PDF (A4) - 40.1Mb
Man Pages (TGZ) - 259.0Kb
Man Pages (Zip) - 366.2Kb
Info (Gzip) - 4.0Mb
Info (Zip) - 4.0Mb
Filter definitions areJSON values. For information about usingJSON data in MySQL, seeSection 13.5, “The JSON Data Type”.
Filter definitions have this form, whereactions indicates how filtering takes place:
{ "filter":actions }The following discussion describes permitted constructs in filter definitions.
To explicitly enable or disable logging of all events, use alog item in the filter:
{ "filter": { "log": true }} Thelog value can be eithertrue orfalse.
The preceding filter enables logging of all events. It is equivalent to:
{ "filter": { }} Logging behavior depends on thelog value and whetherclass orevent items are specified:
With
logspecified, its given value is used.Without
logspecified, logging istrueif noclassoreventitem is specified, andfalseotherwise (in which case,classoreventcan include their ownlogitem).
To log events of a specific class, use aclass item in the filter, with itsname field denoting the name of the class to log:
{ "filter": { "class": { "name": "connection" } }} Thename value can beconnection,general, ortable_access to log connection, general, or table-access events, respectively.
The preceding filter enables logging of events in theconnection class. It is equivalent to the following filter withlog items made explicit:
{ "filter": { "log": false, "class": { "log": true, "name": "connection" } }} To enable logging of multiple classes, define theclass value as aJSON array element that names the classes:
{ "filter": { "class": [ { "name": "connection" }, { "name": "general" }, { "name": "table_access" } ] }}When multiple instances of a given item appear at the same level within a filter definition, the item values can be combined into a single instance of that item within an array value. The preceding definition can be written like this:
{ "filter": { "class": [ { "name": [ "connection", "general", "table_access" ] } ] }} To select specific event subclasses, use anevent item containing aname item that names the subclasses. The default action for events selected by anevent item is to log them. For example, this filter enables logging for the named event subclasses:
{ "filter": { "class": [ { "name": "connection", "event": [ { "name": "connect" }, { "name": "disconnect" } ] }, { "name": "general" }, { "name": "table_access", "event": [ { "name": "insert" }, { "name": "delete" }, { "name": "update" } ] } ] }} Theevent item can also contain explicitlog items to indicate whether to log qualifying events. Thisevent item selects multiple events and explicitly indicates logging behavior for them:
"event": [ { "name": "read", "log": false }, { "name": "insert", "log": true }, { "name": "delete", "log": true }, { "name": "update", "log": true }] Theevent item can also indicate whether to block qualifying events, if it contains anabort item. For details, seeBlocking Execution of Specific Events.
Table 8.33, “Event Class and Subclass Combinations” describes the permitted subclass values for each event class.
Table 8.33 Event Class and Subclass Combinations
| Event Class | Event Subclass | Description |
|---|---|---|
connection | connect | Connection initiation (successful or unsuccessful) |
connection | change_user | User re-authentication with different user/password during session |
connection | disconnect | Connection termination |
general | status | General operation information |
message | internal | Internally generated message |
message | user | Message generated byaudit_api_message_emit_udf() |
table_access | read | Table read statements, such asSELECT orINSERT INTO ... SELECT |
table_access | delete | Table delete statements, such asDELETE orTRUNCATE TABLE |
table_access | insert | Table insert statements, such asINSERT orREPLACE |
table_access | update | Table update statements, such asUPDATE |
Table 8.34, “Log and Abort Characteristics Per Event Class and Subclass Combination” describes for each event subclass whether it can be logged or aborted.
Table 8.34 Log and Abort Characteristics Per Event Class and Subclass Combination
| Event Class | Event Subclass | Can be Logged | Can be Aborted |
|---|---|---|---|
connection | connect | Yes | No |
connection | change_user | Yes | No |
connection | disconnect | Yes | No |
general | status | Yes | No |
message | internal | Yes | Yes |
message | user | Yes | Yes |
table_access | read | Yes | Yes |
table_access | delete | Yes | Yes |
table_access | insert | Yes | Yes |
table_access | update | Yes | Yes |
A filter can be defined in inclusive or exclusive mode:
Inclusive mode logs only explicitly specified items.
Exclusive mode logs everything but explicitly specified items.
