DataSunrise Database Security CLI Guide
DataSunrise Database Security CLI Guide
com
All brand names and product names mentioned in this document are trademarks, registered trademarks or service
marks of their respective owners.
No part of this document may be copied, reproduced or transmitted in any form or by any means, electronic,
mechanical, photocopying, recording, or otherwise, except as expressly allowed by law or permitted in writing by the
copyright holder.
The information in this document is subject to change without notice and is not warranted to be error-free. If you
find any errors, please report them to us in writing.
iii
Contents
Important: To use the CLI, you need to install JRE 8 at least but we recommend using Java 9 or higher because it
supports the TLS 1.3 encryption protocol.
Important: On a Linux machine, it is required to install Java. The example below is given for Ubuntu.
export JAVA_HOME=/opt/jdk1.8.0_131
export JRE_HOME=/opt/jdk1.8.0_131/jre
export PATH=$PATH:/opt/jdk1.8.0_131/bin:/opt/jdk1.8.0_131/jre/bin
Connecting to a Host
To start working with the firewall you need to connect to the server using the connect command. If you run the
command without necessary parameters, the CLI will output a prompt, displaying missing attributes:
If you don't specify the password in the command, the command will try to get it from the variable DS_PASSWORD.
If this variable is missing, a blank password will be used.
Every time you successfully connect to the server, a state.txt file is created. It contains encrypted information about
session ID, because if you execute a list of CLI commands, DataSunrise starts a separate process for each command.
On default, session is active for 10 minutes from the moment of the last server activity.
Session information may be saved in some other file. To specify a file name, use DS_STATE_FILE. This variable should
contain only the file name without its full path. For example, name the file “session_state.dat”:
SET DS_STATE_FILE=session_state.dat
To specify the folder, use DS_STATE_DIR. For example, create a folder named “myDir” and set the DS_STATE_DIR
environment variable as follows:
SET DS_STATE_DIR=C:\myDir
As a result, every time a session is started, the session status file is created in the following folder:
c:\myDir\session_state.dat
>executecommand.bat -m
After running a command with the -m option, you can execute CLI commands without the executecommand.bat
prefix.
C:\firewall\CmdLine>executecommand.bat -m
>connect -host localhost -login admin -password <UI password>
Connect to https://localhost:11000
>exit
C:\firewall\CmdLine>
1 DataSunrise Command Line Interface Overview | 11
To call an RPC from a certain file, get the JSON of the function of interest from the Web Console. Paste the JSON in a
new text file and name it somehow, "myfile.txt" for example.
Run the CLI and execute the callRPC command. As the -file option's value, input your file's name and specify its
path:
To increase the command's flexibility, you can use the -e parameter which enables you to replace the values of
variables specified in your .txt file with you operating system's counterparts. For example, if you use the word
"RULE_NAME" as the "name" parameter's value in your JSON and run callRPC without -e, you will get a Rule named
"RULE_NAME".
But if you add -e to your command, the CLI will search a counterpart of "RULE_NAME" among your operating
system variables and will replace "RULE_NAME" with the OS's "RULE_NAME" environment variable's value. Note that
you should create a RULE_NAME environment variable with some value first. Example:
set RULE_NAME=rule1
The -e parameter is useful for creating scripts because when executing some commands, you might have to use a
variable whose value depends on the result of the previous command execution. For example, this is how you can
create a database Instance, get its ID (id) and assign it as the value of an INSTANCE_ID environment variable:
This is how you can create a Rule using the previously created INSTANCE_ID variable. In this case the CLI will take the
INSTANCE_ID variable's value and replace the corresponding fragment of the JSON read from the createRule.txt:
{
"data": {
"id": -1,
"name": "new",
"dbInstance_id": "INSTANCE_ID",
"sequence": 1,
"comment": "",
"action": 1,
"blockingType": 0,
"dbType": 4,
...
},
"func": "updateRule",
"queryID": 1241745845,
"session_id": 158490930
1 DataSunrise Command Line Interface Overview | 13
}
Restriction: though we try our best to provide backward compatibility of JSON, there is a possibility that you will
need to update contents of some JSON files after updating DataSunrise to newer versions.
Note: if your JSON contains spaces, it should be quoted. All quotes the JSON contains should be escaped using the
-itemEscaping parameter.
-function <arg> Function name. It should contain the contents of the "func" section of JSON
taken from your web browser.
-jsonContent <arg> Input your JSON here. It should contain the contents of the "data" section
of JSON taken from your web browser.
0, "OK"
65, "Validation Error". An error occurred when validating an input parameter
66, "Operation Failed". Operation was closed with an error
67, "Session Save Error". Encountered an error when saving session parameters
68, "Session Restore Error". An error occurred when restoring session
69, "Command not Found"
70, "DB is Not Available"
71, "Help printed". The command was executed with the "help" parameter (e.g., executecommand.bat connect
-h)
72, "Cancelled". Operation was cancelled by a user
73, "Server Error"
74, "Server is Not Available"
75, "Unused Parameter". The parameter was not used when executing the command
100, "Error". Other error
>executecommand.bat connect -host 127.0.0.1 -port 11000 -login admin -password 123123 -protocol https
2. Let's change the Audit Storage location from the SQLite database to a PostgreSQL. It is recommended if you
expect a large volume of traffic to be transferred to the Audit Storage.
3. Register the database that is required to be monitored (the target database). We will use a MySQL database that is
located at 192.168.1.71:3305. We need to open a proxy on a local interface port so that the database clients will be
able to connect to 127.0.0.1:1025 like to the real database server.
4. We need to create several auxiliary objects that will help us to filter according to the specified IP address and user
name:
6. Sometimes it is necessary to restrict active period of a Rule. In that case you can use Schedules. To create a
Schedule, use the addSchedule command:
>executecommand.bat showEvents –h
usage: showEvents
Show a list of Events
-app <arg> application
-appOpt <arg> options to search for app. One of Empty, Not Empty,
Like, Not Like, Match, Not Match, Any
-beginDate <arg> begin date formatted as yyyy-MM-dd HH:mm:ss
-data <arg> data
...
Important: If an object name contains a space symbol, enclose the full name in double quotes.
Note: CLI command names are case insensitive. Parameter names of commands are case sensitive.
