pgaudit | PostgreSQL Audit Extension | Database library

 by   pgaudit C Version: 1.7.0 License: Non-SPDX

kandi X-RAY | pgaudit Summary

kandi X-RAY | pgaudit Summary

pgaudit is a C library typically used in Database, PostgresSQL applications. pgaudit has no bugs, it has no vulnerabilities and it has medium support. However pgaudit has a Non-SPDX License. You can download it from GitHub.

The PostgreSQL Audit Extension (pgAudit) provides detailed session and/or object audit logging via the standard PostgreSQL logging facility. The goal of the pgAudit is to provide PostgreSQL users with capability to produce audit logs often required to comply with government, financial, or ISO certifications. An audit is an official inspection of an individual's or organization's accounts, typically by an independent body. The information gathered by pgAudit is properly called an audit trail or audit log. The term audit log is used in this documentation.
Support
    Quality
      Security
        License
          Reuse

            kandi-support Support

              pgaudit has a medium active ecosystem.
              It has 878 star(s) with 143 fork(s). There are 38 watchers for this library.
              OutlinedDot
              It had no major release in the last 12 months.
              There are 10 open issues and 156 have been closed. On average issues are closed in 85 days. There are 5 open pull requests and 0 closed requests.
              It has a neutral sentiment in the developer community.
              The latest version of pgaudit is 1.7.0

            kandi-Quality Quality

              pgaudit has 0 bugs and 0 code smells.

            kandi-Security Security

              pgaudit has no vulnerabilities reported, and its dependent libraries have no vulnerabilities reported.
              pgaudit code analysis shows 0 unresolved vulnerabilities.
              There are 0 security hotspots that need review.

            kandi-License License

              pgaudit has a Non-SPDX License.
              Non-SPDX licenses can be open source with a non SPDX compliant license, or non open source licenses, and you need to review them closely before use.

            kandi-Reuse Reuse

              pgaudit releases are available to install and integrate.
              Installation instructions, examples and code snippets are available.

            Top functions reviewed by kandi - BETA

            kandi's functional review helps you automatically verify the functionalities of the libraries and avoid rework.
            Currently covering the most popular Java, JavaScript and Python libraries. See a Sample of pgaudit
            Get all kandi verified functions for this library.

            pgaudit Key Features

            No Key Features are available at this moment for pgaudit.

            pgaudit Examples and Code Snippets

            No Code Snippets are available at this moment for pgaudit.

            Community Discussions

            QUESTION

            Installation of pg_cron on Azure Flexible PostgeSQL
            Asked 2022-Feb-25 at 21:31

            I am trying to install pg-cron extension for Azure PostgreSQL Flexible server. According to documentation found here: https://docs.microsoft.com/en-us/azure/postgresql/flexible-server/concepts-extensions#postgres-13-extensions pg_cron is available extension, but when I am trying to install it:

            ...

            ANSWER

            Answered 2021-Dec-16 at 14:12

            Seems that the pg_cron extension is already enabled, by default, in the default 'postgres' database. The reason why I was not seeing this is because I am not using the default 'postgres' database. I have created my own DB which I was connected to. This actually does not resolve my problem, because I can't execute jobs from pg_cron across databases...

            Source https://stackoverflow.com/questions/70363101

            QUESTION

            pgAudit not logging anything in GCP Cloud SQL
            Asked 2022-Feb-18 at 05:22

            I'm hoping for some insight into a problem I'm having with using pgAudit for a PostgreSQL 12 managed instance in GCP Cloud SQL.

            Thus far, I've done the following to set this up:

            Database flags:

            ...

            ANSWER

            Answered 2021-Oct-29 at 12:57

            log_statement=ddl as a flag allows for logging DDL statements without using pgAudit, so the majority of the setup was unnecessary. Set this flag and the operations I needed are now logged.

            Source https://stackoverflow.com/questions/69633522

            QUESTION

            CrashLoopBackOff on postgresql bitnami helm chart
            Asked 2022-Jan-04 at 18:31

            I know there have been already a lot of questions about this, and I read already most of them, but my problem does not seem to fit them.