To perform inclusive logging, disable logging globally and enable logging for specific classes. This filter logsconnect anddisconnect events in theconnection class, and events in thegeneral class:
{ "filter": { "log": false, "class": [ { "name": "connection", "event": [ { "name": "connect", "log": true }, { "name": "disconnect", "log": true } ] }, { "name": "general", "log": true } ] }} To perform exclusive logging, enable logging globally and disable logging for specific classes. This filter logs everything except events in thegeneral class:
{ "filter": { "log": true, "class": { "name": "general", "log": false } }} This filter logschange_user events in theconnection class,message events, andtable_access events, by virtue ofnot logging everything else:
{ "filter": { "log": true, "class": [ { "name": "connection", "event": [ { "name": "connect", "log": false }, { "name": "disconnect", "log": false } ] }, { "name": "general", "log": false } ] }} To enable logging based on specific event field values, specify afield item within thelog item that indicates the field name and its expected value:
{ "filter": { "class": { "name": "general", "event": { "name": "status", "log": { "field": { "name": "general_command.str", "value": "Query" } } } } }}Each event contains event class-specific fields that can be accessed from within a filter to perform custom filtering.
An event in theconnection class indicates when a connection-related activity occurs during a session, such as a user connecting to or disconnecting from the server.Table 8.35, “Connection Event Fields” indicates the permitted fields forconnection events.
Table 8.35 Connection Event Fields
| Field Name | Field Type | Description |
|---|---|---|
status | integer | Event status: 0: OK Otherwise: Failed |
connection_id | unsigned integer | Connection ID |
user.str | string | User name specified during authentication |
user.length | unsigned integer | User name length |
priv_user.str | string | Authenticated user name (account user name) |
priv_user.length | unsigned integer | Authenticated user name length |
external_user.str | string | External user name (provided by third-party authentication plugin) |
external_user.length | unsigned integer | External user name length |
proxy_user.str | string | Proxy user name |
proxy_user.length | unsigned integer | Proxy user name length |
host.str | string | Connected user host |
host.length | unsigned integer | Connected user host length |
ip.str | string | Connected user IP address |
ip.length | unsigned integer | Connected user IP address length |
database.str | string | Database name specified at connect time |
database.length | unsigned integer | Database name length |
connection_type | integer | Connection type: 0 or 1 or 2 or 3 or 4 or 5 or |
The":: values are symbolic pseudo-constants that may be given instead of the literal numeric values. They must be quoted as strings and are case-sensitive.xxx"
An event in thegeneral class indicates the status code of an operation and its details.Table 8.36, “General Event Fields” indicates the permitted fields forgeneral events.
Table 8.36 General Event Fields
| Field Name | Field Type | Description |
|---|---|---|
general_error_code | integer | Event status: 0: OK Otherwise: Failed |
general_thread_id | unsigned integer | Connection/thread ID |
general_user.str | string | User name specified during authentication |
general_user.length | unsigned integer | User name length |
general_command.str | string | Command name |
general_command.length | unsigned integer | Command name length |
general_query.str | string | SQL statement text |
general_query.length | unsigned integer | SQL statement text length |
general_host.str | string | Host name |
general_host.length | unsigned integer | Host name length |
general_sql_command.str | string | SQL command type name |
general_sql_command.length | unsigned integer | SQL command type name length |
general_external_user.str | string | External user name (provided by third-party authentication plugin) |
general_external_user.length | unsigned integer | External user name length |
general_ip.str | string | Connected user IP address |
general_ip.length | unsigned integer | Connection user IP address length |
general_command.str indicates a command name:Query,Execute,Quit, orChange user.
Ageneral event with thegeneral_command.str field set toQuery orExecute containsgeneral_sql_command.str set to a value that specifies the type of SQL command:alter_db,alter_db_upgrade,admin_commands, and so forth. The availablegeneral_sql_command.str values can be seen as the last components of the Performance Schema instruments displayed by this statement:
mysql> SELECT NAME FROM performance_schema.setup_instruments WHERE NAME LIKE 'statement/sql/%' ORDER BY NAME;+---------------------------------------+| NAME |+---------------------------------------+| statement/sql/alter_db || statement/sql/alter_db_upgrade || statement/sql/alter_event || statement/sql/alter_function || statement/sql/alter_instance || statement/sql/alter_procedure || statement/sql/alter_server |... An event in thetable_access class provides information about a specific type of access to a table.Table 8.37, “Table-Access Event Fields” indicates the permitted fields fortable_access events.
