Вы находитесь на странице: 1из 13

Using Triggers to Add an Audit

Log to Postgres Databases


Zack Bloom
@
zackbloom

As a system becomes more robust, it inevitably becomes not enough


to store the current state of the records. At some point it becomes
important to store when and how they were changed, and by whom.
Often, that point is several minutes before you make some horrible
mistake. Fortunately Postgres triggers allow you to create an audit log
for every table in your system painlessly.
Here’s how it works:
 A trigger on the table you care about runs whenever data is
manipulated
 The trigger writes a record to a seperate audit table, which stores all
the information about the edit you care to know.
That’s it! No changes to your code, no painful data model changes,
just add one trigger and you’re done. Note that there is a bit of a
performance penalty, as you now have to write an auditing record on
every insert, update and delete. If you are performance constrained,
it’s definitely a good idea to test this change before rolling it out
system-wide.
Run the trigger code at the bottom of this post, then call this function
for each table you wish to watch: SELECT audit.audit_table(myTable).
After making some changes in your original table, you’ll see records
like this appear in the audit.logged_actions table:
event_id | 2

schema_name | public

table_name | orders

relid | 17803

session_user_name | bill
action_tstamp_tx | 2014-12-03 03:47:38.832537+00

action_tstamp_stm | 2014-12-03 03:47:38.832644+00

action_tstamp_clk | 2014-12-03 03:47:38.835392+00

transaction_id | 79400

application_name |

client_addr | 54.155.24.2

client_port | 42333

client_query | update "orders" set "id"=$1, "appid"=$2

action | U

row_data | "id"=>"fdsa3", "appid"=>"w-fsdfdsf",

statement_only | f

You can query these records by referring to


the audit.logged_actions table. This new table won’t show up with
your other tables, as by default tables are created in
the publicschema.
Finally, here’s the trigger, borrowed from the Postgres Wiki:
CREATE EXTENSION IF NOT EXISTS hstore;

CREATE SCHEMA audit;

REVOKE ALL ON SCHEMA audit FROM public;

COMMENT ON SCHEMA audit IS 'Out-of-table audit/history logging


tables and trigger functions';

--

-- Audited data. Lots of information is available, it's just a


matter of how much

-- you really want to record. See:


--

-- http://www.postgresql.org/docs/9.1/static/functions-info.html

--

-- Remember, every column you add takes up more audit table space
and slows audit

-- inserts.

--

-- Every index you add has a big impact too, so avoid adding
indexes to the

-- audit table unless you REALLY need them. The hstore GIST indexes
are

-- particularly expensive.

--

-- It is sometimes worth copying the audit table, or a coarse


subset of it that

-- you're interested in, into a temporary table where you CREATE


any useful

-- indexes and do your analysis.

--

CREATE TABLE audit.logged_actions (

event_id bigserial primary key,

schema_name text not null,

table_name text not null,

relid oid not null,

session_user_name text,

action_tstamp_tx TIMESTAMP WITH TIME ZONE NOT NULL,

action_tstamp_stm TIMESTAMP WITH TIME ZONE NOT NULL,

action_tstamp_clk TIMESTAMP WITH TIME ZONE NOT NULL,


transaction_id bigint,

application_name text,

client_addr inet,

client_port integer,

client_query text,

action TEXT NOT NULL CHECK (action IN ('I','D','U', 'T')),

row_data hstore,

changed_fields hstore,

statement_only boolean not null

);

REVOKE ALL ON audit.logged_actions FROM public;

COMMENT ON TABLE audit.logged_actions IS 'History of auditable


actions on audited tables, from audit.if_modified_func()';

COMMENT ON COLUMN audit.logged_actions.event_id IS 'Unique


identifier for each auditable event';

COMMENT ON COLUMN audit.logged_actions.schema_name IS 'Database


schema audited table for this event is in';

COMMENT ON COLUMN audit.logged_actions.table_name IS 'Non-schema-


qualified table name of table event occured in';

COMMENT ON COLUMN audit.logged_actions.relid IS 'Table OID. Changes


with drop/create. Get with ''tablename''::regclass';

COMMENT ON COLUMN audit.logged_actions.session_user_name IS 'Login


/ session user whose statement caused the audited event';

COMMENT ON COLUMN audit.logged_actions.action_tstamp_tx IS


'Transaction start timestamp for tx in which audited event
occurred';
COMMENT ON COLUMN audit.logged_actions.action_tstamp_stm IS
'Statement start timestamp for tx in which audited event occurred';

