9 High Availability in Oracle AVDF
Oracle AVDF supports high availability for Audit Vault Server and Database Firewall.
9.1 About High Availability in Oracle AVDF
Learn about high availability in Oracle AVDF.
High availability in Oracle AVDF increases reliability by ensuring continuity in Database Activity Monitoring services like audit data collection, network event data collection, analysis, reporting, etc. High availability requires a pair of Audit Vault Server instances or a pair of Database Firewall instances. One instance works as the primary and another instance works as the standby.
9.2 Configuring High Availability for Audit Vault Servers
Learn about configuring, monitoring, or updating high availability for Audit Vault Servers.
9.2.1 About High Availability in Audit Vault Servers
High availability in Audit Vault Server involves two Audit Vault Server instances that are paired for business continuity.
In this configuration, you designate one Audit Vault Server instance as the primary and the other as the standby. The primary Audit Vault Server is the active server that provides the Audit Vault Server functionality. The standby is automatically synchronized (audit data and network event data) and has a consistent copy of the primary.
If the primary Audit Vault Server becomes unavailable because of an unplanned outage for a period of 10 minutes, the configuration automatically fails over (failover) to the standby server. The earlier standby becomes the new primary.
In high availability, configuration data pertaining to target registration, Audit Vault Agent machine registration, and Database Firewall configuration is automatically synchronized with the standby.
The high availability in Audit Vault Server is internally managed by using Oracle Data Guard. You deploy the pair of Audit Vault Servers in maximum performance mode. This ensures the highest level of data protection without affecting the performance of the primary Audit Vault Server instance.
Note:
The archivelog mode is enabled after you set up high availability. High availability requires archivelog mode, so don't disable it after you set up high availability.Best Practice:
Oracle recommends that you configure high availability for the Audit Vault Servers before deploying Audit Vault Agents and Database Firewalls.See Also:
Oracle Data Guard Protection ModesThe Audit Vault Servers in high availability communicate through HTTPS and Oracle Net. There are no restrictions on where the Audit Vault Servers are located, as long as they can communicate with each other.
Important Points to Consider Before Configuring High Availability
Because existing data on the designated standby Audit Vault Server is purged during high availability configuration, consider the following points:
- Impact on existing Database Firewalls: All Database Firewalls that are registered with the designated standby Audit Vault Server must be registered again after high availability is configured.
-
Impact on existing Audit Vault Agents: There is no impact on the Audit Vault Agents that are registered on the designated primary Audit Vault Server.
However, all the registered Audit Vault Agents on the designated standby Audit Vault Server must be redeployed on the primary after high availability is configured. See Post High Availability Pairing Steps.
-
Impact on existing audit trails and Database Firewall monitoring points: Because audit and network event data that is collected from targets by the designated standby Audit Vault Server is purged during high availability configuration, you must reconfigure these audit trails and Database Firewall monitoring points on the Audit Vault Server after high availability is configured to ensure that these targets continue to be protected.
- From Oracle AVDF 20.9 to 20.12, agentless collection was supported only on standalone, unpaired Audit Vault Servers (AVS). Starting with Oracle AVDF 20.13, agentless collection is supported on both standalone and high availability AVS.
Audit Vault Server High Availability Configuration Process
To configure Audit Vault Servers for high availability, follow this high-level process:
-
Install two standalone Audit Vault Servers to use as the primary and standby servers.
Best Practice:
Place the two Audit Vault Servers in two different data centers. - Configure the designated standby Audit Vault Server.
- Configure the designated primary Audit Vault Server.
9.2.2 Prerequisites for Configuring High Availability for Audit Vault Servers
Ensure that you meet these prerequisites before configuring high availability for Audit Vault Servers.
- Install two standalone Audit Vault Servers to use as the primary and standby servers.
