An endpoint typically is a URL or access point , using URL we can connect to the specific OCI service
API in OCI or any cloud refer to a set of rest API , which is an alternate platform to manage the cloud resources instead of managing through a console. The APIs ideally require valid REST API key to authenticate and will be authorized using
role based user access.
The fingerprint is a short, unique identifier that is derived from the public key using a hash function
REST API will be managed automaticalluy using programming languages like Python,java,Ruby..etc
API key pairs -> This is a PEM key which is a combination of public and private key. The reason is it is universally supported by different secure tools like openssl like using openssl we can rsa key from API key pair
So this RSA can be used by putty to generate PPK as RSA can generate RSA public and RSA private keys
SSH KEY PAIRS -> This is a generation of a public and private keys . So a public key will be used for encryption and
OCI vault is a logical entity used to centrally manage managing and storing secrets in OCI.
using the OCI Vault, you can avoid the need to manage multiple sets of keys and credentials separately, which can simplify your security management and reduce the risk of key and credential theft.
In case of stateless, the security rule don't keep track of the connection state , that is we have define the rule separately for each packet
We have an VM instance is hosting an application and it has received an incoming request from HTTP protocol so
in this case stateful connection will records the information like from which source it has received the request, and the
respective port . So it will create a new connection and automatically allow the return traffic for that connection, which in this case would be the HTTP response sent back from the instance to the client.
In contrast, in a stateless system, the security rules do not maintain information about the connection state. Each packet is evaluated independently, which means that if you want to allow return traffic for established connections, you need to explicitly define egress rules to permit that traffic.
What is the OCI API gateway?
A virtual network appliance in a regional subnet is an API gateway in the OCI. Back-end services such as public, private, and partner HTTP APIs and Oracle Functions get through an API gateway.
What comes in the standard package?
The Oracle Database standard package is designed to simplify the deployment of an Oracle database in OCI. It includes pre-configured resources such as compute instances, block storage volumes, and network components.
You are opting for a standard package. Do you need to pay extra for TDE?
No, Oracle Database is included in all packages, including the regular, enterprise, high-performance, and extreme performance packages. Encryption of Transparent Data
Define a snapshot in the context of an Oracle database.
Oracle uses snapshots, also known as materialized views, to duplicate data to non-master sites in a synchronized environment. In a data warehouse context, snapshots are utilized to cache "expensive" searches. In other words, a snapshot is a replica of the target master table taken at a specific point in time.
What is a hash cluster in Oracle?
Hash clustering is a technique for storing data in hash tables and improving data retrieval performance. The hash function is applied to the cluster key value of each table row and stored in a hash cluster.
How can I delete the compartment in OCI?
To delete the compartment in OCI, select Identity & Security from the navigation menu. Select Compartments from the Identity menu. The compartments in your tenancy are listed. To delete a compartment, go to the Actions menu and select Delete Compartment.
What does a dynamic routing gateway in OCI do?
Dynamic Routing Gateways (DRGs) are routing gateway that allows you to change your route. A DRG serves as a virtual router, connecting your on-premises networks to VCNs and routing traffic between VCNs. A routing table connects with each DRG attachment and routes packets entering the DRG to the next hop.
What are Oracle data masking and subsetting?
Oracle Data Masking and Subsetting Pack is a flexible solution for masking and subsetting sensitive production data shared across non-production settings.
steps to do masking
Connect to your Oracle database using SQL*Plus or SQL Developer.
Create a new directory object in your database to store the exported data files. For example:
CREATE DIRECTORY dpump_dir AS '/u01/app/oracle/admin/DPUMP';
Run the Data Pump export utility to export the data from the source database to a dump file. For example:
expdp hr/hr DIRECTORY=dpump_dir DUMPFILE=hr_dump.dmp
Oracle provides several built-in tools and commands for data masking and subsetting. Here are the basic steps for performing data masking and subsetting using the Oracle Data Pump utility and the Data Masking Pack:
Connect to your Oracle database using SQL*Plus or SQL Developer.
