Table of Contents

Search

  1. Preface
  2. Introduction to Dynamic Data Masking Administration
  3. Authentication
  4. Security
  5. Connection Management
  6. JDBC Client Configuration
  7. ODBC Client Configuration
  8. Configuration for MicroStrategy
  9. Access Control
  10. Logs
  11. High Availability
  12. Server Control
  13. Performance Tuning
  14. Troubleshooting
  15. Appendix A: Database Keywords

Administrator Guide

Administrator Guide

Loggers Example

Loggers Example

Your organization uses syslog to integrate log data from multiple types of systems. You want to add Dynamic Data Masking logs to the syslog repository.
You add appenders to the userReplacement, auditTrail, and rootLogger system loggers. The appenders use the syslog appender class. When Dynamic Data Masking writes to the auditTrail.log, rule.log, and server.log files, it also creates a syslog output.
You create custom loggers and you add syslog appenders to the loggers. You use the loggers in security rules based on the events that you want to log. Dynamic Data Masking sends the event data to the syslog repository.

0 COMMENTS

We’d like to hear from you!