            I am running a postgresql from bitnami using a helm chart as described below. A clean setup is no problem and everything starts fine. But after some time, until now I could not find any pattern, the pod goes into CrashLoopBackOff and I cannot recover it whatever I try!

            Helm uninstall/install does not fix the problem. The PVs seem to be the problem, but I do not know why. And I do not get any error message, which is the weird and scary part of it.

            I use a minikube to run the k8s and helm v3.

            Here are the definitions and logs:

            ...

            ANSWER

            Answered 2022-Jan-04 at 18:31

            I really hope nobody else runs across this, but finally I found the problem and for once it was not only between the chair and the monitor, but also RTFM was involved.

            As mentioned I am using minikube to run my k8s cluster which provides PVs stored on the host disk. Where it is stored you may ask? Exaclty, here: /tmp/hostpath-provisioner/default/data-sessiondb-0/data/. You find the problem? No, I also took some time to figure it out. WHY ON EARTH does minikube use the tmp folder to store persistant volume claims?

            This folder gets autom. cleared every now and so on.

            SOLUTION: Change the path and DO NOT STORE PVs IN tmp FOLDERS.

            They mention this here: https://minikube.sigs.k8s.io/docs/handbook/persistent_volumes/#a-note-on-mounts-persistence-and-minikube-hosts and give an example.

            But why use the "dangerous" tmp path per default and not, let's say, data without putting a Warning banner there?

            Sigh. Closing this question ^^

            --> Workaround: https://github.com/kubernetes/minikube/issues/7511#issuecomment-612099413

            Github issues to this topic:

            My Github issue for clarification in the docs: https://github.com/kubernetes/minikube/issues/13038#issuecomment-981821696

            Source https://stackoverflow.com/questions/70122497

            QUESTION

            why the postgersql kubernetes statefulset did not claim the PVC
            Asked 2021-Nov-27 at 04:09

            Today I want to change the PostgreSQL statefulset PVC name, to my surprise, I did not found any clain about the PVC in the kubernetes deployment define, this is the kubernetes deployment define of PostgreSQL:

            ...

            ANSWER

            Answered 2021-Nov-27 at 04:09

            pvc thats gets created as a part of statefulset will have a name which is an amalgamation of 3 components joined by - :

            1. Name defined in the volumeClaimTemplates section data
            2. Name of the statefulset in the metadata section which is reddwarf-postgresql-postgresql
            3. Its replica number , if it is first replica then it would be 0

            So finally the name of the pvc that gets created when you create this statefulset is data-reddwarf-postgresql-postgresql-0.which is the pvc name that you also seeing in your setup.

            please note when you delete the statefulset , pvc does not deleted automatically we need to pvc separately. When you recreate/scaleup the stateful set and if the pvc which matches above naming convention& spec does not exists then it will create a pvc.

            From kubernetes documentation

            Source https://stackoverflow.com/questions/70131872

            QUESTION

            Google Cloud - Hippa Compliance - PgAudit vs IAM Audit Logs
            Asked 2021-Nov-11 at 17:44

            Our infrastructure is hosted on Google Cloud and uses postgresql instances via Cloud SQL

            I need to configure logging for HIPAA compliance. I have read 2 articles from Google's documentation:

            https://cloud.google.com/logging/docs/audit/configure-data-access#config-console https://cloud.google.com/sql/docs/postgres/pg-audit#overview

            The first talks about enabling Audit Logs from within IAM, here I can select Cloud SQL and enable r+w logs for data and admins

            The second talks about PgAudit and sets the following flag pgaudit.log=all

            I have a couple of questions:

            1. How do IAM logs and PgAudit differ, should I enable both or is there redundancy by doing so?
            2. For HIPAA compliance using PgAudit, should I log all or is there another value that makes sense
            ...

            ANSWER

            Answered 2021-Nov-11 at 17:44

            How do IAM logs and PgAudit differ, should I enable both or is there redundancy by doing so?

            Well the IAM Logs focus on Admin Activity and data access:

            • Admin Activity audit logs: Includes "admin write" operations that write metadata or configuration information.
            • Data Access audit logs: Includes "admin read" operations that read metadata or configuration information. Also includes "data read" and "data write" operations that read or write user-provided data.

