SlideShare a Scribd company logo
1 of 8
Introduction to Database Log Analysis

Dr. Anton Chuvakin

WRITTEN: 2006-2007

DISCLAIMER:

Security is a rapidly changing field of human endeavor. Threats we face literally change every day;
moreover, many security professionals consider the rate of change to be accelerating. On top of that, to
be able to stay in touch with such ever-changing reality, one has to evolve with the space as well. Thus,
even though I hope that this document will be useful for to my readers, please keep in mind that is was
possibly written years ago. Also, keep in mind that some of the URL might have gone 404, please Google
around.




Part I


Database security have been capturing more and more attention in recent years, even
though most of the security issues surrounding the databases existed since the first day
commercial database systems were introduced in the market.

Nowadays, database security is often seen as containing the following principal
components:
access control to database software, structures and data
database configuration hardening
database data encryption
 database vulnerability scanning

It is interesting to see that logging and auditing underline all of the above domains of
database security. Indeed, the only way to verify what access control decisions is being
made and who views what data from the RDBMS is to look at the authentication logs.
Database configuration hardening includes enabling and increasing the auditing levels.
Similarly, data encryption might be verified by log and configuration review. And,
vulnerability exploitation usually leaves traces in logs despite what some say (the
challenge is more often with understanding what the log said and not with having the
logs) In recent years, insider attacks gathered more attention than periodic outbreaks of
malware; and database logging happens to be in the forefront of this fight against
insider attacks. Database systems are usually deployed deep inside the company
network and thus insiders are usually has the easiest opportunity to attack and
compromise them, and then steal (or “extrude” as some would say) the data.

In addition to security, database logging (as well as log analysis) needs to be
performed to allow IT auditors to do their jobs and enable regulatory compliance
validation. On a more general level, IT governance best practice frameworks such as
COBIT also steer IT users towards database logging.

Different database software offer a dizzying array of logging options. For example,
Oracle, the leading database software, has mandatory, standard and fine-grained
audit. Specifically, to enable mandatory auditing (off by default) one needs to set the
audit_sys_operations parameter to true for the appropriate database instance.
Enabling standard audit is done by setting the audit_trail parameter for the instance
and then enabling the relevant audit options.

Similarly, MS SQL Server would always log server access and errors to a Windows
event log, but logging – or “tracing” – other queries requires running a separate tool
that creates trace files.

And, finally, the open source MySQL has several log types – error log, query log, binary
log of statements that change data and slow query logs. While error logs is always
enabled, one needs to manually enable other types. For example, one enables query
logging by starting mysql as “mysql –log”.

So what is in common among the database logging? The above databases
would log (rather, can be configured to log as most would log very little by default)
most if not all of the following events:

   •   user logins and logouts
   •   database system starts, stops and restarts
   •   various system failures and errors
   •   user privilege changes
   •   database structure (metadata) changes
   •   most other DBA actions
   •   select or all database data access (if configured to be so)

The above logged events provide rich sources of information for the mentioned
security, compliance and IT operational needs. A better way of saying it would be
“would have provided if they were easy to analyze.” Many factors, such as log
availability, log format complexity and log volume, hinder the log analysis efforts and
most apply to database logging.

What are the possibilities for database log formats? Given that databases are built to
store structured data, one would assume that logs would always be stored in a
database itself. That assumption will be in fact wrong. Most databases use a mix of
logging to itself and logging to flat files, sometimes binary files. For example, in case of
Oracle, database administrator (DBA) actions are logged into a separate file in order to
prevent the said DBA from modifying the logs of his own actions (typically, a DBA will
have unfettered access to the RDBMS, but not ‘root’ or Administrator on the underlying
system). Here is an example of such log:
Tue Sep 19 15:17:39 2006
ACTION : 'SHUTDOWN'
DATABASE USER: '/'
PRIVILEGE : SYSDBA CLIENT
USER: oracle CLIENT
TERMINAL: pts/4 STATUS: 0

Oracle database audit tables contains other audit information such as time, user
name, SQL command, status and other data access auditing parameters.

Microsoft SQL uses Windows event log facility to log its operational messages
(starts, stops, backup status, etc) as well as server access (user login and logouts)
However, file access audit logs are done differently by using so-called “trace files” –
binary files that contain the information on all database data accesses. Here is an
example messages produced by MS SQL Server:

   •   “There is insufficient system memory to run this query.”

   •   “The master database failed to restore. Use the rebuildm utility to rebuild the
       master database. Shutting down SQL Server.”

   •   “Login failed. The maximum simultaneous user count of 1 licenses for this
       'Standard Edition' server has been exceeded. Additional license should be
       obtained and installed or you should upgrade to a full version.”

It is important to realize that default logging options on most databases exclude
logging of the access to data, such as the SELECT statements as well as changes to
data tables such as UPDATE or DELETE. Even more drastic actions such as table
DROPs and ALTERs are not recorded, unless configured. To enable data-level
logging one needs to set special configuration options and sometimes even to restart a
database software.

Unlike other situation, where logging has minimum impact on system performance,
database audit logging does slow down the database, sometimes significantly. After
all, high-performance databases are mean to provide thousands of data transactions
per second and logging all of those presents a challenge to a system’s IO and well as
CPU and disk storage resources. That is why logging has somewhat of a bad rap with
DBAs. However, there are more and more reasons to enable logging nowadays and
thus such performance considerations become secondary.

If one tries to log even a subset of all data access and data changes, he should be
prepared to drown in an ocean of audit log data. Extracting useful actionable
information from such onslaught of data presents a challenge.

Apart from performance and data volume, other challenges with database logs
include verbosity and obscurity of log formats. Multi-line formats also hamper
automated analysis of logs.

Given the situation above, what can we do to make sense of database logs? While
detailed discussion of database log analysis goes way outside the scope of this brief
paper, we will try to give a few useful hints.

First, as all other logs, database logs are indispensable for incident response. Thus,
even collection of logs with no analysis whatsoever is going to help you during the
crunch time of a data theft, server crash or even a surprise visit by your friendly auditor.
If you are to take this one step, collecting logs from multiple serves at one central
location (such as your log management solution) will make incident analysis much
simpler and will prevent loss of log data due to routine log rotation or other reasons.
Beyond just keeping logs for the “rainy” day one can institute a period review of a DBA
activity logs. Such logs are usually less voluminous than data access audit, but provide
critical information on DBA actions important for keeping tabs on people entrusted with
your “crown jewels” such as customer lists or product inventory information. In some
cases, even a manual review or a set of scripts will work, but for better efficiency, a log
management tool or a set will do the trick much better.

