473,416 Members | 1,531 Online
Bytes | Software Development & Data Engineering Community
Post Job

Home Posts Topics Members FAQ

Join Bytes to post your question to a community of 473,416 software developers and data experts.

Scoping out the size needed for running DB2 audit facility

We're going to be enabling the audit facility on some of our DB2
servers in the future, and I need some basic information on how large
I can expect the log to grow.

I've already been warning NOT to enable everything as a single event
can generate multiple BIG records that will swamp the system.

Going over the requirementat and our access standards, here's the list
of the items we neet to monitor, broken down by the categories:
AUDIT--- Changes to the Audit settings.
CHECKING --- Failed authorization checking on server authentication as
well as object permissions.
SECMAINT --- Security Maintenace changes (grants/revokes on database
objects or DBADM authority, database manager configuration
parameters).
SYSADMIN --- Commands where SYSADM, SYSMAIN, or SYSCTRL permissions
are required (powerful roles).
VALIDATE --- Failed user validation (authentication or retrieving
security information).

If someone can also supply me with some actual logs, I'd appreciate it
as I also have to create tools to parse the logs and examine them.

Of course, I suspect that someone already has tools to do this. Please
provide a link to the tool if possible.

Thanks in advance!

Bruce
Nov 12 '05 #1
1 2489
The actual db2audit log is "unreadable". You need to "db2audit
extract". You can do this to an ASC DEL file which you can then load
into a table of your own design to pick up what you need.
There's the rub. You need to pick up failures of CHECKING and VALIDATE,
but you also need to pick up succes and failure of SYSADMIN, AUDIT,
SECMAINT.
Unfortunately, the audit facility config will not allow this. You'll
need to specify STATUS BOTH in the config scope which will also give you
succes records for CHECKING and VALIDATE. However, if you extract to an
ASCDEL file and load into a table you can then use SELECT stmts. to
filter wexactly what you need.
As to size estimate, this is vry difficult as it is event based and we
have no clue at all as to how many events will happen or about their
rate of arrival.
I've seen ASCII flat files from audit output which generated 7 to 9
records of 3-4 lines of text for just a CONNECT statement when audit
scope was defined with ALL, so you can expect a fairly sized output file.
You shouldn't get too many records from SYSADMIN, AUDIT and SECMAINT as
they require sysadmin and dbadm authorities and there should not be that
many. Where you may get "hurt" is at VALIDATE and CHECKING as these
events will apply to all of your connections and every object that they
attempt to touch.

HTH, Pierre.

Byrocat wrote:
We're going to be enabling the audit facility on some of our DB2
servers in the future, and I need some basic information on how large
I can expect the log to grow.

I've already been warning NOT to enable everything as a single event
can generate multiple BIG records that will swamp the system.

Going over the requirementat and our access standards, here's the list
of the items we neet to monitor, broken down by the categories:
AUDIT--- Changes to the Audit settings.
CHECKING --- Failed authorization checking on server authentication as
well as object permissions.
SECMAINT --- Security Maintenace changes (grants/revokes on database
objects or DBADM authority, database manager configuration
parameters).
SYSADMIN --- Commands where SYSADM, SYSMAIN, or SYSCTRL permissions
are required (powerful roles).
VALIDATE --- Failed user validation (authentication or retrieving
security information).

If someone can also supply me with some actual logs, I'd appreciate it
as I also have to create tools to parse the logs and examine them.

Of course, I suspect that someone already has tools to do this. Please
provide a link to the tool if possible.

Thanks in advance!

Bruce


--
Pierre Saint-Jacques - Reply to: sescons at attglobal dot net
IBM DB2 Cerified Solutions Expert - Administration
SES Consultants Inc.
Nov 12 '05 #2

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

1
by: Nabhonil Sinha | last post by:
hi, There is facility to do backup of the database. I can use that facility to backup the database. But before i do a backup i want to check if the disk space available enough to backup that...
3
by: Robert | last post by:
Greetings I have been trying to write a script that will list out the size of each user table in a specified DB. I am running into a scoping problem when trying to format my display. I am sure...
1
by: Patrick Dunnigan | last post by:
Hi, I am attempting a bulk copy from a c program into SQL Server 2000 using DBLib in freeTDS 0.63 RC11 (gcc 3.4.3, RH 9). I am getting an error message that I cannot find any documentation on. ...
0
by: JohnO | last post by:
Thanks to Serge and MarkB for recent tips and suggestions. Ive rolled together a few stored procedures to assist with creating audit triggers automagically. Hope someone finds this as useful as...
3
by: morris.slutsky | last post by:
So every now and then I like to mess around with hobby projects - I often end up trying to write an OpenGL video game. My last attempt aborted due to the difficulty of automating game elements and...
17
by: Chad | last post by:
The following question stems from Static vs Dynamic scoping article in wikipedia. http://en.wikipedia.org/wiki/Scope_(programming)#Static_versus_dynamic_scoping Using this sites example, if I...
0
by: mahessh | last post by:
Hi folks! i need a clarification regarding the Db2 audit facility , when we configure the Audit facility is it possible that we get the hostname/ip in the audit...
14
by: Khookie | last post by:
Woah... is it just me or do C programmers don't bother talking about how cool C can be (compared to Lisp, Haskell, etc.) - functionally speaking? // Lexical scoping - via nested functions...
1
by: =?Utf-8?B?U3ludGF4IDM3NzA3?= | last post by:
I have found lots of people talking about this issue, but no one seems to have a solution. I could really use some help here. Has anyone seen this or have any ideas? I have been running the...
0
by: emmanuelkatto | last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud. Please let me know. Thanks! Emmanuel
0
BarryA
by: BarryA | last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
1
by: nemocccc | last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
0
by: Hystou | last post by:
There are some requirements for setting up RAID: 1. The motherboard and BIOS support RAID configuration. 2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
0
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
0
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
0
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
0
agi2029
by: agi2029 | last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
0
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.