turbot/azure_compliance

Query: mysql_server_audit_logging_enabled

Usage

powerpipe query azure_compliance.query.mysql_server_audit_logging_enabled

SQL

select
s.id as resource,
case
when lower(config -> 'ConfigurationProperties' ->> 'value') != 'on' then 'alarm'
else 'ok'
end as status,
case
when lower(config -> 'ConfigurationProperties' ->> 'value') != 'on' then s.name || ' server parameter audit_log_enabled off.'
else s.name || ' server parameter audit_log_enabled on.'
end as reason,
s.resource_group as resource_group,
sub.display_name as subscription
from
azure_mysql_server as s,
jsonb_array_elements(server_configurations) config,
azure_subscription sub
where
config ->> 'Name' = 'audit_log_enabled'
and sub.subscription_id = s.subscription_id;

Controls

The query is being used by the following controls: