Databases
Integration guide for Oracle
Oracle Database Audit Logs provide detailed records of database activity, including user actions, access attempts, and changes to data or configurations. These logs help ensure compliance, support forensic investigations, and enhance security monitoring.
1. Requirements
- UTMStack Agent (Windows or Linux) with Syslog integration enabled on port 7014 TCP/UDP (You can follow the Syslog integration guide from the “Integrations” menu on your UTMStack instance).
- rsyslog with module “imfile” enabled.
- Configure Oracle DB to write Audit, Listener and Alert logs to files.
The UTMStack agent can be installed on a separate instance dedicated to receiving logs, or on the UTMStack same server. However, it is recommended to install the UTMStack agent directly on the server running the Oracle DB to enable incident response commands.
Rsyslog must be installed on the same server as your OracleDB.
2. Configure logs forwarding to UTMStack
1. Run the following command to create the configuration file:
2. Open file “/etc/rsyslog.d/oracle-utmstack.conf” with your preferred editor and add the following configuration:
3. Replace BASEDIR
with the actual Oracle DB working/base path (e.g., /u01/app/oracle
)
4. Replace DESTINATION
with the UTMStack Agent’s IP address or Fully Qualified Domain Name (FQDN)
Rsyslog will send logs by default using UDP protocol, however, it is possible to use TCP protocol by adding an additional @ just before the agent IP or FQDN. Example: