Oracle AVDF 12.2.0 Release Note
Oracle AVDF 12.2.0 Release Note
Oracle AVDF 12.2.0 Release Note
Release Notes
Release 12.2.0
E49588-16
September 2019
Release Notes
These Release Notes contain important information about Oracle Audit Vault and
Database Firewall (Oracle AVDF) Release 12.2.0.
This document contains these topics:
• What's New in This Release (page 1)
• Upgrading Oracle Audit Vault and Database Firewall (page 2)
• Downloading the Audit Vault and Database Firewall Documentation (page 9)
• Supported Secured Targets and Platforms (page 10)
• Known Issues (page 10)
• Bugs Fixed In Release 12.2.0.0.0 (page 23)
• Documentation Accessibility (page 24)
1
• You can register hosts with a host name or a domain name.
• You can change the logging levels of system components from the Web UI.
• You can unlock user accounts from the Web UI.
• New reports have been added including: the Oracle Database Vault report,
summary reports, IRS compliance reports, and reports that correlate database
audit events with OS users that used su or sudo to execute commands.
• In the Administrator's Web UI, the Hosts tab has new Host Monitor details, and
added Audit Vault Agent details.
• The Audit Vault Server's high availability pairing UI has been improved for
usability.
• Support for IBM AIX secured targets has been added.
• The Oracle AVDF auditor can create an alert syslog template.
• The Oracle AVDF auditor can set a schedule for retrieval of audit data and
entitlements from Oracle Database.
• We have added Oracle Audit Vault and Database Firewall Concepts Guide to the
documentation library.
• Included important information on upgrade from 12.1 or older versions. See About
Upgrading Oracle Audit Vault and Database Firewall (page 2) for complete
information.
Topics:
• About Upgrading Oracle Audit Vault and Database Firewall (page 2)
• Step 1: Download the Upgrade Software and Instructions (page 4)
• Step 2: Back Up the Current Oracle AVDF Installation (page 5)
• Step 3: Install the Oracle AVDF Pre-Upgrade RPM (page 5)
• Step 4: Transfer the ISO File to the Appliance (page 6)
• Step 5: Start the upgrade script (page 6)
• Step 6: Restart the Appliance (page 7)
• Step 7: Upgrade the Audit Vault Server Pair for High Availability (page 8)
• Step 8: Upgrade the Database Firewall Pair for High Availability (page 9)
2
This procedure explains how to perform an upgrade of Oracle Audit Vault and
Database Firewall (Oracle AVDF) in a single-appliance environment and for a high
availability environment.
Before you begin the upgrade, be aware of the following issues:
• If you are running Oracle Audit Vault and Database Firewall Release 12.1.x in a
VM Ware environment, then do not upgrade to release 12.2.0. Contact Oracle
Support for guidance on upgrading to release 12.2.0 in a VM Ware environment.
• The upgrade process preserves user accounts and passwords from the previous
Oracle Audit Vault and Database Firewall installation.
• Oracle Audit Vault and Database Firewall versions 12.2.0.0.0 and above must
first upgrade to 12.2.0.9.0, and then to the latest version in release 12.2.
• Oracle Audit Vault and Database Firewall versions 12.1.2.7.0 and above in
12.1.x series must first upgrade to 12.2.0.8.0, then to 12.2.0.9.0, and then to
the latest version in release 12.2.
• Oracle Audit Vault and Database Firewall versions prior to 12.1.2.7.0 must first
upgrade to 12.2.0.2.0, then to 12.2.0.9.0, and then subsequently to the latest
version in release 12.2.
• In all the above cases, the user may perform a single backup operation prior to
performing the first upgrade.
• Upon successfully upgrading to release 12.2.0.4.0 from 12.2.0.3.0, the user
must run the encryption script prior to executing archive jobs.
The installer checks for the following conditions before it will allow the upgrade to
complete:
• Compatibility with the currently installed version
• A minimum of at least 8 GB of memory. You can force the upgrade to complete if
your system has a lower amount of memory (for example, 4 GB), because it is not
difficult to extend memory for an Oracle Audit Vault and Database Firewall release
12.2.0 installation. However, Oracle Audit Vault and Database Firewall will send
daily reminders to upgrade your system's memory.
