HP XP P9000 Audit Log User and Reference Guide

Table Of Contents
1 Introduction
Unless otherwise specified, the term P9000 in this guide refers to the following disk array:
P9500 Disk Array
The GUI illustrations in this guide were created using a Windows computer with the Internet Explorer
browser. Actual windows may differ depending on the operating system and browser used. GUI
contents also vary with licensed program products, storage system models, and firmware versions.
Audit logs are created on the Service Processor (SVP) computer in the storage system. You can
access the audit logs that are output by the SVP, but the SVP is accessible only by support personnel.
Resources that can be executed for each function
The Remote Web Console main window shows only the resources that are assigned to a user who
logs into the Remote Web Console. The window may also show the related resources that are
required to manage the assigned resources.
The Remote Web Console secondary window shows all the resources in the storage system. When
you execute each function in the Remote Web Console secondary window, verify the resource
group ID in the Report Display dialog boxes, and then execute the operations for the resources
assigned to the user account.
When you use the functions described in this manual, the resources for each operation must satisfy
the specific conditions.
For details on user accounts, see the HP XP P9000 Remote Web Console User Guide. For details
on the conditions of the resources, see the HP XP P9000 Provisioning for Open Systems User Guide
or the HP XP P9000 Provisioning for Mainframe Systems User Guide.
Unless otherwise specified, the term P9000 in this guide refers to the P9500 disk array.
Overview
The audit log is an important tool that you can use to keep track of operations, to monitor security,
to investigate the cause of errors, and to avoid potential errors.
Audit logs are created on the SVP computer in the storage system. You can access the audit logs
that are output by the SVP, but the SVP is accessible only by support personnel.
Audit logs store the following histories:
Operations performed from a Remote Web Console computer or an SVP
Commands that the storage system received from a host or computer using RAID Manager.
Operations about encryption key for data encryption
The history may not be output in chronological order. This history includes the user, the time of the
operation, the name of the operation, any parameters set, and the end result (normal completion
or error message). Each audit log file ends with a serial number, from 0,000,000,000 to
4,294,967,295. When the number reaches 4,294,967,295, it resets and starts over at
0,000,000,000.
12 Introduction