Rechercher dans le manuel MySQL
6.5.5.8 Audit Log Reference
The following discussion serves as a reference to MySQL Enterprise Audit components:
To install the audit log tables and functions, use the
instructions provided in
Section 6.5.5.2, “Installing or Uninstalling MySQL Enterprise Audit”. Unless those
components are installed, the audit_log
plugin operates in legacy mode. See
Section 6.5.5.7, “Legacy Mode Audit Log Filtering”.
6.5.5.8.1 Audit Log Tables
MySQL Enterprise Audit uses tables in the mysql
system
database for persistent storage of filter and user account
data. The tables can be accessed only by users with privileges
for that database. The tables use the
InnoDB
storage engine.
If these tables are missing, the audit_log
plugin operates in legacy mode. See
Section 6.5.5.7, “Legacy Mode Audit Log Filtering”.
The audit_log_filter
table stores filter
definitions. The table has these columns:
NAME
The filter name.
FILTER
The filter definition associated with the filter name. Definitions are stored as
JSON
values.
The audit_log_user
table stores user
account information. The table has these columns:
USER
The user name part of an account. For an account
user1@localhost
, theUSER
part isuser1
.HOST
The host name part of an account. For an account
user1@localhost
, theHOST
part islocalhost
.FILTERNAME
The name of the filter assigned to the account. The filter name associates the account with a filter defined in the
audit_log_filter
table.
This section describes, for each audit log user-defined function (UDF), its purpose, calling sequence, and return value. For information about the conditions under which these UDFs can be invoked, see Section 6.5.5.6, “Audit Log Filtering”.
Each audit log UDF returns a string that indicates whether the
operation succeeded. OK
indicates success.
ERROR:
indicates failure.
message
These audit log UDFs are available:
audit_log_encryption_password_get()
Retrieves the current audit log encryption password as a binary string. The password is fetched from the MySQL keyring, which must be enabled or an error occurs. Any keyring plugin can be used; for instructions, see Section 6.5.4, “The MySQL Keyring”.
For additional information about audit log encryption, see Audit Log File Encryption.
Arguments:
None.
Return value:
The password string for success (up to 766 bytes), or
NULL
and an error for failure.Example:
- +-------------------------------------+
- | audit_log_encryption_password_get() |
- +-------------------------------------+
- | secret |
- +-------------------------------------+
audit_log_encryption_password_set(
password
)Sets the audit log encryption password and stores it in the MySQL keyring, which must be enabled or an error occurs. Any keyring plugin can be used; for instructions, see Section 6.5.4, “The MySQL Keyring”.
For additional information about audit log encryption, see Audit Log File Encryption.
Arguments:
password
: The password string. The maximum permitted length is 766 bytes.Return value:
1 for success, 0 for failure.
Example:
Calling any of the other filtering UDFs affects operational audit log filtering immediately and updates the audit log tables. If instead you modify the contents of those tables directly using statements such as
INSERT
,UPDATE
, andDELETE
, the changes do not affect filtering immediately. To flush your changes and make them operational, callaudit_log_filter_flush()
.audit_log_filter_flush()
affects all current sessions and detaches them from their previous filters. Current sessions are no longer logged unless they disconnect and reconnect, or execute a change-user operation.If this function fails, an error message is returned and the audit log is disabled until the next successful call to
audit_log_filter_flush()
.Arguments:
None.
Return value:
A string that indicates whether the operation succeeded.
OK
indicates success.ERROR:
indicates failure.message
Example:
- +--------------------------+
- | audit_log_filter_flush() |
- +--------------------------+
- | OK |
- +--------------------------+
audit_log_filter_remove_filter(
filter_name
)Given a filter name, removes the filter from the current set of filters. It is not an error for the filter not to exist.
If a removed filter is assigned to any user accounts, those users stop being filtered (they are removed from the
audit_log_user
table). Termination of filtering includes any current sessions for those users: They are detached from the filter and no longer logged.Arguments:
filter_name
: A string that specifies the filter name.
Return value:
A string that indicates whether the operation succeeded.
OK
indicates success.ERROR:
indicates failure.message
Example:
- +----------------------------------------------+
- | audit_log_filter_remove_filter('SomeFilter') |
- +----------------------------------------------+
- | OK |
- +----------------------------------------------+
audit_log_filter_remove_user(
user_name
)Given a user account name, cause the user to be no longer assigned to a filter. It is not an error if the user has no filter assigned. Filtering of current sessions for the user remains unaffected. New connections for the user are filtered using the default account filter if there is one, and are not logged otherwise.
