Manage Target Databases

As your target databases and their environments evolve, you may need to perform various life-cycle management activities.

View Registration Details for a Target Database

You can view registration details for a target database on the Target database information page in the Oracle Data Safe service in Oracle Cloud Infrastructure. Details vary depending on the database type.

  1. From the navigation menu in Oracle Cloud Infrastructure, select Oracle AI Database, and then under Data Safe - Database Security, select Target databases.
    The Target database page opens.
  2. Select the compartment that contains your target database. To list all the target databases in the child compartments too, select the Include child compartments check box, and then select Apply filter.
  3. Select the name of your target database.
    The details page opens for your target database.
  4. On the Details tab, view the registration details for your target database.

Update Connection Details for a Target Database

You can update connection details for your target database from the Target database information page in Oracle Data Safe. Connection details vary depending on the database type; for example, TCP/TLS, database service name, database port number, and so on.

For example, for some target databases you can change the Oracle Data Safe private endpoint or Oracle Data Safe on-premises connector configuration for a target database.

  1. On the Target databases page in Oracle Data Safe, select the name of the target database that you want to update.
  2. Select Edit connection details.
    The Edit connection details panel opens.
  3. Modify the connection details as needed, and then select Save changes.

Update a Target Database Name and Description

You can update the name and description for your target database.

Here is a possible use case: If you rename your Autonomous AI Database from the database's Console in Oracle Cloud Infrastructure, the change is automatically propagated to Oracle Data Safe. Oracle recommends that you update the target database name in Oracle Data Safe to best match your database name. Each target database name must be unique in Oracle Data Safe. By updating your target database name, you can avoid name conflicts in the future.

  1. From the navigation menu in Oracle Cloud Infrastructure, select Oracle AI Database, and then under Data Safe - Database Security, select Target Databases.
    The Target database page opens.
  2. Select the compartment that contains your target database. To list all the target databases in child compartments too, select the Include child compartments check box.
  3. Select the name of the target database that you want to update.
    The Target database information page opens.
  4. To modify the target database name, from the Actions menu, select Edit display name. In the Edit display name panel, modify the name, and then select Update.
  5. To modify the target database description, from the Actions menu, select Edit description. In the Edit description panel, modify the description, and then select Update.

Update the Database User

For a non-Autonomous AI Database, you can update the credentials for the Oracle Data Safe service account.

  1. From the navigation menu in Oracle Cloud Infrastructure, select Oracle AI Database, and then under Data Safe - Database Security, select Target Databases.
    The Target database page opens.
  2. Select the compartment that contains your target database. To list all the target databases in child compartments too, select the Include child compartments check box.
  3. Select the name of your target database.
    The Target database information page opens.
  4. From the Actions menu, select Update database user.
    The Update database user panel opens.
  5. Modify the credentials as needed, and then select Update.

Move a Target Database to a Different Compartment

  1. From the navigation menu in Oracle Cloud Infrastructure, select Oracle AI Database, and then under Data Safe - Database Security, select Target Databases.
    The Target database page opens.
  2. Select the compartment that contains your target database. To list all the target databases in child compartments too, select the Include child compartments check box.
  3. Select the name of the target database that you want to move.
    The Target database information page opens.
  4. From the Actions menu, select Move resource.
    A Move resource panel opens.
  5. In the drop-down list, select a different compartment, and then select Move resource.
    The target database is immediately moved to the compartment.

Deregister a Target Database

When you deregister a target database, the target database is no longer available in Oracle Data Safe. If your target database is connected via an Oracle Data Safe private endpoint, the private endpoint is not automatically deleted during deregistration. You can still view collected audit data in the audit reports for a deregistered target database as long as the audit data retention period is not expired.

  1. From the navigation menu in Oracle Cloud Infrastructure, select Oracle AI Database, and then under Data Safe - Database Security, select Target Databases.
    The Target database page opens.
  2. Select the compartment that contains your target database. To list all the target databases in child compartments too, select the Include child compartments check box.
  3. Select the name of the target database that you want to deregister.
    The Target database information page opens.
  4. From the Actions menu, select Deregister.
    The Deregister target database dialog box opens.
  5. To confirm, click Deregister.
    Your target database is deregistered from Oracle Data Safe.

    For non-billed target databases the database will be in a DELETED state for one day. During this time, the metadata about your target database is kept in Oracle Data Safe. After one day, Oracle Data Safe permanently removes all metadata about your target database and your target database is no longer listed in the user interface.

    For billed target databases the database will be in a DELETED state for 45 days. During this time, the metadata about your target database is kept in Oracle Data Safe. After 45 days, Oracle Data Safe permanently removes all metadata about your target database and your target database is no longer listed in the user interface.

