Dashboard
Real-time database activity overview
DB Connection Status
Activity Timeline (24h)
Alert Severity Split
Top DB Users (by event count)
Compliance Coverage
Recent Events
| Time | DB | User | Type | Query | Severity |
|---|---|---|---|---|---|
Recent Alerts
Monitored Databases
Configure which databases to monitor
| Name | Type | Environment | Host | Risk | Status | Actions |
|---|---|---|---|---|---|---|
| Disabled Connected Error ⚠ Checking… |
|
Add Monitored Database
DAM will auto-start a collector when saved.
Edit Database
🗄 Databases
| Name | Owner | Encoding |
|---|---|---|
👤 Users
| Username | Host | Superuser | Roles | Attributes |
|---|---|---|---|---|
| YES — |
—
|
|
🔑 Roles
| Role Name | Built-in | Members |
|---|---|---|
| built-in custom |
Events
Database activity log
| Time | Database | User | Type | Query | Exec ms | Severity | OK | |
|---|---|---|---|---|---|---|---|---|
Event Detail
Alerts
Detected security and anomaly alerts
Alert Detail
Detection Rules
Configure what triggers alerts
Edit Business Hours
Add Custom Rule
Collectors
Active collector processes — last 7 days, auto-deduped per database
Users
Manage analyst and admin accounts
| Name | Role | Status | Actions | |
|---|---|---|---|---|
Add User
Notifications
Alert notification channels
Add Notification Channel
DAM will POST a JSON payload with alert details to this URL.
Leave SMTP Username empty to use local relay (port 25).
Reports
Export compliance and activity reports as CSV
Audit Log
Immutable record of all DAM system actions
| Timestamp | User | Action | Resource | IP Address | User Agent | Details |
|---|---|---|---|---|---|---|
| No audit entries found | ||||||
|
— | |||||
Settings
Retention policies and data masking
Data Retention
Events older than this are automatically purged
Resolved alerts older than this are purged
Data Masking
Masking patterns are configured in dam.toml under [masking]. Patterns are applied to raw SQL before storage.
enabled = true
patterns = [
"(?i)SET\\s+\\w*password\\w*\\s*=\\s*'[^']*'",
"\\b\\d{4}[- ]?\\d{4}[- ]?\\d{4}[- ]?\\d{4}\\b",
]
Restart the server after changing dam.toml masking patterns.
SIEM Integration
Forward events, alerts, and audit logs to Splunk, QRadar, ELK, or any syslog/HTTP receiver.
Security Settings
Configure brute-force login protection. Changes take effect immediately without restart.
Failures before lockout (per IP)
Window over which failures are counted
How long an IP is locked out