Audit event log fields
Logs are in JSON format.
Common Audit event log fields
| Log Field Name |
Contains Information |
Notes |
| audit |
Identify log entry to audit events |
Hardcoded to value events |
| originalID |
Original request Id |
Product events: Product ID Operation events: request ID. |
| status |
event status |
See chapter: Audit Event statuses |
| approverID |
Approver AAD Object ID |
omit from events where approver information is not available. Auto approval (blanket groups) approverID is set to: "OperationAutoApprovedByApprovalRule". |
| requestorID |
Requestor AAD Object ID |
omit from events where requestor information is not available. |
| auditEventType |
Audit event type information |
See chapter: Audit event types |
| orgHost |
Hostname for originally called host |
Empty when not available. |
| eventTime |
Time of event creation |
|
| ts |
Time of event received from client |
Time of event received. Not the actual event time. |
| caller |
Calling function information |
Not relevant for audit usage. |
| level |
Logging level |
see chapter: Logging Levels |
| X-Request-Id |
Request ID assigned by the ingress-nginx |
Enables following the logs for specific call. |
| Log Field Name |
Contains Information |
Notes |
| productID |
Signing Solution Product ID |
|
| productName |
Signing Solution Product Name |
|
| Log Field Name |
Contains Information |
Notes |
| productOperationID |
Signing solution unique Product Operation ID |
|
| productOperationType |
Product Operation Type |
See chapter: Product Operation types |
| productOperationName |
Product Operation name |
Name is set on the product creation template. |
| operationStartedAt |
Timestamp of when the request entry was created in the database. |
|
| operationUpdatedAt |
Timestamp of the update made to the request entry in the database. |
|
| originalSHA256 |
Inbound payload SHA256 HASH |
|
| modifiedSHA256 |
Outbound payload SHA256 HASH |
|
Audit event types
| Audit Event Type |
Usage |
Common Fields |
Product fields |
Operation fields |
| AuditTrailRequested |
PKI |
Yes |
No |
No |
| ChangeRequestInit |
Change request management |
Yes |
Yes |
No |
| ChangeRequestApproved |
Change request management |
Yes |
Yes |
No |
| ClientAuthorized |
PKI |
Yes |
Yes |
No |
| ClientApproved |
Client management |
Yes |
No |
No |
| ClientInit |
Client management |
Yes |
No |
No |
| CRLCreation |
PKI |
Yes |
Yes |
No |
| CryptoKeyDeleted |
Product Deletion |
Yes |
Yes |
No |
| EscrowApproved |
Escrow management |
Yes |
No |
No |
| EscrowInit |
Escrow management |
Yes |
No |
No |
| EstServiceConfigApproved |
PKI |
Yes |
Yes |
No |
| EstServiceConfigInit |
PKI |
Yes |
Yes |
No |
| EstServiceUsed |
PKI |
Yes |
Yes |
No |
| Fusemapimx6Created |
Product Secrets |
Yes |
No |
No |
| Fusemapimx6vsCreated |
Product Secrets |
Yes |
No |
No |
| Fusemapimx8Created |
Product Secrets |
Yes |
No |
No |
| Fusemapimx8vsCreated |
Product Secrets |
Yes |
No |
No |
| GetProductSecrets |
Product Secrets |
Yes |
Yes |
No |
| KeyCreated |
Product Creation |
Yes |
Yes |
No |
| KeyCreatedOneTimeKey |
Product Creation |
Yes |
Yes |
No |
| KeyImported |
Product Creation |
Yes |
Yes |
No |
| KeyUsed |
Operation handling |
Yes |
Yes |
Yes |
| MasterKeyRequestInit |
Master key management |
Yes |
