Oracle Exadata Database Service Cloudcustomer
Oracle Exadata Database Service Cloudcustomer
G27855-18
May 2025
Oracle Exadata Oracle Exadata Database Service on Cloud@Customer Administrator's Guide,
G27855-18
Contributors: Abhilash Gudasi, Akhila Prabhu, Alan Williams, Alexander Prince Mathew, Ankit Mahale, Ankur Raina,
Ankur Sinha, Ashutosh Chetal, Barb Lundhild, Behkam Aminzadeh, Bhargavi Amancharla, Bob Thome, Boming Zhang,
Brad Nowrouzi, Bryce Cracco, Charan Chaudary Lekkalapudi, Cynthia Varela, David Jimenez Alvarez, Douglas
Williams, Gabriel Melendez, Gorev Khanna, Guruprasad Hegde, Jai Krishnani, Jean-Francois Verrier, Jose Ricardo
Ortiz Olivares, Karina Ledesma, Kevin Deihl, Kishore Sridhar, Kris Bhanushali, Lakshmi Sneha Kandukuri, Lisa Grant,
Luqman, Manini Chattopadhyay, Manish Mahawar, Manish Shah, Manu Sinha, Mark Bauer, Michael Fitch, Monika
Gupta, Namratha Mandya Subramanya, Nayana Vishwa, Neha Avasthy, Neil Hebert, Nishith Pandey, Nithin Kovoor,
Omar Briseno Safa, Oscar Gallegos, Pablo Sainz Albanez, Peter Fusek, Peter Liu, Peter Sciarra, Pradeep Bhat, Pravin
Jha, Raj Ojha, Ranganath Srirangapatna Ramachandra, Rhonda Day, Robert Greene, Rodrigo Gonzalez Alba, Rohan
Anand, Rudregowda Mallegowda, Sanjay Narvekar, Santosh Uttam Bobade, Saravanan Sabapathy, Sarita Nori, Sham
Rao Pavan, Sheila Ray, Shravan Thatikonda, Smitha Gurunathakrishnan, Somnath Lahiri, Sonali Purdhani, Sujit
Dhawalkar, Syam Vasa, Tammy Bednar, Terence Buencamino, Tushar Pandit, Vedavathi Eagala, Vedika Joshi, Vira
Goorah, Vivek Nama, Vrishali Hajare, Xiao Pan, Youngju Cho
This software and related documentation are provided under a license agreement containing restrictions on use and
disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or
allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit,
perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation
of this software, unless required by law for interoperability, is prohibited.
The information contained herein is subject to change without notice and is not warranted to be error-free. If you find
any errors, please report them to us in writing.
If this is software, software documentation, data (as defined in the Federal Acquisition Regulation), or related
documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then
the following notice is applicable:
U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software, any
programs embedded, installed, or activated on delivered hardware, and modifications of such programs) and Oracle
computer documentation or other Oracle data delivered to or accessed by U.S. Government end users are "commercial
computer software," "commercial computer software documentation," or "limited rights data" pursuant to the applicable
Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, reproduction,
duplication, release, display, disclosure, modification, preparation of derivative works, and/or adaptation of i) Oracle
programs (including any operating system, integrated software, any programs embedded, installed, or activated on
delivered hardware, and modifications of such programs), ii) Oracle computer documentation and/or iii) other Oracle
data, is subject to the rights and limitations specified in the license contained in the applicable contract. The terms
governing the U.S. Government's use of Oracle cloud services are defined by the applicable contract for such services.
No other rights are granted to the U.S. Government.
This software or hardware is developed for general use in a variety of information management applications. It is not
developed or intended for use in any inherently dangerous applications, including applications that may create a risk of
personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all
appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its
affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications.
Oracle®, Java, MySQL, and NetSuite are registered trademarks of Oracle and/or its affiliates. Other names may be
trademarks of their respective owners.
Intel and Intel Inside are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used
under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Epyc, and the AMD logo
are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open
Group.
This software or hardware and documentation may provide access to or information about content, products, and
services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all
warranties of any kind with respect to third-party content, products, and services unless otherwise set forth in an
applicable agreement between you and Oracle. Oracle Corporation and its affiliates will not be responsible for any loss,
costs, or damages incurred due to your access to or use of third-party content, products, or services, except as set forth
in an applicable agreement between you and Oracle.
Contents
iii
Cost and Usage Attribution for Pluggable Databases (PDBs) 2-10
Different RUs for Primary and Standby DB Homes in Data Guard Associations, Switchover,
and Failover Operations 2-11
Granular Permissions for VM Cluster Update Operations 2-12
Enhancements to Quarterly Exadata Infrastructure Maintenance Planning and Execution 2-12
Enable Unified Auditing While Creating a Database Home 2-13
Enhancements to Oracle Key Vault (OKV) Integration with ExaDB-C@C to Manage
Transparent Data Encryption (TDE) Keys 2-14
Ability to Increase the Size of Guest VM Local File Systems 2-14
Create and Use Custom Software Images 2-15
Oracle Database 23ai on Oracle Exadata Database Service on Cloud@Customer 2-15
Change the Home Region of ExaDB-C@C Infrastructure 2-16
Enhancements to Serial Console Functionality 2-16
Provision a VM Cluster with Either an OL7 or OL8-Based Image 2-17
VM Cluster on a Single VM 2-17
Enhancement to Pluggable Database (PDB) Management 2-18
Manage Administrator (SYS User) and TDE Wallet Passwords 2-18
Update Guest VM (domU) Operating System to Oracle Linux 8 2-18
Exadata Fleet Update 2-19
Oracle Key Vault (OKV) Integration with ExaDB-C@C to Manage Transparent Data
Encryption (TDE) Keys 2-19
X10M System Support 2-20
Manage Serial Console Access to ExaDB-C@C Systems 2-20
Interim Software Updates 2-21
Link Aggregation Control Protocol (LACP) Support for Client and Backup Networks 2-22
VM Cluster and Database Health and Performance Metrics in the OCI Console 2-23
Enable Data Guard with Database Software Image (Custom Image) 2-23
Use Identity and Access Management (IAM) Authentication with Oracle Exadata Database
Service on Cloud@Customer 2-24
Create Data Guard Associations Across Regions 2-24
Multi-Rack Elastic Compute and Storage Expansion 2-25
Automatic Diagnostic Collection 2-27
Elastic Compute Expansion 2-28
Oracle Standard Tagging for Resources on Oracle Exadata Database Service on
Cloud@Customer 2-29
Exadata Infrastructure Maintenance History 2-29
Monthly ExaDB-C@C Infrastructure Security Maintenance 2-30
Enhanced Control to Rollback or Retry Failed Guest VM Operating System Update 2-30
Concurrently Create or Terminate Oracle Databases in a VM Cluster 2-31
Support for Rack Serial Number as a System Tag 2-31
Support for DB Home Minor Version Selection (N-3) 2-31
VM Guest Exadata OS Image Major Version Update 2-32
Database Service Events 2-32
iv
Control Plane Server (CPS) Offline Diagnostic Report 2-33
Enhanced Infrastructure Maintenance Controls 2-34
Manage Pluggable Databases on Exadata Cloud@Customer 2-35
Allow Customers to Choose Data Guard Type 2-35
Specify the Same SID for Primary and Standby Databases in a Data Guard Association 2-35
Specify db_unique_name and SID for Primary and Standby Databases in Data Guard
Association 2-36
VM Cluster Node Subsetting 2-36
X9M-2 System Support 2-37
Customize SCAN Listener Port 2-37
Creating DG Association/Standby Database Using Existing Database Home 2-38
Upgrading Oracle Grid Infrastructure on an Exadata Cloud@Customer VM Cluster 2-38
Updating Guest VM Operating System 2-38
Upgrading Oracle Databases 2-39
Download Network Validation Report 2-39
Elastic Storage Expansion 2-39
Oracle Database Software Images 2-40
Exadata Cloud@Customer Infrastructure Patching Automation 2-41
Customer Maintenance Contacts 2-41
X8M-2 System Support 2-41
Enable and Manage Data Guard Associations 2-42
Oracle Exadata Cloud@Customer Deployment Assistant 2-43
Oracle Grid Infrastructure and Oracle Database Patching 2-43
Per-Second Billing for OCPU Usage 2-43
Shared Database Home Resource Tags 2-44
Create and Manage Multiple Virtual Machines per Exadata System (MultiVM) 2-44
Scale OCPUs Without Cloud Connectivity 2-44
Configure Oracle Database Character Set and National Character Set 2-45
Specify a Time Zone While Provisioning Oracle Exadata Database Service on
Cloud@Customer Infrastructure 2-46
Shared Database Homes for Oracle Exadata Database Service on Cloud@Customer 2-46
X7-2 System Support 2-47
v
Flooring for Oracle Exadata Database Service on Cloud@Customer Racks 3-5
Electrical Power for Oracle Exadata Database Service on Cloud@Customer Racks 3-5
Temperature and Humidity Ranges for Oracle Exadata Database Service on
Cloud@Customer 3-7
Ventilation for Oracle Exadata Database Service on Cloud@Customer Racks 3-8
Network Requirements for Oracle Exadata Database Service on Cloud@Customer 3-8
Network Requirements for Oracle Exadata Database Service on Cloud@Customer 3-9
Data Center Network Services for Oracle Exadata Database Service on
Cloud@Customer 3-17
IP Addresses and Subnets for Oracle Exadata Database Service on Cloud@Customer 3-17
Uplinks for Oracle Exadata Database Service on Cloud@Customer 3-19
Network Cabling for Oracle Exadata Database Service on Cloud@Customer 3-20
Establish a Secure Connection Between Your CPS and OCI Using OCI’s FastConnect
Service 3-20
Storage Configuration Requirements for Oracle Exadata Database Service on
Cloud@Customer 3-23
Configuring Exadata ASM Storage 3-23
About ASM Storage Configuration for Oracle Exadata Database Service on
Cloud@Customer 3-24
Allocation of Storage Space Options on Oracle Exadata Storage Servers 3-24
Allocation Proportions for DATA, RECO and SPARSE Disk Groups 3-25
Virtual Machine File System Structure for Oracle Exadata Database Service on
Cloud@Customer 3-26
Configuring Exadata Exascale Storage 3-26
About Exascale Storage Configuration Oracle Exadata Database Service on
Cloud@Customer 3-27
Using the Console to Configure Exascale Storage on Oracle Exadata Database
Service on Cloud@Customer Infrastructure 3-28
Using the Console to Create an Exascale Storage Vault 3-28
Using the Console to Scale an Exascale Storage Vault 3-29
Using the Console to Move an Exascale Storage Vault to Another Compartment 3-30
Using the Console to Delete an Exascale Storage Vault 3-30
Checklists for Oracle Exadata Database Service on Cloud@Customer Deployments 3-31
System Components Checklist for Oracle Exadata Database Service on
Cloud@Customer 3-31
Data Center Room Checklist for Oracle Exadata Database Service on Cloud@Customer 3-32
Data Center Environment Checklist for Oracle Exadata Database Service on
Cloud@Customer 3-32
Access Route Checklist for Oracle Exadata Database Service on Cloud@Customer 3-32
Facility Power Checklist for Oracle Exadata Database Service on Cloud@Customer 3-33
Safety Checklist for Oracle Exadata Database Service on Cloud@Customer 3-34
Logistics Checklist for Oracle Exadata Database Service on Cloud@Customer 3-34
Network Configuration Checklist for Oracle Exadata Database Service on
Cloud@Customer 3-35
vi
Reracking Checklist for Oracle Exadata Database Service on Cloud@Customer 3-35
vii
Creating Database Backup Destinations for Oracle Exadata Database Service on
Cloud@Customer 4-45
About Managing Backup Destinations for Oracle Exadata Database Service on
Cloud@Customer 4-45
Prerequisites for Backup Destinations for Oracle Exadata Database Service on
Cloud@Customer 4-46
Using the Console for Backup Destinations for Oracle Exadata Database Service on
Cloud@Customer 4-47
Using the Console to Create a Backup Destination 4-48
Using the Console to Edit a Backup Destination 4-50
Using the Console to Move a Backup Destination to Another Compartment 4-51
Using the Console to Delete a Backup Destination 4-51
Creating First Database Home on an Oracle Exadata Database Service on
Cloud@Customer System 4-52
About Creating Oracle Database Homes on an Oracle Exadata Database Service on
Cloud@Customer System 4-52
Using the Console to Create Oracle Database Home on Oracle Exadata Database
Service on Cloud@Customer 4-53
Using the API to Create Oracle Database Home on Oracle Exadata Database Service
on Cloud@Customer 4-55
Creating First Database on an Oracle Exadata Database Service on Cloud@Customer
System 4-55
Prerequisites and Limitations for Creating and Managing Oracle Databases on Oracle
Exadata Database Service on Cloud@Customer 4-56
Oracle Database Releases Supported by Oracle Exadata Database Service on
Cloud@Customer 4-56
About Provisioning and Configuring Oracle Databases on Oracle Exadata Database
Service on Cloud@Customer 4-57
Using the Console to Create a Database 4-58
Connecting to an Oracle Exadata Database Service on Cloud@Customer System 4-63
Connecting to a Virtual Machine with SSH 4-64
Prerequisites for Connecting to an Oracle Exadata Database Service on
Cloud@Customer System 4-64
Connecting to a Virtual Machine from a Microsoft Windows System Using PuTTY 4-65
Accessing a Database After You Connect to the Virtual Machine 4-66
Connecting from a Unix-Style System 4-67
Connecting to a Database with Oracle Net Services 4-68
Using Oracle Net Services to Connect to a Database 4-68
Prerequisites for Connecting to a Database with Oracle Net Services 4-69
Connecting to a Database Using SCAN 4-69
Connecting to a Database Using a Node Listener 4-71
5 How-to Guides
Manage Database Security with Oracle Data Safe 5-2
viii
About Oracle Data Safe 5-2
Get Started 5-3
Using Oracle Data Safe 5-4
Connect to the Oracle Exadata Database Service on Cloud@Customer Service 5-5
Connecting to a Virtual Machine with SSH 5-6
Prerequisites for Connecting to an Oracle Exadata Database Service on
Cloud@Customer System 5-6
Connecting to a Virtual Machine from a Microsoft Windows System Using PuTTY 5-7
Connecting from a Unix-Style System 5-8
Accessing a Database After You Connect to the Virtual Machine 5-8
Connecting to a Database with Oracle Net Services 5-9
Using Oracle Net Services to Connect to a Database 5-10
Prerequisites for Connecting to a Database with Oracle Net Services 5-10
Connecting to a Database Using SCAN 5-11
Connecting to a Database Using a Node Listener 5-12
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure 5-13
About Provisioning Oracle Exadata Database Service on Cloud@Customer Systems 5-14
About Changing the Home Region of Oracle Exadata Database Service on
Cloud@Customer Infrastructure 5-14
Overview of Elastic Storage Expansion 5-16
Using the Console to Provision Oracle Exadata Database Service on Cloud@Customer 5-20
Using the Console to Create Oracle Exadata Database Service on
Cloud@Customer Infrastructure 5-21
Using the Console to Edit Network Bonding 5-31
Using the Console to View Exadata Infrastructure Network Configuration Details 5-32
Using the Console to Edit Oracle Exadata Database Service on Cloud@Customer
Infrastructure Networking Configuration 5-32
Using the Console to Download a File Containing Configuration Data 5-34
Using the Console to Activate Oracle Exadata Database Service on
Cloud@Customer Infrastructure 5-35
Using the Console to Check the Status of Oracle Exadata Database Service on
Cloud@Customer Infrastructure 5-36
Using the Console to Scale Infrastructure Compute and Storage 5-36
Using the Console to Download Scale Infrastructure Compute and Storage
Configuration File 5-39
Using the Console to Activate New Database and Storage Servers 5-39
Using the Console to Make Storage Capacity from New Server Available for VM
Clusters Consumption 5-40
Using the Console to View Details of Oracle Exadata Database Service on
Cloud@Customer Infrastructure with Scaled Compute and Storage Capacity 5-41
Using the Console to Move Oracle Exadata Database Service on Cloud@Customer
Infrastructure 5-42
Using the Console to Delete Oracle Exadata Database Service on
Cloud@Customer Infrastructure 5-42
ix
Using the Console to Manage Tags for Your Oracle Exadata Database Service on
Cloud@Customer Resources 5-43
Managing Infrastructure Maintenance Contacts 5-43
Using the API to Manage Oracle Exadata Database Service on Cloud@Customer
Infrastructure 5-46
Configure Oracle-Managed Infrastructure Maintenance 5-46
About Oracle Managed Oracle Exadata Database Service on Cloud@Customer
Infrastructure Maintenance Updates 5-48
Overview of the Quarterly Infrastructure Maintenance Process 5-49
Overview of Monthly Security Maintenance 5-50
Understanding Monthly and Quarterly Maintenance in the Same Month 5-51
Infrastructure Maintenance Contacts 5-53
Maintenance Scheduling Policy 5-54
View the List of Maintenance Scheduling Policy 5-54
Create a Maintenance Scheduling Policy 5-55
View Details of a Maintenance Scheduling Policy 5-57
Edit a Maintenance Scheduling Policy 5-57
Edit a Maintenance Scheduling Policy that's in Needs Attention State 5-57
View the Maintenance Windows of a Maintenance Scheduling Policy 5-57
Edit a Maintenance Window of a Maintenance Scheduling Policy 5-58
Add Additional Maintenance Windows to a Maintenance Scheduling Policy 5-58
View Resources Associated with a Policy 5-58
Delete a Maintenance Window of a Maintenance Scheduling Policy 5-59
Move a Maintenance Scheduling Policy to a Different Compartment 5-59
Add Tags to a Maintenance Scheduling Policy 5-60
Delete a Maintenance Scheduling Policy 5-60
Using the Console to Configure Oracle-Managed Infrastructure Updates 5-61
View or Edit Quarterly Maintenance Preferences 5-61
Manage Quarterly Maintenance Plan using Scheduling Policy 5-65
View or Edit a Scheduled Quarterly Maintenance 5-69
View or Edit a Scheduled Security Maintenance 5-74
View the Maintenance History 5-74
Manage Quarterly Maintenance Run created from Scheduling Plan 5-75
View Maintenance Windows Associated with a Maintenance Run 5-75
Edit Maintenance Window Associated with a Maintenance Run 5-76
View Maintenance Actions Associated with a Maintenance Run 5-77
Edit Maintenance Actions of a Maintenance Window Associated with a Maintenance
Run 5-77
View and Edit Maintenance While Maintenance is In Progress 5-80
View and Edit Maintenance While Maintenance is Waiting for Custom Action 5-81
Cancel a Maintenance Run While In Progress 5-82
View Maintenance Activity in a Compartment 5-83
View the Details of a Maintenance Activity 5-83
x
View Maintenance History in a Compartment 5-83
View Maintenance History Details in a Compartment 5-84
Review and Respond to Unplanned Maintenance Activity 5-84
Monitor Infrastructure Maintenance Using Lifecycle State Information 5-85
Receive Notifications about Your Infrastructure Maintenance Updates 5-85
Using the API to Manage Oracle Exadata Database Service on Cloud@Customer
Infrastructure Maintenance Controls 5-86
Manage VM Cluster Networks 5-87
About Managing VM Cluster Networks on Oracle Exadata Database Service on
Cloud@Customer 5-88
Using the Console to Create a VM Cluster Network 5-89
Using the Console to View VM Cluster Network Details 5-92
Using the Console to View SCAN Listener Port Configured 5-92
Using the Console to Edit a VM Cluster Network 5-92
Using the Console to Download a File Containing the VM Cluster Network Configuration
Details 5-94
Using the Console to Validate a VM Cluster Network 5-95
Using the Console to Download Network Validation Report 5-95
Using the Console to Terminate a VM Cluster Network 5-97
Using the Console to Add Another DB Server to the VM Cluster Network 5-97
Using the Console to Remove DB Servers from a VM Cluster Network 5-98
Manage VM Clusters 5-98
About Managing VM Clusters on Oracle Exadata Database Service on Cloud@Customer 5-99
Overview of VM Cluster Node Subsetting 5-99
Overview of Automatic Diagnostic Collection 5-100
Incident Logs and Trace Files 5-101
Health Metrics 5-106
Introduction to Scale Up or Scale Down Operations 5-111
Scaling Up or Scaling Down the VM Cluster Resources 5-111
Resizing Memory and Large Pages 5-112
Calculating the ASM Storage 5-113
Estimating How Much Local Storage You Can Provision On Your VMs 5-115
Scaling Local Storage 5-116
Using the Console to Manage VM Clusters on Oracle Exadata Database Service on
Cloud@Customer 5-117
Using the Console to Create an ASM VM Cluster 5-118
Using the Console to Create an Exascale VM Cluster 5-125
Using the Console to Enable, Partially Enable, or Disable Diagnostics Collection 5-132
Using the Console to Add VMs to a Provisioned Cluster 5-134
Using the Console to View a List of DB Servers on an Exadata Infrastructure 5-135
Using the Console to Remove a VM from a VM Cluster 5-135
Using the Console to Update the License Type on a VM Cluster 5-136
Using the Console to Add SSH Keys After Creating a VM Cluster 5-136
xi
Using the Console to Scale the Resources on a VM Cluster 5-137
Using the Console to Stop, Start, or Reboot a VM Cluster Virtual Machine 5-139
Using the Console to Check the Status of a VM Cluster Virtual Machine 5-140
Using the Console to Move a VM Cluster to Another Compartment 5-140
Using the Console to Terminate a VM Cluster 5-141
Using the API to Manage Oracle Exadata Database Service on Cloud@Customer VM
Clusters 5-141
Troubleshooting Virtual Machines Using Console Connections 5-142
Required IAM Policies 5-143
Prerequisites 5-143
Create the Virtual Machine Serial Console Connection 5-147
Make an SSH Connection to the Serial Console 5-148
Using Cloud Shell to Connect to the Serial Console 5-152
Displaying the Console History for a Virtual Machine 5-153
Troubleshooting Virtual Machines from Guest VM Console Connections on Linux
Operating Systems 5-156
Exiting the Virtual Machine Serial Console Connection 5-158
Manage Software Images 5-159
Creation and Storage of Software Images 5-160
Using a Software Image with an Oracle Exadata Database Service on Cloud@Customer
System 5-161
Using the Console to View the List of Software Images 5-161
Using the Console to Create a Database Software Image 5-161
Using the Console to Create a Grid Infrastructure Software Image 5-162
Using the OPatch lsinventory Command to Verify the Patches Applied to an Oracle
Database Home or Oracle Grid Infrastructure Home 5-163
Using the Console to Delete a Software Image 5-164
Using the Console to View the Update Information of a Software Image 5-164
Using the Console to Move a Software Image to a Different Compartment 5-165
Using the API for Managing Software Images 5-165
Create Oracle Database Homes on an Oracle Exadata Database Service on
Cloud@Customer System 5-166
About Creating Oracle Database Homes on an Oracle Exadata Database Service on
Cloud@Customer System 5-166
Using the Console to Create Oracle Database Home on Oracle Exadata Database
Service on Cloud@Customer 5-167
Using the API to Create Oracle Database Home on Oracle Exadata Database Service
on Cloud@Customer 5-169
Manage Oracle Database Homes on Oracle Exadata Database Service on
Cloud@Customer Systems 5-169
About Managing Oracle Database Homes on Oracle Exadata Database Service on
Cloud@Customer Systems 5-170
Manage Database Home Using the Console 5-170
Using the Console to View Information About an Oracle Database Home 5-170
xii
Using the Console to Delete an Oracle Database Home 5-171
Using the API to Manage Oracle Database Home on Oracle Exadata Database Service
on Cloud@Customer 5-171
Differences Between Managing Resources with dbaascli and the Database API 5-172
Manage Databases on Oracle Exadata Database Service on Cloud@Customer 5-172
Prerequisites and Limitations for Creating and Managing Oracle Databases on Oracle
Exadata Database Service on Cloud@Customer 5-173
Oracle Database Releases Supported by Oracle Exadata Database Service on
Cloud@Customer 5-174
About Provisioning and Configuring Oracle Databases on Oracle Exadata Database
Service on Cloud@Customer 5-174
Using the Console to Manage Databases on Oracle Exadata Database Service on
Cloud@Customer 5-175
Using the Console to Create a Database 5-176
Using the Console to Manage SYS User and TDE Wallet Passwords 5-181
Using the Console to Migrate Encryption Keys from Oracle Wallet to Other
Encryption Methods (Oracle Key Vault, External Keystore) 5-182
Using the Console to Rotate Encryption Keys 5-183
Using the Console to Move a Database to Another Database Home 5-184
Using the Console to Terminate a Database 5-184
Using the API to Manage Oracle Database Components 5-185
Changing the Database Passwords 5-186
To Change the SYS Password for an Exadata Database Service on
Cloud@Customer Database 5-186
To Change Database Passwords in a Data Guard Environment 5-187
To Change the TDE Wallet Password for an Exadata Database Service on
Cloud@Customer Database 5-187
Manage Pluggable Databases on Oracle Exadata Database Service on
Cloud@Customer 5-187
Pluggable Database Operations 5-187
Concurrently Create or Delete Pluggable Databases (PDBs) 5-210
Cost and Usage Attribution for Pluggable Databases (PDBs) 5-211
Connect to an Oracle Database using Oracle Cloud Infrastructure (OCI) Identity and
Access Management (IAM) Users 5-212
Oracle Cloud Infrastructure (OCI) Identity and Access Management (IAM)
Authentication with Oracle Database 5-213
Prerequisites for Oracle Cloud Infrastructure (OCI) Identity and Access Management
(IAM) Authentication on Oracle Database 5-215
Enabling the Database and Clients for IAM Integration 5-218
Authenticating and Authorizing Microsoft Entra ID (MS-EI) Users for Oracle Databases
on Oracle Exadata Database Service on Cloud@Customer 5-218
About Authorizing Microsoft Entra ID (MS-EI) Users for Oracle Databases on Oracle
Exadata Database Service on Cloud@Customer 5-219
Configuring the Oracle Database for Microsoft Entra ID (MS-EI) Integration 5-220
Manage Database Backup and Recovery on Oracle Exadata Database Service on
Cloud@Customer 5-223
xiii
Backup Destinations 5-223
About Managing Backup Destinations for Oracle Exadata Database Service on
Cloud@Customer 5-224
Prerequisites for Backup Destinations for Oracle Exadata Database Service on
Cloud@Customer 5-224
Using the Console for Backup Destinations for Oracle Exadata Database Service on
Cloud@Customer 5-225
Using the API to Manage Oracle Exadata Database Service on Cloud@Customer
Backup Destinations 5-230
Oracle Database Backup Methods in Exadata Cloud 5-230
Oracle Managed Backup 5-231
User Configured Backup 5-244
Configuring and Customizing Backups with dbaascli 5-252
Customizing Backup Settings by Using a Generated Configuration File 5-253
Creating an On-Demand Backup by Using dbaascli 5-260
Disabling Automatic Backups to Facilitate Manual Backup and Recovery Management 5-262
Customizing Real Time Redo Transport (RTRT) Behavior for Recovery Appliance
Backups 5-262
Alternative Backup Methods 5-263
Recovering a Database Using Oracle Recovery Manager (RMAN) 5-264