If the name is
%
, the function removes the default account filter that is used for any user account that has no explicitly assigned filter.Arguments:
user_name
: The user account name as a string in
format, oruser_name
@host_name
%
to represent the default account.
Return value:
A string that indicates whether the operation succeeded.
OK
indicates success.ERROR:
indicates failure.message
Example:
- +-------------------------------------------------+
- | audit_log_filter_remove_user('user1@localhost') |
- +-------------------------------------------------+
- | OK |
- +-------------------------------------------------+
audit_log_filter_set_filter(
filter_name
,definition
)Given a filter name and definition, adds the filter to the current set of filters. If the filter already exists and is used by any current sessions, those sessions are detached from the filter and are no longer logged. This occurs because the new filter definition has a new filter ID that differs from its previous ID.
Arguments:
filter_name
: A string that specifies the filter name.definition
: AJSON
value that specifies the filter definition.
Return value:
A string that indicates whether the operation succeeded.
OK
indicates success.ERROR:
indicates failure.message
Example:
- +-----------------------------------------------+
- | audit_log_filter_set_filter('SomeFilter', @f) |
- +-----------------------------------------------+
- | OK |
- +-----------------------------------------------+
audit_log_filter_set_user(
user_name
,filter_name
)Given a user account name and a filter name, assigns the filter to the user. A user can be assigned only one filter, so if the user was already assigned a filter, the assignment is replaced. Filtering of current sessions for the user remains unaffected. New connections are filtered using the new filter.
As a special case, the name
%
represents the default account. The filter is used for connections from any user account that has no explicitly assigned filter.Arguments:
user_name
: The user account name as a string in
format, oruser_name
@host_name
%
to represent the default account.filter_name
: A string that specifies the filter name.
Return value:
A string that indicates whether the operation succeeded.
OK
indicates success.ERROR:
indicates failure.message
Example:
- +------------------------------------------------------------+
- | audit_log_filter_set_user('user1@localhost', 'SomeFilter') |
- +------------------------------------------------------------+
- | OK |
- +------------------------------------------------------------+
Reads events from the audit log and returns a binary
JSON
string containing an array of audit events. If the audit log format is notJSON
, an error occurs.Each event in the return value is a
JSON
hash, except that the last array element may be aJSON
null
value to indicate no following events are available to read.For the first call to
audit_log_read()
within a session, pass a bookmark indicating where to begin reading. If the final value of the returned array is not aJSON
null
value, there are more events following those just read andaudit_log_read()
can be called without or with a bookmark argument. Without an argument, reading continues with the next unread event. With a bookmark argument, reading continues from the bookmark.If the final value of the returned array is a
JSON
null
value, there are no more events left to be read and the next call toaudit_log_read()
must include a bookmark argument.To obtain a bookmark for the most recently written event, call
audit_log_read_bookmark()
.For additional information about audit log-reading functions, see Audit Log File Reading.
Arguments:
arg
: An optional bookmark, represented as a string containing aJSON
hash that indicates where and how much to read. The following items are significant in thearg
value (other items are ignored):timestamp
,id
: The location within the audit log of the first event to read. Both items must be present to completely specify a position.max_array_length
: The maximum number of events to read from the log. If omitted, the default is to read to the end of the log or until the read buffer is full, whichever comes first.
Return value:
A binary
JSON
string containing an array of audit events for success, orNULL
and an error for failure.Example:
- +-----------------------------------------------------------------------+
- | audit_log_read(audit_log_read_bookmark()) |
- +-----------------------------------------------------------------------+
- | [ {"timestamp":"2018-01-15 22:41:24","id":0,"class":"connection", ... |
- +-----------------------------------------------------------------------+
Returns a binary
JSON
string representing a bookmark for the most recently written audit log event. If the audit log format is notJSON
, an error occurs.The bookmark is a
JSON
hash withtimestamp
andid
items indicating the event position within the audit log. It is suitable for passing toaudit_log_read()
to indicate to that function where to begin reading.For additional information about audit log-reading functions, see Audit Log File Reading.
Arguments:
None.
Return value:
A binary
JSON
string containing a bookmark for success, orNULL
and an error for failure.Example:
- +-------------------------------------------------+
- | audit_log_read_bookmark() |
- +-------------------------------------------------+
- | { "timestamp": "2018-01-15 21:03:44", "id": 0 } |
- +-------------------------------------------------+
Table 6.35 Audit Log Option and Variable Reference
Name | Cmd-Line | Option File | System Var | Status Var | Var Scope | Dynamic |
---|---|---|---|---|---|---|
audit-log | Yes | Yes | ||||
audit_log_buffer_size | Yes | Yes | Yes | Global | No | |
audit_log_connection_policy | Yes | Yes | Yes | Global | Yes | |
audit_log_current_session | Yes | Both | No | |||
Audit_log_current_size | Yes | Global | No | |||
Audit_log_event_max_drop_size | Yes | Global | No | |||
Audit_log_events | Yes | Global | No | |||
Audit_log_events_filtered | Yes | Global | No | |||
Audit_log_events_lost | Yes | Global | No | |||
Audit_log_events_written | Yes | Global | No | |||
audit_log_exclude_accounts | Yes | Yes | Yes | Global | Yes | |
audit_log_file | Yes | Yes | Yes | Global | No | |
audit_log_flush | Yes | Global | Yes | |||
audit_log_format | Yes | Yes | Yes | Global | No | |
audit_log_include_accounts | Yes | Yes | Yes | Global | Yes | |
audit_log_policy | Yes | Yes | Yes | Global | No | |
audit_log_rotate_on_size | Yes | Yes | Yes | Global | Yes | |
audit_log_statement_policy | Yes | Yes | Yes | Global | Yes | |
audit_log_strategy | Yes | Yes | Yes | Global | No | |
Audit_log_total_size | Yes | Global | No | |||
Audit_log_write_waits | Yes | Global | No |
This section describes the command options and system
variables that control operation of MySQL Enterprise Audit. If values
specified at startup time are incorrect, the
audit_log
plugin may fail to initialize
properly and the server does not load it. In this case, the
server may also produce error messages for other audit log
settings because it will not recognize them.
To control the activation of the audit log plugin, use this option:
-
Property Value Command-Line Format --audit-log[=value]
Introduced 8.0.11 Type Enumeration Default Value ON
Valid Values ON
OFF
FORCE
FORCE_PLUS_PERMANENT
This option controls how the server loads the
audit_log
plugin at startup. It is available only if the plugin has been previously registered withINSTALL PLUGIN
or is loaded with--plugin-load
or--plugin-load-add
. See Section 6.5.5.2, “Installing or Uninstalling MySQL Enterprise Audit”.The option value should be one of those available for plugin-loading options, as described in Section 5.6.1, “Installing and Uninstalling Plugins”. For example,
--audit-log=FORCE_PLUS_PERMANENT
tells the server to load the plugin and prevent it from being removed while the server is running.
If the audit log plugin is enabled, it exposes several system variables that permit control over logging:
- +-----------------------------+--------------+
- +-----------------------------+--------------+
- | audit_log_buffer_size | 1048576 |
- | audit_log_current_session | OFF |
- | audit_log_exclude_accounts | |
- | audit_log_filter_id | 0 |
- | audit_log_flush | OFF |
- | audit_log_format | NEW |
- | audit_log_include_accounts | |
- | audit_log_rotate_on_size | 0 |
- | audit_log_strategy | ASYNCHRONOUS |
- +-----------------------------+--------------+
You can set any of these variables at server startup, and some of them at runtime. Those that are available only for legacy mode audit log filtering are so noted.
-
Property Value Command-Line Format --audit-log-buffer-size=value
Introduced 8.0.11 System Variable audit_log_buffer_size
Scope Global Dynamic No SET_VAR
Hint AppliesNo Type Integer Default Value 1048576
Minimum Value 4096
Maximum Value (64-bit platforms) 18446744073709547520
Maximum Value (32-bit platforms) 4294967295
When the audit log plugin writes events to the log asynchronously, it uses a buffer to store event contents prior to writing them. This variable controls the size of that buffer, in bytes. The server adjusts the value to a multiple of 4096. The plugin uses a single buffer, which it allocates when it initializes and removes when it terminates. The plugin allocates this buffer only if logging is asynchronous.
-
Property Value Command-Line Format --audit-log-compression=value
Introduced 8.0.11 System Variable audit_log_compression
Scope Global Dynamic No SET_VAR
Hint AppliesNo Type Enumeration Default Value NONE
Valid Values NONE
GZIP
The type of compression for the audit log file. Permitted values are
NONE
(no compression; the default) andGZIP
(GNU Zip compression). For more information, see Audit Log File Compression. -
Property Value Command-Line Format --audit-log-connection-policy=value
Introduced 8.0.11 System Variable audit_log_connection_policy
Scope Global Dynamic Yes SET_VAR
Hint AppliesNo Type Enumeration Default Value ALL
Valid Values ALL
ERRORS
NONE
NoteThis variable applies only to legacy mode audit log filtering (see Section 6.5.5.7, “Legacy Mode Audit Log Filtering”).
The policy controlling how the audit log plugin writes connection events to its log file. The following table shows the permitted values.
Value Description ALL
Log all connection events ERRORS
Log only failed connection events NONE
Do not log connection events NoteAt server startup, any explicit value given for
audit_log_connection_policy
may be overridden ifaudit_log_policy
is also specified, as described in Section 6.5.5.5, “Audit Log Logging Control”. -
Property Value Introduced 8.0.11 System Variable audit_log_current_session
Scope Global, Session Dynamic No SET_VAR
Hint AppliesNo Type Boolean Default Value depends on filtering policy
Whether audit logging is enabled for the current session. The session value of this variable is read only. It is set when the session begins based on the values of the
audit_log_include_accounts
andaudit_log_exclude_accounts
system variables. The audit log plugin uses the session value to determine whether to audit events for the session. (There is a global value, but the plugin does not use it.) -
Property Value Command-Line Format --audit-log-encryption=value
Introduced 8.0.11 System Variable audit_log_encryption
Scope Global Dynamic No SET_VAR
Hint AppliesNo Type Enumeration Default Value NONE
Valid Values NONE
AES
The type of encryption for the audit log file. Permitted values are
NONE
(no encryption; the default) andAES
(AES-256-CBC cipher encryption). For more information, see Audit Log File Encryption. -
Property Value Command-Line Format --audit-log-exclude-accounts=value
Introduced 8.0.11 System Variable audit_log_exclude_accounts
Scope Global Dynamic Yes SET_VAR
Hint AppliesNo Type String Default Value NULL
NoteThis variable applies only to legacy mode audit log filtering (see Section 6.5.5.7, “Legacy Mode Audit Log Filtering”).
The accounts for which events should not be logged. The value should be
NULL
or a string containing a list of one or more comma-separated account names. For more information, see Section 6.5.5.6, “Audit Log Filtering”.Modifications to
audit_log_exclude_accounts
affect only connections created subsequent to the modification, not existing connections. -
Property Value Command-Line Format --audit-log-file=file_name
Introduced 8.0.11 System Variable audit_log_file
Scope Global Dynamic No SET_VAR
Hint AppliesNo Type File name Default Value audit.log
The base name and suffix of the file to which the audit log plugin writes events. The default value is
audit.log
, regardless of logging format. To have the name suffix correspond to the format, set the name explicitly, choosing a different suffix (for example,audit.xml
for XML format,audit.json
for JSON format).If the value of
audit_log_file
is a relative path name, the plugin interprets it relative to the data directory. If the value is a full path name, the plugin uses the value as is. A full path name may be useful if it is desirable to locate audit files on a separate file system or directory. For security reasons, the audit log file should be written to a directory accessible only to the MySQL server and to users with a legitimate reason to view the log.For details about how the audit log plugin interprets the
audit_log_file
value and the rules for file renaming that occurs at plugin initialization and termination, see Audit Log File Name.The audit log plugin uses the directory containing the audit log file (determined from the
audit_log_file
value) as the location to search for readable audit log files. From these log files and the current file, the plugin constructs a list of the ones that are subject to use with the audit log bookmarking and reading functions. See Audit Log File Reading. -
Property Value Introduced 8.0.11 System Variable audit_log_filter_id
Scope Global, Session Dynamic No SET_VAR
Hint AppliesNo Type Integer The session value of this variable indicates the internally maintained ID of the audit filter for the current session. A value of 0 means that the session has no filter assigned.
