主权项 |
1. A computer-implemented method, comprising:
accessing, by one or more computers comprising one or more processors, a shadow audit configuration file comprising a list of one or more main data tables that need to be audited; engaging, by one or more computers, a shadow audit module; generating, by the one or more computers running the shadow audit module, audit code; running, by the one or more computers running the shadow audit module, the generated audit code against a main data table to create a corresponding shadow audit data table; running, by the one or more computers running the shadow audit module, the generated audit code to create one or more audit triggers, wherein the one or more audit triggers are placed in the main data table and are configured to run when a data modification is made to the main data table; and replicating, by the one or more computers running the shadow audit module, the data modification in the shadow audit data table. |