{"id":4094,"date":"2019-04-23T13:14:37","date_gmt":"2019-04-23T16:14:37","guid":{"rendered":"https:\/\/www.dbarj.com.br\/2019\/04\/cloning-security-list-rules-among-different-sls-in-oci\/"},"modified":"2019-04-23T13:18:31","modified_gmt":"2019-04-23T16:18:31","slug":"cloning-security-list-rules-among-different-sls-in-oci","status":"publish","type":"post","link":"https:\/\/www.dbarj.com.br\/pt-br\/2019\/04\/cloning-security-list-rules-among-different-sls-in-oci\/","title":{"rendered":"Cloning Security List Rules among different SLs in OCI"},"content":{"rendered":"<p>On the last year, I&#8217;ve been working for a customer that uses one of the Oracle OCI regions as his primary DC and the other as a Standby environment. As they are pretty identical regarding the routes and network access rules, I needed to constantly get their Standby region in sync with the primary regarding the security list rules of all of their 80+ Security Lists.<\/p>\n<p>So, in case they added\/changed\/removed some rule on the primary, I had to find a way to reflect those changes to the corresponding security list on the Standby. This won&#8217;t be an easy task if I haven&#8217;t created a sort of automation to do this for me.<\/p>\n<p>That is how the <a href=\"https:\/\/github.com\/dbarj\/oci-scripts\/blob\/master\/oci_network_seclist_clone_rules.sh\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>oci_network_seclist_clone_rules.sh<\/strong><\/a> script was born.<\/p>\n<p>P.S: This is one more article for the OCI automation shell script series. To check all, please access my <a href=\"https:\/\/github.com\/dbarj\/oci-scripts\" target=\"_blank\" rel=\"noopener noreferrer\">github repo page<\/a>.<\/p>\n<h3>How does it work?<\/h3>\n<p id=\"iQNZeoG\">Basically, the shell script accepts up to 4 arguments:<\/p>\n<ul>\n<li><span style=\"color: #339966;\"><strong><span style=\"font-family: courier new, courier, monospace;\">1st &#8211; Source Security List Name or OCID.<\/span><\/strong><\/span><\/li>\n<li><span style=\"color: #339966;\"><strong><span style=\"font-family: courier new, courier, monospace;\">2nd &#8211; Source VCN Name or OCID.<\/span><\/strong><\/span><\/li>\n<li><span style=\"color: #3366ff;\"><strong><span style=\"font-family: courier new, courier, monospace;\">3rd &#8211; Target Security List Name or OCID.<\/span><\/strong><\/span><\/li>\n<li><span style=\"color: #3366ff;\"><strong><span style=\"font-family: courier new, courier, monospace;\">4th &#8211; Target VCN Name or OCID.<\/span><\/strong><\/span><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" width=\"2078\" height=\"890\" class=\"alignnone size-full wp-image-4081 \" src=\"https:\/\/www.dbarj.com.br\/wp-content\/uploads\/2019\/04\/img_5cbe2baa291bd.png\" alt=\"\" srcset=\"https:\/\/www.dbarj.com.br\/wp-content\/uploads\/2019\/04\/img_5cbe2baa291bd.png 2078w, https:\/\/www.dbarj.com.br\/wp-content\/uploads\/2019\/04\/img_5cbe2baa291bd-300x128.png 300w, https:\/\/www.dbarj.com.br\/wp-content\/uploads\/2019\/04\/img_5cbe2baa291bd-768x329.png 768w, https:\/\/www.dbarj.com.br\/wp-content\/uploads\/2019\/04\/img_5cbe2baa291bd-1024x439.png 1024w\" sizes=\"auto, (max-width: 2078px) 100vw, 2078px\" \/>So the code will basically replicate <span style=\"text-decoration: underline;\"><strong>all<\/strong><\/span> the Security List rules of the Source SL to the Target SL. <strong>Please note it will completely replace the existing rules on the target SL.<\/strong><\/p>\n<p>The code accepts 4 parameters. However, only the first one is mandatory. Why?<\/p>\n<ul>\n<li>For the 1st parameter you can either specify the Display Name or OCID. If you specify the Security List Name, you must also provide the VCN Name or OCID in 2nd argument, turning this arg mandatory.<\/li>\n<li>The same applies for 3rd parameter.<\/li>\n<li>You may also omit 3rd and 4th parameter and use name transformation using the variables that I will explain next.<\/li>\n<\/ul>\n<p>So, you can export the following variables before calling the utility, which will make some changes on the execution procedure:<\/p>\n<ul>\n<li>OCI_CLONE_SOURCE_REGION<\/li>\n<li>OCI_CLONE_TARGET_REGION<\/li>\n<li>OCI_CLONE_SEDREP_SEC_NAME<\/li>\n<li>OCI_CLONE_SEDREP_VCN_NAME<\/li>\n<li>OCI_CLONE_SEDREP_RULES<\/li>\n<\/ul>\n<h4>OCI_CLONE_SOURCE_REGION and OCI_CLONE_TARGET_REGION<\/h4>\n<p>You may export those variables to specify in which location is your source or target security lists are placed. In case you omit, the location used will be the default one specified at <strong>.oci\/config<\/strong><\/p>\n<p><span style=\"color: #0000ff;\"><strong>Example:<br \/>\n<\/strong><\/span>If the target SL is actually placed on us-phoenix-1 location:<\/p>\n<p><code>$ export OCI_CLONE_TARGET_REGION=\"us-phoenix-1\"<\/code><\/p>\n<h4>OCI_CLONE_SEDREP_SEC_NAME<\/h4>\n<p>You may also optionally omit the target SL name or OCID in 3rd parameter and use instead a <strong>sed<\/strong> replace name transformation to transform the source SL name into the target. If this variable is empty (not exported) and 3rd parameter is also not provided, the code will look for a SL with the same name as the source.<\/p>\n<p><span style=\"color: #0000ff;\"><strong>Example:<br \/>\n<\/strong><\/span>If source SL name is &#8220;ash_oci_sl&#8221;, the target SL name used will be &#8220;phx_oci_sl&#8221; if not passed in 3rd parameter.<\/p>\n<p><code>$ export OCI_CLONE_SEDREP_SEC_NAME=\"s\/ash\/phx\/g\"<\/code><\/p>\n<h4>OCI_CLONE_SEDREP_VCN_NAME<\/h4>\n<p>You may omit optionally the target VCN name and use instead a <strong>sed<\/strong> replace name transformation to transform the source VCN name into the target. If this variable is empty (not exported) and the 4th parameter are also not provided, the code will look for a VCN with the same name as the source.<\/p>\n<p><strong><span style=\"color: #0000ff;\">Example:<\/span><br \/>\n<\/strong>If source VCN name is &#8220;ash_oci_vcn&#8221;, the target VCN name will be &#8220;phx_oci_vcn&#8221; if not passed in 4th parameter.<\/p>\n<p><code>$ export OCI_CLONE_SEDREP_VCN_NAME=\"s\/ash\/phx\/g\"<\/code><\/p>\n<h4>OCI_CLONE_SEDREP_RULES<\/h4>\n<p>You may optionally convert some rules while they are copied from source SL to the target SL.<\/p>\n<p><strong><span style=\"color: #0000ff;\">Example:<\/span><\/strong><br \/>\nYou want to exchange the IPs 10.1. &lt;-&gt; 10.2. in your rules.<\/p>\n<p><code>$ export OCI_CLONE_SEDREP_RULES=\"s\/\\\"10\\.1\\.\/\\\"10.XXX.\/g; s\/\\\"10\\.2\\.\/\\\"10.1.\/g; s\/\\\"10\\.XXX\\.\/\\\"10.2.\/g;\"<\/code><\/p>\n<h3>Demo<\/h3>\n<p id=\"leATBLG\"><img loading=\"lazy\" decoding=\"async\" width=\"2722\" height=\"1740\" class=\"alignnone size-full wp-image-4085 \" src=\"https:\/\/www.dbarj.com.br\/wp-content\/uploads\/2019\/04\/img_5cbf34bc2372c.png\" alt=\"\" srcset=\"https:\/\/www.dbarj.com.br\/wp-content\/uploads\/2019\/04\/img_5cbf34bc2372c.png 2722w, https:\/\/www.dbarj.com.br\/wp-content\/uploads\/2019\/04\/img_5cbf34bc2372c-300x192.png 300w, https:\/\/www.dbarj.com.br\/wp-content\/uploads\/2019\/04\/img_5cbf34bc2372c-768x491.png 768w, https:\/\/www.dbarj.com.br\/wp-content\/uploads\/2019\/04\/img_5cbf34bc2372c-1024x655.png 1024w\" sizes=\"auto, (max-width: 2722px) 100vw, 2722px\" \/><\/p>\n<p>Download link: <a href=\"https:\/\/github.com\/dbarj\/oci-scripts\/blob\/master\/oci_network_seclist_clone_rules.sh\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/github.com\/dbarj\/oci-scripts\/blob\/master\/oci_network_seclist_clone_rules.sh<\/a><\/p>\n<p>Hope you enjoyed.<\/p>\n<b>Have you enjoyed? Please leave a comment or give a \ud83d\udc4d!