Create a new directory object in your database to store the exported data files. For example:
CREATE DIRECTORY dpump_dir AS '/u01/app/oracle/admin/DPUMP';
Run the Data Pump export utility to export the data from the source database to a dump file. For example:
expdp hr/hr DIRECTORY=dpump_dir DUMPFILE=hr_dump.dmp
Install the Data Masking Pack using the Oracle Universal Installer.
Create a masking configuration file that defines the masking rules and parameters for the data to be masked. For example:
DECLARE
handle NUMBER;
BEGIN
handle := dbms_datapump_utl.create_masking_handle();
dbms_datapump_utl.add_column(handle, 'EMPLOYEES', 'FIRST_NAME', 'FIRST_NAME', 'FIRST_NAME', 'VARCHAR2', 100, NULL, NULL, 'Random');
dbms_datapump_utl.add_column(handle, 'EMPLOYEES', 'LAST_NAME', 'LAST_NAME', 'LAST_NAME', 'VARCHAR2', 100, NULL, NULL, 'Random');
dbms_datapump_utl.add_column(handle, 'EMPLOYEES', 'EMAIL', 'EMAIL', 'EMAIL', 'VARCHAR2', 100, NULL, NULL, 'Random');
dbms_datapump_utl.add_column(handle, 'EMPLOYEES', 'PHONE_NUMBER', 'PHONE_NUMBER', 'PHONE_NUMBER', 'VARCHAR2', 20, NULL, NULL, 'Random');
dbms_datapump_utl.add_column(handle, 'EMPLOYEES', 'SALARY', 'SALARY', 'SALARY', 'NUMBER', NULL, NULL, NULL, 'Random');
dbms_datapump_utl.execute_masking(handle);
END;
/
Run the Data Pump import utility to import the masked data from the dump file into the target database. For example:
impdp hr/hr DIRECTORY=dpump_dir DUMPFILE=hr_dump.dmp TRANSFORM=DATAPUMP_MASKING_EXPRESSIONS:config_file.txt
example masking table output
+----+-------------+------------+-----------------------------+---------------+---------+
| ID | FIRST_NAME | LAST_NAME | EMAIL | PHONE_NUMBER | SALARY |
+----+-------------+------------+-----------------------------+---------------+---------+
| 1 | Etczrjwxd | Vpmdorrlk | mkljtrbllo@shxbhtgfue.com | (210) 550-9948| 23750 |
+----+-------------+------------+-----------------------------+---------------+---------+
| 2 | Zfbywsmmr | Iqmztkanb | pmnqwmxoie@przwijgaub.com | (905) 236-2931| 15510 |
+----+-------------+------------+-----------------------------+---------------+---------+
| 3 | Ixvlbkjkr | Obonvnkyz | wcdyfmfnph@wnolymcjrj.com | (356) 973-9832| 10240 |
+----+-------------+------------+-----------------------------+---------------+---------+
| 4 | Sjxvzqsrq | Uitfvlwbu | jmfljwjyak@hviuaaemri.com | (426) 778-1492| 6200 |
+----+-------------+------------+-----------------------------+---------------+---------+
| 5 | Trfpyzkqr | Wcvsjmifw | vspkkmzjyj@pjlebnelul.com | (225) 587-4493| 29040 |
+----+-------------+------------+-----------------------------+---------------+---------+
Subsetting is a technique used to create a smaller, representative subset of a larger dataset. It is often used in situations where it is impractical or unnecessary to work with the entire dataset.
To apply subsetting, you can use the Oracle Data Pump utility to export a subset of the data from the source database to a new, smaller database. You can specify a subset of rows or a subset of columns to be included in the exported dataset.
What is the Oracle Audit Vault?
Oracle Audit Vault and Database Firewall analyze Oracle and non-Oracle database traffic to detect and block risks and combine audit data from databases, operating systems, directories, and other sources to improve compliance reporting.
What is the Oracle Wallet Manager used for?