2 The List of CLI Commands | 17
Here's the complete list of CLI commands:
Command Description
addAccessRole Adds an Access Role
addApplication Creates a client application profile
addAppUserCapturingSetting Adds an App User Capturing entity
importApplications Adds multiple application profiles using a CSV file
addAuditReportGen Creates a Data Audit report task with Report Gen
addSecurityReportGen Creates a Data Security report task with Report Gen
addMaskingReportGen Creates a Data Masking report task with Report Gen
addOperationErrorsReportGen Creates a Operation Errors report task with Report Gen
addSessionReportGen Creates a Session Report task with Report Gen
addSystemEventsReportGen Creates a report on system events
addHost Adds a host, network or IP address/range
importHosts Adds multiple hosts using a CSV file
addCefGroup Creates a group of CEF items
addCefItem Adds a CEF item
addDSUser Adds a DataSunrise user
addDbUserGr Creates a group of database users
addDbUser Creates a database user profile
importUsers Adds multiple database users using a CSV file
addDbUserMapping Maps an Active Directory user to a database user
addHostGr Creates a host group
addInstancePlus Creates a database instance with instance interface and either Proxy or
Sniffer
addInstance Creates a new database instance
addInterface Creates an interface for the instance
addLdapServer Creates an LDAP server profile
addObjectGroup Creates a group of database objects
addPerCleanAudit Adds Periodic Clean audit task
addPerHealthCheck Adds Periodic Health check task
addPerUpdateMetadata Adds Periodic Update metadata task
addPerBackupDictionary Adds Periodic Backup Dictionary task
addPerUserBehavior Creates a User Behavior Periodic task
addPerTestBucketAccess Adds Periodic Test Bucket Accessibility task
addProxy Adds a proxy to the instance interface
addQueryOfGroup Adds an SQL query from the query group
addQueryGroup Creates a query group
addRule Creates a new security, audit, masking or learning Rule
addAuditRule Creates a new audit Rule
2 The List of CLI Commands | 18
Command Description
addLearnRule Creates a new learning Rule
addMaskRule Creates a new masking Rule
addSecurityRule Creates a new security Rule
addSchedule Creates a schedule to automatically enable and disable DataSunrise Rules
addServer Adds an SMTP, SNMP or external server for configuring subscription to
DataSunrise notifications
addSniffer Adds a sniffer to the database instance interface
addSslKeyGroup Adds SSL Key Group
addSubscriber Adds a subscriber to receive DataSunrise notifications
addTag Adds a tag to specified Entity
addDiscoveryGr Creates a new DataDiscovery search filter (Information type)
addDiscoveryAttr Adds an attribute to an Information type
arbitrary Executes an arbitrary command using JSON
callRPC Calls an arbitrary RPC from a JSON file
changePwd Changes the password of a specified firewall user
cleanAudit Cleans Audit Storage (audit data storage)
cleanDictionary Resets DataSunrise settings to default and delete all objects created by the
firewall (user accounts, Rules, DB accounts, etc.)
connect Connects to DataSunrise's Web Console
copyDiscoveryGr Makes a copy of a Data Discovery search filter (Information type)
changeParameter Changes the value of a certain firewall parameter
changeStoraqe Changes Audit Storage
createAuditRotation Creates a new audit.db file
createDictionaryBackup Creates a backup of the dictionary (DataSunrise settings)
delAccessRole Deletes an Access Role
delPerTask Deletes a Periodic task
delApplication Deletes a client application entry
delAppUserCapturingSetting Deletes an App User Capturing entity
delCefGroup Deletes a group of CEF items
delCefItem Deletes a CEF item
delDbUserGr Deletes a group of database users
delDbUser Deletes a database user entry
delDbUserMapping Unmaps an Active Directory user from a database user
delHost Deletes a host, network or IP range entry
delHostGr Deletes a group of hosts
delInstance Deletes a database instance
delSslKeyGroup Deletes an SSL Key Group
delInterface Deletes an instance interface
2 The List of CLI Commands | 19
Command Description
delLdapServer Deletes an existing LDAP server
delLicense Deletes an existing License
delObjectGroup Deletes object groups
delProxy Deletes a proxy from the instance interface
delQueryGroup Deletes a query group
delQuery Deletes a query from the group
delReport Deletes a Report Gen task
delRule Deletes a rule
delServer Deletes a mail server profile (subscribers)
delSchedule Deletes a schedule
delSniffer Deletes a sniffer from instance interface
delSubscriber Deletes a subscriber
delDiscoveryGr Deletes a Data Discovery search filter (Information type)
delDiscoveryAttr Deletes a Data Discovery Information type attribute
delDsServer Deletes a DataSunrise server
delDsUser Deletes a DataSunrise user
delTag Deletes a tag
disableDbUserMapping Disables mapping of AD users to DB users for a certain instance
disconnect Disconnects from DataSunrise Web Console
enableDbUserMapping Enables/disables mapping of Active Directory users to database users
isNeedRestart Checks whether it is necessary to restart Core and Backend processes
flush Updates Backend data and send synchronization command to the Core
grantAllPermToRole Grants ALL permissions to a Role
grantPermToRole Grants specified permissions to a Role
restart Restarts Core process
restartBackend Restarts the Backend
setAuditRotation Reads audit data from an old audit.db file
recoverDictionary Restores dictionary (DataSunrise settings) from a backup
restartStatMasking Relaunches previously performed static masking
revokeAllPermFromRole Revokes all permissions from an existing Access Role
revokePermFromRole Revokes permissions from an existing Access Role
setPermissionsToRole Sets specified permissions for a Role (all existing permissions will be reset)
showAccessRole Shows an existing Access Role
showAccessRoles Shows a list of existing Access Roles
showActiveSessions Shows a list of all active sessions
showApplications Shows a list of client applications
showApplication Shows certain client application entry
2 The List of CLI Commands | 20
Command Description
showAuditRotations Shows a list of available audit.db files
showCefGroup Shows parameters of a CEF group
showCefGroups Shows a list of CEF groups
showCefItem Shows parameters of a CEF item
showCoreState Shows state of the Core process
showDbUserGr Shows a database user group
showDbUser Shows a database user entry
showDbUsers Shows a list of database users
showAdDbUserMapping Shows a list of mapped users
showAdminQueryTypes Shows types of Administrative queries
showAppUserCapturingList Displays a list of existing App User Capturings
showAppUserCapturingSetting Displays details of a specified App User Capturing
showDictionaryBackups Shows a list of Dictionary backups
showSslKeyGroups Shows a list of SSL Key Groups
showSslKeyGroup Shows an existing SSL Key Group
showPerTask Shows an existing Periodic task
showReports Displays a list of existing Report Gen reports
showReportGen Displays details of an existing Report Gen task
showReportsGen Display a list of existing Report Gen tasks
showTag Shows tag
showTagged Shows tagged entities
showTags Shows tags
showUntagged Shows untagged entities
showEvents Shows a list of events (Audit, Security, Masking events)
showEvent Shows an event from the list of events (Audit, Security, Masking events)
showHost Shows a host name or IP address
showHostGr Shows a group of hosts, networks or IP addresses
showHosts Shows a list of hosts
showInstances Shows a list of available database instances
showInstance Shows a database instance
showInterface Shows an instance interface
showInterfaces Shows a list of interfaces
showLdapServer Shows an existing LDAP server
showLdapServers Shows existing LDAP servers
showMostBlocked Reports on the most frequently blocked queries
showNetDevices Shows network devices and their IP addresses
showObjectGroups Shows a list of object groups
2 The List of CLI Commands | 21
Command Description
showObjectGroup Shows an object group
showParameters Shows parameters for the changeParameter command
showProxies Shows a list of proxies
showProxy Shows a proxy
showQueryGroups Shows a list of query groups
showQueryGroup Shows a query group
showQueryTypes Shows a list of query types
showReports Shows reports
showRules Shows a list of Rules (Security, Masking, Audit, Learning)
showRule Shows a certain Rule
showServers Shows a list of mail servers (subscribers)
showServer Shows a mail server (subscribers)
showSession Shows a session description
showSessions Shows a list of sessions
showSchedules Shows a list of schedules
showSchedule Shows a schedule
showSniffer Shows a sniffer
showStatMasking Retrieves previously performed static masking configurations in JSON file
showSubscribers Shows a list of subscribers
