**This is an old revision of the document!**
Warning: Undefined array key 0 in /var/www/inc/Parsing/Handler/Quote.php on line 34
File Fabric Audit Logs
File Fabric audit logs are event logs that are generated based on file events that occur through the File Fabric API's and additionally on disocvery of multi-cloud files through meta-data synchronization events.
The Audit logs are available when logged in as the tenant Admin from the Audit Reports section of the Admin options.
The granularity of the audit events can be controlled by the tenant Admin.
Audit logs can be filtered, archived, and/or exported.
Audit logs can capture information that is specific to a tenant user, but also file sharing information such as the remote IP address of users accessing file shares. System tasks can also be captured by the audit event logs, dependent on the granularity that has been set. Audit events that have an IP address of 1.1.1.1 are system generatd events, that may or may not be based on user interaction.
If you want to enable the Audit logs to be accessible from the base OS then you can configure the logs to be output to syslog and they will be available in both places.
To enable audit logs see step4
To view and export audit logs see step5
Writing File Fabric Audit Logs to syslog
Step 1
syslog is a standard for message logging. It allows separation of the software that generates messages and is often used from a software perspective for security audit logging. Such messags can subsequently be integrated into log aggregation tools such as Splunk.
The syslog functionality can be enabled by logging in as appladmin, going to Site Functionality and setting “Enable write audit events to syslog” to yes.
Step 2
Login as org admin to your account and from the Menu on right hand side goto Options –
> Security and set "Write Audit Events to syslog file:" to yes The audit logs now will be written to ''%%/var/log/messages%%'' in the appliance
Sending File Fabric appliance syslog entries to rsyslog service
File Fabric Appliance:
SSH in as smeconfiguser
and then su
to root
. Edit /etc/rsyslog.conf
and at the bottom of file add line:
*.* @IP_OF_REMOTE_SYSLOG
Restart the syslog service:
systemctl restart rsyslog
The logs will be sent using UDP protocol and by default port 514 is used.
Install rsyslog:
If you have not already done so, you will need to install and configure rsyslog on a separate machine please see http://www.rsyslog.com/
Apache Access Logs
You can find apache access logs at at /etc/httpd/logs