Wallet owners use Oracle Wallet Manager to manage and modify the security credentials in their Oracle wallets.
Where can you store your oracle database backup in the Oracle Cloud?
Oracle offers a dependable and scalable cloud object storage solution. According to the Oracle website, this is an 8000 TB storage used to store and access data in ever-growing databases. This is the location where Oracle database backup data saves.
Can you explain what an Availability Domain is?
An Availability Domain is a single data center within Oracle Cloud Infrastructure. It is made up of a cluster of servers, storage, and networking resources that are isolated from other Availability Domains.
How do you create an image of your compute instance using Oracle Cloud Infrastructure?
You can create an image of your compute instance using Oracle Cloud Infrastructure by using the Console or the API. To create an image using the Console, first stop the instance that you want to image. Then, go to the Images section of the Console and click the Create Image button. Enter the required information and click the Create Image button. To create an image using the API, use the CreateImage operation.
Is there any limit on the number of volumes that can be attached to a single compute instance? If yes, then what is the maximum allowed number of volumes?
Yes, there is a limit on the number of volumes that can be attached to a single compute instance. The maximum number of volumes allowed is eight.
Do I need to have SSH access enabled for my compute instance in order to attach a persistent volume?
No, you do not need to have SSH access enabled for your compute instance in order to attach a persistent volume. You can attach a persistent volume to your compute instance through the Oracle Cloud Infrastructure Console.
What is the main advantage of using the DNS service provided by Oracle Cloud Infrastructure?
The main advantage of using the DNS service provided by Oracle Cloud Infrastructure is that it is highly available and scalable. The DNS service is designed to handle large amounts of traffic and can easily scale to meet the needs of your application.
What is the purpose of the “Caching Security Rules” feature present in the WAF Management Console?
The “Caching Security Rules” feature allows you to cache the results of WAF evaluations for a period of time, so that subsequent requests for the same resources can be served more quickly. This can be helpful in reducing the load on your WAF and improving performance.
What is the method used by the FastConnect facility to connect two networks across public internet?
The FastConnect facility uses a technique called “virtual private networking” (VPN) to connect two networks across the public internet. VPNs use a combination of encryption and tunneling to create a secure, private connection between two networks.
Can you give me examples of where I would use block storage as opposed to object storage?
Block storage is well suited for applications that require low latency, such as databases or virtual machines. Object storage is better suited for storing large amounts of data that is infrequently accessed.
What should I do if my compute instance doesn’t start after rebooting?
If your compute instance doesn’t start after rebooting, the first thing you should check is the status of the instance. You can do this by logging into the Oracle Cloud Infrastructure console and checking the instance’s status. If the instance is in a stopped state, you will need to start it manually.
If the instance is in a running state, but you are still unable to connect to it, you should check the security groups associated with the instance. Make sure that the security groups are configured correctly and that they allow traffic on the port you are trying to connect to.
What is fleet patching
Fleet patching is not limited to OCI VM instances, but can be used for any instances that run supported operating systems and meet certain requirements.
In terms of pre-checks, fleet patching performs several checks before applying patches to instances in a fleet. These checks include:
Health check: Checks the overall health of the instances in the fleet, such as whether they are running or stopped, and whether they have any unresolved issues.
Dependency check: Checks that the patches do not have any dependencies that are not met, such as other patches or software versions.
Conflict check: Checks that the patches do not conflict with any other software or configurations on the instances.
Capacity check: Checks that the instances have sufficient resources, such as CPU, memory, and storage, to apply the patches.
Prerequisite check: Checks that the instances meet any prerequisites for the patches, such as minimum software versions or configurations.
If any of these checks fail, the patching job will not proceed until the issues are resolved.
Fleet patching can be a powerful tool for managing patching at scale, but it is important to use it carefully and to ensure that the patches being applied do not cause any unintended consequences or conflicts. It is recommended to test patches on a smaller subset of instances before applying them to an entire fleet, and to monitor the fleet closely during and after patching to ensure that the patches were applied successfully and that there are no issues.
Comments
Post a Comment