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System 5-264
Perform User Managed Maintenance Updates 5-264
Patching and Updating an Oracle Exadata Database Service on Cloud@Customer
System 5-265
Patching and Updating VM Clusters and Database Homes 5-266
Updating Guest VM Operating System 5-272
Upgrading Oracle Grid Infrastructure on an Oracle Exadata Database Service on
Cloud@Customer VM Cluster 5-276
Upgrading Oracle Databases 5-278
Patching and Updating an Oracle Exadata Database Service on Cloud@Customer
System Manually 5-284
Updating Software Manually 5-284
Updating the Guest VM Operating System Manually 5-285
Resolving Dependency Issues Associated with Additional Non-Exadata Software
Packages for DOMU Upgrade 5-294
Interim Software Updates 5-295
Create an Interim Software Update 5-295
Download an Interim Software Update 5-296
Delete an Interim Software Update 5-296
Move an Interim Software Update Resource to Another Compartment 5-296
Using the API to Manage Interim Software Updates 5-297
Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer 5-297
About Using Oracle Data Guard with Oracle Exadata Database Service on
Cloud@Customer 5-298
xiv
Prerequisites for Using Oracle Data Guard with Oracle Exadata Database Service on
Cloud@Customer 5-298
VM Clusters 5-299
Password 5-299
Adding a Node to a VM Cluster 5-299
Removing a Node from a VM Cluster 5-299
Working with Data Guard 5-299
Switchover 5-300
Failover 5-300
Reinstate 5-300
Using the Console to Manage an Oracle Data Guard group 5-300
Using the Console to Enable Data Guard on an Oracle Exadata Database Service
on Cloud@Customer System 5-301
Using the Console to View Data Guard group of Databases in an Exadata VM
Cluster 5-306
Using the Console To View and Edit Data Guard group Details 5-306
Using the Console To Perform a Database Switchover 5-307
Using the Console To Perform a Database Failover 5-307
Using the Console To Reinstate a Database 5-308
Using the Console To Terminate a Data Guard group on an Oracle Exadata
Database Service on Cloud@Customer System 5-308
Using the API to Manage Data Guard Associations on an Oracle Exadata Database
Service on Cloud@Customer System 5-309
Using the API to Manage Data Guard group on an Oracle Exadata Database Service on
Cloud@Customer System 5-310
Manage Keys Using an External Keystore 5-326
Configuring an External Keystore 5-326
Storing the Keys in an External Keystore 5-327
Restrictions on Adding a Virtual Machine to a VM Cluster Configured with an External
Keystore 5-327
Managing Encryption Keys on External Devices 5-328
Customer-Managed Keys in Oracle Exadata Database Service on Cloud@Customer 5-329
About Oracle Key Vault 5-329
Overview of Key Store 5-330
Required IAM Policy for Managing OKV on Oracle Exadata Database Service on
Cloud@Customer 5-330
Tagging Resources 5-331
Moving Resources to a Different Compartment 5-331
Setting Up Your Oracle Exadata Database Service on Cloud@Customer to Work With
Oracle Key Vault 5-331
Step 1: Create a Vault in OKV Vault Service and Add a Secret to the Vault to Store
OKV REST Administrator Password 5-332
Step 2: Create a Dynamic Group and a Policy Statement for Key Store to Access
Secret in OKV Vault 5-332
xv
Step 3: Create a Dynamic Group and a Policy Statement for Exadata Infrastructure
to Key Store 5-333
Step 4: Create a Policy Statement for Database Service to Use Secret from OKV
Vault Service 5-334
Step 5: Create Key Store 5-334
Managing Your Key Store 5-335
View Key Store Details 5-335
Edit Key Store Details 5-336
Move a Key Store to Another Compartment 5-336
Delete a Key Store 5-336
View Key Store Associated Container Database Details 5-336
Using the API to Manage Key Store 5-337
Administer Transparent Data Encryption (TDE) Keys 5-337
How to Manually Clone a Pluggable Database (PDB) from a Remote Container
Database (CDB) When Data is Encrypted with Master Encryption Key (MEK) in Oracle
Key Vault (OKV) 5-339
Source CDB and Target CDB are Encrypted with MEK in the Same OKV Server 5-340
Source CDB and Target CDB are Encrypted with MEK in a Different OKV Server 5-350
How to Upgrade Oracle Key Vault (OKV) Home in ExaDB-C@C 5-360
Migrate to Oracle Exadata Database Service on Cloud@Customer 5-364
Moving to Oracle Cloud Using Zero Downtime Migration 5-365
Overview of Exadata Cloud@Customer Gen1 to Out-of-Place Cloud Upgrade to Oracle
Exadata Database Service on Cloud@Customer Gen2 Infrastructure 5-365
Scope for Exadata Cloud@Customer Gen1 to Gen2 Out-of-Place Cloud Upgrade 5-366
Hardware and Software Required for Out-of-Place Cloud Upgrade to New Oracle
Exadata Database Service on Cloud@Customer Gen2 Infrastructure 5-367
Using Oracle Zero Downtime Migration (ZDM) to Migrate Oracle Databases 5-368
During Out-of-Place Cloud Upgrade to New Oracle Exadata Database Service on
Cloud@Customer Gen2 Infrastructure 5-372
Post Out-of-Place Cloud Upgrade to New Oracle Exadata Database Service on
Cloud@Customer Gen2 Infrastructure 5-373
Best Practices for Out-of-Place Cloud Upgrade to New Oracle Exadata Database
Service on Cloud@Customer Gen2 Infrastructure 5-374
xvi
Use DBMS_CLOUD_PIPELINE to Create Data Pipelines for Loading and Exporting
Data in the Cloud 6-5
Use Select AI to generate SQL from Natural Language Prompts 6-5
Provision for Free Developer Database Instances 6-6
Disable and Enable Automatic Backups 6-6
Ability to Scale Up or Scale Down an Autonomous Exadata VM Cluster 6-7
DST Time-Zone File Update for an Autonomous Container Database (ACD) 6-7
Rolling and Non-Rolling Maintenance Methods to Update an Autonomous Container
Database 6-7
Interactive Visualization of Resource Usage Data 6-8
ECPU Billing Model and CPU Allocation 6-8
X10M System Support 6-9
In-Memory Column Store Support 6-10
Create Autonomous Data Guard Associations and Clone an Autonomous Database
Across Control Plane Regions 6-11
Set Compartment Quotas Using Policy Statements 6-12
Base Shape support on Oracle Autonomous Database on Dedicated Exadata
Infrastructure 6-12
Bring Your Own Certificates (BYOC) 6-12
Use Kerberos to Authenticate Autonomous Database Users 6-13
Long-Term Backup 6-13
Save as Stack 6-14
Autonomous Exadata VM Cluster Node Subsetting 6-14
Choose a Specific Oracle Database Version While Provisioning Autonomous Container
Databases (ACDs) 6-15
Autonomous Data Guard Enhancements 6-16
Configure Non-Default SCAN Listener Ports 6-16
Clone an Autonomous Database Across Exadata Infrastructure Within the Same Region 6-17
Character Set Selection 6-17
Enhanced Resource Tracking for Autonomous Database 6-18
Longer Database Name 6-20
Create a New Autonomous Database Instance from Backup 6-21
Multiple Autonomous VM Cluster Support 6-21
Automatic Failover with a Standby Autonomous Container Database 6-22
X9M-2 System Support 6-22
Fractional OCPU and GB Storage 6-22
Autonomous Data Guard Enabled Autonomous Database and Oracle Key Vault (OKV)
Integration 6-23
Infrastructure Patching 6-23
Access Control List (ACL) to Restrict Access to Autonomous Data Guard Enabled
Autonomous Databases 6-23
ADB-D on Exadata Cloud@Customer: Monitor Performance with Autonomous Database
Metrics 6-24
ADB-D on Exadata Cloud@Customer: Autonomous Data Guard 6-24
xvii
Access Control List (ACL) to Restrict Access to Autonomous Databases 6-24
Oracle Key Vault (OKV) Integration 6-25
X8M-2 System Support 6-25
Per-Second Billing for Autonomous Database OCPU Usage 6-25
Oracle Autonomous Database on Oracle Exadata Database Service on
Cloud@Customer 6-25
Introduction to Autonomous Database on Exadata Cloud@Customer 6-25
Database System Architecture Overview 6-26
Resource Types 6-26
Deployment Order 6-27
User Roles 6-27
Available Exadata Infrastructure Hardware Shapes 6-28
Managing Autonomous Exadata VM Clusters 6-36
About Autonomous Exadata VM Clusters 6-37
Resource Terminology 6-37
Create an Autonomous Exadata VM Cluster 6-38
View a List of DB Servers on an Exadata Infrastructure 6-42
View a List of Autonomous Exadata VM Clusters 6-42
View Details of an Autonomous Exadata VM Cluster 6-43
Scale Autonomous Exadata VM Cluster Resources 6-45
Schedule Oracle-Managed Infrastructure Updates 6-46
Set the Automatic Maintenance Schedule for Autonomous Exadata VM Cluster 6-46
View or Edit the Time of the Next Scheduled Maintenance for Autonomous Exadata
VM Cluster 6-47
View the Maintenance History of Autonomous Exadata VM Cluster 6-48
Change the License Type on an Autonomous VM Cluster 6-48
Move an Autonomous Exadata VM Cluster to Another Compartment 6-48
Terminate an Autonomous Exadata VM Cluster 6-49
Using the API to Manage Autonomous Exadata VM Clusters 6-49
Rotate Oracle Database TLS Certificate and Oracle REST Data Services (ORDS) TLS
Certificate 6-49
Managing Encryption Keys on External Devices 6-51
About Oracle Key Vault 6-52
Overview of Key Store 6-52
Required IAM Policy for Managing OKV on Oracle Exadata Database Service on
Cloud@Customer 6-53
Tagging Resources 6-53
Moving Resources to a Different Compartment 6-54
Setting Up Your Oracle Exadata Database Service on Cloud@Customer to Work With
Oracle Key Vault 6-54
Step 1: Create a Vault in OKV Vault Service and Add a Secret to the Vault to Store
OKV REST Administrator Password 6-55
Step 2: Create a Policy Statement for Database Service to Use Secret from OKV
Vault Service 6-55
xviii
Step 3: Create Key Store 6-55
Managing Your Key Store 6-56
View Key Store Details 6-57
Edit Key Store Details 6-57
Move a Key Store to Another Compartment 6-57
Delete a Key Store 6-58
View Key Store Associated Container Database Details 6-58
Using the API to Manage Key Store 6-58
Managing Autonomous Container Databases 6-59
Create an Autonomous Container Database 6-59
View a List of Autonomous Container Databases 6-62
View the List of Autonomous Container Databases in an Autonomous Exadata VM
Cluster 6-62
View the List of Autonomous Container Databases in a Compartment 6-63
View Details of an Autonomous Container Database 6-63
Update Autonomous Container Database Maintenance Preferences 6-63
Schedule a Quarterly Maintenance Update 6-64
Rotate CDB Encryption Key 6-66
Change the Backup Retention Policy of an Autonomous Container Database 6-66
Change the Maintenance Schedule of an Autonomous Container Database 6-67
Restart an Autonomous Container Database 6-67
Move an Autonomous Container Database to Another Compartment 6-68
Terminate an Autonomous Container Database 6-69
Using the API to Manage Autonomous Container Databases 6-69
Managing Autonomous Databases 6-70
Oracle Autonomous Database for Developers 6-71
Create an Autonomous Database 6-72
Manage Access Control List of an Autonomous Database 6-76
View a List of Autonomous Databases 6-77
View Details of an Autonomous Database 6-78
Manage Customer Contacts for an Autonomous Database 6-78
Rotate ADB Encryption Key 6-79
Set the Password of an Autonomous Database's ADMIN User 6-79
Scale the CPU Core Count or Storage of an Autonomous Database, or Enable/Disable
or Alter the Percentage of System Global Area (SGA) for IM Column Store 6-80
Enable or Disable Auto Scaling for an Autonomous Database 6-82
Move an Autonomous Database to Another Compartment 6-83
Stop or Start an Autonomous Database 6-83
Restart an Autonomous Database 6-84
Back Up an Autonomous Database Manually 6-84
Create a Long-Term Backup 6-85
View Details and Edit Retention Period of a Long-Term Backup 6-86
xix
Delete a Long-Term Backup 6-86
Restore an Autonomous Database 6-86
Restore from a Backup 6-87
Restore to a Point in Time 6-87
Clone an Autonomous Database 6-88
Clone an Autonomous Database Backup 6-92
Clone a Standby Database 6-96
Clone a Standby Database Backup 6-99
Terminate an Autonomous Database 6-103
API to Manage Autonomous Databases 6-104
Monitor Performance with Autonomous Database Metrics 6-104
View Top Six Metrics for an Autonomous Database 6-105
View Aggregated Metrics for Autonomous Databases in a Compartment 6-105
Autonomous Database Metrics and Dimensions 6-106
Connecting to Autonomous Databases 6-106
Download the Wallet for an Autonomous Database 6-107
Get the APEX and SQL Developer Web URLs for an Autonomous Database 6-108
Authenticate Autonomous Database Users with Kerberos 6-108
About Kerberos Authentication 6-108
Components of the Kerberos Authentication System 6-109
Notes about Kerberos Authentication on Autonomous Database 6-109
Enable Kerberos Authentication on Autonomous Database 6-110
Disable Kerberos Authentication on Autonomous Database 6-112
Patching Autonomous Database on Exadata Cloud@Customer Infrastructure 6-112
Overview of Autonomous Database on Exadata Cloud@Customer Infrastructure
Patching 6-112
Specifying When Maintenance Can Occur 6-113
Specifying What Kind of Patches to Apply 6-113
Migrating On-Premises Databases to Oracle Autonomous Database on Exadata
Cloud@Customer 6-114
Using Autonomous Data Guard with Autonomous Database on Exadata Cloud@Customer 6-114
Enabling Autonomous Data Guard on an Autonomous Container Database 6-115
Create an Autonomous Data Guard Enabled Autonomous Container Database 6-116
View Details of a Data Guard Enabled Primary or Standby Autonomous Container
Database 6-121
Edit Autonomous Container Database Backup Settings 6-121
Convert a Physical Standby ACD to Snapshot Standby ACD 6-123
Convert a Snapshot Standby ACD to Physical Standby ACD 6-124
Rotate CDB Encryption Key 6-125
Managing a Standby Autonomous Container Database 6-125
Perform a Failover to Standby Autonomous Container Database 6-126
Perform a Switchover to Standby or Primary Autonomous Container Database 6-127
Reinstate Data Guard Enabled Standby Autonomous Container Database 6-128
xx
Terminate a Data Guard Enabled Primary Autonomous Container Database 6-128
Terminate a Data Guard Enabled Standby Autonomous Container Database 6-129
Operations Performed Using the APIs 6-129
Enabling Autonomous Data Guard on an Autonomous Database 6-130
View Autonomous Data Guard Enablement 6-130
Create an Autonomous Data Guard Enabled Autonomous Database 6-131
View Details of a Data Guard Enabled Primary or Standby Autonomous Database 6-133
Rotate ADB Encryption Key 6-134
Maintenance Scheduling and Patching Data Guard Enabled Autonomous Container
Database 6-134
Configure Automatic Maintenance Schedule for a Data Guard Enabled Autonomous
Container Database 6-134
View the Next Scheduled Maintenance Run of a Data Guard Enabled Autonomous
Container Database 6-136
View the Maintenance History of a Data Guard Enabled Autonomous Container
Database 6-136
Immediately Patch a Data Guard Enabled Autonomous Container Database 6-137
Reschedule or Skip scheduled Maintenance for Data Guard Enabled Autonomous
Container Database 6-137
Using Performance Hub 6-138
xxi
Listing Available Software Images and Versions for Database and Grid Infrastructure 7-15
Performing a Precheck Before Patching Databases and Grid Infrastructure 7-17
Resuming or Rolling Back a Patching Operation 7-19
Updating Cloud Tooling Using dbaascli 7-21
Creating a Duplicate Database 7-21
Using dbaascli to Duplicate a Cloud Database 7-21
Duplicate an On-Premises Database 7-22
Release Notes 7-24
Release 25.1.2.0.0 (250505) 7-25
Release 25.1.1.0.0 (250220) 7-25
Release 24.4.1.0.0 (241212) 7-25
Release 24.3.2.0.0 (240912) 7-25
Release 24.3.1.0.0 (240730) 7-25
Release 24.2.1.0.0 (240620) 7-25
Release 24.1.2.0.0 (240327, 240424, 240502) 7-26
Release 24.1.1.0.0 (240118, 240219) 7-26
Release 23.4.1.0.0 (231219) 7-26
Release 23.3.2.0.0 (231115) 7-26
Release 23.3.1.0.0 (230817, 231020) 7-26
Release 23.2.1.0.0 (230708, 230724) 7-27
Release 23.1.2.0.0 (230411, 230616) 7-27
Release 23.1.1.0.1 (230302) 7-28
Release 22.4.1.0.1 (221214) 7-28
Release 22.3.1.1.0 (221003) 7-29
Release 22.3.1.0.1 (220831) 7-29
Release 22.2.1.1.0 (220713) 7-30
Release 22.2.1.0.1 (220504) 7-31
Release 22.1.1.1.0 (220301) 7-31
Release 22.1.1.0.1 (220223) 7-32
Release 21.4.1.1.0 7-32
Release 21.3.1.2.0 7-33
Release 21.3.1.1.0 7-33
Release 21.3.1.0.1 7-34
Release 21.2.1.x.x 7-35
dbaascli Command Reference 7-35
Administration and Configuration 7-37
CPU Scaling 7-40
Cloud Software Library (CSWLIB) Management 7-44
Database Management 7-51
Data Guard Management 7-88
Database Home Management 7-105
Diagnostics and Health Checks 7-113
xxii
Grid Infrastructure Management 7-118
Patching and Upgrading 7-130
Pluggable Database (PDB) Management 7-155
System Management 7-187
Transparent Data Encryption (TDE) Management 7-190
Deprecated dbaascli commands 7-226
Monitoring and Managing Exadata Storage Servers with ExaCLI 7-229
About the ExaCLI Command 7-230
Exadata Storage Server Username and Password 7-230
ExaCLI Command 7-230
Connecting to a Storage Server with ExaCLI 7-236
Monitor Metrics for VM Cluster Resources 7-237
Prerequisites for Using Metrics 7-238
View Metrics for a VM Cluster 7-239
View Metrics for a Database 7-240
View Metrics for VM Clusters in a Compartment 7-241
View Metrics for Databases in a Compartment 7-242
Manage Oracle Trace File Analyzer 7-242
Metrics for Oracle Exadata Database Service on Cloud@Customer in the Monitoring Service 7-244
Oracle Exadata Database Service on Cloud@Customer Events 7-248
About Event Types on Oracle Exadata Database Service on Cloud@Customer 7-249
Exadata Infrastructure Event Types 7-250
Exascale DB Storage Vaults Event Types 7-265
VM Cluster Network Event Types 7-266
VM Cluster Event Types 7-267
Backup Destination Event Types 7-269
Database Node Event Types (Oracle Exadata Database Service on Cloud@Customer) 7-270
Database Home Event Types (Oracle Exadata Database Service on Cloud@Customer) 7-271
Database Event Types (Oracle Exadata Database Service on Cloud@Customer) 7-272
Database and Grid Infrastructure Patching Event Types 7-273
Autonomous VM Cluster Event Types 7-276
Autonomous Container Database Event Types 7-280
Autonomous Database Event Types 7-281
Data Guard Event Types 7-282
Autonomous Data Guard Association Event Types 7-284
Key Store Event Types 7-288
Exadata Infrastructure Maintenance Event Types 7-289
Storage Expansion Event Types 7-295
Database Software Images Event Types 7-297
Database Upgrade Event Types 7-305
Pluggable Database Event Types 7-313
VM Node Subsetting Event Types 7-323
xxiii
Database Service Events 7-327
Overview of Database Service Events 7-327
Receive Notifications about Database Service Events 7-331
Database Service Event Types 7-331
Temporarily Restrict Automatic Diagnostic Collections for Specific Events 7-342
Remediation 7-345
Compute Expansion Event Types 7-363
Serial Console Connection Event Types 7-368
Viewing Audit Log Events 7-372
Serial Console History Event Types 7-373
Interim Software Updates Event Types 7-377
Policy Details for Oracle Exadata Database Service on Cloud@Customer 7-384
About Resource-Types 7-384
Resource-Types for Oracle Exadata Database Service on Cloud@Customer 7-385
Supported Variables 7-387
Details for Verb + Resource-Type Combinations 7-387
Database-Family Resource Types 7-388
Permissions and API operation details for Exadata Infrastructures 7-388
Permissions and API operation details for exascale-db-storage-vaults 7-389
Permissions and API operation details for VM Cluster Networks 7-390
Permissions and API operation details for VM Clusters 7-390
Permissions and API operation details for Backup Destinations 7-392
Permissions and API operation details for DB Nodes 7-393
Permissions and API operation details for DB Homes 7-393
Permissions and API operation details for Databases 7-394
Permissions and API operation details for Backups 7-395
Permissions and API operation details for Database Software Image 7-395
Permissions and API operation details for Autonomous Databases 7-396
Permissions and API operation details for Autonomous Backups 7-396
Permissions and API operation details for Autonomous Container Databases 7-397
Permissions and API operation details for Autonomous VM Clusters 7-397
Permissions and API operation details for Autonomous Container Database Data
Guard Associations 7-398
Permissions and API operation details for Autonomous Database Data Guard
Association 7-399
Permissions and API operation details for Autonomous Virtual Machine 7-399
Permissions and API operation details for Key Stores 7-399
Permissions and API operation details for Pluggable Databases (PDBs) 7-400
Permissions and API operation details for DB Servers 7-402
Permissions and API operation details for DB Node Console Connection 7-402
Permissions and API operation details for DB Node Console History 7-402
Permissions and API operation details for Interim Software Updates 7-403
xxiv
Permissions and API operation details for Scheduling Policies 7-403
Permissions and API operation details for Scheduling Windows 7-404
Permissions and API operation details for Scheduling Plan 7-404
Permissions and API operation details for Scheduled Action 7-406
Permissions and API operation details for Execution Windows 7-407
Permissions and API operation details for Execution Action 7-409
Permissions and API operation details for Data Guard group 7-410
Permissions Required for Each API Operation 7-411
Managing Exadata Resources with Oracle Enterprise Manager Cloud Control 7-419
Overview of Oracle Enterprise Manager Cloud Control 7-419
Features of Enterprise Manager Cloud Control 7-419
Observability and Management for Oracle Exadata Database Service on Cloud@Customer 7-420
Security Guide for Oracle Exadata Database Service on Cloud@Customer Systems 7-421
Security Configurations and Default Enabled Features 7-421
Responsibilities 7-421
Guiding Principles Followed for Security Configuration Defaults 7-422
Security Features 7-423
Guest VM Default Fixed Users 7-424
Guest VM Default Fixed Groups 7-426
Guest VM Default Security Settings 7-428
Guest VM Default Processes 7-429
Guest VM Network Security 7-430
Additional Procedures for Updating Security Posture 7-432
Customer Responsibilities 7-432
Enabling Additional Security Capabilities 7-433
Troubleshooting Oracle Exadata Database Service on Cloud@Customer Systems 7-437
Patching Failures on Oracle Exadata Database Service on Cloud@Customer Systems 7-438
Determining the Problem 7-438
Troubleshooting and Diagnosis 7-438
Obtaining Further Assistance 7-440
Collecting Cloud Tooling Logs 7-440
Collecting Oracle Diagnostics 7-440
VM Operating System Update Hangs During Database Connection Drain 7-440
Adding a VM to a VM Cluster Fails 7-442
Nodelist is not Updated for Data Guard-Enabled Databases 7-443
CPU Offline Scaling Fails 7-443
Standby Database Fails to Restart After Switchover in Oracle Database 11g Oracle Data
Guard Setup 7-444
Using Custom SCAN Listener Port With Data Guard On Disaster Recovery Network
Causes Data Guard Association Verification Failures 7-444
PDB Creation Fails After Moving Database to a New DB Home (23ai) 7-444
xxv
Intermittent Failure in PDB Creation When Multiple PDBs are Getting Created in Parallel 7-445
xxvi
1
Oracle Exadata Database Service on
Cloud@Customer Overview
This topic is an overview of the Oracle Exadata Database Service on Cloud@Customer
service.
• Oracle Exadata Database Service on Cloud@Customer Service Description
Learn how you can leverage the combined capabilities of Oracle Exadata and Oracle
Cloud Infrastructure with Oracle Exadata Database Service on Cloud@Customer
• Exadata Cloud Management Interfaces
Oracle Exadata Database Service on Cloud@Customer provides a variety of management
interfaces to fit your use case and automation needs.
• Exadata Cloud@Customer Technical Architecture
Note:
For information related to the ADB-D service on Exadata Cloud@Customer please
refer to Autonomous Database on Exadata Cloud@Customer.
1-1
Chapter 1
Oracle Exadata Database Service on Cloud@Customer Service Description
Related Topics
• Autonomous Database on Exadata Cloud@Customer
Note:
For more information on technical architecture, see Oracle Exadata
Cloud@Customer (ExaC@C) Technical Architecture.
With Oracle Exadata Database Service on Cloud@Customer, you can maintain absolute
control over your data while leveraging the combined capabilities of Oracle Exadata and
Oracle Cloud Infrastructure managed by Oracle.
Oracle Exadata Database Service on Cloud@Customer enables you to apply the combined
power of Oracle Exadata and Oracle Cloud Infrastructure inside your own data center. You
have full access to the features and capabilities of Oracle Database along with the intelligent
performance and scalability of Oracle Exadata, but with Oracle owning and managing the
Exadata infrastructure. You can use the Oracle Cloud Infrastructure console and APIs to
manage Oracle Exadata Database Service on Cloud@Customer just as with any other cloud
resource, while maintaining absolute sovereignty over your data.
Each Oracle Exadata Database Service on Cloud@Customer system configuration contains
Oracle Exadata Database Servers and Oracle Exadata Storage Servers that are
interconnected using a high-speed, low-latency RDMA fabric network, and intelligent Oracle
Exadata software.
Oracle Exadata Database Service on Cloud@Customer uses virtual machine (VM) technology
to separate the customer-managed and Oracle-managed components on each database
server. You have root privilege for the Oracle Exadata database server VMs, so you can
manage the Oracle Database, Oracle Grid Infrastructure, and Oracle Exadata system
software. However, you do not have administrative access to the physical database server
hardware, which Oracle administers.
Oracle Exadata Database Service on Cloud@Customer uses Oracle Exadata Storage Servers
for database storage. The storage is allocated to disk groups managed by Oracle Automatic
Storage Management (Oracle ASM). You have full administrative access to the Oracle ASM
disk groups, but Oracle administers the Oracle Exadata Storage Server hardware and
software.
In addition to the database server hardware and Oracle Exadata Storage Servers, Oracle also
manages other Oracle Exadata Database Service on Cloud@Customer infrastructure
components, including the network switches, power distribution units (PDUs), and integrated
lights-out management (ILOM) interfaces.
On each Oracle Exadata Database Service on Cloud@Customer system, you can create one
or more databases. Apart from the inherent storage and processing capacity of your Oracle
Exadata system, there is no set maximum for the number of databases that you can create.
1-2
Chapter 1
Oracle Exadata Database Service on Cloud@Customer Service Description
Related Topics
• Overview of the Database Service
• Oracle Exadata Cloud@Customer (ExaC@C) Technical Architecture
Note:
Oracle doesn't stop billing when a VM or VM Cluster is stopped. To stop billing for a
VM Cluster, lower the OCPU count to zero.
1-3
Chapter 1
Oracle Exadata Database Service on Cloud@Customer Service Description
1-4
Chapter 1
Oracle Exadata Database Service on Cloud@Customer Service Description
A maximum of 12 VM Clusters can be created on a single system with 2 database servers and
a maximum of 24 VM Clusters can be created on a system that contains greater than 2 DB
servers. The maximum number of VM Clusters for systems containing Base database servers
is 4 regardless of the number of database servers in the system.
