{"id":1605,"date":"2026-01-13T22:49:25","date_gmt":"2026-01-13T22:49:25","guid":{"rendered":"https:\/\/adrianotanaka.com.br\/?p=1605"},"modified":"2026-04-06T21:45:51","modified_gmt":"2026-04-06T21:45:51","slug":"protecting-oci-goldengate","status":"publish","type":"post","link":"https:\/\/adrianotanaka.com.br\/index.php\/2026\/01\/13\/protecting-oci-goldengate\/","title":{"rendered":"Protecting OCI GoldenGate"},"content":{"rendered":"\n<p>Oracle GoldenGate on OCI offers robust capabilities for data replication across various technologies, but it\u2019s crucial to implement security best practices for both your deployment and the underlying data. Below are key recommendations and configurations to help secure your environment.<\/p>\n\n\n\n<p>Let\u2019s start with our architecture where we can see the big picture:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"468\" src=\"https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-13-180952-1024x468.png\" alt=\"\" class=\"wp-image-1608\" srcset=\"https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-13-180952-1024x468.png 1024w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-13-180952-300x137.png 300w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-13-180952-768x351.png 768w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-13-180952-1536x701.png 1536w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-13-180952.png 1555w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h1 class=\"wp-block-heading\">Identity<\/h1>\n\n\n\n<h4 class=\"wp-block-heading\">Groups<\/h4>\n\n\n\n<p>To start, we can discuss about the roles in a GoldenGate environment, we usually have a scenario where one person (or group) manages the service (in OCI) and process (extract, replicat, etc) inside GoldenGate deployment, but here we are talking about security so we could split it into three groups:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>SOURCE\/TARGET_ADMIN \u2013 Who own the source\/target setup, usually here we are talking about the DBA (for source and target) or Cloud Admin when we are dealing with Big Data targets (OCI Object Storage, Kafka\u2026)<\/li>\n\n\n\n<li>OGG_OCI_ADMIN \u2013 The group who can deploy and manage the OCI GoldenGate Instance and resources like connections and assignments, it doesn\u2019t need to have access to source\/target or deployment itself.<\/li>\n\n\n\n<li>GGS_GROUPS \u2013 The group that manage inside GoldenGate process, who will be creating and maintaining extracts, replicats, etc within the newer service and on-premises versions, you can federate this group within OCI Domains we will dive more into it in the next topics.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\">IAM Integration<\/h4>\n\n\n\n<p>As told before, Oracle GoldenGate supports identity federation within OCI Domains:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"926\" height=\"669\" src=\"https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-13-183602.png\" alt=\"\" class=\"wp-image-1609\" srcset=\"https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-13-183602.png 926w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-13-183602-300x217.png 300w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-13-183602-768x555.png 768w\" sizes=\"auto, (max-width: 926px) 100vw, 926px\" \/><\/figure>\n\n\n\n<p>In this case you can map OCI Groups with GoldenGate groups and even enable MFA, if you are using on-premises version you can refer to this very good article that show how to setup it <a href=\"https:\/\/blogs.oracle.com\/dataintegration\/goldengate23ai-integration-with-oci-iam\">https:\/\/blogs.oracle.com\/dataintegration\/goldengate23ai-integration-with-oci-iam<\/a>, In the service we can setup it using the OCI deployment interface while creating the deploy:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"572\" height=\"265\" src=\"https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Picture2.png\" alt=\"\" class=\"wp-image-1613\" srcset=\"https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Picture2.png 572w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Picture2-300x139.png 300w\" sizes=\"auto, (max-width: 572px) 100vw, 572px\" \/><\/figure>\n\n\n\n<p>Or if you are using terraform you can define credential_store to IAM and specify the groups in the group_to_roles_mapping variable:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"519\" src=\"https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2025-12-08-133356-1024x519.png\" alt=\"\" class=\"wp-image-1615\" srcset=\"https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2025-12-08-133356-1024x519.png 1024w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2025-12-08-133356-300x152.png 300w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2025-12-08-133356-768x390.png 768w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2025-12-08-133356.png 1033w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>To create the groups, you should go to Identity &gt; Domains &gt; Your_Domain &gt; User Management &gt; Groups.<\/p>\n\n\n\n<p><em>Tip: Do not select the &#8220;User can request access&#8221; option when setting up groups<\/em>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"335\" height=\"370\" src=\"https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-13-184302.png\" alt=\"\" class=\"wp-image-1610\" srcset=\"https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-13-184302.png 335w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-13-184302-272x300.png 272w\" sizes=\"auto, (max-width: 335px) 100vw, 335px\" \/><\/figure>\n\n\n\n<p>To better understand each role you can use this table:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>OCI IAM Group<\/strong><\/td><td><strong>GoldenGate Role<\/strong><\/td><td><strong>Purpose<\/strong><\/td><\/tr><tr><td>GGS_Administrator<\/td><td>Administrator<\/td><td>Grants full access to the user, including the ability to alter general, non-security related operational parameters and profiles of the OCI GoldenGate deployment service.<\/td><\/tr><tr><td>GGS_Security<\/td><td>Security<\/td><td>Grants administration of security related objects and invoke security related service requests. This role has full privileges.<\/td><\/tr><tr><td>GGS_Operator<\/td><td>Operator<\/td><td>Allows users to perform only operational actions. Operators cannot alter the operational parameters or profiles of the OCI GoldenGate deployment services.<\/td><\/tr><tr><td>GGS_User<\/td><td>User<\/td><td>Allows information-only service requests, which do not alter or effect the operation of either the OCI GoldenGate deployment services.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p>Assign users to the appropriate group based on their responsibilities. For example, a user who can create processes but should not change encryption profiles should be added to the GGS_Operator group. Greater privileges can be granted by using the GGS_Administrator or GGS_Security groups as needed.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Policies<\/h1>\n\n\n\n<p>We can split the policies under two categories:<\/p>\n\n\n\n<p>User management:<\/p>\n\n\n\n<p>Polices to users that will manage OCI GoldenGate service, like create the deployment, assign connections, apply patchs and so on, here an example of it:<\/p>\n\n\n\n<p>allow group OGG_OCI_ADMINS to manage goldengate-family in compartment xyz<\/p>\n\n\n\n<p>Service Policies<\/p>\n\n\n\n<p>Grant the GoldenGate service permissions to interact with other OCI services (e.g., Logging, Vault, Domains). Example:<\/p>\n\n\n\n<p>allow service goldengate to {idcs_user_viewer, domain_resources_viewer} in &lt;location&gt;<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Data Access \/ Connections<\/h1>\n\n\n\n<p>To allow connections to your source\/target you need to create an OCI resource called Connection, this connection could be Dedicated or Shared, and the passwords should be stored in a OCI Vault, besides that if your source\/target supports advanced security parameters, you can use the advanced option to enter it (its available for a lot of connections type).<\/p>\n\n\n\n<p>One important addition to the service, is the capability to use a Resource Principal connection, in this case there is no user or password involved!<\/p>\n\n\n\n<p>For this to work you need to setup an dynamic group and the required policies:<\/p>\n\n\n\n<p>ALL {resource.type = &#8216;goldengatedeployment&#8217;, resource.compartment.id = &#8216;compartment_ocid&#8217;}<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>allow dynamic-group <your_dynamic_group> to manage object-family in compartment XYZ<\/your_dynamic_group><\/code><\/pre>\n\n\n\n<h1 class=\"wp-block-heading\">Protecting OCI Resources<\/h1>\n\n\n\n<p>OCI offers a way to lock resources update and delete, here we are talking about OCI GoldenGate but it could be applied to a lot of OCI resources, you can do that from terraform, OCI APIs and OCI CLI:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>oci goldengate deployment add-lock --deployment-id ocid1.goldengatedeployment\u2026&nbsp; --type FULL\/DELETE<\/code><\/pre>\n\n\n\n<p>If you define it to FULL the resource will be locked to any type of update, if you try to shut down, add\/remove tags, update any parameter it will fail with Resource has been locked message.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"652\" src=\"https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2025-12-03-153118-1024x652.png\" alt=\"\" class=\"wp-image-1617\" srcset=\"https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2025-12-03-153118-1024x652.png 1024w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2025-12-03-153118-300x191.png 300w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2025-12-03-153118-768x489.png 768w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2025-12-03-153118.png 1288w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>If you define it to DELETE, only delete operations will be blocked.