No |
No |
| MasterKeyRequestApproved |
Master key management |
Yes |
No |
No |
| OperationInit |
Operation handling |
Yes |
Yes |
Yes |
| OperationAutoApproved |
Operation handling / AutoApproval |
Yes |
Yes |
Yes |
| OperationApproved |
Operation handling |
Yes |
Yes |
Yes |
| OperationCompleted |
Operation handling |
Yes |
Yes |
Yes |
| PKICertificateCreated |
Product Creation |
Yes |
Yes |
No |
| PKICertificateCreatedOneTimeKey |
Product Creation |
Yes |
Yes |
No |
| PKIChangeRequestInit |
PKI change request management |
Yes |
Yes |
No |
| PKIChangeRequestApproved |
PKI change request management |
Yes |
Yes |
No |
| PKICSRCreated |
Product Creation |
Yes |
Yes |
No |
| PKICSRCreatedOneTimeKey |
Product Creation |
Yes |
Yes |
No |
| PKIDeleted |
Product Deletion |
Yes |
Yes |
No |
| ProductInit |
Product Creation |
Yes |
Yes |
No |
| ProductApproved |
Product Creation |
Yes |
Yes |
No |
| ProductCreated |
Product Creation |
Yes |
Yes |
No |
| ProductCryptoKeyCreated |
Product Creation |
Yes |
Yes |
No |
| ProductDeleted |
Product Deletion |
Yes |
Yes |
No |
| ProductPKICreated |
Product Creation |
Yes |
Yes |
No |
| ProductPKIRootWithSubordinatesCreated |
Product Creation |
Yes |
Yes |
No |
| ProductRelatedKeysCreated |
Product Creation |
Yes |
Yes |
No |
| ProductSensitiveKeyCreated |
Product Creation |
Yes |
Yes |
No |
| ProductSoftwareKeyCreated |
Product Creation |
Yes |
Yes |
No |
| ProfileDeleted |
Product Deletion |
Yes |
Yes |
No |
| ProvisiongConfigInit |
Provisioning config management |
Yes |
Yes |
No |
| ProvisiongConfigApproved |
Provisioning config management |
Yes |
Yes |
No |
| ProvisioningRequestCreated |
Provisioning |
Yes |
Yes |
No |
| RequestFusemap |
Product Secrets |
Yes |
No |
No |
| Revocation |
PKI |
Yes |
Yes |
No |
| RevocationApproved |
PKI |
Yes |
Yes |
No |
| RevocationInit |
PKI |
Yes |
Yes |
No |
| RevocationItem |
PKI |
Yes |
Yes |
No |
| RevocationList |
PKI |
Yes |
Yes |
No |
| RnDKeyDeleted |
Product Deletion |
Yes |
Yes |
No |
| SystemConfigInit |
System config management |
Yes |
No |
No |
| SystemConfigApproved |
System config management |
Yes |
No |
No |
| UnRevocation |
PKI |
Yes |
Yes |
No |
Product Operation types
| Operation type name |
notes |
| BootgenPSK |
Generate PSK key for Zynq products. |
| BootgenPSK1 |
Generate PSK1 key for Zynq MPSoC products. |
| BootgenPSK2 |
Generate PSK2 key for Zynq MPSoC products. |
| BootgenSSK |
Generate SSK key for Zynq products. |
| BootgenSSK2 |
Generate SSK key for Zynq products. |
| BootgenSSK3 |
Generate SSK key for Zynq products. |
| BootgenSSK4 |
Generate SSK key for Zynq products. |
| BootgenSSK5 |
Generate SSK key for Zynq products. |
| BootgenSSK6 |
Generate SSK key for Zynq products. |
| BootgenSSK7 |
Generate SSK key for Zynq products. |
| BootgenSSK8 |
Generate SSK key for Zynq products. |
| DetachedSignature |
Digest sign with the CodeSigning End-Entity key |
| DigestSigning |
Sign digests |
| EncryptBootgen |
Generate AES key for FPGA image encryption. Distributed in ProductSecretsRequest endpoint. |
| EncryptBootgen2 |
Generate AES key for image encryption. |
| EncryptBootgen3 |
Generate AES key for image encryption. |
| EncryptBootgen4 |
Generate AES key for image encryption. |
| EncryptBootgen5 |
Generate AES key for image encryption. |
