1. Separate system logs from audit logs
2. Add controls to permit logging granularity levels, both for system logs and audit logs
3. Add controls to permit log rollover based on both file size and duration.
4. Support for remote log file storage.
5. Ensure that user credentials (including hash values) are not written to log files
- depends on
-
SERVER-1891 Audit "DDL" operations
- Closed
-
SERVER-6407 Authenticate users via LDAP proxy
- Closed
-
SERVER-2957 Add ability to log to syslog
- Closed
-
SERVER-3591 Kerberos Support
- Closed