auth.ibm
Introduction
The tags beginning with auth.ibm
identify events generated by authentication services belonging to IBM.
Valid tags and data tablesÂ
The full tag must have 4 levels. The first two are fixed as auth.ibm
. The third level identifies the type of events sent. The fourth level indicates the event subtype.
These are the valid tags and corresponding data tables that will receive the parsers' data:
Product / Service | Tags | Data tables |
---|---|---|
IBM Security Access Manager |
|
|
For more information, read more About Devo tags.
Table structure
These are the fields displayed in this table:
Field | Type | Extra fields |
---|---|---|
eventdate |
| Â |
host |
| Â |
facility |
| Â |
level |
| Â |
device |
| Â |
line_number |
| Â |
code |
| Â |
args |
| Â |
description |
| Â |
eventId |
| Â |
name |
| Â |
priority |
| Â |
time |
| Â |
timestamp |
| Â |
unknown |
| Â |
hostchain |
| ✓ |
tag |
| ✓ |
rawMessage |
| ✓ |