Table 8.37 Table-Access Event Fields
| Field Name | Field Type | Description |
|---|---|---|
connection_id | unsigned integer | Event connection ID |
sql_command_id | integer | SQL command ID |
query.str | string | SQL statement text |
query.length | unsigned integer | SQL statement text length |
table_database.str | string | Database name associated with event |
table_database.length | unsigned integer | Database name length |
table_name.str | string | Table name associated with event |
table_name.length | unsigned integer | Table name length |
The following list shows which statements produce which table-access events:
readevent:SELECTINSERT ... SELECT(for tables referenced inSELECTclause)REPLACE ... SELECT(for tables referenced inSELECTclause)UPDATE ... WHERE(for tables referenced inWHEREclause)HANDLER ... READ
deleteevent:DELETETRUNCATE TABLE
insertevent:INSERTINSERT ... SELECT(for table referenced inINSERTclause)REPLACEREPLACE ... SELECT(for table referenced inREPLACEclauseLOAD DATALOAD XML
updateevent:UPDATEUPDATE ... WHERE(for tables referenced inUPDATEclause)
event items can include anabort item that indicates whether to prevent qualifying events from executing.abort enables rules to be written that block execution of specific SQL statements.
It is theoretically possible for a user with sufficient permissions to mistakenly create anabort item in the audit log filter that prevents themselves and other administrators from accessing the system. TheAUDIT_ABORT_EXEMPT privilege is available to permit a user account’s queries to always be executed even if anabort item would block them. Accounts with this privilege can therefore be used to regain access to a system following an audit misconfiguration. The query is still logged in the audit log, but instead of being rejected, it is permitted due to the privilege.
Accounts created with theSYSTEM_USER privilege have theAUDIT_ABORT_EXEMPT privilege assigned automatically when they are created. TheAUDIT_ABORT_EXEMPT privilege is also assigned to existing accounts with theSYSTEM_USER privilege when you carry out an upgrade procedure, if no existing accounts have that privilege assigned.
Theabort item must appear within anevent item. For example:
"event": { "name":qualifying event subclass names "abort":condition} For event subclasses selected by thename item, theabort action is true or false, depending oncondition evaluation. If the condition evaluates to true, the event is blocked. Otherwise, the event continues executing.
Thecondition specification can be as simple astrue orfalse, or it can be more complex such that evaluation depends on event characteristics.
This filter blocksINSERT,UPDATE, andDELETE statements:
{ "filter": { "class": { "name": "table_access", "event": { "name": [ "insert", "update", "delete" ], "abort": true } } }} This more complex filter blocks the same statements, but only for a specific table (finances.bank_account):
{ "filter": { "class": { "name": "table_access", "event": { "name": [ "insert", "update", "delete" ], "abort": { "and": [ { "field": { "name": "table_database.str", "value": "finances" } }, { "field": { "name": "table_name.str", "value": "bank_account" } } ] } } } }}Statements matched and blocked by the filter return an error to the client:
ERROR 1045 (28000): Statement was aborted by an audit log filterNot all events can be blocked (seeTable 8.34, “Log and Abort Characteristics Per Event Class and Subclass Combination”). For an event that cannot be blocked, the audit log writes a warning to the error log rather than blocking it.
For attempts to define a filter in which theabort item appears elsewhere than in anevent item, an error occurs.
Logical operators (and,or,not) permit construction of complex conditions, enabling more advanced filtering configurations to be written. The followinglog item logs onlygeneral events withgeneral_command fields having a specific value and length:
{ "filter": { "class": { "name": "general", "event": { "name": "status", "log": { "or": [ { "and": [ { "field": { "name": "general_command.str", "value": "Query" } }, { "field": { "name": "general_command.length", "value": 5 } } ] }, { "and": [ { "field": { "name": "general_command.str", "value": "Execute" } }, { "field": { "name": "general_command.length", "value": 7 } } ] } ] } } } }} To refer to a predefined variable in alog condition, use avariable item, which takesname andvalue items and tests equality of the named variable against a given value:
"variable": { "name": "variable_name", "value":comparison_value} This is true ifvariable_name has the valuecomparison_value, false otherwise.