Further, if you need to log access to some data, which increasingly happens due to
various regulations and “best practices” frameworks, manual log review will break
down pretty quickly due to log volume (you might be looking at gigabytes of data per
day or more) Thus, you will be embarking on a trail towards automating your
databases log collection, analysis and archival.

To conclude, database logging represents a new world for many security practitioners,
but the one which they might have no choice but conquer. Enabling logging is a good
start, from where one can progress towards more in-depth log analysis.

Part II

As we covered in the previous paper, database security and auditing have been
capturing more and more attention in recent years. In this part of the paper, we will
focus on what happens after you decide to enable all the logging we suggested in the
previous paper.

While currently, firewalls still hold the dubious record of spewing the highest volume of
logs, database might rival such volume once people configure them to enable logging
motivated by operational, security or compliance reasons.

We mentioned that by default most commercial databases log surprisingly few
events. Thus, a manual log review may be suitable under such circumstances, given
that most of important events don’t ever show up in logs.

Automation in the form of log analysis and log management tools becomes essential if
any kind of database security “best practices” are being followed and logging is
enabled.

So, what might such tools provide? Simpler log analysis tools will allow users to review
at logs on a specific database server only and likely require such tool to be running on
that same server. Consequently, such tools will only work for a specific database type
such as Oracle-only or DB2-only. They also usually do not provide any real-time
analysis in the form or alerting or triggering automated actions. Still, they can provide
some insight s from logs, which are clearly superior to going through raw logs line by
line.

Database vendors usually provide such tools. Examples include IBM DB2 Log
Analysis Tool (that can be used to generate simple database log reports for a single
server), MS SQL Profiler (that can be used to review audit trace files from a SQL
Server) and Oracle LogMiner (that can analyze Oracle redo logs)

More advanced log management tools will work across multiple database servers and
even across database types. Many would also allow analysis of database logs in
combination with other logs such as server, security device or firewall. Analysis of this
type allows put the database data in the context or other enterprise log data and to
correlate database activity with other things that happen at the organization at the same
time.

Such tools automate not only analysis of log data, but the whole lifecycle of log
management:

   •   Collecting the log where it is being generated via an agent or remotely
   •   Securely transferring the data to the central server for analysis and storage
       Issuing real-time alerts to database administrators if needed
   •   Providing reports and analytics based on log data
   •   Securely storing the logs as long as prescribed by the retention policy and

      then, just as safely, destroying them Let’s look at each of the stage of the above
process and see how it applies to databases.

First, how do we collect database log data for analysis? As we learned in the previous
paper, database might be logging to its own database tables or to dedicated files,
either text or binary and proprietary. One obvious solution is to use a dedicated piece
of software - an agent – running on a database server which allows for efficient log
collection and secure data transfer. However, many DBAs would strongly object about
running something extra on “their” servers, and, given typically high requirements for
database server uptime, such concerns are not entirely unbounded. Thus, a remote
or “agentless” approach needs to be used if possible. If a database logs are located
into a database tables, one can connect to said server via ODBC or JDBC and grab
all the needed data by executing a SELECT command. This allows for granular audit
collection which will not endanger database operation. AT the same time, many
database now natively support SSL for JDBC/ODBC transfers and thus our data
connection will be secured against eavesdropping. Once the log data has been
collected by the log management tool, it can be purged from the original database to
save space. In this case, a log management tool will have a full set of logs from all the
databases.

In case of a file-based logging, such as in the case of Oracle DBA logs that cannot be
directed to a database for storage, a secure SFTP or FTPS connection may be used to
grab the logs, also in a secure and authenticated fashion. Needless to say, such log
grabs are logged as well.

Second, while logs are being moved to a log management tool, time-sensitive alerting
needs to take place. For example, if we observe that a somebody is downloading an
entire table or changing a database scheme while being logged from a remote
connection, it might be worth an alert. More sophisticated algorithms, such as
anomaly detection or correlation, may be used to drive alerting as well.

Third, more in-depth analysis of collected log data is performed via reports and
searches. Why review the database log reports? The reasons we show below are
driven by operational, security and regulatory or compliance concerns. Specifically,

Change management: modern RDBMS is a complicated piece of software with plenty
of configuration files and other things to change. And being aware of all the changes
constitutes one of the control objectives for IT governance as well as essential for
protecting the environment.

Authentication, Authorization and Access: logging access control decision such as
login failures and successes as well as access to data and various database objects is
of interest for auditors as well as important for security, such as insider privilege abuse.
While logging all access to data is less common, it is one of the emerging trends in
logging.

Threat Detection: while both unauthorized changes and access control decisions are
essential for security, database logs may be used to discover and analyze direct
exploitation attempts as well, at least in some cases. Even accessing the database
system at an unusual time will likely be of interest to as security team.

Performance: DBAs are tasked with monitoring database performance and logs
provide one of the avenues for doing so. This is especially important to those orgs with
strict service level agreements (SLA) for database performance.

Business Continuity: knowing of database software starts and stops is essential since
business depend on databases for their revenue streams and this a downed database
directly leads to losing money

Thus, looking at the database log reports that cover the above categories would be of
value for multiple stakeholders within the organization and even beyond (in case of an
external audit)
Finally, retaining log data is now directly mandated by some of the regulations and
industry guidelines such as PCI. Log management tools will help you automate such
policy driven retention and make sure that data from each database or a group of
database servers is retained as long as needed and then destroyed. Online retention
period will commonly spam 3-12 month period with longer retention on tape or other
dedicated storage tools.

Making a choice between simple analysis tools and a log management deployment
depends upon the usual factors such as available budget, IT resources, size of an
organization as well as regulatory mandates. Obviously, deploying any solution
enterprise-wide is a more involved process than simply installing a tool on an individual
server, but benefits of such broad deployment will go far beyond solving a single
tactical problem. Thus, author’s recommendation will be to combine database log
management with other similar projects (such as firewall or Unix server syslog
management) and use a single platform for all of them, but grow such deployment in
phases.

One final issue that needs to be addresses is performance. Given that database
administrators are very sensitive about everything that may slow down their databases,
we need to provide a few pointers.

If agent is deployed on a database server for log collection, it may indeed slow down
the system, either during its normal operation or if a bug happens to affect the agent
software. For example, a memory leak in the agent can cause memory exhaustion on
the server which will adversely affect the database performance. Remote log collection
is much less likely to affect the database performance, but the initial retrieval of a large
bulk of log records from a database has a potential of slowing down other operation.
To avoid this problem, one can schedule log collection to occur at off ours, when all
other database service operations, such as backups, happen. At the same time, direct
log grab from a database may be more bandwidth-intensive than the agent
communication. Given that database are commonly deployed in a datacenter,
availability of high-bandwidth network pipes is almost assured.

Conclusion

Overall, given that to satisfy current operational, security and compliance requirements
databases need to be configured with detailed logging which will result in a flood of
audit log data, using log management tools for log automation is absolutely essential.
While database-vendor-specific tools can help a bit, a comprehensive log management
solution presents a better choice in most circumstances. We would also like to note a
couple of future trends that affect database logging and log management. One is an
overall increase in logging across IT solutions. It would not be surprising if in a few
years many organization will have to log all access to data in their critical databases
and their other data storage systems. The second trend that will help allay the
consequences of the first one is an increasing level of intelligence in log management
tools. Thus, despite the dramatic increase of log data volume, it is likely that a
workloads of the IT teams will not grow at the same pace since many of the tasks, even
deeper analysis tasks, will be automated.



ABOUT THE AUTHOR:

This is an updated author bio, added to the paper at the time of reposting in 2009.

Dr. Anton Chuvakin (http://www.chuvakin.org) is a recognized security expert in the field of log
management and PCI DSS compliance. He is an author of books "Security Warrior" and "PCI
Compliance" and a contributor to "Know Your Enemy II", "Information Security Management
Handbook" and others. Anton has published dozens of papers on log management, correlation, data
analysis, PCI DSS, security management (see list www.info-secure.org) . His blog
http://www.securitywarrior.org is one of the most popular in the industry.

In addition, Anton teaches classes and presents at many security conferences across the world; he
recently addressed audiences in United States, UK, Singapore, Spain, Russia and other countries. He
works on emerging security standards and serves on the advisory boards of several security start-ups.

Currently, Anton is developing his security consulting practice, focusing on logging and PCI DSS
compliance for security vendors and Fortune 500 organizations. Dr. Anton Chuvakin was formerly a
Director of PCI Compliance Solutions at Qualys. Previously, Anton worked at LogLogic as a Chief Logging
Evangelist, tasked with educating the world about the importance of logging for security, compliance
and operations. Before LogLogic, Anton was employed by a security vendor in a strategic product
management role. Anton earned his Ph.D. degree from Stony Brook University.

More Related Content

What's hot

Introduction to Oracle Database
Introduction to Oracle DatabaseIntroduction to Oracle Database
Introduction to Oracle Databasepuja_dhar
 
Centralised logging with ELK stack
Centralised logging with ELK stackCentralised logging with ELK stack
Centralised logging with ELK stackSimon Hanmer
 
Mysql index
Mysql indexMysql index
Mysql indexYuan Yao
 
SeaweedFS introduction
SeaweedFS introductionSeaweedFS introduction
SeaweedFS introductionchrislusf
 
AWS RDS Benchmark - Instance comparison
AWS RDS Benchmark - Instance comparisonAWS RDS Benchmark - Instance comparison
AWS RDS Benchmark - Instance comparisonRoberto Gaiser
 
InnoDB Performance Optimisation
InnoDB Performance OptimisationInnoDB Performance Optimisation
InnoDB Performance OptimisationMydbops
 
Get Savvy with Snowflake
Get Savvy with SnowflakeGet Savvy with Snowflake
Get Savvy with SnowflakeMatillion
 
M|18 Deep Dive: InnoDB Transactions and Write Paths
M|18 Deep Dive: InnoDB Transactions and Write PathsM|18 Deep Dive: InnoDB Transactions and Write Paths
M|18 Deep Dive: InnoDB Transactions and Write PathsMariaDB plc
 
Master the Multi-Clustered Data Warehouse - Snowflake
Master the Multi-Clustered Data Warehouse - SnowflakeMaster the Multi-Clustered Data Warehouse - Snowflake
Master the Multi-Clustered Data Warehouse - SnowflakeMatillion
 
Oracle Database Overview
Oracle Database OverviewOracle Database Overview
Oracle Database Overviewhonglee71
 
Database Management System, Lecture-1
Database Management System, Lecture-1Database Management System, Lecture-1
Database Management System, Lecture-1Sonia Mim
 
Business Intelligence, Portals, Dashboards and Operational Matrix with ShareP...
Business Intelligence, Portals, Dashboards and Operational Matrix with ShareP...Business Intelligence, Portals, Dashboards and Operational Matrix with ShareP...
Business Intelligence, Portals, Dashboards and Operational Matrix with ShareP...Optimus BT
 
Install Redis on Oracle Linux
Install Redis on Oracle LinuxInstall Redis on Oracle Linux
Install Redis on Oracle LinuxJohan Louwers
 
Snowflake essentials
Snowflake essentialsSnowflake essentials
Snowflake essentialsqureshihamid
 
MySQL Architecture and Engine
MySQL Architecture and EngineMySQL Architecture and Engine
MySQL Architecture and EngineAbdul Manaf
 
Mysteries of the binary log
Mysteries of the binary logMysteries of the binary log
Mysteries of the binary logMats Kindahl
 

What's hot (20)

OLTP vs OLAP
OLTP vs OLAPOLTP vs OLAP
OLTP vs OLAP
 
Introduction to Oracle Database
Introduction to Oracle DatabaseIntroduction to Oracle Database
Introduction to Oracle Database
 
Centralised logging with ELK stack
Centralised logging with ELK stackCentralised logging with ELK stack
Centralised logging with ELK stack
 
Mysql index
Mysql indexMysql index
Mysql index
 
SeaweedFS introduction
SeaweedFS introductionSeaweedFS introduction
SeaweedFS introduction
 
MySQL Backup & Recovery
MySQL Backup & RecoveryMySQL Backup & Recovery
MySQL Backup & Recovery
 
AWS RDS Benchmark - Instance comparison
AWS RDS Benchmark - Instance comparisonAWS RDS Benchmark - Instance comparison
AWS RDS Benchmark - Instance comparison
 
InnoDB Performance Optimisation
InnoDB Performance OptimisationInnoDB Performance Optimisation
InnoDB Performance Optimisation
 
Get Savvy with Snowflake
Get Savvy with SnowflakeGet Savvy with Snowflake
Get Savvy with Snowflake
 
M|18 Deep Dive: InnoDB Transactions and Write Paths
M|18 Deep Dive: InnoDB Transactions and Write PathsM|18 Deep Dive: InnoDB Transactions and Write Paths
M|18 Deep Dive: InnoDB Transactions and Write Paths
 
PostgreSQL.pptx
PostgreSQL.pptxPostgreSQL.pptx
PostgreSQL.pptx
 
Master the Multi-Clustered Data Warehouse - Snowflake
Master the Multi-Clustered Data Warehouse - SnowflakeMaster the Multi-Clustered Data Warehouse - Snowflake
Master the Multi-Clustered Data Warehouse - Snowflake
 
Oracle Database Overview
Oracle Database OverviewOracle Database Overview
Oracle Database Overview
 
Database Management System, Lecture-1
Database Management System, Lecture-1Database Management System, Lecture-1
Database Management System, Lecture-1
 
Business Intelligence, Portals, Dashboards and Operational Matrix with ShareP...
Business Intelligence, Portals, Dashboards and Operational Matrix with ShareP...Business Intelligence, Portals, Dashboards and Operational Matrix with ShareP...
Business Intelligence, Portals, Dashboards and Operational Matrix with ShareP...
 
