473,657 Members | 2,776 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Scoping out the size needed for running DB2 audit facility

We're going to be enabling the audit facility on some of our DB2
servers in the future, and I need some basic information on how large
I can expect the log to grow.

I've already been warning NOT to enable everything as a single event
can generate multiple BIG records that will swamp the system.

Going over the requirementat and our access standards, here's the list
of the items we neet to monitor, broken down by the categories:
AUDIT--- Changes to the Audit settings.
CHECKING --- Failed authorization checking on server authentication as
well as object permissions.
SECMAINT --- Security Maintenace changes (grants/revokes on database
objects or DBADM authority, database manager configuration
parameters).
SYSADMIN --- Commands where SYSADM, SYSMAIN, or SYSCTRL permissions
are required (powerful roles).
VALIDATE --- Failed user validation (authentication or retrieving
security information).

If someone can also supply me with some actual logs, I'd appreciate it
as I also have to create tools to parse the logs and examine them.

Of course, I suspect that someone already has tools to do this. Please
provide a link to the tool if possible.

Thanks in advance!

Bruce
Nov 12 '05 #1
1 2506
The actual db2audit log is "unreadable ". You need to "db2audit
extract". You can do this to an ASC DEL file which you can then load
into a table of your own design to pick up what you need.
There's the rub. You need to pick up failures of CHECKING and VALIDATE,
but you also need to pick up succes and failure of SYSADMIN, AUDIT,
SECMAINT.
Unfortunately, the audit facility config will not allow this. You'll
need to specify STATUS BOTH in the config scope which will also give you
succes records for CHECKING and VALIDATE. However, if you extract to an
ASCDEL file and load into a table you can then use SELECT stmts. to
filter wexactly what you need.
As to size estimate, this is vry difficult as it is event based and we
have no clue at all as to how many events will happen or about their
rate of arrival.
I've seen ASCII flat files from audit output which generated 7 to 9
records of 3-4 lines of text for just a CONNECT statement when audit
scope was defined with ALL, so you can expect a fairly sized output file.
You shouldn't get too many records from SYSADMIN, AUDIT and SECMAINT as
they require sysadmin and dbadm authorities and there should not be that
many. Where you may get "hurt" is at VALIDATE and CHECKING as these
events will apply to all of your connections and every object that they
attempt to touch.

HTH, Pierre.

Byrocat wrote:
We're going to be enabling the audit facility on some of our DB2
servers in the future, and I need some basic information on how large
I can expect the log to grow.

I've already been warning NOT to enable everything as a single event
can generate multiple BIG records that will swamp the system.

Going over the requirementat and our access standards, here's the list
of the items we neet to monitor, broken down by the categories:
AUDIT--- Changes to the Audit settings.
CHECKING --- Failed authorization checking on server authentication as
well as object permissions.
SECMAINT --- Security Maintenace changes (grants/revokes on database
objects or DBADM authority, database manager configuration
parameters).
SYSADMIN --- Commands where SYSADM, SYSMAIN, or SYSCTRL permissions
are required (powerful roles).
VALIDATE --- Failed user validation (authentication or retrieving
security information).

If someone can also supply me with some actual logs, I'd appreciate it
as I also have to create tools to parse the logs and examine them.

Of course, I suspect that someone already has tools to do this. Please
provide a link to the tool if possible.

Thanks in advance!

Bruce


--
Pierre Saint-Jacques - Reply to: sescons at attglobal dot net
IBM DB2 Cerified Solutions Expert - Administration
SES Consultants Inc.
Nov 12 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
2224
by: Nabhonil Sinha | last post by:
hi, There is facility to do backup of the database. I can use that facility to backup the database. But before i do a backup i want to check if the disk space available enough to backup that database. I have a 22gb database mdf file, when i took a backup of that its only 3gb. SO i cannot use the size of mdf file to determine the database dump file. Is there any facility available to find out the backup database dump size before doing...
3
1674
by: Robert | last post by:
Greetings I have been trying to write a script that will list out the size of each user table in a specified DB. I am running into a scoping problem when trying to format my display. I am sure there are several ways to derive the results. My method won't allow me to select count(*) from @tab_var as it barks that I must declare the variable @tab_var.
1
6369
by: Patrick Dunnigan | last post by:
Hi, I am attempting a bulk copy from a c program into SQL Server 2000 using DBLib in freeTDS 0.63 RC11 (gcc 3.4.3, RH 9). I am getting an error message that I cannot find any documentation on. The server is sending back the following: "Received invalid row length 2 from bcp client. Minimum row size is 4." I know the row is longer 2 bytes (see below). Once this happened I created a
0
2468
by: JohnO | last post by:
Thanks to Serge and MarkB for recent tips and suggestions. Ive rolled together a few stored procedures to assist with creating audit triggers automagically. Hope someone finds this as useful as I've found it educational. Note: - I build this for use in a JDEdwards OneWorld environment. I'm not sure how generic others find it but it should be fairly generic. - I use a C stored procedure GETJOBNAME to get some extra audit data,
3
2058
by: morris.slutsky | last post by:
So every now and then I like to mess around with hobby projects - I often end up trying to write an OpenGL video game. My last attempt aborted due to the difficulty of automating game elements and creating a good level editor - I basically needed a scripting language to control the C modules of the game and, after a half-assed attempt or two to make my own, I just gave up. So naturally this seems like a job for Python. Embedding Python...
17
2891
by: Chad | last post by:
The following question stems from Static vs Dynamic scoping article in wikipedia. http://en.wikipedia.org/wiki/Scope_(programming)#Static_versus_dynamic_scoping Using this sites example, if I go like this: #include <stdio.h> int x = 0;
0
1152
by: mahessh | last post by:
Hi folks! i need a clarification regarding the Db2 audit facility , when we configure the Audit facility is it possible that we get the hostname/ip in the audit tables(audit/checking/secmaint/sysadm etc).kindly revert me ASAP thanking you
14
2171
by: Khookie | last post by:
Woah... is it just me or do C programmers don't bother talking about how cool C can be (compared to Lisp, Haskell, etc.) - functionally speaking? // Lexical scoping - via nested functions #include <stdio.h> int main() { int x = 10;
1
2383
by: =?Utf-8?B?U3ludGF4IDM3NzA3?= | last post by:
I have found lots of people talking about this issue, but no one seems to have a solution. I could really use some help here. Has anyone seen this or have any ideas? I have been running the same backup for 2 years and I came in one morning and it just decided it would not work anymore. Histroy: * Windows 2003 Server
0
8316
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
8833
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
8610
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
7345
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own.... Now, this would greatly impact the work of software developers. The idea...
1
6174
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms. Adolph will...
0
5636
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert into image. Globals.ThisAddIn.Application.ActiveDocument.Select();...
0
4168
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
2
1967
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
2
1730
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.