUI, the time stamps are converted to the local time where the Web browser is running.
- The name of the user who completed the action or command.
- The IP address of the system where the action or command was submitted.
- The name of source and target node on which the command was submitted.
- The parameters that were submitted with the command, except confidential information like clear-text passwords.
- The results of the command or action that completed successfully. Failed commands are not added to the audit log.
- The sequence number and the object identifier that is associated with the command or action.
- The origin of the command or action. Possible values are: GUI, CLI, or REST.
- For service-related actions that are completed by support personnel, the audit log displays the
following information:
- Challenge
- Indicates the challenge with which the support user authenticated to the system. Support users connect to the system through a challenge-response authentication. If authentication succeeds, a session is opened and support users can conduct service-related actions on the system. This field identifies the support user at the support center. This field is blank for other users.