• Space checks on available directory space. The upgrade process does not take
into account the installed data. The space checks are a bare minimum below
known failed upgrades. The space checks are as follows:
3
File System Space Check
/var/dbfw 100 MB
/var/log 100 MB
/var/tmp 5 GB
The downloaded Oracle AVDF zip file contains the following files:
• avdf-pre-upgrade-12.2.0.11.0-1.x86_64.rpm: This executable file is pre-
upgrade check that you should install before beginning the upgrade. It checks
if the system meets conditions for a successful upgrade, prepares the system
by creating volume to copy main upgrade ISO and installs the avdf-upgrade
script. This script simplifies the upgrade process.
4
• The following three ISO files, which include all the files that are required to
perform the upgrade:
– avdf-upgrade-12.2.0.11.0-part1.iso
– avdf-upgrade-12.2.0.11.0-part2.iso
– avdf-upgrade-12.2.0.11.0-part3.iso
• readme_12.2.0.11.0.html: This file contains detailed upgrade instructions for
more complex upgrades, such as high availability.
11. Combine the three ISO files into one ISO file.
• Microsoft Windows:
copy /b avdf-upgrade-12.2.0.11.0-part1.iso+avdf-upgrade-12.2.0.11.0-part2.iso
+avdf-upgrade-12.2.0.11.0-part3.iso avdf-upgrade-12.2.0.11.0.iso
• Linux:
cat avdf-upgrade-12.2.0.11.0-part1.iso avdf-upgrade-12.2.0.11.0-part2.iso
avdf-upgrade-12.2.0.11.0-part3.iso > avdf-upgrade-12.2.0.11.0.iso
12. Generate an MD5 checksum file for the combined ISO files.
• Microsoft Windows: Use the Microsoft File Checksum Integrity Verifier. You
can download this tool from Microsoft Download Center
• Linux:
md5sum avdf-upgrade-12.2.0.11.0.iso
13. Ensure that the checksum file matches the following value:
b2a709d49eb23930639de1b95bcdbab9
14. Use the metadata .txt file to verify the patch download.
See Also:
Oracle Audit Vault and Database Firewall Administrator's Guide for backup
instructions.
5
The avdf-pre-upgrade-12.2.0.11.0-1.x86_64.rpm executable checks the upgrade
preconditions described earlier and prepares the system for upgrade by creating
the /var/dbfw/upgrade directory with enough space to hold the main upgrade ISO file.
1. Log in to the Audit Vault Server through SSH as user support, and then switch
user (su) to root.
2. Copy the avdf-pre-upgrade-12.2.0.11.0-1.x86_64.rpm executable from the
download location to the appliance on which you want to perform the upgrade.
scp remote_host:/path/to/avdf-pre-upgrade-12.2.0.11.0-1.x86_64.rpm /root
3. Install the avdf-pre-upgrade-12.2.0.11.0-1.x86_64.rpm executable.
rpm -i /root/avdf-pre-upgrade-12.2.0.11.0-1.x86_64.rpm
/usr/bin/avdf-upgrade
Note:
In case an error is encountered when running the pre-upgrade RPM, remove
the package, correct the issue, and reinstall it again. Execute the following
command to uninstall the pre-upgrade RPM package before installing again:
rpm -e avdf-pre-upgrade-12.2.0.11.0-1.x86_64
6
1. Log in to the Audit Vault Server through SSH as user support, and then switch
user (su) to root.
You must have root privileges to start the upgrade script.
2. Start the upgrade script as follows:
/usr/bin/avdf-upgrade --confirm
Output similar to the following appears:
WARNING: power loss during upgrade may cause data loss. Do not power
off during upgrade.
The restart process enables the upgrade to complete. When the appliance
restarts, the pre-database and post-database migrations are run automatically.
This process performs any system configurations that could not be completed
when you ran the upgrade helper Step 5: Start the upgrade script (page 6). This
process also removes the pre-upgrade avdf-pre-
upgrade-12.2.0.11.0-1.x86_64.rpm executable, so you do not need to manually
remove this file.
7
Note:
• Optionally the user may reset the firewalls. The Audit Vault Server
stores Firewall settings in the local repository. This can later be used
for recovery purpose. Click Reset Database Firewall to update all
the Firewall’s settings on the Audit Vault Server. This is applicable
for Firewalls added to the Audit Vault Server prior to release
12.2.0.1.
