This portal is to open public enhancement requests against products and services offered by the IBM Data & AI organization. To view all of your ideas submitted to IBM, create and manage groups of Ideas, or create an idea explicitly set to be either visible by all (public) or visible only to you and IBM (private), use the IBM Unified Ideas Portal (https://ideas.ibm.com).
Shape the future of IBM!
We invite you to shape the future of IBM, including product roadmaps, by submitting ideas that matter to you the most. Here's how it works:
Search existing ideas
Start by searching and reviewing ideas and requests to enhance a product or service. Take a look at ideas others have posted, and add a comment, vote, or subscribe to updates on them if they matter to you. If you can't find what you are looking for,
Post your ideas
Post ideas and requests to enhance a product or service. Take a look at ideas others have posted and upvote them if they matter to you,
Post an idea
Upvote ideas that matter most to you
Get feedback from the IBM team to refine your idea
Specific links you will want to bookmark for future use
Welcome to the IBM Ideas Portal (https://www.ibm.com/ideas) - Use this site to find out additional information and details about the IBM Ideas process and statuses.
IBM Unified Ideas Portal (https://ideas.ibm.com) - Use this site to view all of your ideas, create new ideas for any IBM product, or search for ideas across all of IBM.
ideasibm@us.ibm.com - Use this email to suggest enhancements to the Ideas process or request help from IBM for submitting your Ideas.
IBM Employees should enter Ideas at https://ideas.ibm.com
This was discussed with the BoA CSM and the customer team. They were satisfied with the additional logging that was to be provided in version 4.8. This will be closed, with a new request for return the IP address instead of the hostname that will be tracked separately.
Malcolm Singh provided the following:
--
In Cloud Pak for Data v4.8 there was a focus on serviceability, which included enhancements to the auditing and monitoring user activity in Cloud Pak for Data. Based on this, request information is captured in the Cloud Pak for Data Audit Events, which can be accessed by popular SIEM server such as QRadar or Splunk.
For example, at the Cloud Pak for Data platform level the following information is provided:
Platform Level - Login, Logout, Session, Authentication
users.authenticate - Success or failure when a user logs in.
users.revoke - Record when users log out.
accounts.authenticate - Success or failure of token authentication.
authorization - Failure when invoking any privileged action.
Where more information is provided at the service instance level (e.g. Watson OpenScale) the following information is provided:
Instance Level – management for OpenScale (examples)
metrics.create- Store metric in the Watson OpenScale instance
payload.create- Log payload in the Watson OpenScale instance
datamart.configure- Configure the Watson OpenScale instance
datamart.delete- Delete the Watson OpenScale instance
binding.create- Add service binding to the Watson OpenScale instance
binding.delete- Delete service binding from the Watson OpenScale instance
subscription.create- Add subscription to the Watson OpenScale instance
subscription.delete- Delete subscription from the Watson OpenScale instance
Instance Level – Management for OpenPages
In Watson OpenPages more audit information is provided based on the service type, which you can reference from the documentation.
For a complete list of all the auditable events please refer to the link posted above.
Activity Monitoring
For activity monitoring, this has been enhanced and this information can be capture using rsyslog to be used by popular SIEM servers or similar dashboard services.
The following page provides more information: Monitoring Cloud Pak for Data user activity, where the following information is captured:
req_userid
The user's user ID.
http_referrer
The page that the user accessed.
request
The HTTP request type, such as GET, POST, PUT, and so on.
http_sec-fetch-dest
The type of resource that the user accessed, such as an image, document, audio file, script, and so on.
http_x_forwarded_for
The original IP address of a client before proxy.
time
The time of the request in ISO 8601 format.
remote_addr
The client address after the last proxy.
upstream_addr
The IP address and port of the destination server.
It is also possible to add descriptions to the user activity logs for easier identification.
There is item ‘f’ under activities, which needs to be expanded since there are many requests in this item, where some seem specific to the service and in some cases user activity monitoring.
System errors relevant to security events, including but not limited to: SQL errors that indicate a SQL injection (this is specific to the service logs) fuzzing (this is as the testing level, but user activity monitor captures invalid logins, etc…) , multiple failed logins, (user activity monitoring) failed configuration change (service level), failed/disabled anti-virus software failures (n/a)