Creating a record of actions for your database

You can set up iBase to log virtually all user actions with or without user-supplied reasons the actions. Different auditing levels can be set depending on the requirements of your environment.

What is recorded?

iBase starts auditing at the lowest possible level of detail when you create a database. You cannot stop this level of auditing but you can choose to start at a higher level, and to modify all auditing options for existing databases. See Controlling What is Audited for further details.
Attention: The option to record user accesses to records, without change of data, creates large volumes of log data so it is available only with iBase SQL Server databases. Use this option only when strictly required. Your SQL Server administrator can configure the disks to improve performance in this area. For more information, see SQL Server clients, servers, and networks.
Independently of the audit level of the database (SQL Server format only), you can audit changes to data. The iBase field types that you can audit depend on the SQL Server version. See Audit History.
Note: For more information about auditing in a replicated database, see Replicating and synchronizing databases.

Where is it recorded?

Separate audit logs are created for security files and databases.

Security file logs track the opening of databases, failed logon attempts, and a range of administrative actions such as creating templates, and managing users and groups.

Database logs track the opening and closing of databases, historical data (if logged), and all the requested actions within databases. Actions are recorded regardless of origin: users can request database actions from iBase Designer, iBase, Analyst’s Notebook, or third-party mapping applications.

The physical form and location of logs is different for security files, Access databases, and SQL Server databases. The audit viewer handles these differences and can produce archive files in a standard form.

Viewing audit logs

To use the Audit Viewer, a user needs to be a system administrator, a database administrator, or an audit administrator.

The Audit Viewer, if installed, is available from the IBM i2 iBase section of the Windows start menu. You can view and manage audit logs for databases and security files. You can open multiple windows to inspect logs for several databases if those databases are managed through the same security file.

Audit Viewer might not display all the entries in the audit log:
  • Some users generate restricted audit log entries that you need the Audit Administrator role to view.
  • Some audit log entries are hidden if SC codes are used (you can only view the entries for records that match your security classification).
The level of detail in the audit log is determined by the audit level set for the database.

Audit log databases

If you are using iBase and an Access database, the database log is held in the .idl file that is stored in the same folder as the database file.

In an SQL Server installation of iBase, an audit log database is created alongside the main SQL Server database. The name of the database is the same as the main database name with the suffix _log. For instance, the database User_Guide has an audit log database User_Guide_log.

Your SQL Server administrator must ensure that iBase users can access this audit log database. For more information, see Access control.

For information on backing up audit log databases, see Archiving audit logs.