• The Reset Database Firewall removes existing enforcement points
and creates new ones using the configuration already stored on the
Audit Vault Server. Those enforcement points not listed on the Audit
Vault Server are removed. The captured data which is not processed
is also deleted. The network setting of the Firewall is not altered.
This action will also reset the Firewall ID. A Database Firewall is
uniquely identified by a Firewall ID. This Firewall ID is derived from
the Management Network Interface Card (NIC). Whenever the
Network Interface Card is replaced, the Firewall ID must be reset.
3. If you have upgraded an Oracle Database Firewall, then re-register it on the Audit
Vault Server.
a. Log in to the Audit Vault Server as an Administrator.
b. Select the Database Firewalls tab, click Register, and enter a name and IP
address for the firewall. Then click Save.
c. Click Save.
See Also:
Step 7: Upgrade the Audit Vault Server Pair for High Availability
Note:
Do not change the primary and standby roles before completing the upgrade
on both Audit Vault Servers.
8
1. Upgrade the standby Audit Vault Server.
Follow the steps in "Upgrading Oracle Audit Vault and Database Firewall
(page 2)", from Steps 1 through 6 to upgrade the standby (secondary).
2. After the standby Audit Vault Server is rebooted, ensure that it is up and running
before proceeding to upgrade the primary Audit Vault Server.
3. Upgrade the primary Audit Vault Server.
Follow the steps in "Upgrading Oracle Audit Vault and Database Firewall
(page 2)", from Steps 1 through 6, to upgrade the primary.
After the primary Audit Vault Server is rebooted and is running, no additional reboot is
needed. It should be fully functional at this point.
See Also:
Oracle Audit Vault and Database Firewall Administrator's Guide for
information about logging in to the Audit Vault Server.
9
See Also:
• http://www.oracle.com/pls/topic/lookup?ctx=avdf122 to download
the most current version of this document, and the complete set of
Oracle Audit Vault and Database Firewall documentation.
• http://docs.oracle.com for documentation of other Oracle products.
Note:
• Oracle Audit Vault and Database Firewall Administrator's Guide for the
latest information on supported secured targets.
• Oracle Audit Vault and Database Firewall Installation Guide to find the
platform support information for the current release and for other
releases.
This information can also be found in the Article 1536380.1 at My Oracle
Support.
Known Issues
This section lists the system's current known issues, with workarounds if available. Be
sure to apply the latest bundle patch. New installations include the latest bundle patch.
In general, if you experience a problem using the Audit Vault Server console UI, try
running the same command using the AVCLI command line utility.
Workaround: This may be due to a "-" (dash or hyphen) in the export directory name
for NFS archiving locations. Check for "-" (dash or hyphen) in the export directory
name and delete that filesystem from the Audit Vault Server.
10
Workaround: Upgrade SSH client to a version that supports SHA-256.
Note:
This issue is encountered only while upgrading to Oracle Audit Vault and
Database Firewall release 12.2.0.9.0.
Workaround:
1. Check for errors in the /var/log/messages file.
2. In case there are any errors with the tag
com.oracle.preBP9UpgradeAgentPatch.isPatchApplied, then validate that
Oracle Audit Vault and Database Firewall release 12.2.0.9.0 has been
successfully applied.
3. Log in to the Audit Vault Server console. Verify that version is listed as
12.2.0.9.0. This ensures that Oracle Audit Vault and Database Firewall release
12.2.0.9.0 has been successfully applied.
4. In case you still encounter this error, then contact Oracle Support.
11
Note:
This issue is encountered only while upgrading to Oracle Audit Vault and
Database Firewall release 12.2.0.9.0.
Workaround: Check for errors in the /var/log/messages file. In case there are any
errors with the tag com.oracle.preBP9UpgradeAgentPatch.isPatchApplied, then
contact Oracle Support.
Upgrade Fails If The Time Settings For The Primary And Standby
Servers Are Out Of Synch By More Than 3 Minutes
Cause: If the primary and standby server time settings are out of sync by more than 3
minutes, then upgrade will fail raising the following error: ORA-29005: The
certificate is invalid.
Workaround: You must synchronize the time on the primary and standby servers
before commencing upgrade.
12
Workaround: Do not create Entitlement Snapshot labels after a full backup and
before an incremental backup operation. If you do so, perform a full backup operation
to ensure this data will not be missing from the incremental backup operation.
