检测到您已登录华为云国际站账号,为了您更好的体验,建议您访问国际站服务网站 https://www.huaweicloud.com/intl/zh-cn
不再显示此消息
CCE supports kube-controller-manager, kube-apiserver, kube-scheduler, and audit logs. For details, see Collecting Control Plane Component Logs. Application logs are generated by pods.
Value range: true: Yes false: No support_audit_log Boolean Parameter description: Whether audit logs are supported.
An automatically created Hudi table contains three audit fields: cdc_last_update_date, logical_is_deleted, and _hoodie_event_time. The _hoodie_event_time field is used as the pre-aggregation key of the Hudi table. Configure task parameters.
If this parameter is set to a value other than none, the statement audit function is enabled. The database administrator can access server logs to view SQL execution records.
Value range: true: Yes false: No support_audit_log Boolean Parameter description: Whether audit logs are supported.
Querying permission set members Y Y Y Y Querying agencies Y Y Y Y Creating data masking policies Y Y N N Deleting data masking policies Y Y N N Operating data masking policies Y Y Y Y Querying data masking policies Y Y Y Y Editing data masking policies Y Y N N Querying data access audit
Using CTS to Audit DLI lists DLI operations that can be recorded by CTS. For how to enable CTS and view trace details, see Cloud Trace Service Getting Started.
An automatically created Hudi table contains three audit fields: cdc_last_update_date, logical_is_deleted, and _hoodie_event_time. The _hoodie_event_time field is used as the pre-aggregation key of the Hudi table. Configure DDL message processing rules.
An automatically created Hudi table contains three audit fields: cdc_last_update_date, logical_is_deleted, and _hoodie_event_time. The _hoodie_event_time field is used as the pre-aggregation key of the Hudi table. Configure task parameters.
If this parameter is set to a value other than none, the statement audit function is enabled. The database administrator can access server logs to view SQL execution records.
Resources can be centrally managed in one account, which helps enterprises configure security policies in a centralized manner and better monitor and audit resource usage for higher security.
Resources can be centrally managed in one account, which helps enterprises configure security policies in a centralized manner and better monitor and audit resource usage for higher security.
Master Node A master node in a MapReduce Service cluster manages the cluster, assigns MapReduce executable files to core nodes, traces the execution status of each job, and monitors DataNode running status. match If a specified audit object matches an audit rule, the audit engine
The CPU monitoring logic is changed from Cgroup monitoring to job CPU monitoring summary. 5 Audit logs Statements in a transaction are audited when the statement type is set to be audited, even if the transaction is not set to be audited.
secmaster:dataclass:listTypes Querying the search criteria list secmaster:searchCondition:list Querying the data distribution histogram secmaster:search:listHistograms Obtaining the module list secmaster:module:list Searching for an incident list secmaster:incident:list Querying the audit
Permissions management instance * g:EnterpriseProjectId gaussdbformysql:auditlog:list Grants permission to query audit logs. List instance * g:EnterpriseProjectId gaussdbformysql:backup:create Grants permission to create a manual backup.
of all nodes in ZooKeeper. rangeradmin Rangeradmin@123 This user has the Ranger system management permissions and user permissions: Ranger web UI management permission Management permission of each component that uses Ranger authentication rangerauditor Rangerauditor@123 Default audit
By default, database configuration files and key files are not allowed, and you can run COPY FROM FILENAME or COPY TO FILENAME for certificate files and audit logs to prevent unauthorized users from viewing or modifying sensitive files.
By default, COPY FROM FILENAME or COPY TO FILENAME cannot be run for database configuration file, key files, certificate files, and audit logs to prevent unauthorized users from viewing or modifying sensitive files.
By default, database configuration files and key files are not allowed, and you can run the COPY FROM FILENAME or COPY TO FILENAME command for certificate files and audit logs to prevent unauthorized users from viewing or modifying sensitive files.