Information
Enable audit_log_enabled on MySQL flexible servers.
Rationale:
Enabling audit_log_enabled helps MySQL Database to log items such as connection attempts to the server, DDL/DML access, and more. Log data can be used to identify, troubleshoot, and repair configuration errors and suboptimal performance.
Impact:
There are further costs incurred for storage of logs. For high traffic databases these logs will be significant. Determine your organization's needs before enabling.
Solution
Remediate from Azure Portal
Part 1 - Turn on audit logs
Login to Azure Portal using https://portal.azure.com.
Go to Azure Database for MySQL flexible servers.
For each database, under Settings, click Server parameters.
Set audit_log_enabled to ON.
Click Save.
Part 2 - Capture audit logs (diagnostic settings is for example only, send these logs to the appropriate data sink for your logging needs)
Under Monitoring, select Diagnostic settings.
Select + Add diagnostic setting.
Provide a diagnostic setting name.
Under Categories, select MySQL Audit Logs.
Specify destination details.
Click Save.
It may take up to 10 minutes for the logs to appear in the configured destination.
Remediate from Azure CLI
Use the below command to enable audit_log_enabled :
az mysql flexible-server parameter set --resource-group <resourceGroup> --server-name <serverName> --name audit_log_enabled --value on
Remediate from PowerShell
Use the below command to enable audit_log_enabled :
Update-AzMySqlFlexibleServerConfiguration -ResourceGroupName <resourceGroup> -ServerName <serverName> -Name audit_log_enabled -Value on
Default Value:
audit_log_enabled is set to OFF by default