For more information, see Estimating How Much Local Storage You Can Provision to Your VMs
and Scaling Local Storage.
1-5
Chapter 1
Oracle Exadata Database Service on Cloud@Customer Service Description
• A single DB server contains 190 usable cores with a choice of X10M (1390 GB), X10M-L
(2090 GB), or X10M-XL (2800 GB) memory.
• A single storage server contains 80 TB of usable disk storage capacity.
Base System contains 2 base DB servers and 3 base storage servers. It can be expanded in a
single rack up to a total of 16 servers.
• A single base DB server contains 30 usable cores and 660 GB memory.
• A single base storage server contains 35.6 TB of usable disk storage capacity.
A maximum of 24 VM Clusters can be created on a single X10M system that contains greater
than 2 DB servers. For more information, see Estimating How Much Local Storage You Can
Provision On Your VMs and Scaling Local Storage.
1-6
Chapter 1
Oracle Exadata Database Service on Cloud@Customer Service Description
For more information, see Estimating How Much Local Storage You Can Provision On Your
VMs and Scaling Local Storage.
1-7
Chapter 1
Oracle Exadata Database Service on Cloud@Customer Service Description
• A single base storage server contains 24.6 TB of usable disk storage capacity.
For more information, see Estimating How Much Local Storage You Can Provision On Your
VMs and Scaling Local Storage.
1-8
Chapter 1
Oracle Exadata Database Service on Cloud@Customer Service Description
For more information, see Estimating How Much Local Storage You Can Provision On Your
VMs and Scaling Local Storage.
1-9
Chapter 1
Exadata Cloud Management Interfaces
For more information, see Estimating How Much Local Storage You Can Provision On Your
VMs and Scaling Local Storage.
1-10
Chapter 1
Exadata Cloud Management Interfaces
Note:
For more information and best practices on how these interfaces align for various
Exadata Cloud database management use cases, refer to My Oracle Support note:
Exadata Cloud API/CLI Alignment Matrix (Doc ID 2768569.1).
Related Topics
• Using the Console
• https://support.oracle.com/epmos/faces/DocContentDisplay?id=2768569.1
1-11
Chapter 1
Exadata Cloud Management Interfaces
1-12
Chapter 1
Exadata Cloud Management Interfaces
The cloud tooling software on the virtual machines, containing these CLI utilities, is
automatically updated by Oracle on a regular basis. If needed, the tooling can be updated
manually by following the instructions in Updating Cloud Tooling Using dbaascli.
Related Topics
• About Using the dbaascli Utility on Oracle Exadata Database Service on Cloud@Customer
You can use the dbaascli utility to perform various database lifecycle and administration
operations on Oracle Exadata Database Service on Cloud@Customer such as creating an
Oracle Database, patching an Oracle Database, managing pluggable databases (PDBs),
scaling the CPU core count in disconnected mode, and more.
• Creating an On-Demand Backup by Using dbaascli
You can use the dbaascli to create an on-demand backup of a complete database or an
individual pluggable database (PDB):
• Customizing Backup Settings by Using a Generated Configuration File
You can customize backup settings for a database deployment by generating a file
containing the current customizable settings, editing the file, and then using the file to
update the backup settings.
1-13
Chapter 1
Exadata Cloud@Customer Technical Architecture
1-14
2
What’s New in Oracle Exadata Database
Service on Cloud@Customer
Oracle is constantly adding new capabilities to Oracle Exadata Database Service on
Cloud@Customer. This section provides a brief overview of new features as they are released.
Note:
For information on new features for Autonomous Database on Oracle Exadata
Cloud@Customer see What’s New in ADB-D on Oracle Exadata Cloud@Customer
2-1
Chapter 2
2-2
Chapter 2
Concurrently Create or Delete Pluggable Databases (PDBs)
2-3
Chapter 2
Multiple Standby Databases
Note:
You cannot change the VM cluster type after deploying the VM cluster. If you wish to
change the VM cluster type, you must create a new VM cluster and migrate the
database to the new cluster.
Related Topics
• Using the Console to Create an ASM VM Cluster
To create your ASM VM cluster, be prepared to provide values for the fields required for
configuring the infrastructure.
• Using the Console to Create an Exascale VM Cluster
To create your Exascale VM cluster, be prepared to provide values for the fields required
for configuring the infrastructure.
2-4
Chapter 2
Key Management Using an External Keystore
This enhancement provides the ability to create and manage multiple local and remote standby
databases linked to a primary database, providing flexibility for both data protection and
disaster recovery. Local standby databases help minimize data loss, while remote standby
databases safeguard against regional failures. This enhancement allows creation of up to 6
standby databases for a primary database.
In a typical Data Guard configuration, two standby databases are commonly used:
• Local Standby: A standby database in the same region as the production database is
ideal for failover scenarios, offering zero data loss for local failures (such as database,
cluster, or availability domain failures). Application failover impact is reduced in this case,
as applications continue operating without the performance overhead of communicating
with a remote region.
• Remote (Cross-Region) Standby: A remote standby database, located in a different
region, is typically used for disaster recovery or to offload read-only query processing. A
remote standby database setup ensures data protection against regional failures.
Some enterprise customers aim for symmetry after a site switch. For example, they may prefer
to have both the primary and local standby in Region 1, and a remote standby with its own
local standby in Region 2. In this configuration, there will be three standby databases. After a
site switch, you will still have a primary database and a local standby readily available in the
new primary region.
Additionally, customers can enhance their configurations by adding another standby database
for testing purposes, leveraging our snapshot (read/write) standby capabilities.
Note:
Creating a standby database associated with another standby database ("cascading
standby") is not supported.
Related Topics
• Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
Learn to configure and manage Data Guard groups in your VM cluster.
• Using the API to Manage Data Guard group on an Oracle Exadata Database Service on
Cloud@Customer System
Learn how to use the API to manage Data Guard group on an Oracle Exadata Database
Service on Cloud@Customer system.
• Permissions and API operation details for Data Guard group
• Data Guard Event Types
Review the list of event types that Data Gurad groups and Data Guard Associations emit.
2-5
Chapter 2
X11M System Support
Related Topics
• Manage Keys Using an External Keystore
Review the use cases and implementation details of an external keystore.
• Using the Console to Create a Database
To create an Oracle Database with the console, use this procedure.
• Using the Console to Migrate Encryption Keys from Oracle Wallet to Other Encryption
Methods (Oracle Key Vault, External Keystore)
Learn to migrate encryption keys between different encryption methods.
• Using the Console to Rotate Encryption Keys
Learn how to rotate encryption keys. Note that key rotation is only available for databases
that do not use Oracle Wallet as the encryption method.
Note:
This feature is rolled out only to the MTY, BOG, HYD, DXB, YUL, KIX, SYD, ZRH, AMS, MEL,
SCL, YNY, VCP, CWL, SJC, MRS, ARN, MTZ, AUH, LIN, SIN, JNB, ORD, CDG, QRO, MAD, AGA, VAP,
XSP, RUH, LHR, NRT, BOM, JED, ICN, PHX, IAD, FRA, YYZ, and GRU regions. It will be rolled
out to other regions in phases.
Oracle Exadata Cloud@Customer has been extended to support Exadata Infrastructure X11M.
Related Topics
• System Configuration Options for Oracle Exadata Database Service on Cloud@Customer
Oracle Exadata Database Service on Cloud@Customer is now shipping with the latest
generation Exadata infrastructure, Exadata X11M.
• Oracle Exadata X11M System Model Specifications
Review the technical specifications of X11M system model.
• Scaling Up or Scaling Down the VM Cluster Resources
You can scale up or scale down the memory, local disk size (/u02), ASM Storage, and
CPUs (ECPUs for X11M).
• Estimating How Much Local Storage You Can Provision On Your VMs
• Overview of Elastic Storage Expansion
With elastic storage expansion, you can dynamically increase your storage capacity to
meet your growing workload requirements.
• Using the Console to Create Oracle Exadata Database Service on Cloud@Customer
Infrastructure
To create your Oracle Exadata Database Service on Cloud@Customer infrastructure, be
prepared to provide values for the fields required for configuring the infrastructure.
• Using the Console to Scale Infrastructure Compute and Storage
To scale infrastructure compute and storage, complete this procedure.
2-6
Chapter 2
Exadata Exascale with Exadata Database Service on Cloud@Customer
2-7
Chapter 2
Microsoft Entra ID (MS-EI) Integration with Oracle Exadata Database Service on Cloud@Customer
and testing while drastically reducing the overall storage requirement and associated
costs.
• Powerful: Exascale seamlessly integrates with development, test, and deployment
pipelines, accelerating production applications on Exascale while leveraging Exadata
optimizations that deliver extreme performance, reliability, availability, and security. This
strengthens Exadata's mission to be the ideal platform for running all Oracle database
workloads.
For more information about Oracle Exadata Exascale, see the Oracle® Exadata Exascale
User's Guide.
Related Topics
• Storage Configuration Requirements for Oracle Exadata Database Service on
Cloud@Customer
With the introduction of Exascale technology in Exadata Database Service on
Cloud@Customer, you can configure the Exadata infrastructure to use ASM, Exascale, or
a combination of both. When configured to coexist with ASM, you must allocate Exascale
storage capacity from the total Exadata storage available on the Infrastructure. The
allocated storage capacity will be solely available for Exascale use.
• Using the Console to Create an ASM VM Cluster
To create your ASM VM cluster, be prepared to provide values for the fields required for
configuring the infrastructure.
• Using the Console to Create an Exascale VM Cluster
To create your Exascale VM cluster, be prepared to provide values for the fields required
for configuring the infrastructure.
• Using the Console to Create a Database
To create an Oracle Database with the console, use this procedure.
• Clone a Pluggable Database (PDB)
A clone is an independent and complete copy of the given database as it existed at the
time of the cloning operation. You can create clones of your PDB within the same CDB or a
different CDB and also refresh the cloned PDB.
• Resource-Types for Oracle Exadata Database Service on Cloud@Customer
Review the list of resource-types specific to Oracle Exadata Database Service on
Cloud@Customer.
• Permissions and API operation details for Exadata Infrastructures
• Permissions and API operation details for exascale-db-storage-vaults
• Exadata Infrastructure Event Types
Review the list of event types that Exadata Infrastructure instances emit.
• Exascale DB Storage Vaults Event Types
Review the list of event types that exascale-db-storage-vaults emit.
2-8
Chapter 2
Support for Concurrent Data Guard, Container Database (CDB), and Pluggable Database (PDB) Operations
Oracle Exadata Database Service on Cloud@Customer now can accept Microsoft Entra ID
(MS-EI) tokens to access the database. Azure users and applications can use the MS-EI token
to access the database.
MS-EI integration will be available for databases patched to 19.17 and above. This feature is
not available on Oracle Database release 21c.
For information on configuring MS-EI, configuring the database, and configuring the database
client, see:
• Authenticating and Authorizing Microsoft Azure Active Directory Users for Oracle
Databases in the Oracle Database 19c Security Guide.
• Authenticating and Authorizing Microsoft Azure Users for Oracle Databases in the Oracle
Database 23ai Security Guide.
Related Topics
• Authenticating and Authorizing Microsoft Entra ID (MS-EI) Users for Oracle Databases on
Oracle Exadata Database Service on Cloud@Customer
An Oracle Database can be configured for Microsoft Azure users of Microsoft Entra ID to
connect using single sign-on authentication.
2-9
Chapter 2
Delegate Access Control for ExaDB-C@C
2-10
Chapter 2
Different RUs for Primary and Standby DB Homes in Data Guard Associations, Switchover, and Failover Operations
2-11
Chapter 2
Granular Permissions for VM Cluster Update Operations
Related Topics
• Using the Console to Enable Data Guard on an Oracle Exadata Database Service on
Cloud@Customer System
Learn to set up a Data Guard group between databases.
• Using the Console To Perform a Database Switchover
You can initiate a switchover operation on a standby database that is a member of the
Data Guard group.
• Using the Console To Perform a Database Failover
You can initiate a failover operation on a standby database that is a member of the Data
Guard group.
2-12
Chapter 2
Enable Unified Auditing While Creating a Database Home
Note:
You cannot disable Unified Auditing after provisioning the Database Home
Related Topics
• Using the Console to Create Oracle Database Home on Oracle Exadata Database Service
on Cloud@Customer
To create an Oracle Database home in an existing VM cluster with the Console, be
prepared to provide values for the fields required.
2-13
Chapter 2
Enhancements to Oracle Key Vault (OKV) Integration with ExaDB-C@C to Manage Transparent Data Encryption (TDE) Keys
Note:
For X8M and later, a rolling restart is not required when expanding any of the Guest
VM file systems. However, a rolling restart of each VM is required when the size
of /u02 is reduced.
Related Topics
• Estimating How Much Local Storage You Can Provision On Your VMs
• Scaling Local Storage
• Using the Console to Create an ASM VM Cluster
To create your ASM VM cluster, be prepared to provide values for the fields required for
configuring the infrastructure.
• Using the Console to Scale the Resources on a VM Cluster
Starting in Oracle Exadata Database Service on Cloud@Customer, you can scale up or
down multiple resources at the same time. You can also scale up or down resources one
at a time.
• Oracle Exadata X10M System Model Specifications
Review the technical specifications of X10M system model.
• Oracle Exadata X9M-2 System Model Specifications
Review the technical specifications of available Exadata System Shapes.
2-14
Chapter 2
Create and Use Custom Software Images
2-15
Chapter 2
Change the Home Region of ExaDB-C@C Infrastructure
Note:
Changing the home region of your ExaDB-C@C Infrastructure will not affect billing.
Related Topics
• About Changing the Home Region of Oracle Exadata Database Service on
Cloud@Customer Infrastructure
2-16
Chapter 2
Provision a VM Cluster with Either an OL7 or OL8-Based Image
Note:
• You cannot concurrently connect to more than one DB node using Cloud Shell.
As an example, if you have an open connection to DBnode1 and want to connect
to DBnode2, you must first exit the active Cloud Shell from DBnode1 and then
establish a connection to DBnode2.
• Cloud Shell access to the serial console require proper IAM permissions for
Cloud Shell, see OCI Cloud Shell documentation for details. Also, to access the
serial console and to use console history, firewall rules must be configured so
that the Control Plane Server (CPS) can access the necessary OCI endpoints.
Please review Table 3-2 details for Object Storage and VM console connectivity
requirements.
Related Topics
• Using Cloud Shell to Connect to the Serial Console
• Displaying the Console History for a Virtual Machine
• Permissions Required for Each API Operation
Review the list of API operations for Oracle Exadata Database Service on
Cloud@Customer resources in a logical order, grouped by resource type.
• Serial Console History Event Types
Review the list of new event types that serial console history emits.
• Resource-Types for Oracle Exadata Database Service on Cloud@Customer
Review the list of resource-types specific to Oracle Exadata Database Service on
Cloud@Customer.
• Permissions and API operation details for DB Node Console History
VM Cluster on a Single VM
• Services: Database
• Release Date: October 24, 2023
With this enhancement, you can deploy and run multiple databases in a VM cluster running on
a single VM without requiring RAC licenses.
2-17
Chapter 2
Enhancement to Pluggable Database (PDB) Management
Related Topics
• Manage VM Clusters
Learn how to manage your VM clusters on Oracle Exadata Database Service on
Cloud@Customer.
Note:
Changing a TDE wallet password for Oracle Key Vault (OKV) or OCI Vault Key
management-enabled databases is currently not supported.
Related Topics
• Using the Console to Manage SYS User and TDE Wallet Passwords
Learn to manage administrator (SYS user) and TDE wallet passwords.
2-18
Chapter 2
Exadata Fleet Update
Related Topics
• Updating Guest VM Operating System
Learn to update the operating system image on Oracle Exadata Database Service on
Cloud@Customer VM cluster nodes in an automated manner from the OCI console and
APIs.
• Supported Software Versions and Update Restrictions
Minimum requirements for updating to Exadata image release 23.1.0.0.0 (Oracle Linux 8-
based image):
• Using the Console to Update Guest VM Operating System
To update the guest VM operating system with the Console, be prepared to provide values
for the fields required.
• Using the Console to Add VMs to a Provisioned Cluster
To add virtual machines to a provisioned cluster, use this procedure.
2-19
Chapter 2
X10M System Support
2-20
Chapter 2
Interim Software Updates
Note:
The following two endpoints have been added for the Control Plane Server (CPS).
Use these URL formats, replacing oci_region with your region.
• console1.exacc.oci_region.oci.oraclecloud.com
• console2.exacc.oci_region.oci.oraclecloud.com
These must be allowed at your firewall in order for serial console connections to function. See
Network Requirements for Oracle Exadata Database Service on Cloud@Customer Table 3-2
for further details.
Related Topics
• Network Requirements for Oracle Exadata Database Service on Cloud@Customer
To provide secure and reliable network connectivity for different application and
management functions, Exadata Database Service on Cloud@Customer uses different
networks.
• Troubleshooting Virtual Machines Using Console Connections
You can troubleshoot malfunctioning virtual machines using console connections. For
example, a previously working Guest VM stops responding.
• Create the Virtual Machine Serial Console Connection
• Resource-Types for Oracle Exadata Database Service on Cloud@Customer
Review the list of resource-types specific to Oracle Exadata Database Service on
Cloud@Customer.
• Permissions and API operation details for DB Nodes
• Permissions Required for Each API Operation
Review the list of API operations for Oracle Exadata Database Service on
Cloud@Customer resources in a logical order, grouped by resource type.
• Permissions and API operation details for DB Node Console Connection
• Serial Console Connection Event Types
Review the list of event types that serial console connection emits.
• Viewing Audit Log Events
Oracle Cloud Infrastructure Audit service provides records of API operations performed
against supported services as a list of log events.
2-21
Chapter 2
Link Aggregation Control Protocol (LACP) Support for Client and Backup Networks
Downloading one-off patches does not replace Database Software Image (DSI) creation.
Customers must continue to use Database Software Images (DSI) to build and deploy their
customized images.
Related Topics
• Interim Software Updates
For authorized environments, learn how to download interim software updates.
• Permissions Required for Each API Operation
Review the list of API operations for Oracle Exadata Database Service on
Cloud@Customer resources in a logical order, grouped by resource type.
• Permissions and API operation details for Interim Software Updates
• Interim Software Updates Event Types
Note that the BONDING_OPTS line in the host operating system cannot be changed, so customer
switch settings must be compatible with the parameters stated above without alteration.
2-22
Chapter 2
VM Cluster and Database Health and Performance Metrics in the OCI Console
Related Topics
• Using the Console to Create Oracle Exadata Database Service on Cloud@Customer
Infrastructure
To create your Oracle Exadata Database Service on Cloud@Customer infrastructure, be
prepared to provide values for the fields required for configuring the infrastructure.
• Using the Console to Edit Network Bonding
To edit the client and backup network bonding mode, follow these steps.
Note:
When there is a network problem and Oracle Trace File Analyzer (TFA) is unable to
post metrics, TFA will wait for one hour before attempting to retry posting the metrics.
This is required to avoid creating a backlog of metrics processing on TFA.
Potentially one hour of metrics will be lost between network restore and the first
metric posted.
Related Topics
• Monitor Metrics for VM Cluster Resources
You can monitor the health, capacity, and performance of your VM clusters and databases
with metrics, alarms, and notifications. You can use Oracle Cloud Infrastructure Console,
Monitoring APIs, or Database Management APIs to view metrics.
• Metrics for Oracle Exadata Database Service on Cloud@Customer in the Monitoring
Service
Review the metrics emitted by the Oracle Exadata Database Service on Cloud@Customer
service in the oci_database_cluster and oci_database namespaces for Oracle
Databases.
2-23
Chapter 2
Use Identity and Access Management (IAM) Authentication with Oracle Exadata Database Service on Cloud@Customer
• You can change the automatically selected primary DSI to a different DSI for the standby
database.
• If the DSI used to create the primary database is not available, then enabling Data Guard
will use the latest Oracle-published image. Optionally, you can configure the standby
database to have a DSI of your choice.
In both cases, the system will warn you of potential issues with having different images for the
primary and standby databases.
Related Topics
• Using the Console to Enable Data Guard on an Oracle Exadata Database Service on
Cloud@Customer System
Learn to set up a Data Guard group between databases.
Note:
Oracle Exadata Database Service on Cloud@Customer integration with OCI IAM is
supported in commercial tenancies with identity domains as well as the legacy OCI
IAM, which does not include identity domains. OCI IAM with identity domains was
introduced with new OCI tenancies created after November 8, 2021. Only default
domain OCI IAM users are supported with the new identity domains.
Related Topics
• Connect to an Oracle Database using Oracle Cloud Infrastructure (OCI) Identity and
Access Management (IAM) Users
You can configure Oracle Exadata Database Service on Cloud@Customer to use Oracle
Cloud Infrastructure Identity and Access Management (IAM) authentication and
authorization to allow IAM users to access an Oracle Database with IAM credentials.
2-24
Chapter 2
Multi-Rack Elastic Compute and Storage Expansion
Note:
Active Data Guard or Data Guard associations can only be created for Transparent
Data Encryption (TDE) enabled databases, not for Oracle Key Vault (OKV) enabled
databases.
Related Topics
• Using the Console to Enable Data Guard on an Oracle Exadata Database Service on
Cloud@Customer System
Learn to set up a Data Guard group between databases.
2-25
Chapter 2
Multi-Rack Elastic Compute and Storage Expansion
2-26
Chapter 2
Automatic Diagnostic Collection
• Using the Console to Make Storage Capacity from New Server Available for VM Clusters
Consumption
To make storage capacity from the new servers for VM clusters consumption, complete
this procedure.
• Using the Console to View Details of Oracle Exadata Database Service on
Cloud@Customer Infrastructure with Scaled Compute and Storage Capacity
To view the storage capacity from the new storage server, or scaled compute capacity, use
this procedure.
• Compute Expansion Event Types
Review the list of event types that compute expansion emits.
2-27
Chapter 2
Elastic Compute Expansion
2-28
Chapter 2
Oracle Standard Tagging for Resources on Oracle Exadata Database Service on Cloud@Customer
2-29
Chapter 2
Monthly ExaDB-C@C Infrastructure Security Maintenance
Related Topics
• View the Maintenance History
Learn how to view the maintenance history for an Oracle Exadata Database Service on
Cloud@Customer Infrastructure.
2-30
Chapter 2
Concurrently Create or Terminate Oracle Databases in a VM Cluster
• Services: Database
• Release Date: July 27, 2022
You need not mandatorily roll back if applying the Guest VM operating system update fails. A
new option, in addition to the current rollback option, has been added to retry and apply the
failed update. If you want to apply a different operating system image update on failure, then
you will have to first roll back and then apply.
Related Topics
• Using the Console to Rollback or Retry Failed Guest VM Operating System Update
To update the guest VM operating system with the Console, be prepared to provide values
for the fields required.
2-31
Chapter 2
VM Guest Exadata OS Image Major Version Update
For the Oracle Database major version releases available in Oracle Cloud Infrastructure,
images are provided for the current version plus the three most recent older versions (N
through N - 3). For example, if an instance is using Oracle Database 19c, and the latest
version of 19c offered is 19.8.0.0.0, images available for provisioning are for versions
19.8.0.0.0, 19.7.0.0, 19.6.0.0 and 19.5.0.0.
Related Topics
• Using the Console to Create a Database
To create an Oracle Database with the console, use this procedure.
• Using the Console to Create Oracle Database Home on Oracle Exadata Database Service
on Cloud@Customer
To create an Oracle Database home in an existing VM cluster with the Console, be
prepared to provide values for the fields required.
2-32
Chapter 2
Control Plane Server (CPS) Offline Diagnostic Report
Note:
• You cannot enable or disable Control Plane Server (CPS) Offline Diagnostic
Report if the Exadata Infrastructure is in DISCONNECTED mode.
• Every hour, even if no issues are detected on the CPS, the system will still
generate and save a diagnostic report in HTML and JSON formats. Whenever a
connectivity issue arises between CPS and OCI endpoints, the system generates
a report immediately.
• At any given point in time, the report is available only at the primary Control
Plane Server. When generating a report, if the first IP address specified for the
Control Plane Servers does not work, then you may try the second IP.
For more information, see ExaCC gen2: Troubleshooting VPN/WSS connection from Customer
Side (Doc ID 2745571.1).
2-33
Chapter 2
Enhanced Infrastructure Maintenance Controls
Related Topics
• Using the Console to Create Oracle Exadata Database Service on Cloud@Customer
Infrastructure
To create your Oracle Exadata Database Service on Cloud@Customer infrastructure, be
prepared to provide values for the fields required for configuring the infrastructure.
• Enabling or Disabling the Control Plane Server Diagnostic Offline Report
To enable or disable CPS offline report, use this procedure.
• Using the Console to View Exadata Infrastructure Network Configuration Details
To view network configuration details, follow these steps. Save this information for later use
to troubleshoot if you face network issues.
• ExaCC gen2: Troubleshooting VPN/WSS connection from Customer Side (Doc ID
2745571.1)
2-34
Chapter 2
Manage Pluggable Databases on Exadata Cloud@Customer
these infrastructure updates, Oracle alerts you in advance through the Cloud Notification
Portal and allows scheduling flexibility to help you plan for them.
• Exadata Infrastructure Maintenance Event Types
Review the list of event types that Exadata Infrastructure Maintenance emits.
2-35
Chapter 2
Specify db_unique_name and SID for Primary and Standby Databases in Data Guard Association
Note:
VM Cluster Node Subsetting feature is now available in all OCI commercial regions.
VM Cluster Node Subsetting enables you to allocate a subset of database servers to new and
existing VM clusters to enable maximum flexibility in the allocation of compute (CPU, memory,
local storage) resources.
Related Topics
• Overview of VM Cluster Node Subsetting
VM Cluster Node Subsetting enables you to allocate a subset of database servers to new
and existing VM clusters to enable maximum flexibility in the allocation of compute (CPU,
memory, local storage) resources.
• Using the Console to Create an ASM VM Cluster
To create your ASM VM cluster, be prepared to provide values for the fields required for
configuring the infrastructure.
• Using the Console to Add VMs to a Provisioned Cluster
To add virtual machines to a provisioned cluster, use this procedure.
• Using the Console to View a List of DB Servers on an Exadata Infrastructure
To view a list of database server hosts on an Oracle Exadata Cloud@Customer system,
use this procedure.
2-36
Chapter 2
X9M-2 System Support
2-37
Chapter 2
Creating DG Association/Standby Database Using Existing Database Home
Related Topics
• Using the Console to Create a VM Cluster Network
To create your VM cluster network with the Console, be prepared to provide values for the
fields required for configuring the infrastructure.
• Using the Console to View SCAN Listener Port Configured
You can only edit a VM cluster network that is not associated with a VM cluster.
2-38
Chapter 2
Upgrading Oracle Databases
Related Topics
• Updating Guest VM Operating System
Learn to update the operating system image on Oracle Exadata Database Service on
Cloud@Customer VM cluster nodes in an automated manner from the OCI console and
APIs.
2-39
Chapter 2
Oracle Database Software Images
• Using the Console to View Details of Exadata Cloud@Customer Infrastructure with Scaled
Storage Capacity
• Permissions Required for Each API Operation
• exadata-infrastructures
• Storage Expansion Event Types
Related Topics
• Overview of Elastic Storage Expansion
With elastic storage expansion, you can dynamically increase your storage capacity to
meet your growing workload requirements.
• Using the Console to Scale Infrastructure Compute and Storage
To scale infrastructure compute and storage, complete this procedure.
• Using the Console to Download Scale Infrastructure Compute and Storage Configuration
File
To download an Oracle Exadata Cloud@Customer scale configuration file, complete this
procedure.
