Write audit_log_filter definitions¶
Audit log filters are JSON documents you pass to audit_log_filter_set_filter().
Every filter nests rules under a root filter object. For authoritative class, event, and field names that validation accepts, see Audit Log Filter definition fields.
| Benefit | Description |
|---|---|
| Smaller logs | Target only the events you need—less disk, simpler retention. |
| Lighter I/O | Fewer bytes per rotation window; less audit overhead on busy hosts. |
| Sharper security signal | Emphasize sensitive tables, account changes, and chosen DML/DDL instead of noise. |
| Faster investigations | Analysts skim fewer lines when irrelevant classes stay out of the file. |
| Compliance fit | Capture the evidence frameworks ask for without logging everything. |
| Lower resource burn | Trim CPU, memory, and disk spent on unwanted audit volume. |
Basic structure¶
A filter is a JSON document whose root is a single filter object. The filter object contains:
-
An optional global
logflag. -
An optional
idused for dynamic filter swapping. -
One or more
classrules.
Each class rule can carry a log condition and an optional event list. Each event block can carry log, abort, print, or a nested filter. Conditions inside log, abort, and print use field, variable, function, and the logical operators and, or, and not.
The following tree summarizes where each key legally nests:
filter # root object
├── log # optional boolean; global default
├── id # optional; referenced by activate / ref
└── class # one object or an array of class rules
├── name: <class> # "connection" | "general" | "table_access" | "message"
├── log # optional; boolean OR a condition
├── print # optional; field-replacement rule (redaction)
└── event # one object or an array of event rules
├── name: <subclass> # for example, "connect", "status", "update", "insert", ...
├── log # optional; boolean OR a condition
├── abort # optional; boolean OR a condition (blocks execution)
├── print # optional; field-replacement rule (redaction)
└── filter # optional; subfilter for dynamic swapping
condition := {
field : { name, value } # compare an event field
variable : { name, value } # compare a predefined server variable
function : { name, args? } # call a predefined function
and | or : [ condition, … ] # combine sub-conditions
not : condition # invert a sub-condition
}
Keep the preceding tree in mind while reading the rest of the page. Every example hangs an element off one of those nodes.
A minimal skeleton:
{
"filter": {
"class": [
{
"name": "class_type",
"event": [
{ "name": "event_subclass" }
]
}
]
}
}
Replace class_type with a real class name (connection, general, table_access, or message). Replace event_subclass with one of the subclasses. Add a log condition under the class or the event to narrow which matching events are written.
Practical example¶
The following filter logs only connection events whose user.str is admin or developer and whose host.str is 192.168.0.1:
{
"filter": {
"class": [
{
"name": "connection",
"log": {
"and": [
{ "field": { "name": "user.str", "value": ["admin", "developer"] } },
{ "field": { "name": "host.str", "value": "192.168.0.1" } }
]
}
}
]
}
}
Unpacking the shape:
-
"class"holds an array of class rules. -
"name": "connection"selects theconnectionclass. -
"log"under the class block is a condition. The class logs only the events that satisfy the condition. -
The condition is an
andover twofieldcomparisons.user.strandhost.strare fields that everyconnectionevent carries. See Audit Log Filter definition fields. Thevalueforuser.stris an array. The comparison is true when the field matches any value in the array.
Rule-level conditions like the preceding example narrow which events are logged. Those conditions do not determine which filter a session uses. Session-to-filter binding is separate. Use audit_log_filter_set_user() to create the binding, which is stored in mysql.audit_log_user. A session reaches the JSON only after the server has chosen the filter for the session.
Log all events¶
Toggle global logging with the top-level log flag:
{
"filter": { "log": true }
}
"log": true logs everything. "log": false logs nothing.
An empty filter object also logs everything:
{
"filter": { }
}
An empty filter object is equivalent to "log": true.
Behavior summary:
| Option | Details |
|---|---|
Explicit log |
Honors true / false at that level. |
No log, no class/event rules |
Defaults to on (log all). |
| Class or event rules present | Each block can carry its own log override. |
Log specific event classes¶
To limit logging to one class, set class.name, for example connection:
{
"filter": {
"class": { "name": "connection" }
}
}
{ "name": "connection" } under filter.class audits connection events: connect, disconnect, and change_user. event_mode and optional event narrowing apply.
The next example turns default logging off, then turns connection logging back on inside the class block:
{
"filter": {
"log": false,
"class": {
"log": true,
"name": "connection"
}
}
}
Log multiple classes or events¶
Log several classes as separate objects in an array, or as one array of names. The two forms are equivalent when you need no per-class options.
A list¶
Use a list when you plan to add per-class keys such as user or event later.