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"609\" height=\"269\" src=\"https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2025-12-02-174923.png\" alt=\"\" class=\"wp-image-1616\" srcset=\"https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2025-12-02-174923.png 609w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2025-12-02-174923-300x133.png 300w\" sizes=\"auto, (max-width: 609px) 100vw, 609px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\">OCI Events<\/h4>\n\n\n\n<p>Because OCI GoldenGate is a cloud developed service, we can integrate it with other OCI Services, we can use OCI Events (Observability &amp; Management&nbsp; &gt; Events Service &gt; Rules) to fire alerts when specific action occurs, it\u2019s helpful to monitor get when someone is trying to delete your deployment for example.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"708\" height=\"431\" src=\"https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-13-190136.png\" alt=\"\" class=\"wp-image-1611\" srcset=\"https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-13-190136.png 708w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2026-01-13-190136-300x183.png 300w\" sizes=\"auto, (max-width: 708px) 100vw, 708px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"382\" src=\"https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/ogg_events-1024x382.gif\" alt=\"\" class=\"wp-image-1618\" srcset=\"https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/ogg_events-1024x382.gif 1024w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/ogg_events-300x112.gif 300w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/ogg_events-768x287.gif 768w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Logging<\/h2>\n\n\n\n<p>OCI GoldenGate produces three logs:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Error Logs is the same of ggserr.log where you can see warnings, errors and so on<\/li>\n\n\n\n<li>Process Logs where you will find extract, replicat, services entries.<\/li>\n\n\n\n<li>RestAPI Logs \u2013 Calls to your deployment APIs<\/li>\n<\/ul>\n\n\n\n<p>You can enable it under your deployment page in Monitoring &gt; logs tab:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"393\" src=\"https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2025-12-17-163754-1024x393.png\" alt=\"\" class=\"wp-image-1619\" srcset=\"https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2025-12-17-163754-1024x393.png 1024w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2025-12-17-163754-300x115.png 300w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2025-12-17-163754-768x295.png 768w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2025-12-17-163754.png 1170w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>And to read it you can go to Observability &amp; Management&nbsp; &gt; Logging &gt; Log Groups:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"600\" src=\"https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2025-12-17-164013-1024x600.png\" alt=\"\" class=\"wp-image-1620\" srcset=\"https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2025-12-17-164013-1024x600.png 1024w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2025-12-17-164013-300x176.png 300w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2025-12-17-164013-768x450.png 768w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2025-12-17-164013.png 1231w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"645\" src=\"https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2025-12-17-164136-1-1024x645.png\" alt=\"\" class=\"wp-image-1627\" srcset=\"https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2025-12-17-164136-1-1024x645.png 1024w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2025-12-17-164136-1-300x189.png 300w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2025-12-17-164136-1-768x483.png 768w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Screenshot-2025-12-17-164136-1.png 1236w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Auditing<\/h2>\n\n\n\n<p>We can leverage OCI Auditing to retrieve audit trails to answer some questions like: Who started\/stopped\/deleted my deployment? Who removed the connection\u2026 and using the OCI Auditing (Observability &amp; Management&nbsp; &gt; Logging &gt; Audit) we can easily find the answers:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"599\" src=\"https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Picture4-1024x599.png\" alt=\"\" class=\"wp-image-1622\" srcset=\"https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Picture4-1024x599.png 