• Using the Console to Activate New Database and Storage Servers
To download an Oracle Exadata Cloud@Customer scale configuration file, complete this
procedure.
• Using the Console to Make Storage Capacity from New Server Available for VM Clusters
Consumption
To make storage capacity from the new servers for VM clusters consumption, complete
this procedure.
• Using the Console to View Details of Oracle Exadata Database Service on
Cloud@Customer Infrastructure with Scaled Compute and Storage Capacity
To view the storage capacity from the new storage server, or scaled compute capacity, use
this procedure.
• Permissions Required for Each API Operation
Review the list of API operations for Oracle Exadata Database Service on
Cloud@Customer resources in a logical order, grouped by resource type.
• Permissions and API operation details for Exadata Infrastructures
• Storage Expansion Event Types
Review the list of event types that storage expansion emits.
2-40
Chapter 2
Exadata Cloud@Customer Infrastructure Patching Automation
• Using the Console to Create Oracle Database Home on Oracle Exadata Database Service
on Cloud@Customer
To create an Oracle Database home in an existing VM cluster with the Console, be
prepared to provide values for the fields required.
• Using the Console to Perform Update Operation on a Database Home
Learn to apply patches on a Database Home.
2-41
Chapter 2
Enable and Manage Data Guard Associations
2-42
Chapter 2
Oracle Exadata Cloud@Customer Deployment Assistant
2-43
Chapter 2
Shared Database Home Resource Tags
2-44
Chapter 2
Configure Oracle Database Character Set and National Character Set
• Services: Database
• Release Date: June 13, 2020
Oracle Exadata Database Service on Cloud@Customer is considered to be in a
"disconnected" mode when there is a loss of connectivity with the Database service control
plane running on Oracle Cloud Infrastructure. Scale the CPU core count up or down for a
virtual machine in a VM cluster in disconnected mode.
For information and instructions, see:
• About Using the dbaascli Utility on Exadata Cloud@Customer
• dbaascli cpuscale get_status
• dbaascli cpuscale update
• Exadata Infrastructure Event Types
Related Topics
• About Using the dbaascli Utility on Oracle Exadata Database Service on Cloud@Customer
You can use the dbaascli utility to perform various database lifecycle and administration
operations on Oracle Exadata Database Service on Cloud@Customer such as creating an
Oracle Database, patching an Oracle Database, managing pluggable databases (PDBs),
scaling the CPU core count in disconnected mode, and more.
• dbaascli cpuscale get_status
To check the status of current or last scale request performed when network connectivity
between the Control Plane Server and OCI region is disrupted, use the dbaascli
cpuscale get_status command.
• dbaascli cpuscale update
To scale up or down the CPU core count for a virtual machine in a VM cluster when
network connectivity between the Control Plane Server and OCI region is disrupted, use
the dbaascli cpuscale update command.
• Exadata Infrastructure Event Types
Review the list of event types that Exadata Infrastructure instances emit.
2-45
Chapter 2
Specify a Time Zone While Provisioning Oracle Exadata Database Service on Cloud@Customer Infrastructure
2-46
Chapter 2
X7-2 System Support
Related Topics
• Create Oracle Database Homes on an Oracle Exadata Database Service on
Cloud@Customer System
Learn to create Oracle Database Homes on Oracle Exadata Database Service on
Cloud@Customer.
2-47
3
Preparing for Oracle Exadata Database
Service on Cloud@Customer
Review OCI as well as the site, network and storage requirements to prepare and deploy
Oracle Exadata Database Service on Cloud@Customer in your data center.
• Oracle Cloud Infrastructure (OCI) Requirements for Oracle Exadata Database Service on
Cloud@Customer
Learn the basic concepts to get started using Oracle Cloud Infrastructure.
• Site Requirements for Oracle Exadata Database Service on Cloud@Customer
Review the requirements for provisioning Oracle Exadata Database Service on
Cloud@Customer at your site.
• Network Requirements for Oracle Exadata Database Service on Cloud@Customer
Review the network requirements for provisioning Oracle Exadata Database Service on
Cloud@Customer at your site.
• Storage Configuration Requirements for Oracle Exadata Database Service on
Cloud@Customer
With the introduction of Exascale technology in Exadata Database Service on
Cloud@Customer, you can configure the Exadata infrastructure to use ASM, Exascale, or
a combination of both. When configured to coexist with ASM, you must allocate Exascale
storage capacity from the total Exadata storage available on the Infrastructure. The
allocated storage capacity will be solely available for Exascale use.
• Checklists for Oracle Exadata Database Service on Cloud@Customer Deployments
To determine your readiness for an Oracle Exadata Database Service on
Cloud@Customer deployment, review the deployment checklists.
3-1
Chapter 3
Oracle Cloud Infrastructure (OCI) Requirements for Oracle Exadata Database Service on Cloud@Customer
After Oracle creates your tenancy in OCI, an administrator at your company will need to
perform some set up tasks and establish an organization plan for your cloud resources and
users. The information in this topic will help you get started.
• Managing Regions
This topic describes the basics of managing your region subscriptions.
• Managing Compartments
This topic describes the basics of working with compartments.
• Managing Users
This topic describes the basics of working with users.
• Managing Groups
This topic describes the basics of working with groups.
• Required IAM Policy for Oracle Exadata Database Service on Cloud@Customer
Review the identity access management (IAM) policy for provisioning Oracle Exadata
Database Service on Cloud@Customer systems.
Related Topics
• OCI Getting Started Guide
• Setting Up Your Tenancy
• Managing Regions
• Managing Compartments
• Managing Users
• Managing Groups
3-2
Chapter 3
Site Requirements for Oracle Exadata Database Service on Cloud@Customer
If you're new to policies, then see "Getting Started with Policies" and "Common Policies". If you
want to dig deeper into writing policies for databases, then see "Details for the Database
Service".
For more details on writing policies specific to Exadata Cloud@Customer resources see
"Policy Details for Exadata Cloud@Customer".
Related Topics
• Let database admins manage DB systems
• Getting Started with Policies
• Common Policies
• Details for the Database Service
• Policy Details for Oracle Exadata Database Service on Cloud@Customer
Learn to write policies to control access to Oracle Exadata Database Service on
Cloud@Customer resources.
3-3
Chapter 3
Site Requirements for Oracle Exadata Database Service on Cloud@Customer
If your loading dock meets the height and ramp requirements for a standard freight carrier
truck, then you can use a pallet jack to unload the rack. If the loading dock does not meet the
3-4
Chapter 3
Site Requirements for Oracle Exadata Database Service on Cloud@Customer
requirements, then you must provide a standard forklift, or other means to unload the rack. You
can also request that the rack is shipped in a truck with a lift gate.
Use a conditioned space to remove the packaging material to reduce particles before entering
the data center. Allow enough space for unpacking it from its shipping cartons.
Use the information in the following table to ensure that there is a clear pathway for moving the
Exadata Database Service on Cloud@Customer rack. Also, the entire access route to the
installation site should be free of raised-pattern flooring that can cause vibration.
3-5
Chapter 3
Site Requirements for Oracle Exadata Database Service on Cloud@Customer
The following list outlines the available PDUs for Exadata Database Service on
Cloud@Customer, depending on your region. Follow each of the links to access detailed
specifications for each PDU type:
• Americas, Japan, and Taiwan
– Low-Voltage 15 kVA Single-Phase
– Low-Voltage 15 kVA Three-Phase
– Low-Voltage 22 kVA Single-Phase
– Low-Voltage 24 kVA Three-Phase
• Europe, the Middle East and Africa (EMEA), and Asia Pacific (APAC), except for Japan
and Taiwan
– High-Voltage 15 kVA Three-Phase
– High-Voltage 22 kVA Single-Phase
– High-Voltage 24 kVA Three-Phase
Note:
Electrical work and installations must comply with applicable local, state, or national
electrical codes.
PDU power cords are 4 meters (13.12 feet) long, and 1–1.5 meters (3.3–4.9 feet) of
the cord is routed within the rack cabinet. The installation site AC power receptacle
must be within 2 meters (6.6 feet) of the rack.
3-6
Chapter 3
Site Requirements for Oracle Exadata Database Service on Cloud@Customer
Note:
Electrical work and installations must comply with applicable local, state, or national
electrical codes.
3-7
Chapter 3
Network Requirements for Oracle Exadata Database Service on Cloud@Customer
The ambient relative humidity range of 45–50 percent is suitable for safe data processing
operations. Most computer equipment can operate in a wide range (20–80 percent), but the
range of 45–50 percent is recommended for the following reasons:
• The optimal range helps protect computer systems from corrosion problems associated
with high humidity levels..
• The optimal range provides the greatest operating time buffer in case the air conditioning
system fails for some time.
• The optimal range avoids failures or temporary malfunctions caused by interference from
static discharges that can occur when relative humidity is too low. Electrostatic discharge
(ESD) is easily generated, and hard to dissipate in areas of low relative humidity, such as
below 35 percent. ESD becomes critical when humidity drops below 30 percent
3-8
Chapter 3
Network Requirements for Oracle Exadata Database Service on Cloud@Customer
https://
wss.exacc.oci_region.
oci.oraclecloud.com
3-9
Chapter 3
Network Requirements for Oracle Exadata Database Service on Cloud@Customer
https://
mgmthe1.exacc.oci_reg
ion.oci.oraclecloud.c
om
https://
mgmthe2.exacc.oci_reg
ion.oci.oraclecloud.c
om
https://
swiftobjectstorage.oc
i_region.oraclecloud.
com
https://
*.objectstorage.oci_r
egion.oci.customer-
oci.com
https://telemetry-
ingestion.oci_region.
oraclecloud.com
3-10
Chapter 3
Network Requirements for Oracle Exadata Database Service on Cloud@Customer
https://
identity.oci_region.o
raclecloud.com
https://
auth.oci_region.oracl
ecloud.com
Outgoing Tunnel Service for 443 outbound Use this URL format,
Cloud Automation delivery replacing oci_region with
your region:
https://wsshe.adbd-
exacc.oci_region.oci.
oraclecloud.com
3-11
Chapter 3
Network Requirements for Oracle Exadata Database Service on Cloud@Customer
https://
frontend.logging.ad1.
oci_region.oracleiaas
.com
https://
frontend.logging.ad2.
oci_region.oracleiaas
.com
https://
frontend.logging.ad3.
oci_region.oracleiaas
.com
https://
controlplane.logging.
ad1.oci_region.oracle
iaas.com
https://
controlplane.logging.
ad2.oci_region.oracle
iaas.com
https://
controlplane.logging.
ad3.oci_region.oracle
iaas.com
3-12
Chapter 3
Network Requirements for Oracle Exadata Database Service on Cloud@Customer
https://
console1.exacc.oci_re
gion.oci.oraclecloud.
com
https://
console2.exacc.oci_re
gion.oci.oraclecloud.
com
https://
*.oci_region.function
s.oci.oraclecloud.com
https://
*.functions.oci_regio
n.oci.oraclecloud.com
3-13
Chapter 3
Network Requirements for Oracle Exadata Database Service on Cloud@Customer
Note:
ExaDB-C@C infrastructure access to the stated service endpoints in
Table 3-2 Ports to Open for Control Plane Connectivity is mandatory for
full service functionality. Failing to permit all the mandatory URIs may
result in a service reduction or features not working as designed.
Note that the Control Plane Server must be able to establish TCP Port 443
outbound access only. While outbound connections on Port 443 must be allowed,
TCP Port 443 inbound access is not required, and it may be desirable from a
security standpoint to block inbound connections. (Functionally, bi-directional traffic
is still possible over the connection once the secure outbound connection is
established.)
The Control Plane Server requires customer DNS and NTP services to be
functional. Minimum bandwidth requirements for the Control Plane Server internet
connection to OCI are 50/10 mbs download/upload.
Some customers have security policies requiring the use of proxies for all internet
connections to IT infrastructure. Customer HTTP proxy, for example, passive/
corporate proxy supported for the Control Plane Server connection to OCI.
Customer HTTPS, challenge proxy, and traffic inspection are not supported.
If you are using IP address filtering based firewall rules, due to the dynamic nature
of cloud interfaces, you must allow traffic with all the relevant IP CIDR ranges
associated with your OCI region as identified by https://docs.oracle.com/en-us/
iaas/tools/public_ip_ranges.json.
– Administration Network
This network connects Exadata Database Service on Cloud@Customer servers and
switches to the two control plane servers that are located in the Exadata Database
Service on Cloud@Customer rack. It facilitates customer-initiated operations using the
Oracle Cloud Infrastructure Console and APIs. It also facilitates monitoring and
administration of the Oracle-managed infrastructure components in Exadata Database
Service on Cloud@Customer.
This network is fully contained within the Exadata Database Service on
Cloud@Customer rack, and does not connect to your corporate network. However, the
Exadata infrastructure is indirectly connected to your corporate network through the
control plane servers. This connection is required to provide Domain Name System
(DNS) and Network Time Protocol (NTP) services to the Exadata infrastructure.
Therefore, the IP addresses that are allocated to the administration network must not
exist elsewhere in your corporate network.
Each Oracle Database server and Exadata Storage Server has two network interfaces
connected to the administration network. One provides management access to the
server through one of the embedded Ethernet ports (NET0). The other provides access
to the Integrated Lights-Out Management (ILOM) subsystem through a dedicated
ILOM Ethernet port. Exadata Database Service on Cloud@Customer is delivered with
the ILOM and NET0 ports connected to the Ethernet switch in the rack. Cabling or
configuration changes to these interfaces are not permitted.
– InfiniBand or RDMA Over Converged Ethernet (ROCE) Network
This network connects the database servers, Exadata Storage Servers, and control
plane servers using the InfiniBand or ROCE switches on the rack. Each server
contains two InfiniBand network interfaces (IB0 and IB1) or ROCE interface (re0 and
re1) that are connected to separate InfiniBand or ROCE switches in the rack. Primarily,
3-14
Chapter 3
Network Requirements for Oracle Exadata Database Service on Cloud@Customer
Oracle Database uses this network for Oracle RAC cluster interconnect traffic, and for
accessing data on Exadata Storage Servers.
This non-routable network is fully contained within the Exadata Cloud@Customer rack,
and does not connect to your corporate network. However, because the control plane
servers are connected to the InfiniBand or ROCE network and to your corporate
network, the IP addresses that are allocated to the InfiniBand or ROCE network must
not exist elsewhere in your corporate network.
• Customer Network: Customer-owned and managed networks required for the Exadata
Cloud@Customer data plane to access related systems.
– Client Network
This network connects the Exadata Cloud@Customer database servers to your
existing client network and is used for client access to the virtual machines.
Applications access databases on Exadata Database Service on Cloud@Customer
through this network using Single Client Access Name (SCAN) and Oracle Real
Application Clusters (Oracle RAC) Virtual IP (VIP) interfaces.
The client access network uses a pair of network interfaces on each database server,
which are connected to the customer network.
Note:
When you enable Data Guard, replication of data happens over the client
network by default.
– Backup Network
This network is similar to the client access network, as it connects the Exadata
Database Service on Cloud@Customer Oracle Database servers to your existing
network. It can be used for access to the virtual machines for various purposes,
including backups and bulk data transfers.
Like the client network, the backup network uses a pair of network interfaces on each
database server, which are connected to the customer network. Physically connecting
the backup network to a customer network is required.
If the customer's on-premises storage (NFS or ZDLRA) is to be used exclusively as a
backup destination for databases, then no external connectivity to OCI is required for
the backup network.
Exadata Cloud@Customer also offers an Oracle-managed cloud object storage
backup destination. If Oracle's Object Storage Service is to be leveraged as a backup
destination for database backups, then ensure that the backup network can reach the
Object Storage Service through external connection. You must enable TCP port 443
outbound access for the backup network as follows:
3-15
Chapter 3
Network Requirements for Oracle Exadata Database Service on Cloud@Customer
https://
swiftobjectstorage.oci
_region.oraclecloud.co
m
Note:
This additional network is available only to certain authorized customers
under special circumstances. Your system may not be equipped with it.
The Disaster Recovery network is configured similarly to the client access network but
is dedicated solely to transmitting Data Guard traffic. If your system includes this
network, Data Guard traffic will be routed through it instead of the client network,
utilizing Single Client Access Name (SCAN) and Oracle Real Application Clusters
(Oracle RAC) Virtual IP (VIP) interfaces.
Only the Data Guard prechecks require the client network to be open. Once the
precheck stage is complete, Data Guard provisioning automatically registers the
database with the Disaster Recovery network and uses it for both datafile restoration
and redo transport. If opening the client network is not an option, you must manually
register the primary database with the Disaster Recovery network listener before
initiating Data Guard provisioning.
The Disaster Recovery network consists of a pair of network interfaces on each
database server, which are directly connected to the customer network.
Related Topics
• Object Storage Service API
• Monitoring API
• Identity and Access Management Service API
3-16
Chapter 3
Network Requirements for Oracle Exadata Database Service on Cloud@Customer
Administration and Private Network Requirements for Oracle Exadata Database Service
on Cloud@Customer
No overlap is permitted between the address ranges for the administration network and the
RoCE private network, and all IP addresses should be unique within your corporate network.
You must also allocate IP addresses from your corporate network to the control plane servers.
These network configuration details are specified when you create the Exadata infrastructure.
When you create the Exadata infrastructure, the console pre-populates default values for the
administration network CIDR block and the InifinBand network CIDR block. You can use the
suggested CIDR blocks if there is no overlap with existing IP addresses in your corporate
network.
Review IP address requirements for each of these networks. The table specifies the maximum
and minimum CIDR block prefix length that are allowed for each network. The maximum CIDR
block prefix length defines the smallest block of IP addresses that are required for the network.
To allow for possible future expansion within Oracle Exadata Database Service on
Cloud@Customer, work with your network team to reserve enough IP addresses to
accommodate any future growth.
3-17
Chapter 3
Network Requirements for Oracle Exadata Database Service on Cloud@Customer
/23
/16
/22
/19
For more information about Administration and Private Network CIDR requirements, see Table
5-5 X9M CIDR Requirements and Table 5-6 X8M CIDR Requirements in Using the Console to
Create Oracle Exadata Database Service on Cloud@Customer Infrastructure.
Host Name and IP Address Requirements for Oracle Exadata Database Service on
Cloud@Customer
To connect to your corporate network, Oracle Exadata Database Service on Cloud@Customer
requires several host names and IP addresses for network interfaces on the client network and
the backup network. The precise number of IP addresses depends on the Exadata system
shape. These network configuration details, including host names and IP addresses, are
specified when you create a VM cluster network. All IP addresses must be statically assigned
IP addresses, not dynamically assigned (DHCP) addresses. The client network and the backup
network require separate subnets.
The following table outlines the IP address requirements for the client and backup networks.
The table specifies the maximum and recommended CIDR block prefix length for each
network. The maximum CIDR block prefix length defines the smallest block of IP addresses
that are required for the network. To allow for possible future expansion within Oracle Exadata
Database Service on Cloud@Customer, work with your network team to reserve enough IP
addresses to accommodate any future growth.
3-18
Chapter 3
Network Requirements for Oracle Exadata Database Service on Cloud@Customer
/28 /27
/27 /26
Backup network Maximum CIDR block prefix Maximum CIDR block prefix
length: length:
/29 /28
/28 /27
(For authorized customers only) Maximum CIDR block prefix Maximum CIDR block prefix
Disaster Recovery network length: length:
/28 /27
/27 /26
3-19
Chapter 3
Network Requirements for Oracle Exadata Database Service on Cloud@Customer
On Quarter Rack, Half Rack, or Full Rack systems, you can choose to use 10 Gbps RJ45
copper, 10 Gbps SFP+ fiber, or 25Gbps SFP28 fiber network connections to your corporate
network. However, you cannot mix copper and fiber networks on the same physical server. For
example, you cannot use fiber for the client network and copper for the backup network.
On Base System configurations, the options are more limited because of the physical network
interfaces that are available on each database server. On Base Systems, you can choose to
use copper or fiber network connections only for the client network, while the backup network
uses a fiber connection.
You can also use shared network interfaces on the Base System for the client network and the
backup network, which reduces the uplink requirement to two uplinks for each database server.
Using shared network interfaces also enables you to use copper network connections to
support both the client and backup networks on Base System configurations. However, in
general, Oracle recommends that you do not use shared network interfaces, because sharing
networks compromises the bandwidth and availability of both networks. Shared network
interfaces are not supported for Quarter, Half, and Full Rack configurations.
Establish a Secure Connection Between Your CPS and OCI Using OCI’s
FastConnect Service
Consider the solution outlined below, which leverages OCI’s FastConnect service, if you want
additional isolation for the connection between your CPS and OCI in addition to the default
TLS tunnel approach.
For more information, see Oracle Cloud Infrastructure FastConnect.
Oracle Exadata Database Service on Cloud@Customer service supports the public or private
peering connectivity model of FastConnect.
3-20
Chapter 3
Network Requirements for Oracle Exadata Database Service on Cloud@Customer
ExaDB-C@C Service
Endpoints
Customer CPE
SW/Router Object
Storage
Identity
Service
As shown in the figure, the Oracle Exadata Database Service on Cloud@Customer Control
Plane network egresses to FastConnect provider and to Oracle edge. Customers who may
already have existing FastConnect connectivity can use it to connect Oracle Exadata Database
Service on Cloud@Customer to the OCI region using public peering.
3-21
Chapter 3
Network Requirements for Oracle Exadata Database Service on Cloud@Customer
3-22
Chapter 3
Storage Configuration Requirements for Oracle Exadata Database Service on Cloud@Customer
Note:
If you are looking for information to plan the local VM storage available on your VM
Clusters refer to Estimating How Much Local Storage You Can Provision On Your
VMs
3-23
Chapter 3
Storage Configuration Requirements for Oracle Exadata Database Service on Cloud@Customer
3-24
Chapter 3
Storage Configuration Requirements for Oracle Exadata Database Service on Cloud@Customer
ASM disk groups. Your choices profoundly affect how storage space in the Exadata Storage
Servers is allocated to the ASM disk groups. Consider which option best meets your needs:
• Allocate Storage for Exadata Snapshots
If you select this option, then the SPARSE disk group is created, and less space is allocated
to the DATA and RECO disk groups. If you do not select this option, then the SPARSE disk
group is not created, and you cannot use Exadata snapshot functionality.
• Allocate Storage for Local Backups
If you select this option, then more space is allocated to the RECO disk group to
accommodate local backups to Oracle Exadata storage. If you do not select this option,
then more space is allocated to the DATA disk group, but you cannot use local Oracle
Exadata storage as a backup destination for any databases in the VM cluster.
Exadata Storage Server Configuration Allocation With Exadata Snapshot Storage and
No Local Backup
When you select Allocate Storage for Exadata Snapshots: Yes and Enable Backups on
Local Exadata Storage: No, so that storage is allocated for Exadata snapshots, then storage
allocation is as follows:
• DATA Disk Group: 60%
• RECO Disk Group: 20%
• SPARSE Disk Group 20%
3-25
Chapter 3
Storage Configuration Requirements for Oracle Exadata Database Service on Cloud@Customer
Exadata Storage Server Configuration Allocation With Both Exadata Snapshot Storage
and Local Backup Enabled
When you select Allocate Storage for Exadata Snapshots: Yes and Enable Backups on
Local Exadata Storage: Yes, so that storage is allocated for Exadata snapshots, and storage
is allocated for local backups, then storage allocation is as follows:
• DATA Disk Group: 35%
• RECO Disk Group: 50%
• SPARSE Disk Group 15%
Virtual Machine File System Structure for Oracle Exadata Database Service on
Cloud@Customer
Exadata Cloud@Customer use the following file system organization on the virtual machines.
To plan for local storage allocation on the virtual machines please refer to Estimating How
Much Local Storage You Can Provision to Your VMs.
Filesystem Mounted On
devtmpfs /dev
tmpfs /dev/shm
tmpfs /run
tmpfs /sys/fs/cgroup
tmpfs /run/user/0
/dev/mapper/VGExaDb-LVDbSys1 /
/dev/mapper/VGExaDb-LVDbOra1 /u01
/dev/mapper/VGExaDb-LVDbTmp /tmp
/dev/mapper/VGExaDb-LVDbVar1 /var
/dev/mapper/VGExaDb-LVDbVarLog /var/log
/dev/mapper/VGExaDb-LVDbHome /home
/dev/mapper/ /u02
VGExaDbDisk.u02_extra.img-LVDBDisk
/dev/mapper/VGExaDb- /var/log/audit
LVDbVarLogAudit
/dev/sda1 /boot
/dev/mapper/ /u01/app/19.0.0.0/grid
VGExaDbDisk.grid19.0.0.0.200414.im
g-LVDBDisk
/dev/asm/acfsvol01-142 /acfs01
Related Topics
• Estimating How Much Local Storage You Can Provision On Your VMs
3-26
Chapter 3
Storage Configuration Requirements for Oracle Exadata Database Service on Cloud@Customer
Note:
Exascale configuration requires Q-in-Q (802.1ad) enabled on the Exadata compute
nodes. If Q-in-Q is not already enabled on the Exadata infrastructure, a Dom0 reboot
will be initiated as part of the Exascale configuration operation. All VM clusters on the
infrastructure will be restarted in a rolling fashion accordingly.
3-27
Chapter 3
Storage Configuration Requirements for Oracle Exadata Database Service on Cloud@Customer
Note:
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Select Region and Compartment, and provide the region and the compartment where the
Oracle Exadata infrastructure you want to edit is located.
3. Click Exadata Infrastructure.
4. Click the name of the Exadata infrastructure where you want to configure Exascale
storage.
The Infrastructure Details page displays information about the selected Oracle Exadata
infrastructure.
5. Click More Actions, and then select Configure Exascale storage.
6. On the resulting Configure Exascale storage window, enter the storage capacity you want
to allocate for Exascale.
7. Click Submit.
The Exadata storage section on the Exadata Infrastructure Details page displays the storage
details allocated for ASM and Exascale.
3-28
Chapter 3
Storage Configuration Requirements for Oracle Exadata Database Service on Cloud@Customer
Note:
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Select Region and Compartment, and provide the region and the compartment where the
Oracle Exadata infrastructure you want to edit is located.
3. Click Exadata Infrastructure.
4. Click the name of the Exadata infrastructure where you want to create an Exascale storage
vault.
The Infrastructure Details page displays information about the selected Oracle Exadata
infrastructure.
5. Under Resource, click Exascale storage vault.
6. Click Create Exascale storage vault.
7. On the resulting Create Exascale storage vault window, enter the following:
• Compartment: Select a compartment where you want this resource to be created.
• Name: Enter a descriptive name for the vault.
• Storage capacity for the databases: Enter a reasonable storage capacity within the
minimum and maximum values displayed on the screen.
8. Click Create Exascale storage vault.
The Exascale Storage Vault Details page provides key information, including the allocated
storage and a list of VM Clusters associated with the vault.
9. Alternatively, you can create a new vault on the fly using the Create new storage vault
option while provisioning the Exascale VM cluster.
Note:
The minimum configurable or resizable size for an Exascale Storage Vault is 2 TB.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Select Region and Compartment, and provide the region and the compartment where the
Oracle Exadata infrastructure you want to edit is located.
3. Click Exadata Infrastructure.
3-29
Chapter 3
Storage Configuration Requirements for Oracle Exadata Database Service on Cloud@Customer
4. Click the name of the Exadata infrastructure where the Exascale storage vault you want to
scale reside.
The Infrastructure Details page displays information about the selected Oracle Exadata
infrastructure.
5. Under Resource, click Exascale storage vault.
6. Click the name of the Exascale storage vault you want to scale.
7. On the resulting Exascale storage vault Details page, click Scale storage vault.
8. On the resulting Scale storage vault window, enter the storage capacity for the databases
within the minimum and maximum values displayed on the screen.
9. Click Save Changes.
Note:
An Exascale storage vault can only be deleted when it is not associated with any
Exascale VM clusters. To delete an active vault, you must first terminate all VM
clusters and the underlying databases that are using the vault.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Select Region and Compartment, and provide the region and the compartment where the
Oracle Exadata infrastructure you want to edit is located.
3. Click Exadata Infrastructure.
3-30
Chapter 3
Checklists for Oracle Exadata Database Service on Cloud@Customer Deployments
4. Click the name of the Exadata infrastructure where the Exascale storage vault you want to
scale reside.
The Infrastructure Details page displays information about the selected Oracle Exadata
infrastructure.
5. Under Resource, click Exascale storage vault.
6. Click the name of the Exascale storage vault you want to move.
7. On the resulting Exascale storage vault Details page, click Delete.
8. On the resulting dialog, enter the name of the Exascale storage vault, and click Terminate
Exascale storage vault to confirm the action.
3-31
Chapter 3
Checklists for Oracle Exadata Database Service on Cloud@Customer Deployments
3-32
Chapter 3
Checklists for Oracle Exadata Database Service on Cloud@Customer Deployments
• Has the access route been checked for clearance of the rack, including the minimum width
and height requirements for all doors on the route?
• Are there any stairs, ramps, or thresholds that are of concern?
If yes, then provide details.
• Are all access route incline angles within the permitted range (under 6 degrees)?
• Are all the surfaces acceptable for rolling the new unpacked and packed equipment?
• If a pallet jack is to be used:
– Can the pallet jack support the weight of the rack?
– Are the pallet jack tines compatible with the shipping pallet?
• If there are stairs, is a loading elevator available for the equipment?
• If an elevator is to be used:
– Does the elevator car meet the height, width, and depth requirements for carrying the
rack?
– Do the elevator doors meet the height and width requirements for moving the rack?
– Does the elevator meet the weight requirements for transporting the rack?
• Can the complete access route support the weight of the rack?
• Is the access route onto the raised floor rated for dynamic loading of the rack?
3-33
Chapter 3
Checklists for Oracle Exadata Database Service on Cloud@Customer Deployments
3-34
Chapter 3
Checklists for Oracle Exadata Database Service on Cloud@Customer Deployments
3-35
Chapter 3
Checklists for Oracle Exadata Database Service on Cloud@Customer Deployments
Note:
• Reracking requires prior approval. The checklist below provides high level
guidance on re-racking requirements. Oracle maintains a detailed internal
checklist that must be approved prior to performing reracking.
• You must purchase the Oracle Reracking service.
• Oracle does not provide technical support for customer-supplied equipment.
Answer yes, no, not applicable, or add your comments. Or, let the site survey team to fill in the
requested information.
• Have you purchased the Oracle Reracking Service?
• Is there a cart capable of carrying the weight of the servers to move the components and
associated cabling from the supplied rack to the rack that you supply?
• Is the target rack empty?
• Attach pictures of the target rack (inside and outside).
• Does the target rack meet the following requirements?
– Height: 42 RU
– Width: 600 mm (23.62 inches)
– Depth: 1112 mm (43.78 inches) without front and rear doors
If the rack is less than 42 RU tall, then the rack must be at least 30 RU tall, and you must
provide compatible PDUs to install in the target rack.
• Is the distance between the front and rear mounting planes between the minimum of 610
mm and the maximum 915 mm (24–36 inches)?
• Is the clearance depth in the front of the front mounting plane (distance to the front cabinet
door) at least 25.4 mm (1 inch)?
• Does the target rack meet the following minimum load capacity?
– 19 kg (41.89 lb) per RU
– 785 kg (1730.63 lb) total
• Is the rack a four-post rack (mounting at both front and rear)?
Note:
Two-post racks are not compatible.
• Does the target rack's horizontal opening and unit vertical pitch conform to ANSI/EIA 310-
D-1992 or IEC 60297 standards?
• Does the target rack have RETMA rail support?
3-36
Chapter 3
Checklists for Oracle Exadata Database Service on Cloud@Customer Deployments
Note:
Oracle Exadata rack requires 19 inches (483 mm) for RETMA rail spacing width.
The minimum rack width of 600 mm (23.63 inches) is recommended to
accommodate the PDU and cable harnesses on the side. If the rack is less than
600 mm wide, then it must have additional depth to accommodate mounting
behind the server cable management arms.
3-37
4
Getting Started with Oracle Exadata Database
Service on Cloud@Customer Deployment
After completing the preparation tasks in Preparing for Oracle Exadata Database Service on
Cloud@Customer, get started with deploying your Oracle Exadata Database Service on
Cloud@Customer system following these procedures.
• About Provisioning Oracle Exadata Database Service on Cloud@Customer Systems
To provision an Oracle Exadata Database Service on Cloud@Customer system, you must
work with Oracle to set up and configure the system.
• Tagging Oracle Exadata Database Service on Cloud@Customer Resources
Tagging is a powerful foundational service for Oracle Cloud Infrastructure (OCI) that
enables users to search, control access, and do bulk actions on a set of resources based
on the tag.
• Oracle Exadata Database Service on Cloud@Customer Deployment Assistant
Oracle Exadata Database Service on Cloud@Customer Deployment Assistant is an
automated installation and configuration tool that enables you to set up your Oracle
Exadata Database Service on Cloud@Customer machine and create an Oracle Database
instance with minimal effort.
• Overview of Elastic Storage Expansion
With elastic storage expansion, you can dynamically increase your storage capacity to
meet your growing workload requirements.
• Using the Console to Provision Oracle Exadata Database Service on Cloud@Customer
Learn how to provision an Oracle Exadata Database Service on Cloud@Customer system.
• Creating First VM Cluster Network on Oracle Exadata Database Service on
Cloud@Customer
Follow the steps in the following sections to create your first VM Cluster Network.
• Provisioning the First VM Cluster on an Oracle Exadata Database Service on
Cloud@Customer System
Learn how to create the first VM cluster on your Oracle Exadata Database Service on
Cloud@Customer system.
• Creating Database Backup Destinations for Oracle Exadata Database Service on
Cloud@Customer
Oracle Exadata Database Service on Cloud@Customer provides a backup facility, which
you can configure individually on each database.
• Creating First Database Home on an Oracle Exadata Database Service on
Cloud@Customer System
After provisioning a VM Cluster, create your first Oracle Database Home on Exadata
Cloud@Customer.
• Creating First Database on an Oracle Exadata Database Service on Cloud@Customer
System
After provisioning an Oracle Database Home and any needed backup destinations, you
are ready to create your first database on Oracle Exadata Database Service on
Cloud@Customer.
4-1
Chapter 4
About Provisioning Oracle Exadata Database Service on Cloud@Customer Systems
Caution:
Avoid entering confidential information when assigning descriptions, tags, or friendly
names to your cloud resources through the Oracle Cloud Infrastructure Console, the
APIs, or the command-line interface.
Importance of Tagging
Using the Oracle Cloud Infrastructure (OCI) tagging system, you can tag resources per your
organizational scheme allowing you to group resources, manage costs, and give insights into
usage. Tags also help you build a governance model around security and Maximum Availability
Architecture (MAA). As your organization expands its cloud footprint, it can become
challenging to keep track of the deployment architectures, security best practices, MAA,
4-2
Chapter 4
Tagging Oracle Exadata Database Service on Cloud@Customer Resources
application tier, and so on. Using metadata tags to identify workload attributes can help keep
up with the security and availability of your tenancy without cost overruns.
To enable customers to manage OCI resources securely and cost-effectively, Oracle provides
a set of pre-defined tags in line with best practices for tagging resources. These tags are
grouped into two namespaces, the oracleStandard namespace, and the
OracleApplicationName namespace. You can think of a tag namespace as a container for
your tag keys.
Consider a scenario where your organization has multiple cloud resources such as Exadata
Infrastructure, VM Cluster, DB Home, Oracle Database, Autonomous Exadata VM Cluster,
Autonomous Container Database, Autonomous Database, and VM Cluster Networks across
multiple compartments in your tenancy. across multiple compartments in your tenancy.
Suppose you wish to track these cloud resources for specific purposes, report on them, or take
bulk actions. In that case, you will need a system that lets you group these resources based on
different criteria such as environment, criticality, target users, application, etc. You can achieve
this by applying appropriate tags to these resources.
For example, you may tag all resources in your development stack with Oracle-
Standard.Environment=Dev or for a business-critical application stack set Oracle-
Standard.Criticality=High or Extreme. In the event of service disruptions due to various
reasons, you would then be able to quickly identify all OCI resources associated with an
application or business function or be able to separate critical and non-critical workloads.
Tagging can also help you deploy optimized configurations based on workload attributes
identified via tags. For example, database deployments for the PeopleSoft application require a
specific configuration. Setting the ApplicationName and AppMajorVersion tags while deploying
an Oracle Database or an Oracle Autonomous Database can ensure that the database is
configured and ready for the particular application, for example, PeopleSoft out of the box.
Moreover, integration with the Cloud Advisor OCI service can provide you with direct, deep
insight into how well your cloud services adhere to the corporate guidelines and help your
management govern with a vision. See Cloud Advisor Overview for more details.
Adding Tags
You can tag resources using the Oracle Cloud Infrastructure (OCI) console, command-line
interface, or SDK.
There are many cloud resources that can be tagged in an Oracle Exadata Database Service
on Cloud@Customer deployment. Exadata Infrastructure, VM Cluster, DB Home, Oracle
Database, Autonomous Exadata VM Cluster, Autonomous Container Database, Autonomous
Database, and VM Cluster Networks are some of them. Tags can either be applied while
creating the resources or modified later. For example, you can apply tags to an Autonomous
Container Database (ACD) while provisioning the ACD or add them later from its Details page.
See How Tagging Works for more details on using tags. Tagging integrates with Oracle Cloud
Infrastructure authorization system. You can use IAM policy controls to enable delegation or
restriction of tag manipulation. See Authentication and Authorization to learn about the
permissions required to work with defined and free-form tags. (Required) Enter introductory
text here, including the definition and purpose of the concept.
Tip:
For a "try it out" tutorial that demonstrates implementing tags in Oracle Autonomous
Database, refer to Lab 14: Oracle Standard Tags in Oracle Autonomous Database
Dedicated for Fleet Administrators Workshop on Oracle LiveLabs.
4-3
Chapter 4
Tagging Oracle Exadata Database Service on Cloud@Customer Resources
Your tenancies come with a library of standard tags that would apply to most resources. These
tags are currently available as a set of Tag Namespaces that your governance administrators
can deploy. OCI best practices recommend applying these tags to all resources a standard tag
can be applied to. Besides reporting and governance, OCI service automation can deliver
workload-specific optimizations based on standard tag values.
For example, database deployments for the PeopleSoft application require a specific
configuration. By setting the appropriate application tag key in the Oracle-ApplicationName
tag namespace while deploying an Autonomous Database, can ensure that the database is
configured ready for the particular application, for example, PeopleSoft out of the box.
4-4
Chapter 4
Tagging Oracle Exadata Database Service on Cloud@Customer Resources
4-5
Chapter 4
Tagging Oracle Exadata Database Service on Cloud@Customer Resources
Regulation Description
PCI DSS Payment Card Industry Data Security Standard
HIPAA Health Insurance Portability and Accountability Act
ISO International Standards Organization
SOC1 System and Organization Controls 1
SOC 2 System and Organization Controls 2
FedRamp Federal Risk and Authorization Management
Program
GLBA Gramm–Leach–Bliley Act
CCPA California Consumer Privacy Act
SOX Sarbanes Oxley
NIST National Institute of Standards and Technology -
Cyber Security
FISMA Federal Information Security Management
HITECH Health Information Technology for Economic and
Clinical Health Act
FERPA Family Educational Rights and Privacy Act
( Student privacy)
FACTA Fair and Accurate Credit Transaction Act
4-6
Chapter 4
Tagging Oracle Exadata Database Service on Cloud@Customer Resources
Regulation Description
Texas HB300 Texas Medical Records Privacy Act
CIS Center for Internet Security
CJIS Criminal Justice Information Services Security
Policy
C-TPAT Customs-Trade Partnership Against Terrorism
COPPA Children's Online Privacy Protection Act
PIPED Act, or PIPEDA Personal Information Protection and Electronic
Documents Act
GDPR General Data Protection Regulation
PIPL Personal Information Protection Law
Related Topics
• Cloud Advisor Overview
• Oracle Autonomous Database Dedicated for Fleet Administrators Workshop
• How Tagging Works
• Authentication and Authorization
• Managing Tag Namespaces
• Using Predefined Values
4-7
Chapter 4
Oracle Exadata Database Service on Cloud@Customer Deployment Assistant
4-8
Chapter 4
Oracle Exadata Database Service on Cloud@Customer Deployment Assistant
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click Exadata Infrastructure.
3. Click Deployment Assistant.
4. Choose a deployment type.
• New Deployment: Creates an Exadata Cloud@Customer infrastructure and all the
resources needed to create your first Oracle Database.
Select a Compartment, and then click Continue.
• Existing Deployment: Uses an existing Exadata Cloud@Customer infrastructure and
guides you through completing the deployment.
a. Select a Compartment.
b. Select an Exadata Cloud@Customer infrastructure.
c. Select a VM Cluster Network or create one.
d. Click Continue.
5. If you have created an Exadata Cloud@Customer infrastructure and if it is in Active state,
then do the following:
a. Go the Exadata Cloud@Customer infrastructure details page.
b. Click Deployment Assistant.
6. If you have created an Exadata Cloud@Customer infrastructure and if it is in Requires
Activation state, then do the following:
a. Go the Exadata Cloud@Customer infrastructure details page.
b. Click More Actions and then select Deployment Assistant.
Step 1: Pre-Installation
Create Exadata Cloud@Customer infrastructure, VM cluster network, and download the
infrastructure configuration file before your engineered system arrives at your premises.
1. Create Oracle Exadata Database Service on Cloud@Customer infrastructure.
For more information and instructions, see Using the Console to Create Oracle Exadata
Database Service on Cloud@Customer Infrastructure.
2. Create VM cluster network.
For more information and instructions, see Using the Console to Create a VM Cluster
Network.
3. Download the Oracle Exadata Database Service on Cloud@Customer configuration file.
For more information and instructions, see Using the Console to Download a File
Containing Configuration Data.
4-9
Chapter 4
Overview of Elastic Storage Expansion
You must add a primary contact to activate your infrastructure. Ensure that you provide the
details of the contact that you used while registering the Customer Support Identifier (CSI)
associated with this infrastructure, as a primary contact.
For more information and instructions, see Infrastructure Maintenance Contacts
2. Activate Oracle Exadata Database Service on Cloud@Customer infrastructure.
For more information and instructions, see Using the Console to Activate Oracle Exadata
Database Service on Cloud@Customer Infrastructure.
3. Validate the VM cluster network.
You can only validate a VM cluster network if its current state is Requires Validation and if
the underlying Exadata infrastructure is activated.
For more information and instructions, see Using the Console to Validate a VM Cluster
Network.
Step 3: Post-Installation
Create a VM cluster, install Oracle Database, and validate your installation before performing
any administrative tasks.
1. Create VM cluster.
For more information and instructions, see Using the Console to Create an ASM VM
Cluster.
2. Create Oracle Database.
For more information and instructions, see Using the Console to Create a Database.
4-10
Chapter 4
Overview of Elastic Storage Expansion
4-11
Chapter 4
Overview of Elastic Storage Expansion
4-12
Chapter 4
Overview of Elastic Storage Expansion
Multi-Rack Expansion
• Rack Minimum Configuration
– X11M/X10M
* Maximum 16 total servers in the initial rack
* Maximum 18 total servers in the expansion rack
– X8M/X9M
* Base system expandable to a single rack
* Maximum 8 database and 12 storage servers in the first rack
* Maximum 11 database and 18 storage servers in the expansion racks
• Minimum Expansion Rack Configuration
– Start with one storage server and add at least 3 other servers (storage and compute).
• Maximum Overall Configuration
– Maximum total database servers: 32
– Maximum total storage servers: 64
– Maximum total racks (including initial): 6
4-13
Chapter 4
Using the Console to Provision Oracle Exadata Database Service on Cloud@Customer
Related Topics
• Using the Console to Scale Infrastructure Compute and Storage
To scale infrastructure compute and storage, complete this procedure.
• Using the Console to Download Scale Infrastructure Compute and Storage Configuration
File
To download an Oracle Exadata Cloud@Customer scale configuration file, complete this
procedure.
• Using the Console to Activate New Database and Storage Servers
To download an Oracle Exadata Cloud@Customer scale configuration file, complete this
procedure.
• Using the Console to Make Storage Capacity from New Server Available for VM Clusters
Consumption
To make storage capacity from the new servers for VM clusters consumption, complete
this procedure.
• Using the Console to View Details of Oracle Exadata Database Service on
Cloud@Customer Infrastructure with Scaled Compute and Storage Capacity
To view the storage capacity from the new storage server, or scaled compute capacity, use
this procedure.
4-14
Chapter 4
Using the Console to Provision Oracle Exadata Database Service on Cloud@Customer
4-15
Chapter 4
Using the Console to Provision Oracle Exadata Database Service on Cloud@Customer
– Database servers:
* X11M/X10M: You can expand the database and storage servers in the initial
rack up to 16 total servers.
* X8M/X9M: You can add a minimum of 2 and extend up to a maximum of 8
database servers.
– Storage servers:
* X11M/X10M: You can expand the database and storage servers in the initial
rack up to 16 total servers.
* X8M/X9M: You can add a minimum of 3 and extend up to a maximum of 12
storage servers. For each storage server you add, the storage capacity that
will be added is displayed on the right.
– Multi-rack deployment: If you scale beyond the maximum limits, Database
servers: 8 and Storage servers: 12, then the multi-rack deployment toggle is
automatically enabled. You can also enable that option if the database servers
count and storage server count are within the minimum and maximum bounds;
however, you want the infrastructure to span multiple racks.
A new field, Upload multi-rack configuration file, appears when you enable this
toggle button. You can drag and drop the JSON file or select one from the local
filesystem. For multi-rack deployments, the Control Plane cannot generate the
configuration bundle correctly without the JSON file. The JSON file will be used to
generate host names and IP addresses for the additional components. Contact
your Oracle Field Engineer for more information.
If you fail to identify an infrastructure as multi-rack and subsequently determine it is
multi-rack, then you will have to delete that infrastructure and recreate it.
Note:
Resource allocation will display ECPUs for X11M database servers and
OCPUs for X10M and older generation Exadata infrastructure.
ECPU: An ECPU is an abstracted measure of compute resources. ECPUs
are based on the number of cores elastically allocated from a pool of
compute and storage servers.
Note:
If you want to set a time zone other than UTC or the browser-detected
time zone, then select the Select another time zone option, select a
Region or country, and then select the corresponding Time zone.
If you do not see the region or country you want, then select
Miscellaneous, and then select an appropriate Time zone.
4-16
Chapter 4
Using the Console to Provision Oracle Exadata Database Service on Cloud@Customer
http://server.domain:port
For example:
http://proxy.example.com:80
For enhanced security, when possible, Oracle recommends that you use an HTTP
proxy.
– Enable Control Plane Server Offline Report: Enabling the Control Plane Server
(CPS) offline report helps in diagnosing connectivity issues between the CPS and
OCI endpoints, should they arise.
To view the report, do the following:
a. Find the CPS IP addresses.
For more information, see Using the Console to View Exadata Infrastructure
Network Configuration Details.
b. From your local network, access the report over HTTP.
To view the report in HTML format, use http://<CPSPublicIP>:18080/report
To view the report in JSON format, use http://<CPSPublicIP>:18080/
report/json
For more information, see ExaCC gen2: Troubleshooting VPN/WSS connection
from Customer Side.
• Configure the Oracle Exadata system networks
Each Oracle Exadata Database Service on Cloud@Customer system contains two
system networks, which are not connected to your corporate network. The following
settings define IP address allocations for these networks:
– Administration Network CIDR Block: Specifies the IP address range for the
administration network using CIDR notation. The administration network provides
connectivity that enables Oracle to administer the Exadata system components,
such as the Exadata compute servers, storage servers, network switches, and
power distribution units. You can accept the suggested default, or specify a custom
value.
4-17
Chapter 4
Using the Console to Provision Oracle Exadata Database Service on Cloud@Customer
The minimum CIDR block is /23. The maximum CIDR block is /21. Because this
CIDR block cannot be changed in the future, it is recommended to use a /21 CIDR
block to maximize flexibility for future possible expansion. However, the below
table can be used for further guidance.
– Secure Fabric Network: Specifies the IP address range for the Exadata secure
fabric network using CIDR notation. The Exadata secure fabric network provides
the high-speed low-latency interconnect used by Exadata software for internal
communications between various system components. You can accept the
suggested default, or specify a custom value.
The minimum CIDR block is /22. The maximum CIDR block is /19. Because this
CIDR block cannot be changed in the future, it is recommended to use a /19 CIDR
block to maximize flexibility for future possible expansion. However, the below
table can be used for further guidance.
Table 4-10 X11M and X10M (Quarter Rack X10M, Quarter Rack X10M-L, and
Quarter Rack X10M-XL) CIDR Requirements
4-18
Chapter 4
Using the Console to Provision Oracle Exadata Database Service on Cloud@Customer
4-19
Chapter 4
Using the Console to Provision Oracle Exadata Database Service on Cloud@Customer
Note:
You cannot change this value in the future. Consider all future
expansions when making this choice. Otherwise, your future
expandability may be limited.
Note:
The use of LACP requires both the server and the switch(es) have
compatible settings to allow LACP to work properly. To use LACP for ExaDB-
C@C, you must configure your network switches such that they are
compatible with the following parameter from the Linux ifcfg-bondethx
configuration file:
Note that the BONDING_OPTS line in the host operating system cannot be
changed, so customer switch settings must be compatible with the
parameters stated above without alteration.
The client and backup networks are configured to use active-backup bonding (mode 1)
by default. Since the setting gets applied to each network interface individually, you
have the flexibility to configure client and backup network interfaces independently of
each other. For example, you can configure the backup network to LACP and the client
network to active-backup, if desired.
– Enable LACP for Client Network: Select to configure the client network with
LACP mode 4 (mode=802.3ad) active/active dynamic link.
– Enable LACP for Backup Network: Select to configure the backup network with
LACP mode 4 (mode=802.3ad) active/active dynamic link.
You can check the bonding mode of the client and backup networks under the Network
section on the Exadata Infrastructure Details page.
– Active/Backup indicates that the network interfaces are configured to use the
default mode 1.
– LACP indicates that the network interfaces are mode 4 enabled.
• Provide maintenance details
4-20
Chapter 4
Using the Console to Provision Oracle Exadata Database Service on Cloud@Customer
Note:
Custom action timeout applies only to DB servers. Customer
can specify a minimum 15 minutes and a maximum of 120
minutes of custom action time-out before DB server patching
starts. Within this time, they can perform whatever actions
they have planned. In case, they want to extend the custom
action, they can extend the same by going to "edit
maintenance window" option. If custom action is in progress,
customer get 2 options - either extend Custom action
timeout or resume maintenance window.
Default: 30 minutes
Maximum: 120 minutes
* Maintenance scheduling preference: Customer managed schedule
* Maintenance schedule: Define maintenance preferences for this
infrastructure
* Configure maintenance preference: Define maintenance time
preferences for each quarter. If more than one preference is defined
for a quarter, Oracle automation will select one of them to perform
maintenance on all components in your infrastructure.
Select at least one month every two quarters.
* Specify a schedule: Choose your preferred week, weekday, start
time, and lead time for infrastructure maintenance.
* Optional. Under Week of the month, specify which week of the
month, maintenance will take place. Weeks start on the 1st, 8th,
4-21
Chapter 4
Using the Console to Provision Oracle Exadata Database Service on Cloud@Customer
15th, and 22nd days of the month, and have a duration of 7 days.
Weeks start and end based on calendar dates, not days of the
week. Maintenance cannot be scheduled for the fifth week of
months that contain more than 28 days. If you do not specify a
week of the month, Oracle will run the maintenance update in a
week to minimize disruption.
* Optional. Under Day of the week, specify the day of the week on
which the maintenance will occur. If you do not specify a day of
the week, Oracle will run the maintenance update on a weekend
day to minimize disruption.
* Optional. Under Hour of the day, specify the hour during which
the maintenance run will begin. If you do not specify a start hour,
Oracle will pick the least disruptive time to run the maintenance
update.
* Under Notification Lead Time, specify the minimum number of
weeks ahead of the maintenance event you would like to receive a
notification message. Your lead time ensures that a newly
released maintenance update is scheduled to account for your
required minimum period of advanced notification.
* Choose a maintenance method:
* Rolling: By default, Exadata Infrastructure is updated in a
rolling fashion, one server at a time with no downtime.
* Non-rolling: Update database and storage servers at the
same time. The non-rolling maintenance method minimizes
maintenance time but incurs full system downtime.
* Enable custom action before performing maintenance on DB
servers: Enable custom action only if you want to perform
additional actions outside of Oracle’s purview. For maintenance
configured with a rolling software update, enabling this option will
force the maintenance run to wait for a custom action with a
configured timeout before starting maintenance on each DB
server. For maintenance configured with non-rolling software
updates, the maintenance run will wait for a custom action with a
configured timeout before starting maintenance across all DB
servers. The maintenance run, while waiting for the custom action,
may also be resumed prior to the timeout.
* Custom action timeout (in minutes): Timeout available to
perform custom action before starting maintenance on the DB
Servers.
4-22
Chapter 4
Using the Console to Provision Oracle Exadata Database Service on Cloud@Customer
Note:
Custom action timeout applies only to DB servers.
Customer can specify a minimum 15 minutes and a
maximum of 120 minutes of custom action time-out
before DB server patching starts. Within this time,
they can perform whatever actions they have
planned. In case, they want to extend the custom
action, they can extend the same by going to "edit
maintenance window" option. If custom action is in
progress, customer get 2 options - either extend
Custom action timeout or resume maintenance
window.
Default: 30 minutes
Maximum: 120 minutes
* Show advanced options:
* Enable monthly security infrastructure maintenance: Select
this check box to perform monthly security infrastructure
maintenance.
* Maintenance schedule: Use maintenance window preferences from a
scheduling policy. During infrastructure provisioning, after the scheduling
policy is selected, Oracle generates a recommended maintenance
scheduling plan to apply updates to all the components in your
infrastructure. The recommended plan schedules all DB Servers, followed
by Storage Servers and Network Switches, into the maintenance windows
from your policy based on duration. After provisioning the infrastructure,
you can update the scheduling plan by editing the 'Maintenance
Scheduling Plan' resource and customize the update to specific
components to align with different windows in your scheduling policy.
* Click Select policy.
* In the resulting Select maintenance scheduling policy window, choose
a compartment and a policy.
You can also create a maintenance scheduling policy and use it. For
more information, see Create a Maintenance Scheduling Policy. Note
that you can add additional maintenance windows to the policy after
creating it. For more information, see Add Additional Maintenance
Windows to a Maintenance Scheduling Policy.
* Click Save.
Click Save.
If you switch from rolling to non-rolling maintenance method, then Confirm Non-
rolling Maintenance Method dialog is displayed.
Enter the name of the infrastructure in the field provided to confirm the changes.
Click Save Changes.
4-23
Chapter 4
Using the Console to Provision Oracle Exadata Database Service on Cloud@Customer
Note:
After creating the infrastructure, you can find the maintenance method,
maintenance schedule, DB Server version, and Storage Server version
details under the Maintenance and Version sections on the
Infrastructure Details page.
