Background
In order to protect the data security of a database, prevent various attacks, and meet national security compliance requirements, protecting your database is a must.
Database Audit provides you with the database security auditing function in a bypass mode. It records user access to the database in real time, generates fine-grained audit reports, and sends real-time alarms for high-risk operations and attacks. In addition, Database Audit generates compliance reports that meet data security standards (e.g., Sarbanes-Oxley) to locate internal violations and improper operations, thus ensuring data asset security.
Step 1: Purchase a Database Audit Instance
You need to purchase Database Audit instances and configure database security audit parameters based on your business requirements. For detailed operations, see Purchase Database Audit Instance.
Step 2: Add Database Assets
1. In the left menu, select Assets > Asset Management to enter the Asset Management page, select the Asset Management tab, and click Add.
2. In the pop-up Add Asset window, edit the relevant information. For the parameter filling rules, see the table below.
Parameter | Parameter Description |
Enable recommended rules when saved | If this option is checked, the rules recommended by the system will apply to the added assets when they are saved; if not, the rules recommended by the system will not apply to the added assets when they are saved. |
Type | Select Relational database. The following takes MySQL 5.7 as an example. |
Asset Group | Set the asset group to which the asset belongs. |
Name | The name of an asset must consist of Chinese characters, letters, numbers, underlines (_), dots (.) or dashes (-), within 64 characters. |
OS | The following takes the Linux system as an example. |
IP Port | Set the IP address and port number of the server where the asset is located. |
3. Then, click Save to add the database to the assets.
Step 3: Add Agent
1. In the left menu, select System Management > Agent Management, to enter the Agent Management page, select the Agent Installation tab, and select a suitable version of Agent installation package and download.
Note:
The downloaded Agent will forward traffic to the current Database Audit instance by default. If you need to forward traffic to other Database Audit instances, find the serviceIp option in the agent.ini configuration file in the unzipped Agent path and change the address.
Whether it is the Linux version installation package, AIX version installation package or Windows version installation package, there is a ReadMe document in the folder, which contains instructions for use, file description, precautions, running environment description, and configuration file description. Please read this document carefully before installation and follow the requirements strictly.
2. After downloading the installation package, upload the Agent installation package to the specified directory of the Linux server.
Description
Do not execute binary files directly.
The decompression directory cannot contain spaces.
Each time you change the running or decompression directory, you need to re-run the installation script.
In a Linux environment, you need to run the script as the root user and specify Bash as the interpreter, or run the script directly without specifying an interpreter.
3. Use the tar –xf dbAgent_V2.28.tar.gz command to decompress the Agent installation package and enter the Agent installation directory.
4. Execute the ./install.sh command in the installation directory to install the Agent program.