Posts

Showing posts from 2026

Oracle Database 26AI - Priority Transactions

Effective transaction management is central to running a high‑performance, highly available Oracle Database environment. With Oracle Database 26AI, the database engine introduces enhanced capabilities that improve how blocked transactions are handled, how row‑level locks are controlled, and how long‑running or stalled sessions are recovered. This post provides a clear, DBA‑friendly overview of these features and how to use them in real environments. What Is a Transaction in Oracle? A transaction represents a logical, atomic unit of work that includes one or more SQL statements executed as a group. Oracle ensures that the entire group is either fully committed or fully rolled back , maintaining the classic ACID guarantees. This means your database always transitions from one consistent state to another. Transactions implicitly begin with the first executable SQL statement and end either when you issue a COMMIT, a ROLLBACK, or an implicit commit occurs (for example, during DDL op...

Oracle Database Authentication Options

Image
In the modern security landscape, authentication is no longer just about a simple login. As organizations move toward zero-trust architectures, the way we verify identities in the Oracle Database has evolved from legacy local accounts to sophisticated cloud identity integrations. Based on recent technical updates, here is a comprehensive look at the authentication methods available to secure your data. The Foundation: Classic Authentication Methods Oracle Database offers several primary authentication paths, each suited for different architectural needs: Username and Password:  This remains the most used form of authentication and works with almost any client. However, it is also the most frequent contributor to data breaches. Operating System (OS) Authentication:  Often called  OPS$ accounts , this method bases database login on the server OS login. While used by all databases, it is typically reserved for administrators connecting to the CDB. Notably, remote OS authenti...

PDB - Hybrid read only mode

Image
  Hybrid Read-Only Mode , introduced in Oracle Database 23ai, solves the classic "Catch-22" where you need to perform maintenance (requiring Read-Write access) but want to prevent application users from changing data (requiring Read-Only access). For years, DBAs have faced a frustrating trade-off during maintenance windows. If you open a Pluggable Database (PDB) in READ WRITE mode, your application users (and their potentially messy DML) can interfere with your patching or schema upgrades. If you open it in READ ONLY mode, you can’t perform the very maintenance you planned. What is Hybrid Read-Only Mode? In this mode, the PDB's accessibility is determined by the user type : Common Users (CDB Level): Experience the PDB in READ WRITE mode. They can perform DDL, DML, and maintenance tasks. Local Users (PDB Level): Experience the PDB in READ ONLY mode. Even if they have the DBA role, they are restricted from making any changes. Implementing and Testing Hybrid Read-Only...

Strengthening Your Defense: New SQL Firewall Features in Oracle 26ai

Image
Oracle Database has long been the fortress of enterprise data, but with the release of Oracle 26ai , that fortress just got a lot smarter. One of the most critical security enhancements in recent years is the SQL Firewall , and the latest update introduces a surgical way to manage with the dbms_sql_firewall.append_allow_list_single_sql procedure. What is Oracle SQL Firewall? Before diving into the new features, let’s recap how the SQL Firewall works. Think of it as a "VIP list" for your database. It provides real-time protection against SQL injection and unauthorized access by restricting users to a specific set of: Authorized SQL statements Approved connection paths (IP addresses, programs, etc.) For the firewall to be effective, it first needs to be trained . You enable a "capture" period where the database learns the normal behavior of a user. Once you're confident you've captured all legitimate traffic, you generate an allow-list ...

Master the Cloud: The All-in-One dbaascli Tool for OCI

  If you are managing Oracle Exadata Cloud Service, you already know that efficiency is the name of the game. Enter dbaascli - the powerhouse command-line utility designed to handle everything from routine status checks to complex database migrations. Instead of juggling multiple scripts or manual SQL commands, dbaascli offers a unified interface for the entire lifecycle of your database. Here is your comprehensive guide to mastering the most essential commands. Essential Database Administration Before diving into complex operations, you need to master the basics. These commands allow you to control your database instances directly from the compute node. Start a database: # dbaascli database start --dbname TESTDB Stop a database: # dbaascli database stop --dbname TESTDB Check status: # dbaascli database status --dbname TESTDB Seamless Patching and Rollbacks Patching is often the most stressful part of a DBA's job. dbaascli simplifies this by automating t...

Oracle 23ai & 26ai: Structural Changes Every DBA Needs to Know

Image
  The evolution from Oracle 19c to the latest 23ai and 26ai releases isn’t just about new AI features; it’s a fundamental shift in how the database is structured and managed. For DBAs, this means unlearning some old habits and embracing a more automated, secure, and streamlined architecture. Here is a breakdown of the most impactful structural changes you’ll encounter. Data Dictionary & Ownership: Strengthening the Core Oracle is tightening the reins on internal object management to boost security and performance. LogMiner Move: In a move toward better kernel control, LogMiner objects have migrated from the SYSTEM schema to SYS. This reduces the risk of accidental modification and aligns with "least privilege" principles. Component Cleanup: During the upgrade process, Oracle now standardizes Spatial components under the MDSYS schema. Notably, older, legacy multimedia components are being stripped out to reduce the database footprint. JSON Duality: For those...

Oracle TDE: Observations on Online Encryption, Standby Behaviour, and Crash Recovery

Image
  In the modern security landscape, Transparent Data Encryption (TDE) is no longer optional, it is a fundamental requirement for protecting data at rest. While the ALTER TABLESPACE command seems straightforward, the underlying mechanics of how Oracle handles online encryption especially in environments with Data Guard can be surprising. Recently, I’ve been exploring the nuances of online TDE operations. Here are the key takeaways and "gotchas" every DBA should know before hitting 'enter' on that encryption command. 1. The Power of Online Encryption Oracle allows you to encrypt an existing unencrypted tablespace while the database is open and being accessed by users. The syntax is simple: SQL ALTER TABLESPACE TEST ENCRYPTION ONLINE ENCRYPT; Pro Tip: In Oracle 19c, the default algorithm is AES128. If your security standards require AES256, you should set the parameter tablespace_encryption_default_algorithm to 'AES256' or specify it explicitly in yo...