Data Fabric allows you to log audit records of cluster-administration operations, and operations on directories, files, streams and tables.
The auditing capabilities in data-fabric are critical for regulatory compliance as well as for understanding user behavior. Regulations often require the ability to prove which user accessed which data. Logging user behavior helps to identify suspicious activities on sensitive data.
If you enable auditing, data-fabric records information about data access, operations on data objects, and
execution of maprcli commands, including the following:
maprcli commands, REST API
calls, and actions performed on a cluster through the Control SystemBy analyzing audit records, security analysts can answer questions such as these:
Data scientists can analyze audit records to answers these questions:
For a comprehensive explanation on how auditing works, see How Does Auditing Work?.
Levels of Auditing explains the two levels of auditing.
Ensure that you perform the prerequisites mentioned in Managing Auditing before enabling auditing.
To enable or disable auditing of data access operations, see Enabling and Disabling Auditing of Data Access Operations.
Auditing Data Access Operations describes the data access operations that are audited.
To enable or disable auditing of cluster administration operations, see Enabling and Disabling Auditing of Cluster Administration.
Auditing Cluster Operations describes the operations that are audited on a cluster.
To selectively audit Data Fabric Objects, see Selective Auditing of filesystem, HPE Ezmeral Data Fabric Database Table, and HPE Ezmeral Data Fabric Event Store Operations Using the CLI.
After you enable auditing, audit records immediately start to be recorded in audit logs. You can use Apache Drill or other tools to process these logs. The following diagram shows the workflow for processing audit logs of cluster-administration operations:

The next diagram shows the workflow for processing audit logs of filesystem and table operations.

The step "Expand IDs in log files periodically" refers to the use of the expandaudit utility. Raw audit logs contain
file identifiers, volume identifiers, and user identifiers. The expandaudit utility looks up the names that
are associated with those identifiers and puts them in new copies of the audit logs. In
addition, the data-fabric audit
streaming feature uses an API to convert file and volume IDs. The information on audit log files can be
used to interpret auditing messages.
To stream audit logs, see Streaming Audit Logs.
To enable or disable audit streaming, see Enabling and Disabling Audit Streaming Using the CLI.