Table of Contents

Search

  1. Preface
  2. Command Line Programs and Utilities
  3. Installing and Configuring Command Line Utilities
  4. Using the Command Line Programs
  5. Environment Variables for Command Line Programs
  6. Using infacmd
  7. infacmd as Command Reference
  8. infacmd aud Command Reference
  9. infacmd autotune Command Reference
  10. Infacmd bg Command Reference
  11. infacmd ccps Command Reference
  12. infacmd cluster Command Reference
  13. infacmd cms Command Reference
  14. infacmd dis Command Reference
  15. Infacmd dis Queries
  16. infacmd dp Command Reference
  17. infacmd idp Command Reference
  18. infacmd edp Command Reference
  19. Infacmd es Command Reference
  20. infacmd ics Command Reference
  21. infacmd ipc Command Reference
  22. infacmd isp Command Reference
  23. infacmd ldm Command Reference
  24. infacmd mas Command Reference
  25. infacmd mi Command Reference
  26. infacmd mrs Command Reference
  27. infacmd ms Command Reference
  28. infacmd oie Command Reference
  29. infacmd ps Command Reference
  30. infacmd pwx Command Reference
  31. infacmd roh Command Reference
  32. infacmd rms Command Reference
  33. infacmd rtm Command Reference
  34. infacmd sch Command Reference
  35. infacmd search Command Reference
  36. infacmd sql Command Reference
  37. infacmd tdm Command Reference
  38. infacmd tools Command Reference
  39. infacmd wfs Command Reference
  40. infacmd ws Command Reference
  41. infacmd xrf Command Reference
  42. infacmd Control Files
  43. infasetup Command Reference
  44. pmcmd Command Reference
  45. pmrep Command Reference
  46. Working with filemanager
  47. Working with pmrep Files

getUserActivityLog

getUserActivityLog

Gets user activity logs for a single user or multiple users. You can write user activity logs to a file or display them in the console.
The user activity log data includes successful and unsuccessful user login attempts from Informatica clients. If the client includes custom properties set by the clients on login requests, the data includes the properties.
User login attempts are not captured in the user activity logs in a domain configured to use Kerberos authentication.
The infacmd isp getUserActivityLog command uses the following syntax:
getUserActivityLog <-DomainName|-dn> domain_name <-UserName|-un> user_name <-Password|-pd> password [<-SecurityDomain|-sdn> security_domain] [<-Gateway|-hp> gateway_host1:port] [<-ResilienceTimeout|-re> timeout_period_in_seconds] [<-Users|-usrs> user1:[securitydomain] user2:[securitydomain]... [<-StartDate|-sd> start_date] [<-EndDate|-ed> end_date] [<-ActivityCode|-ac> activity_code] [<-ActivityText|-atxt> activity_text] [<-ReverseOrder|-ro> true] [<-OutputFile|-lo> output_file_name] [<-Format|-fm> output_format_BIN_TEXT_XML]
The following table describes infacmd isp getUserActivityLog options and arguments:
Option
Argument
Description
-DomainName
-dn
domain_name
Required. Name of the Informatica domain. You can set the domain name with the -dn option or the environment variable INFA_DEFAULT_DOMAIN. If you set a domain name with both methods, the -dn option takes precedence.
-UserName
-un
user_name
Required if the domain uses Native or LDAP authentication. User name to connect to the domain. You can set the user name with the -un option or the environment variable INFA_DEFAULT_DOMAIN_USER. If you set a user name with both methods, the -un option takes precedence.
Optional if the domain uses Kerberos authentication. To run the command with single sign-on, do not set the user name. If you set the user name, the command runs without single sign-on.
-Password
-pd
password
Required if you specify the user name. Password for the user name. The password is case sensitive. You can set a password with the -pd option or the environment variable INFA_DEFAULT_DOMAIN_PASSWORD. If you set a password with both methods, the password set with the -pd option takes precedence.
-SecurityDomain
-sdn
security_domain
Required if the domain uses LDAP authentication. Optional if the domain uses native authentication or Kerberos authentication. Name of the security domain to which the domain user belongs. You can set a security domain with the -sdn option or the environment variable INFA_DEFAULT_SECURITY_DOMAIN. If you set a security domain name with both methods, the -sdn option takes precedence. The security domain name is case sensitive.
If the domain uses native or LDAP authentication, the default is Native. If the domain uses Kerberos authentication, the default is the LDAP security domain created during installation. The name of the security domain is the same as the user realm specified during installation.
-Gateway
-hp
gateway_host1:port
gateway_host2:port
...
Required if the gateway connectivity information in the domains.infa file is out of date. The host names and port numbers for the gateway nodes in the domain.
-ResilienceTimeout
-re
timeout_period_in_seconds
Optional. Amount of time in seconds that infacmd attempts to establish or reestablish a connection to the domain. If you omit this option, infacmd uses the timeout value specified in the INFA_CLIENT_RESILIENCE_TIMEOUT environment variable. If no value is specified in the environment variable, the default of 180 seconds is used.
-Users
-usrs
user1:[securitydomain] user2:[securitydomain]
...
Optional. The list of users that you want to get log events for. Separate multiple users with a space. Use the wildcard symbol (*) to view logs for multiple users on a single security domain or all security domains. For example, the following strings are valid values for the option:
user:Native "user:*" "user*" "*_users_*" "*:Native"
If you use the wildcard symbol, enclose the argument in quotation marks.
If you do not enter a user, the command retrieves the log events for all users.
-StartDate
-sd
start_date
Optional. Returns log events starting from the date and time that you specify.
Enter the date and time in one of the following formats:
  • MM/dd/yyyy
  • MM/dd/yyyy HH:mm:ss
  • yyyy-MM-dd
  • yyyy-MM-dd HH:mm:ss
-EndDate
-ed
end_date
Optional. Returns log events ending by the date and time. Enter the date and time in the same format as the StartDate option.
If you enter an end date that is before the start date, the command returns no log events.
-ActivityCode
-ac
activity_code
Optional. Returns log events based on the activity code.
Use the wildcard symbol (*) to retrieve log events for multiple activity codes. Valid activity codes include:
  • CCM_10437. Indicates that an activity succeeded.
  • CCM_10438. Indicates that an activity failed.
  • CCM_10778. Indicates that a login attempt with custom properties succeeded.
  • CCM_10779. Indicates that a login attempt with custom properties failed.
  • CCM_10786. Indicates that a login attempt without custom properties succeeded.
  • CCM_10787. Indicates that a login attempt without custom properties failed.
-atxt
activity_text
-ActivityText
Optional. Returns log events based on a string found in the activity text.
Use the wildcard symbol (*) to retrieve logs for multiple events. For example, the following parameter returns all log events that contain the phrase "Enabling service" in their description:
"*Enabling service*"
If you use the wildcard symbol, enclose the argument in quotation marks.
-ReverseOrder
-ro
true
Optional. Prints log events in reverse chronological order. If you do not specify this parameter, the command displays log events in chronological order.
-OutputFile
-lo
output_file_name
Optional. Name of the output file. If you do not specify this parameter, the command displays the log on the command line.
-Format
-fm
output_format_BIN_TEXT_XML
Optional. Format of the log output file.
Valid formats include:
  • Bin (binary)
  • Text
  • XML
Default format is text. If you set the format to binary, then you must specify a file name using the -OutputFile option.

0 COMMENTS

We’d like to hear from you!