{
"filter": {
"class": [
{ "name": "connection" },
{ "name": "general" },
{ "name": "table_access" }
]
}
}
An array¶
Combine class names in one array when the rules stay uniform:
{
"filter": {
"class": [
{ "name": [ "connection", "general", "table_access" ] }
]
}
}
List of event and subclass options¶
Typical class and subclass pairs for authoring appear in the following table. Selection depends on audit_log_filter.event_mode. Validate exact spellings in Audit Log Filter definition fields.
| Class name | Event subclass | Details |
|---|---|---|
connection |
connect |
New sessions, success or failure. |
connection |
change_user |
CHANGE USER. |
connection |
disconnect |
Session end. |
general |
status |
Query or command completion: success or failure. |
general |
command |
Command-level general events in FULL mode. |
table_access |
read |
Reads such as SELECT and INSERT ... SELECT. |
table_access |
delete |
Deletes and truncate-style operations. |
table_access |
insert |
Inserts and REPLACE. |
table_access |
update |
Updates. |
message |
internal |
Internal audit API messages. |
message |
user |
User-emitted messages via audit_api_message_emit_udf(). |
Mix and match subclasses under event to mirror the threat model.
Inclusive filters¶
Inclusive rules list what to log. Pair classes with user, database, table, event, status, and similar fields until the stream matches the policy.
Basic structure¶
Spell out:
-
Which classes matter.
-
Which accounts or objects to watch.
-
Which subclasses or outcomes qualify.
Typical uses include compliance evidence, privileged-user monitoring, schema-change tracking, and incident response.
Tighter filters mean less noise and less I/O. Always stage-test rules before production.
Inclusive filter example¶
Administrators often watch destructive table_access work. The following skeleton logs update and delete only:
{
"filter": {
"class": [
{
"name": "table_access",
"event": [
{
"name": ["update", "delete"],
"log": {
"and": [
{ "field": { "name": "table_database.str", "value": "app_db" } },
{ "field": { "name": "table_name.str", "value": "sensitive_tbl" } }
]
}
}
]
}
]
}
}
The rule matches update and delete table_access events. The nested log condition narrows logging to events where table_database.str equals app_db and table_name.str equals sensitive_tbl. The read and insert subclasses are not named, so those events skip the rule.
-
"class"— begins the class rule block. -
"name": "table_access"— limits the rule to table-access events. Subclasses:read,insert,update, anddelete. -
"event"— selects theupdateanddeletesubclasses. Other subclasses skip the rule. -
"log"— a per-event condition.truelogs every match. Afield,and,or, ornotstructure logs only matches that satisfy the condition. -
"field"— compares an event field against a value.table_database.strandtable_name.strare fields that everytable_accessevent carries. See Audit Log Filter definition fields for the full list.
To widen or narrow the rule, change the field values, add or branches for multiple tables, or drop one field check to scope by database only or by table name only.
Log only UPDATE and DELETE on a specific table¶
To log update and delete against a single table — or a short list of tables inside one database — combine table_database.str with an or over table_name.str values:
{
"filter": {
"class": [
{
"name": "table_access",
"event": [
{
"name": ["update", "delete"],
"log": {
"and": [
{ "field": { "name": "table_database.str", "value": "app_db" } },
{
"or": [
{ "field": { "name": "table_name.str", "value": "sensitive_tbl" } },
{ "field": { "name": "table_name.str", "value": "audit_events" } }
]
}
]
}
}
]
}
]
}
}
To scope to one database only, omit the inner or and keep the table_database.str check.
table_access events do not carry a user field. Filter by account at assignment time with audit_log_filter_set_user().
Exclusive filters¶
Exclusive (or negated) rules drop noisy work. Two idioms apply:
-
Set
"log": trueat the filter level, then set"log": falseon a specific class or event to suppress only that slice. -
Use a
"not"logical operator inside alogcondition to drop matches that satisfy an expression.
Suppress one class while logging everything else¶
{
"filter": {
"log": true,
"class": { "name": "general", "log": false }
}
}
The filter logs every event except general class events. log: true at the top enables logging globally. The class-level log: false carves out one class.
Invert a field match with not¶
Wrap a condition in not inside a log item to drop the events that match the condition. Because inversion tests a field on the current event, use a field the class carries (for example, table_database.str on table_access, user.str on connection, or general_user.str on general). The following example suppresses table_access events against the internal mysql schema:
{
"filter": {
"class": [
{
"name": "table_access",
"log": {
"not": {
"field": { "name": "table_database.str", "value": "mysql" }
}
}
}
]
}
}
The filter logs table_access events except those that touch the mysql system schema. For user-based suppression, apply the not against a field that exists on the class you are filtering: user.str on connection, or general_user.str on general. Alternatively, scope the filter to specific accounts at assignment time with audit_log_filter_set_user().