-
Ensure that the designated primary and standby Audit Vault Servers have identical configurations so that they can stand in for each other. All of the following configurations should be the same:
- Oracle Audit Vault and Database Firewall (Oracle AVDF) version
- Total system memory
- Total repository storage size
- Number of NFS archive locations
- Repository encryption status
- Ensure that the system time difference between the two Audit Vault Servers is less than 60 seconds.
9.2.3 Configure the Designated Standby Audit Vault Server
Learn how to configure the designated standby Audit Vault Server.
- Make a note of the IP address of the designated primary Audit Vault Server.
-
Copy the server certificate of the designated primary Audit Vault Server:
- Log in to primary Audit Vault Server console as super administrator.
- Click the Settings tab. The Security tab in the left navigation menu is selected by default.
- Now, click the Certificate sub tab in the main page.
- Click the Server Certificate sub tab.
- Click the Copy Certificate button.
-
In the left navigation menu of the designated standby Audit Vault Server, perform these steps:
- Select System tab.
- Click High Availability link under the Configuration section on the main page.
- In the Configure High Availability dialog, the Current status field indicates the status of the current Audit Vault Server, which is Standalone.
- In the Configure this server as field, select the Standby server option.
-
In the expanded Configure High Availability dialog, enter the following settings:
- Primary server IP address: Enter the IP address of the designated primary Audit Vault Server.
- Primary server certificate: Paste the certificate that you copied from the designated primary Audit Vault Server.
- Click Save. The designated primary Audit Vault Server's IP address and certificate is now saved on the standby Audit Vault Server, and is now ready to be paired.
9.2.4 Configure the Designated Primary Audit Vault Server
Learn how to configure the designated primary Audit Vault Server.
- Make a note of the IP address of the designated standby Audit Vault Server.
-
Copy the server certificate from the designated standby Audit Vault Server:
- Log in to the designated standby Audit Vault Server console as super administrator.
- Click the Settings tab. The Security tab in the left navigation menu is selected by default.
- Now click the Certificate sub tab in the main page.
- Click Server Certificate sub tab.
- Click the Copy Certificate button.
-
Log in to the designated primary Audit Vault Server console as super administrator and perform these steps:
- In the left navigation menu, select System tab.
- Click High Availability link under the Configuration section in the main page.
- In the Configure High Availability dialog, the Current status field indicates the status of the current Audit Vault Server, which is Standalone.
- In the Configure this server as field, select the Primary server option.
-
In the expanded Configure High Availability window, enter the following settings:
- Standby server IP address: Enter the IP address of the standby Audit Vault Server.
- Standby server certificate: Paste the certificate that you copied from the standby Audit Vault Server.
-
Click Initiate Pairing button at the bottom of the dialog, to initiate high availability pairing. To get the updated status, refresh the Audit Vault Server console periodically, as the process can take at least 15 minutes. This process can take longer depending on the amount of data in the repository. When the high availability pairing is complete, the High Availability Status field in the main page displays the current status.
Note:
- After high availability pairing is successfully completed, perform all the configuration tasks on the primary Audit Vault Server only. This includes tasks such as downloading the Audit Vault Agent, registering targets and hosts, adding Database Firewalls and monitoring points. To perform tasks like setting system time or changing IP address for the standby Audit Vault Server refer to section Specifying the Server Date, Time, and Keyboard Settings.
- During high availability pairing, the NFS archive locations pertaining to the primary and standby Audit Vault Servers are mapped. The mapping of these locations is displayed in the primary Audit Vault Server console after high availability pairing is successful.
9.2.5 Checking the High Availability Status of an Audit Vault Server
Learn how to check the high availability status of an Audit Vault Server.
After high availability pairing is successfully completed, the standby Audit Vault Server console is not accessible. Perform all tasks on the primary Audit Vault Server console. If you attempt to access the standby Audit Vault Server console, it redirects to the primary Audit Vault Server console.
Check High Availability Status Through the Console
- In the Audit Vault Server console, click the Settings tab.
- In the left navigation menu, select System.
- Under the Status section, check the
High Availability Status field.
