Clean Up Audit Vault
Clean Up Audit Vault
Prerequisites
Any persons following this document must understand that following the steps
outlined below will result in data loss. If you wish to restore data in future,
Oracle recommends completeing a full backup of the system by following Note
1556200.1.
You must enable SSH access to the Audit Vault Server before proceeding.
You must know the support and root user passwords.
You must be able to login as a user with Super Admin privileges.
You must be able to login as a user with Super Auditor privileges.
Details
1.3. Click on the Audit Trails link and stop all Audit Trails
1.4. Click on the Enforcement Points link and stop all Enforcement Points
3.1. Open connection to the Audit Vault Server as 'root' user either via SSH or the
console
su - oracle
3.3. Login to the database
sqlplus / as sysdba
4. Unlock avsys user
sqlplus avsys/Oracle_123
@purge-avs-package.sql
6. Check to see which tablespaces have been archived and/or are offline. These must
be brought back online before attempting the purging (step 9).
execute purge_avs.offline_tablespaces;
7. Copy all the archived tablespaces back to the Audit Vault Server and place in
the same directory, file ownership must be "oracle:oinstall". If the files are
owned by root, the following steps will fail. You do not have to run an archive
restore job in the Audit Vault server UI, a simple copy is sufficient.
execute purge_avs.bring_tbsp_online;
8.1. Verify all tablespace files are restored and online by checking
purge_avs.offline_tablespaces as in step 8. If no filenames are returned proceed to
the next step.
execute purge_avs.purge_data;
execute purge_avs.drop_ilm_tablespaces;
11. The steps in this section are optional - if you do not wish to clear any of the
following, proceed to step 12.
execute purge_avs.clean_alerts;
11.2. Clean up custom reports
execute purge_avs.clean_reports;
11.3. Clean up Firewall policies and associated cluster data. Before doing so, you
must login to the AVS UI as an AVAUDITOR and configure all Secured Targets which
have Enforcement Points configured to use one of the built-in policies (Pass all;
Unique; Log sample;Log all; Log all - no mask; Unique - no mask)
execute purge_avs.clean_fw_policies;
12.5. Click on the Audit Trails link and start all Audit Trails
12.6. Click on the Enforcement Points link and start all Enforcement Points