It provides the current status of the installation or upgrade and asks you to check the
system log for more information and contact Oracle Support.
Workaround: Upon seeing this blue screen, perform the following:
1. Log in as root user.
2. Capture the diagnostics archive by running the following diagnostics package to
output the name of the archive file:
/usr/local/dbfw/bin/priv/dbfw-diagnostics-package.rb
Note:
If this command creates a file diagnostics-not-enabled.readme follow
the instructions in that file to enable the diagnostics and generate the
archive.
3. File a Service Request (SR) and attach the archive to the SR.
Note:
Once Oracle Audit Vault and Database Firewall detects an error in the
installation or upgrade, it will not start any more services, but it will retain any
started services so that they can be debugged.
Cause: These servers include a small internal USB drive for the Oracle System
Assistant. This device contains a Linux installation, which conflicts with the bootloader
in Oracle Audit Vault and Database Firewall 12.2.0.0.0 and later versions.
13
Solution: To install Oracle Audit Vault and Database Firewall 12.2.0.0.0 or a later
version, you must first disable Oracle System Assistant from the BIOS menu. If the
option to disable the OSA is greyed out, reset the BIOS to enable it.
See Also:
https://docs.oracle.com/cd/E36975_01/html/E38042/
z40000091408680.html for more information.
Solution: Only a single instance of VG (vg_root) can exist. In case there are more
instances, they must be removed. Failure to comply may result in kernel panic or
upgrade failure.
Contact Oracle Support for assistance.
14
• The administrator must configure the network and plan the routing table to
accommodate multiple network interface cards. The network routing table
determines how the packets are routed, their path, and the preferred network
adapter. In case this is not effectively designed, then the agent installation may
fail.
15
Existing Workaround Command Before Installing Pre-upgrade RPM
Release
12.2.0.2.0 mount /boot; rm -rf /boot/
initramfs-3.8.13-118.6.1.el6uek.x86_64.img; yum -y erase
kernel-2.6.32-573.26.1.el6.x86_64; umount /boot
12.2.0.3.0 mount /boot; rm -rf /boot/
initramfs-3.8.13-118.8.1.el6uek.x86_64.img; yum -y erase
kernel-2.6.32-642.3.1.el6.x86_64; umount /boot
Note:
The above issue may not be encountered for Oracle Audit Vault and
Database Firewall release 12.2.0.4.0 and onwards.
16
Change the network adapter the host monitor uses so that traffic is captured from the
correct network for the secured target. Follow these steps:
1. Check the host monitor log file and look for a section similar to:
The selected network device for capturing is:
\Device\NPF_{22E6D6FF-43E2-4212-9970-05C446A33A35}. To change the device update
the network_device_name_for_hostmonitor attribute at Collection Attributes to
any one value from the list:
\Device\NPF_{17C832B3-B8FC-44F4-9C99-6ECFF1706DD1},
\Device\NPF_{22E6D6FF-43E2-4212-9970-05C446A33A35},
\Device\NPF_{60611262-3FCC-4374-9333-BD69BF51DEEA} and restart the trail
This indicates which device is being used, and which devices are available. For
more information on the available devices, you can run the host monitor in debug
mode.
2. In the Audit Vault Server console, Secured Targets tab, click the secured target
you want.
3. In the Modify Collection Attributes section, Attribute Name field, enter
network_device_name_for_hostmonitor.
4. In the Attribute Value field, enter the device name, for example: \Device
\NPF_{17C832B3-B8FC-44F4-9C99-6ECFF1706DD1}
5. Click Add, and then Save.
6. Restart the audit trail for this secured target.
17
18420068: oracle_user_setup.sql Asks to Add User to Data
Dictionary Realm for Oracle Database Vault on Release 12c
Update oracle_user_setup.sql script to avoid using Oracle Data Dictionary realm for
Database Vault.