| EncryptBootgen6 |
Generate AES key for image encryption. |
| EncryptBootgen7 |
Generate AES key for image encryption. |
| EncryptBootgen8 |
Generate AES key for image encryption. |
| EncryptBootgen9 |
Generate AES key for image encryption. |
| EncryptBootgen10 |
Generate AES key for image encryption. |
| EncryptBootgen11 |
Generate AES key for image encryption. |
| EncryptBootgen12 |
Generate AES key for image encryption. |
| EncryptBootgen13 |
Generate AES key for image encryption. |
| EncryptBootgen14 |
Generate AES key for image encryption. |
| EncryptBootgen15 |
Generate AES key for image encryption. |
| EncryptBootgen16 |
Generate AES key for image encryption. |
| EncryptFirmwareUpdateWithAES |
Reserved for future use. |
| EncryptFirmwareUpdateWithPassphrase |
Generate passphrase for firmware update signing. Used in SWUpdateBuildSigning operation. Distributed in ProductSecretsRequest endpoint. |
| EncryptImageWithAESEscrowCustom |
Custom image encryption with AES |
| EncryptMcuBoot |
Encryption key for MCUBoot. |
| FirmwareUpdateSigning |
Sign the updated firmware package. |
| IssueCertificate |
Issue generic certificates under some CA. |
| IssueDeviceCertificate |
Issued initial device certificates. Used by the production PCs. |
| NotifyJenkins |
This is used to notify Jenkins after the image signing that Jenkins can continue with the build process. |
| NXPKeyExchangeSigning |
Sign KEY_EXCHANGE_REQ requests |
| NXPKeyImport |
Create KEY_IMPORT command payload |
| OP-TEESigning |
Sign OP-TEE TA packages |
| RaucBundleSigning |
Sign RAUC bundles. If encryption certificates are provided then package is encrypted. |
| RaucBundleSigningWithOneTimeKey |
Sign RAUC bundles using ephemeral key. An ephemeral key is created to create the certificate signing request and subsequent certificate. The payload is signed with the ephemeral key and certificate. Certificate can be revoked if needed. |
| SbsfuSlot1AuthenticationKey |
Generate signing key for ST SBSFU. |
| SbsfuSlot1EncryptionKey |
Generate encryption key for ST SBSFU. |
| SbsfuSlot2AuthenticationKey |
Generate signing key for ST SBSFU. |
| SbsfuSlot2EncryptionKey |
Generate encryption key for ST SBSFU. |
| SbsfuSlot3AuthenticationKey |
Generate signing key for ST SBSFU. |
| SbsfuSlot3EncryptionKey |
Generate encryption key for ST SBSFU. |
| SignAHAB |
AHAB image sign. Digest signing. |
| SignAndEncryptBootgenImage |
Sign and encrypt Bootgen image with the PSK, SSK and EncryptBootgen AES key. |
| SignAndEncryptBootgenMPSoCImage |
Sign and encrypt Bootgen image for MPSoC. |
| SignAndEncryptBootgenMPSoCImage2 |
Sign and encrypt Bootgen image for MPSoC. |
| SignAndEncryptBootgenMPSoCImage3 |
Sign and encrypt Bootgen image for MPSoC. |
| SignAndEncryptBootgenMPSoCImage4 |
Sign and encrypt Bootgen image for MPSoC. |
| SignBootgenImage |
Sign Bootgen image. |
| SignHAB |
HAB sign image with CST tool. Either with HAB tree or with externally issued HAB End-Entity. |
| SignHABCSF |
Digest sign HAB with CSF key |
| SignHABIMG |
Digest sign HAB with IMG key |
| SignJAVA |
JAR / WAR package signing. |
| SignKernel |
Sign kernel image. |
| SignMcuBoot |
Sign MCUBoot image (for nRF). |
| SignOCI |
Sign OCI packages |
| SignStCubeSBSFU |
ST SBSFU signing. |
