A brief introduction to the function of holographic log subsystem

Source: Internet
Author: User
Tags add log modify sql query rollback system log oracle database

A brief introduction to the function of holographic log subsystem



I. Background of the project

With the rapid development of computers and networks, the database is no longer just a topic of programmer-specific. and Oracle database is by virtue of its outstanding performance, easy to operate and flexible features, in the database market has occupied a place. But also with the continuous progress of network technology, the increasing data information, data security is no longer the old "long talk", and more than the previous books on those "elusive" rules. Both government agencies and enterprise users are very concerned about the security of data, because it is directly related to the user's immediate interests. Once the core data is destroyed, it will directly lead to the government can not continue to work, enterprises can not operate normally, will bring huge losses to society, enterprises and individuals, the consequences are disastrous. Therefore, the user is eager to the application system can faithfully record the user to the database of every modification, delete operations, so that the changes in data can be traced. It facilitates accountability when data is compromised and restores data at critical times. Especially for the use of multiple users of the application system, such requirements are more urgent.



Ii. Solutions

The holographic log subsystem is based on the basic function of oracle9i, and the software developed using pl/sql language. He is a complete solution dedicated to system log monitoring and data security. The system can achieve the table level and even the column level of fine-grained monitoring configuration, you can also view the monitored tables/columns of any add, delete, modify operations, the administrator can know who, at what time, what data to perform what kind of operation, but also can pull out the old data and new data for comparison view. If the user wants to, you can also perform a recovery operation on one of these operations, bringing the data back to the state before the modification.



Third, the system function design

1 User Management function

The holographic log subsystem has built-in user management capabilities to add and remove users, and to modify user passwords. The user information is encrypted and stored in the holographic log subsystem, and the user is configured and managed through the stored procedure.

2) Monitoring Configuration function

Users can select the tables/columns to monitor, and the log system will monitor and record all additions, edits, and deletions on these tables/columns.

3 Login authentication and Data protection function

When the application system connects to the database, the user name and password need to be passed to the holographic log subsystem through the stored procedure, and the system will determine whether the logged-on user is legitimate according to the preconfigured user information. Legitimate users can normally operate by the holographic log subsystem monitoring of the table/column, but each operation will be faithfully recorded by the system, so that the changes in data can be traced. Users who fail to log on will not be able to add, edit, and delete the monitored tables to ensure the security of the system data. Even if you use a Third-party tool to connect to a database, you cannot damage the data in the monitored tables if you are not logged on correctly.

4) Log Query function

The administrator can review the additions, edits, and deletions on the monitored tables/columns at any time, and see who has made the changes to which tables/columns. You can also compare old data with new data. For upper-level applications, the natural language description of the query results can be achieved simply by making a simple configuration of the log system. For example: John added a new parcel on November 20 15:38.

5) Data Recovery function

The user can perform a restore operation on the last modification of the datasheet/column to restore the data to the state before the modification.



Four, the system uses the explanation
1) Installation
Run the program Pl/sql package in Sqlplus and install the holographic log subsystem.
Configure the tables and columns that users want to monitor in the system tables.
Log on with SYSDBA permissions to run the monitoring initialization stored procedure.
Populate the Log system table with the business-level user name, password, and role number of the application system through the log system's stored procedure. If you have a user maintenance module, you should also maintain the user name and password in the Log system table in the user Maintenance module.
3) Use method
Application of the business layer user login, call the log system stored procedures to log in, if the login is successful, can be monitored data to add, edit, modify operations, otherwise it will not be able to perform the above operation.

Five, System characteristics


1) High cohesion, low coupling

The coupling of holographic log subsystem and application system is limited to user name, password, role number maintenance, update and login operation at logon.

2) Convenient installation and configuration

3 implementation of fine-grained audit control, users can limit the monitoring of a table on a column.

2. Intuitive Log display function

The application system can view user action logs from database views. In addition to providing the most basic simple operation log (who has performed what at what time) and the verbose log (the contrast between old and new data in operation), it also provides a natural language description mechanism that can be implemented through a simple configuration such as: "John on November 20 15:38 A new parcel was added to Yongtai road." Such a log description.

3 Data Fine rollback function

If you install the data rollback plug-in, you can also rollback the last operation of the specified table (not a concept with Oracle's transaction rollback) to revert to the state before the modification. Theoretically can be rolled back infinitely

Eight wind does not move original


Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.