Install Redis on Oracle Linux
Install Redis on Oracle LinuxInstall Redis on Oracle Linux
Install Redis on Oracle Linux
 
Snowflake essentials
Snowflake essentialsSnowflake essentials
Snowflake essentials
 
MySQL Architecture and Engine
MySQL Architecture and EngineMySQL Architecture and Engine
MySQL Architecture and Engine
 
Mysteries of the binary log
Mysteries of the binary logMysteries of the binary log
Mysteries of the binary log
 
Deep Dive on Amazon Aurora
Deep Dive on Amazon AuroraDeep Dive on Amazon Aurora
Deep Dive on Amazon Aurora
 

Viewers also liked

Time For A Change: How clear formate brine drilling fluids are outperforming ...
Time For A Change: How clear formate brine drilling fluids are outperforming ...Time For A Change: How clear formate brine drilling fluids are outperforming ...
Time For A Change: How clear formate brine drilling fluids are outperforming ...John Downs
 
Hoại tử xương do dùng thuốc viêm khớp bừa bãi
Hoại tử xương do dùng thuốc viêm khớp bừa bãiHoại tử xương do dùng thuốc viêm khớp bừa bãi
Hoại tử xương do dùng thuốc viêm khớp bừa bãirubye157
 
Vincent Industry Service Log
Vincent Industry Service LogVincent Industry Service Log
Vincent Industry Service LogVincent Tam
 
Open Hole Electric logs interpretation
Open Hole Electric logs interpretationOpen Hole Electric logs interpretation
Open Hole Electric logs interpretationMourad Wassef
 
Log File Analysis: The most powerful tool in your SEO toolkit
Log File Analysis: The most powerful tool in your SEO toolkitLog File Analysis: The most powerful tool in your SEO toolkit
Log File Analysis: The most powerful tool in your SEO toolkitTom Bennet
 
well logging tools and exercise_dileep p allavarapu
well logging tools and exercise_dileep p allavarapuwell logging tools and exercise_dileep p allavarapu
well logging tools and exercise_dileep p allavarapuknigh7
 
Well logging analysis: methods and interpretation
Well logging analysis: methods and interpretationWell logging analysis: methods and interpretation
Well logging analysis: methods and interpretationCristiano Ascolani
 
Formation evaluation and well log correlation
Formation evaluation and well log correlationFormation evaluation and well log correlation
Formation evaluation and well log correlationSwapnil Pal
 

Viewers also liked (18)

Time For A Change: How clear formate brine drilling fluids are outperforming ...
Time For A Change: How clear formate brine drilling fluids are outperforming ...Time For A Change: How clear formate brine drilling fluids are outperforming ...
Time For A Change: How clear formate brine drilling fluids are outperforming ...
 
Hoại tử xương do dùng thuốc viêm khớp bừa bãi
Hoại tử xương do dùng thuốc viêm khớp bừa bãiHoại tử xương do dùng thuốc viêm khớp bừa bãi
Hoại tử xương do dùng thuốc viêm khớp bừa bãi
 
WELL LOGGING 2
WELL LOGGING 2WELL LOGGING 2
WELL LOGGING 2
 
Baselining Logs
Baselining LogsBaselining Logs
Baselining Logs
 
Vincent Industry Service Log
Vincent Industry Service LogVincent Industry Service Log
Vincent Industry Service Log
 
Open Hole Electric logs interpretation
Open Hole Electric logs interpretationOpen Hole Electric logs interpretation
Open Hole Electric logs interpretation
 
Log File Analysis: The most powerful tool in your SEO toolkit
Log File Analysis: The most powerful tool in your SEO toolkitLog File Analysis: The most powerful tool in your SEO toolkit
Log File Analysis: The most powerful tool in your SEO toolkit
 
Log Files
Log FilesLog Files
Log Files
 
Well logging
Well loggingWell logging
Well logging
 
Tutorial imex builder (field units)
Tutorial imex builder (field units)Tutorial imex builder (field units)
Tutorial imex builder (field units)
 
Well logging
Well loggingWell logging
Well logging
 
Well logging
Well loggingWell logging
Well logging
 
Geophysical well logging
Geophysical well loggingGeophysical well logging
Geophysical well logging
 
well logging tools and exercise_dileep p allavarapu
well logging tools and exercise_dileep p allavarapuwell logging tools and exercise_dileep p allavarapu
well logging tools and exercise_dileep p allavarapu
 
Well logging analysis: methods and interpretation
Well logging analysis: methods and interpretationWell logging analysis: methods and interpretation
Well logging analysis: methods and interpretation
 
Formation evaluation and well log correlation
Formation evaluation and well log correlationFormation evaluation and well log correlation
Formation evaluation and well log correlation
 
Chemical kinetics presentation
Chemical kinetics   presentationChemical kinetics   presentation
Chemical kinetics presentation
 
Well logging
Well loggingWell logging
Well logging
 

Similar to Introduction to Database Log Analysis

Help! my sql server log file is too big!!! tech republic
Help! my sql server log file is too big!!!   tech republicHelp! my sql server log file is too big!!!   tech republic
Help! my sql server log file is too big!!! tech republicKaing Menglieng
 
Why advanced monitoring is key for healthy
Why advanced monitoring is key for healthyWhy advanced monitoring is key for healthy
Why advanced monitoring is key for healthyDenodo
 
how to protect your sensitive data using oracle database vault
how to protect your sensitive data using oracle database vaulthow to protect your sensitive data using oracle database vault
how to protect your sensitive data using oracle database vaultAnar Godjaev
 
DBA, LEVEL III TTLM Monitoring and Administering Database.docx
DBA, LEVEL III TTLM Monitoring and Administering Database.docxDBA, LEVEL III TTLM Monitoring and Administering Database.docx
DBA, LEVEL III TTLM Monitoring and Administering Database.docxseifusisay06
 
Application Of A New Database Management System
Application Of A New Database Management SystemApplication Of A New Database Management System
Application Of A New Database Management SystemPamela Wright
 
Exploring Oracle Database Performance Tuning Best Practices for DBAs and Deve...
Exploring Oracle Database Performance Tuning Best Practices for DBAs and Deve...Exploring Oracle Database Performance Tuning Best Practices for DBAs and Deve...
Exploring Oracle Database Performance Tuning Best Practices for DBAs and Deve...Aaron Shilo
 
