2. The following is intended to outline our general product direction. It is intended for information
purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any
material, code, or functionality, and should not be relied upon in making purchasing decisions. The
development, release, timing, and pricing of any features or functionality described for Oracle’s
products may change and remains at the sole discretion of Oracle Corporation.
Safe harbor statement
3. 1. Resource savings through fewer repeat collections
2. TFA won't use more CPU than you want
3. Easier to upload diagnostic collections
4. Latest most secure python stack
5. Run all database server compliance checks without needing root
password
Agenda
3
4. 4
Resource savings through fewer repeat collections
tfactl floodcontrol
Flood control
Each event which TFA
automatically generates
a collection for, now has
a flood control limit
The flood control limit instructs TFA
to only collect a certain amount of
times for the same event and then
pause collection for that event
for a set duration
Avoids unnecessary repeat
collections for similar events
and helps conserve system
resources
5. 5
TFA CPU usage can be limited on Linux with:
For example to limit to 50% of a CPU use:
TFA won't use more CPU than you want
tfactl setresourcelimit [-value value]
tfactl setresourcelimit -value 0.5
Minimum of 0.5
Maximum of 4 or 75% of available CPU
(whichever is lower)
6. 6
Easier to upload diagnostic collections
tfactl setupload
ORAchk/EXAchk TFA
tfactl setupload
-name mysqlnetconfig
-type sqlnet
tfactl setupload
-name mos
-type https
tfactl setupload
-name mos
-type https
-proxy www-proxy.example.com:80
Configure ORAchk results to
be uploaded to a database
Configure TFA results to be
uploaded to a MOS
Include a proxy in the MOS
upload configuration
7. 7
The python stack has been upgraded to 3.7.7.
This upgrade avoids all known python security issues
Latest most secure python stack
8. 8
Run all database server checks without root password
tfactl access promote -user user_name -runasroot
As root user grant
permission to run root
privileged checks, for
non-root users:
tfactl access lsusers
Verify that the non-root
user has been
promoted by using:
Non-root user can run
root privileged checks
using the option:
1 2 3