Audit log
This appendix details audit log entries in the audit.log
file.
The following table shows the four components of entries in the audit log files.
Date | Subject | Action | Resources |
---|---|---|---|
|
Subject is the module through which actions are performed: command-line interface (CLI), REST application programming interface (API), or cluster |
Actions are the ran commands. |
Resources are the parameters associated with the actions. |
The following table shows the subjects and their description.
Subject | Description |
---|---|
|
CLI commands ran |
|
REST API requests received by API Security Enforcer (ASE) |
|
Changes requested by peer node in a cluster |
Here is sample output of an audit log file:
2019-06-13 10:45:12 | cli | delete_api | username=admin, api_id=cart 2019-06-13 10:46:13 | rest_api | GET /v4/ase/cluster | x-ase-access-key=admin, x-ase-secret-key= 2019-06-13 10:46:25 | cluster | delete_api | peer_node=192.168.11.108:8020, api_id=shop
CLI
The following table lists the actions and resources for ASE CLI.
Action | Resources |
---|---|
|
N/A |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
N/A |
|
|
|
|
|
|
|
|
REST API
Action | Resource |
---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Cluster
Action | Resource |
---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|