A Audit Vault Server Fields

This appendix contains the AVDF events and fields that you can map to in your collection plug-ins.

This appendix covers these topics:

A.1 AVDF Fields

This section discusses the different types of AVDF values:

A.1.1 Core Fields

Core fields are fundamental to all source types and central to the description of an event. These fields are present in most audit records, for reporting, filtering, and so on.

EventTimeUTC: Required: The time stamp that indicates when the event occurred. If the event has more than one time stamp (for example, an event start time stamp and an event end time stamp), then the collection plug-in must assign a time stamp to this field. If this field contains NULL, then Oracle Audit Vault shuts down the collection plug-in.

UserName: Required: The user who performed the action in the application or system that generated the audit record. If this field contains NULL, then the audit record is invalid.

CommandClass: Required: The action performed in the event (for example, SELECT or DELETE). If this field contains NULL, then the audit record is invalid. See "Actions".

OSUserName: The user who logged into the operating system that generated the audit record. If the user logged into the operating system as JOHN but performed the action as SCOTT, then this field contains JOHN and the User Name field contains SCOTT.

TargetType: The type of the target object on which the action was performed. For example, if the user selected from a table, then the target type is TABLE. See "Target Types".

TargetObject: The name of the object on which the action was performed. For example, if the user selected from a table, then the Target Object field contains the name of the table.

TargetOwner: The name of the owner of the target on which the action was performed. For example, if the user had selected from a table owned by user JOHN, then the Target Owner field contains the user name JOHN.

ClientIP: The IP address of the host (Host Name) from where the user initiated the action.

ClientHostName: The host computer from where the user initiated the action. For example, if the user performed the action from an application on a server, then this field contains the name of the server.

EventName: The name of the event as is from the audit trail.

EventStatus: The status of the event. There are three possible values for EventStatus: SUCCESS, FAILURE, and UNKNOWN.

ErrorId: The error code of an action.

ErrorMessage: The error message of an action.

CommandText: Contains the text of the command that caused the event, which can be a SQL statement, a PL/SQL statement, and so on. This is also a large field.

CommandParam: Contains the parameters of the command that caused the event. This is also a large field.

A.1.2 Large Fields

Large fields are fields that can contain arbitrarily large amounts of data.

For large fields, use the following:

  • CommandText: Contains the text of the command that caused the event, which can be a SQL statement, a PL/SQL statement, and so on. This is also a core field.

  • CommandParam: Contains the parameters of the command that caused the event. This is also a core field.

A.1.3 Marker Field

Marker Field of a Record: The marker is a string that uniquely identifies a record in a a trail. During the recovery process, Audit Vault uses this field to filter the duplicate records. The collection plug-in provides the marker field, which is typically a concatenated subset of the fields of an audit record. For example, in Oracle database, the session Id and Entry id (a unique identifier within a session) define a marker.

A.1.4 Extension Field

The extension field can store fields that cannot be accommodated in core or large fields, as name-value pairs, separated by delimiter, inside a single Audit Vault field.

A.2 Actions and Target Types

This section contains lists of target types and actions that Audit Vault is aware of. If you are building a collection plug-in, then you should use these fields in your mapper file, if the fields mapped semantically. Otherwise, you can use your own values.

This section covers the following:

A.2.1 Actions

The Action field describes the nature of user activity that triggers generation of an audit record. It is similar to the verb part of a sentence; it describes the activity.

Oracle Audit Vault and Database Firewall strongly recommends mapping audit events to an appropriate value for the Action field, if the user activity semantically maps to it. Audit Vault Server is current aware of the following actions:

Create

Read

Select

Insert

Delete

Remove

Truncate

Update

Modify

Execute

Communicate

Set

Get

Verify

Logon

Logoff

Authorize

Violate

Acquire

Release

Enable

Disable

Backup

Restore

Open

Close

Apply

Grant

Revoke

Deny

Suspend

Resume

Commit

Savepoint

Checkpoint

Rollback

Rollforward

Copy

Move

Rename

Analyze

Audit

Noaudit

Migrate

Validate

Startup

Shutdown

Unmount

Mount

Invalid

Associate

Disassociate

Deny

Proxy

Initialize

Unknown

Subscribe

Unsubscribe

User configurable event

DDL

Control

Undo

Access

Deadlock

DML

Transaction Control

A.2.2 Target Types

The TargetType field describes the type of object on which a user action operates. It is similar to a noun that describes the object of a user action.

Oracle Audit Vault and Database Firewall strongly recommends mapping audit events to an appropriate value for the TargetType field, if the user activity semantically maps to it.

Audit Vault Server is current aware of the following target types:

DATABASE

OBJECT

OPERATOR

OUTLINE

PROCEDURE

PUBLIC DATABASE LINK

TYPE BODY

CONTROL FILE

FLASHBACK

BROKER QUEING

BUFFERPOOL

SCHEMA

SYSTEM

TRIGGER

PRIVILEGE

EVENT MONITOR

RULE

EVALUATION

USER

STATISTICS

METHOD

CONTEXT

MESSAGE

VIEW

CONNECTION

TAPE

SAVEPOINT

USER OR PROGRAM UNIT LABEL

APP ROLE

EDITION

FLASHBACK ARCHIVE

MATERIALIZED VIEW LOG

NODEGROUP

PACKAGE BODY

RESOURCE COST

ROLE

INDEXTYPE

USER_RECYCLEBIN

SAVEPOINT

ASSEMBLY

CLUSTER

FUNCTION

JAVA

MINING MODEL

PUBLIC SYNONYM

REWRITE EQUIVALENCE

SEQUENCE

SUMMARY

DEFAULT

AUTHORIZATION

INSTANCE

NODE

CHECKPOINT

EXPRESSION

DATABASE LINK

DIMENSION

INDEX

PACKAGE

SYNONYM

TABLE

TABLESPACE

TYPE

DIRECTORY

LIBRARY

RESTORE POINT

ALL TRIGGERS

APPLICATION

TRANSACTION

USER LOGON

REVOKE

UNKNOWN

MATERIALIZED VIEW

SESSION

TABLE OR SCHEMA POLICY

INDEXES

PROFILE

ROLLBACK SEG

TRACE

DBA_RECYCLEBIN

SUBSCRIPTION