diff --git a/docs/dbss/umn/ALL_META.TXT.json b/docs/dbss/umn/ALL_META.TXT.json new file mode 100644 index 00000000..f1c227b5 --- /dev/null +++ b/docs/dbss/umn/ALL_META.TXT.json @@ -0,0 +1,622 @@ +[ + { + "uri":"dbss_01_0138.html", + "product_code":"dbss", + "code":"1", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Overview", + "title":"Overview", + "githuburl":"" + }, + { + "uri":"dbss_01_0001.html", + "product_code":"dbss", + "code":"2", + "des":"Database Security Service (DBSS) is an intelligent database security service. Based on the machine learning mechanism and big data analytics technologies, it can audit yo", + "doc_type":"usermanual", + "kw":"DBSS,Overview,User Guide", + "title":"DBSS", + "githuburl":"" + }, + { + "uri":"dbss_01_0237.html", + "product_code":"dbss", + "code":"3", + "des":"Database audit delivers functions such as user behavior detection and audit, multi-dimensional lead analysis, real-time alarms, and reports.User Behavior Detection and Au", + "doc_type":"usermanual", + "kw":"Functions,Overview,User Guide", + "title":"Functions", + "githuburl":"" + }, + { + "uri":"dbss_01_0238.html", + "product_code":"dbss", + "code":"4", + "des":"Database audit provides you with the database audit function in out-of-path pattern, enabling the system to generate real-time alarms for risky operations. In addition, d", + "doc_type":"usermanual", + "kw":"Advantages,Overview,User Guide", + "title":"Advantages", + "githuburl":"" + }, + { + "uri":"dbss_01_0181.html", + "product_code":"dbss", + "code":"5", + "des":"Database audit is deployed in out-of-path pattern. It can audit databases built on ECS, BMS and RDS on the management console.Figure 1 shows the database audit deployment", + "doc_type":"usermanual", + "kw":"Deployment Architecture,Overview,User Guide", + "title":"Deployment Architecture", + "githuburl":"" + }, + { + "uri":"dbss_01_0268.html", + "product_code":"dbss", + "code":"6", + "des":"Database audit provides basic, professional, and advanced editions. You can select one of them as needed.Table 1 describes the database audit editions.Database audit edit", + "doc_type":"usermanual", + "kw":"Editions,Overview,User Guide", + "title":"Editions", + "githuburl":"" + }, + { + "uri":"dbss_01_0313.html", + "product_code":"dbss", + "code":"7", + "des":"Database audit is subject to certain constraints.The following types of databases on the management console can be audited in out-of-path mode:RDS instancesDatabases buil", + "doc_type":"usermanual", + "kw":"Constraints,Overview,User Guide", + "title":"Constraints", + "githuburl":"" + }, + { + "uri":"dbss_01_0185.html", + "product_code":"dbss", + "code":"8", + "des":"Before using the database audit function, you need to apply for a database audit instance.Ensure the VPC of the database audit instance is the same as that of the node (a", + "doc_type":"usermanual", + "kw":"Applying for a Database Audit Instance,User Guide", + "title":"Applying for a Database Audit Instance", + "githuburl":"" + }, + { + "uri":"dbss_01_0186.html", + "product_code":"dbss", + "code":"9", + "des":"Database audit supports databases built on ECS, BMS, and RDS on the console. After applying for a database audit instance, you need to add the database to be audited to t", + "doc_type":"usermanual", + "kw":"Step 1: Add a Database,User Guide", + "title":"Step 1: Add a Database", + "githuburl":"" + }, + { + "uri":"dbss_01_0356.html", + "product_code":"dbss", + "code":"10", + "des":"By default, database audit complies with a full audit rule, which is used to audit all databases that are connected to the database audit instance. You can enable audit a", + "doc_type":"usermanual", + "kw":"Step 2: Enable Database Audit,User Guide", + "title":"Step 2: Enable Database Audit", + "githuburl":"" + }, + { + "uri":"dbss_01_0253.html", + "product_code":"dbss", + "code":"11", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Step 3: View Audit Results", + "title":"Step 3: View Audit Results", + "githuburl":"" + }, + { + "uri":"dbss_01_0205.html", + "product_code":"dbss", + "code":"12", + "des":"After connecting the database to the database audit instance, view SQL statements of the database.You have applied for a database audit instance and the Status is Running", + "doc_type":"usermanual", + "kw":"Viewing SQL Statement Details,Step 3: View Audit Results,User Guide", + "title":"Viewing SQL Statement Details", + "githuburl":"" + }, + { + "uri":"dbss_01_0206.html", + "product_code":"dbss", + "code":"13", + "des":"After connecting the database to the database audit instance, view session distribution of the database.You have applied for a database audit instance and the Status is R", + "doc_type":"usermanual", + "kw":"Viewing Session Distribution,Step 3: View Audit Results,User Guide", + "title":"Viewing Session Distribution", + "githuburl":"" + }, + { + "uri":"dbss_01_0204.html", + "product_code":"dbss", + "code":"14", + "des":"After connecting the database to the database audit instance, view the audit statistics, including the overall audit statistics, risk distribution, session statistics, an", + "doc_type":"usermanual", + "kw":"Viewing the Audit Dashboard,Step 3: View Audit Results,User Guide", + "title":"Viewing the Audit Dashboard", + "githuburl":"" + }, + { + "uri":"dbss_01_0248.html", + "product_code":"dbss", + "code":"15", + "des":"By default, database audit complies with a full audit rule, which is used to audit all databases that are successfully connected to the database audit instance. After con", + "doc_type":"usermanual", + "kw":"Viewing Audit Reports,Step 3: View Audit Results,User Guide", + "title":"Viewing Audit Reports", + "githuburl":"" + }, + { + "uri":"dbss_01_0190.html", + "product_code":"dbss", + "code":"16", + "des":"By default, database audit complies with a full audit rule, which is used to audit all databases that are successfully connected to database audit. You can also add audit", + "doc_type":"usermanual", + "kw":"Adding Audit Scope,User Guide", + "title":"Adding Audit Scope", + "githuburl":"" + }, + { + "uri":"dbss_01_0362.html", + "product_code":"dbss", + "code":"17", + "des":"You can add SQL injection rules to audit your databases.You have purchased a database audit instance and the Status is Running.You have added a database and enabled datab", + "doc_type":"usermanual", + "kw":"Adding an SQL Injection Rule,User Guide", + "title":"Adding an SQL Injection Rule", + "githuburl":"" + }, + { + "uri":"dbss_01_0191.html", + "product_code":"dbss", + "code":"18", + "des":"SQL injection detection is enabled by default. You can disable or enable the detection rules.One piece of audited data can match only one SQL injection detection rule.You", + "doc_type":"usermanual", + "kw":"Enabling or Disabling SQL Injection Detection,User Guide", + "title":"Enabling or Disabling SQL Injection Detection", + "githuburl":"" + }, + { + "uri":"dbss_01_0192.html", + "product_code":"dbss", + "code":"19", + "des":"After enabling database audit, add and configure risky operations for audit.One piece of audited data can match only one risky operation rule.You have applied for a datab", + "doc_type":"usermanual", + "kw":"Adding Risky Operations,User Guide", + "title":"Adding Risky Operations", + "githuburl":"" + }, + { + "uri":"dbss_01_0266.html", + "product_code":"dbss", + "code":"20", + "des":"To mask sensitive information in entered SQL statements, you can enable the function of masking privacy data and configure masking rules to prevent sensitive information ", + "doc_type":"usermanual", + "kw":"Configuring Privacy Data Protection Rules,User Guide", + "title":"Configuring Privacy Data Protection Rules", + "githuburl":"" + }, + { + "uri":"dbss_01_0239.html", + "product_code":"dbss", + "code":"21", + "des":"After configuring alarm notifications, you can receive DBSS alarms on database risks. If this function is not enabled, you have to log in to the management console to vie", + "doc_type":"usermanual", + "kw":"Configuring Alarm Notifications,User Guide", + "title":"Configuring Alarm Notifications", + "githuburl":"" + }, + { + "uri":"dbss_01_0208.html", + "product_code":"dbss", + "code":"22", + "des":"This section describes how to view the system monitoring of database audit and learn about system resources and traffic usage.You have applied for a database audit instan", + "doc_type":"usermanual", + "kw":"Viewing the System Monitoring,User Guide", + "title":"Viewing the System Monitoring", + "githuburl":"" + }, + { + "uri":"dbss_01_0252.html", + "product_code":"dbss", + "code":"23", + "des":"This section describes how to view and confirm alarms of database audit.You have applied for a database audit instance and the Status is Running.Database audit has been e", + "doc_type":"usermanual", + "kw":"Viewing the Alarms,User Guide", + "title":"Viewing the Alarms", + "githuburl":"" + }, + { + "uri":"dbss_01_0213.html", + "product_code":"dbss", + "code":"24", + "des":"Before restarting and disabling an instance, ensure that its Status is Running.You can click the name of an instance to view its overview.Select an instance status from t", + "doc_type":"usermanual", + "kw":"Managing Database Audit Instances,User Guide", + "title":"Managing Database Audit Instances", + "githuburl":"" + }, + { + "uri":"dbss_01_0203.html", + "product_code":"dbss", + "code":"25", + "des":"This section describes how to view the instance overview, including the basic information, network settings and associated databases.You have applied for a database audit", + "doc_type":"usermanual", + "kw":"Viewing the Instance Overview,User