Table 12-2 provides an overview of managing single-table auditing.
Action |
Description |
See |
---|---|---|
1. Install auditing. |
Installation of auditing, which involves setting the number of audit tables and assigning devices for the audit trail and the syslogs transaction log in the sybsecurity database. |
The the installation documentation for your platform. |
2. Set up the audit process to manage the audit trail. |
Writing and establishing a threshold procedure that receives control when the audit table is nearly full. The procedure automatically writes the contents of the audit table to another table, and then truncates the audit table. In addition, this step involves setting the audit queue size and suspend audit when device full configuration parameters. |
|
3. Set up the audit process to manage the syslogs transaction log in the sybsecurity database. |
Determining how to handle the syslogs transaction log in the sybsecurity database. The task includes determining the setting of the trunc log on chkpt database option and establishing a last-chance threshold procedure for syslogs if trunc log on chkpt is off. |
|
4. Set auditing options. |
Using sp_audit to establish the events to be audited. No audit records are generated until auditing is turned on with sp_configure. |
|
5. Enable auditing. |
Using sp_configure to turn on the auditing configuration parameter. Adaptive Server begins writing audit records for audited events to the current audit table. |