All Products
Search
Document Center

ApsaraDB for OceanBase:Security center

Last Updated:Feb 22, 2024

This topic describes how to use the security center. You can set different filter conditions to query SQL statements that may have problems.

Procedure

  1. Log on to the ApsaraDB for OceanBase console.

  2. In the left-side navigation pane, click Autonomy Service.

  3. In the Instance Details section, click the name of the target cluster instance.

  4. In the left-side navigation pane, click Security Center. On the page that appears, you can view a wide range of information.

SQL audit

On the SQL Audit tab, you can perform the following operations to query SQL statements that may have problems:

  1. Switch to the target tenant: You can select the target tenant from the Tenant drop-down list.1

  2. Filter the information based on the specified conditions.

    Filter item

    Description

    Database

    Select one or more databases in the corresponding tenant.

    Node

    Select one or more nodes.

    Keyword

    Select one or more keywords that may exist in the problematic SQL statements. The relationship between the keywords can be AND or OR.

    Time Range

    You can select the last 5 minutes, 30 minutes, 1 hour, 6 hours, or a custom time range. The time range cannot exceed 6 hours.

    Username

    Enter one or more tenant names.

    Operation Type

    Select one or more operation types from the drop-down list.

    Client IP Address

    Enter the IP address of the client.

    Execution Duration (ms)

    Enter the execution duration for the target SQL statement.

    Scan Records

    Enter the range of scan records to view.

  3. View the query result: You can view the query result in the following columns: SQL Statement, Database, User, Client IP Address, Operation Type, Request Time, Execution Duration (ms), Scanned Rows, and Updated Rows.

  4. Download the query result: Click Export to download the query result.2

    Note

    At present, you can download at most 1,000 audit records. If the number of query records exceeds 1,000, only the first 1,000 records on the page are downloaded.

Security assessment

On the Security Assessment tab, you can perform the following operations to view information as needed:

image.png

  1. View the statistics information of Total detection items, Cluster security risk items, and Tenant security risk items.

  2. Click the Cluster Detection item or Tenant Detection Item tab to view the status of each check item. For a check item in the Risks detected state, you can view its assessment suggestions and click To Resolve to go to the corresponding page to modify configurations.

  3. Click Start Assessment and then click OK to perform the assessment again.

  4. Click Assessment History to view security assessment records.

    image.png