COMMENT ON COLUMN audit.logged_actions.action_tstamp_clk IS 'Wall


clock time at which audited event''s trigger call occurred';

COMMENT ON COLUMN audit.logged_actions.transaction_id IS


'Identifier of transaction that made the change. May wrap, but
unique paired with action_tstamp_tx.';

COMMENT ON COLUMN audit.logged_actions.client_addr IS 'IP address


of client that issued query. Null for unix domain socket.';

COMMENT ON COLUMN audit.logged_actions.client_port IS 'Remote peer


IP port address of client that issued query. Undefined for unix
socket.';

COMMENT ON COLUMN audit.logged_actions.client_query IS 'Top-level


query that caused this auditable event. May be more than one
statement.';

COMMENT ON COLUMN audit.logged_actions.application_name IS


'Application name set when this audit event occurred. Can be
changed in-session by client.';

COMMENT ON COLUMN audit.logged_actions.action IS 'Action type; I =


insert, D = delete, U = update, T = truncate';

COMMENT ON COLUMN audit.logged_actions.row_data IS 'Record value.


Null for statement-level trigger. For INSERT this is the new tuple.
For DELETE and UPDATE it is the old tuple.';

COMMENT ON COLUMN audit.logged_actions.changed_fields IS 'New


values of fields changed by UPDATE. Null except for row-level
UPDATE events.';

COMMENT ON COLUMN audit.logged_actions.statement_only IS '''t'' if


audit event is from an FOR EACH STATEMENT trigger, ''f'' for FOR
EACH ROW';

CREATE INDEX logged_actions_relid_idx ON


audit.logged_actions(relid);

CREATE INDEX logged_actions_action_tstamp_tx_stm_idx ON


audit.logged_actions(action_tstamp_stm);
CREATE INDEX logged_actions_action_idx ON
audit.logged_actions(action);

CREATE OR REPLACE FUNCTION audit.if_modified_func() RETURNS TRIGGER


AS $body$

DECLARE

audit_row audit.logged_actions;

include_values boolean;

log_diffs boolean;

h_old hstore;

h_new hstore;

excluded_cols text[] = ARRAY[]::text[];

BEGIN

IF TG_WHEN <> 'AFTER' THEN

RAISE EXCEPTION 'audit.if_modified_func() may only run as


an AFTER trigger';

END IF;

audit_row = ROW(

nextval('audit.logged_actions_event_id_seq'), -- event_id

TG_TABLE_SCHEMA::text, --
schema_name

TG_TABLE_NAME::text, -- table_name

TG_RELID, -- relation
OID for much quicker searches

session_user::text, --
session_user_name

current_timestamp, --
action_tstamp_tx
statement_timestamp(), --
action_tstamp_stm

clock_timestamp(), --
action_tstamp_clk

txid_current(), --
transaction ID

current_setting('application_name'), -- client
application

inet_client_addr(), --
client_addr

inet_client_port(), --
client_port

current_query(), -- top-level
query or queries (if multistatement) from client

substring(TG_OP,1,1), -- action

NULL, NULL, -- row_data,


changed_fields

'f' --
statement_only

);

IF NOT TG_ARGV[0]::boolean IS DISTINCT FROM 'f'::boolean THEN

audit_row.client_query = NULL;

END IF;

IF TG_ARGV[1] IS NOT NULL THEN

excluded_cols = TG_ARGV[1]::text[];

END IF;
IF (TG_OP = 'UPDATE' AND TG_LEVEL = 'ROW') THEN

audit_row.row_data = hstore(OLD.*);

audit_row.changed_fields = (hstore(NEW.*) -
audit_row.row_data) - excluded_cols;

IF audit_row.changed_fields = hstore('') THEN

-- All changed fields are ignored. Skip this update.

RETURN NULL;

END IF;

ELSIF (TG_OP = 'DELETE' AND TG_LEVEL = 'ROW') THEN

audit_row.row_data = hstore(OLD.*) - excluded_cols;

ELSIF (TG_OP = 'INSERT' AND TG_LEVEL = 'ROW') THEN

audit_row.row_data = hstore(NEW.*) - excluded_cols;

ELSIF (TG_LEVEL = 'STATEMENT' AND TG_OP IN


('INSERT','UPDATE','DELETE','TRUNCATE')) THEN

audit_row.statement_only = 't';

ELSE

RAISE EXCEPTION '[audit.if_modified_func] - Trigger func


added as trigger for unhandled case: %, %',TG_OP, TG_LEVEL;

RETURN NULL;

END IF;

INSERT INTO audit.logged_actions VALUES (audit_row.*);

RETURN NULL;

END;

$body$

LANGUAGE plpgsql

SECURITY DEFINER

SET search_path = pg_catalog, public;


COMMENT ON FUNCTION audit.if_modified_func() IS $body$

Track changes to a table at the statement and/or row level.

