Security Audit

1. Introduction

Audit logs serve as the record credentials of a database, enabling tracking of various operations (e.g., create, read, update, delete) to ensure information security. The audit log feature in IoTDB supports the following capabilities:

  • Supports enabling/disabling the audit log functionality through configuration
  • Supports configuring operation types and privilege levels to be recorded via parameters
  • Supports setting the storage duration of audit log files, including time-based rolling (via TTL) and space-based rolling (via SpaceTL)
  • Supports configuring parameters to count slow requests (with write/query latency exceeding a threshold, default 3000 milliseconds) within any specified time period
  • Audit log files are stored in encrypted format by default

Note: This feature is available from version V2.0.8 onwards.

2. Configuration Parameters

Edit the iotdb-system.properties file to enable audit logging using the following parameters:

  • V2.0.8.1
Parameter NameDescriptionData TypeDefault ValueActivation Method
enable_audit_logWhether to enable audit logging. true: enabled. false: disabled.BooleanfalseHot Reload
auditable_operation_typeOperation type selection. DML: all DML operations are logged; DDL: all DDL operations are logged; QUERY: all query operations are logged; CONTROL: all control statements are logged.StringDML,DDL,QUERY,CONTROLHot Reload
auditable_operation_levelPermission level selection. global: log all audit events; object: only log events related to data instances. Containment relationship: object < global. For example: when set to global, all audit logs are recorded normally; when set to object, only operations on specific data instances are recorded.StringglobalHot Reload
auditable_operation_resultAudit result selection. success: log only successful events; fail: log only failed eventsStringsuccess,failHot Reload
audit_log_ttl_in_daysAudit log TTL (Time To Live). Logs older than this threshold will expire.Double-1.0 (never deleted)Hot Reload
audit_log_space_tl_in_GBAudit log SpaceTL. Logs will start rotating when total space reaches this threshold.Double1.0Hot Reload
audit_log_batch_interval_in_msBatch write interval for audit logsLong1000Hot Reload
audit_log_batch_max_queue_bytesMaximum byte size of the queue for batch processing audit logs. Subsequent write operations will be blocked when this threshold is exceeded.Long268435456Hot Reload
  • V2.0.8.2
Parameter NameDescriptionData TypeDefault ValueActivation Method
enable_audit_logWhether to enable audit logging. true: enabled. false: disabled.BooleanfalseHot Reload
auditable_operation_typeOperation type selection. DML: all DML operations are logged; DDL: all DDL operations are logged; QUERY: all query operations are logged; CONTROL: all control statements are logged.StringDML,DDL,QUERY,CONTROLHot Reload
auditable_dml_event_typeEvent types for auditing DML operations. OBJECT_AUTHENTICATION: object authentication, SLOW_OPERATION: slow operationStringOBJECT_AUTHENTICATION,SLOW_OPERATIONHot Reload
auditable_ddl_event_typeEvent types for auditing DDL operations. OBJECT_AUTHENTICATION: object authentication, SLOW_OPERATION: slow operationStringOBJECT_AUTHENTICATION,SLOW_OPERATIONHot Reload
auditable_query_event_typeEvent types for auditing query operations. OBJECT_AUTHENTICATION: object authentication, SLOW_OPERATION: slow operationStringOBJECT_AUTHENTICATION,SLOW_OPERATIONHot Reload
auditable_control_event_typeEvent types for auditing control operations. CHANGE_AUDIT_OPTION: audit option change, OBJECT_AUTHENTICATION: object authentication, LOGIN: login, LOGOUT: logout, DN_SHUTDOWN: data node shutdown, SLOW_OPERATION: slow operationStringCHANGE_AUDIT_OPTION,OBJECT_AUTHENTICATION,LOGIN,LOGOUT,DN_SHUTDOWN,SLOW_OPERATIONHot Reload
auditable_operation_levelPermission level selection. global: log all audit events; object: only log events related to data instances. Containment relationship: object < global. For example: when set to global, all audit logs are recorded normally; when set to object, only operations on specific data instances are recorded.StringglobalHot Reload
auditable_operation_resultAudit result selection. success: log only successful events; fail: log only failed eventsStringsuccess,failHot Reload
audit_log_ttl_in_daysAudit log TTL (Time To Live). Logs older than this threshold will expire.Double-1.0 (never deleted)Hot Reload
audit_log_space_tl_in_GBAudit log SpaceTL. Logs will start rotating when total space reaches this threshold.Double1.0Hot Reload
audit_log_batch_interval_in_msBatch write interval for audit logsLong1000Hot Reload
audit_log_batch_max_queue_bytesMaximum byte size of the queue for batch processing audit logs. Subsequent write operations will be blocked when this threshold is exceeded.Long268435456Hot Reload

Instructions for Object Authentication and Slow Operations:

  • When the parameters auditable_dml_event_type, auditable_ddl_event_type, auditable_query_event_type, or auditable_control_event_type are set to OBJECT_AUTHENTICATION, the corresponding event types will be recorded in the audit log.
  • When the parameters auditable_dml_event_type, auditable_ddl_event_type, auditable_query_event_type, or auditable_control_event_type are set to SLOW_OPERATION, only the corresponding event types whose execution time exceeds the value of the slow_query_threshold parameter (default: 3000 ms) will be recorded in the audit log. The value of the slow_query_threshold parameter can be configured in the iotdb-system.properties file.

