In the first part of this series on system logging on the IBM i platform, we discussed all of the sources for security and system events on the IBM i. These sources included the security audit journal QAUDJRN, the system history log QHST, the system operator message queue, and open source log files in the IFS file system. Now that we’ve identified the sources of this important system information, how do we format it for log collection and Security Information and Event Management (SIEM) ...

REGISTER NOW TO ACCESS THIS ARTICLE

All registered users get access to premium content on iPro Developer for free.

Already registered? here.