Audit Logs
Audit Logs record system events that occurred, where they occurred, and which users initiated them.
The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
Audit Logs record system events that occurred, where they occurred, and which users initiated them.
Command or Action | Purpose | |||
---|---|---|---|---|
Step 1 |
UCS-A# scope security |
Enters security mode. |
||
Step 2 |
UCS-A /security # show audit-logs |
|
The following example displays the audit logs:
UCS-A# scope security
UCS-A /security # show audit-logs
Audit trail logs:
Creation Time User ID Action Description
-------------------- ---------- -------- ---------------- -----------
2015-12-24T12:34:02.980
internal 6572175 Creation Web A: local user admin logged i
2015-12-22T11:26:33.547
admin 6512814 Creation Server port A/1/21 created
2015-12-22T11:26:33.547
admin 6512816 Deletion Server Port Channel A/1025 delet
2015-12-22T11:26:33.536
admin 6512791 Modification Acknowledged chassis 1.
2015-12-22T11:25:44.755
admin 6512767 Modification chassis discovery policy modifie
2015-12-22T11:25:01.447
admin 6512763 Deletion Server Member Port A/1/23 remove
2015-12-22T11:04:22.031
admin 6511644 Deletion Server port A/1/21 deleted
2015-12-22T11:04:22.030
admin 6511638 Creation Server Port Channel A/1025 creat
2015-12-22T11:04:22.030
UCS-A /security #