You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/audit-log-filter-compression-encryption.md
+4-46Lines changed: 4 additions & 46 deletions
Original file line number
Diff line number
Diff line change
@@ -26,52 +26,10 @@ The AES uses the 256-bit key size.
26
26
27
27
The following audit log filter functions are used with encryption:
28
28
29
-
<!DOCTYPE html>
30
-
<html>
31
-
<head>
32
-
<title>HTML Table Generator</title>
33
-
<style>
34
-
table {
35
-
border:1px solid #b3adad;
36
-
border-collapse:collapse;
37
-
padding:5px;
38
-
}
39
-
table th {
40
-
border:1px solid #b3adad;
41
-
padding:5px;
42
-
background: #f0f0f0;
43
-
color: #313030;
44
-
}
45
-
table td {
46
-
border:1px solid #b3adad;
47
-
text-align:center;
48
-
padding:5px;
49
-
background: #ffffff;
50
-
color: #313030;
51
-
}
52
-
</style>
53
-
</head>
54
-
<body>
55
-
<table>
56
-
<thead>
57
-
<tr>
58
-
<th>Function name</th>
59
-
<th>Description</th>
60
-
</tr>
61
-
</thead>
62
-
<tbody>
63
-
<tr>
64
-
<td>audit_log_encryption_password_set()</td>
65
-
<td>Stores the password in the keyring. If encryption is enabled, the function also rotates the log file by renaming the current log file and creating a log file encrypted with the password.</td>
66
-
</tr>
67
-
<tr>
68
-
<td>audit_log_encryption_password_get()</td>
69
-
<td>Invoking this function without an argument returns the current encryption password. An argument that specifies the keyring ID of an archived password or current password returns that password by ID.</td>
70
-
</tr>
71
-
</tbody>
72
-
</table>
73
-
</body>
74
-
</html>
29
+
| Function name | Description |
30
+
| --------------- | ------------------ |
31
+
| audit_log_encryption_password_set() | Stores the password in the keyring. If encryption is enabled, the function also rotates the log file by renaming the current log file and creating a log file encrypted with the password. |
32
+
| audit_log_encryption_password_get() | Invoking this function without an argument returns the current encryption password. An argument that specifies the keyring ID of an archived password or current password returns that password by ID. |
75
33
76
34
The `audit_log_filter_password_history_keep_days` variable is used with encryption. If the variable is not zero (0) , invoking `audit_log_encryption_password_set()` causes the expiration of archived audit log passwords.
@@ -82,178 +82,33 @@ The order of the attributes within an <AUDIT_RECORD> can vary. Certain attribute
82
82
83
83
The attributes in every element are the following:
84
84
85
+
| Attribute Name | Description |
86
+
| -------------- | ----------- |
87
+
|`<NAME>`| The action that generated the audit record. |
88
+
|`<RECORD_ID>`| The `<RECORD_ID>` consists of a sequence number and a timestamp value. The sequence number is initialized when the plugin opens the audit log filter file. |
89
+
|`<TIMESTAMP>`| Displays the date and time when the audit event happened. |
85
90
86
-
<!DOCTYPE html>
87
-
<html>
88
-
<head>
89
-
<title>HTML Table Generator</title>
90
-
<style>
91
-
table {
92
-
width:150%;
93
-
height:100%;
94
-
border:1px solid #b3adad;
95
-
border-collapse:collapse;
96
-
padding:1px;
97
-
}
98
-
table th {
99
-
border:1px solid #b3adad;
100
-
padding:1px;
101
-
background: #f0f0f0;
102
-
color: #313030;
103
-
}
104
-
table td {
105
-
border:1px solid #b3adad;
106
-
text-align:left;
107
-
padding:1px;
108
-
background: #ffffff;
109
-
color: #313030;
110
-
}
111
-
</style>
112
-
</head>
113
-
<body>
114
-
<table>
115
-
<thead>
116
-
<tr>
117
-
<th>Attribute Name</th>
118
-
<th>Description</th>
119
-
</tr>
120
-
</thead>
121
-
<tbody>
122
-
<tr>
123
-
<td> <NAME></td>
124
-
<td>The action that generated the audit record.</td>
125
-
</tr>
126
-
<tr>
127
-
<td> <RECORD_ID></td>
128
-
<td>The <RECORD_ID> consists of a sequence number and a timestamp value. The sequence number is initialized when the plugin opens the audit log filter file.</td>
129
-
</tr>
130
-
<tr>
131
-
<td> <TIMESTAMP></td>
132
-
<td>Displays the date and time when the audit event happened.</td>
133
-
</tr>
134
-
</tbody>
135
-
</table>
136
-
</body>
137
-
</html>
138
91
The optional attributes are the following:
139
92
140
-
<!DOCTYPE html>
141
-
<html>
142
-
<head>
143
-
<title>HTML Table Generator</title>
144
-
<style>
145
-
table {
146
-
width:150%;
147
-
height:100%;
148
-
border:1px solid #b3adad;
149
-
border-collapse:collapse;
150
-
padding:1px;
151
-
}
152
-
table th {
153
-
border:1px solid #b3adad;
154
-
padding:1px;
155
-
background: #f0f0f0;
156
-
color: #313030;
157
-
}
158
-
table td {
159
-
border:1px solid #b3adad;
160
-
text-align:left;
161
-
padding:1px;
162
-
background: #ffffff;
163
-
color: #313030;
164
-
}
165
-
</style>
166
-
</head>
167
-
<body>
168
-
<table>
169
-
<thead>
170
-
<tr>
171
-
<th>Attribute Name</th>
172
-
<th>Description</th>
173
-
</tr>
174
-
</thead>
175
-
<tbody>
176
-
<tr>
177
-
<td> <COMMAND_CLASS></td>
178
-
<td>Contains the type of performed action. </td>
179
-
</tr>
180
-
<tr>
181
-
<td> <CONNECTION_ID></td>
182
-
<td>Contains the client connection identifier.</td>
183
-
</tr>
184
-
<tr>
185
-
<td> <CONNECTION_ATTRIBUTES></td>
186
-
<td>Contains the client connection attributes. Each attribute has a <NAME> and <VALUE> pair.</td>
187
-
</tr>
188
-
<tr>
189
-
<td> <CONNECTION_TYPE></td>
190
-
<td>Contains the type of connection security. <br></td>
191
-
</tr>
192
-
<tr>
193
-
<td> <DB></td>
194
-
<td>Contains the database name.</td>
195
-
</tr>
196
-
<tr>
197
-
<td> <HOST></td>
198
-
<td>Contains the client's hostname.</td>
199
-
</tr>
200
-
<tr>
201
-
<td> <IP></td>
202
-
<td>Contains the client's IP address.</td>
203
-
</tr>
204
-
<tr>
205
-
<td> <MYSQL_VERSION></td>
206
-
<td>Contains the MySQL server version.</td>
207
-
</tr>
208
-
<tr>
209
-
<td> <OS_LOGIN></td>
210
-
<td>Contains the user name used during an external authentication, for example, if the user is authenticated through an LDAP plugin. If the authentication plugin does not set a value or the user is authenticated using MySQL authentication, this value is empty.</td>
211
-
</tr>
212
-
<tr>
213
-
<td> <OS_VERSION></td>
214
-
<td>Contains the server's operating system.</td>
215
-
</tr>
216
-
<tr>
217
-
<td> <PRIV_USER></td>
218
-
<td>Contains the user name used by the server when checking privileges. This name may be different than <USER>.</td>
219
-
</tr>
220
-
<tr>
221
-
<td> <PROXY_USER></td>
222
-
<td>Contains the proxy user. If a proxy is not used, the value is empty.</td>
223
-
</tr>
224
-
<tr>
225
-
<td> <SERVER_ID></td>
226
-
<td>Contains the server ID.</td>
227
-
</tr>
228
-
<tr>
229
-
<td> <SQLTEXT></td>
230
-
<td>Contains the text of the SQL statement.</td>
231
-
</tr>
232
-
<tr>
233
-
<td> <STARTUP_OPTIONS></td>
234
-
<td>Contains the startup options. These options may be provided by the command line or files.</td>
235
-
</tr>
236
-
<tr>
237
-
<td> <STATUS></td>
238
-
<td>Contains the status of a command. A 0 (zero) is a success. A nonzero value is an error.</td>
239
-
</tr>
240
-
<tr>
241
-
<td> <STATUS_CODE></td>
242
-
<td>Contains the status of a command, which either succeeds (0) or an error occurred (1).</td>
243
-
</tr>
244
-
<tr>
245
-
<td> <TABLE></td>
246
-
<td>Contains the table name.</td>
247
-
</tr>
248
-
<tr>
249
-
<td> <USER></td>
250
-
<td>Contains the user name from the client. This name may be different than <PRIV_USER>.</td>
251
-
</tr>
252
-
<tr>
253
-
<td> <VERSION></td>
254
-
<td>Contains the audit log filter format.</td>
255
-
</tr>
256
-
</tbody>
257
-
</table>
258
-
</body>
259
-
</html>
93
+
| Attribute Name | Description |
94
+
| ----------------------- | ------------- |
95
+
|`<COMMAND_CLASS>`| Contains the type of performed action. |
96
+
|`<CONNECTION_ID>`| Contains the client connection identifier. |
97
+
|`<CONNECTION_ATTRIBUTES>`| Contains the client connection attributes. Each attribute has a `<NAME>` and `<VALUE>` pair. |
98
+
|`<CONNECTION_TYPE>`| Contains the type of connection security. |
99
+
|`<DB>`| Contains the database name. |
100
+
|`<HOST>`| Contains the client's hostname. |
101
+
|`<IP>`| Contains the client's IP address. |
102
+
|`<MYSQL_VERSION>`| Contains the MySQL server version. |
103
+
|`<OS_LOGIN>`| Contains the user name used during an external authentication, for example, if the user is authenticated through an LDAP plugin. If the authentication plugin does not set a value or the user is authenticated using MySQL authentication, this value is empty. |
104
+
|`<OS_VERSION>`| Contains the server's operating system. |
105
+
|`<PRIV_USER>`| Contains the user name used by the server when checking privileges. This name may be different than `<USER>`. |
106
+
|`<PROXY_USER>`| Contains the proxy user. If a proxy is not used, the value is empty. |
107
+
|`<SERVER_ID>`| Contains the server ID. |
108
+
|`<SQLTEXT>`| Contains the text of the SQL statement. |
109
+
|`<STARTUP_OPTIONS>`| Contains the startup options. These options may be provided by the command line or files. |
110
+
|`<STATUS>`| Contains the status of a command. A 0 (zero) is a success. A nonzero value is an error. |
111
+
|`<STATUS_CODE>`| Contains the status of a command, which either succeeds (0) or an error occurred (1). |
112
+
|`<TABLE>`| Contains the table name. |
113
+
|`<USER>`| Contains the user name from the client. This name may be different than `<PRIV_USER>`. |
114
+
|`<VERSION>`| Contains the audit log filter format. |
0 commit comments