APTARE IT Analytics Technical Notes

Last Published:
Product(s): APTARE IT Analytics (10.5)
  1. Enabling Oracle's Transparent Data Encryption (TDE)
    1.  
      Enabling Oracle's transparent data encryption (TDE)
  2. Array Performance Statistics Technical Note
    1.  
      EMC Symmetrix Enhanced Performance metrics
    2.  
      Create enhanced EMC Symmetrix Performance report templates
    3.  
      EMC Symmetrix Array Performance
    4. EMC Symmetrix Back-end Director Performance
      1.  
        EMC Symmetrix Front-end Director Performance
    5.  
      EMC Symmetrix Front-end Port Performance
    6.  
      EMC Symmetrix Storage Group Performance
    7.  
      EMC Symmetrix Database Performance
    8.  
      EMC Symmetrix Disk Group Performance
    9.  
      EMC Symmetrix Disk Performance
    10.  
      EMC Symmetrix Device Groups Performance
    11.  
      EMC Symmetrix Disk by Technology Performance
    12.  
      EMC Symmetrix Storage Tier Performance
    13.  
      EMC Symmetrix Thin Tier Performance
    14.  
      EMC Symmetrix Thin Pool Performance
    15.  
      EMC Isilon Array Performance Metrics
    16.  
      EMC Isilon Array Performance
    17.  
      EMC Isilon Disk Performance
    18.  
      EMC Isilon Node Performance
    19.  
      EMC Isilon OneFS Performance
    20.  
      EMC Isilon Protocol Performance
    21.  
      NetApp Cluster-Mode Performance Metrics
    22.  
      NetApp Cluster-Mode Aggregate Performance
    23.  
      NetApp Cluster-Mode CIFS Performance
    24.  
      NetApp Cluster-Mode Disk Performance
    25.  
      NetApp Cluster-Mode Fiber Channel Protocol Logical Interface Performance
    26.  
      NetApp Cluster-Mode LUN Performance
    27.  
      NetApp Cluster-Mode NFS Performance
    28.  
      NetApp Cluster-Mode Processor Node Performance
    29.  
      NetApp Cluster-Mode Processor Performance
    30.  
      NetApp Cluster-Mode RAID Performance
    31.  
      NetApp Cluster-Mode SMB (Server Message Block) Performance
    32.  
      NetApp Cluster-Mode System Performance
    33.  
      NetApp Cluster-Mode Target Port Performance
    34.  
      NetApp Cluster-Mode Volume Performance
    35.  
      Pure Storage FlashArray Performance Metrics
    36.  
      Pure Array Performance

Enabling Oracle's transparent data encryption (TDE)

This Oracle feature is only available when using Oracle Enterprise Edition with the additional Oracle Advanced Security option licensed.

Oracle supports transparent data encryption (TDE) with Oracle Database Enterprise Edition. To use TDE with APTARE IT Analytics complete the following steps on a Linux platform:

  1. Create a keystore path. For example: /opt/aptare/oracle/wallet

    # su - aptare
    # mkdir /opt/aptare/oracle/wallet
  2. Edit/create the sqlnet.ora file in the Oracle installation. The default location is <install location>/oracle/network/admin with following content:

    --------------------------------
    #cat /opt/aptare/oracle/network/admin/sqlnet.ora
    ENCRYPTION_WALLET_LOCATION=
    (SOURCE=
       (METHOD=FILE)
         (METHOD_DATA=
    	(DIRECTORY=<path where keystore to be created for example /opt/aptare/oracle/wallet >)))
    --------------------------------
  3. Copy the APTARE IT Analytics portal software ISO contents to a directory in the system where the Portal will be installed.

  4. Edit the tablespace creation sql file to support TDE.

  5. Copy the database_release_10XXX.tar.gz from the ISO contents to a temp directory:

    # cp /portal/aptare/linux/database_release_10XXX.tar.gz /tmp/oracle_ee_tde/
  6. Extract the tar:

    #cd /tmp/oracle_ee_tde
    # tar -xzvf database_release_10XXX.tar.gz
  7. Replace file ora_scripts/create_tablespaces_encrypt.sql with ora_scripts/create_tablespaces.sql:

    #cp ora_scripts/create_tablespaces_encrypt.sql ora_scripts/create_tablespaces.sql
  8. Edit the following lines in the file ora_scripts/create_tablespaces_encrypt.sql to replace the place holder strings for keystore password, keystore path (for example /opt/aptare/oracle/wallet/) and encryption standard (for example AES256):

    PROMPT Creating keystore
    ADMINISTER KEY MANAGEMENT CREATE KEYSTORE '<keystore path mentioned in sqlnet.ora>' IDENTIFIED BY <keystore password>;
    PROMPT Checking wallet status
    select WRL_PARAMETER,STATUS,WALLET_TYPE from v$encryption_wallet;
    PROMPT Opening Wallet...
    administer key management set keystore open identified by <keystore password>;
    PROMPT Checking wallet status
    select WRL_PARAMETER,STATUS,WALLET_TYPE from v$encryption_wallet;
    PROMPT Setting Master key
    ADMINISTER KEY MANAGEMENT SET KEY IDENTIFIED BY <keystore password> WITH BACKUP USING 'aptare_scdb';
    PROMPT Setting Auto login
    ADMINISTER KEY MANAGEMENT CREATE LOCAL AUTO_LOGIN KEYSTORE FROM KEYSTORE  '<Keystore path mentioned in sqlnet.ora >' IDENTIFIED BY <keystore password>;
    CREATE TABLESPACE aptare_tbs_data_1m
            DATAFILE '/data01/oradata/scdb/aptare_tbs_data_1m_01.dbf' SIZE 256M REUSE AUTOEXTEND ON NEXT 64M MAXSIZE 20G
                     EXTENT MANAGEMENT LOCAL UNIFORM SIZE 1M ENCRYPTION USING '<encryption standard>' DEFAULT STORAGE (ENCRYPT);  ->

    Note:

    Every table space in the file has an <encryption standard> to replace. All must be modified.

  9. Create the tar with the modified file and replace it in the ISO contents.

    #cd /tmp/test
    # rm -f database_release_10XXX.tar.gz
    # tar -cvf /tmp/database_release_10XXX.tar *
    # gzip /tmp/database_release_10XXX.tar
    #cp /tmp/database_release_10XXX.tar.gz /portal/aptare/linux/
  10. Run the schema creation script create_aptare_database.sh

    #su - aptare /portal/ create_aptare_database.sh