| SignUBoot |
Sign U-Boot image. |
| SignWindowsBinary |
Windows binary signing. |
| SWUpdateBuildSigning |
Take RnD signed firmware update image package and verify the integrity and re-sign with production keys |
Audit Event statuses
| Audit Event status |
notes |
| SUCCESS |
|
| FAILED |
|
| UNKNOWN |
|
Logging Levels
| Logging level |
notes |
| DEBUG |
|
| INFO |
Audit events logging level. |
| WARN |
|
| ERROR |
|
Example audit events logs
Operation with manual approval
{
"X-Request-Id": "9421eb79-6c1b-7a4f-6056-fb08a6777fbb",
"approverID": "00000000-0000-0000-0000-000000000000",
"audit": "events",
"auditEventType": "OperationInit",
"caller": "general.go:119",
"eventTime": "2023-05-31T16:51:07Z",
"level": "info",
"modifiedSHA256": "",
"operationStartedAt": "2023-05-31T16:51:07.000Z",
"operationUpdatedAt": "2023-05-31T16:51:07.000Z",
"orgHost": "localhost",
"originalID": "88d32787-6a5c-4a13-9142-0910878fe9fd",
"originalSHA256": "",
"productID": "7a648646-fdd0-4164-953e-aee51b939bd8",
"productName": "TEST1",
"productOperationID": "b35bae83-86cb-40df-a681-ba3c4df98ecc",
"productOperationName": "Digest sign",
"productOperationType": "DigestSigning",
"requestorID": "0978158a-a60b-4c57-aaf3-986978ac3699",
"status": "SUCCESS",
"ts": "2023-05-31T16:51:07.541545249Z"
}
{
"X-Request-Id": "5346de3a-7861-4bcb-32cb-3261008b4e3a",
"approverID": "32e3d025-42f9-4ada-ac25-a5b9547ddc9c",
"audit": "events",
"auditEventType": "OperationApproved",
"caller": "general.go:119",
"eventTime": "2023-05-31T16:51:07Z",
"level": "info",
"modifiedSHA256": "",
"operationStartedAt": "2023-05-31T16:51:07.000Z",
"operationUpdatedAt": "2023-05-31T16:51:07.000Z",
"orgHost": "localhost",
"originalID": "88d32787-6a5c-4a13-9142-0910878fe9fd",
"originalSHA256": "",
"productID": "7a648646-fdd0-4164-953e-aee51b939bd8",
"productName": "TEST1",
"productOperationID": "b35bae83-86cb-40df-a681-ba3c4df98ecc",
"productOperationName": "Digest sign",
"productOperationType": "DigestSigning",
"requestorID": "0978158a-a60b-4c57-aaf3-986978ac3699",
"status": "SUCCESS",
"ts": "2023-05-31T16:51:07.93814393Z"
}
{
"X-Request-Id": "5346de3a-7861-4bcb-32cb-3261008b4e3a",
"approverID": "32e3d025-42f9-4ada-ac25-a5b9547ddc9c",
"audit": "events",
"auditEventType": "KeyUsed",
"caller": "general.go:119",
"eventTime": "2023-05-31T16:51:08Z",
"level": "info",
"modifiedSHA256": "",
"operationStartedAt": "2023-05-31T16:51:07.000Z",
"operationUpdatedAt": "2023-05-31T16:51:07.000Z",
"orgHost": "",
"originalID": "88d32787-6a5c-4a13-9142-0910878fe9fd",
"originalSHA256": "",
"productID": "7a648646-fdd0-4164-953e-aee51b939bd8",
"productName": "TEST1",
"productOperationID": "b35bae83-86cb-40df-a681-ba3c4df98ecc",
"productOperationName": "Digest sign",
"productOperationType": "DigestSigning",
"requestorID": "0978158a-a60b-4c57-aaf3-986978ac3699",
"status": "SUCCESS",
"ts": "2023-05-31T16:51:08.10043425Z"
}
{
"X-Request-Id": "5346de3a-7861-4bcb-32cb-3261008b4e3a",
"approverID": "32e3d025-42f9-4ada-ac25-a5b9547ddc9c",
"audit": "events",
"auditEventType": "OperationCompleted",
"caller": "general.go:119",
"eventTime": "2023-05-31T16:51:08Z",
"level": "info",
"modifiedSHA256": "89ed2665b0ad3424be4a2814f464e54f0e0cff26987118aa231ff647e24071e7",
"operationStartedAt": "2023-05-31T16:51:07.000Z",
