DataSunrise Achieves AWS DevOps Competency Status in AWS DevSecOps and Monitoring, Logging, Performance

ScyllaDB Audit Log

Introduction

Database Audit Logs has become a critical concern for organizations handling sensitive data. As cyber threats evolve, implementing robust security measures is essential to protect valuable information from breaches and unauthorized access. High-performance NoSQL databases, such as ScyllaDB, are widely used for their scalability and efficiency, but securing them requires additional tools and configurations. Ensuring proper database security involves strategies like encryption, access controls, and comprehensive audit logging. With increasing regulatory requirements and growing concerns about data security, maintaining thorough audit trails has become essential for compliance and risk management.

Native ScyllaDB Audit Log

ScyllaDB Enterprise Edition provides built-in audit logging functionality that can be configured through the scylla.yaml configuration file. The audit log system captures various database activities, including authentication attempts, data modifications, and schema changes.

To enable native audit logging in ScyllaDB, modify the scylla.yaml file:

audit: "table"
audit_categories: "DCL,DDL,AUTH,ADMIN"
audit_keyspaces: "my_keyspace"
audit_tables: "my_keyspace.sensitive_table"

The audit logs can be stored either in a dedicated ScyllaDB table or sent to Syslog. When using table storage, the audit records are stored in a structure similar to:

CREATE TABLE audit.audit_log (
    date timestamp,
    node inet,
    event_time timeuuid,
    category text,
    consistency text,
    table_name text,
    keyspace_name text,
    operation text,
    source inet,
    username text,
    error boolean,
    PRIMARY KEY ((date, node), event_time)
);

Example audit log query output:

datenodecategoryoperationusername
2024-02-18 10:15:22+0010.0.1.100DDLCREATE TABLE usersadmin
2024-02-18 10:16:45+0010.0.1.100AUTHLOGINanalyst
2024-02-18 10:17:30+0010.0.1.101DMLINSERT INTO usersapp_user

ScyllaDB Audit Log with DataSunrise

While ScyllaDB’s native audit capabilities are useful, DataSunrise provides enhanced audit logging features specifically designed for enterprise environments. DataSunrise’s ScyllaDB audit log functionality offers real-time monitoring, advanced filtering, and comprehensive reporting capabilities.

ScyllaDB audit Transactional Trails interface showing detailed transaction history

DataSunrise implements a proxy-based architecture that captures all database interactions, ensuring complete visibility of database operations. Its built-in performance anaylitcs tool can help gain useful insights about your database environment.

Real-time ScyllaDB audit log analysis with security event
tracking

ScyllaDB Audit Log Best Practices

Designing an effective audit logging strategy for ScyllaDB requires a strategic approach that balances comprehensive monitoring with performance considerations. Here are key best practices to maximize your audit log’s value while minimizing potential overhead:

1. Selective Auditing

Don’t log everything indiscriminately. Use audit_categories judiciously, focusing on critical events like authentication (AUTH), data definition changes (DDL), and administrative operations (ADMIN). This targeted approach reduces performance impact and storage requirements.

2. Granular Keyspace and Table Configuration

Leverage ScyllaDB’s fine-grained auditing by specifying exact audit_keyspaces and audit_tables. Concentrate on sensitive tables containing personally identifiable information (PII) or critical business data.

3. Performance Monitoring

Regularly review the performance implications of audit logging. ScyllaDB Enterprise allows extensive auditing, but excessive logging can introduce latency. Use DataSunrise’s performance monitoring tools to balance security insights with system efficiency.

4. Secure Log Storage

Whether using Syslog or ScyllaDB’s internal audit table, ensure your logs are stored securely. Implement encryption and strict access controls to prevent unauthorized log access or tampering.

5. Regular Log Review

Establish a routine for reviewing audit logs. Look for unusual patterns, unauthorized access attempts, and potential security anomalies. Automated alerts can help quickly identify and respond to suspicious activities.

By implementing these practices, you’ll create a robust audit logging strategy that enhances your ScyllaDB’s security posture without compromising performance.

Conclusion

Implementing robust ScyllaDB audit log mechanisms is crucial for maintaining database security and compliance. While ScyllaDB’s native auditing provides basic functionality, DataSunrise offers comprehensive audit logging capabilities that meet enterprise-level requirements.

To experience the full potential of DataSunrise’s ScyllaDB Audit Log features, you can schedule a personalized demo or download the trial version today.

Next

ScyllaDB Auditing Tools

Learn More

Need Our Support Team Help?

Our experts will be glad to answer your questions.

Countryx
United States
United Kingdom
France
Germany
Australia
Afghanistan
Islands
Albania
Algeria
American Samoa
Andorra
Angola
Anguilla
Antarctica
Antigua and Barbuda
Argentina
Armenia
Aruba
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belgium
Belize
Benin
Bermuda
Bhutan
Bolivia
Bosnia and Herzegovina
Botswana
Bouvet
Brazil
British Indian Ocean Territory
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cambodia
Cameroon
Canada
Cape Verde
Cayman Islands
Central African Republic
Chad
Chile
China
Christmas Island
Cocos (Keeling) Islands
Colombia
Comoros
Congo, Republic of the
Congo, The Democratic Republic of the
Cook Islands
Costa Rica
Cote D'Ivoire
Croatia
Cuba
Cyprus
Czech Republic
Denmark
Djibouti
Dominica
Dominican Republic
Ecuador
Egypt
El Salvador
Equatorial Guinea
Eritrea
Estonia
Ethiopia
Falkland Islands (Malvinas)
Faroe Islands
Fiji
Finland
French Guiana
French Polynesia
French Southern Territories
Gabon
Gambia
Georgia
Ghana
Gibraltar
Greece
Greenland
Grenada
Guadeloupe
Guam
Guatemala
Guernsey
Guinea
Guinea-Bissau
Guyana
Haiti
Heard Island and Mcdonald Islands
Holy See (Vatican City State)
Honduras
Hong Kong
Hungary
Iceland
India
Indonesia
Iran, Islamic Republic Of
Iraq
Ireland
Isle of Man
Israel
Italy
Jamaica
Japan
Jersey
Jordan
Kazakhstan
Kenya
Kiribati
Korea, Democratic People's Republic of
Korea, Republic of
Kuwait
Kyrgyzstan
Lao People's Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Libyan Arab Jamahiriya
Liechtenstein
Lithuania
Luxembourg
Macao
Madagascar
Malawi
Malaysia
Maldives
Mali
Malta
Marshall Islands
Martinique
Mauritania
Mauritius
Mayotte
Mexico
Micronesia, Federated States of
Moldova, Republic of
Monaco
Mongolia
Montserrat
Morocco
Mozambique
Myanmar
Namibia
Nauru
Nepal
Netherlands
Netherlands Antilles
New Caledonia
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norfolk Island
North Macedonia, Republic of
Northern Mariana Islands
Norway
Oman
Pakistan
Palau
Palestinian Territory, Occupied
Panama
Papua New Guinea
Paraguay
Peru
Philippines
Pitcairn
Poland
Portugal
Puerto Rico
Qatar
Reunion
Romania
Russian Federation
Rwanda
Saint Helena
Saint Kitts and Nevis
Saint Lucia
Saint Pierre and Miquelon
Saint Vincent and the Grenadines
Samoa
San Marino
Sao Tome and Principe
Saudi Arabia
Senegal
Serbia and Montenegro
Seychelles
Sierra Leone
Singapore
Slovakia
Slovenia
Solomon Islands
Somalia
South Africa
South Georgia and the South Sandwich Islands
Spain
Sri Lanka
Sudan
Suriname
Svalbard and Jan Mayen
Swaziland
Sweden
Switzerland
Syrian Arab Republic
Taiwan, Province of China
Tajikistan
Tanzania, United Republic of
Thailand
Timor-Leste
Togo
Tokelau
Tonga
Trinidad and Tobago
Tunisia
Turkey
Turkmenistan
Turks and Caicos Islands
Tuvalu
Uganda
Ukraine
United Arab Emirates
United States Minor Outlying Islands
Uruguay
Uzbekistan
Vanuatu
Venezuela
Viet Nam
Virgin Islands, British
Virgin Islands, U.S.
Wallis and Futuna
Western Sahara
Yemen
Zambia
Zimbabwe
Choose a topicx
General Information
Sales
Customer Service and Technical Support
Partnership and Alliance Inquiries
General information:
info@datasunrise.com
Customer Service and Technical Support:
support.datasunrise.com
Partnership and Alliance Inquiries:
partner@datasunrise.com