showSubscriber Shows a subscriber of DataSunrise notifications
showSystemErrors Shows system errors over a certain period of time
showThroughputHistory Shows Throughput history
showDiscoveryGroups Shows a list of Data Discovery search filters (Information types)
showDiscoveryGr Shows a Data Discovery search filter (Information type)
showDiscoveryAttr Shows Data Discovery Information type attribute
showDsServer Shows a DataSunrise server
showDsServers Shows a list of DataSunrise servers
showWorkers Displays a list of available Workers
stop Stops Core process
start Starts Core process
statMask Performs static masking
updateAccessRole Updates an existing Access Role
updateApplication Edits a client application profile
updateAppUserCapturingSetting Updates a specified App User Capturing
updateAuditRule Edits an existing audit rule
updateCefGroup Changes parameters of a CEF group
updateCefItem Changes parameters of a CEF item
2 The List of CLI Commands | 22
Command Description
updateHost Edits a host or IP address
updateHostGr Edits a host group
updateDbUser Edits a database user entry
updateDbUserGr Edits a group of database users
updateDsServer Updates a DataSunrise server
updateInstance Edits settings of a database instance
updateInterface Edits settings of an instance interface
updateLdapServer Updates an LDAP server profile
updateLearnRule Edits an existing learning rule
updateMaskRule Edits an existing masking rule
updateObjectGroup Edits an object group
updatePerCleanAudit Updates a Periodic Clean audit task
updatePerHealthCheck Updates a Periodic Health check task
updatePerUpdateMetadata Updates s Periodic Update metadata task
updatePerBackupDictionary Updates an existing Periodic Backup Dictionary task
updatePerUserBehavior Updates an existing User Behavior Periodic task
updatePerTestBucketAccess Updates Periodic Test Bucket Accessibility task
updateProxy Edits settings of an existing proxy
updateQueryGroup Edits a query group
updateQueryOfGroup Edits the query of a certain query group
updateRule Edits an existing rule
updateSchedule Edits a schedule
updateSecurityRule Edits an existing security rule
updateServer Edits settings of a subscriber server (SMTP, SNMP, external)
updateSniffer Edits sniffer settings
updateSslKeyGroup Updates an SSL Key Group
updateSubscriber Edits a subscriber profile
updateLicense Updates a license key
updateLicenses Uploads multiple license keys
updateMetadata Updates metadata
updateTag Updates a tag
updateAuditReportGen Updates a Data Audit report task
updateSecurityReportGen Updates a Data Security report task
updateMaskingReportGen Updates a Data Masking report task
updateOperationErrorsReportGen Updates a Operation Errors report task
updateSessionReportGen Updates a Session report task
2 The List of CLI Commands | 23
Command Description
updateSystemEventsReportGen Updates a System Events report task
Each command has two obligatory additional parameters (see below). For the complete list of parameters see each
command's description.
Command Description
-json Show response from the Backend "as is" (JSON format)
-debug Show request to the server and response from the server (for debugging)
3 Commands for Configuring System Settings | 24
Example:
>executecommand.bat connect -host localhost -login admin -password admin01 -port 11000
-login <arg> Name of user to change password for ("admin" for administrator).
Example:
Example:
-connectionString <arg> Custom connection string. For PostgreSQL and MS SQL only
-database <arg> Audit Storage database name. For Aurora PostgreSQL, Aurora MySQL,
PostgreSQL, MySQL, MS SQL only
-schema <arg> Audit Storage database schema. For Aurora PostgreSQL, PostgreSQL only
-dbType <arg> Audit Storage DB type (aurora mysql | aurora postgresql | mysql | postgresql
| sqlite | mssql)
Example:
-u Force Audit Storage cleaning even if some core processes have not been
stopped (when working in the High Availability mode).
Example:
>executecommand.bat cleanAudit -f -u
-o Backup Objects.
-s Backup Settings.
-u Backup Users.
Example:
>executecommand.bat createDictionaryBackup -o -s -u
Example:
>executecommand.bat cleanDictionary -f
-dsServer <arg> Name of the DataSunrise server the backup file is located on
Example:
Example:
Note: for the list of additional parameters, refer to the User Guide, subs. 4.1.3
4 Configuring Instances | 33
4 Configuring Instances
-database <arg> Name of the database (for Aurora PostgreSQL, DB2, Greenplum, Hive, Informix,
Impala, MSSQL, MongoDB, Netezza, PostgreSQL, Redshift, SAP Hana, Sybase,
Teradata, Vertica)
-dbType <arg> Select the database type (athena | aurora mysql | aurora postgresql | cassandra
| db2 | dynamodb | elasticsearch | greenplum | hive | impala | informix | mariadb
| mongodb | mssql | mysql | netezza | oracle | postgresql | redshift | sap hana |
sybase | teradata | vertica)
-loginType <arg> Login type: Without Authentication | Regular | Active Directory | IAM Role
-sysDba <true | false> Connect to the Oracle database with SYSDBA privileges (Oracle-specific option)
-tableRelations <true | false> Search for table relations and include them in the default target database
relation
-queryGroups2FA <arg> Comma-separated list of query groups, queries of which are used to access the
database when configuring 2FA
-queryResultLocation <arg> Query result location for Amazon Athena
-serverName <arg> Server name for Informix
-awsRegion <arg> AWS Region for DynamoDB, Amazon Athena, Amazon Elasticsearch, Amazon
Aurora MySQL Amazon Aurora PostgreSQL
-metadataRetrievalMethod Metadata retrieval method: Regular | Via Stored Procedures (for Aurora MySQL,
<arg> MariaDB, MySQL only)
-protocolType <arg> Protocol type for MySQL-like databases: Usual | HTTP | XProtocol
-acceptOnly2FAUsers <arg> Accept only users authenticated with 2FA
4 Configuring Instances | 34
-connString <arg> Custom connection string for Aurora PostgreSQL, Cassandra, DB2, Greenplum,
Hive, Impala, Informix, MongoDB, MSSQL, Netezza, Oracle, PostgreSQL, Sybase,
Redshift, SAP Hana, Snowflake, Teradata, Vertica
-database <arg> Name of the database (for DB2, Greenplum, Hive, SQL Server, Netezza,
PostgreSQL, Aurora PostgreSQL, Redshift, Teradata, Mongo, SAP Hana, Vertica,
Impala, Sybase). For DynamoDB, this option is used for Dynamo region
-dbType <arg> (aurora mysql | aurora postgresql | db2 | greenplum | hive | mariadb | mysql |
mssql | netezza | oracle | postgresql | redshift | teradata | sap hana | vertica |
mongo | dynamo | impala | cassandra | sybase | snowflake | elasticsearch)
-envName <arg> DS Environment Name (available for: MariaDB, Aurora MySQL, Oracle, Aurora
PostgreSQL, PostgreSQL, Redshift, Greenplum, MSSQL
-dbKeyGroupName <arg> Name of the group of Certificates to be used for database connection
-loginType <arg> Login type: Without Authentication | Regular | Active Directory | IAM Role
4 Configuring Instances | 36
Parameter Description
-sid Use SID for connection instead of Service Name (default). (Oracle-specific,
optional)
-snifferDevice <arg> Network adapter the traffic of which will be sniffed. Only several first letters of
Interface name are permitted
-ssl Use SSL when connecting to the database. For DynamoDB, this option is used
for https connection. Otherwise, http will be used
-tableRelations <true | false> Search for table relations and include them in the default target database
relation
-queryGroups2FA <arg> Comma-separated list of query groups, queries of which are used to access the
database when configuring 2FA
-queryResultLocation <arg> Query result location for Amazon Athena
-metadataRetrievalMethod Metadata retrieval method: Regular | Via Stored Procedures (for Aurora MySQL,
<arg> MariaDB, MySQL only)
-protocolType <arg> Protocol type for MySQL-like databases, S3, Athena, ElasticSearch: Usual | HTTP
| XProtocol | HTTP Proxy:
• HTTP Proxy: -protocolType "HTTP Proxy"
• HTTP Reverse proxy: -protocolType "HTTP"
• HTTPS Proxy: -protocolType "HTTP Proxy" -ssl
• HTTPS Reverse proxy: -protocolType "HTTP" -ssl
addInstancePlus -name s3_example -dbType s3 -dbPort 443 -dbHost s3.amazonaws.com -loginType "Regular"
-savePassword ds -login <access key> -password <secret key> -snifferDevice "Intel(R) Wi-Fi 6 AX201
160MHz" -dsServer local -protocolType "HTTP -ssl
Example (S3):
addInstancePlus -name s3_example -dbType s3 -dbPort 443 -dbHost s3.amazonaws.com -loginType "Regular"
-savePassword ds -login <access key> -password <secret key> -proxyHost 0.0.0.0 -proxyPort 547 -ssl -
protocolType "HTTP Proxy"
4 Configuring Instances | 38
Parameter Description
-storageAccountName Storage Account name for Azure Connection Type
<arg>
-tenantId <arg> Tenant ID for Azure Connection Type
-testConnection Test connection before creating a task. If test fails a task will not be created
Example:
-name <arg> Logical name of the Instance to view. Use showInstances command to
search for the Instance of interest.