"operationUpdatedAt": "2023-05-31T16:51:08.000Z",
"orgHost": "",
"originalID": "88d32787-6a5c-4a13-9142-0910878fe9fd",
"originalSHA256": "2f2db0944b4dbfb1358408dee68f5dd0f7f8fa6c3c684e179bfabdd698850160",
"productID": "7a648646-fdd0-4164-953e-aee51b939bd8",
"productName": "TEST1",
"productOperationID": "b35bae83-86cb-40df-a681-ba3c4df98ecc",
"productOperationName": "Digest sign",
"productOperationType": "DigestSigning",
"requestorID": "0978158a-a60b-4c57-aaf3-986978ac3699",
"status": "SUCCESS",
"ts": "2023-05-31T16:51:08.138283244Z"
}
Operation with Auto Approval
{
"X-Request-Id": "2fce3a2a-021a-07a1-5d5e-2a83889fdacd",
"approverID": "OperationAutoApprovedByApprovalRule",
"audit": "events",
"auditEventType": "OperationAutoApproved",
"caller": "general.go:119",
"eventTime": "2023-05-31T16:58:41Z",
"level": "info",
"modifiedSHA256": "",
"operationStartedAt": "2023-05-31T16:58:41.000Z",
"operationUpdatedAt": "2023-05-31T16:58:41.000Z",
"orgHost": "localhost",
"originalID": "bf39f257-057a-4c4c-978d-662276ec3115",
"originalSHA256": "",
"productID": "1c3cc1a5-0e8f-4308-a6bc-fe6bbd96b9b7",
"productName": "TEST3",
"productOperationID": "4ed747f0-6f58-4718-a2f7-3c9f74b2d5bc",
"productOperationName": "Content encryption operation",
"productOperationType": "EncryptImageWithAESEscrowCustom",
"requestorID": "971d4f6b-4b98-4a0d-bab5-fe3fd0dce677",
"status": "SUCCESS",
"ts": "2023-05-31T16:58:41.334087273Z"
}
{
"X-Request-Id": "2fce3a2a-021a-07a1-5d5e-2a83889fdacd",
"approverID": "OperationAutoApprovedByApprovalRule",
"audit": "events",
"auditEventType": "KeyUsed",
"caller": "general.go:119",
"eventTime": "2023-05-31T16:58:45Z",
"level": "info",
"modifiedSHA256": "",
"operationStartedAt": "2023-05-31T16:58:41.000Z",
"operationUpdatedAt": "2023-05-31T16:58:41.000Z",
"orgHost": "",
"originalID": "bf39f257-057a-4c4c-978d-662276ec3115",
"originalSHA256": "",
"productID": "1c3cc1a5-0e8f-4308-a6bc-fe6bbd96b9b7",
"productName": "TEST3",
"productOperationID": "4ed747f0-6f58-4718-a2f7-3c9f74b2d5bc",
"productOperationName": "Content encryption operation",
"productOperationType": "EncryptImageWithAESEscrowCustom",
"requestorID": "971d4f6b-4b98-4a0d-bab5-fe3fd0dce677",
"status": "SUCCESS",
"ts": "2023-05-31T16:58:45.192349104Z"
}
{
"X-Request-Id": "2fce3a2a-021a-07a1-5d5e-2a83889fdacd",
"approverID": "OperationAutoApprovedByApprovalRule",
"audit": "events",
"auditEventType": "OperationCompleted",
"caller": "general.go:119",
"eventTime": "2023-05-31T16:58:45Z",
"level": "info",
"modifiedSHA256": "da5db79763456f06191fa1127e05102803fb466e77bd0b48441c2b6aa4e6e231",
"operationStartedAt": "2023-05-31T16:58:41.000Z",
"operationUpdatedAt": "2023-05-31T16:58:45.000Z",
"orgHost": "",
"originalID": "bf39f257-057a-4c4c-978d-662276ec3115",
"originalSHA256": "88a409ad406b4913f7b24741b83f0e94373a6991b0348f91b18297f5ef22b72f",
"productID": "1c3cc1a5-0e8f-4308-a6bc-fe6bbd96b9b7",
"productName": "TEST3",
"productOperationID": "4ed747f0-6f58-4718-a2f7-3c9f74b2d5bc",
"productOperationName": "Content encryption operation",
"productOperationType": "EncryptImageWithAESEscrowCustom",
"requestorID": "971d4f6b-4b98-4a0d-bab5-fe3fd0dce677",
"status": "SUCCESS",
"ts": "2023-05-31T16:58:45.23771394Z"
}
Product creation
For the sake of readability, the log example has been truncated.
