Network Deployment (Distributed operating systems), v8.0 > Reference > Sets
Audit service provider settings
Use this page to define the implementation details of the audit service provider. There are three types of audit service providers: binary file-based, third party and SMF. From the console...
one of the following paths:
- Security > Security auditing > Audit service provider > audit_service_provider_name .
- Security > Security auditing > Audit service provider > New > Binary File-based emitter .
- Security > Security auditing > Audit service provider > New > Third party emitter .
Name
Unique name associated with the audit service provider.
Third party emitter class name
Name of the class for this implementation. This field is only present for Third party emitter implementations.
Audit file location
Audit file size
Maximum size of a single binary log file. This value is defined in megabytes.
Maximum number of audit log files
Maximum number of binary log files to create before the oldest is replaced.
The maximum number of logs does not include the current binary log that is being written to. It is a reference to the maximum number of archived (timestamped) logs. The total number of binary logs that can exist for a server process is the maximum number of archived logs plus the current log.
Audit log wrapping
Wrapping behavior of the binary audit log when the maximum number of binary audit log files is reached.
New feature: In this release of WAS, there are new customizable options available when specifying the default audit log wrapping behavior. This is only applicable to the Binary Audit Log implementation.
Choose from one of the following options:
WRAP
If you select this option, when the maximum audit logs are reached, the oldest audit log is rewritten; notification is not sent to the auditor. This is the default option, and mimics the default behavior in WAS Version 7.0.
NOWRAP
This option does not rewrite over the oldest audit log. It stops the audit service, sends a notification to the SystemOut.log, and quiesces the application server.
SILENT_FAIL
This option does not rewrite over the oldest audit log. It also stops the audit service, but does allow the WebSphere process to continue. Notifications are not posted in the SystemOut.log. New feature:If audit notification of failures in the audit subsystem is configured, and SILENT_FAIL is selected, the auditor is not notified of the audit subsystem failure. The SILENT_FAIL option takes precedence
If you use the NOWRAP or SILENT_FAIL options, when the server is stopped as a result of the logs being maxed-out, a stopserver is performed, or because the server abends in some way, archive the binary audit logs before you restart the server.
With WAS v8 you can configure the server to use the HPEL log and trace infrastructure instead of using SystemOut.log , SystemErr.log, trace.log, and activity.log files or native z/OS logging facilities. If you are using HPEL, you can access all of your log and trace information using $PROFILE/bin/LogViewer.sh.
Event formatting module class name
Specifies a class used to format the generic event into a format that is specific to the audit service provider implementation. For example, a third party audit service provider implementation might have an event formatting class that takes the generic event and translates it into XML data.
Selectable filters
Available event filters.
To enable a filter for an implementation, select the filter from the Selectable event filters list and then click >.
Enabled filters
Event filters that are currently enabled for an implementation.
To disable a filter for an implementation, select the filter from the Enabled filters list and then click <.
Custom properties
Specifies any custom properties that might be used to add properties to a third party implementation. Custom properties are not available for binary file-based implementations or SMF implementations.
- Name
- Value
Use HPEL to troubleshoot applications
Auditing the security infrastructure
Related
Audit service provider collection