Table 12-1 provides a general procedure for setting up auditing.
Action |
Description |
See |
---|---|---|
1. Install auditing. |
Set the number of audit tables and assign devices for the audit trail and the syslogs transaction log in the sybsecurity database. |
“Installing the audit system” and the Adaptive Server installation and configuration documentation |
2. Set up audit trail management. |
Write and establish a threshold procedure that receives control when the current audit table is nearly full. The procedure automatically switches to a new audit table and archives the contents of the current table. In addition, this step involves setting the audit queue size and the suspend audit when device full configuration parameters. |
“Setting up audit trail management” For single-table auditing, “Single-table auditing” |
3. Set up transaction log management in the sybsecurity database. |
Determine how to handle the syslogs transaction log in the sybsecurity database, how to set the trunc log on chkpt database option and establishing a last-chance threshold procedure for syslogs if trunc log on chkpt is off. |
|
4. Set auditing options. |
Using sp_audit to establish the events to be audited. |
|
5. Enable auditing. |
Using sp_configure to turn on the auditing configuration parameter. Adaptive Server begins writing audit records to the current audit table. |