Veritas Velocity™ User's Guide
- Getting to know Velocity
- Setting up Velocity
- How to set up the Velocity Storage Server
- How to set up the Velocity Client
- Setting up the Velocity on-premises management server
- Upgrading Velocity
- Velocity Storage Server
- Users and roles
- Oracle database ingestion using Velocity
- How to use copy preparation to mask or sanitize sensitive data
- Oracle database ingestion using NetBackup CoPilot
- Microsoft SQL Server database ingestion using Velocity
- Database sources and copies
- About scheduling ingestions for a database source
- Retention periods for database sources and copies
- Sandboxes
- Database recovery
- Alerts and logs
- Managing the Velocity physical appliance
- Configuring network address settings on the Velocity physical appliance
- About WAN optimization on the Velocity physical appliance
- About the Veritas Remote Management Console on the Velocity physical appliance
- About Velocity physical appliance storage
- About users on the Velocity physical appliance
- About Velocity physical appliance checkpoints
- About factory reset on the Velocity physical appliance
- Configuring network address settings on the Velocity physical appliance
- Monitoring the Velocity physical appliance
- Velocity physical appliance security
- About Velocity physical appliance user account privileges
- About the Velocity physical appliance intrusion detection system
- About Velocity physical appliance operating system security
- Recommended IPMI settings on the Velocity physical appliance
- Best practices
- Troubleshooting
- Glossary
- Context-sensitive topics
- Section I. Velocity shell menu commands
- Introduction
- Appendix A. Main > Manage > Storage
- Appendix B. Main > Manage > Cloud
- Appendix C. Main > Manage > Software
- Appendix D. Main > Monitor
- Appendix E. Main > Network
- Appendix F. Main > Settings
- Appendix G. Main > Support
Creating audit log reports
Use audit log reports to examine and review information about the operations that have run in Velocity. The report is created in .csv format.
To create an audit log report
- From the Velocity Cloud Console, in the left pane, click Audit Logs.
- Select a start date and an end date, and then click Create Report.
The report is downloaded.
The following columns appear on the report. Note that not all columns appear for every operation. In addition, some operations may include several audit records for a single operation.
actionTime | Shows the time when the operation occurred. |
status | Indicates if the operation succeeded or failed. |
userid | Identifies the user that initiated the operation. If a user initiated the operation, that user's email address is displayed. If the Velocity Storage Server initiated the operation, a GUID is displayed. |
action | Indicates the type of action that was performed, such as:
|
objType | Indicates what kind of item the operation was performed on, such as:
|
objid | Indicates a computer-specific identifier for the object on which the operation was performed. |
objName | Shows the name of the object on which the operation was performed. |
actionDescription | Shows free-form text that describes the action that was performed. |
actionError | Shows free-form text that describes the error that occurred during the operation. |
sessionId | Identifies a user session. All operations that a user performed between signing on and signing off have the same session ID. |
fromIP | Indicates the IP address from which the requested operation was initiated. Note: The accuracy of this value may be impacted by routers, NATs, forwarders, and other factors. |