diff --git a/filter-plugin/logstash-filter-aurora-mysql-guardium/README.md b/filter-plugin/logstash-filter-aurora-mysql-guardium/README.md index d3cc79391..667c46779 100644 --- a/filter-plugin/logstash-filter-aurora-mysql-guardium/README.md +++ b/filter-plugin/logstash-filter-aurora-mysql-guardium/README.md @@ -10,7 +10,6 @@ This is a [Logstash](https://github.com/elastic/logstash) filter plug-in for the universal connector that is featured in IBM Security Guardium. It parses events and messages from the aurora-mysql audit log into a [Guardium record](https://github.com/IBM/universal-connectors/blob/main/common/src/main/java/com/ibm/guardium/universalconnector/commons/structures/Record.java) instance (which is a standard structure made out of several parts). The information is then sent over to Guardium. Guardium records include the accessor (the person who tried to access the data), the session, data, and exceptions. If there are no errors, the data contains details about the query "construct". The construct details the main action (verb) and collections (objects) involved. -Currently, this plug-in will work only on IBM Security Guardium Data Protection, not Guardium Insights. The plug-in is free and open-source (Apache 2.0). It can be used as a starting point to develop additional filter plug-ins for Guardium universal connector. diff --git a/filter-plugin/logstash-filter-yugabyte-guardium/README.md b/filter-plugin/logstash-filter-yugabyte-guardium/README.md index 6c786ba74..db89c05c4 100644 --- a/filter-plugin/logstash-filter-yugabyte-guardium/README.md +++ b/filter-plugin/logstash-filter-yugabyte-guardium/README.md @@ -47,7 +47,8 @@ Log configuration: --ysql_pg_conf_csv=pgaudit.log='ALL',pgaudit.log_level=INFO,pgaudit.log_parameter=true,pgaudit.log_relation=on,log_line_prefix='%n %r [%p] %a %u %d %c %x ' --ycql_enable_audit_log=true --ycql_audit_included_categories=QUERY,DML,DDL,DCL,AUTH,PREPARE,ERROR,OTHER - --ycql_audit_log_level=INFO + --ycql_audit_log_level=INFO + --use_cassandra_authentication=true ``` d. Create a configuration file with the content in the step 3(c) and start the Yugabyte server as follows: