Skip to main content
Data Infrastructure Insights

Audit Workload Security Events

Contributors netapp-alavoie

Identify changes both expected (for tracking) or unexpected (for troubleshooting). View an audit trail of the Workload Security system events and user activities.

Viewing Audited Events

To View the Audit page, click Admin > Audit in the menu. The Audit page is displayed, providing the following details for each audit entry:

  • Time - Date and time of the event or activity

  • User - The User who initiated the activity

  • Role - The user's role in Workload Security (guest, user, administrator)

  • IP - The IP address associated with the event

  • Action - Type of activity, for example Login, Create, Update

  • Category - The category of activity.

  • Details - Details of the activity

  • Application Type - Type of audited application: Observability OR Workload Security. Use it for filtering only Workload Security audits.

Workload Security events that are audited include, but are not limited to, the following:

  • Changes of Workload Security policies.

  • Creation of new Data Source Collectors (DSCs).

  • Modification of DSCs.

  • Creation of agents.

  • User management tasks.

  • API token tasks.

Displaying audit entries

There are a number of different ways to view audit entries:

  • You can display audit entries by choosing a particular time period (1 hour, 24 hours, 3 days, etc.).

  • You can change the sort order of entries to either ascending (up arrow) or descending (down arrow) by clicking the arrow in the column header. By default, the table displays the entries in descending time order.

  • You can use the filter fields to show only the entries you want in the table. Click the [+] button to add additional filters.

More on Filtering

You can use any of the following to refine your filter:

Filter

What it does

Example

Result

* (Asterisk)

enables you to search for everything

vol*rhel

returns all resources that start with "vol" and end with "rhel"

? (question mark)

enables you to search for a specific number of characters

BOS-PRD??-S12

returns BOS-PRD12-S12, BOS-PRD23-S12, and so on

OR

enables you to specify multiple entities

FAS2240 OR CX600 OR FAS3270

returns any of FAS2440, CX600, or FAS3270

NOT

allows you to exclude text from the search results

NOT EMC*

returns everything that does not start with "EMC"

None

searches for blank/NULL/None in any field where selected

None

returns results where the target field is not empty

Not *

as with None above, but you can also use this form to search for NULL values in text-only fields

Not *

returns results where the target field is not empty.

""

searches for an exact match

"NetApp*"

returns results containing the exact literal string NetApp*

If you enclose a filter string in double quotes, Insight treats everything between the first and last quote as an exact match. Any special characters or operators inside the quotes will be treated as literals. For example, filtering for "*" will return results that are a literal asterisk; the asterisk will not be treated as a wildcard in this case. The operators OR and NOT will also be treated as literal strings when enclosed in double quotes.

Audited Events and Actions

The events and actions audited by Workload Security can be categorized in the following broad areas:

  • User account: Log in, log out, role change, etc.

  • Agent: create, delete, upgrade, pin, unpin etc.

    Examples:
    Agent Agent-Boston-1 is deleted.
    Agent upgrade to version 1.760.0 initiated by bulk operation

  • Data/User directory Collector: add, remove, modify, upgrade, postpone/resume, change agent, restart, etc.

    Examples:
    Data collector Collector-Boston1 removed, type ONTAP SVM
    Agent: Agent-Boston-1, Cluster IP 10.193.88.36, SVM demoGroupShares2
    Collector ONTAP SVM upgrade to version 1.417.0 initiated by bulk operation

  • Automated Response Policies: add, update, remove, enable, disable, etc.

    Example:
    Automated attack policy Policy-Boston1 updated. Properties Devices updated, old value: [Device(name=svm_boston1, dataSourceId=39fb3b9c-9dd4-4961-bc27-23eb0b6f9ab7)], new value: [Device(name=demoGroupShares2, dataSourceId=5b9f5b74-4533-4852-909d-8886582a4359)]

  • User blocking/unblocking: Automated or manual user blocking and unblocking.

    Example:
    Block initiated for User Safwan Langley as part of Automated Response for a period of 2 hours

  • Apikey: add, remove, etc.

    Example:
    Workload Security API access token JPick-SWS has been created

  • Notification: change email, etc.

    Example:
    Recipient ci-alerts-notifications-dl created

Exporting Audit Events

You can export the results of your Audit display to a .CSV file, which will allow you to analyze the data or import it into another application.
Steps
1. On the Audit page, set the desired time range and any filters you want. Workload Security will export only the Audit entries that match the filtering and time range you have set.
2. Click the Export button in the upper right of the table.
The displayed Audit events will be exported to a .CSV file, up to a maximum of 10,000 rows.

Retention of Audit Data

The amount of time Workload Security retains Audit data is based on your subscription:

  • Trial environments: Audit data is retained for 30 days

  • Subscribed environments: Audit data is retained for 1 year plus 1 day

Audit entries older than the retention time are automatically purged. No user interaction is needed.