Exclusive filter example¶
This filter logs everything except general events, and within connection events drops connect/disconnect subclasses (keeping only change_user):
{
"filter": {
"log": true,
"class": [
{
"name": "connection",
"event": [
{ "name": "connect", "log": false },
{ "name": "disconnect", "log": false }
]
},
{ "name": "general", "log": false }
]
}
}
-
The top-level
"log": trueturns everything on by default. -
The
connectionblock’seventlist silences the two noisy subclasses but leaveschange_useron. -
The second class entry turns off the entire
generalclass.
Field-type rules — JSON numbers against strings, connection_type symbolic constants such as "::tcp/ip", and the types accepted for each field — appear under audit_log_filter_set_filter() and in Audit Log Filter definition fields.
Advanced filter constructs¶
The preceding sections cover logging on or off at class and event granularity. The filter language also supports:
-
Per-event conditions.
-
Execution blocking.
-
References to server variables and functions.
-
Field-value replacement (redaction).
-
Dynamic filter swapping.
Validate exact field names and types against Audit Log Filter definition fields before deploying any of these features to production.
Test event field values¶
Inside an event block, a log item can carry a field comparison. The rule logs the event only when the field equals the given value.
{
"filter": {
"class": {
"name": "general",
"event": {
"name": "status",
"log": {
"field": { "name": "general_command.str", "value": "Query" }
}
}
}
}
}
The preceding example logs general/status events only when general_command.str equals Query, which drops Execute, Quit, and Change user. String fields take string values. Integer fields such as status on connection or general_error_code on general take JSON numbers.
Fields available on each class are listed in Audit Log Filter definition fields. Examples:
-
connection:status,user.str,host.str,ip.str,database.str,connection_type -
general:general_error_code,general_user.str,general_command.str,general_query.str,general_sql_command.str,general_host.str,general_ip.str -
table_access:query.str,table_database.str,table_name.str
Combine conditions with logical operators¶
and, or, and not let you build compound conditions. They take an array (for and / or) or a single sub-condition (for not) and can be nested arbitrarily.
{
"filter": {
"class": {
"name": "general",
"event": {
"name": "status",
"log": {
"or": [
{
"and": [
{ "field": { "name": "general_command.str", "value": "Query" } },
{ "field": { "name": "general_command.length", "value": 5 } }
]
},
{
"and": [
{ "field": { "name": "general_command.str", "value": "Execute" } },
{ "field": { "name": "general_command.length", "value": 7 } }
]
}
]
}
}
}
}
}
The filter logs general/status events where general_command is either Query (length 5) or Execute (length 7).
Use not to invert any sub-expression. For example, { "not": { "field": { "name": "user.str", "value": "healthcheck" } } } matches every account except healthcheck on a class that carries user.str.
Block execution with abort¶
An event block can carry an abort item. The abort item prevents matching statements from executing, either instead of logging or in addition to logging. Blocking is a policy-enforcement capability, not observability, so blocking has a dedicated page: Block statements with an audit log filter.
Reference predefined variables¶
A log or abort condition can test a predefined variable with a variable item. The condition is true when the variable equals the given value.
{
"filter": {
"class": {
"name": "general",
"event": {
"name": "status",
"log": {
"variable": {
"name": "audit_log_connection_policy_value",
"value": "::none"
}
}
}
}
}
}
Predefined variables mirror the legacy-mode audit_log_*_policy system variables. Operators can re-tune an active filter by changing a server variable instead of rewriting the JSON:
-
audit_log_connection_policy_value—0or"::none",1or"::errors",2or"::all". -
audit_log_policy_value—0or"::none",1or"::logins",2or"::all",3or"::queries". -
audit_log_statement_policy_value—0or"::none",1or"::errors",2or"::all".
Symbolic constants such as "::none" and "::all" are case-sensitive strings. The symbolic constants are interchangeable with the numeric form.
Reference predefined functions¶
Use a function item to call a built-in function inside a log or abort condition. The name key holds the function name without parentheses. The args key holds an array of arguments. Omit args when the function takes none.
{
"filter": {
"class": {
"name": "general",
"event": {
"name": "status",
"log": {
"function": {
"name": "find_in_include_list",
"args": [ { "string": [ { "field": "user.str" },
{ "string": "@" },
{ "field": "host.str" } ] } ]
}
}
}
}
}
}
The preceding example logs general/status events only when the current account, built by concatenating user.str, @, and host.str, exists in audit_log_include_accounts.