<\/b>\n<div class='watch-action'><div class='watch-position align-left'><div class='action-like'><a class='lbg-style2 like-4094 jlk' href='javascript:void(0)' data-task='like' data-post_id='4094' data-nonce='de4404f630' rel='nofollow'><img class='wti-pixel' src='https:\/\/www.dbarj.com.br\/wp-content\/plugins\/wti-like-post\/images\/pixel.gif' title='Like' \/><span class='lc-4094 lc'>0<\/span><\/a><\/div><\/div> <div class='status-4094 status align-left'><\/div><\/div><div class='wti-clear'><\/div>","protected":false},"excerpt":{"rendered":"<p>On the last year, I&#8217;ve been working for a customer that uses one of the Oracle OCI regions as his primary DC and the other as a Standby environment. As they are pretty identical regarding the routes and network access rules, I needed to constantly get their Standby region in sync with the primary regarding &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/www.dbarj.com.br\/pt-br\/2019\/04\/cloning-security-list-rules-among-different-sls-in-oci\/\">Continue lendo<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-4094","post","type-post","status-publish","format-standard","hentry","category-data-guard","item-wrap"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cloning Security List Rules among different SLs in OCI - DBA - Rodrigo Jorge - Oracle Tips and Guides<\/title>\n<meta name=\"description\" content=\"How to clone Security List Rules among different SLs in OCI that can even be in different regions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dbarj.com.br\/pt-br\/2019\/04\/cloning-security-list-rules-among-different-sls-in-oci\/\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"DBA RJ\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dbarj.com.br\\\/pt-br\\\/2019\\\/04\\\/cloning-security-list-rules-among-different-sls-in-oci\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dbarj.com.br\\\/pt-br\\\/2019\\\/04\\\/cloning-security-list-rules-among-different-sls-in-oci\\\/\"},\"author\":{\"name\":\"DBA RJ\",\"@id\":\"https:\\\/\\\/www.dbarj.com.br\\\/pt-br\\\/#\\\/schema\\\/person\\\/28a44ca3a6633fe4156ad1ea209d40a9\"},\"headline\":\"Cloning Security List Rules among different SLs in OCI\",\"datePublished\":\"2019-04-23T16:14:37+00:00\",\"dateModified\":\"2019-04-23T16:18:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dbarj.com.br\\\/pt-br\\\/2019\\\/04\\\/cloning-security-list-rules-among-different-sls-in-oci\\\/\"},\"wordCount\":636,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dbarj.com.br\\\/pt-br\\\/#\\\/schema\\\/person\\\/28a44ca3a6633fe4156ad1ea209d40a9\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dbarj.com.br\\\/pt-br\\\/2019\\\/04\\\/cloning-security-list-rules-among-different-sls-in-oci\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dbarj.com.br\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/img_5cbe2baa291bd.png\",\"articleSection\":[\"Data Guard\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.dbarj.com.br\\\/pt-br\\\/2019\\\/04\\\/cloning-security-list-rules-among-different-sls-in-oci\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dbarj.com.br\\\/pt-br\\\/2019\\\/04\\\/cloning-security-list-rules-among-different-sls-in-oci\\\/\",\"url\":\"https:\\\/\\\/www.dbarj.com.br\\\/pt-br\\\/2019\\\/04\\\/cloning-security-list-rules-among-different-sls-in-oci\\\/\",\"name\":\"Cloning Security List Rules among different SLs in OCI - DBA - Rodrigo Jorge - Oracle Tips and Guides\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dbarj.com.br\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dbarj.com.br\\\/pt-br\\\/2019\\\/04\\\/cloning-security-list-rules-among-different-sls-in-oci\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dbarj.com.br\\\/pt-br\\\/2019\\\/04\\\/cloning-security-list-rules-among-different-sls-in-oci\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dbarj.com.br\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/img_5cbe2baa291bd.png\",\"datePublished\":\"2019-04-23T16:14:37+00:00\",\"dateModified\":\"2019-04-23T16:18:31+00:00\",\"description\":\"How to clone Security List Rules among different SLs in OCI that can even be in different regions.