4-24
Chapter 4
Using the Console to Provision Oracle Exadata Database Service on Cloud@Customer
Note:
• You cannot enable or disable Control Plane Server diagnostic offline report if the
Exadata Infrastructure is in DISCONNECTED mode.
• At any given point in time, the report is available only at the primary Control
Plane Server. When generating a report, if the first IP address specified for the
Control Plane Servers does not work, then you may try the second IP.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Under Region, select the region that you want to associate with the Oracle Exadata
infrastructure.
3. Click Exadata Infrastructure.
4. From the list of infrastructures, click the name of the infrastructure that you're interested in.
5. On the Infrastructure Details page, find the Control Plane Server Offline Report details
under the Network section.
6. Click the Enable or Disable link as needed.
• If you click Enable, then the Enable Control Plane Server Offline Report window is
displayed.
Review the information provided on the popup window, and then click Enable.
• If you click Disable, then Disable Control Plane Server Offline Report window is
displayed.
Review the information provided on the popup window, and then click Disable.
Related Topics
• Using the Console to View Exadata Infrastructure Network Configuration Details
To view network configuration details, follow these steps. Save this information for later use
to troubleshoot if you face network issues.
4-25
Chapter 4
Using the Console to Provision Oracle Exadata Database Service on Cloud@Customer
4-26
Chapter 4
Using the Console to Provision Oracle Exadata Database Service on Cloud@Customer
Note:
If you want to set a time zone other than UTC or the browser-detected time
zone, then select the Select another time zone option, select a Region or
country, and then select the corresponding Time zone.
If you do not see the region or country you want, then select Miscellaneous,
and then select an appropriate Time zone.
http://server.domain:port
For example:
http://proxy.example.com:80
For enhanced security, when possible, Oracle recommends that you use an HTTP
proxy.
c. Configure the Exadata system networks
Each Oracle Exadata Database Service on Cloud@Customer system contains two
system networks, which are not connected to your corporate network. The following
settings define IP address allocations for these networks:
• Administration Network CIDR Block: Specifies the IP address range for the
administration network using CIDR notation. The administration network provides
connectivity that enables Oracle to administer the Exadata system components,
such as the Exadata compute servers, storage servers, network switches, and
power distribution units.
The maximum CIDR block prefix length is /23, which defines the smallest block of
IP addresses that are required for the network. To allow for possible future
expansion within Oracle Exadata Database Service on Cloud@Customer, work
with your network team to reserve enough IP addresses to accommodate any
future growth. The minimum CIDR block prefix length is /16.
4-27
Chapter 4
Using the Console to Provision Oracle Exadata Database Service on Cloud@Customer
Ensure that the IP address range does not conflict with other hosts your corporate
network, and does not overlap with the InfiniBand network CIDR block.
• Secure Fabric Network CIDR Block: Specifies the IP address range for the
Exadata InfiniBand network using CIDR notation. The Exadata InfiniBand network
provides the high-speed low-latency interconnect used by Exadata software for
internal communications between various system components.
The maximum CIDR block prefix length is /22, which defines the smallest block of
IP addresses that are required for the network. To allow for possible future
expansion within Oracle Exadata Database Service on Cloud@Customer, work
with your network team to reserve enough IP addresses to accommodate any
future growth. The minimum CIDR block prefix length is /19.
Ensure that the IP address range does not conflict with other hosts your corporate
network, and does not overlap with the administration network CIDR block.
d. Configure DNS and NTP services
Each Oracle Exadata Database Service on Cloud@Customer system requires access
to Domain Names System (DNS) and Network Time Protocol (NTP) services. The
following settings specify the servers that provide these services to the Exadata
infrastructure:
• DNS Servers: Provide the IP address of a DNS server that is accessible using the
control plane network. You can specify up to three DNS servers.
• NTP Servers: Provide the IP address of an NTP server that is accessible using
the control plane network. You may specify up to three NTP servers.
7. Click Save Changes.
4-28
Chapter 4
Using the Console to Provision Oracle Exadata Database Service on Cloud@Customer
Using the Console to Check the Status of Oracle Exadata Database Service
on Cloud@Customer Infrastructure
To find the status of your Oracle Exadata Database Service on Cloud@Customer
infrastructure, use this procedure to check the Infrastructure Details page.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Choose the Region and Compartment that contains the Oracle Exadata infrastructure
that you are interested in.
3. Click Exadata Infrastructure.
4. Click the name of the Oracle Exadata infrastructure that you are interested in.
The Infrastructure Details page displays information about the selected Oracle Exadata
infrastructure.
4-29
Chapter 4
Creating First VM Cluster Network on Oracle Exadata Database Service on Cloud@Customer
5. Check the icon on the Infrastructure Details page. The color of the icon and the text below
it indicates the status of the Oracle Exadata infrastructure.
• Creating: Yellow icon. The Oracle Exadata infrastructure definition is being created in
the control plane.
• Requires Activation: Yellow icon. The Oracle Exadata infrastructure is defined in the
control plane, but it must be provisioned and activated before it can be used.
• Active: Green icon. The Oracle Exadata infrastructure is successfully provisioned and
activated.
• Deleting: Gray icon. The Oracle Exadata infrastructure is being deleted by using the
Console or API.
• Deleted: Gray icon. The Oracle Exadata infrastructure is deleted, and is no longer
available. This state is transitory. It is displayed for a short time, after which the Oracle
Exadata infrastructure is no longer displayed.
• Activation Failed: Red icon. An error condition currently prevents the activation of the
Oracle Exadata infrastructure. Typically, this state is auto-correcting, and does not
require user intervention.
4-30
Chapter 4
Creating First VM Cluster Network on Oracle Exadata Database Service on Cloud@Customer
The VM cluster network specifies network resources, such as IP addresses and host names,
that reside in your corporate data center and are allocated to Exadata Cloud@Customer. The
VM cluster network includes definitions for the Exadata client network and the Exadata backup
network. The client network and backup network contain the network interfaces that you use to
connect to the VM cluster virtual machines, and ultimately the databases that reside on those
virtual machines.
Note:
Avoid entering confidential information when assigning descriptions, tags, or friendly
names to your cloud resources through the Oracle Cloud Infrastructure Console, API,
or CLI.
4-31
Chapter 4
Creating First VM Cluster Network on Oracle Exadata Database Service on Cloud@Customer
Note:
The values "0" and "4095" are reserved and cannot be entered.
Note:
The values "0" and "4095" are reserved, and cannot be entered.
4-32
Chapter 4
Creating First VM Cluster Network on Oracle Exadata Database Service on Cloud@Customer
• VLAN ID: Provide a virtual LAN identifier (VLAN ID) for the disaster recovery
between 1 and 4094, inclusive. To specify no VLAN tagging, enter "1". (This is
equivalent to a "NULL" VLAN ID tag value.)
Note:
The values "0" and "4095" are reserved, and cannot be entered.
4-33
Chapter 4
Creating First VM Cluster Network on Oracle Exadata Database Service on Cloud@Customer
Maximum and recommended CIDR block prefix lengths for each Exadata system shape
The following table specifies the maximum and recommended CIDR block prefix lengths for
each Exadata system shape. The maximum CIDR block prefix length defines the smallest
block of IP addresses that are required for the network. To allow for possible future expansion
within Exadata Database Service on Cloud@Customer, work with your network team to
reserve enough IP addresses to accommodate any future growth.
Max # Database Servers Client and DR Subnet Size Backup Subnet Size
5 /28 (16 IPs) /29 (8 IPs)
13 /27 (32 IPs) /28 (16 IPs)
29 /26 (64 IPs) /27 (32 IPs)
32 /25 (128 IPs) /26 (64 IPs)
Related Topics
• Resource Tags
Note:
The values "0" and "4095" are reserved and cannot be entered.
4-34
Chapter 4
Creating First VM Cluster Network on Oracle Exadata Database Service on Cloud@Customer
Note:
The values "0" and "4095" are reserved and cannot be entered.
Note:
The values "0" and "4095" are reserved and cannot be entered.
4-35
Chapter 4
Creating First VM Cluster Network on Oracle Exadata Database Service on Cloud@Customer
4-36
Chapter 4
Provisioning the First VM Cluster on an Oracle Exadata Database Service on Cloud@Customer System
Note:
Avoid entering confidential information when assigning descriptions, tags, or friendly
names to your cloud resources through the Oracle Cloud Infrastructure Console, API,
or CLI.
4-37
Chapter 4
Provisioning the First VM Cluster on an Oracle Exadata Database Service on Cloud@Customer System
The public key is in OpenSSH format, from the key pair that you plan to use for connecting to
the VM cluster virtual machines through SSH. The following shows an example of a public key,
which is abbreviated for readability.
ssh-rsa AAAAB3NzaC1yc2EAAAABJQAA....lo/gKMLVM2xzc1xJr/Hc26biw3TXWGEakrK1OQ==
rsa-key-20160304
Related Topics
• Managing Key Pairs on Linux Instances
Note:
You cannot change the VM cluster type after deploying the VM cluster. If you
wish to change the VM cluster type, you must create a new VM cluster and
migrate the database to the new cluster.
4-38
Chapter 4
Provisioning the First VM Cluster on an Oracle Exadata Database Service on Cloud@Customer System
Note:
– Click Save.
• Specify the OCPU (ECPUs for X11M) count per VM: Specify the OCPU (ECPUs
for X11M) count to be provisioned for each VM in this cluster. The minimum value
is 2 OCPUs per VM or 8 ECPUs per VM for X11M (for a live VM condition), unless
you are specifying zero OCPUs or 0 ECPUs for X11M (for a shutdown VM
condition).
If you specify a value of zero, then the VM cluster virtual machines are all shut
down at the end of the cluster creation process. In this case, you can later start the
virtual machines by scaling the OCPU (ECPUs for X11M) resources. See Using
the Console to Scale the Resources on a VM Cluster.
The OCPU (ECPUs for X11M) count for the whole VM Cluster will be calculated
automatically based on the per-VM OCPU (ECPUs for X11M) count you have
specified and the number of physical Database Servers configured for the VM
Cluster.
OCPU: An Oracle Compute Unit (OCPU) provides CPU capacity equivalent of one
physical core of an Intel Xeon processor with hyperthreading enabled. Each OCPU
corresponds to two hardware execution threads, known as vCPUs.
4-39
Chapter 4
Provisioning the First VM Cluster on an Oracle Exadata Database Service on Cloud@Customer System
Note:
– You can only expand these file systems and cannot reduce the
size once expanded.
– Due to backup partitions and mirroring, the / and /var file
systems will consume twice the space they were allocated,
which is indicated in the read-only Total allocated storage for /
(GB) due to mirroring and Total allocated storage for /var
(GB) due to mirroring fields.
– After creating the VM Cluster, check the Exadata Resources
section on the Exadata Infrastructure Details page to check the
file size allocated to the local storage (/u02) and local storage
(additional file systems).
• Reserved local storage per VM (GB): Displays the local storage size reserved
internally for root file systems, Oracle Grid Infrastructure Homes, and diagnostic
logs. This field is not editable.
g. Configure the Exadata Storage: The following settings define how the Exadata
storage is configured for use with the VM cluster. The storage type once selected
4-40
Chapter 4
Provisioning the First VM Cluster on an Oracle Exadata Database Service on Cloud@Customer System
cannot be changed later on once the VM cluster is provisioned with the desired
storage type. You have two options to choose: Automatic storage type (ASM) and
Exascale. For more information about Exascale storage type, see Using the Console
to Create an Exascale VM Cluster.
Automatic Storage Management (ASM)
• Specify Usable Exadata Storage: Specify the size for each individual VM. The
minimum recommended size is 2 TB.
• Allocate Storage for Exadata Snapshots: Check this option to create a sparse
disk group, which is required to support Exadata snapshot functionality. Exadata
snapshots enable space-efficient clones of Oracle databases that can be created
and destroyed very quickly and easily.
• Allocate Storage for Local Backups: Check this option to configure the Exadata
storage to enable local database backups. If you select this option, more space is
allocated to the RECO disk group to accommodate the backups. If you do not
select this option, you cannot use local Exadata storage as a backup destination
for any databases in the VM cluster.
Storage Allocation DATA Disk Group RECO Disk Group SPARSE Disk Group
Exadata Snapshots: 80% 20% 0% (The SPARSE disk
No group is not created.)
Enable Backups on
Local Exadata
Storage: No
Exadata Snapshots: 40% 60% 0% (The SPARSE disk
No group is not created.)
Enable Backups on
Local Exadata
Storage: Yes
Allocate Storage for 60% 20% 20%
Exadata Snapshots:
Yes
Enable Backups on
Local Exadata
Storage: No
Allocate Storage for 35% 50% 15%
Exadata Snapshots:
Yes
Enable Backups on
Local Exadata
Storage: Yes
h. Select version:
• Choose the Oracle Grid Infrastructure version: From the list, choose the Oracle
Grid Infrastructure release (19c and 23ai) that you want to install on the VM
cluster.
The Oracle Grid Infrastructure release determines the Oracle Database releases
that can be supported on the VM cluster. You cannot run an Oracle Database
release that is later than the Oracle Grid Infrastructure software release.
4-41
Chapter 4
Provisioning the First VM Cluster on an Oracle Exadata Database Service on Cloud@Customer System
Note:
Minimum requirements for provisioning a VM Cluster with Grid
Infrastructure 23ai:
– Exadata Guest VM running Exadata System Software 23.1.8
– Exadata Infrastructure running Exadata System Software 23.1.x
Note:
BYOL is not available for Exadata Database-Developer VM Cluster type.
4-42
Chapter 4
Provisioning the First VM Cluster on an Oracle Exadata Database Service on Cloud@Customer System
k. Diagnostics Collection:
By enabling diagnostics collection and notifications, Oracle Cloud Operations and you
will be able to identify, investigate, track, and resolve guest VM issues quickly and
effectively. Subscribe to Events to get notified about resource state changes. For more
information, see Getting Started with Events.
Note:
You are opting in with the understanding that the list of events, metrics, and
log files collected can change in the future. You can opt out of this feature at
any time.
• Enable Diagnostic Events: Allow Oracle to collect and publish critical, warning,
error, and information events to me.
• Enable Health Monitoring: Allow Oracle to collect health metrics/events such as
Oracle Database up/down, disk space usage, and so on, and share them with
Oracle Cloud operations. You will also receive notification of some events.
• Enable Incident Logs and Trace Collection: Allow Oracle to collect incident logs
and traces to enable fault diagnosis and issue resolution.
All three checkboxes are selected by default. You can leave the default settings as
is or clear the checkboxes as needed. You can view the Diagnostic Collection
settings on the VM Cluster Details page under General Information >>
Diagnostics Collection.
– Enabled: When you choose to collect diagnostics, health metrics, incident
logs, and trace files (all three options).
– Disabled: When you choose not to collect diagnostics, health metrics, incident
logs, and trace files (all three options).
– Partially Enabled: When you choose to collect diagnostics, health metrics,
incident logs, and trace files ( one or two options).
l. Show Advanced Options:
• Time zone: The default time zone for the Exadata Infrastructure is UTC, but you
can specify a different time zone. The time zone options are those supported in
both the Java.util.TimeZone class and the Oracle Linux operating system.
Note:
If you want to set a time zone other than UTC or the browser-detected
time zone, then select the Select another time zone option, select a
Region or country, and then select the corresponding Time zone.
If you do not see the region or country you want, then select
Miscellaneous, and then select an appropriate Time zone.
• Tags: Optionally, you can apply tags. If you have permission to create a resource,
you also have permission to apply free-form tags to that resource. To apply a
defined tag, you must have permission to use the tag namespace. For more
information about tagging, see Resource Tags. If you are not sure if you should
apply tags, skip this option (you can apply tags later) or ask your administrator.
4-43
Chapter 4
Provisioning the First VM Cluster on an Oracle Exadata Database Service on Cloud@Customer System
c. Click Save.
After saving the Stack, the system displays a banner with a link to the saved
Stack.
d. Click the link to open the Stack in the Resource Manager Service console.
See, Resource Manager and Terraform.
• To view the details of a Stack:
a. Open the navigation menu. Under Developer Services, click Resource Manager.
b. Click Stacks.
c. Click the name of the Stack that you want to view details.
Or, click the Actions menu (three dots), and select the View stack details option.
7. Click Create VM Cluster.
The VM Cluster Details page is now displayed. While the creation process is running, the
state of the VM cluster is Pending. When the VM cluster creation process completes, the
state of the VM cluster changes to Available.
The Exadata Database Storage section on the VM Cluster Details page shows the type of
storage configured, which, in this case, is ASM.
Related Topics
• Oracle Exadata Database Service on Cloud@Customer Service Description
Learn how you can leverage the combined capabilities of Oracle Exadata and Oracle
Cloud Infrastructure with Oracle Exadata Database Service on Cloud@Customer
• Using the Console to Scale the Resources on a VM Cluster
Starting in Oracle Exadata Database Service on Cloud@Customer, you can scale up or
down multiple resources at the same time. You can also scale up or down resources one
at a time.
• Introduction to Scale Up or Scale Down Operations
With the Multiple VMs per Exadata system (MultiVM) feature release, you can scale up or
scale down your VM cluster resources.
• Estimating How Much Local Storage You Can Provision On Your VMs
• Resource Tags
• Oracle PaaS/IaaS Cloud Service Description documents
• Oracle Platform as a Service and Infrastructure as a Service – Public Cloud Service
DescriptionsMetered & Non-Metered
• Getting Started with Events
• Overview of Database Service Events
4-44
Chapter 4
Creating Database Backup Destinations for Oracle Exadata Database Service on Cloud@Customer
4-45
Chapter 4
Creating Database Backup Destinations for Oracle Exadata Database Service on Cloud@Customer
Oracle Exadata Database Service on Cloud@Customer provides a backup facility, which you
can configure individually on each database.
See: Managing Databases on Exadata Cloud@Customer and Managing Database Backup
and Recovery on Exadata Cloud@Customer.
If you want to store backups on a Recovery Appliance, or on a network file storage (NFS)
location that you manage, then you must first create a backup destination. Each backup
destination defines the properties that are required to connect to the Recovery Appliance or
NFS location, and each backup destination must be accessible in your data center from the
VM cluster nodes.
The Oracle Exadata Database Service on Cloud@Customer backup facility can also store
backups on Oracle Cloud Infrastructure object storage, or on local Exadata storage on your
Oracle Exadata Database Service on Cloud@Customer system. However, you do not need to
create a backup destination for any of these other locations. Instead, applicable options for
backup to cloud object storage or local Exadata storage are available directly when you create
a database.
Note:
Avoid entering confidential information when assigning descriptions, tags, or friendly
names to your cloud resources through the Oracle Cloud Infrastructure Console, API,
or CLI.
Related Topics
• Zero Data Loss Recovery Appliance
• Manage Oracle Database Homes on Oracle Exadata Database Service on
Cloud@Customer Systems
Learn to manage Oracle Database homes on Oracle Exadata Database Service on
Cloud@Customer.
• Using the Console to Create a Backup Destination
To create a backup destination, be prepared to provide values for the backup destination
configuration.
• Manage Database Backup and Recovery on Oracle Exadata Database Service on
Cloud@Customer
Learn how to work with the backup and recovery facilities provided by Oracle Exadata
Database Service on Cloud@Customer.
4-46
Chapter 4
Creating Database Backup Destinations for Oracle Exadata Database Service on Cloud@Customer
– The appliance must be accessible from the Oracle Exadata Database Service on
Cloud@Customer system using the Oracle Net Services connection string, which is
provided by the Zero Data Loss Recovery Appliance administrator.
• For an NFS backup destination:
– Oracle Exadata Database Service on Cloud@Customer non-autonomous databases:
* You must mount the NFS server location to a local mount point directory on each
node in the VM cluster.
* The local mount point directory and the NFS server must be identical across all
nodes in the cluster.
* You must ensure that the NFS mount is maintained continuously on all of the VM
cluster nodes.
* The NFS-mounted file system must be readable and writable by the oracle
operating system user on all of the VM cluster nodes.
– Autonomous Database on Cloud@Customer:
Note:
Oracle Autonomous Database on Exadata Cloud@Customer supports NFS
versions 3 and 4. Mounts with both versions enabled, however, default to
version 4.
* To ensure that the Autonomous VM cluster can access the NFS server over the
(preferred) Backup Network, enter valid Backup Network IP addresses while
configuring the VM Cluster Network.
If the backup destination is not accessible over the backup network but accessible
over the client network, the backup traffic will be routed over the client network.
* The NFS-mounted file system must be readable and writable by the oracle
operating system user on all of the VM cluster nodes.
* If permissions are being controlled at the user level, then the uid:gid of the
oracle user for the Autonomous VM cluster is 1001:1001.
* For NFSv4 servers that restrict port range, you must use the insecure option to
enable clients other than an Administrator user to connect to the NFS server.
Using the Console for Backup Destinations for Oracle Exadata Database
Service on Cloud@Customer
Learn how to use the console to create, edit, move, and terminate a backup destination for
your infrastructure for Oracle Exadata Database Service on Cloud@Customer.
• Using the Console to Create a Backup Destination
To create a backup destination, be prepared to provide values for the backup destination
configuration.
• Using the Console to Edit a Backup Destination
To edit a backup destination, be prepared to provide values for the backup destination
configuration.
4-47
Chapter 4
Creating Database Backup Destinations for Oracle Exadata Database Service on Cloud@Customer
Note:
You can also set OCI Object Store as a backup destination. However, you
cannot set it from this screen. You can configure OCI Object Store as a
backup destination when creating a database. For more information, see
Backup Destination Type in Using the Console to Create a Database.
4-48
Chapter 4
Creating Database Backup Destinations for Oracle Exadata Database Service on Cloud@Customer
Note:
ADB customers must ensure to provide the connection string that
connects to the recovery appliance in an Oracle "easy connect"
string format, as shown below:
host:port/service name
Where host is the SCAN hostname of the Zero Data Loss Recovery
Appliance.
– Provide the Virtual Private Catalog (VPC) Users: Provide a VPC user name
for connecting to the Zero Data Loss Recovery Appliance. You can specify
multiple VPC user names in case you want to use the appliance as a backup
destination for multiple databases. This information is typically provided by the
Zero Data Loss Recovery Appliance administrator.
• If you select Network Storage (NFS), then you must also specify the following:
– Self-mount for non-autonomous databases:
Provide the local NFS mount point path: Specify the local directory path on
each VM cluster node where the NFS server location is mounted. The local
directory path and the NFS server location must each be the same across all
of the VM cluster nodes.
– Auto-mount for Autonomous Databases:
Use this destination for Autonomous Databases:
* NFS server: Specify the IP address of the NFS server. Optionally, you can
specify up to four IP addresses. These are just extra paths to the same
NFS server. Note that Oracle supports only one NFS device for backups.
* NFS export share: Specify the directory path where the exported file
system is mounted.
d. Configure Advanced Options.
• Tags: (Optional) You can choose to apply tags. If you have permissions to create a
resource, then you also have permissions to apply free-form tags to that resource.
To apply a defined tag, you must have permissions to use the tag namespace. For
more information about tagging, refer to information about resource tags. If you are
not sure if you should apply tags, then skip this option (you can apply tags later),
or ask your administrator.
6. Click Create Backup Destination.
The Backup Destination Details page displays the newly created backup destination.
Related Topics
• Using the Console to Create a Database
To create an Oracle Database with the console, use this procedure.
• Resource Tags
4-49
Chapter 4
Creating Database Backup Destinations for Oracle Exadata Database Service on Cloud@Customer
Note:
You cannot edit a Backup Destination if there is already a database attached to it.
• If you are editing a Zero Data Loss Recovery Appliance backup destination:
– Provide the Recovery Appliance connection string: Specify the Oracle Net
Services connection string that connects to the Recovery Appliance. This
information is typically provided by the Recovery Appliance administrator.
– Provide the Virtual Private Catalog (VPC) Users: Provide a VPC user name for
connecting to the Recovery Appliance. You can specify multiple VPC user names
in case you want to use the Recovery Appliance as a backup destination for
multiple databases. This information is typically provided by the Recovery
Appliance administrator.
• If you are editing an NFS backup destination:
– Self-mount for non-autonomous databases:
Provide the local NFS mount point path: Specify the local directory path on
each VM cluster node where the NFS server location is mounted. The local
directory path and the NFS server location must each be the same across all of
the VM cluster nodes.
– Auto-mount for Autonomous Databases:
Use this destination for Autonomous Databases:
* NFS server: Specify the IP address of the NFS server. Optionally, you can
specify up to four IP addresses.
* NFS export share: Specify the directory path where the exported file system
is mounted.
7. Click Save Changes.
4-50
Chapter 4
Creating Database Backup Destinations for Oracle Exadata Database Service on Cloud@Customer
4-51
Chapter 4
Creating First Database Home on an Oracle Exadata Database Service on Cloud@Customer System
Note:
Avoid entering confidential information when assigning descriptions, tags, or friendly
names to your cloud resources through the Oracle Cloud Infrastructure Console, API,
or CLI.
You can also add and remove Database homes, and perform other management tasks on a
Database home by using the dbaascli utility.
Related Topics
• Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Learn to use the dbaascli utility on Oracle Exadata Database Service on
Cloud@Customer.
4-52
Chapter 4
Creating First Database Home on an Oracle Exadata Database Service on Cloud@Customer System
Note:
Minimum requirements for provisioning a Database 23ai home:
• Grid Infrastructure 23ai
• Exadata Guest VM running Exadata System Software 23.1.8
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
VM Clusters is selected by default.
2. Choose your Compartment.
A list of VM Clusters is displayed for the chosen Compartment.
3. In the list of VM clusters, click the VM cluster on which you want to create the Database
Home.
4. Under Resources, click Database Homes.
5. Click Create Database Home.
6. In the Create Database Home dialog, enter the following:
• Database Home display name: The display name for the Database Home.
• Unified Auditing: Select this check box to enable Unified Auditing framework.
Note:
You cannot disable Unified Auditing after provisioning the Database Home.
– For Oracle Database versions lower than 12.1: You cannot use the Unified
Auditing framework and should instead use the Traditional Audit, the legacy Oracle
Database audit framework.
– For Oracle Database versions 12.1 or higher: You can enable Unified Auditing
from the OCI Console. For Oracle Database versions 12.1 or higher but lower than
version 23ai, the Unified Auditing check box is not selected by default. However,
it is selected by default for Oracle Database version 23ai.
Unified Auditing field in the General Information section on the Database Home
Details page displays if Unified Auditing is Enabled or Disabled.
• Database image: Determines what Oracle Database version is used for the database.
You can mix database versions on the Exadata VM Cluster, but not editions. By
default, the latest Oracle-published database software image is selected.
4-53
Chapter 4
Creating First Database Home on an Oracle Exadata Database Service on Cloud@Customer System
Note:
For the Oracle Database major version releases available in Oracle Cloud
Infrastructure, images are provided for the current version plus the three
most recent older versions (N through N - 3). For example, if an instance is
using Oracle Database 19c, and the latest version of 19c offered is
19.8.0.0.0, images available for provisioning are for versions 19.8.0.0.0,
19.7.0.0, 19.6.0.0 and 19.5.0.0.
A Database Software Image will not be available for Database Home creation if:
– The database version of Database Software Image is out of support. For example,
Database Software Images created using 11.2.0.4 will not be available for
Database Home provisioning after 31-Dec-2022.
– The Exadata model should support the PSU/RU version of the Database Software
Image. For example, for the 19c release, the X8M-2 model supports RU version
19.4 and greater.
– Only Database Software Images created specifically in the context of Exadata
Cloud@Customer service can be used while provisioning and patching Database
Homes within the Exadata Cloud@Customer service.
– The Database Software Image is not in Available state, that is, Deleted or is
being Updated.
• Show Advanced Options
You have the option to configure advanced options.