This issue affects Oracle Database 12c secured targets that have Database Vault
enabled. When using the Oracle Audit Vault and Database Firewall user setup script
oracle_user_setup.sql, and running the script with REDO_COLL mode, the script outputs
the following message, which does not apply to Oracle Database 12c:
Connect to the secured target database as DV Owner and execute:
exec dbms_macadm.add_auth_to_realm('Oracle Data Dictionary', 'C##USER1',
null,dbms_macutl.g_realm_auth_participant);
Workaround:
Ignore the above message if you see it when running the script for an Oracle
Database 12c. Instead, execute the following on the database as DV Owner:
SQL> GRANT DV_STREAMS_ADMIN TO username;
For username, use the name of the account you created for Oracle Audit Vault and
Database Firewall on this Oracle Database secured target.
See Also:
Oracle Audit Vault and Database Firewall Administrator's Guide for complete
instructions on this setup script .
18
18948614: HA - After Failover AVSERVER Fails to Forward
Syslog And Arcsight Messages
In a High Availability configuration, after a failover, Audit Vault Server does not forward
syslog and Arcsight messages
Workaround:
1. Log in to the Audit Vault Server console as a super administrator.
2. Click the Settings tab, and then click Connectors.
3. In the Syslog section, and then click Save.
4. Scroll down to the HP ArcSight SIEM section, and then click Save.
See Also:
Oracle Audit Vault and Database Firewall Installation Guide
19
The avpack plug-in that is packaged on Windows does not work on Linux. In other
words, you cannot run the avpack plug-in on Linux after you have packaged it on
Windows. To produce this error:
1. Download the Oracle AVSDK on Windows.
2. Package the plug-in on Windows.
3. Deploy the plug-in on Oracle AVDF.
4. Install an Oracle AVDF agent on Linux.
5. Start an audit trail for this Linux host. However, the audit trail cannot start.
Workaround: If you want to run the agent and audit trail collection on Linux, then
package the plug-in on Linux, not on Windows. If you package the plug-in on Linux,
agent and audit trail collection can run on either Linux or Windows.
If you try to start the agent manually by running the agentctl start command, the
following error appears:
Agent integrity check failed. Please upgrade the agent manually.
20
4. Install the agent.
5. When the agent installation is complete, try starting the collection.
The following error may appear:
java.sql.SQLException: ORA-00604: error occurred at recursive SQL level 1
ORA-01882: timezone region not found
21
22260134: Oracle AVDF: Old Primary Fails to Restart After
Switchover
The previous primary database for Audit Vault Server fails to restart after the
switchover operation. The following error appears, visible in the /var/log/messages
file:
ORA-01102: Cannot mount database in EXCLUSIVE mode
Workaround:
• The administrator has to ensure that relevant routes are in place on the host
machine in such a way that one network interface card leads to one Audit Vault
Server.
• The user must have sufficient privileges to the Management Interface to add hosts
and assign IP addresses.
• The administrator must configure the network and plan the routing table to
accommodate multiple network interface cards. The network routing table
determines how the packets are routed, their path, and the preferred network
adapter. In case this is not effectively designed, then the agent installation may
fail.
Workaround:
Submit the job again. This is a known issue and subsequent submission of job
succeeds.
22
Solution
The user must check if ILM archival was executed before performing the high
availability pairing of Audit Vault Servers. This is due to presence of archive files in the
primary server.
To avoid such a situation, the user must ensure to delete archive files from the primary
Audit Vault Server and later execute the high availability pairing.
Workaround:
A secured target created by an avadmin user cannot be viewed or recreated by an
avauditor user. Use a different name to create the secured target group.
23
Table 1-1 (Cont.) Bugs Fixed In Release 12.2.0.0.0
Documentation Accessibility
For information about Oracle's commitment to accessibility, visit the Oracle
Accessibility Program website at http://www.oracle.com/pls/topic/lookup?
ctx=acc&id=docacc.
Oracle® Audit Vault and Database Firewall Release Notes, Release 12.2.0
E49588-16
Copyright © 2012, 2019, Oracle and/or its affiliates. All rights reserved.
This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws.
Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit,
perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for
interoperability, is prohibited.
The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing.
If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is
applicable:
U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation,
delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental
regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on
the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government.
This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous
applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take
all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by
use of this software or hardware in dangerous applications.
Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.
24
Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of
SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered
trademark of The Open Group.
This software or hardware and documentation may provide access to or information about content, products, and services from third parties. Oracle Corporation and its affiliates
are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services unless otherwise set forth in an applicable
agreement between you and Oracle. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-
party content, products, or services, except as set forth in an applicable agreement between you and Oracle.
25