Unit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptxUnit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptxSakshiGawde6
 
The Fundamental Characteristics of Storage concepts for DBAs
The Fundamental Characteristics of Storage concepts for DBAsThe Fundamental Characteristics of Storage concepts for DBAs
The Fundamental Characteristics of Storage concepts for DBAsAlireza Kamrani
 
Scalable scheduling of updates in streaming data warehouses
Scalable scheduling of updates in streaming data warehousesScalable scheduling of updates in streaming data warehouses
Scalable scheduling of updates in streaming data warehousesFinalyear Projects
 
REAL TIME PROJECTS IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
REAL TIME PROJECTS  IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...REAL TIME PROJECTS  IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
REAL TIME PROJECTS IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...Finalyear Projects
 
Real world business workflow with SharePoint designer 2013
Real world business workflow with SharePoint designer 2013Real world business workflow with SharePoint designer 2013
Real world business workflow with SharePoint designer 2013Ivan Sanders
 
SharePoint Intelligence Real World Business Workflow With Share Point Designe...
SharePoint Intelligence Real World Business Workflow With Share Point Designe...SharePoint Intelligence Real World Business Workflow With Share Point Designe...
SharePoint Intelligence Real World Business Workflow With Share Point Designe...Ivan Sanders
 
Large Scale SQL Considerations for SharePoint Deployments
Large Scale SQL Considerations for SharePoint DeploymentsLarge Scale SQL Considerations for SharePoint Deployments
Large Scale SQL Considerations for SharePoint DeploymentsJoel Oleson
 
How to protect your sensitive data using oracle database vault / Creating and...
How to protect your sensitive data using oracle database vault / Creating and...How to protect your sensitive data using oracle database vault / Creating and...
How to protect your sensitive data using oracle database vault / Creating and...Anar Godjaev
 
IRJET - The 3-Level Database Architectural Design for OLAP and OLTP Ops
IRJET - The 3-Level Database Architectural Design for OLAP and OLTP OpsIRJET - The 3-Level Database Architectural Design for OLAP and OLTP Ops
IRJET - The 3-Level Database Architectural Design for OLAP and OLTP OpsIRJET Journal
 
שבוע אורקל 2016
שבוע אורקל 2016שבוע אורקל 2016
שבוע אורקל 2016Aaron Shilo
 
Migration to Oracle 12c Made Easy Using Replication Technology
Migration to Oracle 12c Made Easy Using Replication TechnologyMigration to Oracle 12c Made Easy Using Replication Technology
Migration to Oracle 12c Made Easy Using Replication TechnologyDonna Guazzaloca-Zehl
 
1 ISACA JOURNAL VOLUME 1, 2012FeatureThe ability to r.docx
1 ISACA JOURNAL  VOLUME 1, 2012FeatureThe ability to r.docx1 ISACA JOURNAL  VOLUME 1, 2012FeatureThe ability to r.docx
1 ISACA JOURNAL VOLUME 1, 2012FeatureThe ability to r.docxhoney725342
 
New Microsoft Office WordDatabase administration and automation Document (2)
New Microsoft Office WordDatabase administration and automation Document (2)New Microsoft Office WordDatabase administration and automation Document (2)
New Microsoft Office WordDatabase administration and automation Document (2)naveen
 
AWS Data Lakes & Best Practices - GoDgtl
AWS Data Lakes & Best Practices - GoDgtlAWS Data Lakes & Best Practices - GoDgtl
AWS Data Lakes & Best Practices - GoDgtlMezzybatliwala
 

Similar to Introduction to Database Log Analysis (20)

Help! my sql server log file is too big!!! tech republic
Help! my sql server log file is too big!!!   tech republicHelp! my sql server log file is too big!!!   tech republic
Help! my sql server log file is too big!!! tech republic
 
Why advanced monitoring is key for healthy
Why advanced monitoring is key for healthyWhy advanced monitoring is key for healthy
Why advanced monitoring is key for healthy
 
how to protect your sensitive data using oracle database vault
how to protect your sensitive data using oracle database vaulthow to protect your sensitive data using oracle database vault
how to protect your sensitive data using oracle database vault
 
DBA, LEVEL III TTLM Monitoring and Administering Database.docx
DBA, LEVEL III TTLM Monitoring and Administering Database.docxDBA, LEVEL III TTLM Monitoring and Administering Database.docx
DBA, LEVEL III TTLM Monitoring and Administering Database.docx
 
Application Of A New Database Management System
Application Of A New Database Management SystemApplication Of A New Database Management System
Application Of A New Database Management System
 
Exploring Oracle Database Performance Tuning Best Practices for DBAs and Deve...
Exploring Oracle Database Performance Tuning Best Practices for DBAs and Deve...Exploring Oracle Database Performance Tuning Best Practices for DBAs and Deve...
Exploring Oracle Database Performance Tuning Best Practices for DBAs and Deve...
 
Unit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptxUnit 2 - Chapter 7 (Database Security).pptx
Unit 2 - Chapter 7 (Database Security).pptx
 
The Fundamental Characteristics of Storage concepts for DBAs
The Fundamental Characteristics of Storage concepts for DBAsThe Fundamental Characteristics of Storage concepts for DBAs
The Fundamental Characteristics of Storage concepts for DBAs
 
Scalable scheduling of updates in streaming data warehouses
Scalable scheduling of updates in streaming data warehousesScalable scheduling of updates in streaming data warehouses
Scalable scheduling of updates in streaming data warehouses
 
REAL TIME PROJECTS IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
REAL TIME PROJECTS  IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...REAL TIME PROJECTS  IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
REAL TIME PROJECTS IEEE BASED PROJECTS EMBEDDED SYSTEMS PAPER PUBLICATIONS M...
 
Real world business workflow with SharePoint designer 2013
Real world business workflow with SharePoint designer 2013Real world business workflow with SharePoint designer 2013
Real world business workflow with SharePoint designer 2013
 
SharePoint Intelligence Real World Business Workflow With Share Point Designe...
SharePoint Intelligence Real World Business Workflow With Share Point Designe...SharePoint Intelligence Real World Business Workflow With Share Point Designe...
SharePoint Intelligence Real World Business Workflow With Share Point Designe...
 
Large Scale SQL Considerations for SharePoint Deployments
Large Scale SQL Considerations for SharePoint DeploymentsLarge Scale SQL Considerations for SharePoint Deployments
Large Scale SQL Considerations for SharePoint Deployments
 
How to protect your sensitive data using oracle database vault / Creating and...
How to protect your sensitive data using oracle database vault / Creating and...How to protect your sensitive data using oracle database vault / Creating and...
How to protect your sensitive data using oracle database vault / Creating and...
 
