security log storage-fieldΒΆ

security log storage-field(1)				BIG-IP TMSH Manual			     security log storage-field(1)

NAME
       storage-field - Lists the available storage format fields that can be used in the context of Application Security Logging.

MODULE
       security log

SYNTAX
       Retrieve the list of the storage-field values using the syntax shown in the following sections.

   DISPLAY
	list storage-field
	list storage-field [ [ [name] | [glob] | [regex] ] ... ]
	  options:
	    all
	    app-service
	    format
	    id
	    one-line

DESCRIPTION
       Use this command to display the possible values of the storage-field object to be used in the context of Application
       Security Logging. These possible values are predefined traffic items available for the server to log.  The traffic items
       appear in the final format string as arguments in the printf() function, i.e. "%$", therefore each
       storage field has its fixed format (specifier) and id (position).

EXAMPLES
       list storage-field

       Displays all the storage fields supported by Application Security Logging.

OPTIONS
       app-service
	    Displays the application service to which the object belongs. The default value is none. Note: If the strict-updates
	    option is enabled on the Application Service that owns the object, you cannot modify or delete the object. Only the
	    Application Service can modify or delete the object.

       format
	    Displays a format of the field (s - string, d - decimal). It corresponds to the conversion specifier in the printf()
	    function.

       id   Displays an order ID of the field (starting from 1). It corresponds to the position in the argument list of the
	    desired argument in the printf() function.

SEE ALSO
       glob, list, regex, security log profile, tmsh

COPYRIGHT
       No part of this program may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
       photocopying, recording, or information storage and retrieval systems, for any purpose other than the purchaser's personal
       use, without the express written permission of F5 Networks, Inc.

       F5 Networks and BIG-IP (c) Copyright 2009-2012. All rights reserved.

BIG-IP							    2012-08-02				     security log storage-field(1)