You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on May 10, 2024. It is now read-only.
For compliance reasons an audit log may be introduced to record all security related failures and backup downloads.
Example events:
"backup downloaded from X IP at 01.01.2023 + token shortcut"
"failed to upload backup, window does not match, date: 01.01.2023 + IP + token shortcut"
"failed to upload backup, no gpg header/footer found + date + IP + token shortcut"
"too many backups uploaded in a short time period + date + IP + token shortcut"
"warning: backup file is at least 50% lighter than previous backup"
"tried to upload files simultaneously + date + IP + token shortcut"
There should be an endpoint to browse the audit log, with a pagination.
Every entry in the audit log should have a severity one of: low, medium, high
The audit log should require a permission from the user to view.
Additionally the collection health endpoint could show an extra entry that counts if there is any entry with high severity with a possibiity to pass the "since" date as a query string parameter, with defaults to 1 day.
The text was updated successfully, but these errors were encountered:
I think this feature can possibly highlight Backup Repository in comparison to other backup solutions.
A great compliance + end-to-end encryption + automatic backup testing on Kubernetes could make it a really good solution comparing to just "backup & restore cloud volume".
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
For compliance reasons an audit log may be introduced to record all security related failures and backup downloads.
Example events:
There should be an endpoint to browse the audit log, with a pagination.
Every entry in the audit log should have a severity one of: low, medium, high
The audit log should require a permission from the user to view.
Additionally the collection health endpoint could show an extra entry that counts if there is any entry with high severity with a possibiity to pass the "since" date as a query string parameter, with defaults to 1 day.
The text was updated successfully, but these errors were encountered: