Hey guys! Thanks for the nice episode. In one of our systems we're planing to implement auditing to control activities in some sensitive tables, basically to log updates, inserts and deletes (selects aren't required). I'm aware of pgAudit and at first glance it seems very easy to install, use and maintain. However, all DBAs I know somehow prefer to user shadow tables and triggers instead. The main arguments are high customization and the fact that the data can be queried without having to import any log file into the database. So I was wondering, what strategy do your clients mostly adopt to log activities in sensitive tables? I would be also very interested in your thoughts on the topic :) Thanks!
@michristofides Жыл бұрын
Thanks! You're the second person to ask about auditing options, seems like a good candidate for a full episode soon :) In the meantime, I thought this video did a good job comparing the two options at a high level: kzfaq.info/get/bejne/hqxkfZllvLaZdpc.html