-name <arg> Logical name of the instance to remove. Use the showInstances command
to search for the Instance of interest.
-database <arg> Name of a database to update an Instance for. For DB2, Greenplum, MySQL,
PostgreSQL, Redshift, Teradata only. For DynamoDB, this option is used for
Dynamo region.
-envAutoCreate <true | false> Create DS Environment automatically (available for: MariaDB, Aurora MySQL,
Oracle,Aurora PostgreSQL, PostgreSQL, Redshift, Greenplum, MSSQL
-envName <arg> DS Environment Name (available for: MariaDB, Aurora MySQL, Oracle, Aurora
PostgreSQL, PostgreSQL, Redshift, Greenplum, MSSQL
-tableRelations <true | false> Search for table relations and include them in the default target database
relation
-queryGroups2FA <arg> Comma-separated list of query groups, queries of which are used to access the
database when configuring 2FA
-queryResultLocation <arg> Query result location for Amazon Athena
-awsRegion <arg> AWS Region for DynamoDB, Amazon Athena, Amazon Elasticsearch,
PostgreSQL, MySQL
-metadataRetrievalMethod Metadata retrieval method: Regular | Via Stored Procedures (for Aurora MySQL,
<arg> MariaDB, MySQL only)
-protocolType <arg> Protocol type for MySQL-like databases: Usual | HTTP | XProtocol
-acceptOnly2FAUsers <arg> Accept only users authenticated with 2FA
4 Configuring Instances | 42
-ssl <arg> Use SSL when connecting to Oracle or DB2 ( no | ssl ). For DynamoDB, this
option is used for http and https connections respectively.
Parameter Description
Parameter Description
Parameter Description
>executecommand.bat addSecurityRule -action block -dbType mysql -instance Inst2 -name "Block ObjGr" -
blockType sqlerror -filterType object -intercSqlSelect false -intercSqlSelectWJ false
Above is the example of a rule for blocking INSERT, DELETE, UPDATE commands and function calls, leaving
SELECT and SELECT in WHERE & JOIN statements available to execute. By default settings, all parameters of these
statements are at true state, so you need to switch off the ones you don't need. -name <arg> parameter is used to
assign a rule name.
6 Creating, Editing and Configuring Rules | 53
Here is the list of security rule parameters for allowing and blocking queries:
Parameter Description
-addOsUserGroups <arg> Add Operating system user groups to the Rule's settings
-addOsUsers <arg> Add a list of comma-separated OS users or regular expression
-addSubscribers <arg> Add email addresses (separated by commas) to receive notification when
the rule is triggered.
-affectedRows <arg> Trigger the rule only if the number of affected rows is not less that a
specified number.
-blockSeparator <arg> Assign a character as a separator between blocks of database elements (';' is
assigned by default).
-dbType <arg> Select database type: aurora mysql | aurora postgresql | db2 | greenplum
| hive | mariadb | mysql | mssql | netezza | oracle | postgresql | redshift |
teradata | sap hana | vertica | mongodb | dynamodb | impala | cassandra |
sybase | snowflake | any.
By default, it is set to ‘any database’, so the firewall will intercept queries
targeted to all available databases.
Parameter Description
-delUsers <arg> Comma-separated list of database users for deleting or {regexp name}
-injConcat <arg> Set a number of penalties for Concatenation of single Characters (many
types of attacks)
-injPenConst <arg> Set a number of penalties for the expression which is always true.
-injPenDq <arg> Set a number of penalties for multiple SQL statements separated by
semicolon.
-injPenKw <arg> Set a number of penalties for comments containing one or multiple SQL
keywords.
-injErrLevel <arg> Set a number of penalties a query should achieve to be considered as SQL-
injected.
-intercObjGr <arg> Intercept queries targeted to specified databases, schemas, tables, columns
from a list of Object Groups separated by semicolons (<groups> | false).
6 Creating, Editing and Configuring Rules | 55
Parameter Description
-intercPack <arg> Intercept the whole package of DDL statements. Use empty quoted string
to delete all the packages and functions.
-listSeparator <arg> Separator for a list of values. Used together with -addHosts, -
addHostGroups, -delHosts, -delHostGroups, -addUsers, -addUserGroups, -
delUsers, -delUserGroups, -addOsUsers, -addOsUserGroups, -delOsUsers,
-delOsUserGroups, -addSubscribers, -delSubscribersddlTypes, -
functionParams. Default is ","
-nameSeparator <arg> Assign a character as a separator between database elements ('.' is assigned
by default).
-skipObjGr <arg> Skip statements for databases, schemas, tables, columns from the comma
separated list of object groups ((groups) | false).
Parameter Description
-skipTab <arg> Skip statements for databases, schemas, tables, columns formatted
like "orcl.alex.customers.id;orcl.bob.orders.id". For Aurora databases,
MariaDB, MySQL, PostgreSQL, Teradata the format is the following
"alex.customers.id;bob.orders.id".
