security log storage-fieldΒΆ

security log storage-field(1) BIG-IP TMSH Manual security log storage-field(1)



NAME
       storage-field - Lists the available storage format fields that can be
       used in the context of Application Security Logging.

MODULE
       security log

SYNTAX
       Retrieve the list of the storage-field values using the syntax shown in
       the following sections.

   DISPLAY
	list storage-field
	list storage-field [ [ [name] | [glob] | [regex] ] ... ]
	  options:
	    all
	    app-service
	    format
	    id
	    one-line

DESCRIPTION
       Use this command to display the possible values of the storage-field
       object to be used in the context of Application Security Logging. These
       possible values are predefined traffic items available for the server
       to log.	The traffic items appear in the final format string as
       arguments in the printf() function, i.e. "%$",
       therefore each storage field has its fixed format (specifier) and id
       (position).

EXAMPLES
       list storage-field

       Displays all the storage fields supported by Application Security
       Logging.

OPTIONS
       app-service
	    Displays the application service to which the object belongs. The
	    default value is none. Note: If the strict-updates option is
	    enabled on the Application Service that owns the object, you
	    cannot modify or delete the object. Only the Application Service
	    can modify or delete the object.

       format
	    Displays a format of the field (s - string, d - decimal). It
	    corresponds to the conversion specifier in the printf() function.

       id   Displays an order ID of the field (starting from 1). It
	    corresponds to the position in the argument list of the desired
	    argument in the printf() function.

SEE ALSO
       glob, list, regex, security log profile, tmsh

COPYRIGHT
       No part of this program may be reproduced or transmitted in any form or
       by any means, electronic or mechanical, including photocopying,
       recording, or information storage and retrieval systems, for any
       purpose other than the purchaser's personal use, without the express
       written permission of F5 Networks, Inc.

       F5 Networks and BIG-IP (c) Copyright 2009-2012. All rights reserved.



BIG-IP				  2012-08-02	 security log storage-field(1)