From 3e9d95e85e5be5b0c60492c640187bd2230deffb Mon Sep 17 00:00:00 2001 From: Joao Fernandes Date: Mon, 6 Nov 2017 16:08:53 -0800 Subject: [PATCH] Introduce Notary changeed --- _data/toc.yaml | 2 + .../notary-audit-logs.md | 260 ++++++++++++++++++ 2 files changed, 262 insertions(+) create mode 100644 datacenter/dtr/2.4/guides/admin/monitor-and-troubleshoot/notary-audit-logs.md diff --git a/_data/toc.yaml b/_data/toc.yaml index e9e7c194bd..06adbef932 100644 --- a/_data/toc.yaml +++ b/_data/toc.yaml @@ -2014,6 +2014,8 @@ manuals: section: - path: /datacenter/dtr/2.4/guides/admin/monitor-and-troubleshoot/ title: Monitor the cluster status + - path: /datacenter/dtr/2.4/guides/admin/monitor-and-troubleshoot/notary-audit-logs/ + title: Check Notary audit logs - path: /datacenter/dtr/2.4/guides/admin/monitor-and-troubleshoot/troubleshoot-with-logs/ title: Troubleshoot with logs - path: /datacenter/dtr/2.4/guides/admin/monitor-and-troubleshoot/troubleshoot-batch-jobs/ diff --git a/datacenter/dtr/2.4/guides/admin/monitor-and-troubleshoot/notary-audit-logs.md b/datacenter/dtr/2.4/guides/admin/monitor-and-troubleshoot/notary-audit-logs.md new file mode 100644 index 0000000000..7ae89b0200 --- /dev/null +++ b/datacenter/dtr/2.4/guides/admin/monitor-and-troubleshoot/notary-audit-logs.md @@ -0,0 +1,260 @@ +--- +title: Check Notary audit logs +description: When you push signed images, Docker Trusted Registry keeps audit + logs for the changes made to the image metadata. Learn how to view these logs. +keywords: registry, monitor, troubleshoot +--- + +DTR keeps audit logs of changes made to trusted repositories. +Every time you push a signed image to a repository, or delete trust data for a +repository, DTR logs that information. + +These logs are only available from the DTR API. + +## Get an authentication token + +To access the audit logs you need to authenticate your requests using an +authentication token. You can get an authentication token for all repositories, +or one that is specific to a single repository. + + +
+
+ +```bash +curl --insecure --silent \ +--user : \ +"https:///auth/token?realm=dtr&service=dtr&scope=registry:catalog:*" +``` + +
+
+ +```bash +curl --insecure --silent \ +--user : \ +"https:///auth/token?realm=dtr&service=dtr&scope=repository:/:pull" +``` + +
+
+ +DTR returns a JSON file with a token, even when the user doesn't have access +to the repository to which they requested the authentication token. The +JSON file returned, has the following structure: + + +```json +{ + "token": "", + "access_token": "", + "expires_in": "", + "issued_at": "