Skip to content

View Audit Messages in Kibana

Vrinda edited this page Mar 27, 2023 · 1 revision

Content

Overview

Audit messages emitted by archive or Keycloak to logstash are stored in elasticsearch. To access and view these messages, use Kibana user interface.

Configuration

Tests and Verification

  • Access Kibana at : http://<docker-host>:5601

  • This redirects to the following screen

    kibanaHome.png

  • From the left-hand menu, select Discover

    kibanaDiscover.png

  • By default, all audit messages received by the audit record repository are shown in a raw format as follows :

    kibanaAuditMsgsRawFormat.png

  • One may change the default time / day range of audit messages shown in Kibana and Update

    kibanaUpdateTimeRange.png

Add filters as required for faster tracking / viewing of audit messages sent by various systems to the archive. These can be selected from the Available Fields. Examples of filters :

  • AuditSource.AuditSourceID
  • Destination.UserID
  • Event.EventActionCode
  • Event.EventDateTime
  • EventID.originalText
  • Patient.ParticipantObjectID
  • Source.UserID
  • Study.ParticipantObjectID

to be part of Selected Fields. This results in a tabular like screen showing audit messages one may be interested in as follows :

kibanaFilteredAuditMsgs.png

  • Expand on one of them to see the contents of the whole audit message

    kibanaExpandedAuditMsg.png

  • On going further in the expanded details section, one may also see the XML format of the audit message sent by the peer system. This can be useful in debugging purposes where you may want to look at the whole audit message to see if it is conformant as per DICOM's Security Trail Profiles.

    kibanaAuditXMLMsg.png

  • One may save these settings, in order that it can be accessed later.

    kibanaSaveSettings.png

    kibanaSaveSettings1.png

  • This saved filter template should now be available from Open link.

    kibanaOpenSavedSearch.png

    kibanaOpenSavedSearch1.png

Clone this wiki locally