The possible values are:
-
Standalone - This server is not configured for high availability and is a standalone instance.
-
Primary - This server is currently the primary Audit Vault Server.
-
Disconnected - This primary Audit Vault Server switches to this mode if it detects that the standby Audit Vault Server changed its role to standalone or primary. This indicates that the high availability pairing is broken. Contact Oracle Support for further assistance.
-
Check High Availability Status Through Commands
-
Log in to the Audit Vault Server through SSH as the
support
user.Note:
If you're using the Oracle Cloud Infrastructure (OCI) marketplace image, connect through SSH as theOPC
user.ssh support@<audit_vault_server_ip_address>
-
Switch to the
root
user.su - root
Note:
If you're using the OCI marketplace image, use thesudo su -
command. -
Switch to the
oracle
user.su - oracle
- Run the following command
/usr/local/dbfw/bin/setup_ha.rb --status
The output of above command will tell the current high availability (HA) status and different properties such as Data Guard broker status, fast recovery area usage, and apply lag of HA system.
9.2.6 Post High Availability Pairing Steps
Learn post high availability pairing steps for Audit Vault Agents and Host Monitor Agents.
Audit Vault Agents and Host Monitor Agents deployed on the designated primary Audit Vault Server require no further action. The information of Audit Vault Agents is replicated to the standby Audit Vault Server during high availability pairing.
Audit Vault Agents and Host Monitor Agents deployed on the designated standby Audit Vault Server will be unable to communicate with the designated primary Audit Vault Server after high availability pairing. To redeploy the Agents on the specific Agent machines, follow these steps:
9.2.7 Audit Vault Agent Communication with Audit Vault Server in High Availability
Learn how Audit Vault Agent communicates with Audit Vault Server.
Audit Vault Agent software is packaged with the connection details pertaining to Audit Vault Server. In case of high availability environment, the Audit Vault Agent software is packaged with the connection details pertaining to both the primary and standby Audit Vault Servers.
Existing Audit Vault Agents on the designated primary Audit Vault Server receive the connection details of both the primary and standby Audit Vault Servers during high availability configuration. New Audit Vault Agents that are deployed after high availability configuration are also packaged with the connection details pertaining to both the primary and standby Audit Vault Servers.
In the event of Audit Vault Server failover, the Audit Vault Agents reconnect to the new primary Audit Vault Server (previous standby).
9.2.8 Swapping Roles Between a Primary and Standby Audit Vault Server
Learn how to swap the roles of the primary and standby Audit Vault Servers.
Related Topics
9.2.9 Initiating a Switchover Between Primary and Standby Audit Vault Servers
You can initiate a switchover if you know that your primary Audit Vault Server is going to be offline for an extended period of time (more than 10 minutes) and you wish to maintain the high availability configuration. You can also initiate a switchover if you wish to promote the standby Audit Vault Server to primary because the designation of primary data center has changed.
-
Log in to the Audit Vault Server through SSH as the
support
user.Note:
If you're using the Oracle Cloud Infrastructure (OCI) marketplace image, connect through SSH as theOPC
user.ssh support@<audit_vault_server_ip_address>
-
Switch to the
root
user.su - root
Note:
If you're using the OCI marketplace image, use thesudo su -
command. -
Switch to the
oracle
user.su - oracle
- Run the switchover command on the existing primary Audit Vault
Server:
/usr/local/dbfw/bin/setup_ha.rb --switchover
9.2.10 Handling a Failover Scenario
In a high availability environment, automatic failover mechanism is enabled by default. You can disable it manually through the Audit Vault Server console.
When automatic failover is in effect, the system periodically monitors the availability of the primary Audit Vault Server. If the primary becomes unavailable for more than 10 minutes, then the failover to the standby Audit Vault Server is automatically triggered. However, if the primary Audit Vault Server has been gracefully shut down by the user, then no failover is automatically triggered. In this case, to manually initiate the failover, carefully examine the situation as required, and run the following command as the oracle user on the standby Audit Vault Server:
/usr/local/dbfw/bin/setup_ha.rb --failover
In a failover, the standby Audit Vault Server becomes the new primary. If the previous primary comes back within 20 minutes, it is reinstated as the new standby and both systems will be in a high availability configuration.