To block SQL injections, use the command with the following parameters as shown in the example below addRule -
action block -filterType inject:
>executecommand.bat addRule -name "Block SQLinj" -action block -dbType mysql -instance Inst2 -
addHostGroups bank -filterType inject -injErrLevel 10 -injPenComm 15 -injPenConst 10 -injPenDq 10 -
injPenKw 10 -injPenOr 10 -injPenUnion 10 -injWarnLevel 10
OK
>executecommand.bat addAuditRule -action audit -dbType postgresql -instance mydb -name "Audit_all"
-filterType object -intercSqlSelect true -intercSqlSelectWJ true -login postgres -password 1234 -
logInStorage true -logData true -intercTab test.public.customers
Note: Operation type ID's for DDL commands are shown in parentheses.
6 Creating, Editing and Configuring Rules | 57
To edit an existing audit rule, use the updateAuditRule command with the parameters given in the table below:
Parameter Description
-addSubscribers <arg> Add email addresses (separated by commas) to receive notification when the
rule is triggered.
-affectedRows <arg> Trigger the rule only if the number of affected rows is not less than a specified
number.
-blockSeparator <arg> Assign a character as a separator between blocks of database elements (';'
is assigned by default). Used together with -maskColumns, -intercTab, -
intercPack, -intercFunc, -skipTab, -skipPack, -skipFunc.
-dbType <arg> Select database type: aurora mysql | aurora postgresql | db2 | greenplum | hive
| mariadb | mysql | mssql | netezza | oracle | postgresql | redshift | teradata | sap
hana | vertica | mongodb | dynamodb | impala | cassandra | sybase | snowflake
| any.
By default, it is set to ‘any database’, so the firewall will intercept queries
targeted to all available databases
-delUsers <arg> Comma-separated list of database users for deleting or {regexp name}
6 Creating, Editing and Configuring Rules | 58
Parameter Description
-depersQueries <true | false> Depersonalize queries
-enable <true | false> Enable/disable the rule
-filterSessionsFile <arg> Filter session rules JSON file
-injPenDq <arg> Number of penalties for multiple SQL statements separated by semicolons
-injPenKw <arg> Number of penalties for comments containing one or multiple SQL keywords
-intercObjGr <arg> Intercept queries targeted to specified databases, schemas, tables, columns
from a list of Object Groups separated by semicolons (<groups> | false).
-intercPack <arg> Intercept the whole package of DDL statements. Use empty quoted string to
delete all the packages and functions.
Parameter Description
-listSeparator <arg> Separator for a list of values. Used together with -addHosts, -addHostGroups,
-delHosts, -delHostGroups, -addUsers, -addUserGroups, -delUsers,
-delUserGroups, -addOsUsers, -addOsUserGroups, -delOsUsers, -
delOsUserGroups, -addSubscribers, -delSubscribersddlTypes, -functionParams.
Default separator is comma ","
-logData <true | false> Log the result set of query returned to the user.
-logMaxRowCount <arg> Log max number of rows returned to the user (number | unlimited).
-nameSeparator <arg> Assign a character as a separator between database elements ('.' is assigned by
default).
-skipObjGr <arg> Skip statements for databases, schemas, tables, columns from the comma
separated list of object groups ((groups) | false).
Parameter Description
-skipTab <arg> Skip statements for databases, schemas, tables, columns formatted like
"orcl.alex.customers.id;orcl.bob.orders.id". For Aurora, PostgreSQL, MariaDB,
MySQL, Teradata the format is the following: "alex.customers.id;bob.orders.id".
-affectedRows <arg> Trigger the rule only if the number of affected rows is not less than a
specified number.
-blockSeparator <arg> Assign a character as a separator between blocks of database elements (';' is
assigned by default).
-dbType <arg> Select database type: aurora mysql | aurora postgresql | db2 | greenplum
| hive | mariadb | mysql | mssql | netezza | oracle | postgresql | redshift |
teradata | sap hana | vertica | mongodb | dynamodb | impala | cassandra |
sybase | snowflake | any.
By default, it is set to ‘any database’, so the firewall will intercept queries
targeted to all available databases.
-learnInsert <true | false> Do not intercept statements from a specified SQL group.
-learnObjectGroup <arg> Save names of databases, schemas, tables, columns to the Object Group for
the Learning Rule ( false | <group name>).
-learnSqlGroup <arg> Save SQL Statements to the Group for the Learning Rule ( false | <group
name>).
-learnUserGroup <arg> Save Users in the Learning Rule Group (true | false | <group name>). The
"true" option allows to save users out of any group.
Parameter Description
-nameSeparator <arg> Assign a character as a separator between database elements ('.' is assigned
by default).
In order to create a masking rule, use the addMaskRule or addRule -action mask commands.
6 Creating, Editing and Configuring Rules | 63
Here is the list of parameters for masking rules:
Parameter Description
-action mask | skip
-addSubscribers <arg> Add email addresses (separated by commas) to receive a notification when
the rule is triggered.
-app <arg> Process application requests (any | <application name> | {regexp name})
-blockSeparator <arg> Assign a character as a separator between blocks of database elements (';' is
assigned by default). Used in conjunction with -maskColumns, -intercTab, -
intercPack, -intercFunc, -skipTab, -skipPack, -skipFunc
-columnDelimeter <arg> Column delimeter. Applicable to CSV files only. It shouldn't contain quote
characters. The default one is \t
-columns <arg> Comma-separated names or numbers of columns to mask for CSV, or text
inside tags to mask for XML
-date <arg> Replace date value with a fixed value. Use if -maskType is fixDate
-dateTime <arg> replace date and time value with a fixed value. Use if -maskType is
fixDateTime
-days <arg> Replace date values with random values from a predefined range. Use if -
maskType
is dateDisp or dateTimeDisp
-dbType <arg> Select database type: aurora mysql | aurora postgresql | db2 | greenplum
| hive | mariadb | mysql | mssql | netezza | oracle | postgresql | redshift |
teradata | sap hana | s3 | vertica | mongodb | dynamodb | impala | cassandra
| sybase | snowflake | <any>)
By default, it is set to "any database", so the firewall will intercept queries
targeted to all available databases
Parameter Description
-delUserGroups <arg> Comma-separated list of DB user groups to delete
-delUsers <arg> Comma-separated list of DB users or {regexp name} to delete
-endDate <arg> Minimum value of the random date value interval. Use if -maskType is
rndDate
-endDateTime <arg> Minimum value of the random time and value interval. Use if -maskType is
rndDateTime
-endTime <arg> Minimum value of the random time value interval. Use if -maskType is
rndTime
-filler <arg> A placeholder to replace the masked values with. Note that it should be one
character. Default is "*"
-functionName <arg> Call a custom function for masking. Use if -maskType is function
-hours <arg> Replace date or date/time value with a value from the end of available
range. Use if -maskType is timeDisp or dateTimeDisp
-instance <arg> Select an instance (instance name | <any>). 'any' is set by default
-jsonPath <arg> Keys' values of a JSON file to be masked. Note that the values should be
comma-separated
-keepRowCount <true | false> Keep row count of the original data set if the query includes the DISTINCT
operator or a GROUP BY, HAVING, or ORDER BY clause. Default is false
-logData <true | false> Log the result set of a query returned to the user
6 Creating, Editing and Configuring Rules | 65
Parameter Description
-logMaxRowCount <arg> Log max number of rows returned to the user (number | unlimited).
