Only specific tables.

Of the 150 plus existing there are only 8 or 10 that hold sensitive
data.

This will grow over time but will always be in the minority.





-----Original Message-----
From: Jim C. Nasby [mailto:[EMAIL PROTECTED] 
Sent: Monday, May 15, 2006 10:42 AM
To: Hogan, James F. Jr.
Cc: Tom Lane; Joshua D. Drake; josh@agliodbs.com; Andrew Dunstan;
pgsql-hackers@postgresql.org
Subject: Re: [HACKERS] audit table containing Select statements
submitted

How do you hope to avoid this overhead when you're looking to track
information on every single SELECT statement? Or were you looking to
only log access to some specific tables?

On Mon, May 15, 2006 at 09:38:54AM -0500, Hogan, James F. Jr. wrote:
> Thank you all for the effort you put into response.
> 
> The biggest thing I want to avoid isn't so much having to parse
through
> the log files but to avoid turning on such extensive logging
altogether.
> 
> I am not sure what kind of additional load logging to this extent may
> add.
> 
> Looks like I am not going to have much in the way of alternative.
> 
> Maybe some day.
> 
> Good news is that most access is via Web Interface and I capture most
> activity that way.
-- 
Jim C. Nasby, Sr. Engineering Consultant      [EMAIL PROTECTED]
Pervasive Software      http://pervasive.com    work: 512-231-6117
vcard: http://jim.nasby.net/pervasive.vcf       cell: 512-569-9461

---------------------------(end of broadcast)---------------------------
TIP 6: explain analyze is your friend

Reply via email to