Resources that are Automatically Deleted When a Target Database is De-registered

When you de-register a target database there are a number of resources that are automatically deleted. However, there are also some resources that can't be deleted. See the below list to learn what happens to certain resources when a target database is de-registered.

Table 3-1 Resources that are automatically deleted when a target database is de-registered

Functional Area Oracle Data Safe Resource Oracle Data Safe Resource Name in OCI IAM Comments
Activity Auditing Audit profile* data-safe-audit-profiles In a cleanup job once there are no more audit events for the target database
Activity Auditing Audit trail data-safe-audit-trails  
Activity Auditing Audit event data-safe-audit-events Once the retention policy is over
Activity Auditing Audit policy* data-safe-audit-policies  
Activity Auditing/Alerts Target alert policy associations data-safe-target-alert-policy-associations  
Activity Auditing/Alerts Report data-safe-reports Reports that are older than 90 days will be deleted in a routine cleanup job
Activity Auditing Archive retrievals data-safe-archive-retrievals Yes - After the retrieved data has been online for 30 days
User Assessment User assessment user-assessments In a routine cleanup job
Security Assessment Security assessment security-assessments In a routine cleanup job
SQL Firewall Database security config data-safe-database-security-configs In a routine cleanup job
SQL Firewall Security policy data-safe-security-policies In a routine cleanup job
SQL Firewall Security policy deployment data-safe-security-policy-deployments In a routine cleanup job
SQL Firewall Firewall policy data-safe-sql-firewall-policies In a routine cleanup job
SQL Firewall SQL collection data-safe-sql-collections In a routine cleanup job
SQL Firewall Violation logs data-safe-sql-firewall-violations Yes-After the 12 month retention period has passed
SQL Firewall SQL Firewall allowed SQL data-safe-sql-firewall-allowed-sqls In a routine cleanup job
*When a target database is de-registered, the target database's audit policies and audit profiles are scheduled for deletion in an automatic cleanup job. Following the first run of the cleanup job, the policies are visible and marked as FAILED. Following the second run of the clean up job, the policies are visible and marked as DELETED. The policies are hard deleted following the third run of the clean up job and then are no longer be visible.

Note:

A maximum of 100 policies are cleaned up per day. So, in cases where more than 100 policies need to be cleaned up, the remaining policies are queued up for the next day's cleanup job.

The routine cleanup job runs frequently and deletes a number of resources whenever it runs. If you have many resources in the queue to be deleted, it may take several runs of the cleanup job to empty the queue.

Resources associated with or used by the target database (for example, sensitive data models, masking policies, and reports) are not deleted when the target database is de-registered. You need to manually delete these items. See What Resources Can Be Deleted While a Target Database is Active for more information.

Manage Network Access Changes for Oracle Autonomous AI Database Serverless

You can change the network access type for Oracle Autonomous AI Database Serverless from Secure access from everywhere to Secure access from allowed IPs and VCNs only, and vice versa. When making a network access change, you may need to perform tasks to maintain the database's registration with Oracle Data Safe.

Overview

If you plan to switch the network access for your Oracle Autonomous AI Database Serverless from Secure access from everywhere (public endpoint) to Private endpoint access only, prior to making the network access change, you need to create an Oracle Data Safe private endpoint on the same virtual cloud network (VCN) and subnet as your database. If you plan to switch from a private endpoint to a public endpoint, you do not need to do anything other than make the network switch. You do not need to deregister your Autonomous AI Database with Oracle Data Safe beforehand. Your database will have a public IP address after you make the change and you can view that IP address from the database's console. You may want to delete the Oracle Data Safe private endpoint previously used because it is no longer needed.

Note:

If your database is not yet registered with Oracle Data Safe, update the network access settings first, and then proceed with the registration.

When you switch the network access type to Private endpoint access only, the database's private endpoint communicates with Oracle Data Safe's private endpoint. The two private endpoints allow Oracle Data Safe to communicate with your database. This scenario is illustrated in the diagram below.

If there is no Oracle Data Safe private endpoint available and you attempt to make the network access change, you will get a message stating that the "Data Safe service may be disrupted if you switch to using a private endpoint without first configuring a Data Safe private endpoint." In this case, the switch will fail.

Workflow

If your Oracle Autonomous AI Database Serverless is already registered with Oracle Data Safe and you want to switch the database's network access type from Secure access from everywhere to Private endpoint access only, then follow the general steps listed in the table below.

Step Description Reference

1

Create an Oracle Data Safe private endpoint.

Create an Oracle Data Safe Private Endpoint

2

Switch the network access type to Private endpoint access only for your Oracle Autonomous AI Database Serverless.

Change from Public to Private Endpoints with Autonomous AI Database

3

Update the security rules to allow communication between Oracle Data Safe and your database.