Guide", + "title":"Viewing the Instance Overview", + "githuburl":"" + }, + { + "uri":"dbss_01_0200.html", + "product_code":"dbss", + "code":"26", + "des":"After adding an audit scope, you can view, enable, edit, disable, or delete the audit scope.The audit scope has been added.Before enabling, editing, or deleting the audit", + "doc_type":"usermanual", + "kw":"Management an Audit Scope,User Guide", + "title":"Management an Audit Scope", + "githuburl":"" + }, + { + "uri":"dbss_01_0207.html", + "product_code":"dbss", + "code":"27", + "des":"This section describes how to view SQL injection detection information of a database audit instance.Database audit has been enabled.Select a risk severity from the All ri", + "doc_type":"usermanual", + "kw":"Viewing Information About SQL Injection Detection,User Guide", + "title":"Viewing Information About SQL Injection Detection", + "githuburl":"" + }, + { + "uri":"dbss_01_0201.html", + "product_code":"dbss", + "code":"28", + "des":"After adding a risky operation, you can view the risk, enable, edit, disable, or delete the risky operation, or set its priority.The risky operation has been added.Before", + "doc_type":"usermanual", + "kw":"Managing Risky Operations,User Guide", + "title":"Managing Risky Operations", + "githuburl":"" + }, + { + "uri":"dbss_01_0267.html", + "product_code":"dbss", + "code":"29", + "des":"You can view, enable, edit, disable, or delete data masking rules.Store Result SetYou are advised to disable . After this function is disabled, database audit will not st", + "doc_type":"usermanual", + "kw":"Managing Privacy Data Protection Rules,User Guide", + "title":"Managing Privacy Data Protection Rules", + "githuburl":"" + }, + { + "uri":"dbss_01_0196.html", + "product_code":"dbss", + "code":"30", + "des":"By default, database audit complies with a full audit rule, which is used to audit all databases that are successfully connected to the database audit instance. After con", + "doc_type":"usermanual", + "kw":"Managing Audit Reports,User Guide", + "title":"Managing Audit Reports", + "githuburl":"" + }, + { + "uri":"dbss_01_0197.html", + "product_code":"dbss", + "code":"31", + "des":"After backing up audit logs, you can view or delete backup audit logs.Database audit has been enabled.You have backed up audit logs.Click in the upper right corner of th", + "doc_type":"usermanual", + "kw":"Managing Backup Audit Logs,User Guide", + "title":"Managing Backup Audit Logs", + "githuburl":"" + }, + { + "uri":"dbss_01_0209.html", + "product_code":"dbss", + "code":"32", + "des":"This section describes how to view operation logs of a database audit instance.Select Last 30 minutes, 1 hour, 24 hours, 7 days, or 30 days, or click to set start time a", + "doc_type":"usermanual", + "kw":"Viewing Operation Logs,User Guide", + "title":"Viewing Operation Logs", + "githuburl":"" + }, + { + "uri":"dbss_01_0409.html", + "product_code":"", + "code":"33", + "des":"You can add tags to database audit instances for easy management.You have applied for a database audit instance and the Status is Running.Up to 10 tags can be added to ea", + "doc_type":"", + "kw":"Adding a Database Instance Tag,User Guide", + "title":"Adding a Database Instance Tag", + "githuburl":"" + }, + { + "uri":"dbss_01_0144.html", + "product_code":"dbss", + "code":"34", + "des":"After you enable CTS, the system starts recording operations on DBSS. Operation records for the last seven days can be viewed on the CTS console.The following four filter", + "doc_type":"usermanual", + "kw":"Viewing Tracing Logs,User Guide", + "title":"Viewing Tracing Logs", + "githuburl":"" + }, + { + "uri":"dbss_01_0142.html", + "product_code":"dbss", + "code":"35", + "des":"Cloud Trace Service (CTS) records all cloud service operations on DBSS, including requests initiated from the management console or open APIs and responses to the request", + "doc_type":"usermanual", + "kw":"Auditable Operations,User Guide", + "title":"Auditable Operations", + "githuburl":"" + }, + { + "uri":"dbss_01_0097.html", + "product_code":"dbss", + "code":"36", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"FAQs", + "title":"FAQs", + "githuburl":"" + }, + { + "uri":"dbss_01_0269.html", + "product_code":"dbss", + "code":"37", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Functions", + "title":"Functions", + "githuburl":"" + }, + { + "uri":"dbss_01_0290.html", + "product_code":"dbss", + "code":"38", + "des":"No. Your databases are audited in out-of-path mode. Database audit neither affects your services nor conflicts with local audit tools.", + "doc_type":"usermanual", + "kw":"Does Database Audit (in Bypass Mode) Affect My Services?,Functions,User Guide", + "title":"Does Database Audit (in Bypass Mode) Affect My Services?", + "githuburl":"" + }, + { + "uri":"dbss_01_0215.html", + "product_code":"dbss", + "code":"39", + "des":"Monitors database login, operation type (data definition, operation, and control), and operation object based on risky operations to effectively audit the database.Analyz", + "doc_type":"usermanual", + "kw":"What Are the Functions of Database Audit?,Functions,User Guide", + "title":"What Are the Functions of Database Audit?", + "githuburl":"" + }, + { + "uri":"dbss_01_0221.html", + "product_code":"dbss", + "code":"40", + "des":"Yes. In bidirectional audit, both requests and responses to the database are audited.Bidirectional audit is used for database audit by default.", + "doc_type":"usermanual", + "kw":"Does Database Audit Support Bidirectional Audit?,Functions,User Guide", + "title":"Does Database Audit Support Bidirectional Audit?", + "githuburl":"" + }, + { + "uri":"dbss_01_0312.html", + "product_code":"dbss", + "code":"41", + "des":"No. Applications using TLS are encrypted.", + "doc_type":"usermanual", + "kw":"Can Applications Using TLS Connections Be Audited?,Functions,User Guide", + "title":"Can Applications Using TLS Connections Be Audited?", + "githuburl":"" + }, + { + "uri":"dbss_01_0225.html", + "product_code":"dbss", + "code":"42", + "des":"Database audit can store online and archived audit data for at least 180 days.", + "doc_type":"usermanual", + "kw":"How Long Is the Database Audit Data Stored by Default?,Functions,User Guide", + "title":"How Long Is the Database Audit Data Stored by Default?", + "githuburl":"" + }, + { + "uri":"dbss_01_0228.html", + "product_code":"dbss", + "code":"43", + "des":"When database audit is running properly, if an exception occurs, you will receive an alarm notification within 5 minutes.If you set alarm notifications, when database aud", + "doc_type":"usermanual", + "kw":"How Soon Can I Receive an Alarm Notification If an Exception Occurs in Database Audit?,Functions,Use", + "title":"How Soon Can I Receive an Alarm Notification If an Exception Occurs in Database Audit?", + "githuburl":"" + }, + { + "uri":"dbss_01_0229.html", + "product_code":"dbss", + "code":"44", + "des":"Yes. One alarm message corresponds to one email notification.", + "doc_type":"usermanual", + "kw":"Is the Total Number Of Alarms Every Day the Same as that of Emails?,Functions,User Guide", + "title":"Is the Total Number Of Alarms Every Day the Same as that of Emails?", + "githuburl":"" + }, + { + "uri":"dbss_01_0289.html", + "product_code":"dbss", + "code":"45", + "des":"To preview a report online, use Google Chrome or Mozilla FireFox.", + "doc_type":"usermanual", + "kw":"Why I Cannot Preview the Database Security Audit Report Online?,Functions,User Guide", + "title":"Why I Cannot Preview the Database Security Audit Report Online?", + "githuburl":"" + }, + { + "uri":"dbss_01_0347.html", + "product_code":"dbss", + "code":"46", + "des":"No.Middleware is a type of software deployed between applications and software including OSs, networks, and databases. Middleware provides an environment for application ", + "doc_type":"usermanual", + "kw":"If I Use Middleware at the Service Side, Will It Affect Database Audit?,Functions,User Guide", + "title":"If I Use Middleware at the Service Side, Will It Affect Database Audit?", + "githuburl":"" + }, + { + "uri":"dbss_01_0114.html", + "product_code":"dbss", + "code":"47", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Operations", + "title":"Operations", + "githuburl":"" + }, + { + "uri":"dbss_01_0283.html", + "product_code":"dbss", + "code":"48", + "des":"If SSL is enabled for a database, the database cannot be audited. To use database audit, disable SSL first.The MySQL database client is used as an example. Perform the fo", + "doc_type":"usermanual", + "kw":"How Do I Disable SSL for a Database?,Operations,User Guide", + "title":"How Do I Disable SSL for a Database?", + "githuburl":"" + }, + { + "uri":"dbss_01_0233.html", + "product_code":"dbss", + "code":"49", + "des":"To check the version of database audit, perform the following steps:", + "doc_type":"usermanual", + "kw":"How Do I Check the Version of Database Audit?,Operations,User Guide", + "title":"How Do I Check the Version of Database Audit?", + "githuburl":"" + }, + { + "uri":"dbss_01_0234.html", + "product_code":"dbss", + "code":"50", + "des":"To check the alarms of database audit, perform the following steps:Select Last 30 minutes, 1 hour, 24 hours, 7 days, or 30 days for Time, and click to view alarms of the", + "doc_type":"usermanual", + "kw":"How Do I View All Alarms in Database Audit?,Operations,User Guide", + "title":"How Do I View All Alarms in Database Audit?", + "githuburl":"" + }, + { + "uri":"dbss_01_0300.html", + "product_code":"dbss", + "code":"51", + "des":"If your PC accesses RDS through a private line, you can