Tag: Database & Technology

Oracle Multitenant was built to consolidate databases. The provisioning and management advantages of using pluggable databases greatly simplify database operations. However, accidental or intentional acts can create security breaches with pluggable databases. This session will review briefly the features and functionality introduced by the multitenant option. We will then discuss changes to basic database security…

In previous Oracle versions there were many different ways to setup auditing and separate auditing trails for components.  There were also various layouts to the information provided within those audit trails.  Oracle 12c introduces a new auditing framework where all auditing is written to a single repository and accessed by a single view.  This framework is more secure…

Oracle Database security patches are not routinely applied by many organizations due to business limitations regarding patching or due to lack of security patches for desupported database versions.  All database versions 11.2.0.3 and prior are under Sustaining Support and no Critical Patch Updates (CPU) are available for these versions.  There are significant security risks when…

In previous Oracle versions there were many different ways to setup auditing and separate auditing trails for components.  There were also various layouts to the information provided within those audit trails.  Oracle 12c introduces a new auditing framework where all auditing is written to a single repository and accessed by a single view.  This framework is more secure…

In previous Oracle versions there were many different ways to setup auditing and separate auditing trails for components.  There were also various layouts to the information provided within those audit trails.  Oracle 12c introduces a new auditing framework where all auditing is written to a single repository and accessed by a single view.  This framework is more secure…

To properly secure an Oracle database requires significant effort and often expensive security add-on products.  The Thrifty DBA likes having secure databases, but doesn’t like to spend money on expensive security products when equivalent zero or low-cost solutions are available.  The Thrifty DBA will show you thrifty yet effective security solutions to solve auditing, encryption,…

Containers have taken the IT world by storm, and for good reason. The reduction in setup time, administration time, and resource consumption that containers provide makes a very strong case for using container technologies throughout the data center. Docker can be used to containerize many applications, including the Oracle Database. While Oracle Database is not…

OakTable World: RAC Cache Fusion internals - visit the OakTable World page for more details

In this presentation, we will explore various internal topics to better understand RAC Grid Infrastructure clusterware better. I will explore the background processes, startup sequence, resources, and attributes of the resources. Then, we will explore various log files of the background processes and explain how to use the log files to better understand the Grid…

In this presentation, we will review ASM , high level overview of ASM files, disks, ASM extents, and allocation units etc. Then we will review a few of ASM header structures and how ASM identifies the disks etc. We will dump headers using few tools and show the output of those dumps. We will explore…