Security audit endpoint overview
Contributors
Suggest changes
- PDF of this doc site
Collection of separate PDF docs
Creating your file...
This may take a few minutes. Thanks for your patience.
Your file is ready
Overview
This API controls what is logged to the audit log files. All operations that make changes are always logged and cannot be disabled. The PATCH request updates administrative audit settings for GET requests. All fields are optional for a PATCH request. A GET request retrieves administrative audit settings for GET requests.
Examples
Retrieving administrative audit settings for GET requests
The following example shows the administrative audit settings for GET requests.
# The API: /api/security/audit # The call: curl -X GET "https://<cluster-ip>/api/security/audit" # The response: { "cli": false, "http": false, "ontapi": false, "_links": { "self": { "href": "/api/security/audit" } } }
Updating administrative audit settings for GET requests
The following example updates the administrative audit settings for GET requests
# The API: /api/security/audit # The call: curl -X PATCH "https://<cluster-ip>/api/security/audit" -d '{"cli":"false", "http": "true", "ontapi": "true"}'