orcl.alex.customers.id;orcl.bob.orders.id
alex.customers.id;bob.orders.id
-maskMax <arg> Maximum value of the range. Default value is 100. Use if -maskType is
intervalRandom
-maskMin <arg> Minimum value of the range. Default value is 0. Use if -maskType is
intervalRandom
-maskPattern <arg> A pattern that should be found and replaced with the text specified by -
replaceBy option. Use if -maskType is regexpReplace
-minutes <arg> Replace date or date/time value with a value from the end of available
range. Use if -maskType is timeDisp or dateTimeDisp
-paddingText <arg> Replace masked characters with a predefined character. Default character
is *. Use if -maskType is: maskFirst | maskLast | maskFirstLast | showFirst |
showLast | showFirstLast
Parameter Description
-quote <arg> Applicable only to CSV files. Default is "\"
-replaceBy <arg> The text used instead of the pattern specified by -maskPattern. Use if -
maskType is regexpReplace
-rowDelimeter <arg> Applicable to CSV files only. It shouldn't contain quote characters. Default is
"\n"
-seconds <arg> Replace date or date/time value with a value from the end of available
range. Use if -maskType is timeDisp or dateTimeDisp
-startDate <arg> Maximum value of the random date value interval. Use if -maskType is
rndDate
-startDateTime <arg> Maximum value of the random time and date value interval. Use if -
maskType is rndDateTime
-startTime <arg> Maximum value of the random time value interval. Use if -maskType is
rndTime
-withHeader <true | false> Applicable to CSV only. Whether a SCV file has headers or not
-xmlPath <arg> Keys' values of an XML file to be masked. Note that the values should be
comma-separated
6 Creating, Editing and Configuring Rules | 67
The -maskType <arg> parameter is used for selecting a masking type. By default, the masking type is set to
"random". Here is the list of DataSunrise masking types:
Argument for - Masking type Description and subparameters
maskType parameter
bankCard Credit Card Number Use this argument to mask credit card numbers. It replaces
all card number digits except the last four with "X" character.
(XXXX-XXXX-XXXX-1234)
dateTimeDisp Date/Time Dispersion Date/Time Dispersion (when -masktype is dateTimeDisp)
default Default INT-type values are replaced with zeroes (0) and STRING-type
values are replaced with empty spaces
emailDefault Default E-mail Masking Email address characters are replaced with "*" symbols,
except the first one and the last one in a row. For example:
***@**.**m
emailFull Full E-mail Masking Email address is replaced with asterisks "*" except for the "@"
character and the top-level domain name (***@**.com)
emailLogin Mask login of E-Mail Email user name is replaced with asterisks
address (**@datasunrise.com)
empty Empty STRING-type values are replaced with an empty space
fixedNum Fixed Number NUMBER-type and INT-type values are replaced with a
predefined value (-fixedVal <arg>)
fixedStr Fixed String STRING-type values are replaced with a predefined string
function Function Call Call a stored procedure (-functionName <arg>) for data
obfuscation
-functionName <arg> Function Call Function call value (when -masktype is function)
-hours <arg> Date Time Dispersion Max value of 'hours' (when -masktype is dateDisp or
dateTimeDisp)
-fixedVal <arg> Fixed Number Fixed number value (when -masktype is fixedNum)
fixDateTime Fixed Date and Time Replace date and time values with a fixed value (-dateTime
<arg>)
fixDate Fixed Date Replace date values with a fixed value (-date <arg>)
fixTime Fixed Time Replace time values with a fixed value (-time <arg>)
rndDateTime Random Date and Time Replace date and time values with random values from a
predefined range.
-startDateTime <arg>
-endDateTime <arg>
rndDate Random Date Interval Replace date values with random values from a predefined
range:
-startDate <arg>
-endDate <arg>
rndTime Random Time Replace time values with random values from a predefined
range. Specify a range for random time values:
-startTime <arg>
-endTime <arg>
dateDisp Date Dispersion Replace date values with random values from a predefined
range. Specify the maximum deviation of the "masked" date:
-days <arg>
timeDisp Time Dispersion Replace time values with random values from predefined
range. Specify the maximum deviation of the "masked" time:
-hours <arg>, -minutes <arg>, -seconds <arg>
Important: For MySQL, MariaDB, Aurora, Teradata use a format like test.table;test.table2.
Real names and regular expressions can be used when defining names of databases, schemes, tables and columns.
Dot symbol ‘.’ in regular expressions means any symbol.
Semicolon is used as a separator between blocks. Blocks consist of 4 parts: database, scheme, table, and column.
Between these four parts ‘.’ is used as a separator.
addRule, updateRule, addObjectGroup, updateObjectGroup commands have a -nameSeparator parameter, that
allows to assign any other symbol or a combination of symbols as a separator between database elements instead
of a dot symbol ".".
Limitations:
The semicolon symbol ’;’ cannot be used in the names of database objects, because it is used as a delimiter between
blocks.
Names cannot be enclosed in curly brackets '{}', as it is the sign of a regular expression.
-name <arg> Logical name of the Rule to view. Use the showRules command to search
for the Rule of interest.
Example:
7 Static Masking
Important: Do not specify the same target schema as the source schema.
Otherwise the masked values will be inserted into the same table. The
target table name should be the same as the source table name.
Use the command without the -file parameter to view information about previously executed static masking
procedure.
If a directory is not specified, the file will be saved in the /datasunrise/cmdline folder. The file can be used for the -
tableFile parameter of the statMask command to perform static data masking with the same masking types for the
same columns.
8 Configuring Hosts, Networks, IP addresses/ranges | 73
host;10.10.0.1
host;10.10.0.25
host;10.10.0.30
8 Configuring Hosts, Networks, IP addresses/ranges | 74
If you need to upload a range of IP addresses, begin each .CSV file line with the "range" key word (for IPv4
addresses) or "range_ipv6" key word (for IPv6 addresses), then enter initial IP address and ending IP address of the
range separated with a semicolon:
If you need to upload network settings, each line of a .CSV file should begin with the "network" key word (for IPv4
addresses) or "network_ipv6" key word (for IPv6 addresses):
-fileName <arg> Name of the CSV file which contains the list of hosts to be added to
DataSunrise configuration.
Example:
Example:
-removeMembers <arg> A comma-separated list of addresses required to remove from the group.
9 Database Users
-dbType <arg> Select database type: aurora mysql | aurora postgresql | db2 | greenplum
| hive | mariadb | mysql | mssql | netezza | oracle | postgresql | redshift |
teradata | sap hana | vertica | mongodb | dynamodb | impala | cassandra |
sybase | snowflake | any
Example:
user;user_name1
user;user_name2
user;user_name3
-fileName <arg> Name of the CSV file which contains the list of Users to be added to
DataSunrise configuration.
Example:
-dbType <arg> Select database type: aurora mysql | aurora postgresql | db2 | greenplum
| hive | mariadb | mysql | mssql | netezza | oracle | postgresql | redshift |
teradata | sap hana | vertica | mongodb | dynamodb | impala | cassandra |
sybase | snowflake | any
Example:
>executecommand.bat addDbUserGr -dbType mysql -instance Inst2 -addMembers alex,bob -name room20
-dbType <arg> Select database type: aurora mysql | aurora postgresql | db2 | greenplum
| hive | mariadb | mysql | mssql | netezza | oracle | postgresql | redshift |
teradata | sap hana | vertica | mongodb | dynamodb | impala | cassandra |
sybase | snowflake | any
-dbType <arg> Select database type: aurora mysql | aurora postgresql | db2 | greenplum
| hive | mariadb | mysql | mssql | netezza | oracle | postgresql | redshift |
teradata | sap hana | vertica | mongodb | dynamodb | impala | cassandra |
sybase | snowflake | any
10 Access Roles
Example:
Example:
>executecommand.bat addDSUser -allowLogin true -email [email protected] -login myuser -password 123456 -
role admin
10 Access Roles | 82
Example:
Example:
See the possible values for different parameters in the section 10.4 Granting permissions to a Role.
Example:
See the possible values for different parameters in the section 10.4 Granting permissions to a Role.
Example:
Example:
app;application_name1
app;application_name2
app;application_name3
-fileName <arg> Name of the CSV file which contains the list of Applications to be added to
DataSunrise configuration.
Example:
Example:
Example:
12 Object Groups
-functions <arg> Functions to include in a Group. The function path should be formatted as
follows: "orcl.alex.pack1.func1;orcl.bob.pack2.func2"
-functionsCsvFile <arg> The parameter to add a list of functions from the cvs file. Use a file
name as an argument (use the full path to the file, if the file is not in the
same directory as the CLI executable file). The list of functions should be
formatted as shown below. Start a new line for each function path:
orcl,alex,pack1,func1
orcl,bob,pack2,func2
orcl,carl,pack3,func3
-instance <arg> Database Instance objects of which to include in a Group (<instance name>
| any)
-tables <arg> Tables to include in Group. The table path should be expressed in the
following format: "orcl.alex.customers.id;orcl.bob.orders.id"
-tablesCsvFile <arg> The parameter to add a list of tables from a CSV file. Use file name as an
argument (use the full path to the file, if the file is not in the same directory
as the CLI executable file). The list of tables should be formatted as shown
below. Start a new line for each table path:
postgres,public,tab1,col1
postgres,public,tab1,col2
postgres,public,tab2
Example:
-instance <arg> Database Instance objects from which to include into Group (<instance
name> | any)
-login <arg> User name to access the database if metadata update is required
-name <arg> Logical name of an Object group
-newName <arg> New logical name of an Object group
-nameSeparator <arg> Name separator. Used together with - tables, -functions
-password <arg> Password to access the database if metadata update is required
-tables <arg> Tables to include into Group. The table path should be expressed in the
following format: orcl.alex.customers.id;orcl.bob.orders.id
-tablesCsvFile <arg> The parameter to add a list of tables from a CSV file. Use file name as an
argument (use the full path to the file, if the file is not in the same directory
as the CLI executable file). The list of tables should be formatted as shown
below. Start a new line for each table path:
postgres,public,tab1,col1
postgres,public,tab1,col2
postgres,public,tab2
Example:
13 Query Groups
Example:
Example:
Example:
Example:
14 Configuring Schedules
Example:
15 Configuring Subscribers
Example:
>executecommand.bat addServer -serverType smtp -cert selfsigned -host smtp.server.com -port 465 -login
test -password test -mailFrom [email protected] -tls false
Example:
-type <arg> Types of operations to be logged. Available options: Session Open | Session
Close | Operation Open | Operation Close | Operation Exec Start | Operation
Exec Stop | Operation Data | Operation Masking | Operation Blocking
| Operation Meta | Session Failed | Operation Failed | Operation Rule |
Session Rule | Execution Rule
-cef <arg> System events and corresponding CEF code of messages transferred to
Syslog server
16 Configuring CEF Groups | 102
-enable <true | false> Assign a name for the client application profile.
-type <arg> Types of operations to be logged. Available options: Session Open | Session
Close | Operation Open | Operation Close | Operation Exec Start | Operation
Exec Stop | Operation Data | Operation Masking | Operation Blocking
| Operation Meta | Session Failed | Operation Failed | Operation Rule |
Session Rule | Execution Rule
-cef <arg> Specify system events and corresponding CEF code of messages transferred
to the Syslog server.
To view more detailed information about a certain event, use the showEvent command with the following
attributes:
Attribute Description
-eid <arg> Execution ID
-oid <arg> Operation ID
-sid <arg> Session ID
17 Monitoring Events and Sessions | 105
18 Data Discovery
Parameter Description
-colNames <arg> Column names separated by -nameSeparator. Default value of separator is
<;>
-maxDate <arg> Maximum date for column content. Only for Date column types.
-min <arg> Minimum value for column content. Only for Number column types.
-minDate <arg> Minimum date for column content. Only for Date column types.
Parameter Description
-name <arg> Logical name of the Information Type
18 Data Discovery | 107
Parameter Description
-name <arg> Logical name of the Information Type to make a copy of
Parameter Description
-group <arg> Logical name of the Information Type
-name <arg> Logical name of the attribute
Parameter Description
-name <arg> Logical name of the Information Type
Parameter Description
-group <arg> Logical name of the Information type
-name <arg> Logical name of the attribute
Parameter Description
-name <arg> Logical name of the Information Type
Parameter Description
-colNames <arg> Column names separated by -nameSeparator. Default value of separator is
<;>
-maxDate <arg> Maximum date for column content. Only for Date column types.
-min <arg> Minimum value for column content. Only for Number column types.
-minDate <arg> Minimum date for column content. Only for Date column types.
-excludeS3Objects <arg> Path to the folder that should be excluded from search for AWS S3 instance.
Note that it should start with "/". Paths are separated by ; by default.
Example:
/bucket1/folder1/folder2/;/bucket2/
Parameter Description
-reportFormat <arg> Report file format (csv | pdf)
-searchByInfoTypes <arg> Information Types separated by semicolon (;) by default
-searchDb <arg> Database to search across. Empty value if database is not specified
-searchS3Objects <arg> Path to the folder that should be searched across for AWS S3 instance. Note
that each path should start with "/". Paths are separated by ; by default.
Example:
/bucket1/folder1/folder2/;/bucket2/
All buckets and their subfolders will be scanned if this parameter's value is
empty
-searchSchema <arg> Schema to search at. Empty value if schema is not specified
-searchTable <arg> Table to search at. Empty value if table is not specified
-weekDays <arg> Day of Week for Startup Separated by semicolon [;] (mo;tu;we;th;fr;sa;su)
Example (PostgreSQL):
-excludeS3Objects <arg> Path to the folder that should be excluded from search for AWS S3 instance.
Note that it should start with "/". Paths are separated by ; by default.
Example:
/bucket1/folder1/folder2/;/bucket2/
-searchDb <arg> Database to search across. Empty value if database is not specified
-searchS3Objects <arg> Path to the folder that should be searched across for AWS S3 instance. Note
that each path should start with "/". Paths are separated by ; by default.
Example:
/bucket1/folder1/folder2/;/bucket2/
All buckets and their subfolders will be scanned if this parameter's value is
empty
-searchSchema <arg> Schema to search at. Empty value if schema is not specified
-searchTable <arg> Table to search at. Empty value if table is not specified
-weekDays <arg> Day of Week for Startup Separated by semicolon [;] (mo;tu;we;th;fr;sa;su)
19 Report Generator
In addition to the above parameters, you can also use the parameters available for all periodic task types (refer to
Periodic Tasks).
