The Foglight® Management Server stores its configuration parameters in configuration files within the Foglight directory on the Management Server's file system. When Foglight is launched, the parameters are read and cached internally; the configuration files on disk are not re-read until the Management Server restarts. This allows modification of the configuration files while Foglight is running without affecting real-time processing.
From the Foglight® Administration Console, users can select security and change audit logs for a specific time period and display those logs in the Audit Viewer.
The View Audit Information dashboard allows you to review these logs and to filter them to show information for a specific time span. It also lists users who have logged in to Foglight, changes to user, group or role settings, and changes made to configuration items, including rules, schedules, or registry variables.
The following information is recorded in the Foglight® log files on the Management Server:
No user names or passwords are stored in the log file. These files are stored unencrypted on the file system within the Foglight directory structure. Any system user with read privileges to these files can access the logs.
Foglight® masks password entries with asterisks to prevent them from being displayed. Foglight also masks agent properties that are marked as sensitive.