Chapter 3.1.5. Managing IDs and passwords

Page 50

50 SAN Volume Controller: Best Practices and Performance Guidelines Example 3- 9 Example for a captured Audit log IBM_ 2145: ITSOCL1: admin> svcinfo catauditlog - delim : - first 3 audit_ seq_ no: timestamp: cluster_ user: ssh_ label: ssh_ ip_ address: icat_ user: result: res_ obj_ id: action_ cmd 126: 070724102710: admin: admin: 9.43.86.115: superuser: 0:: svctask mkvdiskhostmap - host 0 15 127: 070724104853: admin: admin: 9.43.86.115: superuser: 0:: svctask chcluster - icatip 9.43.86.115: 9080 128: 070724104854: admin: admin: 9.43.86.115: superuser: 0:: svctask chcluster - icatip 9.43.86.115: 9080 This output gives the reader more information about the command being issued on the SVC cluster. ...

Get SAN Volume Controller: Best Practices and Performance Guidelines now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.