-
Property Value Introduced 8.0.11 System Variable audit_log_flush
Scope Global Dynamic Yes SET_VAR
Hint AppliesNo Type Boolean Default Value OFF
When this variable is set to enabled (1 or
ON
), the audit log plugin closes and reopens its log file to flush it. (The value remainsOFF
so that you need not disable it explicitly before enabling it again to perform another flush.) Enabling this variable has no effect unlessaudit_log_rotate_on_size
is 0. For more information, see Section 6.5.5.5, “Audit Log Logging Control”. -
Property Value Command-Line Format --audit-log-format=value
Introduced 8.0.11 System Variable audit_log_format
Scope Global Dynamic No SET_VAR
Hint AppliesNo Type Enumeration Default Value NEW
Valid Values OLD
NEW
JSON
The audit log file format. Permitted values are
OLD
(old-style XML),NEW
(new-style XML; the default), andJSON
. For details about each format, see Section 6.5.5.4, “Audit Log File Formats”.NoteFor information about issues to consider when changing the log format, see Audit Log File Format.
-
Property Value Command-Line Format --audit-log-include-accounts=value
Introduced 8.0.11 System Variable audit_log_include_accounts
Scope Global Dynamic Yes SET_VAR
Hint AppliesNo Type String Default Value NULL
NoteThis variable applies only to legacy mode audit log filtering (see Section 6.5.5.7, “Legacy Mode Audit Log Filtering”).
The accounts for which events should be logged. The value should be
NULL
or a string containing a list of one or more comma-separated account names. For more information, see Section 6.5.5.6, “Audit Log Filtering”.Modifications to
audit_log_include_accounts
affect only connections created subsequent to the modification, not existing connections. -
Property Value Command-Line Format --audit-log-policy=value
Introduced 8.0.11 System Variable audit_log_policy
Scope Global Dynamic No SET_VAR
Hint AppliesNo Type Enumeration Default Value ALL
Valid Values ALL
LOGINS
QUERIES
NONE
NoteThis variable applies only to legacy mode audit log filtering (see Section 6.5.5.7, “Legacy Mode Audit Log Filtering”).
The policy controlling how the audit log plugin writes events to its log file. The following table shows the permitted values.
Value Description ALL
Log all events LOGINS
Log only login events QUERIES
Log only query events NONE
Log nothing (disable the audit stream) audit_log_policy
can be set only at server startup. At runtime, it is a read-only variable. Two other system variables,audit_log_connection_policy
andaudit_log_statement_policy
, provide finer control over logging policy and can be set either at startup or at runtime. If you useaudit_log_policy
at startup instead of the other two variables, the server uses its value to set those variables. For more information about the policy variables and their interaction, see Section 6.5.5.5, “Audit Log Logging Control”. -
Property Value Command-Line Format --audit-log-read-buffer-size=#
Introduced 8.0.11 System Variable (>= 8.0.11) audit_log_read_buffer_size
Scope (>= 8.0.12) Global, Session Scope (8.0.11) Global Dynamic (>= 8.0.12) Yes Dynamic (8.0.11) No SET_VAR
Hint Applies (>= 8.0.11)No Type Integer Default Value (>= 8.0.12) 32768
Default Value (8.0.11) 1048576
Minimum Value (>= 8.0.12) 32768
Minimum Value (8.0.11) 1024
Maximum Value 4194304
The buffer size for reading from the audit log file, in bytes. The
audit_log_read()
function reads no more than this many bytes. Log file reading is supported only for JSON log format. For more information, see Audit Log File Reading.As of MySQL 8.0.12, this variable has a default of 32KB and can be set at runtime. Each client should set its session value of
audit_log_read_buffer_size
appropriately for its use ofaudit_log_read()
. Prior to MySQL 8.0.12,audit_log_read_buffer_size
has a default of 1MB, affects all clients, and can be changed only at server startup. -
Property Value Command-Line Format --audit-log-rotate-on-size=N
Introduced 8.0.11 System Variable audit_log_rotate_on_size
Scope Global Dynamic Yes SET_VAR
Hint AppliesNo Type Integer Default Value 0
If the
audit_log_rotate_on_size
value is 0, the audit log plugin does not perform automatic log file rotation. Instead, useaudit_log_flush
to close and reopen the log on demand. In this case, manually rename the file externally to the server before flushing it.If the
audit_log_rotate_on_size
value is greater than 0, automatic size-based log file rotation occurs. Whenever a write to the log file causes its size to exceed theaudit_log_rotate_on_size
value, the audit log plugin closes the current log file, renames it, and opens a new log file.For more information about audit log file rotation, see Audit Log File Space Management and Name Rotation.
