HP XP P9000 Audit Log User and Reference Guide

Table Of Contents
[ENC] Restore Keys fr Serv
This logged information is output when the backup of the encryption key information is obtained
from the key management server.
Example
07xx,YYYY/MM/DD,HH:MM:SS.xxx, 00:00,RMI AP,uid=user-name,1,
Task Name,[ENC],Restore Keys fr Serv,,Normal end,
from=xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx,,Seq.=xxxxxxxxxx
+{UUID,Backup Date,Description,Result,Server_Reply}
=[{KEY-cf20025e-b35b-492a-a0d2-65c9a0875951,2011/11/12 14:30:00,
For Backup,Normal end,-}],Num. of Keys=1
Detailed Information
DescriptionItem
The UUID of the encryption key used for restoring in the key management serverUUID
The backup date set to the encryption key used for restoringBackup Date
The description of the encryption key used for restoringDescription
The result of the operationResult
Normal end: Normal end, Error(xxxx-yyyyy): Abnormal end
The return value from the key management serverServer_Reply
A hyphen (-) is output except when the operation ended abnormally.
For details on return values, see the manual for the key management server.
The number of restored keysNum. of Keys
[ENC] Set keys to DKC
Example
07xx,YYYY/MM/DD,HH:MM:SS.xxx, 00:00,RMI AP,uid=user-name,1,
Task Name,[ENC],Set keys to DKC,,Normal end,
from=xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx,,Seq.=xxxxxxxxxx
+{Enc Key Number}=[1,2],Num. of Keys=2
Detailed Information
DescriptionItem
The encryption key number that have been set upEnc Key Number
The number of encryption keys that have been set upNum. of Keys
[ENC] Setup Key Mng Serv
Example 1: using a key management server
07xx,YYYY/MM/DD,HH:MM:SS.xxx, 00:00,RMI AP,uid=user-name,1,
Task Name,[ENC],Setup Key Mng Serv,,Normal end,
from=xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx:xxxx,,Seq.=xxxxxxxxxx
+{Key Management Server,Host Name,Port Number,Timeout,
Retry Interval,Number of Retries,Client Certificate File Name,
Root Certificate File Name}
=[{Enable,10.213.75.112,5696,10,1,3,si22gkeyR.p12,
kmipserver.cer}],Num. of Servers=1
242 Audit log examples for encryption key operations