install the agent on a proxy your set up. Access from the proxy to the database can be audited. Access from applic", + "doc_type":"usermanual", + "kw":"How Do I Audit an RDS Database Accessed through Intranet (by Applications Off the Cloud)?,Operations", + "title":"How Do I Audit an RDS Database Accessed through Intranet (by Applications Off the Cloud)?", + "githuburl":"" + }, + { + "uri":"dbss_01_0323.html", + "product_code":"dbss", + "code":"52", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Troubleshooting", + "title":"Troubleshooting", + "githuburl":"" + }, + { + "uri":"dbss_01_0256.html", + "product_code":"dbss", + "code":"53", + "des":"The functions of the database audit instance are normal. When there is database traffic, audit information about the executed SQL statement cannot be found in the SQL sta", + "doc_type":"usermanual", + "kw":"Database Audit Is Running Properly But Generates No Audit Records,Troubleshooting,User Guide", + "title":"Database Audit Is Running Properly But Generates No Audit Records", + "githuburl":"" + }, + { + "uri":"dbss_01_0235.html", + "product_code":"dbss", + "code":"54", + "des":"After the database traffic is triggered, you cannot find the audit information about an executed statement in the SQL statement list.In this case, perform the following o", + "doc_type":"usermanual", + "kw":"Database Audit Is Unavailable,Troubleshooting,User Guide", + "title":"Database Audit Is Unavailable", + "githuburl":"" + }, + { + "uri":"dbss_01_0341.html", + "product_code":"dbss", + "code":"55", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Logs", + "title":"Logs", + "githuburl":"" + }, + { + "uri":"dbss_01_0227.html", + "product_code":"dbss", + "code":"56", + "des":"No. Database audit does not support migrating database operation logs.You can view the operation logs of database audit. For details, see How Long Are the Operation Logs ", + "doc_type":"usermanual", + "kw":"Can the Operation Logs of Database Audit Be Migrated?,Logs,User Guide", + "title":"Can the Operation Logs of Database Audit Be Migrated?", + "githuburl":"" + }, + { + "uri":"dbss_01_0224.html", + "product_code":"dbss", + "code":"57", + "des":"The operation logs of database audit are permanently saved.", + "doc_type":"usermanual", + "kw":"How Long Are the Operation Logs of Database Audit Saved by Default?,Logs,User Guide", + "title":"How Long Are the Operation Logs of Database Audit Saved by Default?", + "githuburl":"" + }, + { + "uri":"dbss_01_0309.html", + "product_code":"dbss", + "code":"58", + "des":"To check the operation logs of database audit, perform the following steps:Select Last 30 minutes, 1 hour, 24 hours, 7 days, or 30 days, or click to set start time and e", + "doc_type":"usermanual", + "kw":"How Do I Check the Operation Logs of Database Audit?,Logs,User Guide", + "title":"How Do I Check the Operation Logs of Database Audit?", + "githuburl":"" + }, + { + "uri":"dbss_01_0284.html", + "product_code":"dbss", + "code":"59", + "des":"Database audit logs are stored in a log database and processed based on disk usage.If the disk usage of the log database is 85% or higher, the system automatically delete", + "doc_type":"usermanual", + "kw":"How Does Database Audit Process Logs?,Logs,User Guide", + "title":"How Does Database Audit Process Logs?", + "githuburl":"" + }, + { + "uri":"dbss_01_0226.html", + "product_code":"dbss", + "code":"60", + "des":"Database audit supports manual backup and automatic backup. Audit logs are backed up to OBS. Buckets will be automatically created and will incur a separate bill.Perform ", + "doc_type":"usermanual", + "kw":"How Do I Back Up the Database Audit Logs?,Logs,User Guide", + "title":"How Do I Back Up the Database Audit Logs?", + "githuburl":"" + }, + { + "uri":"dbss_03_0001.html", + "product_code":"dbss", + "code":"61", + "des":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "doc_type":"usermanual", + "kw":"Best Practices", + "title":"Best Practices", + "githuburl":"" + }, + { + "uri":"dbss_06_0020.html", + "product_code":"dbss", + "code":"62", + "des":"This section describes how to audit the security of a relational database instance. (Applications connected to this DB instance are deployed on ECS.) DBSS can audit certa", + "doc_type":"usermanual", + "kw":"Auditing an RDS DB Instance (Without Agents),Best Practices,User Guide", + "title":"Auditing an RDS DB Instance (Without Agents)", + "githuburl":"" + } +] \ No newline at end of file diff --git a/docs/dbss/umn/CLASS.TXT.json b/docs/dbss/umn/CLASS.TXT.json new file mode 100644 index 00000000..f1abd249 --- /dev/null +++ b/docs/dbss/umn/CLASS.TXT.json @@ -0,0 +1,560 @@ +[ + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"dbss", + "title":"Overview", + "uri":"dbss_01_0138.html", + "doc_type":"usermanual", + "p_code":"", + "code":"1" + }, + { + "desc":"Database Security Service (DBSS) is an intelligent database security service. Based on the machine learning mechanism and big data analytics technologies, it can audit yo", + "product_code":"dbss", + "title":"DBSS", + "uri":"dbss_01_0001.html", + "doc_type":"usermanual", + "p_code":"1", + "code":"2" + }, + { + "desc":"Database audit delivers functions such as user behavior detection and audit, multi-dimensional lead analysis, real-time alarms, and reports.User Behavior Detection and Au", + "product_code":"dbss", + "title":"Functions", + "uri":"dbss_01_0237.html", + "doc_type":"usermanual", + "p_code":"1", + "code":"3" + }, + { + "desc":"Database audit provides you with the database audit function in out-of-path pattern, enabling the system to generate real-time alarms for risky operations. In addition, d", + "product_code":"dbss", + "title":"Advantages", + "uri":"dbss_01_0238.html", + "doc_type":"usermanual", + "p_code":"1", + "code":"4" + }, + { + "desc":"Database audit is deployed in out-of-path pattern. It can audit databases built on ECS, BMS and RDS on the management console.Figure 1 shows the database audit deployment", + "product_code":"dbss", + "title":"Deployment Architecture", + "uri":"dbss_01_0181.html", + "doc_type":"usermanual", + "p_code":"1", + "code":"5" + }, + { + "desc":"Database audit provides basic, professional, and advanced editions. You can select one of them as needed.Table 1 describes the database audit editions.Database audit edit", + "product_code":"dbss", + "title":"Editions", + "uri":"dbss_01_0268.html", + "doc_type":"usermanual", + "p_code":"1", + "code":"6" + }, + { + "desc":"Database audit is subject to certain constraints.The following types of databases on the management console can be audited in out-of-path mode:RDS instancesDatabases buil", + "product_code":"dbss", + "title":"Constraints", + "uri":"dbss_01_0313.html", + "doc_type":"usermanual", + "p_code":"1", + "code":"7" + }, + { + "desc":"Before using the database audit function, you need to apply for a database audit instance.Ensure the VPC of the database audit instance is the same as that of the node (a", + "product_code":"dbss", + "title":"Applying for a Database Audit Instance", + "uri":"dbss_01_0185.html", + "doc_type":"usermanual", + "p_code":"", + "code":"8" + }, + { + "desc":"Database audit supports databases built on ECS, BMS, and RDS on the console. After applying for a database audit instance, you need to add the database to be audited to t", + "product_code":"dbss", + "title":"Step 1: Add a Database", + "uri":"dbss_01_0186.html", + "doc_type":"usermanual", + "p_code":"", + "code":"9" + }, + { + "desc":"By default, database audit complies with a full audit rule, which is used to audit all databases that are connected to the database audit instance. You can enable audit a", + "product_code":"dbss", + "title":"Step 2: Enable Database Audit", + "uri":"dbss_01_0356.html", + "doc_type":"usermanual", + "p_code":"", + "code":"10" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"dbss", + "title":"Step 3: View Audit Results", + "uri":"dbss_01_0253.html", + "doc_type":"usermanual", + "p_code":"", + "code":"11" + }, + { + "desc":"After connecting the database to the database audit instance, view SQL statements of the database.You have applied for a database audit instance and the Status is Running", + "product_code":"dbss", + "title":"Viewing SQL Statement Details", + "uri":"dbss_01_0205.html", + "doc_type":"usermanual", + "p_code":"11", + "code":"12" + }, + { + "desc":"After connecting the database to the database audit instance, view session distribution of the database.You have applied for a database audit instance and the Status is R", + "product_code":"dbss", + "title":"Viewing Session Distribution", + "uri":"dbss_01_0206.html", + "doc_type":"usermanual", + "p_code":"11", + "code":"13" + }, + { + "desc":"After connecting the database to the database audit instance, view the audit statistics, including the overall audit statistics, risk distribution, session statistics, an", + "product_code":"dbss", + "title":"Viewing the Audit Dashboard", + "uri":"dbss_01_0204.html", + "doc_type":"usermanual", + "p_code":"11", + "code":"14" + }, + { + "desc":"By default, database audit complies with a full audit rule, which is used to audit all databases that are successfully connected to the database audit instance. After con", + "product_code":"dbss", + "title":"Viewing Audit Reports", + "uri":"dbss_01_0248.html", + "doc_type":"usermanual", + "p_code":"11", + "code":"15" + }, + { + "desc":"By default, database audit complies with a full audit rule, which is used to audit all databases that are successfully connected to database audit. You can also add audit", + "product_code":"dbss", + "title":"Adding