If the previous primary does not come back within 20 minutes, then it becomes unusable. The new primary unpairs and becomes a standalone instance. Perform the following procedure to bring the system back into high availability configuration:
- Install a new Audit Vault Server for the new designated standby.
- Follow the configuration steps again to configure the Audit Vault Servers for high availability. See Configuring High Availability for Audit Vault Servers.
Related Topics
9.2.11 Unpair Primary and Standby Audit Vault Servers
Learn how to unpair primary and standby Audit Vault Servers in high availability environment.
9.2.12 Disabling or Enabling Failover of the Audit Vault Server
Learn how to enable or disable failover for Audit Vault Servers.
When you configure high availability, the system is configured for automatic failover. However, in some cases, you may want to disable automatic failover. For example, you may need to disconnect the Audit Vault Servers for maintenance or you may be in an environment with an unstable network that may cause frequent failover. In these cases, you may choose to disable automatic failover, and trigger the failover manually by following the steps mentioned below.
To enable or disable automatic failover using the Audit Vault Server console:
- Log in to the primary Audit Vault Server as a super administrator.
- Click the Settings tab, and then in the left navigation menu, select System tab.
- Click the High Availability link under the Configuration section.
- Click the Enable Failover or Disable Failover button as needed.
Alternately, you can execute the following commands to disable or enable the failover as oracle user:
/usr/local/dbfw/bin/setup_ha.rb --disable_failover
/usr/local/dbfw/bin/setup_ha.rb --enable_failover
Note:
You can run the following command to determine if failover is currently disabled or enabled.sudo -u oracle /usr/local/dbfw/bin/setup_ha.rb --status
9.2.13 Archiving and Retrieving in High Availability
Learn about archiving and retrieving audit and network event data in a high availability scenario.
Archive and retrieve functionality in high availability automatically handles the necessary steps to process the datafiles on both the primary and standby Audit Vault Server instances. In order to archive, you must provide an NFS archive location. An NFS archive location in a high availability environment contains separate NFS details for primary and standby Audit Vault Servers.
In case there is no NFS archive location, then follow these steps to create a new NFS archive location:
9.2.14 Backup and Restore of Audit Vault Server in High Availability
Learn about backup and restore of Audit Vault Server in high availability.
In a high availability configuration, you must perform the backup operation on the primary Audit Vault Server and not on the standby. To recover from a disaster, you can restore from the backup taken earlier. However, the restored system is not automatically configured for high availability. You need to once again configure for high availability after completing the restore from backup.
9.2.15 Removing High Availability Configuration
You may wish to remove the high availability configuration from the primary Audit Vault Server if the secondary host has failed and you need to re-create the high availability pair with a new standby host.
-
Log in to the Audit Vault Server through SSH as the
support
user.Note:
If you're using the Oracle Cloud Infrastructure (OCI) marketplace image, connect through SSH as theOPC
user.ssh support@<audit_vault_server_ip_address>
-
Switch to the
root
user.su - root
Note:
If you're using the OCI marketplace image, use thesudo su -
command. -
Switch to the
oracle
user.su - oracle
- Ensure the standby host is offline and removed from the network. Its IP address must not be accessible from the existing primary.
- Run the setup_ha.rb script on the primary Audit Vault Server to remove the high
availability
configuration:
/usr/local/dbfw/bin/setup_ha.rb -v --password --unconfigure
9.3 Configuring High Availability for Database Firewalls
Learn how to manage, configure, switch roles, and unpair a Database Firewall pair.
9.3.1 High Availability for Database Firewall
Learn about high availability in Database Firewall.
