security log storage-fieldΒΆ

security log storage-field(1)			  BIG-IP TMSH Manual			security log storage-field(1)

NAME
       storage-field - Lists the available storage format fields that can be used in the context of Application
       Security Logging.

MODULE
       security log

SYNTAX
       Retrieve the list of the storage-field values using the syntax shown in the following sections.

   DISPLAY
	list storage-field
	list storage-field [ [ [name] | [glob] | [regex] ] ... ]
	  options:
	    all
	    app-service
	    format
	    id
	    one-line

DESCRIPTION
       Use this command to display the possible values of the storage-field object to be used in the context of
       Application Security Logging. These possible values are predefined traffic items available for the server to
       log.  The traffic items appear in the final format string as arguments in the printf() function, i.e.
       "%$", therefore each storage field has its fixed format (specifier) and id (position).

EXAMPLES
       list storage-field

       Displays all the storage fields supported by Application Security Logging.

OPTIONS
       app-service
	    Displays the application service to which the object belongs. The default value is none. Note: If the
	    strict-updates option is enabled on the Application Service that owns the object, you cannot modify or
	    delete the object. Only the Application Service can modify or delete the object.

       format
	    Displays a format of the field (s - string, d - decimal). It corresponds to the conversion specifier in
	    the printf() function.

       id   Displays an order ID of the field (starting from 1). It corresponds to the position in the argument list
	    of the desired argument in the printf() function.

SEE ALSO
       glob, list, regex, security log profile, tmsh

COPYRIGHT
       No part of this program may be reproduced or transmitted in any form or by any means, electronic or
       mechanical, including photocopying, recording, or information storage and retrieval systems, for any purpose
       other than the purchaser's personal use, without the express written permission of F5 Networks, Inc.

       F5 Networks and BIG-IP (c) Copyright 2009-2012. All rights reserved.

BIG-IP						      2012-08-02			security log storage-field(1)