Audit Scope", + "uri":"dbss_01_0190.html", + "doc_type":"usermanual", + "p_code":"", + "code":"16" + }, + { + "desc":"You can add SQL injection rules to audit your databases.You have purchased a database audit instance and the Status is Running.You have added a database and enabled datab", + "product_code":"dbss", + "title":"Adding an SQL Injection Rule", + "uri":"dbss_01_0362.html", + "doc_type":"usermanual", + "p_code":"", + "code":"17" + }, + { + "desc":"SQL injection detection is enabled by default. You can disable or enable the detection rules.One piece of audited data can match only one SQL injection detection rule.You", + "product_code":"dbss", + "title":"Enabling or Disabling SQL Injection Detection", + "uri":"dbss_01_0191.html", + "doc_type":"usermanual", + "p_code":"", + "code":"18" + }, + { + "desc":"After enabling database audit, add and configure risky operations for audit.One piece of audited data can match only one risky operation rule.You have applied for a datab", + "product_code":"dbss", + "title":"Adding Risky Operations", + "uri":"dbss_01_0192.html", + "doc_type":"usermanual", + "p_code":"", + "code":"19" + }, + { + "desc":"To mask sensitive information in entered SQL statements, you can enable the function of masking privacy data and configure masking rules to prevent sensitive information ", + "product_code":"dbss", + "title":"Configuring Privacy Data Protection Rules", + "uri":"dbss_01_0266.html", + "doc_type":"usermanual", + "p_code":"", + "code":"20" + }, + { + "desc":"After configuring alarm notifications, you can receive DBSS alarms on database risks. If this function is not enabled, you have to log in to the management console to vie", + "product_code":"dbss", + "title":"Configuring Alarm Notifications", + "uri":"dbss_01_0239.html", + "doc_type":"usermanual", + "p_code":"", + "code":"21" + }, + { + "desc":"This section describes how to view the system monitoring of database audit and learn about system resources and traffic usage.You have applied for a database audit instan", + "product_code":"dbss", + "title":"Viewing the System Monitoring", + "uri":"dbss_01_0208.html", + "doc_type":"usermanual", + "p_code":"", + "code":"22" + }, + { + "desc":"This section describes how to view and confirm alarms of database audit.You have applied for a database audit instance and the Status is Running.Database audit has been e", + "product_code":"dbss", + "title":"Viewing the Alarms", + "uri":"dbss_01_0252.html", + "doc_type":"usermanual", + "p_code":"", + "code":"23" + }, + { + "desc":"Before restarting and disabling an instance, ensure that its Status is Running.You can click the name of an instance to view its overview.Select an instance status from t", + "product_code":"dbss", + "title":"Managing Database Audit Instances", + "uri":"dbss_01_0213.html", + "doc_type":"usermanual", + "p_code":"", + "code":"24" + }, + { + "desc":"This section describes how to view the instance overview, including the basic information, network settings and associated databases.You have applied for a database audit", + "product_code":"dbss", + "title":"Viewing the Instance Overview", + "uri":"dbss_01_0203.html", + "doc_type":"usermanual", + "p_code":"", + "code":"25" + }, + { + "desc":"After adding an audit scope, you can view, enable, edit, disable, or delete the audit scope.The audit scope has been added.Before enabling, editing, or deleting the audit", + "product_code":"dbss", + "title":"Management an Audit Scope", + "uri":"dbss_01_0200.html", + "doc_type":"usermanual", + "p_code":"", + "code":"26" + }, + { + "desc":"This section describes how to view SQL injection detection information of a database audit instance.Database audit has been enabled.Select a risk severity from the All ri", + "product_code":"dbss", + "title":"Viewing Information About SQL Injection Detection", + "uri":"dbss_01_0207.html", + "doc_type":"usermanual", + "p_code":"", + "code":"27" + }, + { + "desc":"After adding a risky operation, you can view the risk, enable, edit, disable, or delete the risky operation, or set its priority.The risky operation has been added.Before", + "product_code":"dbss", + "title":"Managing Risky Operations", + "uri":"dbss_01_0201.html", + "doc_type":"usermanual", + "p_code":"", + "code":"28" + }, + { + "desc":"You can view, enable, edit, disable, or delete data masking rules.Store Result SetYou are advised to disable . After this function is disabled, database audit will not st", + "product_code":"dbss", + "title":"Managing Privacy Data Protection Rules", + "uri":"dbss_01_0267.html", + "doc_type":"usermanual", + "p_code":"", + "code":"29" + }, + { + "desc":"By default, database audit complies with a full audit rule, which is used to audit all databases that are successfully connected to the database audit instance. After con", + "product_code":"dbss", + "title":"Managing Audit Reports", + "uri":"dbss_01_0196.html", + "doc_type":"usermanual", + "p_code":"", + "code":"30" + }, + { + "desc":"After backing up audit logs, you can view or delete backup audit logs.Database audit has been enabled.You have backed up audit logs.Click in the upper right corner of th", + "product_code":"dbss", + "title":"Managing Backup Audit Logs", + "uri":"dbss_01_0197.html", + "doc_type":"usermanual", + "p_code":"", + "code":"31" + }, + { + "desc":"This section describes how to view operation logs of a database audit instance.Select Last 30 minutes, 1 hour, 24 hours, 7 days, or 30 days, or click to set start time a", + "product_code":"dbss", + "title":"Viewing Operation Logs", + "uri":"dbss_01_0209.html", + "doc_type":"usermanual", + "p_code":"", + "code":"32" + }, + { + "desc":"You can add tags to database audit instances for easy management.You have applied for a database audit instance and the Status is Running.Up to 10 tags can be added to ea", + "product_code":"dbss", + "title":"Adding a Database Instance Tag", + "uri":"dbss_01_0409.html", + "doc_type":"usermanual", + "p_code":"", + "code":"33" + }, + { + "desc":"After you enable CTS, the system starts recording operations on DBSS. Operation records for the last seven days can be viewed on the CTS console.The following four filter", + "product_code":"dbss", + "title":"Viewing Tracing Logs", + "uri":"dbss_01_0144.html", + "doc_type":"usermanual", + "p_code":"", + "code":"34" + }, + { + "desc":"Cloud Trace Service (CTS) records all cloud service operations on DBSS, including requests initiated from the management console or open APIs and responses to the request", + "product_code":"dbss", + "title":"Auditable Operations", + "uri":"dbss_01_0142.html", + "doc_type":"usermanual", + "p_code":"", + "code":"35" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"dbss", + "title":"FAQs", + "uri":"dbss_01_0097.html", + "doc_type":"usermanual", + "p_code":"", + "code":"36" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"dbss", + "title":"Functions", + "uri":"dbss_01_0269.html", + "doc_type":"usermanual", + "p_code":"36", + "code":"37" + }, + { + "desc":"No. Your databases are audited in out-of-path mode. Database audit neither affects your services nor conflicts with local audit tools.", + "product_code":"dbss", + "title":"Does Database Audit (in Bypass Mode) Affect My Services?", + "uri":"dbss_01_0290.html", + "doc_type":"usermanual", + "p_code":"37", + "code":"38" + }, + { + "desc":"Monitors database login, operation type (data definition, operation, and control), and operation object based on risky operations to effectively audit the database.Analyz", + "product_code":"dbss", + "title":"What Are the Functions of Database Audit?", + "uri":"dbss_01_0215.html", + "doc_type":"usermanual", + "p_code":"37", + "code":"39" + }, + { + "desc":"Yes. In bidirectional audit, both requests and responses to the database are audited.Bidirectional audit is used for database audit by default.", + "product_code":"dbss", + "title":"Does Database Audit Support Bidirectional Audit?", + "uri":"dbss_01_0221.html", + "doc_type":"usermanual", + "p_code":"37", + "code":"40" + }, + { + "desc":"No. Applications using TLS are encrypted.", + "product_code":"dbss", + "title":"Can Applications Using TLS Connections Be Audited?", + "uri":"dbss_01_0312.html", + "doc_type":"usermanual", + "p_code":"37", + "code":"41" + }, + { + "desc":"Database audit can store online and archived audit data for at least 180 days.", + "product_code":"dbss", + "title":"How Long Is the Database Audit Data Stored by Default?", + "uri":"dbss_01_0225.html", + "doc_type":"usermanual", + "p_code":"37", + "code":"42" + }, + { + "desc":"When database audit is running properly, if an exception occurs, you will receive an alarm notification within 5 minutes.If you set alarm notifications, when database aud", + "product_code":"dbss", + "title":"How Soon Can I Receive an Alarm Notification If an Exception Occurs in Database Audit?", + "uri":"dbss_01_0228.html", + "doc_type":"usermanual", + "p_code":"37", + "code":"43" + }, + { + "desc":"Yes. One alarm message corresponds to one email notification.", + "product_code":"dbss", + "title":"Is the Total Number Of Alarms Every Day the Same as that of Emails?", + "uri":"dbss_01_0229.html", + "doc_type":"usermanual", + "p_code":"37", + "code":"44" + }, + { + "desc":"To preview a report online, use Google Chrome or Mozilla FireFox.", + "product_code":"dbss", + "title":"Why I Cannot Preview the Database Security Audit Report Online?", + "uri":"dbss_01_0289.html", + "doc_type":"usermanual", + "p_code":"37", + "code":"45" + }, + { + "desc":"No.Middleware is a type of software deployed between applications and