<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Working with Discover on</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/insight/iag_discover_wrap/</link><description>Recent content in Working with Discover on</description><generator>Hugo</generator><language>en</language><atom:link href="https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/insight/iag_discover_wrap/index.xml" rel="self" type="application/rss+xml"/><item><title>Understanding the Insight indexes</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/insight/iag_discover_wrap/iag_sec_index_wrap/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/insight/iag_discover_wrap/iag_sec_index_wrap/</guid><description>&lt;p>All the features and Protectors send logs to Insight. The logs from the Audit Store are displayed on the &lt;strong>Discover&lt;/strong> screen of the Insight Dashboard. Here, you can view the different fields logged. In addition to viewing the data, these logs serve as input for Insight to analyze the health of the system and to monitor the system for providing security. These logs are stored in the Audit index with the name, such as, &lt;strong>pty_insight_analytics_audits_1.0*&lt;/strong>.&lt;/p></description></item><item><title>Understanding the index field values</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/insight/iag_discover_wrap/iag_index_gen_new/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/insight/iag_discover_wrap/iag_index_gen_new/</guid><description>&lt;h2 id="common-logging-information">Common Logging Information&lt;/h2>
&lt;p>These logging fields are common with the different log types generated by Protegrity products.&lt;/p>
&lt;p>&lt;strong>Note:&lt;/strong> These common fields are used across all log types.&lt;/p>
&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>Field&lt;/th>
 &lt;th>Data Type&lt;/th>
 &lt;th>Description&lt;/th>
 &lt;th>Source&lt;/th>
 &lt;th>Example&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>cnt&lt;/td>
 &lt;td>Integer&lt;/td>
 &lt;td>The aggregated count for a specific log.&lt;/td>
 &lt;td>Protector&lt;/td>
 &lt;td>5&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>logtype&lt;/td>
 &lt;td>String&lt;/td>
 &lt;td>The type of log. For example, Protection, Policy, Application, Audit, Kernel, System, or Verification. For more examples about the log types, refer &lt;a href="https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/insight/iag_discover_wrap/iag_index_audit/">here&lt;/a>.&lt;/td>
 &lt;td>Protector&lt;/td>
 &lt;td>Protection&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>level&lt;/td>
 &lt;td>String&lt;/td>
 &lt;td>The level of severity. For example, SUCCESS, WARNING, ERROR, or INFO. These are the results of the logging operation. For more information about the log levels, refer &lt;a href="https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/insight/iag_discover_wrap/iag_log_levels/#log-levels">here&lt;/a>.&lt;/td>
 &lt;td>Protector&lt;/td>
 &lt;td>SUCCESS&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>starttime&lt;/td>
 &lt;td>Date&lt;/td>
 &lt;td>This is an unused field.&lt;/td>
 &lt;td>Protector&lt;/td>
 &lt;td> &lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>endtime&lt;/td>
 &lt;td>Date&lt;/td>
 &lt;td>This is an unused field.&lt;/td>
 &lt;td>Protector&lt;/td>
 &lt;td> &lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>index_time_utc&lt;/td>
 &lt;td>Date&lt;/td>
 &lt;td>The time the log was inserted into the Audit Store.&lt;/td>
 &lt;td>Audit Store&lt;/td>
 &lt;td>Mar 8, 2025 @ 12:55:24.733&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>ingest_time_utc&lt;/td>
 &lt;td>Date&lt;/td>
 &lt;td>The time the Log Forwarder processed the logs.&lt;/td>
 &lt;td>Log Forwarder&lt;/td>
 &lt;td>Mar 8, 2025 @ 12:56:22.027&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>uri&lt;/td>
 &lt;td>String&lt;/td>
 &lt;td>The URI for the log. This is an unused field.&lt;/td>
 &lt;td> &lt;/td>
 &lt;td> &lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>correlationid&lt;/td>
 &lt;td>String&lt;/td>
 &lt;td>A unique ID that is generated when the policy is deployed.&lt;/td>
 &lt;td>Hubcontroller&lt;/td>
 &lt;td>clo5nyx470bi59p22fdrsr7k3&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>filetype&lt;/td>
 &lt;td>String&lt;/td>
 &lt;td>This is the file type, such as, regular file, directory, or device, when operations are performed on the file. This displays the value ISREG for files and ISDIR for directories. This is only used in File Protector.&lt;/td>
 &lt;td>File Protector&lt;/td>
 &lt;td>ISDIR&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>index_node&lt;/td>
 &lt;td>String&lt;/td>
 &lt;td>The index node that ingested the log.&lt;/td>
 &lt;td>Audit Store&lt;/td>
 &lt;td>protegrity-ppc746/192.168.2.20&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>operation&lt;/td>
 &lt;td>String&lt;/td>
 &lt;td>This is an unused field.&lt;/td>
 &lt;td> &lt;/td>
 &lt;td> &lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>path&lt;/td>
 &lt;td>String&lt;/td>
 &lt;td>This field is provided for Protector-related data.&lt;/td>
 &lt;td>File Protector&lt;/td>
 &lt;td>/hmount/source_dir/postmark_dir/postmark/1&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>system_nano_time&lt;/td>
 &lt;td>Long&lt;/td>
 &lt;td>This displays the time in nano seconds for the Signature Verification job.&lt;/td>
