Re: audit table containing Select statements submitted

From: "Jim C(dot) Nasby" <jnasby(at)pervasive(dot)com>
To: "Hogan, James F(dot) Jr(dot)" <JHogan(at)seton(dot)org>
Cc: Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>, "Joshua D(dot) Drake" <jd(at)commandprompt(dot)com>, josh(at)agliodbs(dot)com, Andrew Dunstan <andrew(at)dunslane(dot)net>, pgsql-hackers(at)postgresql(dot)org
Subject: Re: audit table containing Select statements submitted
Date: 2006-05-15 16:02:40
Message-ID: 20060515160240.GQ26212@pervasive.com
Views: Raw Message | Whole Thread | Download mbox | Resend email
Thread:
Lists: pgsql-hackers

On Mon, May 15, 2006 at 10:55:43AM -0500, Hogan, James F. Jr. wrote:
> Only specific tables.
>
> Of the 150 plus existing there are only 8 or 10 that hold sensitive
> data.

In that case I'd definately go with the suggestion of creating access
functions and logging to a table from within them. Just make sure to
mark the functions as volatile.
--
Jim C. Nasby, Sr. Engineering Consultant jnasby(at)pervasive(dot)com
Pervasive Software http://pervasive.com work: 512-231-6117
vcard: http://jim.nasby.net/pervasive.vcf cell: 512-569-9461

In response to

Responses

Browse pgsql-hackers by date

  From Date Subject
Next Message Jeff Frost 2006-05-15 16:28:25 does wal archiving block the current client connection?
Previous Message Hogan, James F. Jr. 2006-05-15 15:55:43 Re: audit table containing Select statements submitted