6 Audit log examples for encryption key operations
This chapter provides examples and descriptions of the audit logs produced by data encryption
operations.
For the detailed information of version numbers in log output examples, see Table 4 (page 16).
[ENC] Backup Keys
07xx,YYYY/MM/DD,HH:MM:SS.xxx, 00:00,RMI AP,uid=user-name,1,
Task Name,[ENC],Backup Keys,,Normal end,
from=xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx,,Seq.=xxxxx
[ENC] Create Keys
07xx,YYYY/MM/DD,HH:MM:SS.xxx, 00:00,RMI AP,uid=user-name,1,
Task name,[ENC],Create Keys,,Normal end,
from=xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx,,Seq.=xxxxx
+{Enc Key Number}=[1,2],Num. of Keys=2
Table 16 Create Keys Operation
DescriptionItem
The encryption key number.Enc Key Number
The number of the encryption keys.Num. of Keys
[ENC] Delete Keys
07xx,YYYY/MM/DD,HH:MM:SS.xxx, 00:00,RMI AP,uid=user-name,1,
Task Name,[ENC],Delete Keys,,Normal end,
from=xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx,,Seq.=xxxxx
+{Enc Key Number}=[1,2],Num. of Keys=2
Table 17 Delete Keys Operation
DescriptionItem
The encryption key number to be deleted.Enc Key Number
The number of the encryption keys to be deleted.Num. of Keys
[ENC] Edit Encryption
07xx,YYYY/MM/DD,HH:MM:SS.xxx, 00:00,RMI AP,uid=user-name,1,
Task Name,[ENC],Edit Encryption,,Normal end,
from=xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx,,Seq.=xxxxx
+{PG,Encryption,Enc Key Number}=[{XX-XX,Enable,0},{XX-XX,Disable,
-}],Num. of PGs=2
Table 18 Edit Encryption Operation
DescriptionItem
The parity group number.PG
The status of the encryption.
Enable: The encryption setting is enabled.
Disable: The encryption setting is disabled.
Encryption
[ENC] Backup Keys 191