IRJET - The 3-Level Database Architectural Design for OLAP and OLTP Ops
IRJET - The 3-Level Database Architectural Design for OLAP and OLTP OpsIRJET - The 3-Level Database Architectural Design for OLAP and OLTP Ops
IRJET - The 3-Level Database Architectural Design for OLAP and OLTP Ops
 
שבוע אורקל 2016
שבוע אורקל 2016שבוע אורקל 2016
שבוע אורקל 2016
 
Migration to Oracle 12c Made Easy Using Replication Technology
Migration to Oracle 12c Made Easy Using Replication TechnologyMigration to Oracle 12c Made Easy Using Replication Technology
Migration to Oracle 12c Made Easy Using Replication Technology
 
1 ISACA JOURNAL VOLUME 1, 2012FeatureThe ability to r.docx
1 ISACA JOURNAL  VOLUME 1, 2012FeatureThe ability to r.docx1 ISACA JOURNAL  VOLUME 1, 2012FeatureThe ability to r.docx
1 ISACA JOURNAL VOLUME 1, 2012FeatureThe ability to r.docx
 
New Microsoft Office WordDatabase administration and automation Document (2)
New Microsoft Office WordDatabase administration and automation Document (2)New Microsoft Office WordDatabase administration and automation Document (2)
New Microsoft Office WordDatabase administration and automation Document (2)
 
AWS Data Lakes & Best Practices - GoDgtl
AWS Data Lakes & Best Practices - GoDgtlAWS Data Lakes & Best Practices - GoDgtl
AWS Data Lakes & Best Practices - GoDgtl
 

More from Anton Chuvakin

Future of SOC: More Security, Less Operations
Future of SOC: More Security, Less OperationsFuture of SOC: More Security, Less Operations
Future of SOC: More Security, Less OperationsAnton Chuvakin
 
SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?Anton Chuvakin
 
Meet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton ChuvakinMeet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton ChuvakinAnton Chuvakin
 
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...Anton Chuvakin
 
SOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton ChuvakinSOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton ChuvakinAnton Chuvakin
 
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 BoothHey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 BoothAnton Chuvakin
 
20 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 202220 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 2022Anton Chuvakin
 
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton ChuvakinAnton Chuvakin
 
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020  Groovy SOC Tunes aka Modern SOC TrendsSOCstock 2020  Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020 Groovy SOC Tunes aka Modern SOC TrendsAnton Chuvakin
 
SOCstock 2021 The Cloud-native SOC
SOCstock 2021 The Cloud-native SOC SOCstock 2021 The Cloud-native SOC
SOCstock 2021 The Cloud-native SOC Anton Chuvakin
 
Modern SOC Trends 2020
Modern SOC Trends 2020Modern SOC Trends 2020
Modern SOC Trends 2020Anton Chuvakin
 
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in BriefAnton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in BriefAnton Chuvakin
 
Five SIEM Futures (2012)
Five SIEM Futures (2012)Five SIEM Futures (2012)
Five SIEM Futures (2012)Anton Chuvakin
 
RSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics PresentationRSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics PresentationAnton Chuvakin
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinAnton Chuvakin
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinAnton Chuvakin
 
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton ChuvakinPractical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton ChuvakinAnton Chuvakin
 

More from Anton Chuvakin (20)

Future of SOC: More Security, Less Operations
Future of SOC: More Security, Less OperationsFuture of SOC: More Security, Less Operations
Future of SOC: More Security, Less Operations
 
SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?SOC Meets Cloud: What Breaks, What Changes, What to Do?
SOC Meets Cloud: What Breaks, What Changes, What to Do?
 
Meet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton ChuvakinMeet the Ghost of SecOps Future by Anton Chuvakin
Meet the Ghost of SecOps Future by Anton Chuvakin
 
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
SANS Webinar: The Future of Log Centralization for SIEMs and DFIR – Is the En...
 
SOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton ChuvakinSOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton Chuvakin
 
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 BoothHey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
Hey SOC, Look LEFT! by Anton Chuvakin RSA 2023 Booth
 
20 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 202220 Years of SIEM - SANS Webinar 2022
20 Years of SIEM - SANS Webinar 2022
 
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
 
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020  Groovy SOC Tunes aka Modern SOC TrendsSOCstock 2020  Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
 
SOCstock 2021 The Cloud-native SOC
SOCstock 2021 The Cloud-native SOC SOCstock 2021 The Cloud-native SOC
SOCstock 2021 The Cloud-native SOC
 
Modern SOC Trends 2020
Modern SOC Trends 2020Modern SOC Trends 2020
Modern SOC Trends 2020
 
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in BriefAnton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in Brief
 
Generic siem how_2017
Generic siem how_2017Generic siem how_2017
Generic siem how_2017
 
Tips on SIEM Ops 2015
Tips on SIEM Ops 2015Tips on SIEM Ops 2015
Tips on SIEM Ops 2015
 
Five SIEM Futures (2012)
Five SIEM Futures (2012)Five SIEM Futures (2012)
Five SIEM Futures (2012)
 
RSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics PresentationRSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics Presentation
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
 
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton ChuvakinPractical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
 
SIEM Primer:
SIEM Primer:SIEM Primer:
SIEM Primer:
 

Recently uploaded

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DaySri Ambati
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo DayH2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
H2O.ai CEO/Founder: Sri Ambati Keynote at Wells Fargo Day
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Introduction to Database Log Analysis

