Databases Reference
In-Depth Information
CHAPTER 1
■ ■ ■
Partially Documented
Parameters
F iguratively speaking, the Oracle database management system has a tremendous number of
knobs to turn and switches to flip. Oracle9 i Release 2 has 257 documented parameters, Oracle10 g
Release 2 has 258, and Oracle11 g Release 1 has 294. Presumably there is no single DBA who has
memorized the meanings and permissible values for all those parameters. The Oracle Database
Reference manual of each respective release is the definitive source for documented initialization
parameters. This chapter scrutinizes the partially documented parameters AUDIT_SYSLOG_LEVEL ,
PGA_AGGREGATE_TARGET , EVENT , and OS_AUTHENT_PREFIX and provides information that is absent
from the Oracle Database Reference manual. Both AUDIT_SYSLOG_LEVEL and OS_AUTHENT_PREFIX
are related to database security. EVENT is a curious parameter in the sense that the parameter
itself is documented, but permissible values are not. Among other things it may be used to
collect more evidence when errors occur or gather diagnostic information under the supervision of
Oracle Support Services. From a performance perspective, learning how PGA_AGGREGATE_TARGET is
handled internally allows a DBA to significantly reduce the response time of large sort operations.
AUDIT_SYSLOG_LEVEL
The initialization parameter AUDIT_SYSLOG_LEVEL is partially documented. Several inaccuracies
in the documentation suggest that the parameter is less useful than it actually is. Database
actions by SYS and/or database administrators or operators may be audited to the UNIX oper-
ating system's syslog daemon log files owned by the UNIX user root. This prevents privileged
database users from removing audit records that contain a log of their activities. The default
setting is to audit CONNECT , STARTUP , and SHUTDOWN with SYSDBA or SYSOPER privileges to files
owned by the ORACLE software owner, while not auditing SQL, PL/SQL statements, and other
actions with these privileges or other privileges, such as the role DBA, at all. In other words,
except for the aforementioned operations, standard auditing (see parameter AUDIT_TRAIL ) as
well as fine grained auditing (see package DBMS_FGA ) are switched off by default. As a conse-
quence, there will be no trace of many activities performed by privileged users. Auditing to
operating system files owned by the ORACLE software owner ( AUDIT_TRAIL=OS ) or to the data-
base table SYS.AUD$ ( AUDIT_TRAIL=DB ) may be circumvented, since DBAs normally have access
to the ORACLE software owner's UNIX account as well as to SYS.AUD$ , allowing them to easily
remove audit records generated for their actions. Auditing via the UNIX syslog facility is also
useful for detecting intrusions by hackers or manipulations by malevolent insiders.
3
 
Search WWH ::




Custom Search