3. Access Methods

Supports direct reading of audit logs via SQL.

3.1 SQL Syntax

SELECT (<audit_log_field>, )* log FROM <AUDIT_LOG_PATH> WHERE whereclause ORDER BY order_expression
  • AUDIT_LOG_PATH: Audit log storage location root.__audit.log.<node_id>.<user_id>
  • audit_log_field: Query fields refer to the metadata structure below
  • Supports WHERE clause filtering and ORDER BY sorting

3.2 Metadata Structure

FieldDescriptionData Type
timeThe date and time when the event startedtimestamp
usernameUser namestring
cli_hostnameClient hostname identifierstring
audit_event_typeAudit event type, e.g., WRITE_DATA, GENERATE_KEYstring
operation_typeOperation type, e.g., DML, DDL, QUERY, CONTROLstring
privilege_typePrivilege used, e.g., WRITE_DATA, MANAGE_USERstring
privilege_levelEvent privilege level, global or objectstring
resultEvent result, success=1, fail=0boolean
databaseDatabase namestring
sql_stringUser's original SQL statementstring
logDetailed event descriptionstring

3.3 Usage Examples

  • Query times, usernames and host information for successfully executed queries:
IoTDB> select username,cli_hostname from root.__audit.log.** where operation_type='QUERY' and result=true align by device
+-----------------------------+---------------------------+--------+------------+
|                         Time|                     Device|username|cli_hostname|
+-----------------------------+---------------------------+--------+------------+
|2026-01-23T10:39:21.563+08:00|root.__audit.log.node_1.u_0|    root|   127.0.0.1|
|2026-01-23T10:39:33.746+08:00|root.__audit.log.node_1.u_0|    root|   127.0.0.1|
|2026-01-23T10:42:15.032+08:00|root.__audit.log.node_1.u_0|    root|   127.0.0.1|
+-----------------------------+---------------------------+--------+------------+
Total line number = 3
It costs 0.036s
  • Query latest operation details:
IoTDB> select username,cli_hostname,operation_type,sql_string  from root.__audit.log.** order by time desc limit 1 align by device
+-----------------------------+---------------------------+--------+------------+--------------+------------------------------------------------------------------------------------------------------------------+
|                         Time|                     Device|username|cli_hostname|operation_type|                                                                                                        sql_string|
+-----------------------------+---------------------------+--------+------------+--------------+------------------------------------------------------------------------------------------------------------------+
|2026-01-23T10:42:32.795+08:00|root.__audit.log.node_1.u_0|    root|   127.0.0.1|         QUERY|select username,cli_hostname from root.__audit.log.** where operation_type='QUERY' and result=true align by device|
+-----------------------------+---------------------------+--------+------------+--------------+------------------------------------------------------------------------------------------------------------------+
Total line number = 1
It costs 0.033s
  • Query failed operations:
IoTDB> select database,operation_type,log  from root.__audit.log.** where result=false align by device
+-----------------------------+-------------------------------+-----------+--------------+---------------------------------------------------------------------------------+
|                         Time|                         Device|   database|operation_type|                                                                              log|
+-----------------------------+-------------------------------+-----------+--------------+---------------------------------------------------------------------------------+
|2026-01-23T10:49:55.159+08:00|root.__audit.log.node_1.u_10000|           |       CONTROL|        User user1 (ID=10000) login failed with code: 801, Authentication failed.|
|2026-01-23T10:52:04.579+08:00|root.__audit.log.node_1.u_10000|  [root.**]|         QUERY|   User user1 (ID=10000) requests authority on object [root.**] with result false|
|2026-01-23T10:52:43.412+08:00|root.__audit.log.node_1.u_10000|root.userdb|           DDL| User user1 (ID=10000) requests authority on object root.userdb with result false|
|2026-01-23T10:52:48.075+08:00|root.__audit.log.node_1.u_10000|       null|         QUERY|User user1 (ID=10000) requests authority on object root.__audit with result false|
+-----------------------------+-------------------------------+-----------+--------------+---------------------------------------------------------------------------------+
Total line number = 4
It costs 0.024s
  • Query audit records for user ‘u_0’ on node ‘node_1’ with event types ‘SLOW_OPERATION’ and ‘LOGIN’
IoTDB> select * from root.__audit.log.node_1.u_0 where audit_event_type='SLOW_OPERATION' or audit_event_type='LOGIN' limit 1 align by device 
+-----------------------------+---------------------------+------+---------------+--------------+--------+--------------+-----------------------------------------------------------------------------------------------+----------+----------------+------------+--------+
|                         Time|                     Device|result|privilege_level|privilege_type|database|operation_type|                                                                                            log|sql_string|audit_event_type|cli_hostname|username|
+-----------------------------+---------------------------+------+---------------+--------------+--------+--------------+-----------------------------------------------------------------------------------------------+----------+----------------+------------+--------+
|2026-01-23T11:42:23.636+08:00|root.__audit.log.node_1.u_0|  true|         GLOBAL|          null|        |       CONTROL|IoTDB: Login status: Login successfully. User root (ID=0), opens Session-1-root:127.0.0.1:51308|          |           LOGIN|   127.0.0.1|    root|
+-----------------------------+---------------------------+------+---------------+--------------+--------+--------------+-----------------------------------------------------------------------------------------------+----------+----------------+------------+--------+
Total line number = 1
It costs 0.021s