In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-02-28 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Database >
Share
Shulou(Shulou.com)06/01 Report--
The Audit is used to monitor the database operations performed by the user, and Oracle stores the audit trail results in the OS file (default location is $ORACLE_BASE/admin / $ORACLE_SID/adump/) or in the database (stored in the SYS.AUD$ table in the system tablespace, which can be viewed through the view dba_audit_trail). Audit can provide useful information to reveal the abuse and misuse of authority. When a certain granularity is needed, DBA can use fine-grained auditing to monitor access to certain rows or columns in the table, not just whether or not to access the table.
In oracle 11g, the audit function (AUDIT_TRAIL) is turned on by default. The audit data is stored on the AUD$ audit dictionary base table under the SYSTEM table space by default. Opening the audit database will increase consumption and reduce business performance, so if it is not necessary, after installing the database, you can choose to turn off the database audit function.
Oracle also recommends audit logging based on OS files (OSaudit trail files). When AUDIT_TRAIL is set to OS, the audit record file will be generated in the directory specified by the AUDIT_FILE_DEST parameter.
Type of audit
Statement audit
Audit SQL statements by statement type, regardless of which specific mode pair is accessed
Elephant. You can also specify one or more users in the database to audit them for specific statements
Authority audit
Audit system permissions, such as CREATE TABLE or ALTER INDEX. Like statement auditing, permission auditing can specify one or more specific users as the target of the audit
Pattern object audit
Audit specific statements running on specific schema objects (for example, DEPARTMENTS table
The UPDATE statement on the. Schema object auditing is always applied to all users in the database
Fine-grained audit
Audit table access and permissions based on the contents of the access object. Use packages
DBMS_FGA to establish policies on specific tables
Sequel: http://blog.itpub.net/30208428/viewspace-1815992/
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.