Update the Security Rules to Allow Communication Between Oracle Data Safe and Your Database

Update the Security Rules to Allow Communication Between Oracle Data Safe and Your Database

Update the ingress and egress security rules for the Network Security Groups (NSGs) within your private VCN in Oracle Cloud Infrastructure to allow traffic from Oracle Data Safe's private endpoint to your Autonomous AI Database's private endpoint. While both an NSG and a security list act as virtual firewalls for your database, Oracle recommends that you use NSGs. For more information, see Network Security Groups.

Example 3-1 Configure security rules for Oracle Autonomous AI Database Serverless with private VCN access

Suppose you provision an Oracle Autonomous AI Database Serverless with private VCN access in Oracle Cloud Infrastructure. During provisioning, Oracle Cloud Infrastructure automatically creates a private endpoint for your database and you associate an NSG with your database.

To obtain the private IP address for your database's private endpoint and view the NSG name, you access the Network section on the Autonomous AI Database information tab in your database's Console in Oracle Cloud Infrastructure. Suppose the private endpoint's IP address is 10.0.10.232 and the NSG name is test_nsg.

To obtain the private IP address and NSG for an Oracle Data Safe's private endpoint, you access the private endpoint's page in Oracle Data Safe. Suppose the IP address is 10.0.10.160 and the NSG name is nsg_not_allow_pdb_pe_ip.

Next, you create a security rule for each of the NSGs the following way:

  • Ingress rule for the database private endpoint NSG: Configure the database's private endpoint IP address (10.0.10.232) on port 1522 to be able to receive incoming traffic from Oracle Data Safe's private endpoint IP address (10.0.0.6) from any port.
  • Egress rule for the Oracle Data Safe private endpoint NSG: Configure Oracle Data Safe's private endpoint IP address (10.0.0.6) from any port to be able to send requests to the database's private endpoint IP address (10.0.10.232) on port 1522.

The following diagram illustrates the general idea of the two security rules.

Manage Peer Databases Associated with a Registered Active Data Guard Primary Database

When you register a target database that is the primary database in an Active Data Guard association, you can manage the associated standby databases from the Target database page of the primary database. Managing the standby databases can include, adding them as peer databases, refreshing their connection details, editing their connection details, or deregistering them from Oracle Data Safe.

  1. From the navigation menu in Oracle Cloud Infrastructure, select Oracle AI Database, and then under Data Safe - Database Security, select Target databases. The Target databases page opens.
  2. Select the compartment that contains your target database.
  3. Select the name of your target database to which you want to add peer databases or refresh peer database connections for.

Add Peer Databases

  1. Open the details page for your target database.
  2. Select the Active Data Guard peer databases tab.
  3. Select Add peer database. The Add peer database panel opens.
  4. Select Add item.
  5. Either select from the available list of peer databases (cloud databases) or enter the following information (non-cloud databases):
    • Peer display name
    • Database service name
    • Database IP address
    • Database port number
    • Select TCP or TLS. If you select TLS, select either One way TLS and Mutual TLS.
      • If you select One way TLS, then do the following: Upload the TrustStore of your database in PEM, PKCS#12 wallet, or JKS wallet format. You can also enter the wallet password if required. This file is required whether client authentication is enabled or disabled on your target database.
      • If you select Mutual TLS, then do the following: Upload the TrustStore of your database in the format of PEM file, PKCS#12 wallet, or JKS wallet and enter the wallet password. This file is required whether client authentication is enabled or disabled on your target database. When client authentication is enabled on your target database, upload the KeyStore of your database in the format of PEM file, PKCS#12 wallet, or JKS wallet. This file is not required when client authentication is disabled.
  6. Select Add peer database.

Manually Refresh Peer Database Connections

Oracle Data Safe automatically checks and refreshes the peer database connection details every hour; however, you can do a manual refresh any time.

  1. Open the details page for your target database.
  2. Select the Active Data Guard peer databases tab.
  3. From the Actions menu, select Refresh.

Edit the Connection Details for the Primary Database

  1. On the details page for your target database, select Edit connection details.
  2. Modify the information, and then select Update.

Deregister a Peer Database

  1. Open the details page for your target database.
  2. Select the Active Data Guard peer databases tab.
  3. In the table, select the name of a peer database that you want to deregister. The Peer database information page opens.
  4. From the Actions menu, select Deregister.

Actions to Take After Performing a Manual Switch Over of Active Data Guard Associated Target Databases

If you have registered Active Data Guard associated target databases in Oracle Data Safe, you are able to see the role (primary or standby) of the databases. If you perform a manual switchover of the databases, you may not see the changes in the roles reflected immediately in Oracle Data Safe.

As a result of this, it's possible that a data masking job will fail because the proper read and write permissions are not associated with the database.

To prevent this from occurring, after performing a manual switchover, refresh the database connections. See Manage Peer Databases Associated with a Registered Active Data Guard Primary Database for more information.