 &lt;td>Signature Verification&lt;/td>
 &lt;td>255073580723571&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>tiebreaker&lt;/td>
 &lt;td>Long&lt;/td>
 &lt;td>This is an internal field that is used with the index time to make a record unique across nodes for sorting.&lt;/td>
 &lt;td>Protector, Signature Verification&lt;/td>
 &lt;td>2590230&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>_id&lt;/td>
 &lt;td>String&lt;/td>
 &lt;td>This is the entry id for the record stored in the Audit Store.&lt;/td>
 &lt;td>Log Forwarder, td-agent&lt;/td>
 &lt;td>NDgyNzAwMDItZDI5Yi00NjU1LWJhN2UtNzJhNWRkOWYwOGY3&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>_index&lt;/td>
 &lt;td>String&lt;/td>
 &lt;td>This is the index name of the Audit Store where the log is stored.&lt;/td>
 &lt;td>Log Forwarder, td-agent&lt;/td>
 &lt;td>pty_insight_analytics_audits_10.0-2026.08.30-000001&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table>
&lt;h2 id="additional_info">Additional_Info&lt;/h2>
&lt;p>These descriptions are used for all types of logs.&lt;/p></description></item><item><title>Index entries</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/insight/iag_discover_wrap/iag_index_audit/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/insight/iag_discover_wrap/iag_index_audit/</guid><description>&lt;h2 id="audit-index">Audit index&lt;/h2>
&lt;p>The log types of protection, metering, audit, and security are stored in the audit index. These log are generated during security operations. The logs generated by protectors are stored in the pty_insight_analytics_*&lt;strong>audits&lt;/strong>* audit index.&lt;/p>
&lt;h3 id="protection-logs">Protection logs&lt;/h3>
&lt;p>These logs are generated by protectors during protecting, unprotecting, and reprotecting data operations. These logs are generated by protectors.&lt;/p>
&lt;p>Use the following query in Discover to view these logs.&lt;/p>
&lt;div class="highlight">&lt;pre tabindex="0" style="background-color:#f8f8f8;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-fallback" data-lang="fallback">&lt;span style="display:flex;">&lt;span>logtype:protection
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/div>&lt;p>A sample log is shown here:&lt;/p></description></item><item><title>Log return codes</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/insight/iag_discover_wrap/iag_log_return_codes/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/insight/iag_discover_wrap/iag_log_return_codes/</guid><description>&lt;table>
 &lt;thead>
 &lt;tr>
 &lt;th>Return Code&lt;/th>
 &lt;th>Description&lt;/th>
 &lt;/tr>
 &lt;/thead>
 &lt;tbody>
 &lt;tr>
 &lt;td>0&lt;/td>
 &lt;td>Error code for no logging&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>1&lt;/td>
 &lt;td>The username could not be found in the policy&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>2&lt;/td>
 &lt;td>The data element could not be found in the policy&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>3&lt;/td>
 &lt;td>The user does not have the appropriate permissions to perform the requested operation&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>4&lt;/td>
 &lt;td>Tweak is null&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>5&lt;/td>
 &lt;td>Integrity check failed&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>6&lt;/td>
 &lt;td>Data protect operation was successful&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>7&lt;/td>
 &lt;td>Data protect operation failed&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>8&lt;/td>
 &lt;td>Data unprotect operation was successful&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>9&lt;/td>
 &lt;td>Data unprotect operation failed&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>10&lt;/td>
 &lt;td>The user has appropriate permissions to perform the requested operation but no data has been protected/unprotected&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>11&lt;/td>
 &lt;td>Data unprotect operation was successful with use of an inactive keyid&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>12&lt;/td>
 &lt;td>Input is null or not within allowed limits&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>13&lt;/td>
 &lt;td>Internal error occurring in a function call after the provider has been opened&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>14&lt;/td>
 &lt;td>Failed to load data encryption key&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>15&lt;/td>
 &lt;td>Tweak input is too long&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>16&lt;/td>
 &lt;td>The user does not have the appropriate permissions to perform the unprotect operation&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>17&lt;/td>
 &lt;td>Failed to initialize the PEP: this is a fatal error&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>19&lt;/td>
 &lt;td>Unsupported tweak action for the specified fpe data element&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>20&lt;/td>
 &lt;td>Failed to allocate memory&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>21&lt;/td>
 &lt;td>Input or output buffer is too small&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>22&lt;/td>
 &lt;td>Data is too short to be protected/unprotected&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>23&lt;/td>