Optional parameters to trigger in CREATE TRIGGER call:

param 0: boolean, whether to log the query text. Default 't'.

param 1: text[], columns to ignore in updates. Default [].

Updates to ignored cols are omitted from changed_fields.

Updates with only ignored cols changed are not inserted

into the audit log.

Almost all the processing work is still done for updates

that ignored. If you need to save the load, you need to


use

WHEN clause on the trigger instead.

No warning or error is issued if ignored_cols contains


columns

that do not exist in the target table. This lets you


specify

a standard set of ignored columns.


There is no parameter to disable logging of values. Add this
trigger as

a 'FOR EACH STATEMENT' rather than 'FOR EACH ROW' trigger if you do
not

want to log row values.

Note that the user name logged is the login role for the session.
The audit trigger

cannot obtain the active role because it is reset by the SECURITY


DEFINER invocation

of the audit trigger its self.

$body$;

CREATE OR REPLACE FUNCTION audit.audit_table(target_table regclass,


audit_rows boolean, audit_query_text boolean, ignored_cols text[])
RETURNS void AS $body$

DECLARE

stm_targets text = 'INSERT OR UPDATE OR DELETE OR TRUNCATE';

_q_txt text;

_ignored_cols_snip text = '';

BEGIN

EXECUTE 'DROP TRIGGER IF EXISTS audit_trigger_row ON ' ||


target_table;

EXECUTE 'DROP TRIGGER IF EXISTS audit_trigger_stm ON ' ||


target_table;

IF audit_rows THEN

IF array_length(ignored_cols,1) > 0 THEN


_ignored_cols_snip = ', ' ||
quote_literal(ignored_cols);

END IF;

_q_txt = 'CREATE TRIGGER audit_trigger_row AFTER INSERT OR


UPDATE OR DELETE ON ' ||

target_table ||

' FOR EACH ROW EXECUTE PROCEDURE


audit.if_modified_func(' ||

quote_literal(audit_query_text) ||
_ignored_cols_snip || ');';

RAISE NOTICE '%',_q_txt;

EXECUTE _q_txt;

stm_targets = 'TRUNCATE';

ELSE

END IF;

_q_txt = 'CREATE TRIGGER audit_trigger_stm AFTER ' ||


stm_targets || ' ON ' ||

target_table ||

' FOR EACH STATEMENT EXECUTE PROCEDURE


audit.if_modified_func('||

quote_literal(audit_query_text) || ');';

RAISE NOTICE '%',_q_txt;

EXECUTE _q_txt;

END;

$body$

language 'plpgsql';
COMMENT ON FUNCTION audit.audit_table(regclass, boolean, boolean,
text[]) IS $body$

Add auditing support to a table.

Arguments:

target_table: Table name, schema qualified if not on


search_path

audit_rows: Record each row change, or only audit at a


statement level

audit_query_text: Record the text of the client query that


triggered the audit event?

ignored_cols: Columns to exclude from update diffs, ignore


updates that change only ignored cols.

$body$;

-- Pg doesn't allow variadic calls with 0 params, so provide a


wrapper

CREATE OR REPLACE FUNCTION audit.audit_table(target_table regclass,


audit_rows boolean, audit_query_text boolean) RETURNS void AS
$body$

SELECT audit.audit_table($1, $2, $3, ARRAY[]::text[]);

$body$ LANGUAGE SQL;

-- And provide a convenience call wrapper for the simplest case

-- of row-level logging with no excluded cols and query logging


enabled.

--

CREATE OR REPLACE FUNCTION audit.audit_table(target_table regclass)


RETURNS void AS $$
SELECT audit.audit_table($1, BOOLEAN 't', BOOLEAN 't');

$$ LANGUAGE 'sql';

COMMENT ON FUNCTION audit.audit_table(regclass) IS $body$

Add auditing support to the given table. Row-level changes will be


logged with full client query text. No cols are ignored.

$body$;

Use the comments to share how you have handled the need to store
information about changes made to your databases.

Вам также может понравиться