{
"X-Request-Id": "66923000-afc6-8b85-0892-f45d4f08415f",
"approverID": "00000000-0000-0000-0000-000000000000",
"audit": "events",
"auditEventType": "ProductInit",
"caller": "general.go:238",
"eventTime": "2023-05-31T17:09:40Z",
"level": "info",
"orgHost": "localhost",
"originalID": "e59e7dad-b67b-42cc-ba8a-ae287ac9c91e",
"productID": "e59e7dad-b67b-42cc-ba8a-ae287ac9c91e",
"productName": "TEST20",
"requestorID": "971d4f6b-4b98-4a0d-bab5-fe3fd0dce677",
"status": "SUCCESS",
"ts": "2023-05-31T17:09:40.520228368Z"
}
{
"X-Request-Id": "67ecb78b-b089-2187-1519-5fef7b620a8c",
"approverID": "b753a4d3-114f-4f21-9036-caefc039ce79",
"audit": "events",
"auditEventType": "ProductApproved",
"caller": "general.go:180",
"eventTime": "2023-05-31T17:09:40Z",
"level": "info",
"orgHost": "localhost",
"originalID": "e59e7dad-b67b-42cc-ba8a-ae287ac9c91e",
"productID": "e59e7dad-b67b-42cc-ba8a-ae287ac9c91e",
"productName": "TEST20",
"requestorID": "971d4f6b-4b98-4a0d-bab5-fe3fd0dce677",
"status": "SUCCESS",
"ts": "2023-05-31T17:09:40.712381166Z"
}
{
"X-Request-Id": "67ecb78b-b089-2187-1519-5fef7b620a8c",
"approverID": "b753a4d3-114f-4f21-9036-caefc039ce79",
"audit": "events",
"auditEventType": "KeyCreated",
"caller": "general.go:238",
"eventTime": "2023-05-31T17:09:40Z",
"level": "info",
"orgHost": "",
"originalID": "e59e7dad-b67b-42cc-ba8a-ae287ac9c91e",
"productID": "e59e7dad-b67b-42cc-ba8a-ae287ac9c91e",
"productName": "TEST20",
"requestorID": "971d4f6b-4b98-4a0d-bab5-fe3fd0dce677",
"status": "SUCCESS",
"ts": "2023-05-31T17:09:40.937367185Z"
}
{
"X-Request-Id": "67ecb78b-b089-2187-1519-5fef7b620a8c",
"approverID": "b753a4d3-114f-4f21-9036-caefc039ce79",
"audit": "events",
"auditEventType": "ProductSoftwareKeyCreated",
"caller": "general.go:238",
"eventTime": "2023-05-31T17:09:40Z",
"level": "info",
"orgHost": "",
"originalID": "e59e7dad-b67b-42cc-ba8a-ae287ac9c91e",
"productID": "e59e7dad-b67b-42cc-ba8a-ae287ac9c91e",
"productName": "TEST20",
"requestorID": "971d4f6b-4b98-4a0d-bab5-fe3fd0dce677",
"status": "SUCCESS",
"ts": "2023-05-31T17:09:40.983185524Z"
}
{
"X-Request-Id": "67ecb78b-b089-2187-1519-5fef7b620a8c",
"approverID": "b753a4d3-114f-4f21-9036-caefc039ce79",
"audit": "events",
"auditEventType": "ProductCryptoKeyCreated",
"caller": "general.go:238",
"eventTime": "2023-05-31T17:09:40Z",
"level": "info",
"orgHost": "",
"originalID": "e59e7dad-b67b-42cc-ba8a-ae287ac9c91e",
"productID": "e59e7dad-b67b-42cc-ba8a-ae287ac9c91e",
"productName": "TEST20",
"requestorID": "971d4f6b-4b98-4a0d-bab5-fe3fd0dce677",
"status": "SUCCESS",
"ts": "2023-05-31T17:09:41.01897891Z"
}
{