 &lt;td>Data is too long to be protected/unprotected&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>24&lt;/td>
 &lt;td>The user does not have the appropriate permissions to perform the protect operation&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>25&lt;/td>
 &lt;td>Username too long&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>26&lt;/td>
 &lt;td>Unsupported algorithm or unsupported action for the specific data element&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>27&lt;/td>
 &lt;td>Application has been authorized&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>28&lt;/td>
 &lt;td>Application has not been authorized&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>29&lt;/td>
 &lt;td>The user does not have the appropriate permissions to perform the reprotect operation&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>30&lt;/td>
 &lt;td>Not used&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>31&lt;/td>
 &lt;td>Policy not available&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>32&lt;/td>
 &lt;td>Delete operation was successful&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>33&lt;/td>
 &lt;td>Delete operation failed&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>34&lt;/td>
 &lt;td>Create operation was successful&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>35&lt;/td>
 &lt;td>Create operation failed&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>36&lt;/td>
 &lt;td>Manage protection operation was successful&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>37&lt;/td>
 &lt;td>Manage protection operation failed&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>38&lt;/td>
 &lt;td>Not used&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>39&lt;/td>
 &lt;td>Not used&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>40&lt;/td>
 &lt;td>No valid license or current date is beyond the license expiration date&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>41&lt;/td>
 &lt;td>The use of the protection method is restricted by license&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>42&lt;/td>
 &lt;td>Invalid license or time is before license start&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>43&lt;/td>
 &lt;td>Not used&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>44&lt;/td>
 &lt;td>The content of the input data is not valid&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>45&lt;/td>
 &lt;td>Not used&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>46&lt;/td>
 &lt;td>Used for z/OS query default data element when policy name is not found&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>47&lt;/td>
 &lt;td>Access key security groups not found&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>48&lt;/td>
 &lt;td>Not used&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>49&lt;/td>
 &lt;td>Unsupported input encoding for the specific data element&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>50&lt;/td>
 &lt;td>Data reprotect operation was successful&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>51&lt;/td>
 &lt;td>Failed to send logs, connection refused&lt;/td>
 &lt;/tr>
 &lt;tr>
 &lt;td>52&lt;/td>
 &lt;td>Return code used by bulkhandling in pepproviderauditor&lt;/td>
 &lt;/tr>
 &lt;/tbody>
&lt;/table></description></item><item><title>Protectors security log codes</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/insight/iag_discover_wrap/iag_protector_security_logs/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/insight/iag_discover_wrap/iag_protector_security_logs/</guid><description>&lt;p>The security logging level can be configured when a data security policy is created in the Policy management in PPC. If logging level is set to &lt;strong>audit successful&lt;/strong> and &lt;strong>audit failed&lt;/strong>, then both successful and failed Unprotect/Protect/Reprotect/Delete operations will be logged.&lt;/p>
&lt;p>You can define the server where these security audit logs will be sent to. You can do that by modifying the Log Server configuration section in &lt;strong>pepserver.cfg&lt;/strong> file.&lt;/p>
&lt;p>If you configure to send protector security logs to the PPC, you will be able view them in &lt;strong>Discover&lt;/strong>, by logging into the Insight Dashboard, selecting &lt;strong>Discover&lt;/strong> from the menu, and selecting a time period such as &lt;strong>Last 30 days&lt;/strong>. The following table displays the logs sent by protectors.&lt;/p></description></item><item><title>Additional log information</title><link>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/insight/iag_discover_wrap/iag_log_levels/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/aiteam-edition/1.0.0/docs/infrastructure/insight/iag_discover_wrap/iag_log_levels/</guid><description>&lt;blockquote>
&lt;p>These are values for understanding the values that are displayed in the log records.&lt;/p>&lt;/blockquote>
&lt;h2 id="log-levels">Log levels&lt;/h2>
&lt;p>Most events on the system generate logs. The level of the log helps you understand whether the log is just an information message or denotes some issue with the system. The log message and the log level allows you to understand more about the working of the system and also helps you identify and troubleshoot any system issues.&lt;/p></description></item></channel></rss>