Posts

PDB - Hybrid read only mode

Image
  Hybrid Read-Only Mode , introduced in Oracle Database 23ai, solves the classic "Catch-22" where you need to perform maintenance (requiring Read-Write access) but want to prevent application users from changing data (requiring Read-Only access). For years, DBAs have faced a frustrating trade-off during maintenance windows. If you open a Pluggable Database (PDB) in READ WRITE mode, your application users (and their potentially messy DML) can interfere with your patching or schema upgrades. If you open it in READ ONLY mode, you can’t perform the very maintenance you planned. What is Hybrid Read-Only Mode? In this mode, the PDB's accessibility is determined by the user type : Common Users (CDB Level): Experience the PDB in READ WRITE mode. They can perform DDL, DML, and maintenance tasks. Local Users (PDB Level): Experience the PDB in READ ONLY mode. Even if they have the DBA role, they are restricted from making any changes. Implementing and Testing Hybrid Read-Only...

Strengthening Your Defense: New SQL Firewall Features in Oracle 26ai

Image
Oracle Database has long been the fortress of enterprise data, but with the release of Oracle 26ai , that fortress just got a lot smarter. One of the most critical security enhancements in recent years is the SQL Firewall , and the latest update introduces a surgical way to manage with the dbms_sql_firewall.append_allow_list_single_sql procedure. What is Oracle SQL Firewall? Before diving into the new features, let’s recap how the SQL Firewall works. Think of it as a "VIP list" for your database. It provides real-time protection against SQL injection and unauthorized access by restricting users to a specific set of: Authorized SQL statements Approved connection paths (IP addresses, programs, etc.) For the firewall to be effective, it first needs to be trained . You enable a "capture" period where the database learns the normal behavior of a user. Once you're confident you've captured all legitimate traffic, you generate an allow-list ...

Master the Cloud: The All-in-One dbaascli Tool for OCI

  If you are managing Oracle Exadata Cloud Service, you already know that efficiency is the name of the game. Enter dbaascli - the powerhouse command-line utility designed to handle everything from routine status checks to complex database migrations. Instead of juggling multiple scripts or manual SQL commands, dbaascli offers a unified interface for the entire lifecycle of your database. Here is your comprehensive guide to mastering the most essential commands. Essential Database Administration Before diving into complex operations, you need to master the basics. These commands allow you to control your database instances directly from the compute node. Start a database: # dbaascli database start --dbname TESTDB Stop a database: # dbaascli database stop --dbname TESTDB Check status: # dbaascli database status --dbname TESTDB Seamless Patching and Rollbacks Patching is often the most stressful part of a DBA's job. dbaascli simplifies this by automating t...

Oracle 23ai & 26ai: Structural Changes Every DBA Needs to Know

Image
  The evolution from Oracle 19c to the latest 23ai and 26ai releases isn’t just about new AI features; it’s a fundamental shift in how the database is structured and managed. For DBAs, this means unlearning some old habits and embracing a more automated, secure, and streamlined architecture. Here is a breakdown of the most impactful structural changes you’ll encounter. Data Dictionary & Ownership: Strengthening the Core Oracle is tightening the reins on internal object management to boost security and performance. LogMiner Move: In a move toward better kernel control, LogMiner objects have migrated from the SYSTEM schema to SYS. This reduces the risk of accidental modification and aligns with "least privilege" principles. Component Cleanup: During the upgrade process, Oracle now standardizes Spatial components under the MDSYS schema. Notably, older, legacy multimedia components are being stripped out to reduce the database footprint. JSON Duality: For those...

Oracle TDE: Observations on Online Encryption, Standby Behaviour, and Crash Recovery

Image
  In the modern security landscape, Transparent Data Encryption (TDE) is no longer optional, it is a fundamental requirement for protecting data at rest. While the ALTER TABLESPACE command seems straightforward, the underlying mechanics of how Oracle handles online encryption especially in environments with Data Guard can be surprising. Recently, I’ve been exploring the nuances of online TDE operations. Here are the key takeaways and "gotchas" every DBA should know before hitting 'enter' on that encryption command. 1. The Power of Online Encryption Oracle allows you to encrypt an existing unencrypted tablespace while the database is open and being accessed by users. The syntax is simple: SQL ALTER TABLESPACE TEST ENCRYPTION ONLINE ENCRYPT; Pro Tip: In Oracle 19c, the default algorithm is AES128. If your security standards require AES256, you should set the parameter tablespace_encryption_default_algorithm to 'AES256' or specify it explicitly in yo...

Securing Your Crown Jewels: A Guide to Oracle DBSAT

  In an era where data is the new oil, your database is the high-security vault. But how often do you check the locks? For Oracle Database users, the Database Security Assessment Tool (DBSAT) is the essential "home inspection" kit for your data environment. Whether you're preparing for a GDPR audit or just trying to sleep better at night, DBSAT provides a fast, comprehensive way to evaluate your security posture. What is DBSAT? Oracle DBSAT is a lightweight, command-line utility that identifies security risks by analyzing database configurations, user entitlements, and sensitive data locations. It doesn’t just point out problems; it provides actionable recommendations based on CIS Benchmarks , DISA STIG , and Oracle best practices. The Three Pillars of DBSAT The tool operates through three distinct components: The Collector: Runs SQL queries and OS commands on the database server to gather raw metadata. The Reporter: Analyzes the collecte...

Mastering the Art of Least Privilege: Oracle Privilege Analysis in 23ai

 In the fast-paced world of database administration and development, the pressure to get things done often collides with the need for security. How many times have you, as a DBA, succumbed to the temptation of granting SELECT ANY TABLE or DBA privileges to a developer just to bypass a perplexing ORA-00942: table or view does not exist error? We’ve all been there. It’s the "Get it Working Now, Fix it Later" approach. The problem is, "later" rarely comes, and your database becomes a Swiss cheese of excessive permissions. This is the anti-pattern of the Principle of Least Privilege (PoLP) , which dictates that a user should only have the privileges necessary to perform their specific job - no more, no less. Over-privileged users are a massive security risk, turning a single compromised account into a database-wide breach. Oracle Database 23ai changes the game. With its focus on "Security by Design," 23ai introduces features that make implementing least pri...