This topic describes how to use the security center. You can set different filter conditions to query SQL statements that may have problems.
Procedure
Log on to the ApsaraDB for OceanBase console.
In the left-side navigation pane, click Autonomy Service.
In the Instance Details section, click the name of the target cluster instance.
In the left-side navigation pane, click Security Center. On the page that appears, you can view a wide range of information.
SQL audit
On the SQL Audit tab, you can perform the following operations to query SQL statements that may have problems:
Switch to the target tenant: You can select the target tenant from the Tenant drop-down list.
Filter the information based on the specified conditions.
Filter item
Description
Database
Select one or more databases in the corresponding tenant.
Node
Select one or more nodes.
Keyword
Select one or more keywords that may exist in the problematic SQL statements. The relationship between the keywords can be AND or OR.
Time Range
You can select the last 5 minutes, 30 minutes, 1 hour, 6 hours, or a custom time range. The time range cannot exceed 6 hours.
Username
Enter one or more tenant names.
Operation Type
Select one or more operation types from the drop-down list.
Client IP Address
Enter the IP address of the client.
Execution Duration (ms)
Enter the execution duration for the target SQL statement.
Scan Records
Enter the range of scan records to view.
View the query result: You can view the query result in the following columns: SQL Statement, Database, User, Client IP Address, Operation Type, Request Time, Execution Duration (ms), Scanned Rows, and Updated Rows.
Download the query result: Click Export to download the query result.
NoteAt present, you can download at most 1,000 audit records. If the number of query records exceeds 1,000, only the first 1,000 records on the page are downloaded.
Security assessment
On the Security Assessment tab, you can perform the following operations to view information as needed:
View the statistics information of Total detection items, Cluster security risk items, and Tenant security risk items.
Click the Cluster Detection item or Tenant Detection Item tab to view the status of each check item. For a check item in the Risks detected state, you can view its assessment suggestions and click To Resolve to go to the corresponding page to modify configurations.
Click Start Assessment and then click OK to perform the assessment again.
Click Assessment History to view security assessment records.