Control: 4.4.4 Ensure server parameter 'audit_log_events' has 'CONNECTION' set for MySQL Database Server
Description
Set audit_log_enabled to include CONNECTION on MySQL Servers.
Enabling CONNECTION helps MySQL Database to log items such as successful and failed connection attempts to the server. Log data can be used to identify, troubleshoot, and repair configuration errors and suboptimal performance.
Remediation
From Azure Portal
- From Azure Home select the Portal Menu.
 - Select 
Azure Database for MySQL servers. - Select a database.
 - Under 
Settings, selectServer parameters. - Update 
audit_log_enabledparameter toON. - Update 
audit_log_eventsparameter to have at leastCONNECTIONchecked. - Click 
Save. - Under 
Monitoring, selectDiagnostic settings. - Select 
+ Add diagnostic setting. - Provide a diagnostic setting name.
 - Under 
Categories, selectMySQL Audit Logs. - Specify destination details.
 - Click 
Save. 
It may take up to 10 minutes for the logs to appear in the configured destination.
Default Value
By default audit_log_events is disabled.
Usage
Run the control in your terminal:
powerpipe control run azure_compliance.control.cis_v210_4_4_4Snapshot and share results via Turbot Pipes:
powerpipe loginpowerpipe control run azure_compliance.control.cis_v210_4_4_4 --shareSQL
This control uses a named query:
select  s.id as resource,  case    when lower(config -> 'ConfigurationProperties' ->> 'value') = 'connection' then 'ok'    else 'alarm'  end as status,  case    when lower(config -> 'ConfigurationProperties' ->> 'value') = 'connection' then s.name || ' server parameter audit_log_events has connection set.'    else s.name || ' server parameter audit_log_events connection not set.'  end as reason    , s.resource_group as resource_group  , sub.display_name as subscriptionfrom  azure_mysql_server as s  cross join lateral jsonb_array_elements(server_configurations) config  left join azure_subscription as sub on sub.subscription_id = s.subscription_idwhere  config ->> 'Name' = 'audit_log_events';