software including OSs, networks, and databases. Middleware provides an environment for application ", + "product_code":"dbss", + "title":"If I Use Middleware at the Service Side, Will It Affect Database Audit?", + "uri":"dbss_01_0347.html", + "doc_type":"usermanual", + "p_code":"37", + "code":"46" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"dbss", + "title":"Operations", + "uri":"dbss_01_0114.html", + "doc_type":"usermanual", + "p_code":"36", + "code":"47" + }, + { + "desc":"If SSL is enabled for a database, the database cannot be audited. To use database audit, disable SSL first.The MySQL database client is used as an example. Perform the fo", + "product_code":"dbss", + "title":"How Do I Disable SSL for a Database?", + "uri":"dbss_01_0283.html", + "doc_type":"usermanual", + "p_code":"47", + "code":"48" + }, + { + "desc":"To check the version of database audit, perform the following steps:", + "product_code":"dbss", + "title":"How Do I Check the Version of Database Audit?", + "uri":"dbss_01_0233.html", + "doc_type":"usermanual", + "p_code":"47", + "code":"49" + }, + { + "desc":"To check the alarms of database audit, perform the following steps:Select Last 30 minutes, 1 hour, 24 hours, 7 days, or 30 days for Time, and click to view alarms of the", + "product_code":"dbss", + "title":"How Do I View All Alarms in Database Audit?", + "uri":"dbss_01_0234.html", + "doc_type":"usermanual", + "p_code":"47", + "code":"50" + }, + { + "desc":"If your PC accesses RDS through a private line, you can install the agent on a proxy your set up. Access from the proxy to the database can be audited. Access from applic", + "product_code":"dbss", + "title":"How Do I Audit an RDS Database Accessed through Intranet (by Applications Off the Cloud)?", + "uri":"dbss_01_0300.html", + "doc_type":"usermanual", + "p_code":"47", + "code":"51" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"dbss", + "title":"Troubleshooting", + "uri":"dbss_01_0323.html", + "doc_type":"usermanual", + "p_code":"36", + "code":"52" + }, + { + "desc":"The functions of the database audit instance are normal. When there is database traffic, audit information about the executed SQL statement cannot be found in the SQL sta", + "product_code":"dbss", + "title":"Database Audit Is Running Properly But Generates No Audit Records", + "uri":"dbss_01_0256.html", + "doc_type":"usermanual", + "p_code":"52", + "code":"53" + }, + { + "desc":"After the database traffic is triggered, you cannot find the audit information about an executed statement in the SQL statement list.In this case, perform the following o", + "product_code":"dbss", + "title":"Database Audit Is Unavailable", + "uri":"dbss_01_0235.html", + "doc_type":"usermanual", + "p_code":"52", + "code":"54" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"dbss", + "title":"Logs", + "uri":"dbss_01_0341.html", + "doc_type":"usermanual", + "p_code":"36", + "code":"55" + }, + { + "desc":"No. Database audit does not support migrating database operation logs.You can view the operation logs of database audit. For details, see How Long Are the Operation Logs ", + "product_code":"dbss", + "title":"Can the Operation Logs of Database Audit Be Migrated?", + "uri":"dbss_01_0227.html", + "doc_type":"usermanual", + "p_code":"55", + "code":"56" + }, + { + "desc":"The operation logs of database audit are permanently saved.", + "product_code":"dbss", + "title":"How Long Are the Operation Logs of Database Audit Saved by Default?", + "uri":"dbss_01_0224.html", + "doc_type":"usermanual", + "p_code":"55", + "code":"57" + }, + { + "desc":"To check the operation logs of database audit, perform the following steps:Select Last 30 minutes, 1 hour, 24 hours, 7 days, or 30 days, or click to set start time and e", + "product_code":"dbss", + "title":"How Do I Check the Operation Logs of Database Audit?", + "uri":"dbss_01_0309.html", + "doc_type":"usermanual", + "p_code":"55", + "code":"58" + }, + { + "desc":"Database audit logs are stored in a log database and processed based on disk usage.If the disk usage of the log database is 85% or higher, the system automatically delete", + "product_code":"dbss", + "title":"How Does Database Audit Process Logs?", + "uri":"dbss_01_0284.html", + "doc_type":"usermanual", + "p_code":"55", + "code":"59" + }, + { + "desc":"Database audit supports manual backup and automatic backup. Audit logs are backed up to OBS. Buckets will be automatically created and will incur a separate bill.Perform ", + "product_code":"dbss", + "title":"How Do I Back Up the Database Audit Logs?", + "uri":"dbss_01_0226.html", + "doc_type":"usermanual", + "p_code":"55", + "code":"60" + }, + { + "desc":"HUAWEI CLOUD Help Center presents technical documents to help you quickly get started with HUAWEI CLOUD services. The technical documents include Service Overview, Price Details, Purchase Guide, User Guide, API Reference, Best Practices, FAQs, and Videos.", + "product_code":"dbss", + "title":"Best Practices", + "uri":"dbss_03_0001.html", + "doc_type":"usermanual", + "p_code":"", + "code":"61" + }, + { + "desc":"This section describes how to audit the security of a relational database instance. (Applications connected to this DB instance are deployed on ECS.) DBSS can audit certa", + "product_code":"dbss", + "title":"Auditing an RDS DB Instance (Without Agents)", + "uri":"dbss_06_0020.html", + "doc_type":"usermanual", + "p_code":"61", + "code":"62" + } +] \ No newline at end of file diff --git a/docs/dbss/umn/PARAMETERS.txt b/docs/dbss/umn/PARAMETERS.txt new file mode 100644 index 00000000..6da8d5f0 --- /dev/null +++ b/docs/dbss/umn/PARAMETERS.txt @@ -0,0 +1,3 @@ +version="" +language="en-us" +type="" \ No newline at end of file diff --git a/docs/dbss/umn/dbss_01_0001.html b/docs/dbss/umn/dbss_01_0001.html new file mode 100644 index 00000000..d126f7b6 --- /dev/null +++ b/docs/dbss/umn/dbss_01_0001.html @@ -0,0 +1,34 @@ + + +
Database Security Service (DBSS) is an intelligent database security service. Based on the machine learning mechanism and big data analytics technologies, it can audit your databases, detect SQL injection attacks, and identify high-risk operations.
+Database Type + |
+Edition + |
+
---|---|
GaussDB(for MYSQL) + |
+MYSQL 8.0 + |
+
Cloud Trace Service (CTS) records all cloud service operations on DBSS, including requests initiated from the management console or open APIs and responses to the requests, for tenants to query, audit, and trace.
+Table 1 lists DBSS operations recorded by CTS.
+ +Operation + |
+Resource Type + |
+Trace Name + |
+
---|---|---|
Creating an instance + |
+dbss + |
+createInstance + |
+
Deleting an instance + |
+dbss + |
+deleteInstance + |
+
Starting an instance + |
+dbss + |
+startInstance + |
+
Stopping an instance + |
+dbss + |
+stopInstance + |
+
Restarting an instance + |
+dbss + |
+rebootInstance + |
+
After you enable CTS, the system starts recording operations on DBSS. Operation records for the last seven days can be viewed on the CTS console.
+Database audit is deployed in out-of-path pattern. It can audit databases built on ECS, BMS and RDS on the management console.
+Figure 1 shows the database audit deployment architecture.
+ +The agent deployment for database audit is as follows:
+Before using the database audit function, you need to apply for a database audit instance.
+Ensure the VPC of the database audit instance is the same as that of the node (application side or database side) where you plan to install the database audit agent. Otherwise, the instance will be unable to connect to the agent or perform audit.
+Database audit works in out-of-path mode, which neither affects user services nor conflicts with the local audit tools.
++
Parameter + |
+Description + |
+Example Value + |
+
---|---|---|
VPC + |
+You can select an existing VPC, or click View VPC to create one. + NOTE:
+
For more information about VPC, see Virtual Private Cloud User Guide. + |
+vpc-sec + |
+
Security Group + |
+The security group configured for the instance is displayed on the page. Once a security group is selected for an instance, the instance is protected by the access rules of this security group. +For more information about security groups, see Virtual Private Cloud User Guide. + |
+sg + |
+
Subnet + |
+The Subnet drop-down list displays all available subnets. +For more information about subnets, see Virtual Private Cloud User Guide. + |
+public_subnet + |
+
Instance Name + |
+Custom name of the instance + |
+DBSS-test + |
+
On the Instances page, you can view the created database audit instance.
+If the Status is Running, you have successfully applied for the database audit instance.
+Database audit supports databases built on ECS, BMS, and RDS on the console. After applying for a database audit instance, you need to add the database to be audited to the instance.
+You have applied for a database audit instance and the Status is Running.
+Parameter + |
+Description + |
+Example + |
+
---|---|---|
Database Type + |
+Supported database type. You can select RDS. + |
+RDS database + |
+
Database Type + |
+Supported database type. You can select GaussDB(for MySQL). +You do not need to install an agent on the database. + |
+GaussDB(for MySQL) + |
+
By default, database audit complies with a full audit rule, which is used to audit all databases that are successfully connected to database audit. You can also add audit scope and specify the databases to be audited.
+By default, the full audit rule takes effect even if other rules exist. To make another audit rule take effect, disable the full audit rule first.