"X-Request-Id": "67ecb78b-b089-2187-1519-5fef7b620a8c",
"approverID": "b753a4d3-114f-4f21-9036-caefc039ce79",
"audit": "events",
"auditEventType": "ProductRelatedKeysCreated",
"caller": "general.go:238",
"eventTime": "2023-05-31T17:09:41Z",
"level": "info",
"orgHost": "",
"originalID": "e59e7dad-b67b-42cc-ba8a-ae287ac9c91e",
"productID": "e59e7dad-b67b-42cc-ba8a-ae287ac9c91e",
"productName": "TEST20",
"requestorID": "971d4f6b-4b98-4a0d-bab5-fe3fd0dce677",
"status": "SUCCESS",
"ts": "2023-05-31T17:09:41.065871308Z"
}
{
"X-Request-Id": "67ecb78b-b089-2187-1519-5fef7b620a8c",
"approverID": "b753a4d3-114f-4f21-9036-caefc039ce79",
"audit": "events",
"auditEventType": "PKICSRCreated",
"caller": "general.go:238",
"eventTime": "2023-05-31T17:09:46Z",
"level": "info",
"orgHost": "",
"originalID": "e59e7dad-b67b-42cc-ba8a-ae287ac9c91e",
"productID": "e59e7dad-b67b-42cc-ba8a-ae287ac9c91e",
"productName": "TEST20",
"requestorID": "971d4f6b-4b98-4a0d-bab5-fe3fd0dce677",
"status": "SUCCESS",
"ts": "2023-05-31T17:09:46.68818457Z"
}
{
"X-Request-Id": "67ecb78b-b089-2187-1519-5fef7b620a8c",
"approverID": "b753a4d3-114f-4f21-9036-caefc039ce79",
"audit": "events",
"auditEventType": "PKICertificateCreated",
"caller": "general.go:238",
"eventTime": "2023-05-31T17:09:46Z",
"level": "info",
"orgHost": "",
"originalID": "e59e7dad-b67b-42cc-ba8a-ae287ac9c91e",
"productID": "e59e7dad-b67b-42cc-ba8a-ae287ac9c91e",
"productName": "TEST20",
"requestorID": "971d4f6b-4b98-4a0d-bab5-fe3fd0dce677",
"status": "SUCCESS",
"ts": "2023-05-31T17:09:47.005185457Z"
}
{
"X-Request-Id": "67ecb78b-b089-2187-1519-5fef7b620a8c",
"approverID": "b753a4d3-114f-4f21-9036-caefc039ce79",
"audit": "events",
"auditEventType": "ProductPKIRootWithSubordinatesCreated",
"caller": "general.go:238",
"eventTime": "2023-05-31T17:09:47Z",
"level": "info",
"orgHost": "",
"originalID": "e59e7dad-b67b-42cc-ba8a-ae287ac9c91e",
"productID": "e59e7dad-b67b-42cc-ba8a-ae287ac9c91e",
"productName": "TEST20",
"requestorID": "971d4f6b-4b98-4a0d-bab5-fe3fd0dce677",
"status": "SUCCESS",
"ts": "2023-05-31T17:09:47.163634265Z"
}
{
"X-Request-Id": "67ecb78b-b089-2187-1519-5fef7b620a8c",
"approverID": "b753a4d3-114f-4f21-9036-caefc039ce79",
"audit": "events",
"auditEventType": "ProductCreated",
"caller": "general.go:238",
"eventTime": "2023-05-31T17:09:51Z",
"level": "info",
"orgHost": "",
"originalID": "e59e7dad-b67b-42cc-ba8a-ae287ac9c91e",
"productID": "e59e7dad-b67b-42cc-ba8a-ae287ac9c91e",
"productName": "TEST20",
"requestorID": "971d4f6b-4b98-4a0d-bab5-fe3fd0dce677",
"status": "SUCCESS",
"ts": "2023-05-31T17:09:51.176913812Z"
}