检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
ENABLE|DISABLE Enables or disables the unified audit policy. If ENABLE|DISABLE is not specified, ENABLE is used by default. Examples See Examples in "CREATE AUDIT POLICY." Helpful Links CREATE AUDIT POLICY and DROP AUDIT POLICY Parent topic: SQL Syntax
ENABLE|DISABLE Enables or disables the unified audit policy. If ENABLE|DISABLE is not specified, ENABLE is used by default. Examples See Examples in "CREATE AUDIT POLICY." Helpful Links CREATE AUDIT POLICY and DROP AUDIT POLICY Parent topic: SQL Syntax
Parent topic: Using CTS to Audit ModelArts Standard
Audit Using CTS Key Operations Supported by CTS Viewing Traces
Database Audit Context Database audit is critical to the security of the database system.
Database Audit Context Database audit is critical to the security of the database system.
Database Audit Context Database audit is critical to the security of the database system.
Managing Backup Audit Logs After backing up audit logs, you can view or delete backup audit logs. Prerequisites The database audit instance is in the Running state. For details about how to enable database audit, see Enable Database Audit.
Audit and Logging Audit Cloud Trace Service (CTS) records operations on the cloud resources in your account. You can use the logs generated by CTS to perform security analysis, track resource changes, audit compliance, and locate faults.
Table of Audit Logs This function enables direct SQL statement execution for viewing and analyzing audit logs, eliminating the need to manually collect and analyze FE audit log files to check service volume and types.
If the system data disk space is large enough, you can prolong the storage duration of system audit logs or even keep system audit logs for ever. For more details about system data backup, see How Can I Back Up CBH System Data? Parent topic: O&M Log Audit
Viewing DCS Audit Logs With CTS, you can query, audit, and review operations performed on cloud resources. Traces include the operation requests sent using the management console or open APIs as well as the results of these requests.
Meeting Database Audit Compliance Requirements To meet compliance requirements, DBSS allows you to configure the retention period for audit logs, audit reports, and privacy audit logs Configuring Audit Log Retention Duration According to relevant audit laws and regulations, audit
The Audit Log Is Enabled Rule Details Table 1 Rule details Parameter Description Rule Name gaussdb-mysql-instance-enable-auditlog Identifier gaussdb-mysql-instance-enable-auditlog Description If the audit log is not enabled for a TaurusDB instance, this instance is noncompliant.
Parent topic: Audit Instance
Viewing Audit Logs After you enable CTS, the system starts recording operations on CFW. You can view the operation records of the last seven days on the CTS console. For details about how to view audit logs, see Querying Real-Time Traces (for New Console).
Value range: N/A name String Explanation: Indicates the audit log file name. Value range: N/A size Long Explanation: Indicates the size in KB of the audit log. Value range: N/A begin_time String Explanation: Indicates the start time of the audit log.
Querying Audit Logs For details about how to view audit logs, see Querying Real-Time Traces. Parent topic: Key Operations Recorded by CTS
policy. openGauss=# CREATE AUDIT POLICY adt1 PRIVILEGES CREATE; -- Perform the SELECT operation on the database to create an audit policy. openGauss=# CREATE AUDIT POLICY adt2 ACCESS SELECT; -- Create an audit policy to audit only the CREATE operations performed on the adt_lb0
policy. openGauss=# CREATE AUDIT POLICY adt1 PRIVILEGES CREATE; -- Perform the SELECT operation on the database to create an audit policy. openGauss=# CREATE AUDIT POLICY adt2 ACCESS SELECT; -- Create an audit policy to audit only the CREATE operations performed on the adt_lb0