Document toolboxDocument toolbox

auth.ibm

Introduction

The tags beginning with auth.ibm identify events generated by authentication services belonging to IBM.

Valid tags and data tables 

The full tag must have 4 levels. The first two are fixed as auth.ibm. The third level identifies the type of events sent. The fourth level indicates the event subtype.

These are the valid tags and corresponding data tables that will receive the parsers' data:

Product / Service

Tags

Data tables

Product / Service

Tags

Data tables

IBM Security Access Manager

auth.ibm.isam.events

auth.ibm.isam.events

For more information, read more About Devo tags.

Table structure

These are the fields displayed in this table:

auth.ibm.isam.events

Field

Type

Extra fields

Field

Type

Extra fields

eventdate

timestamp

 

host

str

 

facility

str

 

level

str

 

device

str

 

line_number

str

 

code

str

 

args

str

 

description

str

 

eventId

str

 

name

str

 

priority

str

 

time

str

 

timestamp

str

 

unknown

str

 

hostchain

str

✓

tag

str

✓

rawMessage

str

✓