  • 1. Introduction to Database Log Analysis Dr. Anton Chuvakin WRITTEN: 2006-2007 DISCLAIMER: Security is a rapidly changing field of human endeavor. Threats we face literally change every day; moreover, many security professionals consider the rate of change to be accelerating. On top of that, to be able to stay in touch with such ever-changing reality, one has to evolve with the space as well. Thus, even though I hope that this document will be useful for to my readers, please keep in mind that is was possibly written years ago. Also, keep in mind that some of the URL might have gone 404, please Google around. Part I Database security have been capturing more and more attention in recent years, even though most of the security issues surrounding the databases existed since the first day commercial database systems were introduced in the market. Nowadays, database security is often seen as containing the following principal components: access control to database software, structures and data database configuration hardening database data encryption database vulnerability scanning It is interesting to see that logging and auditing underline all of the above domains of database security. Indeed, the only way to verify what access control decisions is being made and who views what data from the RDBMS is to look at the authentication logs. Database configuration hardening includes enabling and increasing the auditing levels. Similarly, data encryption might be verified by log and configuration review. And, vulnerability exploitation usually leaves traces in logs despite what some say (the challenge is more often with understanding what the log said and not with having the logs) In recent years, insider attacks gathered more attention than periodic outbreaks of malware; and database logging happens to be in the forefront of this fight against insider attacks. Database systems are usually deployed deep inside the company network and thus insiders are usually has the easiest opportunity to attack and compromise them, and then steal (or “extrude” as some would say) the data. In addition to security, database logging (as well as log analysis) needs to be performed to allow IT auditors to do their jobs and enable regulatory compliance
  • 2. validation. On a more general level, IT governance best practice frameworks such as COBIT also steer IT users towards database logging. Different database software offer a dizzying array of logging options. For example, Oracle, the leading database software, has mandatory, standard and fine-grained audit. Specifically, to enable mandatory auditing (off by default) one needs to set the audit_sys_operations parameter to true for the appropriate database instance. Enabling standard audit is done by setting the audit_trail parameter for the instance and then enabling the relevant audit options. Similarly, MS SQL Server would always log server access and errors to a Windows event log, but logging – or “tracing” – other queries requires running a separate tool that creates trace files. And, finally, the open source MySQL has several log types – error log, query log, binary log of statements that change data and slow query logs. While error logs is always enabled, one needs to manually enable other types. For example, one enables query logging by starting mysql as “mysql –log”. So what is in common among the database logging? The above databases would log (rather, can be configured to log as most would log very little by default) most if not all of the following events: • user logins and logouts • database system starts, stops and restarts • various system failures and errors • user privilege changes • database structure (metadata) changes • most other DBA actions • select or all database data access (if configured to be so) The above logged events provide rich sources of information for the mentioned security, compliance and IT operational needs. A better way of saying it would be “would have provided if they were easy to analyze.” Many factors, such as log availability, log format complexity and log volume, hinder the log analysis efforts and most apply to database logging. What are the possibilities for database log formats? Given that databases are built to store structured data, one would assume that logs would always be stored in a database itself. That assumption will be in fact wrong. Most databases use a mix of logging to itself and logging to flat files, sometimes binary files. For example, in case of Oracle, database administrator (DBA) actions are logged into a separate file in order to prevent the said DBA from modifying the logs of his own actions (typically, a DBA will have unfettered access to the RDBMS, but not ‘root’ or Administrator on the underlying system). Here is an example of such log:
  • 3. Tue Sep 19 15:17:39 2006 ACTION : 'SHUTDOWN' DATABASE USER: '/' PRIVILEGE : SYSDBA CLIENT USER: oracle CLIENT TERMINAL: pts/4 STATUS: 0 Oracle database audit tables contains other audit information such as time, user name, SQL command, status and other data access auditing parameters. Microsoft SQL uses Windows event log facility to log its operational messages (starts, stops, backup status, etc) as well as server access (user login and logouts) However, file access audit logs are done differently by using so-called “trace files” – binary files that contain the information on all database data accesses. Here is an example messages produced by MS SQL Server: • “There is insufficient system memory to run this query.” • “The master database failed to restore. Use the rebuildm utility to rebuild the master database. Shutting down SQL Server.” • “Login failed. The maximum simultaneous user count of 1 licenses for this 'Standard Edition' server has been exceeded. Additional license should be obtained and installed or you should upgrade to a full version.” It is important to realize that default logging options on most databases exclude logging of the access to data, such as the SELECT statements as well as changes to data tables such as UPDATE or DELETE. Even more drastic actions such as table DROPs and ALTERs are not recorded, unless configured. To enable data-level logging one needs to set special configuration options and sometimes even to restart a database software. Unlike other situation, where logging has minimum impact on system performance, database audit logging does slow down the database, sometimes significantly. After all, high-performance databases are mean to provide thousands of data transactions per second and logging all of those presents a challenge to a system’s IO and well as CPU and disk storage resources. That is why logging has somewhat of a bad rap with DBAs. However, there are more and more reasons to enable logging nowadays and thus such performance considerations become secondary. If one tries to log even a subset of all data access and data changes, he should be prepared to drown in an ocean of audit log data. Extracting useful actionable information from such onslaught of data presents a challenge. Apart from performance and data volume, other challenges with database logs include verbosity and obscurity of log formats. Multi-line formats also hamper
  • 4. automated analysis of logs. Given the situation above, what can we do to make sense of database logs? While detailed discussion of database log analysis goes way outside the scope of this brief paper, we will try to give a few useful hints. First, as all other logs, database logs are indispensable for incident response. Thus, even collection of logs with no analysis whatsoever is going to help you during the crunch time of a data theft, server crash or even a surprise visit by your friendly auditor. If you are to take this one step, collecting logs from multiple serves at one central location (such as your log management solution) will make incident analysis much simpler and will prevent loss of log data due to routine log rotation or other reasons. Beyond just keeping logs for the “rainy” day one can institute a period review of a DBA activity logs. Such logs are usually less voluminous than data access audit, but provide critical information on DBA actions important for keeping tabs on people entrusted with your “crown jewels” such as customer lists or product inventory information. In some cases, even a manual review or a set of scripts will work, but for better efficiency, a log management tool or a set will do the trick much better. Further, if you need to log access to some data, which increasingly happens due to various regulations and “best practices” frameworks, manual log review will break down pretty quickly due to log volume (you might be looking at gigabytes of data per day or more) Thus, you will be embarking on a trail towards automating your databases log collection, analysis and archival. To conclude, database logging represents a new world for many security practitioners, but the one which they might have no choice but conquer. Enabling logging is a good start, from where one can progress towards more in-depth log analysis. Part II As we covered in the previous paper, database security and auditing have been capturing more and more attention in recent years. In this part of the paper, we will focus on what happens after you decide to enable all the logging we suggested in the previous paper. While currently, firewalls still hold the dubious record of spewing the highest volume of logs, database might rival such volume once people configure them to enable logging motivated by operational, security or compliance reasons. We mentioned that by default most commercial databases log surprisingly few events. Thus, a manual log review may be suitable under such circumstances, given that most of important events don’t ever show up in logs. Automation in the form of log analysis and log management tools becomes essential if any kind of database security “best practices” are being followed and logging is