19 Report Generator | 114
Also available all the parameters of the addAuditReportGen command (refer to Creating a Data Audit report)
19 Report Generator | 115
In addition to the above parameters, you can also use the parameters available for all periodic task types (refer to
Periodic Tasks).
19 Report Generator | 116
Also available all the parameters of the addSecurityReportGen command (refer to Creating a Data Security report)
19 Report Generator | 117
In addition to the above parameters, you can also use the parameters available for all periodic task types (refer to
Periodic Tasks).
19 Report Generator | 118
Also available all the parameters of the addMaskingReportGen command (refer to Creating a Data Masking report)
19 Report Generator | 119
In addition to the above parameters, you can also use the parameters available for all periodic task types (refer to
Periodic Tasks).
19 Report Generator | 120
Also available all the parameters of the addOperationErrorsReportGen command (refer to Creating an Operation
Errors report)
19 Report Generator | 121
In addition to the above parameters, you can also use the parameters available for all periodic task types (refer to
Periodic Tasks).
19 Report Generator | 122
Also available all the parameters of the addSessionReportGen command (refer to Creating a Session report)
In addition to the above parameters, you can also use the parameters available for all periodic task types (refer to
Periodic Tasks).
Also available all the parameters of the addSystemEventsReportGen command (refer to Creating a System Events
report)
19 Report Generator | 123
In addition to the above parameters, you can also use the parameters available for all periodic task types (refer to
Periodic Tasks).
Also available all the parameters of the addDirectSessionReportGen command (refer to Creating a Report Gen task
on Direct Sessions)
19 Report Generator | 124
In addition to the above parameters, you can also use the parameters available for all periodic task types (refer to
Periodic Tasks).
Also available all the parameters of the addInstStatusReportGen command (refer to Creating an Instances Status
report)
The -mapType <arg> parameter has 3 options on how to store the list of mapped users.
• -mapType config
The list of mapped users will be stored in DataSunrise configurations.
• mapType file
The list of mapped users will be stored in the text format. -file <arg> is used to assign a name for the txt-file.
There is no need to create the file.
• -mapType db
The list of mapped users will be stored in an external database.
Example:
Example:
You can use MD5 or SHA-512 encryption algorithms (for now, SHA-512 is available only for Vertica DB).
• To use MD5 encryption algorithm, perform the following:
DB_user_2 and DB_user_password_2 are required to access the database where the salt for the user is stored.
>executecommand.bat showLdapServers
Example:
21 Periodic Tasks
The following parameters are available for each periodic task types because related to the periodicity of starting:
Parameter Description
-name <arg> Logical Name
-days <arg> Month Days (1...31 | last) for Startup Separated by [;]
In addition to the above parameters, you can also use the parameters available for all periodic task types (refer to
Periodic Tasks on page 142).
Also available all the parameters of the addPerCleanAudit command (refer to Adding a Clean audit periodic task)
21 Periodic Tasks | 132
In addition to the above parameters, you can also use the parameters available for all periodic task types (refer to
Periodic Tasks on page 142).
Also available all the parameters of the addPerHealthCheck command (refer to Adding a Health check periodic task)
In addition to the above parameters, you can also use the parameters available for all periodic task types (refer to
Periodic Tasks on page 142).
In addition to the above parameters, you can also use the parameters available for all periodic task types (refer to
Periodic Tasks on page 142).
Also available all the parameters of the addPerBackupDictionary command (refer to Adding a Backup Dictionary
periodic task)
In addition to the above parameters, you can also use the parameters available for all periodic task types (refer to
Periodic Tasks on page 142).
21 Periodic Tasks | 134
Also available all the parameters of the addPerUserBehavior command (refer to Adding a Uset Behavior task)
In addition to the above parameters, you can also use the parameters available for all periodic task types (refer to
Periodic Tasks on page 142).
Also available all the parameters of the addPerVulnAssessment command (refer to Adding a Vulnerability
Assessment periodic task)
21 Periodic Tasks | 135
In addition to the above parameters, you can also use the parameters available for all periodic task types (refer to
Periodic Tasks on page 142).
In addition to the above parameters, you can also use the parameters available for all periodic task types (refer to
Periodic Tasks on page 142).
21 Periodic Tasks | 136
Also available all the parameters of the addDDLTabRelLearnPerTask command (refer to Adding a DDL Table
Relation Learning periodic task)
In addition to the above parameters, you can also use the parameters available for all periodic task types (refer to
Periodic Tasks on page 142).
Also available all the parameters of the addPerAzureRemoveServ command (refer to Adding an Azure Remove
Unused Servers periodic task)
Also available all the parameters of the addPerKuberRemoveServ command (refer to Adding a Kubernetes Remove
Unused Servers periodic task)
-roles <arg> Database roles. Comma-separated names of roles. Only for MSSQL, MySQL,
Oracle, PostgreSQL, Redshift
In addition to the above parameters, you can also use the parameters available for all periodic task types (refer to
Periodic Tasks on page 142).
21 Periodic Tasks | 138
Also available all the parameters of the addPerDbUserSync command (refer to Adding a DB User Synchronization
Periodic task)
In addition to the above parameters, you can also use the parameters available for all periodic task types (refer to
Periodic Tasks on page 142).
Also available all the parameters of the addPerTestBucketAccess command (refer to Adding a Test Bucket
Accessibility periodic task).
21 Periodic Tasks | 139
-type <arg> Type of Key Group: Proxy, Sniffer, Interface. Proxy is used by default.
22 SSL Key Groups | 141
Example:
Example:
Example:
Example:
Example:
24 Tags
25 Infrastructure-as-Code
26 Miscellanious
26.1 showWorkers
To display a list of all available Workers, use the showWorkers command:
Parameter Description
-dsServer <arg> Name of the server the proxy or sniffer is located on. If this option is not
set, DataSunrise will display workers list for your current server.
26.2 Flush
To update the Backend data and send synchronization command to the Core, use the flush command:
Parameter Description
-worker <arg> Worker name. To see the full list of workers user the "showWorkers"
command (showWorkers on page 149). If this option is not specified, flush
will be applied to all available workers.
-dsServer <arg> Name of the DataSunrise server the proxy or sniffer is running on
-worker <arg> Worker name. To view the full list of all available workers, use the
showWorkers command. If an option is not specified, flush will be
executed for all workers
26 Miscellanious | 150
-eventType <arg> Event type: "a", "s", "m" for audit, security and masking rules respectively.
-appOpt <arg> Options to search for application. Empty, Not empty, Like, Not Like, Match,
Not Match, Any.
-hostOpt <arg> Options to search for host. Empty, Not empty, Like, Not Like, Match, Not
Match, Any.
-loginOpt <arg> Options to search for login. Empty, Not empty, Like, Not Like, Match, Not
Match, Any.
-dsServer <arg> Name of the server the proxy or sniffer is located on. If this option is not
set, DataSunrise will display workers list for your current server
-worker <arg> Worker name. To see a complete list of all available workers use the
showWorkers command. If no option is specified, flush will be executed for
all workers
Parameter Description
-action <arg> Action: Deny Access | Create a New User | Create or Update User
Based on Response
-role <arg> Role. Execute the showAccessRoles command to see all available roles
-role <arg> Role. Execute the showAccessRoles command to see all available roles