O'Reilly logo

Teradata Database Administration – Teradata Internals by Tom Coffing, Todd Wilson

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 11 – Access Logging

“When you go into court, you are putting your fate into the hands of twelve people who weren’t smart enough to get out of jury duty.”

- Norm Crosby

 

Access Logging

Access Logging allows monitoring of data access requests in the system and log granted and/or denied requests.

This is how you find out who is logging into Teradata and who has tried and failed.

This is how you track who is trying to access certain tables and information and who has been denied.

When you track someone or everyone, the Access Logs are written to before the query runs so this does slow down queries.

The DBA is first given permission to utilize Access Logging, and then they have to perform a BEGIN LOGGING statement for any action to be ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required