Veritas NetBackup™ Flex Scale Administrator's Guide
- Product overview
- Viewing information about the NetBackup Flex Scale cluster environment
- NetBackup Flex Scale infrastructure management
- User management
- About Universal Shares
- Node and disk management
- Adding a node to the cluster using the NetBackup Flex Scale web interface
- License management
- Managing hardware vendor packages
- User management
- NetBackup Flex Scale network management
- Bonding operations
- Data network configurations
- Network configuration on plain device (eth5)
- Network configuration on bonded interfaces (bond0 on eth5 and eth7)
- NetBackup Flex Scale infrastructure monitoring
- Resiliency in NetBackup Flex Scale
- EMS server configuration
- Site-based disaster recovery in NetBackup Flex Scale
- Performing disaster recovery using RESTful APIs
- NetBackup Flex Scale security
- STIG overview for NetBackup Flex Scale
- FIPS overview for NetBackup Flex Scale
- Support for immutability in NetBackup Flex Scale
- Deploying external certificates on NetBackup Flex Scale
- Troubleshooting
- Collecting logs for cluster nodes
- Troubleshooting NetBackup Flex Scale issues
- Appendix A. Maintenance procedures for HPE servers
- Appendix B. Configuring NetBackup optimized duplication
- Appendix C. Disaster recovery terminologies
- Appendix D. Configuring Auto Image Replication
Audit logs
You can use the Settings > Audit logs tab to view the list of operations or events that are performed from the GUI or cluster-level CLI. All the operations and events which are triggered are logged on an audit log file as a single entry.
The following information is displayed for each operation or event:
Event: This specifies the name of the operation or event.
Date and time: This specifies the date and time when the operation or event was completed.
User: This specifies the user who initiated the operation or event.
Severity: This specifies the severity of the logged message for the operation or event.
Description: This gives information about the operation or event.
You can also search for events by using the search box that is present above the audit log entry table. The search can be done based on event name, username, severity, description or sub-string of description.
The audit logs can be collected as part of Infrastructure module from the tab of . After you extract the collected log package, the audit logs are present in the infrastructure/auditlog
directory. The audit logs can also be collected from the tab of . You can collect the audit log file from /vx/MASTER_LOG_FS/auditlog/auditlog.log
location in the tab.
The audit log captures the operation or event that a user has initiated. If that operation involves execution of some suboperations, then those suboperations also get logged as a new audit log entry.