High availability in Database Firewall ensures uninterrupted network event monitoring in the event of network or Database Firewall failure. It also ensures that the corporate security policies for monitoring the database targets are enforced at all times.
High availability for Database Firewall can be accomplished in the following two ways:
- A pair of Database Firewall instances in Monitoring (Host Monitor) or Monitoring (Out of Band) modes.
- Multiple Database Firewall instances operating in Monitoring/Blocking (Proxy) mode.
Prerequisite
First, create the Database Firewall instances and register them in the Audit Vault Server console. Afterward, configure these instances for high availability to ensure system resilience. Later, create monitoring points, register targets, and define policies for the Database Firewall instances configured for high availability.
Starting with Oracle AVDF 20.6, Database Firewall instances can be paired with existing monitoring points in Monitoring (Host Monitor) or Monitoring (Out of Band) modes. See Configuring High Availability of Database Firewall Instances With Monitoring Points for more information.
High Availability in Monitoring (Host Monitor) Or Monitoring (Out of Band) Modes
In this configuration:
- High availability (primary and standby) is configured through Audit Vault Server.
- In case of Monitoring (Host Monitor) mode, the Host Monitor Agent is configured to capture and forward the traffic to the primary and standby Database Firewall instances.
- In case of Monitoring (Out of Band) deployment mode, the network switch is configured to mirror and forward the traffic to both the primary and standby Database Firewall instances.
- The configuration of targets, monitoring points, and policies is automatically applied to the primary and standby Database Firewall instances by Audit Vault Server.
The Audit Vault Server collects network events from the primary or standby Database Firewall instance. If the Audit Vault Server is unable to contact the primary Database Firewall for a specified period of time (default of 10 minutes), then the Audit Vault Server collects the network events from the standby Database Firewall. The Audit Vault Server deletes the network events from both instances of Database Firewall after storing the data in the Audit Vault Server repository.
High Availability in Monitoring/Blocking (Proxy) Mode
Database Firewall instances deployed in Monitoring/Blocking (Proxy) mode can be configured for high availability in the following ways:
- Active (primary) and passive (standby)
- Active and active
In active and passive configuration:
- Client programs are configured to connect to the primary Database Firewall instance. If the primary Database Firewall instance is not reachable or is down, then they connect to the standby.
- Audit Vault Server collects the network events from the Database Firewall instance (either active or passive) that receives the traffic.
In active and active configuration:
- Multiple Database Firewall instances can be part of this configuration.
- Client programs can connect to any of the active Database Firewall instances that are part of this configuration.
- Once a client establishes a session with an active Database Firewall instance, it communicates with the same instance throughout the session.
- Audit Vault Server collects the network events from all the active Database Firewall instances that are part of this configuration.
9.3.2 High Availability for Database Firewall in Host Monitor Agent or Out of Band Modes
Learn how to configure a Database Firewall high availability pair in Host Monitor Agent or Out of Band modes.
Prerequisites
- Register both of the Database Firewall instances in the Audit Vault Server console.
- If you have Audit Vault Servers in high availability mode, then you must provide the primary and standby Audit Vault Server's IP address and certificate to each Database Firewall instance during registration.
- For Oracle AVDF release 20.5 and earlier, ensure there are no monitoring points configured on either of the Database Firewall instances. In case there are any existing monitoring points, then they must be deleted.
- For Oracle AVDF release 20.6 and later, pairing of Database Firewall instances with existing monitoring points is possible.
- Log in to the Audit Vault Server console as an administrator.
- Click Database Firewalls tab.
- In the left navigation menu, select High Availability.
- Click Create.
- In the Create Resilient Pair dialog, select the Database Firewall instances for Primary and Standby fields from the drop down list.
- Click Save.
- Starting with Oracle AVDF 20.6, the pairing process of the Database Firewall instances is a background job. See the Jobs dialog in the Audit Vault Server console to check the status of high availability pairing. Locate for the job against the entry
Create DBFW resilient pair
. After completion of the pairing process, navigate to the Database Firewalls tab and then to High Availability tab in left navigation menu to verify the resilient pair.
