检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
You are advised to enable the audit logging function before using the function to record audit information. Calling this system function is a high-risk operation. Exercise caution when performing this operation.
You are advised to enable the audit logging function before using the function to record audit information. Calling this system function is a high-risk operation. Exercise caution when performing this operation.
AUDITADMIN | NOAUDITADMIN Specifies whether a role has the audit and management attributes. If not specified, NOAUDITADMIN is the default. CREATEDB | NOCREATEDB Specifies a role's permission to create databases. A new role does not have the permission to create databases.
AUDITADMIN | NOAUDITADMIN Specifies whether a role has the audit and management attributes. If not specified, NOAUDITADMIN is the default. CREATEDB | NOCREATEDB Specifies a role's permission to create databases. A new role does not have the permission to create databases.
Contact technical support before modifying this parameter. audit_system_object: If the value of this parameter is changed, DDL audit logs will be lost. Contact technical support before modifying this parameter. Replicas This parameter is available only for distributed instances.
If this parameter is set to a value other than none, the statement audit function is enabled. The database administrator can access server logs to view SQL execution records.
If this parameter is set to a value other than none, the statement audit function is enabled. The database administrator can access server logs to view SQL execution records.
By default, database configuration files and key files are not allowed, and you can run COPY FROM FILENAME or COPY TO FILENAME for certificate files and audit logs to prevent unauthorized users from viewing or modifying sensitive files.
By default, COPY FROM FILENAME or COPY TO FILENAME cannot be run for database configuration file, key files, certificate files, and audit logs to prevent unauthorized users from viewing or modifying sensitive files.
By default, database configuration files and key files are not allowed, and you can run the COPY FROM FILENAME or COPY TO FILENAME command for certificate files and audit logs to prevent unauthorized users from viewing or modifying sensitive files.
By default, database configuration files and key files are not allowed, and you can run the COPY FROM FILENAME or COPY TO FILENAME command for certificate files and audit logs to prevent unauthorized users from viewing or modifying sensitive files.
If this parameter is set to a value other than none, the statement audit function is enabled. The database administrator can access server logs to view SQL execution records. Parameter type: enumerated type.
If this parameter is set to a value other than none, the statement audit function is enabled. The database administrator can access server logs to view SQL execution records. Value type: enumerated type.
Reserved ASC Reserved Reserved Reserved ASENSITIVE N/A Non-reserved N/A ASSERTION Non-reserved Reserved Reserved ASSIGNMENT Non-reserved Non-reserved N/A ASYMMETRIC Reserved Non-reserved N/A AT Non-reserved Reserved Reserved ATOMIC N/A Non-reserved N/A ATTRIBUTE Non-reserved N/A N/A AUDIT
Reserved ASC Reserved Reserved Reserved ASENSITIVE N/A Non-reserved N/A ASSERTION Non-reserved Reserved Reserved ASSIGNMENT Non-reserved Non-reserved N/A ASYMMETRIC Reserved Non-reserved N/A AT Non-reserved Reserved Reserved ATOMIC N/A Non-reserved N/A ATTRIBUTE Non-reserved N/A N/A AUDIT
Reserved ASC Reserved Reserved Reserved ASENSITIVE N/A Non-reserved N/A ASSERTION Non-reserved Reserved Reserved ASSIGNMENT Non-reserved Non-reserved N/A ASYMMETRIC Reserved Non-reserved N/A AT Non-reserved Reserved Reserved ATOMIC N/A Non-reserved N/A ATTRIBUTE Non-reserved N/A N/A AUDIT
Reserved ASC Reserved Reserved Reserved ASENSITIVE N/A Non-reserved N/A ASSERTION Non-reserved Reserved Reserved ASSIGNMENT Non-reserved Non-reserved N/A ASYMMETRIC Reserved Non-reserved N/A AT Non-reserved Reserved Reserved ATOMIC N/A Non-reserved N/A ATTRIBUTE Non-reserved N/A N/A AUDIT
Reserved ASC Reserved Reserved Reserved ASENSITIVE N/A Non-reserved N/A ASSERTION Non-reserved Reserved Reserved ASSIGNMENT Non-reserved Non-reserved N/A ASYMMETRIC Reserved Non-reserved N/A AT Non-reserved Reserved Reserved ATOMIC N/A Non-reserved N/A ATTRIBUTE Non-reserved N/A N/A AUDIT
By default, database configuration files and key files are not allowed, and you can run COPY FROM FILENAME or COPY TO FILENAME for certificate files and audit logs to prevent unauthorized users from viewing or modifying sensitive files.
By default, database configuration files and key files are not allowed, and you can run COPY FROM FILENAME or COPY TO FILENAME for certificate files and audit logs to prevent unauthorized users from viewing or modifying sensitive files.