Table of Contents

Search

  1. Preface
  2. Introduction to Dynamic Data Masking Administration
  3. Authentication
  4. Connection Management
  5. JDBC Client Configuration
  6. ODBC Client Configuration
  7. Access Control
  8. Logs
  9. High Availability
  10. Server Control
  11. Performance Tuning

Administrator Guide

Administrator Guide

Custom Loggers

Custom Loggers

A custom logger is a logger that you create to use in a security rule to define events that you want to log.
Loggers have a Name property that you define when you create the logger. Logger names must be unique. When you create a security rule with the Log Message rule action, you specify the name of the logger in the rule and define the log level in the rule. The logger creates logs based on the appender child nodes of the logger. The log level that you define in the Send As parameter of the security rule must be equal to or higher than the log level that you define in the Dynamic Data Masking Server node. If the log level of the rule is a lower severity than the Dynamic Data Masking Server Log Level parameter, the logger will not log the event.
After you create a logger and add an appender, you must use the Log Message rule action in a security rule to define the events that you want the logger to log. If you do not use the logger in a security rule, it does not log events.
Because logger nodes are child nodes of the Dynamic Data Masking Server node, only a Dynamic Data Masking administrator can create or edit a logger node. An administrator cannot delegate privileges to a non-privileged user.
Do not use system loggers with the Log Message rule action because you might not be able to perform log analysis on the logs if they contain information from security rules.

0 COMMENTS

We’d like to hear from you!