Available functions:
-
audit_log_exclude_accounts_is_null()— returns true whenaudit_log_exclude_accountsisNULL. Takes no arguments. -
audit_log_include_accounts_is_null()— returns true whenaudit_log_include_accountsisNULL. Takes no arguments. -
find_in_exclude_list(account)— returns true whenaccountappears inaudit_log_exclude_accounts. -
find_in_include_list(account)— returns true whenaccountappears inaudit_log_include_accounts. -
query_digest([str])— with no argument, returns the current event’s statement digest and is usable inreplace. With an argument, returns a Boolean that compares the argument to the current digest. -
string_find(text, substr)— returns true whensubstris contained intext. Case-sensitive. -
debug_sleep(millisec)— sleeps the given number of milliseconds. Debug builds only. Used for performance measurement.
Replace event field values (redaction)¶
A print / replace item inside a class or event block rewrites statement text (general_query.str and query.str) as a query_digest before the event is logged. The rewrite keeps literal values out of the audit stream. The capability is compliance- and PII-focused. See the dedicated page: Redact audit log fields.
Replace a filter dynamically¶
A filter can swap itself for a different rule set mid-session. Nest a filter block inside an event and give the outer filter an id. Use activate to trigger the swap. Use ref to point back at the original filter.
{
"filter": {
"id": "main",
"class": {
"name": "table_access",
"event": {
"name": ["update", "delete"],
"log": false,
"filter": {
"class": {
"name": "general",
"event": { "name": "status",
"filter": { "ref": "main" } }
},
"activate": {
"or": [
{ "field": { "name": "table_name.str", "value": "temp_1" } },
{ "field": { "name": "table_name.str", "value": "temp_2" } }
]
}
}
}
}
}
}
How the filter behaves:
-
mainwaits fortable_accessupdateordeleteevents.log: falsemeans those events are not logged directly. -
When one of those events touches
temp_1ortemp_2, the inner filter activates. -
The inner filter waits for the next
general/statusevent, typically at end of statement, and logs the event. The nestedref: mainthen restores the outer filter.
Net effect: you log one general/status entry per statement that touched temp_1 or temp_2, instead of many table_access rows. A single UPDATE temp_1, temp_3 SET ... emits one log entry, not one per row touched.
activate is valid only inside a subfilter. Using activate on the top-level filter raises an error. id values are scoped to the filter definition only. id values are unrelated to the audit_log_filter_id system variable.
Best practices¶
-
Start wide, then narrow. Begin with a noisy catch-all in staging, then peel away classes you do not need.
-
Test combinations. Overlapping rules and assignments surprise operators. Validate on a clone.
-
Plan retention. Pair filters with rotation, pruning, and disk budgets. See Manage the Audit Log Filter files.
-
Watch overhead. Granular auditing costs CPU and I/O. Ramp detail gradually and watch latency plus
audit_log_filter_*status counters.
Implement the filter¶
Typical workflow:
Create a filter¶
Call audit_log_filter_set_filter(filter_name, json_definition):
SELECT audit_log_filter_set_filter('log_all', '{ "filter": { "log": true } }');
Assign filter to users¶
Bind accounts (or the default % row) with audit_log_filter_set_user('user@host', 'filter_name'):
SELECT audit_log_filter_set_user('%', 'log_all');
Example: Financial tracking filter¶
Create and assign a finance-focused filter. The filter logs DML on two tables in financial_db and every connection event. Account scoping applies at assignment time, because table_access events do not carry a user field.
-- Create the filter
SELECT audit_log_filter_set_filter('financial_tracking', '{
"filter": {
"class": [
{
"name": "table_access",
"event": [
{
"name": ["insert", "update", "delete"],
"log": {
"and": [
{ "field": { "name": "table_database.str", "value": "financial_db" } },
{
"or": [
{ "field": { "name": "table_name.str", "value": "accounts" } },
{ "field": { "name": "table_name.str", "value": "transactions" } }
]
}
]
}
}
]
},
{
"name": "connection",
"event": [
{ "name": "connect" },
{ "name": "disconnect" }
]
}
]
}
}');
Field-value typing appears under audit_log_filter_set_filter(). Examples include JSON numbers for integer fields such as status, strings for *.str fields, and "::tcp/ip"-style symbolic constants for connection_type.
Assign the filter to only the accounts that should be audited instead of to %:
-- Assign to specific accounts; other users keep their existing filter (or none).
SELECT audit_log_filter_set_user('admin@%', 'financial_tracking');
SELECT audit_log_filter_set_user('finance_team@%', 'financial_tracking');
The filter records:
-
insert,update, anddeleteonfinancial_db.accountsandfinancial_db.transactionsfor the two assigned accounts. -
connectanddisconnectevents for the same accounts. -
Nothing for other users, because those users are not bound to the filter. Nothing outside the declared schema and tables unless you extend the JSON.
Inspect metadata directly:
-- Check created filters
SELECT * FROM mysql.audit_log_filter;
-- Check user assignments
SELECT * FROM mysql.audit_log_user;
Tail the audit file (default under the data directory) to confirm events stream as expected.