RE: [External] Moving from database to OS audit trail

From: <"">
Date: Mon, 14 Sep 2020 17:26:22 +0000
Message-ID: <BY5PR08MB62942CA2F2A10168CCF90A1FFE230_at_BY5PR08MB6294.namprd08.prod.outlook.com>



Thank you! We’ll test that out (and cross our fingers that the format is acceptable to the security folk).

From: oracle-l-bounce_at_freelists.org <oracle-l-bounce_at_freelists.org> On Behalf Of Jeffrey Beckstrom Sent: Monday, September 14, 2020 11:39 AM To: oracle-l-freelist <oracle-l_at_freelists.org>; Miller, Jay <Jay.Miller_at_tdameritrade.com> Subject: Re: [External] Moving from database to OS audit trail

We send our audit trail to xml audit trail files. We then query it from v$xml_audit_trail

Jeffrey Beckstrom
Lead Database Administrator
Information Technology Department
Greater Cleveland Regional Transit Authority 1240 W. 6th Street
Cleveland, Ohio 44113

>>> "" (Redacted sender "Jay.Miller" forDMARC) <dmarc-noreply_at_freelists.org<mailto:dmarc-noreply_at_freelists.org>> 9/14/20 11:31 AM >>>
We have just been given the requirement to move our auditing from database to OS and I was wondering how other people have handled obtaining the data which is currently easily available from dba_audit_trail.

For example things like getting a histogram of login times to see if there was a sudden surge in connect activity or finding the name of an app server which is locking an account by sending invalid passwords. Really easy now but with OS files? How are other people handling this?

I’m told all the information will be available in Splunk though I have no idea how easy that will be to access.

TIA,
Jay Miller

--
http://www.freelists.org/webpage/oracle-l
Received on Mon Sep 14 2020 - 19:26:22 CEST

Original text of this message