            On the other hand the pgAudit extension applies to executed SQL commands and queries.

            Basic statement logging can be provided by the standard logging facility with log_statement = all. This is acceptable for monitoring and other usages but does not provide the level of detail generally required for an audit. It is not enough to have a list of all the operations performed against the database. It must also be possible to find particular statements that are of interest to an auditor. The standard logging facility shows what the user requested, while pgAudit focuses on the details of what happened while the database was satisfying the request.

            For HIPAA compliance using PgAudit, should I log all or is there another value that makes sense

            When it comes to HIPAA compliance, I do not have any experience in the topic, but in this page it is mentioned that part of the Technical safeguards of HIPAA security rule is to introduce activity logs and audit controls.

            Maybe combining the IAM logs (Who did what, where, and when?) with the pgAudit(executed commands and queries) will provide better coverage to face this implementation specification.

            Source https://stackoverflow.com/questions/69918266

            QUESTION

            /opt/bitnami/scripts/postgresql/entrypoint.sh: line 30: exec: max_connections=500: not found
            Asked 2021-Aug-11 at 02:27

            Today I want to increase PostgreSQL max conenctions, then I add config to my kubernetes PostgreSQL config:

            ...

            ANSWER

            Answered 2021-Aug-11 at 02:26

            If you open the link that Bitnami helpfully provided you right there in the output you can find the documentation for the image. https://github.com/bitnami/bitnami-docker-postgresql#configuration-file seems to be the most relevant part to you though.

            Source https://stackoverflow.com/questions/68735163

            QUESTION

            How to automatic switch to new parameter group in AWS' RDS with Terraform?
            Asked 2021-May-19 at 07:37

            Set a new parameter group for RDS, its plan is

            ...

            ANSWER

            Answered 2021-May-19 at 07:37

            This is a long lasting and yet not-resolved issue with TF, already reported on GitHub:

            You have to do it manually for now.

            Source https://stackoverflow.com/questions/67598534

            QUESTION

            Can't install pgaudit on Ubuntu
            Asked 2021-Mar-10 at 14:24

            Trying to do everything by instruction in git. Clone the pgAudit extension:

            ...

            ANSWER

            Answered 2021-Mar-10 at 14:24

            Depending on the versions of Ubuntu and PostgreSQL you may not need to clone the Git repository of pgAudit and compile it from the sources.

            For example, Ubuntu 20.04 has a package named postgresql-12-pgaudit which may be what you need. To install it, open your terminal and type

            Source https://stackoverflow.com/questions/66566323

            QUESTION

            Is there a syntax to remove the \n from the chef inspec output
            Asked 2021-Feb-06 at 05:44

            When executing the below command:

            ...

            ANSWER

            Answered 2021-Feb-06 at 05:44

            you just have to run the query before the describe block, strip it and then use expect on it. something like:

            Source https://stackoverflow.com/questions/66058424

            QUESTION

            How to log SQL queries on a Google Cloud SQL PostgreSQL 11 instance?
            Asked 2020-May-28 at 11:04

            I have to log all DDL and DML queries executed on a Google Cloud SQL PostgreSQL instance.

            I checked a lot of websites, but there is no clear information available. I tried using the pgAudit extension, but that is not supported by Cloud SQL.

            Can someone please suggest the extension to be used or any other way of logging SQL queries? Also, if the user logins can be logged, then that will be helpful, too.

            ...

            ANSWER

            Answered 2020-May-27 at 09:04

            Add in postgresql.conf:

            Source https://stackoverflow.com/questions/62039227

            Community Discussions, Code Snippets contain sources that include Stack Exchange Network

            Vulnerabilities

            No vulnerabilities reported

            Install pgaudit

            pgAudit can be compiled against an installed copy of PostgreSQL with development packages using PGXS. The following instructions are for RHEL 7.

            Support

            For any new features, suggestions and bugs create an issue on GitHub. If you have any questions check and ask questions on community page Stack Overflow .
            Find more information at:

            Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items

            Find more libraries