If you set this variable to a value that is not a multiple of 4096, it is truncated to the nearest multiple. (Thus, setting it to a value less than 4096 has the effect of setting it to 0 and no rotation occurs, except manually.)
-
Property Value Command-Line Format --audit-log-statement-policy=value
Introduced 8.0.11 System Variable audit_log_statement_policy
Scope Global Dynamic Yes SET_VAR
Hint AppliesNo Type Enumeration Default Value ALL
Valid Values ALL
ERRORS
NONE
NoteThis variable applies only to legacy mode audit log filtering (see Section 6.5.5.7, “Legacy Mode Audit Log Filtering”).
The policy controlling how the audit log plugin writes statement events to its log file. The following table shows the permitted values.
Value Description ALL
Log all statement events ERRORS
Log only failed statement events NONE
Do not log statement events NoteAt server startup, any explicit value given for
audit_log_statement_policy
may be overridden ifaudit_log_policy
is also specified, as described in Section 6.5.5.5, “Audit Log Logging Control”. -
Property Value Command-Line Format --audit-log-strategy=value
Introduced 8.0.11 System Variable audit_log_strategy
Scope Global Dynamic No SET_VAR
Hint AppliesNo Type Enumeration Default Value ASYNCHRONOUS
Valid Values ASYNCHRONOUS
PERFORMANCE
SEMISYNCHRONOUS
SYNCHRONOUS
The logging method used by the audit log plugin. These strategy values are permitted:
ASYNCHRONOUS
: Log asynchronously. Wait for space in the output buffer.PERFORMANCE
: Log asynchronously. Drop requests for which there is insufficient space in the output buffer.SEMISYNCHRONOUS
: Log synchronously. Permit caching by the operating system.SYNCHRONOUS
: Log synchronously. Callsync()
after each request.
If the audit log plugin is enabled, it exposes several status variables that provide operational information. These variables are available for for legacy mode audit filtering and JSON mode audit filtering.
The size of the current audit log file. The value increases when an event is written to the log and is reset to 0 when the log is rotated.
The size of the largest dropped event in performance logging mode. For a description of logging modes, see Section 6.5.5.5, “Audit Log Logging Control”.
The number of events handled by the audit log plugin, whether or not they were written to the log based on filtering policy (see Section 6.5.5.5, “Audit Log Logging Control”).
The number of events handled by the audit log plugin that were filtered (not written to the log) based on filtering policy (see Section 6.5.5.5, “Audit Log Logging Control”).
The number of events lost in performance logging mode because an event was larger than than the available audit log buffer space. This value may be useful for assessing how to set
audit_log_buffer_size
to size the buffer for performance mode. For a description of logging modes, see Section 6.5.5.5, “Audit Log Logging Control”.The number of events written to the audit log.
The total size of events written to all audit log files. Unlike
Audit_log_current_size
, the value ofAudit_log_total_size
increases even when the log is rotated.The number of times an event had to wait for space in the audit log buffer in asynchronous logging mode. For a description of logging modes, see Section 6.5.5.5, “Audit Log Logging Control”.
Traduction non disponible
Le manuel MySQL n'est pas encore traduit en français sur l'infobrol. Seule la version anglaise est disponible pour l'instant.
Document créé le 26/06/2006, dernière modification le 26/10/2018
Source du document imprimé : https://www.gaudry.be/mysql-rf-audit-log-reference.html
L'infobrol est un site personnel dont le contenu n'engage que moi. Le texte est mis à disposition sous licence CreativeCommons(BY-NC-SA). Plus d'info sur les conditions d'utilisation et sur l'auteur.
Références
Ces références et liens indiquent des documents consultés lors de la rédaction de cette page, ou qui peuvent apporter un complément d'information, mais les auteurs de ces sources ne peuvent être tenus responsables du contenu de cette page.
L'auteur de ce site est seul responsable de la manière dont sont présentés ici les différents concepts, et des libertés qui sont prises avec les ouvrages de référence. N'oubliez pas que vous devez croiser les informations de sources multiples afin de diminuer les risques d'erreurs.