Example:
{ "filter": { "class": { "name": "general", "event": { "name": "status", "log": { "variable": { "name": "audit_log_connection_policy_value", "value": "::none" } } } } }} Each predefined variable corresponds to a system variable. By writing a filter that tests a predefined variable, you can modify filter operation by setting the corresponding system variable, without having to redefine the filter. For example, by writing a filter that tests the value of theaudit_log_connection_policy_value predefined variable, you can modify filter operation by changing the value of theaudit_log_connection_policy system variable.
Theaudit_log_ system variables are used for the deprecated legacy mode audit log (seeSection 8.4.5.10, “Legacy Mode Audit Log Filtering”). With rule-based audit log filtering, those variables remain visible (for example, usingxxx_policySHOW VARIABLES), but changes to them have no effect unless you write filters containing constructs that refer to them.
The following list describes the permitted predefined variables forvariable items:
audit_log_connection_policy_valueThis variable corresponds to the value of the
audit_log_connection_policysystem variable. The value is an unsigned integer.Table 8.38, “audit_log_connection_policy_value Values” shows the permitted values and the correspondingaudit_log_connection_policyvalues.Table 8.38 audit_log_connection_policy_value Values
Value Corresponding audit_log_connection_policy Value 0or"::none"NONE1or"::errors"ERRORS2or"::all"ALLThe
"::values are symbolic pseudo-constants that may be given instead of the literal numeric values. They must be quoted as strings and are case-sensitive.xxx"audit_log_policy_valueThis variable corresponds to the value of the
audit_log_policysystem variable. The value is an unsigned integer.Table 8.39, “audit_log_policy_value Values” shows the permitted values and the correspondingaudit_log_policyvalues.Table 8.39 audit_log_policy_value Values
Value Corresponding audit_log_policy Value 0or"::none"NONE1or"::logins"LOGINS2or"::all"ALL3or"::queries"QUERIESThe
"::values are symbolic pseudo-constants that may be given instead of the literal numeric values. They must be quoted as strings and are case-sensitive.xxx"audit_log_statement_policy_valueThis variable corresponds to the value of the
audit_log_statement_policysystem variable. The value is an unsigned integer.Table 8.40, “audit_log_statement_policy_value Values” shows the permitted values and the correspondingaudit_log_statement_policyvalues.Table 8.40 audit_log_statement_policy_value Values
Value Corresponding audit_log_statement_policy Value 0or"::none"NONE1or"::errors"ERRORS2or"::all"ALLThe
"::values are symbolic pseudo-constants that may be given instead of the literal numeric values. They must be quoted as strings and are case-sensitive.xxx"
To refer to a predefined function in alog condition, use afunction item, which takesname andargs items to specify the function name and its arguments, respectively:
"function": { "name": "function_name", "args":arguments} Thename item should specify the function name only, without parentheses or the argument list.
Theargs item must satisfy these conditions:
If the function takes no arguments, no
argsitem should be given.If the function does take arguments, an
argsitem is needed, and the arguments must be given in the order listed in the function description. Arguments can refer to predefined variables, event fields, or string or numeric constants.
If the number of arguments is incorrect or the arguments are not of the correct data types required by the function an error occurs.
Example:
{ "filter": { "class": { "name": "general", "event": { "name": "status", "log": { "function": { "name": "find_in_include_list", "args": [ { "string": [ { "field": "user.str" }, { "string": "@"}, { "field": "host.str" } ] } ] } } } } }} The preceding filter determines whether to loggeneral classstatus events depending on whether the current user is found in theaudit_log_include_accounts system variable. That user is constructed using fields in the event.
The following list describes the permitted predefined functions forfunction items:
audit_log_exclude_accounts_is_null()Checks whether the
audit_log_exclude_accountssystem variable isNULL. This function can be helpful when defining filters that correspond to the legacy audit log implementation.Arguments:
None.
audit_log_include_accounts_is_null()Checks whether the
audit_log_include_accountssystem variable isNULL. This function can be helpful when defining filters that correspond to the legacy audit log implementation.Arguments:
None.
debug_sleep(millisec)Sleeps for the given number of milliseconds. This function is used during performance measurement.
debug_sleep()is available for debug builds only.Arguments:
millisec: An unsigned integer that specifies the number of milliseconds to sleep.
find_in_exclude_list(account)Checks whether an account string exists in the audit log exclude list (the value of the
audit_log_exclude_accountssystem variable).Arguments:
account: A string that specifies the user account name.
find_in_include_list(account)Checks whether an account string exists in the audit log include list (the value of the
audit_log_include_accountssystem variable).Arguments:
account: A string that specifies the user account name.
query_digest([str])This function has differing behavior depending on whether an argument is given:
With no argument,
query_digestreturns the statement digest value corresponding to the statement literal text in the current event.With an argument,
query_digestreturns a Boolean indicating whether the argument is equal to the current statement digest.
