First of all I want to note that we journal all our files on the iSeries where I work at now. I want to mention that long ago where I worked at before, we had to get into the journals to discover what was causing records to be deleted randomly and no one could find out what program was causing it...we just knew a bunch of records were being deleted radomly. I remember by looking through the journals somehow we found the records showing the deletes and it gave us what program was deleting it. Now we had direction, found the bug and fixed the program.
Here where I work at now, we have an agressive user who does a lot with MS Query, Access, etc and uses ODBC (read only that IT dept. set up) to get the data from the iSeries to his stuff. This person wants to be able to use this means to update info back to the iSeries files and naturally IT department does not want this to occur and have stressed that. This person is quite PC savy and I think this person already found way to create his own ODBC link and turn off the 'read only'. Currently we have the libraries locked down with security and unless he finds the administrative password, this person cannot update information to the iSeries files.
SO....now my question: if this person did get this to work, would the journal show this change coming from outside the iSeries environment and actually tell us what application (MS Query or Access) changed it, would it reflect a user id? Or would no journal entry be created when this occurred because it was done outside of the iSeries environment? I just do not know enough about journals....I remember it was a nightmare to figure that problem out years ago but it was cool once we found it. Thanks to anyone who might be an expert on journaling and can answer this question.
Software/Hardware used: iSeries files and MS Query or Access
Free Guide: Managing storage for virtual environments
Complete a brief survey to get a complimentary 70-page whitepaper featuring the best methods and solutions for your virtual environment, as well as hypervisor-specific management advice from TechTarget experts. Don’t miss out on this exclusive content!