Skip to content

Commit 719eefc

Browse files
authored
Merge pull request #111337 from hyoshioka0128/patch-672
Typo "Flexible server"→"Flexible Server"
2 parents f8f4b15 + 4a4b4e4 commit 719eefc

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

articles/postgresql/flexible-server/concepts-audit.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
2-
title: Audit logging - Azure Database for PostgreSQL - Flexible server
3-
description: Concepts for pgAudit audit logging in Azure Database for PostgreSQL - Flexible server.
2+
title: Audit logging - Azure Database for PostgreSQL - Flexible Server
3+
description: Concepts for pgAudit audit logging in Azure Database for PostgreSQL - Flexible Server.
44
ms.service: postgresql
55
ms.subservice: flexible-server
66
ms.topic: conceptual
@@ -10,16 +10,16 @@ ms.reviewer:
1010
ms.date: 11/30/2021
1111
---
1212

13-
# Audit logging in Azure Database for PostgreSQL - Flexible server
13+
# Audit logging in Azure Database for PostgreSQL - Flexible Server
1414

1515
[!INCLUDE [applies-to-postgresql-flexible-server](../includes/applies-to-postgresql-flexible-server.md)]
1616

17-
Audit logging of database activities in Azure Database for PostgreSQL - Flexible server is available through the PostgreSQL Audit extension: [pgAudit](https://www.pgaudit.org/). pgAudit provides detailed session and/or object audit logging.
17+
Audit logging of database activities in Azure Database for PostgreSQL - Flexible Server is available through the PostgreSQL Audit extension: [pgAudit](https://www.pgaudit.org/). pgAudit provides detailed session and/or object audit logging.
1818

1919
If you want Azure resource-level logs for operations like compute and storage scaling, see the [Azure Activity Log](../../azure-monitor/essentials/platform-logs-overview.md).
2020

2121
## Usage considerations
22-
By default, pgAudit log statements are emitted along with your regular log statements by using Postgres's standard logging facility. In Azure Database for PostgreSQL - Flexible server, you can configure all logs to be sent to Azure Monitor Log store for later analytics in Log Analytics. If you enable Azure Monitor resource logging, your logs will be automatically sent (in JSON format) to Azure Storage, Event Hubs, and/or Azure Monitor logs, depending on your choice.
22+
By default, pgAudit log statements are emitted along with your regular log statements by using Postgres's standard logging facility. In Azure Database for PostgreSQL - Flexible Server, you can configure all logs to be sent to Azure Monitor Log store for later analytics in Log Analytics. If you enable Azure Monitor resource logging, your logs will be automatically sent (in JSON format) to Azure Storage, Event Hubs, and/or Azure Monitor logs, depending on your choice.
2323

2424
To learn how to set up logging to Azure Storage, Event Hubs, or Azure Monitor logs, visit the resource logs section of the [server logs article](concepts-logging.md).
2525

@@ -93,7 +93,7 @@ The [pgAudit documentation](https://github.com/pgaudit/pgaudit/blob/master/READM
9393
> `pgaudit.log_level` is only enabled when `pgaudit.log_client` is on.
9494

9595
> [!NOTE]
96-
> In Azure Database for PostgreSQL - Flexible server, `pgaudit.log` cannot be set using a `-` (minus) sign shortcut as described in the pgAudit documentation. All required statement classes (READ, WRITE, etc.) should be individually specified.
96+
> In Azure Database for PostgreSQL - Flexible Server, `pgaudit.log` cannot be set using a `-` (minus) sign shortcut as described in the pgAudit documentation. All required statement classes (READ, WRITE, etc.) should be individually specified.
9797
> [!NOTE]
9898
>If you set the log_statement parameter to DDL or ALL, and run a `CREATE ROLE/USER ... WITH PASSWORD ... ; ` or `ALTER ROLE/USER ... WITH PASSWORD ... ;`, command, then PostgreSQL creates an entry in the PostgreSQL logs, where password is logged in clear text, which may cause a potential security risk. This is expected behavior as per PostgreSQL engine design. You can, however, use PGAudit extension and set `pgaudit.log='DDL'` parameter in server parameters page, which doesn't record any `CREATE/ALTER ROLE` statement in Postgres Log, unlike Postgres `log_statement='DDL'` setting. If you do need to log these statements you can add `pgaudit.log ='ROLE'` in addition, which, while logging `'CREATE/ALTER ROLE'` will redact the password from logs.
9999
@@ -123,5 +123,5 @@ AzureDiagnostics
123123
124124
125125
## Next steps
126-
- [Learn about logging in Azure Database for PostgreSQL - Flexible server](concepts-logging.md)
127-
- [Learn how to setup logging in Azure Database for PostgreSQL - Flexible server and how to access logs](howto-configure-and-access-logs.md)
126+
- [Learn about logging in Azure Database for PostgreSQL - Flexible Server](concepts-logging.md)
127+
- [Learn how to setup logging in Azure Database for PostgreSQL - Flexible Server and how to access logs](howto-configure-and-access-logs.md)

0 commit comments

Comments
 (0)