Method and apparatus for creating and using a policy-based access/change log
First Claim
1. A method for creating a logging policy for an access/change log, comprising:
- selecting at least one object of a file system executing on a computer system to be logged;
identifying at least one attribute of the selected at least one object to be logged; and
generating a logging policy based upon the selected at least one object and the at least one attribute wherein the at least one attribute comprises at least one of user name/identifier, group name/identifier, application name/identifier, computer identity information, file access time, file modification time, file creation time, file allocation/reallocation/reservation policies, file name/path/inode number, size of the file, number of links to a file, offset/length of access/modification, access control lists, filed named data streams.
8 Assignments
0 Petitions
Accused Products
Abstract
A method and apparatus for creating and using a policy-based file access/change log. Using the policy-based techniques, specific objects within the file system are selected for logging within an access/change log. These selected objects are then processed to identify attributes of the selected objects that are to be logged such that a policy is created regarding the objects to be logged and the attributes of those objects. Lastly, the policy is applied to the object either by having a separate object (file) created that is related to the object to be logged that identifies the policy for logging, or by attaching certain attributes directly to the object such that access to the object identifies the logging policy for that object. When an object that uses policy-based logging is changed, the object access/change log policy is utilized to log only the information that is identified in the policy. In this manner, the amount of information that is logged is controlled by the logging policy, limiting the size of the access/change log.
-
Citations
15 Claims
-
1. A method for creating a logging policy for an access/change log, comprising:
-
selecting at least one object of a file system executing on a computer system to be logged; identifying at least one attribute of the selected at least one object to be logged; and generating a logging policy based upon the selected at least one object and the at least one attribute wherein the at least one attribute comprises at least one of user name/identifier, group name/identifier, application name/identifier, computer identity information, file access time, file modification time, file creation time, file allocation/reallocation/reservation policies, file name/path/inode number, size of the file, number of links to a file, offset/length of access/modification, access control lists, filed named data streams. - View Dependent Claims (2, 3, 4, 5, 6)
-
-
7. A method of using a policy-based access/change log comprising;
-
detecting at least one of a change or access associated with at least one object of a file system executing on a computer system; accessing a logging policy associated with the at least one object; and updating a access/change log in accordance with the logging policy, wherein the logging policy was generated based upon at least one attribute of the at least one object wherein the at least one attribute comprises at least one of user name/identifier, group name/identifier, application name/identifier, computer identity information, file access time, file modification time, file creation time, file allocation/reallocation/reservation policies, file name/path/inode number, size of the file, number of links to a file, offset/length of access/modification, access control lists, filed named data streams. - View Dependent Claims (8)
-
-
9. A computer readable medium comprising software that, when executed by a processor within a computer system, causes the computer system to perform a method for creating a logging policy for an access/change log, comprising:
-
selecting at least one object of a file system executing on a computer system to be logged; identifying at least one attribute of the selected at least one object to be logged; and generating a logging policy based upon the selected at least one object and the at least one attribute wherein the at least one attribute comprises at least one of user name/identifier, group name/identifier, application name/identifier, computer identity information, file access time, file modification time, file creation time, file allocation/reallocation/reservation policies, file name/path/inode number, size of the file, number of links to a file, offset/length of access/modification, access control lists, filed named data streams. - View Dependent Claims (10, 11, 12, 13)
-
-
14. A computer readable medium comprising software that, when executed by a processor within a computer system, causes the computer system to perform a method of using a policy-based access/change log comprising;
-
detecting at least one of a change or access associated with at least one object of a file system executing on a computer system; accessing a logging policy associated with the at least one object; and updating a access/change log in accordance with the logging policy, wherein the logging policy was generated based upon at least one attribute of the at least one object wherein the at least one attribute comprises at least one of user name/identifier, group name/identifier, application name/identifier, computer identity information, file access time, file modification time, file creation time, file allocation/reallocation/reservation policies, file name/path/inode number, size of the file, number of links to a file, offset/length of access/modification, access control lists, filed named data streams. - View Dependent Claims (15)
-
Specification