– Tags: (Optional) You can choose to apply tags. If you have permissions to create a
resource, then you also have permissions to apply free-form tags to that resource.
To apply a defined tag, you must have permissions to use the tag namespace. For
more information about tagging, see "Resource Tags". If you are not sure if you
should apply tags, then skip this option (you can apply tags later) or ask your
administrator.
Note that after Home install, patch to the latest if the latest patch is available.
7. Click Create.
4-54
Chapter 4
Creating First Database on an Oracle Exadata Database Service on Cloud@Customer System
When the Database Home creation is complete, the status changes from Provisioning to
Available.
Related Topics
• Resource Tags
4-55
Chapter 4
Creating First Database on an Oracle Exadata Database Service on Cloud@Customer System
Note:
Custom locale objects (such as language, territory, character set, and collation)
require deploying custom locale data files to both the database and storage servers,
which is not supported in Exadata Database Service on Cloud@Customer.
4-56
Chapter 4
Creating First Database on an Oracle Exadata Database Service on Cloud@Customer System
4-57
Chapter 4
Creating First Database on an Oracle Exadata Database Service on Cloud@Customer System
– The PDBADMIN user account is initially configured with the same administration
password as the CDB SYS and SYSTEM users.
– The PDBADMIN user account is initially configured with basic privileges assigned
through two roles; CONNECT and PDB_DBA. However, for most practical administrative
purposes you must assign extra privileges to the PDBADMIN user account, or to the
PDB_DBA role.
You can use native Oracle Database facilities to create extra PDBs, and to manage all of
your PDBs. The dbaascli utility also provides a range of convenient PDB management
functions.
Note:
Avoid entering confidential information when assigning descriptions, tags, or friendly
names to your cloud resources through the Oracle Cloud Infrastructure Console, API,
or CLI.
Note:
You cannot modify the db_name, db_unique_name, and SID prefix after creating
the database.
• Provide the database name: Specify a user-friendly name that you can use to identify
the database. The database name must contain only the permitted characters.
Review the following guidelines when selecting a database name.
– maximum of 8 characters
– contain only alphanumeric characters
– begin with an alphabetic character
4-58
Chapter 4
Creating First Database on an Oracle Exadata Database Service on Cloud@Customer System
4-59
Chapter 4
Creating First Database on an Oracle Exadata Database Service on Cloud@Customer System
Note:
For the Oracle Database major version releases available in Oracle
Cloud Infrastructure, images are provided for the current version plus
the three most recent older versions (N through N - 3). For example,
if an instance is using Oracle Database 19c, and the latest version of
19c offered is 19.8.0.0.0, images available for provisioning are for
versions 19.8.0.0.0, 19.7.0.0, 19.6.0.0 and 19.5.0.0.
• Provide the administration password: Provide and confirm the Oracle Database
administration password. This password is used for administration accounts and
functions in the database, including:
– The password for the Oracle Database SYS and SYSTEM users.
– The Transparent Data Encryption (TDE) Keystore password.
For Oracle Database 12c Release 1 or later releases, the password for the PDB
administration user in the first PDB (PDBADMIN) must be nine to 30 characters and
contain at least two uppercase, two lowercase, two numeric, and two special
characters. The special characters must be _, #, or -. In addition, the password must
not contain the name of the tenancy or any reserved words, such as Oracle or Table,
regardless of casing.
– Use the administrator password for the TDE wallet: When this option is
checked, the password entered for the SYS user is also used for the TDE wallet.
To set the TDE wallet password manually, uncheck this option and enter the TDE
wallet password.
• Backup Destination Type: Select a backup destination for the database. From the
list, choose an option:
– Local: Select to store backups locally in the Oracle Exadata Storage Servers on
your Oracle Exadata Cloud at Customer system.
This option is available only if you enabled backups on local Oracle Exadata
storage in the VM cluster that you want to host the database.
– Object Storage: Select to store backups in an Oracle-managed object storage
container on Oracle Cloud Infrastructure.
To use this option, your Oracle Exadata Cloud@Customer system must have
egress connectivity to Oracle Cloud Infrastructure Object Storage.
– NFS: Select to store backups in one of your previously defined backup
destinations that use Network File System (NFS) storage. For more information,
refer to the information about backup destinations in this publication.
If you select this option, then you must also choose from the list of NFS Backup
Destinations.
– Recovery Appliance: Select to store backups in one of your previously defined
backup destinations that use Oracle Zero Data Loss Recovery Appliance. Refer to
the information about backup destination options in this document.
If you select Oracle Zero Data Loss Recovery Appliance as your backup option,
then you must also:
* Choose from the list of appliance Backup Destinations.
* Choose from the VPC User list, which contains the list of virtual private catalog
(VPC) user names that are defined in the Oracle Zero Data Loss Recovery
Appliance backup destination.
4-60
Chapter 4
Creating First Database on an Oracle Exadata Database Service on Cloud@Customer System
Note:
If you select a backup destination, then you cannot change a backup
location after the database is created. However, if you select None now,
then you can select a backup destination after the database is created.
– Enable automatic backups: Select this option to enable daily backups using the
policy for automatic backups.
This option is only enabled when you select a Backup Destination Type other
than None. You can change this setting after database creation.
• Key Management: Choose an encryption option, Oracle Wallet, Oracle Key Vault, or
External HSM. The default option is Oracle Wallet.
– Oracle Wallet:
Use the administrator password for the TDE wallet: When this option is
checked, the password entered for the SYS user is also used for the TDE wallet.
To set the TDE wallet password manually, uncheck this option and enter the TDE
wallet password and confirm it.
– Oracle Key Vault: Select the compartment where you have created the Key Store,
and then select the Key Store. As part of the CDB creation, a new wallet is created
for the CDB in Oracle Key Vault (OKV). Also, a TDE Master Key is generated for
the CDB and added to the wallet in OKV.
Note:
– External Keystore:
* TDE wallet password: Enter the TDE wallet password.
* External Keystore credential: Enter user credentials in the format your
external keystore provider supports.
• (Optional) Select Show Advanced Options. From this window, you can select the
following options:
4-61
Chapter 4
Creating First Database on an Oracle Exadata Database Service on Cloud@Customer System
Note:
Entering a SID prefix is only available for 12.1 databases and above.
Optionally, specify the Oracle SID prefix for the database. The instance number is
automatically appended to the SID prefix to become the instance_name database
parameter. If not provided, then the SID prefix defaults to the db_name.
Review the following guidelines when selecting a database name:
* maximum of 12 characters
* contain only alphanumeric characters
* begin with an alphabetic character
* unique in the VM cluster
– Encryption Key: Choose an encryption option, Encrypt using Oracle-managed
keys or Encrypt using customer-managed keys. The default option is Oracle-
managed keys.
To use customer-managed keys, select the Encrypt using customer-managed
keys option, select the compartment where you have created the Key Store, and
then select the Key Store. As part of the CDB creation, a new wallet is created for
the CDB in Oracle Key Vault (OKV). Also, a TDE Master Key is generated for the
CDB and added to the wallet in OKV.
Note:
– Backup retention period: From the list, you can choose the length of time that
you want automatic backups to be retained.
For backups to local Exadata storage, you can choose a retention period of 7 days
or 14 days. The default retention period is 7 days.
4-62
Chapter 4
Connecting to an Oracle Exadata Database Service on Cloud@Customer System
Note:
You can now:
• Create or delete a CDB while a Data Guard setup is running on another
database within the same Oracle home, and vice versa.
• Create or delete a CDB while concurrently performing Data Guard actions
(switchover, failover, and reinstate) within the same Oracle home, and vice versa.
• Create or delete a CDB while concurrently creating or deleting a PDB within the
same Oracle home, and vice versa.
• Create or delete a CDB concurrently on different databases within the same
Oracle home.
• Create or delete a CDB while simultaneously updating VM Cluster tags.
Related Topics
• Resource Tags
• Manage Database Backup and Recovery on Oracle Exadata Database Service on
Cloud@Customer
Learn how to work with the backup and recovery facilities provided by Oracle Exadata
Database Service on Cloud@Customer.
• Manage Keys Using an External Keystore
Review the use cases and implementation details of an external keystore.
4-63
Chapter 4
Connecting to an Oracle Exadata Database Service on Cloud@Customer System
Cluster virtual machine using SSH and to connect to an Oracle Exadata Database Service on
Cloud@Customer database using Oracle Net Services (SQL*Net).
• Connecting to a Virtual Machine with SSH
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
• Connecting to a Database with Oracle Net Services
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system using Oracle Net Services.
4-64
Chapter 4
Connecting to an Oracle Exadata Database Service on Cloud@Customer System
Note:
The public keys are stored in the authorized_keys file at ~/.ssh/
authorized_keys. Separate authorized_keys files are located under the home
directories of the operating system users. By default, only the opc user account
has an authorized_keys entry and is able to log in remotely. Do not remove or
alter the automatically generated entry in authorized_keys for the opc user.
• The host name or IP address for the virtual machine that you want to access.
See, Using the Console to Check the Status of a VM Cluster Virtual Machine.
Related Topics
• Using the Console to Check the Status of a VM Cluster Virtual Machine
Review the health status of a VM cluster virtual machine.
• Connect as the user opc to perform operations that require root or oracle access to
the virtual machine, such as backing up or patching; this user can use the sudo
command to gain root or oracle access to the VM.
7. Confirm that the When username is not specified option is set to Prompt.
8. In the Category tree, expand SSH and then click Auth.
The Auth panel is displayed.
4-65
Chapter 4
Connecting to an Oracle Exadata Database Service on Cloud@Customer System
9. Click the Browse button next to the Private key file for authentication field. Then, in the
Select private key file window, navigate to and open the private key file that matches the
public key that is associated with the deployment.
10. In the Category tree, click Session.
The PuTTY Configuration window closes and the PuTTY terminal window displays.
If this is the first time you are connecting to the VM, the PuTTY Security Alert window is
displayed, prompting you to confirm the public key. Click Yes to continue connecting.
4. Identify the database instances for the database that you want to access. For example:
5. Configure the environment settings for the database that you want to access. For example:
. oraenv
ORACLE_SID = [oracle] ? s12c
The Oracle base has been set to /u02/app/oracle
export ORACLE_SID=s12c1
6. You can use the svrctl command to display more detailed information about the
database. For example:
4-66
Chapter 4
Connecting to an Oracle Exadata Database Service on Cloud@Customer System
Domain: example.com
Start options: open
Stop options: immediate
Database role: PRIMARY
Management policy: AUTOMATIC
Server pools:
Disk Groups: DATAC4
Mount point paths:
Services:
Type: RAC
Start concurrency:
Stop concurrency:
OSDBA group: dba
OSOPER group: racoper
Database instances: s12c1,s12c2
Configured nodes: node01,node02
CSS critical: no
CPU count: 0
Memory target: 0
Maximum memory: 0
Default network number for database services:
Database is administrator managed
sqlplus / as sysdba
Connected to:
Oracle Database 12c EE Extreme Perf Release 12.2.0.1.0 - 64bit Production
4-67
Chapter 4
Connecting to an Oracle Exadata Database Service on Cloud@Customer System
* To perform operations that require root access to the virtual machine, such as
patching, connect as opc. The opc user can use the sudo -s command to gain
root access to the virtual machine.
– node is the host name or IP address for the virtual machine that you want to access.
4-68
Chapter 4
Connecting to an Oracle Exadata Database Service on Cloud@Customer System
Note:
This documentation provides basic requirements for connecting to your Oracle
Exadata Database Service on Cloud@Customer databases by using Oracle Net
Services.
Connecting to a Database Using a Connect Descriptor that References All of the SCAN VIPs
You can set up a connect descriptor for Oracle Exadata Database Service on
Cloud@Customer System using multiple SCAN listeners.
This approach requires you to supply all of the single client access name (SCAN) virtual IP
(VIP) addresses, and enables Oracle Net Services to connect to an available SCAN listener.
• Use the following template to define a Net Services alias, which is typically used to provide
a convenient name for the connect descriptor:
alias-name = (DESCRIPTION=
(ADDRESS_LIST=
(ADDRESS=(PROTOCOL=tcp)(HOST=SCAN-VIP-1)(PORT=1521))
(ADDRESS=(PROTOCOL=tcp)(HOST=SCAN-VIP-2)(PORT=1521))
(ADDRESS=(PROTOCOL=tcp)(HOST=SCAN-VIP-3)(PORT=1521)))
(CONNECT_DATA=(sid-or-service-entry)))
Where:
alias-name is the name you use to identify the alias.
4-69
Chapter 4
Connecting to an Oracle Exadata Database Service on Cloud@Customer System
Note:
By default, Oracle Net Services randomly selects one of the addresses in the
address list to balance the load between the SCAN listeners.
Connecting to a Database Use a Connect Descriptor that References a Custom SCAN Name
You can set up a connect descriptor for Oracle Exadata Database Service on
Cloud@Customer System using a custom SCAN name.
Using this approach, you define a custom single client access name (SCAN) name in your
domain name server (DNS), which resolves to the three SCAN virtual IP addresses (VIPs).
• Use the following template to define a Net Services alias that references the custom SCAN
name:
alias-name = (DESCRIPTION=
(ADDRESS_LIST=(ADDRESS=(PROTOCOL=tcp)(HOST=scan-name)(PORT=1521)))
(CONNECT_DATA=(sid-or-service-entry)))
Where:
alias-name is the name you use to identify the alias.
scan-name is the custom SCAN name.
sid-or-service-entry identifies the database SID or service name using one of the
following formats:
• SID=sid-name. For example: SID=S12C1.
• SERVICE_NAME=service-name. For example:
SERVICE_NAME=PDB1.example.yourcloud.com.
Alternatively, you can use the easy connect method to specify a connect descriptor with
the following format:
scan-name:1521/sid-or-service-entry
For example:
exa1scan.example.com:1521/S12C1
4-70
Chapter 4
Connecting to an Oracle Exadata Database Service on Cloud@Customer System
Or
exa1scan.example.com:1521/PDB1.example.yourcloud.com
alias-name = (DESCRIPTION=
(CONNECT_TIMEOUT=timeout)
(ADDRESS_LIST=(ADDRESS=(PROTOCOL=tcp)(HOST=node)(PORT=1521)))
(CONNECT_DATA=(sid-or-service-entry)))
Where:
alias-name is the name you use to identify the alias.
timeout specifies a timeout period (in seconds), which enables you to terminate a connection
attempt without having to wait for a TCP timeout. The (CONNECT_TIMEOUT=timeout) parameter
is optional.
node is the hostname or IP address for the virtual machine that you want to use.
sid-or-service-entry identifies the database SID or service name using one of the following
formats:
• SID=sid-name. For example, SID=S12C1.
• SERVICE_NAME=service-name. For example,
SERVICE_NAME=PDB1.example.oraclecloudatcust.com.
Alternatively, you can use the easy connect method to specify a connect descriptor with the
following format:
node:1521/sid-or-service-entry
For example:
exa1node01.example.com:1521/S12C1
Or
exa1node01.example.com:1521/PDB1.example.oraclecloudatcust.com
4-71
5
How-to Guides
A collection of tasks and procedures for managing Oracle Exadata Database Service on
Cloud@Customer.
• Manage Database Security with Oracle Data Safe
• Connect to the Oracle Exadata Database Service on Cloud@Customer Service
Learn how to connect to an Oracle Exadata Database Service on Cloud@Customer
system using SSH, and how to connect to an Exadata Cloud@Customer database using
Oracle Net Services (SQL*Net).
• Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
Use the provided tools to manage the Infrastructure.
• Configure Oracle-Managed Infrastructure Maintenance
Oracle performs the updates to all of the Oracle-managed infrastructure components on
Oracle Exadata Database Service on Cloud@Customer.
• Manage VM Cluster Networks
Learn how to use the console to create, edit, download a configuration file, validate, and
terminate your infrastructure network.
• Manage VM Clusters
Learn how to manage your VM clusters on Oracle Exadata Database Service on
Cloud@Customer.
• Manage Software Images
• Create Oracle Database Homes on an Oracle Exadata Database Service on
Cloud@Customer System
Learn to create Oracle Database Homes on Oracle Exadata Database Service on
Cloud@Customer.
• Manage Oracle Database Homes on Oracle Exadata Database Service on
Cloud@Customer Systems
Learn to manage Oracle Database homes on Oracle Exadata Database Service on
Cloud@Customer.
• Manage Databases on Oracle Exadata Database Service on Cloud@Customer
• Manage Database Backup and Recovery on Oracle Exadata Database Service on
Cloud@Customer
Learn how to work with the backup and recovery facilities provided by Oracle Exadata
Database Service on Cloud@Customer.
• Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
Learn to update and patch the Oracle Exadata Database Service on Cloud@Customer
System
• Interim Software Updates
For authorized environments, learn how to download interim software updates.
• Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
Learn to configure and manage Data Guard groups in your VM cluster.
• Manage Keys Using an External Keystore
Review the use cases and implementation details of an external keystore.
5-1
Chapter 5
Manage Database Security with Oracle Data Safe
5-2
Chapter 5
Manage Database Security with Oracle Data Safe
incident investigations. Activity auditing collects audit records from databases and helps
you manage audit policies. Audit insights make it easy to identify inefficient audit policies,
while alerts based on audit data proactively notify you of risky activity.
• Sensitive Data Discovery: Knowing what sensitive data is managed in your applications
is critical for security and privacy. Data discovery scans your database for over 150
different types of sensitive data, helping you understand what types and how much
sensitive data you are storing. Use these reports to formulate audit policies, develop data
masking templates, and create effective access control policies.
• Data Masking: Minimizing the amount of sensitive data your organization maintains helps
you meet compliance requirements and satisfy data privacy regulations. Data masking
helps you remove risk from your non-production databases by replacing sensitive
information with masked data. With reusable masking templates, over 50 included masking
formats, and the ability to easily create custom formats for your organization's unique
requirements, data masking can streamline your application development and testing
operations.
• SQL Firewall Management: Protect against risks such as SQL injection attacks or
compromised accounts. Oracle SQL Firewall is a new security capability built into the
Oracle Database 23ai kernel and offers best-in-class protection against these risks. The
SQL Firewall feature in Oracle Data Safe lets you centrally manage and monitor the SQL
Firewall policies for your target databases. Data Safe lets you collect authorized SQL
activities of a database user, generate and enable the policy with allowlists of approved
SQL statements and database connection paths and provides a comprehensive view of
any SQL Firewall violations across the fleet of your target databases.
*Includes 1 million audit records per database per month if using the audit collection for Activity
Auditing
Get Started
To get started you just need to register your database with Oracle Data Safe:
• Pre-requisite: Obtain the necessary Identity and Access Management (IAM) permissions to
register your target database in Data Safe: Permissions to register an Oracle
Cloud@Customer Database
• Select an option for connecting your database to Data Safe
– Connect over VPN or FastConnect using a Data Safe private endpoint
If you have FastConnect or VPN Connect set up between your Cloud@Customer
environment and a virtual cloud network (VCN) in the Oracle Cloud Infrastructure
(OCI), you can register your database with Oracle Data Safe by using an Oracle Data
Safe private endpoint. You can create the private endpoint during the registration or
before. You can find more details on how to create the private endpoint under Create
an Oracle Data Safe Private Endpoint.
– Connect using a Data Safe on-premises connectors
If you don't have FastConnect or VPN set up between your Cloud@Customer
environment and OCI or you don't want to use it for Data Safe, you can register your
database with Data Safe by using an Oracle Data Safe on-premises connector. You
can create and install the on-premises connector during the registration or before. You
can find more details on how to create the connector under Create an Oracle Data
Safe On-Premises Connector.
• Register your Cloud@Customer database in Data Safe
5-3
Chapter 5
Manage Database Security with Oracle Data Safe
Security Assessment
Security Assessments are automatically scheduled once a week in Data Safe and provide an
overall picture of your database security posture. It analyzes your database configurations,
users and user entitlements, as well as security policies to uncover security risks and improve
the security posture of Oracle Databases within your organization. A security assessment
provides findings with recommendations for remediation activities that follow best practices to
reduce or mitigate risk.
Start by reviewing the security assessment report for your database: View the latest
assessment for a target database
You can find more details on Security Assessment under Security Assessment Overview.
User Assessment
User Assessments are automatically scheduled once a week in Data Safe and help you to
identify highly privileged user accounts that could pose a threat if misused or compromised.
User Assessment reviews information about your users in the data dictionaries on your target
databases and then calculates a potential risk for each user, based on system privileges and
role grants.
Start by reviewing the user assessment report for your database: View the latest user
assessment for a target database
You can find more details on User Assessment under User Assessment Overview.
Data Discovery
Data Discovery searches for sensitive columns in your database. It comes with over 150 pre-
defined sensitive types and you can also create your own sensitive types. You tell Data
Discovery if you want to scan your entire database or just certain schemas and what type of
sensitive information to look for, and it finds the sensitive columns that meet your criteria and
stores them in a sensitive data model (SDM).
Start by discovering sensitive data in your database: Create Sensitive Data Models
You can find more details on Data Discovery under Data Discovery Overview.
Data Masking
Data masking, also known as static data masking helps you to replace sensitive or confidential
information in your non-production databases with realistic and fully functional data with similar
characteristics as the original data. Data Safe comes with pre-defined masking formats for
each of the pre-defined sensitive types that can also be leveraged for your own sensitive types.
Once you know where sensitive data is stored in your database (for instance after running
Data Discovery in Data Safe), you can start by creating a masking policy: Create Masking
Policies
After you created a masking policy and copied your production database, you can mask your
non-production copy: Mask Sensitive Data on a Target Database
You can find more details on Data Masking under Data Masking Overview.
5-4
Chapter 5
Connect to the Oracle Exadata Database Service on Cloud@Customer Service
Activity Auditing
Activity Auditing in Oracle Data Safe helps to ensure accountability and improve regulatory
compliance. With Activity Auditing, you can collect and retain audit records per industry and
regulatory compliance requirements and monitor user activities on Oracle databases with pre-
defined reports and alerts. For example, you can audit access to sensitive data, security-
relevant events, administrator and user activities, activities recommended by compliance
regulations like the Center for Internet Security (CIS), and activities defined by your own
organization.
If you are using the audit collection in Data Safe, up to 1 million audit records per target
database per month are included for your Cloud@Customer database.
To use activity auditing, start the audit trail for your target database in Data Safe: Start an Audit
Trail
Once the audit trail is started, you can monitor and analyze your audit data with pre-defined
audit reports: View a Predefined or Custom Audit Report
You can find more details on Activity Auditing under Activity Auditing Overview.
SQL Firewall*
SQL Firewall in Oracle Data Safe lets you centrally manage the SQL Firewalls and provides a
comprehensive view of SQL Firewall violations across the fleet of your target databases. Data
Safe lets you collect authorized SQL activities of a database user you wish to protect, monitor
the progress of the collection, generate and enable the policy with allowlists of approved SQL
statements and database connection paths.
Start by enabling the SQL Firewall in your 23ai target database: Enable SQL Firewall On Your
Target Database.
Next, you need to generate and enable a SQL Firewall policy with allowlists for the database
user you wish to protect: Generate and Enforce SQL Firewall Policies.
Once you start enforcing the SQL Firewall policy, you can monitor and analyze the violations in
the pre-defined violation reports: View and Manage Violations Reports.
You can find more details on SQL Firewall under SQL Firewall Overview.
*SQL Firewall is only available for Oracle Databases 23ai.
5-5
Chapter 5
Connect to the Oracle Exadata Database Service on Cloud@Customer Service
Note:
The public keys are stored in the authorized_keys file at ~/.ssh/
authorized_keys. Separate authorized_keys files are located under the home
directories of the operating system users. By default, only the opc user account
has an authorized_keys entry and is able to log in remotely. Do not remove or
alter the automatically generated entry in authorized_keys for the opc user.
• The host name or IP address for the virtual machine that you want to access.
See, Using the Console to Check the Status of a VM Cluster Virtual Machine.
Related Topics
• Using the Console to Check the Status of a VM Cluster Virtual Machine
Review the health status of a VM cluster virtual machine.
5-6
Chapter 5
Connect to the Oracle Exadata Database Service on Cloud@Customer Service
• Connect as the user opc to perform operations that require root or oracle access to
the virtual machine, such as backing up or patching; this user can use the sudo
command to gain root or oracle access to the VM.
7. Confirm that the When username is not specified option is set to Prompt.
8. In the Category tree, expand SSH and then click Auth.
The Auth panel is displayed.
9. Click the Browse button next to the Private key file for authentication field. Then, in the
Select private key file window, navigate to and open the private key file that matches the
public key that is associated with the deployment.
10. In the Category tree, click Session.
The PuTTY Configuration window closes and the PuTTY terminal window displays.
If this is the first time you are connecting to the VM, the PuTTY Security Alert window is
displayed, prompting you to confirm the public key. Click Yes to continue connecting.
5-7
Chapter 5
Connect to the Oracle Exadata Database Service on Cloud@Customer Service
4. Identify the database instances for the database that you want to access. For example:
5. Configure the environment settings for the database that you want to access. For example:
. oraenv
ORACLE_SID = [oracle] ? s12c
The Oracle base has been set to /u02/app/oracle
export ORACLE_SID=s12c1
5-8
Chapter 5
Connect to the Oracle Exadata Database Service on Cloud@Customer Service
6. You can use the svrctl command to display more detailed information about the
database. For example:
sqlplus / as sysdba
Connected to:
Oracle Database 12c EE Extreme Perf Release 12.2.0.1.0 - 64bit Production
5-9
Chapter 5
Connect to the Oracle Exadata Database Service on Cloud@Customer Service
Note:
This documentation provides basic requirements for connecting to your Oracle
Exadata Database Service on Cloud@Customer databases by using Oracle Net
Services.
5-10
Chapter 5
Connect to the Oracle Exadata Database Service on Cloud@Customer Service
Connecting to a Database Using a Connect Descriptor that References All of the SCAN VIPs
You can set up a connect descriptor for Oracle Exadata Database Service on
Cloud@Customer System using multiple SCAN listeners.
This approach requires you to supply all of the single client access name (SCAN) virtual IP
(VIP) addresses, and enables Oracle Net Services to connect to an available SCAN listener.
• Use the following template to define a Net Services alias, which is typically used to provide
a convenient name for the connect descriptor:
alias-name = (DESCRIPTION=
(ADDRESS_LIST=
(ADDRESS=(PROTOCOL=tcp)(HOST=SCAN-VIP-1)(PORT=1521))
(ADDRESS=(PROTOCOL=tcp)(HOST=SCAN-VIP-2)(PORT=1521))
(ADDRESS=(PROTOCOL=tcp)(HOST=SCAN-VIP-3)(PORT=1521)))
(CONNECT_DATA=(sid-or-service-entry)))
Where:
alias-name is the name you use to identify the alias.
SCAN-VIP-[1–3] are the IP addresses for the SCAN VIPs.
sid-or-service-entry identifies the database SID or service name using one of the
following formats:
• SID=sid-name. For example: SID=S12C1.
• SERVICE_NAME=service-name. For example:
SERVICE_NAME=PDB1.example.yourcloud.com.
Note:
By default, Oracle Net Services randomly selects one of the addresses in the
address list to balance the load between the SCAN listeners.
5-11
Chapter 5
Connect to the Oracle Exadata Database Service on Cloud@Customer Service
Connecting to a Database Use a Connect Descriptor that References a Custom SCAN Name
You can set up a connect descriptor for Oracle Exadata Database Service on
Cloud@Customer System using a custom SCAN name.
Using this approach, you define a custom single client access name (SCAN) name in your
domain name server (DNS), which resolves to the three SCAN virtual IP addresses (VIPs).