9.3.3 Swapping Roles Between Primary and Standby Database Firewalls
Learn to swap the roles of primary and standby Database Firewall instances in a high availability.
9.3.4 Unpair Primary and Standby Database Firewalls
Learn to unpair Database Firewall instances in high availability.
9.3.5 Configuring High Availability of Database Firewall Instances With Monitoring Points
Learn how to configure high availability in Database Firewall instances with monitoring points.
Starting with Oracle AVDF release 20.6 if there are monitoring points on the designated primary Database Firewall instance or on the standby instance, or on both, they can be paired. The existing monitoring points on the designated primary instance are replicated on the standby Database Firewall instance after pairing. Likewise, the existing monitoring points of the designated standby Database Firewall instance are replicated on the primary instance after pairing. The monitoring points are shared between the resilient pair.
If a target has monitoring points on both the Database Firewall instances, the configuration data of the monitoring points is merged. The data on the primary instance takes precedence.
Note:
Starting Oracle AVDF 20.6, Database Firewall instances can be paired with existing monitoring points in Monitoring (Host Monitor) or Monitoring (Out of Band) modes. This is not supported for Database Firewall instances deployed in Monitoring/Blocking (Proxy) mode. An error is displayed if an attempt is made to pair Database Firewall instances deployed in Monitoring/Blocking (Proxy) mode with existing monitoring points.
Unable to create resilient pair in Monitoring/Blocking(Proxy)
mode.
9.4 Configuring High Availability for Database Firewalls in Proxy Mode
Learn how to configure Database Firewall instances for high availability Monitoring / Blocking (Proxy) mode.
Oracle AVDF provides an option to set up the high availability configuration for multiple Database Firewall instances deployed in Monitoring / Blocking (Proxy) mode. These multiple instances are installed and configured independently.
Prerequisites
-
Install and register all Database Firewall instances that will be part of the high availability.
-
For each Database Firewall instance:
-
The configuration of the monitoring points must be same. For example Database Firewall instances
DBFW1
andDBFW2
should have the same number of monitoring points and the configuration of these monitoring points should also be the same. -
Deploy the same Database Firewall policy for a specific target. For example, deploy Database Firewall policy
P1
(for targetT1
) on instancesDBFW1
andDBFW2
.
-
High availability configuration in proxy mode can be achieved in the following ways:
- Through Client Configuration for Oracle Databases
- Using DNS for Oracle and Other Database Types
9.4.1 Configuring High Availability for Database Firewall in Proxy Mode through Client Configuration
Learn how to configure high availability for two or more Database Firewall instances in proxy mode using the tnsnames.ora
the for Oracle databases.
OCI (Oracle Call Interface) based clients use tnsnames.ora
file
to connect to Oracle database. The following parameters in this file should be modified
as part of this configuration:
-
ADDRESS_LIST
-
CONNECT_TIMEOUT
-
LOAD_BALANCE
ADDRESS_LIST
Include addresses of all the Database Firewall instances in the
ADDRESS_LIST
. The client programs connect to the first Database
Firewall instance. In case of a failed attempt, the client connects to the next
instance in the order.
For example:
dbfw1=(DESCRIPTION=(ADDRESS_LIST=(ADDRESS=(PROTOCOL=TCP)(HOST=192.0.2.1)(PORT=1111))
(ADDRESS=(PROTOCOL=TCP)(HOST=192.0.2.2)(PORT=2222)))(CONNECT_DATA=(SERVICE_NAME=dbfwdb)))
where:
dbfw1
is referred to as net_service_name
.
Host = 192.0.2.1
and Host = 192.0.2.2
are the IP addresses of Database Firewall instances configured for high
availability.
