检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
Helpful Links ALTER AUDIT POLICY and CREATE AUDIT POLICY Parent topic: SQL Syntax
Helpful Links CREATE AUDIT POLICY and ALTER AUDIT POLICY Parent topic: SQL Syntax
Helpful Links CREATE AUDIT POLICY and ALTER AUDIT POLICY Parent topic: SQL Syntax
Helpful Links ALTER AUDIT POLICY and CREATE AUDIT POLICY Parent topic: SQL Syntax
Examples See Examples in section "CREATE AUDIT POLICY." Helpful Links CREATE AUDIT POLICY and DROP AUDIT POLICY Parent topic: SQL Syntax
Examples See Examples in section "CREATE AUDIT POLICY." Helpful Links CREATE AUDIT POLICY and DROP AUDIT POLICY Parent topic: SQL Syntax
ENABLE|DISABLE Enables or disables the unified audit policy. If ENABLE|DISABLE is not specified, ENABLE is used by default. Examples See Examples in "CREATE AUDIT POLICY." Helpful Links CREATE AUDIT POLICY and DROP AUDIT POLICY Parent topic: SQL Syntax
ENABLE|DISABLE Enables or disables the unified audit policy. If ENABLE|DISABLE is not specified, ENABLE is used by default. Examples See Examples in "CREATE AUDIT POLICY." Helpful Links CREATE AUDIT POLICY and DROP AUDIT POLICY Parent topic: SQL Syntax
Audit Using CTS Key Operations Supported by CTS Viewing Traces
Parent topic: Using CTS to Audit ModelArts Standard
CREATE AUDIT POLICY Function CREATE AUDIT POLICY creates a unified audit policy. Precautions Only user poladmin, user sysadmin, or the initial user can perform this operation.
Managing Backup Audit Logs After backing up audit logs, you can view or delete backup audit logs. Prerequisites The database audit instance is in the Running state. For details about how to enable database audit, see Enable Database Audit.
Viewing DCS Audit Logs With CTS, you can query, audit, and review operations performed on cloud resources. Traces include the operation requests sent using the management console or open APIs as well as the results of these requests.
Meeting Database Audit Compliance Requirements To meet compliance requirements, DBSS allows you to configure the retention period for audit logs, audit reports, and privacy audit logs Configuring Audit Log Retention Duration According to relevant audit laws and regulations, audit
Database Audit Context Database audit is critical to the security of the database system.
Database Audit Context Database audit is critical to the security of the database system.
Database Audit Context Database audit is critical to the security of the database system.
Table of Audit Logs This function enables direct SQL statement execution for viewing and analyzing audit logs, eliminating the need to manually collect and analyze FE audit log files to check service volume and types.
If the system data disk space is large enough, you can prolong the storage duration of system audit logs or even keep system audit logs for ever. For more details about system data backup, see How Can I Back Up CBH System Data? Parent topic: O&M Log Audit
Audit and Logging Audit Cloud Trace Service (CTS) records operations on the cloud resources in your account. You can use the logs generated by CTS to perform security analysis, track resource changes, audit compliance, and locate faults.