audit

Configure command auditing. Command auditing logs the following types of system management events:

  • Admin logins and logouts for CLI, GUI, and aXAPI sessions
  • Unsuccessful admin login attempts
  • Configuration changes. All attempts to change the configuration are logged, even if they are unsuccessful.
  • CLI commands at the Privileged EXEC level (if audit logging is enabled for this level)

The audit log is maintained in a separate file, apart from the system log. The audit log is ADPaware.

The audit log messages that are displayed for an admin depend upon the admin’s role (privilege level). Admins with Root, Read Write, or Read Only privileges who view the audit log can view all the messages, for all system partitions. Admins who have privileges only within a specific partition can view only the audit log messages related to management of that partition. Partition Real Server Operator admins can not view any audit log entries.

audit Specification

Type Configuration Resource
Element Name audit
Element URI /axapi/v3/audit
Element Attributes audit_attributes
Schema audit schema

Operations Allowed:

Operation Method URI Payload

Create Object

POST

/axapi/v3/audit

audit Attributes

Get Object

GET

/axapi/v3/audit

audit Attributes

Modify Object

POST

/axapi/v3/audit

audit Attributes

Replace Object

PUT

/axapi/v3/audit

audit Attributes

Delete Object

DELETE

/axapi/v3/audit

audit Attributes

audit Attributes

enable

Description: Enables command auditing for all configuration commands.

Type: boolean

Supported Values: true, false, 1, 0

Default: 0

privilege

Description: Enables the logging of privileged EXEC commands in addition to configuration commands.

Type: boolean

Supported Values: true, false, 1, 0

Default: 0

size

Description: Specifies the number of entries the audit log file can hold. When the log buffer is full, the oldest entries are removed to make room for new entries.

Type: number

Range: 1000-30000

uuid

Description: uuid of the object

Type: string