Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Current »

Introduction

The tags beginning with auth.ibm identify events generated by authentication services belonging to IBM.

Valid tags and data tables 

The full tag must have 4 levels. The first two are fixed as auth.ibm. The third level identifies the type of events sent. The fourth level indicates the event subtype.

These are the valid tags and corresponding data tables that will receive the parsers' data:

Product / Service

Tags

Data tables

IBM Security Access Manager

auth.ibm.isam.events

auth.ibm.isam.events

For more information, read more About Devo tags.

Table structure

These are the fields displayed in this table:

Field

Type

Extra fields

eventdate

timestamp

host

str

facility

str

level

str

device

str

line_number

str

code

str

args

str

description

str

eventId

str

name

str

priority

str

time

str

timestamp

str

unknown

str

hostchain

str

tag

str

rawMessage

str

  • No labels