APTARE IT Analytics Technical Notes
- Enable Oracle's Transparent Data Encryption (TDE)
- Array Performance Statistics Technical Note
- EMC Symmetrix Enhanced Performance metrics
- Create enhanced EMC Symmetrix Performance report templates
- EMC Symmetrix Array Performance
- EMC Symmetrix Back-end Director Performance
- EMC Symmetrix Front-end Port Performance
- EMC Symmetrix Storage Group Performance
- EMC Symmetrix Database Performance
- EMC Symmetrix Disk Group Performance
- EMC Symmetrix Disk Performance
- EMC Symmetrix Device Groups Performance
- EMC Symmetrix Disk by Technology Performance
- EMC Symmetrix Storage Tier Performance
- EMC Symmetrix Thin Tier Performance
- EMC Symmetrix Thin Pool Performance
- EMC Isilon Array Performance Metrics
- EMC Isilon Array Performance
- EMC Isilon Disk Performance
- EMC Isilon Node Performance
- EMC Isilon OneFS Performance
- EMC Isilon Protocol Performance
- NetApp Cluster-Mode Performance Metrics
- NetApp Cluster-Mode Aggregate Performance
- NetApp Cluster-Mode CIFS Performance
- NetApp Cluster-Mode Disk Performance
- NetApp Cluster-Mode Fiber Channel Protocol Logical Interface Performance
- NetApp Cluster-Mode LUN Performance
- NetApp Cluster-Mode NFS Performance
- NetApp Cluster-Mode Processor Node Performance
- NetApp Cluster-Mode Processor Performance
- NetApp Cluster-Mode RAID Performance
- NetApp Cluster-Mode SMB (Server Message Block) Performance
- NetApp Cluster-Mode System Performance
- NetApp Cluster-Mode Target Port Performance
- NetApp Cluster-Mode Volume Performance
- Pure Storage FlashArray Performance Metrics
- Pure Array Performance
- Set up FIPS Compliant Data Collector for File Analytics
Enable Oracle's transparent data encryption (TDE)
This Oracle features is only available when using Oracle Enterprise Edition with the additional Oracle Advanced Security option licensed.
Oracle supports TDE with Oracle Database Enterprise Edition. To use TDE with APTARE IT Analytics complete the following steps on a Linux platform:
- Create a keystore path. For example: /opt/aptare/oracle/wallet
# su - aptare # mkdir /opt/aptare/oracle/wallet
- Edit/create the sqlnet.ora file in the Oracle installation. The default location is <install location>/oracle/network/admin with following content:
-------------------------------- #cat /opt/aptare/oracle/network/admin/sqlnet.ora ENCRYPTION_WALLET_LOCATION= (SOURCE= (METHOD=FILE) (METHOD_DATA= (DIRECTORY=<path where keystore to be created for example /opt/aptare/oracle/wallet >))) -------------------------------- - Copy the APTARE IT Analytics portal software ISO contents to a directory in the system where the Portal will be installed.
- Edit the tablespace creation sql file to support TDE:
Copy the database_release_10XXX.tar.gz from the ISO contents to a temp directory:
# cp /portal/aptare/linux/database_release_10XXX.tar.gz /tmp/oracle_ee_tde/
Extract the tar:
#cd /tmp/oracle_ee_tde # tar -xzvf database_release_10XXX.tar.gz
Replace file ora_scripts/create_tablespaces_encrypt.sql with ora_scripts/create_tablespaces.sql:
#cp ora_scripts/create_tablespaces_encrypt.sql ora_scripts/create_tablespaces.sql
Edit the following lines in the file ora_scripts/create_tablespaces_encrypt.sql to replace the place holder strings for keystore password, keystore path (for example /opt/aptare/oracle/wallet/) and encryption standard (for example AES256):
PROMPT Creating keystore ADMINISTER KEY MANAGEMENT CREATE KEYSTORE '<keystore path mentioned in sqlnet.ora>' IDENTIFIED BY <keystore password>; PROMPT Checking wallet status select WRL_PARAMETER,STATUS,WALLET_TYPE from v$encryption_wallet; PROMPT Opening Wallet... administer key management set keystore open identified by <keystore password>; PROMPT Checking wallet status select WRL_PARAMETER,STATUS,WALLET_TYPE from v$encryption_wallet; PROMPT Setting Master key ADMINISTER KEY MANAGEMENT SET KEY IDENTIFIED BY <keystore password> WITH BACKUP USING 'aptare_scdb'; PROMPT Setting Auto login ADMINISTER KEY MANAGEMENT CREATE LOCAL AUTO_LOGIN KEYSTORE FROM KEYSTORE '<Keystore path mentioned in sqlnet.ora >' IDENTIFIED BY <keystore password>; CREATE TABLESPACE aptare_tbs_data_1m DATAFILE '/data01/oradata/scdb/aptare_tbs_data_1m_01.dbf' SIZE 256M REUSE AUTOEXTEND ON NEXT 64M MAXSIZE 20G EXTENT MANAGEMENT LOCAL UNIFORM SIZE 1M ENCRYPTION USING '<encryption standard>' DEFAULT STORAGE (ENCRYPT); ->Note:
Every tablespace in the file has an <encryption standard> to replace. All must be modified.
- Create the tar with the modified file and replace it in the ISO contents.
#cd /tmp/test # rm -f database_release_10XXX.tar.gz # tar -cvf /tmp/database_release_10XXX.tar * # gzip /tmp/database_release_10XXX.tar #cp /tmp/database_release_10XXX.tar.gz /portal/aptare/linux/
- Run the schema creation script create_aptare_database.sh
#su - aptare /portal/ create_aptare_database.sh