+Parameter + |
+Description + |
+Example Value + |
+
---|---|---|
Name + |
+Name of the custom audit scope + |
+audit00 + |
+
Database Name + |
+Database to be added to the audit scope + |
+db03 + |
+
Operations + |
+Audited operation type. It can be Login or Operation. +When you select the Operation check box, you can select All operations or the operations in DDL, DML, and DCL. + |
+Login + |
+
Database Account + |
+(Optional) Database username. +You can specify multiple accounts, separated by commas (,). + |
+- + |
+
Exception IP Address + |
+(Optional) IP addresses that do not need to be audited. + NOTE:
+If an IP address is set as both a source and an exception IP address, the IP address will not be audited. + |
+- + |
+
Source IP Address + |
+(Optional) IP address or IP address range used for accessing the database to be audited + |
+- + |
+
Source Port + |
+(Optional) Port number used for accessing the database to be audited + |
+- + |
+
When the audit scope is added successfully, it is displayed in the audit scope list in the state of Enabled.
+In addition to adding the audit scope, you can enable or disable SQL injection detection and add risky operations to set audit rules for database audit.
+SQL injection detection is enabled by default. You can disable or enable the detection rules.
+One piece of audited data can match only one SQL injection detection rule.
+SQL injection detection is enabled by default. You can disable the detection rules as required. When an SQL injection detection rule is disabled, the audit rule does not take effect.
+Only user-defined rules can be edited and deleted. Default rules can only be enabled and disabled.
+When the status of an SQL injection detection rule is Disabled, SQL injection detection is disabled successfully.
+Parameter + |
+Description + |
+Example Value + |
+
---|---|---|
Name + |
+Name of an SQL rule. + |
+Postal Code SQL injection Rule + |
+
Risk Level + |
+Level of risks matching a SQL rule. Its value can be: +
|
+Moderate + |
+
Status + |
+Enables or disables an SQL injection rule. +
|
+
+ |
+
Test Regular Expression + |
+Regular expression that checks for content in certain pattern. + |
+^\d{6}$ + |
+
Data + |
+Content that matches the regular expression. +Enter content and click Test to verify that the regular expression works properly. + |
+628307 + |
+
Result + |
+Test result. It can be: +
|
+Hit + |
+
When the status of an SQL injection detection rule is Enabled, SQL injection detection is enabled successfully.
+After enabling database audit, add and configure risky operations for audit.
+One piece of audited data can match only one risky operation rule.
+Parameter + |
+Description + |
+Example Value + |
+
---|---|---|
Name + |
+Custom name of a risky operation + |
+test + |
+
Risk Severity + |
+Severity of a risky operation. The options are as follows: +
|
+High + |
+
Status + |
+Status of a risky operation +
|
+
+
+ |
+
Select Database + |
+Database that the risky operation will be applied to +You can select ALL or a specific database. + |
+- + |
+
Client IP Address or IP Range + |
+IP address or IP address range of the client +The IP address can be an IPv4 address (for example, 192.168.1.1) or an IPv6 address (for example, fe80:0000:0000:0000:0000:0000:0000:0000). + |
+192.168.0.0 + |
+
Parameter + |
+Description + |
+Example Value + |
+
---|---|---|
Operations + |
+Type of a risky operation, including Login and Operation +When you select the Operation check box, you can select All operations or the operations in DDL, DML, and DCL. + |
+Operation + |
+
Objects + |
+Enter the target database, target table, and field information after clicking Add Operation Object. Click OK to add an operation object. + |
+- + |
+
Results + |
+Set Affected Rows and Operation Duration. The operation conditions are as follows: +
|
+- + |
+
By default, database audit complies with a full audit rule, which is used to audit all databases that are successfully connected to the database audit instance. After connecting the database to the database audit instance, view report templates and report results.
+After backing up audit logs, you can view or delete backup audit logs.
+Click in the upper right corner of the list and select the start time and end time to view backup logs in a specified time range.
Parameter + |
+Description + |
+
---|---|
Log Name + |
+Name of a log, which is automatically generated + |
+
Backup Time + |
+Time when a log is backed up + |
+
File Size + |
+Log file size + |
+
Backup Mode + |
+Log backup mode. + |
+
Backup Scope + |
+Backup time window + |
+
Task Status + |
+Backup status of a log + |
+
Locate the row that contains the log to be deleted, click Delete in the Operation column, and click OK in the displayed dialog box.
+After adding an audit scope, you can view, enable, edit, disable, or delete the audit scope.
+By default, database audit complies with a full audit rule, which is used to audit all databases that are connected to the database audit instance. This audit rule is enabled by default. You can disable it but cannot delete it.
+Enter the key word of an audit scope to search.
+Parameter + |
+Description + |
+
---|---|
Name + |
+Name of the audit scope + |
+
Exception IP Address + |
+Whitelisted IP addresses within the audit scope + |
+
Source IP Address + |
+IP address or IP address range used for accessing the database + |
+
Source Port + |
+Port number of the IP address to be audited + |
+
Database Name + |
+Database in the audit scope + |
+
Database Account + |
+Database username + |
+
Status + |
+Status of the audit scope. The options are as follows: +
|
+
You can perform the following operations on audit scopes as required:
+Locate the row that contains the audit scope to be enabled, and click Enable in the Operation column. Databases within the scope will be audited.
+Locate the row that contains the audit scope to be edited, click Edit in the Operation column, and modify the scope in the displayed dialog box.
+Locate the row that contains the audit scope to be disabled, click Disable in the Operation column, and click OK in the displayed dialog box. When the audit scope is disabled, the audit scope rule will not be executed in the audit.
+Locate the row that contains the audit scope to be deleted, click Delete in the Operation column, and click OK in the displayed dialog box. You need to add the audit scope again if it is deleted and you want to audit it.
+After adding a risky operation, you can view the risk, enable, edit, disable, or delete the risky operation, or set its priority.
+Select a risk severity from the All risk severities drop-down list in the upper right corner of the list, or enter a key word of a risky operation name to search.
+Parameter + |
+Description + |
+
---|---|
Name + |
+Name of the risky operation + |
+
Category + |
+Category of the risky operation + |
+
Feature + |
+Feature of the risky operation + |
+
Risk Severity + |
+Risk severity of the risky operation. The options are as follows: +
|
+
Status + |
+Status of the risky operation. The options are as follows: +
|
+
You can perform the following operations on risky operations as required:
+Locate the row that contains the risky operation to be enabled, and click Enable in the Operation column. The operation will be audited.
+Locate the row that contains the risky operation to be edited, click Edit in the Operation column, and modify the operation in the displayed dialog box.
+Locate the row that contains the risky operation to be disabled, click Disable in the Operation column, and click OK in the displayed dialog box. When a risky operation is disabled, the risky operation rule will not be executed in the audit.
+Locate the row that contains the risky operation to be deleted, click Delete in the Operation column, and click OK in the displayed dialog box. You need to add the risky operation again if a risky operation is deleted and you need to audit its rule.
+This section describes how to view the instance overview, including the basic information, network settings and associated databases.
+You have applied for a database audit instance and the Status is Running.
+Category + |
+Parameter + |
+Description + |
+
---|---|---|
Basic Info + + |
+Name + |
+Instance name. You can click |
+
Status + |
+Running status of an instance. The options are as follows: +
|
+|
ID + |
+Instance ID, which is automatically generated + |
+|
AZ + |
+Availability Zone (AZ) where an instance resides + |
+|
Version + |
+Version of the DBSS instance when you create the DBSS instance. The version of the DBSS instance created at different time may be different. +Impact scope of DBSS instance versions: +
|
+|
Remarks + |
+Remarks about an instance. You can click |
+|
Edition + |
+Edition of an instance + |
+|
Created + |
+Time when an instance is created + |
+|
Network Settings + |
+VPC + |
+VPC where an instance resides + |
+
Security Group + |
+Security group where an instance resides + |
+|
Subnet + |
+Subnet where an instance resides + |
+|
Private IP Address + |
+IP address of an instance + |
+|
Associated Database + |
+- + |
+Database information associated with an instance +Click Manage Database, and the Databases page is displayed. + |
+
After connecting the database to the database audit instance, view the audit statistics, including the overall audit statistics, risk distribution, session statistics, and SQL distribution.
+After connecting the database to the database audit instance, view SQL statements of the database.
+To query a specified SQL statement, perform the following steps:
+A maximum of 10,000 records can be retrieved in a query.
+The maximum length of an audit statement or result set is 10,240 bytes. Excessive parts are not recorded in audit logs.
+Parameter + |
+Description + |
+
---|---|
Session ID + |
+ID of an SQL statement, which is automatically generated + |
+
Database Instance + |
+Database where an SQL statement is executed + |
+
Database Type + |
+Type of the database where an SQL statement is executed + |
+
Database User + |
+Database user for executing an SQL statement + |
+
Client MAC Address + |
+MAC address of the client where an SQL statement is executed + |
+
Database MAC Address + |
+MAC address of the database where an SQL statement is executed + |
+
Client IP Address + |
+IP address of the client where an SQL statement is executed + |
+
Database IP Address/Domain Name + |
+IP address or the domain name of the database where an SQL statement is executed + |
+
Client Port + |
+Port of the client where an SQL statement is executed + |
+
Database Port + |
+Port of the database where the SQL statement is executed + |
+
Client Name + |
+Name of the client where an SQL statement is executed + |
+
Operation Type + |
+Type of an SQL statement operation + |
+
Operation Object Type + |
+Type of an SQL statement operation object + |
+
Response Result + |
+Response by executing an SQL statement + |
+
Affected Rows + |
+Number of rows affected by executing an SQL statement + |
+
Started + |
+Time when an SQL statement starts to be executed + |
+
Ended + |
+Time when the SQL statement execution ends + |
+
SQL Statement + |
+Name of an SQL statement + |
+
Request Result + |
+Result of requesting for executing an SQL statement + |
+
After connecting the database to the database audit instance, view session distribution of the database.
