HP StorageWorks 2/16V HP StorageWorks Fabric OS 5.3.x administrator guide (569 - Page 55

Auditable event classes, Table 6 AuditCfg Event Class Operands

Page 55 highlights

• By default, all event classes are configured for audit; to create an audit event log for specific events, you must explicitly set a filter via the class operand and then enable it. • Audited events are generated specific to a switch and have no negative impact on performance. • All Secure Fabric OS event are audited. • Events are not persistently stored on the switch but are streamed to a system message log. • The audit log depends on the system message log facility and IP network to send messages from the switch to a remote host. Because the audit event log configuration has no control over these facilities, audit events can be lost if the system message log and IP network facilities fail. • If too many events are generated by the switch, the system message log will become a bottleneck and audit events will be dropped by the Fabric OS. • If the user name, IP address, or user interface is not transported an audit message is logged by adding the message None to each of the respective fields. • For High Availability, the audit event logs exist independently on both active and standby CPs. The configuration changes that occur on the active CP are propagated to the standby CP and take effect. • Audit log configuration is updated via a configuration download. See the Fabric OS Command Reference Manual for more information about the auditCfg command and command syntax. Auditable event classes You configure the audit log using the auditCfg command. Before configuring an audit log, you must select the event classes you want audited. When enabled, the audit log feature audits any RASLOG messages (system message log) previously tagged as AUDIT in Fabric OS v5.1.0, which includes: • SEC-3001 through SEC-3017 • SEC-3024 through SEC-3029 • ZONE-3001 through ZONE-3012 Table 6 identifies auditable event classes and auditCfg operands used to enable auditing of a specific class. Table 6 AuditCfg Event Class Operands Operand Event class Description 1 Zone Audit zone event configuration changes, but not the actual values that were changed. For example, you a message might state, "Zone configuration has changed," but the syslog does not display the actual values that were changed. 2 Security Audit any user-initiated security event for all management interfaces. For events that have an impact on an entire fabric, an audit is generated only for the switch from which the event was initiated. 3 Configuration Audit configuration downloads of existing SNMP configuration parameters. Configuration uploads are not audited. 4 Firmware Audit firmware download start, firmware complete, and any other errors encountered during a firmware download. 5 Fabric Audit administrative domain-related changes. NOTE: Only the active CP can generate audit messages because event classes being audited occur only on the active CP. Audit messages cannot originate from other blades in a chassis. Fabric OS 5.3.0 administrator guide 55

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465

Fabric OS 5.3.0 administrator guide
55
By default,
all
event classes
are configured for audit; to create an audit event log
for specific events
,
you must explicitly set a filter via the
class
operand and then enable it.
Audited events are generated specific to a switch and have no negative impact on performance.
All Secure Fabric OS event are audited.
Events are not persistently stored on the switch but are streamed to a system message log.
The audit log depends on the system message log facility and IP network to send messages from the
switch to a remote host. Because the audit event log configuration has no control over these facilities,
audit events can be lost if the system message log and IP network facilities fail.
If too many events are generated by the switch, the system message log will become a bottleneck and
audit events will be dropped by the Fabric OS.
If the user name, IP address, or user interface is not transported an audit message is logged by adding
the message None to each of the respective fields.
For High Availability, the audit event logs exist independently on both active and standby CPs. The
configuration changes that occur on the active CP are propagated to the standby CP and take effect.
Audit log configuration is updated via a configuration download.
See the
Fabric OS Command Reference Manual
for more information about the
auditCfg
command and
command syntax.
Auditable event classes
You configure the audit log using the
auditCfg
command. Before configuring an audit log, you must
select the event classes you want audited. When enabled, the audit log feature audits any RASLOG
messages (system message log) previously tagged as AUDIT in Fabric OS v5.1.0, which includes:
SEC-3001 through SEC-3017
SEC-3024 through SEC-3029
ZONE-3001 through ZONE-3012
Table 6
identifies auditable event classes and
auditCfg
operands used to enable auditing of a specific
class.
Table 6
AuditCfg Event Class Operands
Operand
Event class
Description
1
Zone
Audit zone event configuration changes, but not the actual values
that were changed. For example, you a message might state,
“Zone configuration has changed,” but the syslog does not
display the actual values that were changed.
2
Security
Audit any user-initiated security event for all management
interfaces. For events that have an impact on an entire fabric, an
audit is generated only for the switch from which the event was
initiated.
3
Configuration
Audit configuration downloads of existing SNMP configuration
parameters. Configuration uploads are not audited.
4
Firmware
Audit firmware download start, firmware complete, and any other
errors encountered during a firmware download.
5
Fabric
Audit administrative domain-related changes.
NOTE:
Only the active CP can generate audit messages because event classes being audited
occur only on the active CP. Audit messages cannot originate from other blades in a chassis.