1024w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Picture4-300x175.png 300w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Picture4-768x449.png 768w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Picture4-1536x898.png 1536w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Picture4.png 1994w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"626\" height=\"201\" src=\"https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Picture5.png\" alt=\"\" class=\"wp-image-1623\" srcset=\"https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Picture5.png 626w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Picture5-300x96.png 300w\" sizes=\"auto, (max-width: 626px) 100vw, 626px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Trail Encryption<\/h2>\n\n\n\n<p>By default, GoldenGate will use a local wallet to encrypt your trail, but you can leverage it to OCI Vault to achieve better security, in case of a malicious user get access to your trail files he will need to have access to the wallet from the Vault since that wallet couldn\u2019t be exported from it.<\/p>\n\n\n\n<p>In Oracle docs you have a good image that show this architecture:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"624\" height=\"322\" src=\"https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Picture6.png\" alt=\"\" class=\"wp-image-1624\" srcset=\"https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Picture6.png 624w, https:\/\/adrianotanaka.com.br\/wp-content\/uploads\/2026\/01\/Picture6-300x155.png 300w\" sizes=\"auto, (max-width: 624px) 100vw, 624px\" \/><\/figure>\n\n\n\n<p>Both source and target deployments must have access to the same vault, if you try to open the trail without the right encryption profile you will find this error:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Logdump 95 &gt;ghdr on\n\nLogdump 96 &gt;detail on\n\nLogdump 97 &gt;open ab000000000.htm\n\nCurrent log trail file is \/mnt\/c\/Users\/tanaka\/Downloads\/ab000000000\n\n\u2026.\n\n2025-12-08 17:05:04&nbsp; INFO&nbsp;&nbsp;&nbsp; OGG-25851&nbsp; Using encryption profile 'LocalWallet'.\n\nWarning: Unable to decrypt with masterkey OGG_DEFAULT_MASTERKEY version 0.\n\n\u2026.\n\nBad compressed block, found length of 3,310 (0x00000cee), RBA 2,021.\n\nIf the trail file is encrypted, set to use decryption on using decrypt command and rerun. If the decrypt command is used, wallet file or key name is incorrect, verify the encryption configuration.<\/code><\/pre>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\">\n<p><\/p>\n<\/div>\n\n\n\n<p>If you want, watch this video to better understand how to setup and use Encryption profiles: <a href=\"https:\/\/www.youtube.com\/watch?v=Yh3ogaOheZE\">https:\/\/www.youtube.com\/watch?v=Yh3ogaOheZE<\/a><\/p>\n\n\n\n<p>By combining IAM integration, strict policies, proper encryption, detailed logging, resource locking, and event-triggered alerts, you can significantly enhance the security posture of your OCI GoldenGate deployments.<\/p>\n\n\n\n<p>If you need further details or specific instructions, please let me know.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Oracle GoldenGate on OCI offers robust capabilities for data replication across various technologies, but it\u2019s crucial to implement security best practices for both your deployment and the underlying data. Below are key recommendations and configurations to help secure your environment. Let\u2019s start with our architecture where we can see the big picture: Identity Groups To [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"material-hide-sections":[],"footnotes":""},"categories":[55,19,48,8],"tags":[],"class_list":["post-1605","post","type-post","status-publish","format-standard","hentry","category-api","category-cli","category-goldengate","category-oci"],"_links":{"self":[{"href":"https:\/\/adrianotanaka.com.br\/index.php\/wp-json\/wp\/v2\/posts\/1605","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adrianotanaka.com.br\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adrianotanaka.com.br\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adrianotanaka.com.br\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/adrianotanaka.com.br\/index.php\/wp-json\/wp\/v2\/comments?post=1605"}],"version-history":[{"count":5,"href":"https:\/\/adrianotanaka.com.br\/index.php\/wp-json\/wp\/v2\/posts\/1605\/revisions"}],"predecessor-version":[{"id":1664,"href":"https:\/\/adrianotanaka.com.br\/index.php\/wp-json\/wp\/v2\/posts\/1605\/revisions\/1664"}],"wp:attachment":[{"href":"https:\/\/adrianotanaka.com.br\/index.php\/wp-json\/wp\/v2\/media?parent=1605"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adrianotanaka.com.br\/index.php\/wp-json\/wp\/v2\/categories?post=1605"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adrianotanaka.com.br\/index.php\/wp-json\/wp\/v2\/tags?post=1605"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}