+This section describes how to view SQL injection detection information of a database audit instance.
+Parameter + |
+Description + |
+
---|---|
Name + |
+Name of the SQL injection detection + |
+
Command Feature + |
+Command features of the SQL injection detection + |
+
Risk Severity + |
+Risk level of the SQL injection detection. The options are as follows: +
|
+
Status + |
+Status of the SQL injection detection. The options are as follows: +
|
+
Operation + |
+Operations on an SQL injection rule. The options are as follows: +
|
+
This section describes how to view the system monitoring of database audit and learn about system resources and traffic usage.
+Select Last 30 minutes, 1 hour, 24 hours, 7 days, or 30 days, or click to customize start time and end time to view the system monitoring information of the specified time range.
This section describes how to view operation logs of a database audit instance.
+Select Last 30 minutes, 1 hour, 24 hours, 7 days, or 30 days, or click to set start time and end time to view the operation logs of a specified time range.
Parameter + |
+Description + |
+
---|---|
Username + |
+User who performs the operation + |
+
Time + |
+Time when the operation was performed + |
+
Function + |
+Function of the operation + |
+
Action + |
+Action of the operation + |
+
Operation Object + |
+Object of the operation + |
+
Description + |
+Description of the operation + |
+
Result + |
+Result of the operation + |
+
Parameter + |
+Description + |
+
---|---|
Instance Name/ID + |
+Name and ID of an instance. Instance ID is automatically generated. + |
+
Specifications + |
+Edition of an instance + |
+
Status + |
+Running status of an instance. The options are as follows: +
|
+
Associated Databases/Total Databases + |
+Number of databases an instance has associated with and Number of databases an instance supports + |
+
Operation + |
+Operations can be performed on the instance. The options are as follows: +
|
+
You can perform the following operations on instances as required:
+Locate the row that contains the desired instance, choose More > Restart in the Operation column, and click OK in the displayed dialog box.
+Locate the row that contains the desired instance, choose More > Enable in the Operation column, and click OK in the displayed dialog box.
+Locate the row that contains the desired instance, choose More > Disable in the Operation column, and click OK in the displayed dialog box. When an instance is disabled, the audit function is disabled for the databases on the instance.
+Locate the row that contains the instance that failed to be created, choose More > Delete in the Operation column, and click Delete in the displayed dialog box. Deleted instances will not be displayed in the instance list.
+Locate the row that contains the instance that failed to be created, choose More > View Details in the Operation column. In the dialog box that is displayed, view the instance creation failure details.
+Yes. In bidirectional audit, both requests and responses to the database are audited.
+Bidirectional audit is used for database audit by default.
+The operation logs of database audit are permanently saved.
+Database audit can store online and archived audit data for at least 180 days.
+Database audit supports manual backup and automatic backup. Audit logs are backed up to OBS. Buckets will be automatically created and will incur a separate bill.
+Perform the following operations to automatically back up audit logs.
+Parameter + |
+Description + |
+Example Value + |
+
---|---|---|
Automatic Backup + |
+Status of automatic backup +
|
+
+
+
+ |
+
Backup Period + |
+Automatic backup period. Its options are as follows: +
|
+Daily + |
+
Started + |
+Start time of the backup. Click |
+2020/01/14 20:27:08 + |
+
Bucket Name + |
+Name of the OBS bucket used for backup. Its options are as follows: +
NOTE:
+
|
+20f18-7a5a-4042 + |
+
Export Directory + |
+Directory for storing backup files in the OBS bucket. + |
+test + |
+
After the automatic backup function is configured, new data in the database will be backed up one hour later. Then you can view the backup information.
+No. Database audit does not support migrating database operation logs.
+You can view the operation logs of database audit. For details, see How Long Are the Operation Logs of Database Audit Saved by Default?
+When database audit is running properly, if an exception occurs, you will receive an alarm notification within 5 minutes.
+If you set alarm notifications, when database audit is running properly, the system generates an alarm notification when a metric of a database audit instance resource (CPU, memory, or disk) exceeds the alarm threshold. You can receive the notification within about 5 minutes.
+Yes. One alarm message corresponds to one email notification.
+To check the version of database audit, perform the following steps:
+To check the alarms of database audit, perform the following steps:
+After the database traffic is triggered, you cannot find the audit information about an executed statement in the SQL statement list.
+In this case, perform the following operations to troubleshoot the problem:
+ +service audit_agent restart
+tailf /opt/dbss_audit_agent/log/audit_agent.log
+Click next to the database to view the information of its agent, and record Installing Node IP Address.
Database audit delivers functions such as user behavior detection and audit, multi-dimensional lead analysis, real-time alarms, and reports.
+Supports analysis in multiple dimensions, such as audit duration, statement quantity, risk quantity, risk distribution, session statistics, and SQL distribution.
+Conducts analysis based on time, user, IP address, and client.
+Provides multiple search criteria, such as time, risk severity, user, client IP address, database IP address, operation type, and rule.
+Defines a risky operation in fine-grained dimensions such as operation type, operation object, and risk severity.
+Provides an SQL injection library, which facilitates alarm reporting for database exceptions based on the SQL command feature or risk severity.
+Reports alarms when the usage of system resources (CPU, memory, and disk) reaches configured threshold.
+Database audit provides you with the database audit function in out-of-path pattern, enabling the system to generate real-time alarms for risky operations. In addition, database audit generates compliance reports that meet data security standards. In this way, it locates internal violations and improper operations, protecting your data assets.
+Database audit is deployed in out-of-path pattern. It is simple to set up and operate.
+Supports audit of databases built on RDS, ECS, and BMS on the management console.
+Implements 99%+ application association audit, complete SQL parsing, and accurate protocol analysis.
+Responds quickly for data query with 10,000 requests per second from massive volumes of data saved.
+Clearly divides permissions among the system administrator, security administrator, and audit administrator, meeting audit security requirements.
+You have applied for a database audit instance and the Status is Running.
+Parameter + |
+Description + |
+Example Value + |
+
---|---|---|
Message Notifications + |
+Enables or disables notifications. + |
++ |
Daily Alarm Notifications + |
+Total number of alarms allowed to be sent every day + NOTICE:
+
|
+30 + |
+
Alarm Risk Severity + |
+Risk severity of the risk log. The options are as follows: +
|
+High + |
+
CPU Alarm Threshold (%) + |
+CPU alarm threshold of an audit instance. When the threshold is exceeded, an alarm notification is generated. + |
+80 + |
+
Memory Alarm Threshold (%) + |
+Memory alarm threshold of an audit instance. When the threshold is exceeded, an alarm notification is generated. + |
+80 + |
+
Disk Alarm Threshold (%) + |
+Disk alarm threshold of an audit instance. When the threshold is exceeded, an alarm notification is generated. + |
+80 + |
+
By default, database audit complies with a full audit rule, which is used to audit all databases that are successfully connected to the database audit instance. After connecting the database to the database audit instance, generate an audit report and preview online or download it.
+Database audit provides eight types of report templates. Table 1 lists the report names. You can generate reports and set report tasks as needed.
+ +Template Name + |
+Report Types + |
+Description + |
+
---|---|---|
Database Security General Report + |
+Overview report + |
+Provides the overall audit status of the database, including risks, sessions, and login status to better manage databases. + |
+
Database Security Compliance Report + |
+Compliance report + |
+This report helps database administrators and auditors detect abnormal behaviors, locate problems, and manage information. + |
+
SOX Report + |
+Compliance report + |
+Complies with the Sarbanes-Oxley Act (SOX) to provide statics on and evaluate database operations. This report helps database administrators and auditors detect abnormal behaviors, locate problems, and manage information. + |
+
Database Server Analysis Report + |
+Database report + |
+Provides statistics and analysis on active users, user IP addresses, database logins and requests, database usage duration, and database performance. + |
+
Client IP Address Analysis Report + |
+Client report + |
+Provides statistics on client applications, database users, and SQL statements collected from user IP addresses. + |
+
DML Command Report + |
+Database operation report + |
+Analyzes user and privileged operations based on DML commands. + |
+
DDL Command Report + |
+Database operation report + |
+Analyzes user and privileged operations based on DDL commands. + |
+
DCL Command Report + |
+Database operation report + |
+Analyzes user and privileged operations based on DCL commands. + |
+
You can generate reports immediately or periodically. You can also customize the generation time, frequency, and format of reports.
+Parameter + |
+Description + |
+Example Value + |
+
---|---|---|
Enable Task + |
+Status of a scheduled task. +
|
+
+
+ |
+
Message Notifications + |
+Enables or disables notifications. +
|
+
+ |
+
SMN Topic + |
+For details about topics and subscriptions, see Simple Message Notification User Guide. + |
+- + |
+
Report Type + |
+Type of a report. The options are as follows: +
|
+Weekly + |
+
Execution Mode + |
+Execution mode of the report. The options are as follows: +
|
+Periodically + |
+
Time + |
+Time when the report is executed + |
+10:00 + |
+
Format + |
+Only the PDF format is supported. + |
+|
Database + |
+Database for which you want to execute the report task + |
+- + |
+
Before previewing or downloading an audit report, ensure that its Status is 100%.