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dbarj.com.br\\\/pt-br\\\/2019\\\/04\\\/cloning-security-list-rules-among-different-sls-in-oci\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dbarj.com.br\\\/pt-br\\\/2019\\\/04\\\/cloning-security-list-rules-among-different-sls-in-oci\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/www.dbarj.com.br\\\/pt-br\\\/2019\\\/04\\\/cloning-security-list-rules-among-different-sls-in-oci\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.dbarj.com.br\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/img_5cbe2baa291bd.png\",\"contentUrl\":\"https:\\\/\\\/www.dbarj.com.br\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/img_5cbe2baa291bd.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dbarj.com.br\\\/pt-br\\\/2019\\\/04\\\/cloning-security-list-rules-among-different-sls-in-oci\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dbarj.com.br\\\/pt-br\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloning Security List Rules among different SLs in OCI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dbarj.com.br\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/www.dbarj.com.br\\\/pt-br\\\/\",\"name\":\"DBA - Rodrigo Jorge - Oracle Tips and Guides\",\"description\":\"Blog about Databases, Security and High Availability\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dbarj.com.br\\\/pt-br\\\/#\\\/schema\\\/person\\\/28a44ca3a6633fe4156ad1ea209d40a9\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dbarj.com.br\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.dbarj.com.br\\\/pt-br\\\/#\\\/schema\\\/person\\\/28a44ca3a6633fe4156ad1ea209d40a9\",\"name\":\"DBA RJ\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/www.dbarj.com.br\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/RodrigoJorgePOUG19.png\",\"url\":\"https:\\\/\\\/www.dbarj.com.br\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/RodrigoJorgePOUG19.png\",\"contentUrl\":\"https:\\\/\\\/www.dbarj.com.br\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/RodrigoJorgePOUG19.png\",\"width\":712,\"height\":712,\"caption\":\"DBA RJ\"},\"logo\":{\"@id\":\"https:\\\/\\\/www.dbarj.com.br\\\/wp-content\\\/uploads\\\/2019\\\/09\\\/RodrigoJorgePOUG19.png\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cloning Security List Rules among different SLs in OCI - DBA - Rodrigo Jorge - Oracle Tips and Guides","description":"How to clone Security List Rules among different SLs in OCI that can even be in different regions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dbarj.com.br\/pt-br\/2019\/04\/cloning-security-list-rules-among-different-sls-in-oci\/","twitter_misc":{"Escrito por":"DBA RJ","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dbarj.com.br\/pt-br\/2019\/04\/cloning-security-list-rules-among-different-sls-in-oci\/#article","isPartOf":{"@id":"https:\/\/www.dbarj.com.br\/pt-br\/2019\/04\/cloning-security-list-rules-among-different-sls-in-oci\/"},"author":{"name":"DBA RJ","@id":"https:\/\/www.dbarj.com.br\/pt-br\/#\/schema\/person\/28a44ca3a6633fe4156ad1ea209d40a9"},"headline":"Cloning Security List Rules among different SLs in OCI","datePublished":"2019-04-23T16:14:37+00:00","dateModified":"2019-04-23T16:18:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dbarj.com.br\/pt-br\/2019\/04\/cloning-security-list-rules-among-different-sls-in-oci\/"},"wordCount":636,"commentCount":0,"publisher":{"@id":"https:\/\/www.dbarj.com.br\/pt-br\/#\/schema\/person\/28a44ca3a6633fe4156ad1ea209d40a9"},"image":{"@id":"https:\/\/www.dbarj.com.br\/pt-br\/2019\/04\/cloning-security-list-rules-among-different-sls-in-oci\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dbarj.com.br\/wp-content\/uploads\/2019\/04\/img_5cbe2baa291bd.png","articleSection":["Data