A newer release of this product is available.
Security audit endpoint overview
Contributors
Suggest changes
- PDF of this doc site
Collection of separate PDF docs
Creating your file...
This may take a few minutes. Thanks for your patience.
Your file is ready
Overview
This API controls what is logged to the audit log files. All operations that make changes are always logged and cannot be disabled. The PATCH operation updates administrative audit settings for GET operations. All fields are optional for the PATCH operation. The GET operation retrieves administrative audit settings for GET operations.
Examples
Retrieving administrative audit settings for GET operations
The following example shows the administrative audit settings for GET operations
# The API: /api/security/audit # The call: curl -X GET "https://<cluster-ip>/api/security/audit" # The response: { "cli": false, "http": false, "ontapi": false, "_links": { "self": { "href": "/api/security/audit" } } }
Updating administrative audit settings for GET operations
The following example updates the administrative audit settings for GET operations
# The API: /api/security/audit # The call: curl -X PATCH "https://<cluster-ip>/api/security/audit" -d '{"cli":"false", "http": "true", "ontapi": "true"}'