Arguments:
str: This argument is optional. If given, it specifies a statement digest to be compared against the digest for the statement in the current event.
Examples:
This
functionitem includes no argument, soquery_digestreturns the current statement digest as a string:"function": { "name": "query_digest"}This
functionitem includes an argument, soquery_digestreturns a Boolean indicating whether the argument equals the current statement digest:"function": { "name": "query_digest", "args": "SELECT ?"}string_find(text, substr)Checks whether the
substrvalue is contained in thetextvalue. This search is case-sensitive.Arguments:
text: The text string to search.substr: The substring to search for intext.
Audit filter definitions support replacement of certain audit event fields, so that logged events contain the replacement value rather than the original value. This capability enables logged audit records to include statement digests rather than literal statements, which can be useful for MySQL deployments for which statements may expose sensitive values.
Field replacement in audit events works like this:
Field replacements are specified in audit filter definitions, so audit log filtering must be enabled as described inSection 8.4.5.7, “Audit Log Filtering”.
Not all fields can be replaced.Table 8.41, “Event Fields Subject to Replacement” shows which fields are replaceable in which event classes.
Table 8.41 Event Fields Subject to Replacement
Event Class Field Name generalgeneral_query.strtable_accessquery.strReplacement is conditional. Each replacement specification in a filter definition includes a condition, enabling a replaceable field to be changed, or left unchanged, depending on the condition result.
If replacement occurs, the replacement specification indicates the replacement value using a function that is permitted for that purpose.
AsTable 8.41, “Event Fields Subject to Replacement” shows, currently the only replaceable fields are those that contain statement text (which occurs in events of thegeneral andtable_access classes). In addition, the only function permitted for specifying the replacement value isquery_digest. This means that the only permitted replacement operation is to replace statement literal text by its corresponding digest.
Because field replacement occurs at an early auditing stage (during filtering), the choice of whether to write statement literal text or digest values applies regardless of log format written later (that is, whether the audit log plugin produces XML or JSON output).
Field replacement can take place at differing levels of event granularity:
To perform field replacement for all events in a class, filter events at the class level.
To perform replacement on a more fine-grained basis, include additional event-selection items. For example, you can perform field replacement only for specific subclasses of a given event class, or only in events for which fields have certain characteristics.
Within a filter definition, specify field replacement by including aprint item, which has this syntax:
"print": { "field": { "name": "field_name", "print":condition, "replace":replacement_value }} Within theprint item, itsfield item takes these three items to indicate how whether and how replacement occurs:
name: The field for which replacement (potentially) occurs.field_namemust be one of those shown inTable 8.41, “Event Fields Subject to Replacement”.print: The condition that determines whether to retain the original field value or replace it:If
conditionevaluates totrue, the field remains unchanged.If
conditionevaluates tofalse, replacement occurs, using the value of thereplaceitem.
To unconditionally replace a field, specify the condition like this:
"print": falsereplace: The replacement value to use when theprintcondition evaluates tofalse. Specifyreplacement_valueusing afunctionitem.
