Audited attribute hiding, Audited file creation, Audited file renaming – HP Integrity NonStop H-Series User Manual
Page 53
![background image](/manuals/397556/53/background.png)
Configuring Automatic Transaction Processing
HP NonStop AutoTMF Software User’s Guide—429952-013
4-9
Audited Attribute Hiding
NonStop AutoTMF software notifies you if any automatic transaction (nowait or waited)
aborts by immediately abending the process with an explanatory message to the
process home terminal and to the EMS log.
Audited Attribute Hiding
Most legacy programs are unaware of auditing and simply access the database as if
the database were unaudited. Some programs, however, check the database and
terminate (or otherwise malfunction) if audited files are found. If you configure
HIDEAUDIT for a file, the following procedures will report that the file is not audited:
•
FILEINFO
•
FILERECINFO
•
FILE_GETINFO_
•
FILE_GETINFOBYNAME_
•
FILE_GETINFOLIST_ (first item only)
•
FILE_GETINFOLISTBYNAME_ (first item only)
Due to the complexity of locating a result item in a multi-item list request, the audit
attribute is hidden only if the first item number is for the audit attribute (66).
Audited File Creation
Some programs create files, but the files are not audited. NonStop AutoTMF software
allows you to configure file names to be created automatically as audited.
Audited File Renaming
Attempts to rename a file while the file is audited are rejected by the file system with an
error. Each audit record contains the name of the disk file being updated, so renaming
a file can make backout operations fail.
NonStop AutoTMF software can rename audited files by performing a complex series
of open, close, and alter operations. A file that is opened by other processes cannot be
renamed.
Note. The NonStop RDF product replicates the creation of an audited file on the backup node;
the NonStop RDF product does not create a file on the backup node if a file is created as
unaudited and is later altered to be audited.
Note. The NonStop RDF product does not replicate the rename of an audited file on the
backup node because the rename operation is not audited.