Note: Please go to docs.rightscale.com to access the current RightScale documentation set. Also, feel free to Chat with us!
Home > Reference Info > Dashboard Help Text > Infrastructure_audits

Infrastructure_audits

Table of Contents

Index

Infrastructure Audits provide a quick overview of the usage of cloud resources within your RightScale account. The audits focus on security aspects and cover all EC2 regions available to your RightScale account. Create audit reports that summarize your account usage of Security Groups or SSH Keys. You may keep up to 10 historical audits. Beyond that, the oldest audit will be rotated out (deleted). You may lock audits to prevent them from being deleted in the rotation, which will allow you to keep an old report as a baseline for performing differentials.
Note: Other clouds are not yet supported.

Default Fields

  • Created At - Time and date stamp when the Infrastructure Audit was created.
  • Options - The option for which you chose to perform an Infrastructure Audit. For Security Groups, it's either 'Public Ports' or 'All Ports'. For SSH Keys, it's either 'Keys for running servers' or 'All Keys'.
  • User - The user that created the report.

Actions

  • Perform New Audit - Perform an Infrastructure Audit for either Security Groups or SSH Keys
  • Lock - Only 10 Infrastructure Audit reports can exist at one time; lock a report for it to not be deleted.
  • Baseline - Select which report should be used as a baseline for comparison when performing a Diff.
  • Diff - Perform a Differential between one report and the baseline report.
Report -> Infrastructure Audits

- -

Show

View detailed information about the selected Infrastructure Audit Report.

When viewing an EC2 Security Group report, you'll see the following information:

  • Ports - The ports that were opened for the Security Group.
  • Source - The source of the client request. It can either represent a range of public IP addresses or Security Groups, which would have access over the private IP addresses. Note that an IP address may have "!!" after an it. This denotes that the entire world can view that IP.
  • Cloud - The Cloud in which the Security Group was created.
  • Group - The name of the Security Group.
  • Running servers - A link to the list of servers (that were running when the report was created) that are using the specified Security Group. Only servers in deployments are taken into consideration. Running instances in server arrays are not taken into account.
  • Next servers - The number of inactive servers that are currently configured to inherit the defined access permissions the next time that they are launched.

When viewing an EC2 SSH Key report, you'll see the following information:

  • Cloud - The Cloud in which the SSH key was created.
  • SSH key - The name of the SSH key.
  • Fingerprint - The SSH key's unique fingerprint.
  • User - The user that created the SSH key.
  • Running instances - A link to the list of servers (that were running when the report was created) that are using the specified SSH Key. Only servers in deployments are taken into consideration. Running instances in server arrays are not taken into account.

Actions

  • Back to audits - Use this button to return to Reports -> Infrastructure Audits.
  • Download Text - Download a text (.txt) file of the report.
  • Download JSON - Download a JSON (.json) file of the report. Use a JSON parser to create an object of your choice.
Report > Infrastructure Audits > Show
You must to post a comment.
Last modified
08:47, 3 Jun 2013

Tags

This page has no custom tags.

Classifications

This page has no classifications.

Announcements

None


© 2006-2014 RightScale, Inc. All rights reserved.
RightScale is a registered trademark of RightScale, Inc. All other products and services may be trademarks or servicemarks of their respective owners.