For example, this filter definition applies to all events in thegeneral class, replacing the statement literal text with its digest:
{ "filter": { "class": { "name": "general", "print": { "field": { "name": "general_query.str", "print": false, "replace": { "function": { "name": "query_digest" } } } } } }} The preceding filter uses thisprint item to unconditionally replace the statement literal text contained ingeneral_query.str by its digest value:
"print": { "field": { "name": "general_query.str", "print": false, "replace": { "function": { "name": "query_digest" } } }}print items can be written different ways to implement different replacement strategies. Thereplace item just shown specifies the replacement text using thisfunction construct to return a string representing the current statement digest:
"function": { "name": "query_digest"} Thequery_digest function can also be used in another way, as a comparator that returns a Boolean, which enables its use in theprint condition. To do this, provide an argument that specifies a comparison statement digest:
"function": { "name": "query_digest", "args": "digest"} In this case,query_digest returnstrue orfalse depending on whether the current statement digest is the same as the comparison digest. Usingquery_digest this way enables filter definitions to detect statements that match particular digests. The condition in the following construct is true only for statements that have a digest equal toSELECT ?, thus effecting replacement only for statements that do not match the digest:
"print": { "field": { "name": "general_query.str", "print": { "function": { "name": "query_digest", "args": "SELECT ?" } }, "replace": { "function": { "name": "query_digest" } } }} To perform replacement only for statements that do match the digest, usenot to invert the condition:
"print": { "field": { "name": "general_query.str", "print": { "not": { "function": { "name": "query_digest", "args": "SELECT ?" } } }, "replace": { "function": { "name": "query_digest" } } }} Suppose that you want the audit log to contain only statement digests and not literal statements. To achieve this, you must perform replacement on all events that contain statement text; that is, events in thegeneral andtable_access classes. An earlier filter definition showed how to unconditionally replace statement text forgeneral events. To do the same fortable_access events, use a filter that is similar but changes the class fromgeneral totable_access and the field name fromgeneral_query.str toquery.str:
{ "filter": { "class": { "name": "table_access", "print": { "field": { "name": "query.str", "print": false, "replace": { "function": { "name": "query_digest" } } } } } }} Combining thegeneral andtable_access filters results in a single filter that performs replacement for all statement text-containing events:
{ "filter": { "class": [ { "name": "general", "print": { "field": { "name": "general_query.str", "print": false, "replace": { "function": { "name": "query_digest" } } } } }, { "name": "table_access", "print": { "field": { "name": "query.str", "print": false, "replace": { "function": { "name": "query_digest" } } } } } ] }} To perform replacement on only some events within a class, add items to the filter that indicate more specifically when replacement occurs. The following filter applies to events in thetable_access class, but performs replacement only forinsert andupdate events (leavingread anddelete events unchanged):
{ "filter": { "class": { "name": "table_access", "event": { "name": [ "insert", "update" ], "print": { "field": { "name": "query.str", "print": false, "replace": { "function": { "name": "query_digest" } } } } } } }} This filter performs replacement forgeneral class events corresponding to the listed account-management statements (the effect being to hide credential and data values in the statements):
{ "filter": { "class": { "name": "general", "event": { "name": "status", "print": { "field": { "name": "general_query.str", "print": false, "replace": { "function": { "name": "query_digest" } } } }, "log": { "or": [ { "field": { "name": "general_sql_command.str", "value": "alter_user" } }, { "field": { "name": "general_sql_command.str", "value": "alter_user_default_role" } }, { "field": { "name": "general_sql_command.str", "value": "create_role" } }, { "field": { "name": "general_sql_command.str", "value": "create_user" } } ] } } } }} For information about the possiblegeneral_sql_command.str values, seeTesting Event Field Values.
In some cases, the filter definition can be changed dynamically. To do this, define afilter configuration within an existingfilter. For example:
{ "filter": { "id": "main", "class": { "name": "table_access", "event": { "name": [ "update", "delete" ], "log": false, "filter": { "class": { "name": "general", "event" : { "name": "status", "filter": { "ref": "main" } } }, "activate": { "or": [ { "field": { "name": "table_name.str", "value": "temp_1" } }, { "field": { "name": "table_name.str", "value": "temp_2" } } ] } } } } }} A new filter is activated when theactivate item within a subfilter evaluates totrue. Usingactivate in a top-levelfilter is not permitted.
A new filter can be replaced with the original one by using aref item inside the subfilter to refer to the original filterid.
The filter shown operates like this:
The
mainfilter waits fortable_accessevents, eitherupdateordelete.If the
updateordeletetable_accessevent occurs on thetemp_1ortemp_2table, the filter is replaced with the internal one (without anid, since there is no need to refer to it explicitly).If the end of the command is signalled (
general/statusevent), an entry is written to the audit log file and the filter is replaced with themainfilter.
The filter is useful to log statements that update or delete anything from thetemp_1 ortemp_2 tables, such as this one:
UPDATE temp_1, temp_3 SET temp_1.a=21, temp_3.a=23; The statement generates multipletable_access events, but the audit log file contains onlygeneral /status entries.
Anyid values used in the definition are evaluated with respect only to that definition. They have nothing to do with the value of theaudit_log_filter_id system variable.
PDF (A4) - 40.1Mb
Man Pages (TGZ) - 259.0Kb
Man Pages (Zip) - 366.2Kb
Info (Gzip) - 4.0Mb
Info (Zip) - 4.0Mb