and IPv6) of the client machine that accessed the server; operations performed, such as search, add,
and edit; and the result of the access, such as the number of entries returned:
id_number processor - [date:time] [number_of_operations] [result] servlet: message
10439.http-13443-Processor25 - [19/May/2009:14:16:51 CDT] [11] [3] UGSubsystem: Get User Error
User not found
Example 15.1. TKS System Log
This log is on by default.
15.2.2. Transactions Log
Transaction logs are kept for the CA, OCSP, DRM, and TKS subsystems.
This log, transactions, records any kind of operation performed or submitted to the subsystem.
id_number.processor - [date:time] [number_of_operations] [result] servlet: message
These messages are specific to the certificate service, such as the CA receiving certificate requests,
the DRM archiving or retrieving keys, and the TKS registering a new TPS. This log can also be used to
detect any unauthorized access or activity.
11438.http-10443-Processor25 - [27/May/2009:07:56:18 CDT] [1] [1] archival reqID 4 fromAgent
agentID: CA-server.example.com-9444 authenticated by noAuthManager is completed DN requested:
UID=recoverykey,E=recoverykey@email.com,CN=recover key serial number: 0x3
Example 15.2. DRM Transactions Log
This log is on by default.
15.2.3. Debug Logs
Debug logs are maintained for all six subsystems, with varying degrees and types of information.
Debug logs for each subsystem record much more detailed information than system, transaction,
and access logs. Debug logs contain very specific information for every operation performed by the
subsystem, including plug-ins and servlets which are run, connection information, and server request
and response messages.
The general types of services which are recorded to the debug log are briefly discussed in
Section 15.1.1, "Services That Are
processing certificate requests, certificate status checks, and archiving and recovering keys, and
access to web services.
The debug logs for the CA, OCSP, DRM, and TKS record detailed information about the processes for
the subsystem. Each log entry has the following format:
[date:time] [processor]: servlet: message
Logged". These services include authorization requests,
Transactions Log
363
Need help?
Do you have a question about the CERTIFICATE SYSTEM 8.0 - ADMINISTRATION and is the answer not in the manual?
Questions and answers