  • 5. enabled. So, what might such tools provide? Simpler log analysis tools will allow users to review at logs on a specific database server only and likely require such tool to be running on that same server. Consequently, such tools will only work for a specific database type such as Oracle-only or DB2-only. They also usually do not provide any real-time analysis in the form or alerting or triggering automated actions. Still, they can provide some insight s from logs, which are clearly superior to going through raw logs line by line. Database vendors usually provide such tools. Examples include IBM DB2 Log Analysis Tool (that can be used to generate simple database log reports for a single server), MS SQL Profiler (that can be used to review audit trace files from a SQL Server) and Oracle LogMiner (that can analyze Oracle redo logs) More advanced log management tools will work across multiple database servers and even across database types. Many would also allow analysis of database logs in combination with other logs such as server, security device or firewall. Analysis of this type allows put the database data in the context or other enterprise log data and to correlate database activity with other things that happen at the organization at the same time. Such tools automate not only analysis of log data, but the whole lifecycle of log management: • Collecting the log where it is being generated via an agent or remotely • Securely transferring the data to the central server for analysis and storage Issuing real-time alerts to database administrators if needed • Providing reports and analytics based on log data • Securely storing the logs as long as prescribed by the retention policy and then, just as safely, destroying them Let’s look at each of the stage of the above process and see how it applies to databases. First, how do we collect database log data for analysis? As we learned in the previous paper, database might be logging to its own database tables or to dedicated files, either text or binary and proprietary. One obvious solution is to use a dedicated piece of software - an agent – running on a database server which allows for efficient log collection and secure data transfer. However, many DBAs would strongly object about running something extra on “their” servers, and, given typically high requirements for database server uptime, such concerns are not entirely unbounded. Thus, a remote or “agentless” approach needs to be used if possible. If a database logs are located into a database tables, one can connect to said server via ODBC or JDBC and grab all the needed data by executing a SELECT command. This allows for granular audit collection which will not endanger database operation. AT the same time, many database now natively support SSL for JDBC/ODBC transfers and thus our data connection will be secured against eavesdropping. Once the log data has been
  • 6. collected by the log management tool, it can be purged from the original database to save space. In this case, a log management tool will have a full set of logs from all the databases. In case of a file-based logging, such as in the case of Oracle DBA logs that cannot be directed to a database for storage, a secure SFTP or FTPS connection may be used to grab the logs, also in a secure and authenticated fashion. Needless to say, such log grabs are logged as well. Second, while logs are being moved to a log management tool, time-sensitive alerting needs to take place. For example, if we observe that a somebody is downloading an entire table or changing a database scheme while being logged from a remote connection, it might be worth an alert. More sophisticated algorithms, such as anomaly detection or correlation, may be used to drive alerting as well. Third, more in-depth analysis of collected log data is performed via reports and searches. Why review the database log reports? The reasons we show below are driven by operational, security and regulatory or compliance concerns. Specifically, Change management: modern RDBMS is a complicated piece of software with plenty of configuration files and other things to change. And being aware of all the changes constitutes one of the control objectives for IT governance as well as essential for protecting the environment. Authentication, Authorization and Access: logging access control decision such as login failures and successes as well as access to data and various database objects is of interest for auditors as well as important for security, such as insider privilege abuse. While logging all access to data is less common, it is one of the emerging trends in logging. Threat Detection: while both unauthorized changes and access control decisions are essential for security, database logs may be used to discover and analyze direct exploitation attempts as well, at least in some cases. Even accessing the database system at an unusual time will likely be of interest to as security team. Performance: DBAs are tasked with monitoring database performance and logs provide one of the avenues for doing so. This is especially important to those orgs with strict service level agreements (SLA) for database performance. Business Continuity: knowing of database software starts and stops is essential since business depend on databases for their revenue streams and this a downed database directly leads to losing money Thus, looking at the database log reports that cover the above categories would be of value for multiple stakeholders within the organization and even beyond (in case of an external audit)
  • 7. Finally, retaining log data is now directly mandated by some of the regulations and industry guidelines such as PCI. Log management tools will help you automate such policy driven retention and make sure that data from each database or a group of database servers is retained as long as needed and then destroyed. Online retention period will commonly spam 3-12 month period with longer retention on tape or other dedicated storage tools. Making a choice between simple analysis tools and a log management deployment depends upon the usual factors such as available budget, IT resources, size of an organization as well as regulatory mandates. Obviously, deploying any solution enterprise-wide is a more involved process than simply installing a tool on an individual server, but benefits of such broad deployment will go far beyond solving a single tactical problem. Thus, author’s recommendation will be to combine database log management with other similar projects (such as firewall or Unix server syslog management) and use a single platform for all of them, but grow such deployment in phases. One final issue that needs to be addresses is performance. Given that database administrators are very sensitive about everything that may slow down their databases, we need to provide a few pointers. If agent is deployed on a database server for log collection, it may indeed slow down the system, either during its normal operation or if a bug happens to affect the agent software. For example, a memory leak in the agent can cause memory exhaustion on the server which will adversely affect the database performance. Remote log collection is much less likely to affect the database performance, but the initial retrieval of a large bulk of log records from a database has a potential of slowing down other operation. To avoid this problem, one can schedule log collection to occur at off ours, when all other database service operations, such as backups, happen. At the same time, direct log grab from a database may be more bandwidth-intensive than the agent communication. Given that database are commonly deployed in a datacenter, availability of high-bandwidth network pipes is almost assured. Conclusion Overall, given that to satisfy current operational, security and compliance requirements databases need to be configured with detailed logging which will result in a flood of audit log data, using log management tools for log automation is absolutely essential. While database-vendor-specific tools can help a bit, a comprehensive log management solution presents a better choice in most circumstances. We would also like to note a couple of future trends that affect database logging and log management. One is an overall increase in logging across IT solutions. It would not be surprising if in a few years many organization will have to log all access to data in their critical databases and their other data storage systems. The second trend that will help allay the consequences of the first one is an increasing level of intelligence in log management tools. Thus, despite the dramatic increase of log data volume, it is likely that a workloads of the IT teams will not grow at the same pace since many of the tasks, even
  • 8. deeper analysis tasks, will be automated. ABOUT THE AUTHOR: This is an updated author bio, added to the paper at the time of reposting in 2009. Dr. Anton Chuvakin (http://www.chuvakin.org) is a recognized security expert in the field of log management and PCI DSS compliance. He is an author of books "Security Warrior" and "PCI Compliance" and a contributor to "Know Your Enemy II", "Information Security Management Handbook" and others. Anton has published dozens of papers on log management, correlation, data analysis, PCI DSS, security management (see list www.info-secure.org) . His blog http://www.securitywarrior.org is one of the most popular in the industry. In addition, Anton teaches classes and presents at many security conferences across the world; he recently addressed audiences in United States, UK, Singapore, Spain, Russia and other countries. He works on emerging security standards and serves on the advisory boards of several security start-ups. Currently, Anton is developing his security consulting practice, focusing on logging and PCI DSS compliance for security vendors and Fortune 500 organizations. Dr. Anton Chuvakin was formerly a Director of PCI Compliance Solutions at Qualys. Previously, Anton worked at LogLogic as a Chief Logging Evangelist, tasked with educating the world about the importance of logging for security, compliance and operations. Before LogLogic, Anton was employed by a security vendor in a strategic product management role. Anton earned his Ph.D. degree from Stony Brook University.