+To preview a report online, use Google Chrome or Mozilla FireFox.
+This section describes how to view and confirm alarms of database audit.
+Parameter + |
+Description + |
+
---|---|
Time + |
+Time when an alarm occurred. + |
+
Type + |
+Alarm type. The options are as follows: +
|
+
Alarm Risk Severity + |
+Risk severity of an alarm. The options are as follows: +
|
+
Cleared + |
+Time when an alarm is cleared + |
+
Confirmed Or Not + |
+Confirmation status of an alarm. Click |
+
Description + |
+Description of an alarm + |
+
You can select multiple alarms to be confirmed and click Batch Confirm to batch confirm alarms.
+The functions of the database audit instance are normal. When there is database traffic, audit information about the executed SQL statement cannot be found in the SQL statement list.
+The MySQL database client is used as an example. Perform the following steps:
+\s
+ +Add the following parameters at the end of the login command:
+--ssl-mode=DISABLED
+or
+--ssl=0
+If you log in to the MySQL database in SSL mode, you can only disable SSL for this login. To use the database audit function, log in to the MySQL database in the mode described in 3.b.
+1 | SSL: Not in use + |
To mask sensitive information in entered SQL statements, you can enable the function of masking privacy data and configure masking rules to prevent sensitive information leakage.
+Only user-defined rules can be edited and deleted. Default rules can only be enabled and disabled.
+You are advised to disable . After this function is disabled, database audit will not store the result sets of user SQL statements.
Do not enable this function if you want to prepare for PCI DSS/PCI 3DS CSS certification.
+You are advised to enable . After this function is enabled, you can configure masking rules to prevent privacy data leakage.
Parameter + |
+Description + |
+Example Value + |
+
---|---|---|
Rule Name + |
+Name of a rule + |
+test + |
+
Regular Expression + |
+Regular expression that specifies the sensitive data pattern + |
+- + |
+
Substitution Value + |
+Value used to replace sensitive data specified by the regular expression + |
+### + |
+
A masking rule in the Enabled status is added to the rule list.
+Perform the following steps to check whether a rule takes effect. The audit information about passport No. in a MySQL database is used as an example.
+select * from db where HOST="Passport NO.";
+After adding a user-defined masking rule, you can perform the following operations on it:
+Locate the row that contains the rule to be disabled and click Disable in the Operation column. A disabled rule cannot be used.
+Locate the row that contains the rule to be modified, click Edit in the Operation column, and modify the rule in the displayed dialog box.
+Locate the row that contains the rule to be deleted, click Delete in the Operation column, and click OK in the displayed dialog box.
+You can view, enable, edit, disable, or delete data masking rules.
+You are advised to disable . After this function is disabled, database audit will not store the result sets of user SQL statements.
Do not enable this function if you want to prepare for PCI DSS/PCI 3DS CSS certification.
+You are advised to enable . After this function is enabled, you can configure masking rules to prevent privacy data leakage.
Parameter + |
+Description + |
+
---|---|
Rule Name + |
+Rule name + |
+
Rule Type + |
+Rule type. +
|
+
Regular Expression + |
+Regular expression that specifies the sensitive data pattern + |
+
Substitution Value + |
+Value used to replace sensitive data specified by the regular expression + |
+
Status + |
+Status of a rule. Its value can be: +
|
+
You can perform the following operations on a rule:
+Locate the row that contains the rule to be disabled and click Disable in the Operation column. A disabled rule cannot be used.
+Locate the row that contains the rule to be modified, click Edit in the Operation column, and modify the rule in the displayed dialog box.
+Locate the row that contains the rule to be deleted, click Delete in the Operation column, and click OK in the displayed dialog box.
+Database audit provides basic, professional, and advanced editions. You can select one of them as needed.
+Version + |
+Maximum Databases + |
+System Resource + |
+Performance + |
+
---|---|---|---|
Basic + |
+3 + |
+
|
+
|
+
Professional + |
+6 + |
+
|
+
|
+
Advanced + |
+30 + |
+
|
+
|
+
The number of database instances equals the number of database ports. If a database IP address has N database ports, there are N database instances.
+Example: A user has two database IP addresses, IP1 and IP2. IP1 has a database port. IP2 has three database ports. IP1 and IP2 have four database instances in total. To audit all of them, select professional edition DBSS, which supports a maximum of six database instances.
+If SSL is enabled for a database, the database cannot be audited. To use database audit, disable SSL first.
+The MySQL database client is used as an example. Perform the following steps:
+\s
+1 | SSL: Not in use + |
1 | SSL: Cipher in use is XXX-XXX-XXXXXX-XXX + |
Add the following parameters at the end of the login command:
+--ssl-mode=DISABLED
+Or
+--ssl=0
+If you logged in to the MySQL database in SSL mode, you can disable SSL only for this login. To use the database audit function, log in to the MySQL database as instructed in this step.
+1 | SSL: Not in use + |
To preview a report online, use Google Chrome or Mozilla FireFox.
+No. Your databases are audited in out-of-path mode. Database audit neither affects your services nor conflicts with local audit tools.
+If your PC accesses RDS through a private line, you can install the agent on a proxy your set up. Access from the proxy to the database can be audited. Access from applications to the proxy cannot be audited.
+To check the operation logs of database audit, perform the following steps:
+Select Last 30 minutes, 1 hour, 24 hours, 7 days, or 30 days, or click to set start time and end time to view the operation logs of a specified time range.
Parameter + |
+Description + |
+
---|---|
Username + |
+User who performs the operation + |
+
Time + |
+Time when the operation was performed + |
+
Function + |
+Function of the operation + |
+
Action + |
+Action of the operation + |
+
Operation Object + |
+Object of the operation + |
+
Description + |
+Description of the operation + |
+
Result + |
+Result of the operation + |
+
No. Applications using TLS are encrypted.
+Database audit is subject to certain constraints.
+The following types of databases on the management console can be audited in out-of-path mode:
+The following database versions can be audited.
+ +Database Type + |
+Edition + |
+
---|---|
GaussDB(for MYSQL) + |
+MYSQL 8.0 + |
+
System Name + |
+System version + |
+
---|---|
CentOS + |
+
|
+
Debian + |
+
|
+
Fedora + |
+
|
+
SUSE + |
+
|
+
Ubuntu + |
+
|
+
EulerOS + |
+
|
+
Oracle Linux + |
+
|
+
No.
+Middleware is a type of software deployed between applications and software including OSs, networks, and databases. Middleware provides an environment for application operation and development, helping users flexibly and efficiently develop and integrate complex application software.
+Database audit is deployed in out-of-path mode. The database audit agent (installed on database or application nodes) obtains database access traffic, uploads the traffic to the audit system, receives commands issued by the audit system, and reports database status.
+Using middleware on the service side does not affect the agent during SQL listening or auditing.
+If database audit cannot obtain any data, troubleshoot the problem by referring to:
+By default, database audit complies with a full audit rule, which is used to audit all databases that are connected to the database audit instance. You can enable audit and check audit results. For details, see Viewing the Audit Dashboard.
+The Audit Status of the database is Enabled. You do not need to restart the database.
++
You can add SQL injection rules to audit your databases.
+Parameter + |
+Description + |
+Example Value + |
+
---|---|---|
Name + |
+Name of an SQL rule. + |
+Postal Code SQL injection Rule + |
+
Risk Level + |
+Level of risks matching a SQL rule. Its value can be: +
|
+Moderate + |
+
Status + |
+Enables or disables an SQL injection rule. +
|
+
+ |
+
Test Regular Expression + |
+Regular expression that checks for content in certain pattern. + |
+^\d{6}$ + |
+
Data + |
+Content that matches the regular expression. +Enter content and click Test to verify that the regular expression works properly. + |
+628307 + |
+
Result + |
+Test result. It can be: +
|
+Hit + |
+
You can add tags to database audit instances for easy management.
+You have applied for a database audit instance and the Status is Running.
+Up to 10 tags can be added to each DB instance.
+This section describes how to audit the security of a relational database instance. (Applications connected to this DB instance are deployed on ECS.) DBSS can audit certain types of relational databases without installing agents.
+DBSS without agents is easy to configure and use, but the following functions are not supported:
+GaussDB(DWS) has the permission control policy for the log audit function. Only accounts and users with the Security Administrator permission can enable or disable the DWS database audit function.
+The DBSS instance receives the logs sent from databases, such as certain GaussDB(for MySQL) or RDS for MySQL versions, and saves the logs to its log library for security analysis, aggregation statistics, and compliance analysis.
+Take the GaussDB(for MySQL) database as an example. Assume you need to locate and track internal violations and improper operations in the database to meet compliance requirements. This section describes how to enable the database audit function and check audit results.
+ + +The database audit instance and the database to be audited must be in the same region.
+Configure and apply for the database audit service. For details, see the "Database Audit Instance" section.
+After applying for database audit, add a database to the database audit instance and enable audit for the database.
+You can check audit results on the dashboard page, or generate, preview, or download reports.
+In the navigation pane, choose Dashboard.
+The Dashboard page displays the audit duration, total number of SQL statements and risks, statements and risks today, and today's sessions of an instance.
+You can click the Statements or Sessions tab to view session distribution.
+The Reports page will be displayed. You can view the report status on this page. After a report is generated, you can click Preview or choose . See Figure 2.
+To preview a report online, use Google Chrome or Mozilla FireFox.
+