 Correlator, IAF and dashboard server log files (the main log file, and for the correlator also any additional files defined by eplLogging and correlatorLogging configuration). These files include logging performed by the customer's application and by standard Apama connectivity and EPL plug-ins and the correlator itself. For example, the contents of Apama events are often logged (either in full, or truncated) if an error occurs during processing or sending of the event, and data from events or other EPL data structures may be logged as part of correlator error messages.
Correlator, IAF and dashboard server log files (the main log file, and for the correlator also any additional files defined by eplLogging and correlatorLogging configuration). These files include logging performed by the customer's application and by standard Apama connectivity and EPL plug-ins and the correlator itself. For example, the contents of Apama events are often logged (either in full, or truncated) if an error occurs during processing or sending of the event, and data from events or other EPL data structures may be logged as part of correlator error messages. Correlator input log. If enabled, it contains the contents of all events sent into the correlator.
Correlator input log. If enabled, it contains the contents of all events sent into the correlator. Correlator persistence database (and if using JMS, the reliable receive database). If enabled, it contains an on-disk representation of the state of the Apama application.
Correlator persistence database (and if using JMS, the reliable receive database). If enabled, it contains an on-disk representation of the state of the Apama application.| Product area | Potential "personal data" | Where data could be stored | 
| Correlator, IAF, dashboard servers | User identifiers and IP addresses for direct connections to/from Apama server processes (typically only for machine-to-machine communication between server processes, or monitoring and management by system administrator accounts). These are logged to provide an audit trail in case of an attack or accidental mistake by a system administrator. |  correlator main log file  correlator input log  correlator persistence database  IAF and dashboard server log files | 
| Scenario Service API, queries, DataViews, dashboard servers, custom clients and dashboards | The Scenario Service event protocol contains a username field, identifying users who created instances of scenarios (for example, DataViews or queries). There are various places where this username could show up. See also 
    Scenario Service API. Note: Apama queries are deprecated and will be removed in a future release. |  correlator and dashboard server log files  correlator input log  correlator in-memory state  correlator persistence database | 
| Dashboard servers | User identifiers and IP addresses of dashboard clients that connect, who may be end-users. These are logged to provide an audit trail. |  dashboard server log files | 
| Dashboard servers, if using JAAS | User identifiers of dashboard clients for authentication purposes. These are logged to provide an audit trail. | Under the control of the JAAS plug-in used. For example, the UserFileLoginModule provided by Apama stores usernames in plaintext in an XML file, whereas other plug-ins are available that hold usernames on a remote server such as an LDAP server. See 
    Administering Dashboard Security. You can choose an appropriate JAAS plug-in which complies with the way you need to protect the user data if required. | 
| HTTP server connectivity plug-in | User identifiers and IP addresses of clients that connect to the HTTP server, as specified in HTTP header. These are written to the log file. Along with other HTTP headers they are also present in the message metadata. Thus they can optionally be mapped to fields in an Apama event, using a connectivity codec such as the mapper codec. |  correlator main log file  correlator input log file  correlator in-memory state  correlator persistence database | 
| HTTP server connectivity plug-in, only if authentication is enabled | User identifiers of clients who are permitted to connect to the HTTP server (with a secure hash of the passwords). |  HTTP server authentication password file, which is stored on disk in plaintext and contains un-encrypted usernames and hashed salted passwords, see 
    Authentication. As the file is completely under the user's control, you can use standard tools included with your operating system to set access control for protecting this data as needed. Users can be deleted from the file using a text editor or the httpserver_passman provided by Apama as described in the documentation. |