If you are using SQL*Plus client, then use the following command:
sqlplus <username>/<password>@<net_service_name>
The SQL*Plus client attempts to connect to the first Database Firewall
instance with IP 192.0.2.1
. In case the first instance is down or
not reachable, then the client attempts to connect to the second Database Firewall
instance with IP address 192.0.2.2
.
CONNECT_TIMEOUT
Use CONNECT_TIMEOUT
(seconds) parameter to quickly
detect if the Database Firewall instance is down.
For example:
dbfw1=(DESCRIPTION=(CONNECT_TIMEOUT=10)(ADDRESS_LIST=(ADDRESS=(PROTOCOL=TCP)(HOST=192.0.2.1)(PORT=1111))(ADDRESS=(PROTOCOL=TCP)(HOST=192.0.2.2)(PORT=2222)))(CONNECT_DATA=(SERVICE_NAME=dbfwdb)))
The client attempts to connect to the first Database Firewall instance with IP 192.0.2.1
. In case the first instance is down or not reachable, then the client waits for the duration (seconds) mentioned in the CONNECT_TIMEOUT
parameter. In the above example it is 10 seconds. Next, the client attempts to connect to the second Database Firewall instance with IP address 192.0.2.2
.
Note:
- By default the value of
CONNECT_TIMEOUT
is 60 seconds. - Refer to Oracle Database Net Services Administrator's Guide for more details.
LOAD_BALANCE
Use LOAD_BALANCE
parameter for client connections to
connect to Database Firewall instances in a random sequence.
For example:
dbfw1=(DESCRIPTION=(ADDRESS_LIST=(LOAD_BALANCE=on)(ADDRESS=(PROTOCOL=TCP)(HOST=192.0.2.1)(PORT=1111))(ADDRESS=(PROTOCOL=TCP)(HOST=192.0.2.2)(PORT=2222)))(CONNECT_DATA=(SERVICE_NAME=dbfwdb)))
Here, clients will connect to either 192.0.2.1
or 192.0.2.2
in a random sequence.
Note:
- When set to
on
, theLOAD_BALANCE
parameter instructs clients to progress through the list of Database Firewall addresses in a random sequence. When set tooff
, instructs clients to try the addresses sequentially until one succeeds. - Refer to Oracle Database Net Services Administrator's Guide for more details.
9.4.2 Configuring High Availability for Database Firewall in Proxy Mode using DNS
Learn how to configure high availability for multiple Database Firewall instances in Monitoring / Blocking (Proxy) mode using DNS for Oracle and other database types.
Prerequisites
-
Install and register Database Firewall instances.
-
For each Database Firewall instance:
-
The configuration of the monitoring points must be same. For example Database Firewall instances
DBFW1
andDBFW2
should have the same number of monitoring points and the configuration of these monitoring points should also be the same. -
Deploy the same Database Firewall policy for a specific target. For example, deploy Database Firewall policy
P1
(for targetT1
) on instancesDBFW1
andDBFW2
.
-
-
Client programs should be able to connect to the configured DNS server.
Setup a fully qualified Domain Name in DNS
-
Create a fully qualified domain name to represent IP addresses of the Database Firewall instances.
-
Configure the selected DNS server as the name resolution server on the client hosts.
-
Clients should use the fully qualified domain name in the connection string to connect to the Database Firewall instance.
-
For example, if you are using SQL*Plus, then follow these steps:
- Start the SQL*Plus
connection as
sqlplus /nolog
without the username or password. - Run the command:
connect <username>/<password>@<fully qualified domain name>:<port/service>
- Start the SQL*Plus
connection as
-
DNS can be configured in one of the following ways:
- Configure DNS to always connect to
an ordered list of Database Firewall instances
(for example
DBFW1
,DBFW2
, etc). If a client is not able to connect to the first instance (DBFW1
), then it attempts to connect to the second instance (DBFW2
). - Configure DNS to use round-robin algorithm for connecting to Database Firewall instances.
- Configure DNS to always connect to
an ordered list of Database Firewall instances
(for example