Guard"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.dbarj.com.br\/pt-br\/2019\/04\/cloning-security-list-rules-among-different-sls-in-oci\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.dbarj.com.br\/pt-br\/2019\/04\/cloning-security-list-rules-among-different-sls-in-oci\/","url":"https:\/\/www.dbarj.com.br\/pt-br\/2019\/04\/cloning-security-list-rules-among-different-sls-in-oci\/","name":"Cloning Security List Rules among different SLs in OCI - DBA - Rodrigo Jorge - Oracle Tips and Guides","isPartOf":{"@id":"https:\/\/www.dbarj.com.br\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dbarj.com.br\/pt-br\/2019\/04\/cloning-security-list-rules-among-different-sls-in-oci\/#primaryimage"},"image":{"@id":"https:\/\/www.dbarj.com.br\/pt-br\/2019\/04\/cloning-security-list-rules-among-different-sls-in-oci\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dbarj.com.br\/wp-content\/uploads\/2019\/04\/img_5cbe2baa291bd.png","datePublished":"2019-04-23T16:14:37+00:00","dateModified":"2019-04-23T16:18:31+00:00","description":"How to clone Security List Rules among different SLs in OCI that can even be in different regions.","breadcrumb":{"@id":"https:\/\/www.dbarj.com.br\/pt-br\/2019\/04\/cloning-security-list-rules-among-different-sls-in-oci\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dbarj.com.br\/pt-br\/2019\/04\/cloning-security-list-rules-among-different-sls-in-oci\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.dbarj.com.br\/pt-br\/2019\/04\/cloning-security-list-rules-among-different-sls-in-oci\/#primaryimage","url":"https:\/\/www.dbarj.com.br\/wp-content\/uploads\/2019\/04\/img_5cbe2baa291bd.png","contentUrl":"https:\/\/www.dbarj.com.br\/wp-content\/uploads\/2019\/04\/img_5cbe2baa291bd.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dbarj.com.br\/pt-br\/2019\/04\/cloning-security-list-rules-among-different-sls-in-oci\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dbarj.com.br\/pt-br\/"},{"@type":"ListItem","position":2,"name":"Cloning Security List Rules among different SLs in OCI"}]},{"@type":"WebSite","@id":"https:\/\/www.dbarj.com.br\/pt-br\/#website","url":"https:\/\/www.dbarj.com.br\/pt-br\/","name":"DBA - Rodrigo Jorge - Oracle Tips and Guides","description":"Blog about Databases, Security and High Availability","publisher":{"@id":"https:\/\/www.dbarj.com.br\/pt-br\/#\/schema\/person\/28a44ca3a6633fe4156ad1ea209d40a9"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dbarj.com.br\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":["Person","Organization"],"@id":"https:\/\/www.dbarj.com.br\/pt-br\/#\/schema\/person\/28a44ca3a6633fe4156ad1ea209d40a9","name":"DBA RJ","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/www.dbarj.com.br\/wp-content\/uploads\/2019\/09\/RodrigoJorgePOUG19.png","url":"https:\/\/www.dbarj.com.br\/wp-content\/uploads\/2019\/09\/RodrigoJorgePOUG19.png","contentUrl":"https:\/\/www.dbarj.com.br\/wp-content\/uploads\/2019\/09\/RodrigoJorgePOUG19.png","width":712,"height":712,"caption":"DBA RJ"},"logo":{"@id":"https:\/\/www.dbarj.com.br\/wp-content\/uploads\/2019\/09\/RodrigoJorgePOUG19.png"}}]}},"_links":{"self":[{"href":"https:\/\/www.dbarj.com.br\/pt-br\/wp-json\/wp\/v2\/posts\/4094","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dbarj.com.br\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dbarj.com.br\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dbarj.com.br\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dbarj.com.br\/pt-br\/wp-json\/wp\/v2\/comments?post=4094"}],"version-history":[{"count":1,"href":"https:\/\/www.dbarj.com.br\/pt-br\/wp-json\/wp\/v2\/posts\/4094\/revisions"}],"predecessor-version":[{"id":4096,"href":"https:\/\/www.dbarj.com.br\/pt-br\/wp-json\/wp\/v2\/posts\/4094\/revisions\/4096"}],"wp:attachment":[{"href":"https:\/\/www.dbarj.com.br\/pt-br\/wp-json\/wp\/v2\/media?parent=4094"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dbarj.com.br\/pt-br\/wp-json\/wp\/v2\/categories?post=4094"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dbarj.com.br\/pt-br\/wp-json\/wp\/v2\/tags?post=4094"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}