• Use the following template to define a Net Services alias that references the custom SCAN
name:
alias-name = (DESCRIPTION=
(ADDRESS_LIST=(ADDRESS=(PROTOCOL=tcp)(HOST=scan-name)(PORT=1521)))
(CONNECT_DATA=(sid-or-service-entry)))
Where:
alias-name is the name you use to identify the alias.
scan-name is the custom SCAN name.
sid-or-service-entry identifies the database SID or service name using one of the
following formats:
• SID=sid-name. For example: SID=S12C1.
• SERVICE_NAME=service-name. For example:
SERVICE_NAME=PDB1.example.yourcloud.com.
Alternatively, you can use the easy connect method to specify a connect descriptor with
the following format:
scan-name:1521/sid-or-service-entry
For example:
exa1scan.example.com:1521/S12C1
Or
exa1scan.example.com:1521/PDB1.example.yourcloud.com
5-12
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
Example 5-1 Defining a Net Service Alias That Directly References the Node
alias-name = (DESCRIPTION=
(CONNECT_TIMEOUT=timeout)
(ADDRESS_LIST=(ADDRESS=(PROTOCOL=tcp)(HOST=node)(PORT=1521)))
(CONNECT_DATA=(sid-or-service-entry)))
Where:
alias-name is the name you use to identify the alias.
timeout specifies a timeout period (in seconds), which enables you to terminate a connection
attempt without having to wait for a TCP timeout. The (CONNECT_TIMEOUT=timeout) parameter
is optional.
node is the hostname or IP address for the virtual machine that you want to use.
sid-or-service-entry identifies the database SID or service name using one of the following
formats:
• SID=sid-name. For example, SID=S12C1.
• SERVICE_NAME=service-name. For example,
SERVICE_NAME=PDB1.example.oraclecloudatcust.com.
Alternatively, you can use the easy connect method to specify a connect descriptor with the
following format:
node:1521/sid-or-service-entry
For example:
exa1node01.example.com:1521/S12C1
Or
exa1node01.example.com:1521/PDB1.example.oraclecloudatcust.com
5-13
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
Caution:
Avoid entering confidential information when assigning descriptions, tags, or friendly
names to your cloud resources through the Oracle Cloud Infrastructure Console, the
APIs, or the command-line interface.
5-14
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
Note:
Changing the home region of your ExaDB-C@C Infrastructure will not affect billing.
Prerequisites
• The customer must provide the new region for changing the home region of their ExaDB-
C@C Infrastructure.
• Subscribe the tenancy to the new region.
• Keep the permissions and network connectivity configuration details handy.
Deployment process
1. Customer opens an SR for changing the home region for their ExaDB-C@C Infrastructure.
2. Oracle processes the SR and assigns a field engineer (FE).
3. FE schedules time to visit the customer data center collects configuration details, and runs
precheck.
4. FE works with the customer to obtain credentials (API key/IAM access) for the new region.
5. Customer opens the required endpoints/ports for the new region.
6. FE executes the scripts and validates connectivity.
7. FE validates OCI resources created in the OCI Control Plane for the new region.
8. Customer recreates the needed configuration.
5-15
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
Note:
Customers will need to set the following attributes in the new region again as these
are not currently carried over after changing the home region.
5-16
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
5-17
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
5-18
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
• Exadata Infrastructures deployed with X8M generation at install time can only be scaled
with X8M or higher generation storage servers. X9M and X10M storage servers used to
scale X8M infrastructure will only present the same total usable capacity as other X8M
storage servers that are already part of the infrastructure.
• Exadata Infrastructures deployed with X9M generation at install time can only be scaled
with X9M or higher generation storage servers. X10M storage servers used to scale X9M
infrastructure will only present the same total usable capacity as other X9M storage
servers that are already part of the infrastructure.
• Exadata Infrastructures deployed with X10M generation at install time can only be scaled
with X10M or higher generation storage servers. X11M storage servers used to scale
X10M infrastructure will only present the same total usable capacity as other X10M storage
servers that are already part of the infrastructure.
Exadata Infrastructures deployed with additional storage servers will be configured as an
Elastic shape with the total number of storage servers and usable capacity clearly called out
for the given infrastructure.
Before you can scale the number of Exadata storage servers, review the site and network
requirements, and the checklists to prepare and deploy Exadata Cloud@Customer. Ensure
that you have worked with sales and followed the procurement process. The following figure
provides you with an overview of the order and deployment process.
Multi-Rack Expansion
• Rack Minimum Configuration
– X11M/X10M
* Maximum 16 total servers in the initial rack
* Maximum 18 total servers in the expansion rack
– X8M/X9M
* Base system expandable to a single rack
5-19
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
5-20
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
5-21
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
2. Under Region, select the region that you want to associate with the Oracle Exadata
infrastructure.
The region that is associated with your Oracle Exadata infrastructure cannot be changed
after the Oracle Exadata infrastructure is created. Therefore, ensure that you select the
most appropriate region for your infrastructure. Consider the following factors:
• Consider any business policies or regulations that preclude the use of a particular
region. For example, you can be required to maintain all operations within national
boundaries.
• Consider the physical proximity of the region to your data center. Needless extra
physical separation adds unnecessary latency to network communications between
Oracle Cloud Infrastructure and your corporate data center.
3. Click Exadata Infrastructure.
4. Click Create Exadata Infrastructure.
5. In the Create Exadata Infrastructure page, provide the requested information:
• Provide the display name: The display name is a user-friendly name that you can
use to identify the Exadata infrastructure. The name doesn't need to be unique,
because an Oracle Cloud Identifier (OCID) uniquely identifies the Oracle Exadata
infrastructure.
• Choose a compartment: From the list of available compartments, choose the
compartment that you want to contain the Oracle Exadata infrastructure.
For more information, see Understanding Compartments.
• Oracle Cloud Infrastructure region: The region that is associated with your Oracle
Exadata infrastructure cannot be changed after the Oracle Exadata infrastructure is
created. Therefore, check the displayed region to ensure that you are using the most
appropriate region for your infrastructure.
See step 2 (earlier in this procedure) for further considerations. To switch regions now,
use the Region menu at the top of the console.
• Select the Exadata system model: From the list, choose an Oracle Exadata
hardware.
The Oracle Exadata system model and system shape combine to define the amount of
CPU, memory, and storage resources that are available in the Exadata infrastructure.
For more information, see System Configuration.
• Compute and storage configuration:
– Database server type (displayed if Exadata Cloud@Customer X11M is
selected):
* Choices: X11M-BASE, X11M, X11M-L, and X11M-XL
– Storage server type (displayed if Exadata Cloud@Customer X11M is
selected):
* Choices: X11M-BASE and X11M-HC
– Database servers:
* X11M/X10M: You can expand the database and storage servers in the initial
rack up to 16 total servers.
* X8M/X9M: You can add a minimum of 2 and extend up to a maximum of 8
database servers.
– Storage servers:
* X11M/X10M: You can expand the database and storage servers in the initial
rack up to 16 total servers.
5-22
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
Note:
Resource allocation will display ECPUs for X11M database servers and
OCPUs for X10M and older generation Exadata infrastructure.
ECPU: An ECPU is an abstracted measure of compute resources. ECPUs
are based on the number of cores elastically allocated from a pool of
compute and storage servers.
Note:
If you want to set a time zone other than UTC or the browser-detected
time zone, then select the Select another time zone option, select a
Region or country, and then select the corresponding Time zone.
If you do not see the region or country you want, then select
Miscellaneous, and then select an appropriate Time zone.
5-23
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
second control plane server to your corporate network using the control plane
network.
– Netmask: Specify the IP netmask for the control plane network.
– Gateway: Specify the IP address of the control plane network gateway.
– HTTP Proxy: (Optional) You can choose to use this field to specify your corporate
HTTP proxy. The expected format is as follows, where server is the server name,
domain is the domain name, and port is the assigned port:
http://server.domain:port
For example:
http://proxy.example.com:80
For enhanced security, when possible, Oracle recommends that you use an HTTP
proxy.
– Enable Control Plane Server Offline Report: Enabling the Control Plane Server
(CPS) offline report helps in diagnosing connectivity issues between the CPS and
OCI endpoints, should they arise.
To view the report, do the following:
a. Find the CPS IP addresses.
For more information, see Using the Console to View Exadata Infrastructure
Network Configuration Details.
b. From your local network, access the report over HTTP.
To view the report in HTML format, use http://<CPSPublicIP>:18080/report
To view the report in JSON format, use http://<CPSPublicIP>:18080/
report/json
For more information, see ExaCC gen2: Troubleshooting VPN/WSS connection
from Customer Side.
• Configure the Oracle Exadata system networks
Each Oracle Exadata Database Service on Cloud@Customer system contains two
system networks, which are not connected to your corporate network. The following
settings define IP address allocations for these networks:
– Administration Network CIDR Block: Specifies the IP address range for the
administration network using CIDR notation. The administration network provides
connectivity that enables Oracle to administer the Exadata system components,
such as the Exadata compute servers, storage servers, network switches, and
power distribution units. You can accept the suggested default, or specify a custom
value.
The minimum CIDR block is /23. The maximum CIDR block is /21. Because this
CIDR block cannot be changed in the future, it is recommended to use a /21 CIDR
block to maximize flexibility for future possible expansion. However, the below
table can be used for further guidance.
– Secure Fabric Network: Specifies the IP address range for the Exadata secure
fabric network using CIDR notation. The Exadata secure fabric network provides
the high-speed low-latency interconnect used by Exadata software for internal
communications between various system components. You can accept the
suggested default, or specify a custom value.
5-24
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
The minimum CIDR block is /22. The maximum CIDR block is /19. Because this
CIDR block cannot be changed in the future, it is recommended to use a /19 CIDR
block to maximize flexibility for future possible expansion. However, the below
table can be used for further guidance.
Table 5-7 X11M and X10M (Quarter Rack X10M, Quarter Rack X10M-L, and
Quarter Rack X10M-XL) CIDR Requirements
5-25
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
Note:
You cannot change this value in the future. Consider all future
expansions when making this choice. Otherwise, your future
expandability may be limited.
5-26
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
– DNS Servers: Provide the IP address of a DNS server that is accessible using the
control plane network. You may specify up to three DNS servers.
– NTP Servers: Provide the IP address of an NTP server that is accessible using
the control plane network. You may specify up to three NTP servers.
• Network bonding mode
Note:
The use of LACP requires both the server and the switch(es) have
compatible settings to allow LACP to work properly. To use LACP for ExaDB-
C@C, you must configure your network switches such that they are
compatible with the following parameter from the Linux ifcfg-bondethx
configuration file:
Note that the BONDING_OPTS line in the host operating system cannot be
changed, so customer switch settings must be compatible with the
parameters stated above without alteration.
The client and backup networks are configured to use active-backup bonding (mode 1)
by default. Since the setting gets applied to each network interface individually, you
have the flexibility to configure client and backup network interfaces independently of
each other. For example, you can configure the backup network to LACP and the client
network to active-backup, if desired.
– Enable LACP for Client Network: Select to configure the client network with
LACP mode 4 (mode=802.3ad) active/active dynamic link.
– Enable LACP for Backup Network: Select to configure the backup network with
LACP mode 4 (mode=802.3ad) active/active dynamic link.
You can check the bonding mode of the client and backup networks under the Network
section on the Exadata Infrastructure Details page.
– Active/Backup indicates that the network interfaces are configured to use the
default mode 1.
– LACP indicates that the network interfaces are mode 4 enabled.
• Provide maintenance details
– Click Configure maintenance.
On the resulting Configure maintenance page, configure the following:
* Maintenance scheduling preference: Oracle managed schedule
* Choose a maintenance method:
* Rolling: By default, Exadata Infrastructure is updated in a rolling
fashion, one server at a time with no downtime.
* Non-rolling: Update database and storage servers at the same time.
The non-rolling maintenance method minimizes maintenance time but
incurs full system downtime.
5-27
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
Note:
Custom action timeout applies only to DB servers. Customer
can specify a minimum 15 minutes and a maximum of 120
minutes of custom action time-out before DB server patching
starts. Within this time, they can perform whatever actions
they have planned. In case, they want to extend the custom
action, they can extend the same by going to "edit
maintenance window" option. If custom action is in progress,
customer get 2 options - either extend Custom action
timeout or resume maintenance window.
Default: 30 minutes
Maximum: 120 minutes
* Maintenance scheduling preference: Customer managed schedule
* Maintenance schedule: Define maintenance preferences for this
infrastructure
* Configure maintenance preference: Define maintenance time
preferences for each quarter. If more than one preference is defined
for a quarter, Oracle automation will select one of them to perform
maintenance on all components in your infrastructure.
Select at least one month every two quarters.
* Specify a schedule: Choose your preferred week, weekday, start
time, and lead time for infrastructure maintenance.
* Optional. Under Week of the month, specify which week of the
month, maintenance will take place. Weeks start on the 1st, 8th,
15th, and 22nd days of the month, and have a duration of 7 days.
Weeks start and end based on calendar dates, not days of the
week. Maintenance cannot be scheduled for the fifth week of
months that contain more than 28 days. If you do not specify a
week of the month, Oracle will run the maintenance update in a
week to minimize disruption.
* Optional. Under Day of the week, specify the day of the week on
which the maintenance will occur. If you do not specify a day of
the week, Oracle will run the maintenance update on a weekend
day to minimize disruption.
5-28
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
* Optional. Under Hour of the day, specify the hour during which
the maintenance run will begin. If you do not specify a start hour,
Oracle will pick the least disruptive time to run the maintenance
update.
* Under Notification Lead Time, specify the minimum number of
weeks ahead of the maintenance event you would like to receive a
notification message. Your lead time ensures that a newly
released maintenance update is scheduled to account for your
required minimum period of advanced notification.
* Choose a maintenance method:
* Rolling: By default, Exadata Infrastructure is updated in a
rolling fashion, one server at a time with no downtime.
* Non-rolling: Update database and storage servers at the
same time. The non-rolling maintenance method minimizes
maintenance time but incurs full system downtime.
* Enable custom action before performing maintenance on DB
servers: Enable custom action only if you want to perform
additional actions outside of Oracle’s purview. For maintenance
configured with a rolling software update, enabling this option will
force the maintenance run to wait for a custom action with a
configured timeout before starting maintenance on each DB
server. For maintenance configured with non-rolling software
updates, the maintenance run will wait for a custom action with a
configured timeout before starting maintenance across all DB
servers. The maintenance run, while waiting for the custom action,
may also be resumed prior to the timeout.
* Custom action timeout (in minutes): Timeout available to
perform custom action before starting maintenance on the DB
Servers.
Note:
Custom action timeout applies only to DB servers.
Customer can specify a minimum 15 minutes and a
maximum of 120 minutes of custom action time-out
before DB server patching starts. Within this time,
they can perform whatever actions they have
planned. In case, they want to extend the custom
action, they can extend the same by going to "edit
maintenance window" option. If custom action is in
progress, customer get 2 options - either extend
Custom action timeout or resume maintenance
window.
Default: 30 minutes
Maximum: 120 minutes
* Show advanced options:
* Enable monthly security infrastructure maintenance: Select
this check box to perform monthly security infrastructure
maintenance.
5-29
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
Note:
After creating the infrastructure, you can find the maintenance method,
maintenance schedule, DB Server version, and Storage Server version
details under the Maintenance and Version sections on the
Infrastructure Details page.
5-30
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
– Tags: (Optional) You can choose to apply tags. If you have permission to create a
resource, then you also have permission to apply free-form tags to that resource.
To apply a defined tag, you must have permission to use the tag namespace. For
more information about tagging, see Resource Tags. If you are not sure if you
should apply tags, then skip this option (you can apply tags later) or ask your
administrator.
6. Click Create.
If all of your inputs are valid, then the Infrastructure Details page appears. The page
outlines the next steps in the provisioning process. Initially, after creation, the state of the
Oracle Exadata infrastructure is Requires-Activation.
Related Topics
• Understanding Compartments
• System Configuration Options for Oracle Exadata Database Service on Cloud@Customer
Oracle Exadata Database Service on Cloud@Customer is now shipping with the latest
generation Exadata infrastructure, Exadata X11M.
• ExaCC gen2: Troubleshooting VPN/WSS connection from Customer Side
• Resource Tags
Note:
The use of LACP requires both the server and the switch(es) have compatible
settings to allow LACP to work properly. To use LACP for ExaDB-C@C, you must
configure your network switches such that they are compatible with the following
parameter from the Linux ifcfg-bondethx configuration file:
Note that the BONDING_OPTS line in the host operating system cannot be changed, so
customer switch settings must be compatible with the parameters stated above
without alteration.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click Exadata Infrastructure.
3. Click the name of the Exadata infrastructure that you want to edit.
The Infrastructure Details page displays information about the selected Oracle Exadata
infrastructure.
4. Click Edit network bonding.
Edit Network Bonding page is displayed.
5. Select or clear the Enable LACP for Client Network and Enable LACP for Backup
Network checkboxes.
Apply Network Bonding Change dialog is displayed.
5-31
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
Note:
This action initiates a non-rolling update process and bonding modes are
changed simultaneously on all Database Servers. You are required to manage
your own switch settings on your network accordingly. You may experience a
network outage and should plan for application downtime until your switch
settings and ExaDB-C@C settings are made to match.
6. Click Save to apply the changes or Cancel to retain the existing settings.
The state of Exadata Infrastructure changes to Updating state until the back-end change
on the bonding mode setting is completed.
You must change your switch settings to correspond to the BONDING_OPTS, as stated above.
The state changes to Waiting for Connectivity until you make the correct switch changes.
While in this state, the bonding mode validation is continuously re-tried until it passes
successfully.
When the network validation succeeds, then the state of the Exadata Infrastructure
changes to Active.
Note:
If you need to revert your settings while in the "Waiting for Connectivity" state,
you can edit the network bonding mode again using the same procedure
described above. Note that Oracle has no control over your switch settings, so
you will need to manage your switch settings to return them to the original
settings if changed.
5-32
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Select Region and Compartment, and provide the region and the compartment where the
Oracle Exadata infrastructure you want to edit is located.
3. Click Exadata Infrastructure.
4. Click the name of the Exadata infrastructure that you want to edit.
The Infrastructure Details page displays information about the selected Oracle Exadata
infrastructure.
5. Click Edit Infrastructure Networking.
6. Use the Edit Infrastructure Networking dialog to edit the Oracle Exadata infrastructure
networking:
a. Time zone: The default time zone for the Exadata Infrastructure is UTC, but you can
specify a different time zone. The time zone options are those supported in both the
Java.util.TimeZone class and the Oracle Linux operating system.
Note:
If you want to set a time zone other than UTC or the browser-detected time
zone, then select the Select another time zone option, select a Region or
country, and then select the corresponding Time zone.
If you do not see the region or country you want, then select Miscellaneous,
and then select an appropriate Time zone.
http://server.domain:port
For example:
http://proxy.example.com:80
5-33
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
For enhanced security, when possible, Oracle recommends that you use an HTTP
proxy.
c. Configure the Exadata system networks
Each Oracle Exadata Database Service on Cloud@Customer system contains two
system networks, which are not connected to your corporate network. The following
settings define IP address allocations for these networks:
• Administration Network CIDR Block: Specifies the IP address range for the
administration network using CIDR notation. The administration network provides
connectivity that enables Oracle to administer the Exadata system components,
such as the Exadata compute servers, storage servers, network switches, and
power distribution units.
The maximum CIDR block prefix length is /23, which defines the smallest block of
IP addresses that are required for the network. To allow for possible future
expansion within Oracle Exadata Database Service on Cloud@Customer, work
with your network team to reserve enough IP addresses to accommodate any
future growth. The minimum CIDR block prefix length is /16.
Ensure that the IP address range does not conflict with other hosts your corporate
network, and does not overlap with the InfiniBand network CIDR block.
• Secure Fabric Network CIDR Block: Specifies the IP address range for the
Exadata InfiniBand network using CIDR notation. The Exadata InfiniBand network
provides the high-speed low-latency interconnect used by Exadata software for
internal communications between various system components.
The maximum CIDR block prefix length is /22, which defines the smallest block of
IP addresses that are required for the network. To allow for possible future
expansion within Oracle Exadata Database Service on Cloud@Customer, work
with your network team to reserve enough IP addresses to accommodate any
future growth. The minimum CIDR block prefix length is /19.
Ensure that the IP address range does not conflict with other hosts your corporate
network, and does not overlap with the administration network CIDR block.
d. Configure DNS and NTP services
Each Oracle Exadata Database Service on Cloud@Customer system requires access
to Domain Names System (DNS) and Network Time Protocol (NTP) services. The
following settings specify the servers that provide these services to the Exadata
infrastructure:
• DNS Servers: Provide the IP address of a DNS server that is accessible using the
control plane network. You can specify up to three DNS servers.
• NTP Servers: Provide the IP address of an NTP server that is accessible using
the control plane network. You may specify up to three NTP servers.
7. Click Save Changes.
5-34
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
5-35
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
Using the Console to Check the Status of Oracle Exadata Database Service on
Cloud@Customer Infrastructure
To find the status of your Oracle Exadata Database Service on Cloud@Customer
infrastructure, use this procedure to check the Infrastructure Details page.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Choose the Region and Compartment that contains the Oracle Exadata infrastructure
that you are interested in.
3. Click Exadata Infrastructure.
4. Click the name of the Oracle Exadata infrastructure that you are interested in.
The Infrastructure Details page displays information about the selected Oracle Exadata
infrastructure.
5. Check the icon on the Infrastructure Details page. The color of the icon and the text below
it indicates the status of the Oracle Exadata infrastructure.
• Creating: Yellow icon. The Oracle Exadata infrastructure definition is being created in
the control plane.
• Requires Activation: Yellow icon. The Oracle Exadata infrastructure is defined in the
control plane, but it must be provisioned and activated before it can be used.
• Active: Green icon. The Oracle Exadata infrastructure is successfully provisioned and
activated.
• Deleting: Gray icon. The Oracle Exadata infrastructure is being deleted by using the
Console or API.
• Deleted: Gray icon. The Oracle Exadata infrastructure is deleted, and is no longer
available. This state is transitory. It is displayed for a short time, after which the Oracle
Exadata infrastructure is no longer displayed.
• Activation Failed: Red icon. An error condition currently prevents the activation of the
Oracle Exadata infrastructure. Typically, this state is auto-correcting, and does not
require user intervention.
Note:
You can add database servers and storage servers together or add them individually.
You cannot scale infrastructure beyond the point you previously reserved network resources
for when creating your infrastructure originally. The below table identifies the required network
ranges. Note that the network addresses and ranges originally identified for these networks at
initial infrastructure deployment cannot be changed. If you do not have sufficient network
resources reserved already, you will not be able to scale the infrastructure at this point.
5-36
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
Table 5-10 X11M and X10M (Quarter Rack X10M, Quarter Rack X10M-L, and Quarter
Rack X10M-XL) CIDR Requirements
5-37
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Choose the Region and Compartment that contains the Oracle Exadata infrastructure
that you are interested in.
3. Click Exadata Infrastructure.
4. Click the name of the Oracle Exadata infrastructure for which you want to download a file
containing the infrastructure configuration details.
The Infrastructure Details page displays information about the selected Oracle Exadata
infrastructure.
5. Click Scale Infrastructure.
6. Select the number of database servers from the Additional database servers field.
7. Select the number of storage servers from the Additional storage servers field.
5-38
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
8. Select the Multi-rack deployment checkbox, if you want the infrastructure to span multiple
racks.
9. Click Scale.
Note:
When you provide the generated infrastructure configuration file to Oracle,
ensure that it has not been altered in any way. Also, ensure that you do not edit
the Oracle Exadata infrastructure after you download the configuration file and
provide it to Oracle.
Note:
Once the activation file is uploaded and the activate process is initiated, you cannot
change the Scale Infrastructure request or cancel this whole operation. If there is an
activation failure, then contact the field engineer to resolve the issue.
5-39
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
Using the Console to Make Storage Capacity from New Server Available for VM
Clusters Consumption
To make storage capacity from the new servers for VM clusters consumption, complete this
procedure.
1. Download the activation file.
2. Open the navigation menu. Under Oracle Databases, click Exadata Database Service
on Cloud@Customer.
3. Choose the Region and Compartment that contains the Oracle Exadata infrastructure
that you are interested in.
4. Click Exadata Infrastructure.
5. Click the name of the Oracle Exadata infrastructure that you want to activate.
The Infrastructure Details page displays information about the selected Oracle Exadata
infrastructure.
6. Click Activate New Storage Server(s).
7. Review the advisory on the Activate New Server dialog, and then click Activate.
5-40
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
Note:
While Activate New Server operation is in progress,
• The system rebalances the storage to ensure that the capacity from the newly
added storage servers is available for VM Cluster consumption. This rebalance
will run with a ASM power limit of 4 independent of what you have set within your
ASM configuration. If you would like the rebalance to complete faster, you can
update the power limit after the rebalance process has begun. Monitor the ASM
rebalance process to ensure it successfully completes (which will allow the add
storage capacity workflow to complete).
• You cannot create or delete VM Clusters.
• Existing VM Clusters provisioned are in the Available life cycle state. However,
they do not support scale up or down of resources allocated to the VM cluster,
except for OCPU allocation. OCPU allocation changes are allowed even while
Activate New Server operation is in progress.
• During the add storage operation, if ASM detects insufficient space in the VM
cluster to perform the disk group shrinking operation, it automatically allocates
additional space to the VM to complete the process. This space is then deducted
from the total storage being added to the infrastructure. The VM cluster reflects
the additional space allocated to the VM.
Note:
When you perform scale VM Cluster Exadata storage operation, newly added
Exadata storage capacity is also available for consumption. Similarly, when you
create a VM cluster, the Console displays the newly added Exadata storage
capacity (shared Exadata storage) as available storage.
Related Topics
• Introduction to Scale Up or Scale Down Operations
With the Multiple VMs per Exadata system (MultiVM) feature release, you can scale up or
scale down your VM cluster resources.
• Using the Console to Create an ASM VM Cluster
To create your ASM VM cluster, be prepared to provide values for the fields required for
configuring the infrastructure.
5-41
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
5-42
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Select Region and Compartment, and provide the region and compartment that contains
the Oracle Exadata infrastructure that you want to delete.
3. Click Exadata Infrastructure.
4. Click the name of the Oracle Exadata infrastructure that you want to delete.
The Infrastructure Details page displays information about the selected Oracle Exadata
infrastructure.
5. Click More actions, and then Delete.
6. In the resulting dialog, enter the Oracle Exadata infrastructure name and click Delete
Exadata Infrastructure to confirm the action.
Using the Console to Manage Tags for Your Oracle Exadata Database Service on
Cloud@Customer Resources
1. Open the navigation menu. Under Oracle Database, click Exadata Cloud@Customer.
2. Choose your Compartment.
3. Find the Exadata Infrastructure, VM Cluster Network, VM Cluster, Backup Destination,
Database Home, or Database resource you're interested in, and click the name.
4. Click the Tags tab to view or edit the existing tags. Or, click More Actions and then Apply
Tags to add new ones.
Related Topics
• Resource Tags
5-43
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
2. Select Region and Compartment, and provide the region and compartment that contains
the Oracle Exadata infrastructure for which you want to view contact details.
3. Click Exadata Infrastructure.
4. Click the name of the Oracle Exadata infrastructure for which you want to view contact
details.
The Infrastructure Details page displays information about the selected Oracle Exadata
infrastructure.
5. Find the CSI and the primary contact under Maintenance.
The operations team sets the infrastructure maintenance Service Level Objective (SLO) to
Degraded:
• If the primary contact CSI verification has failed.
• If the primary contact is missing.
• If the primary contact is verified and unresponsive.
Also, a warning message is displayed on the Console as follows:
"Ensure that the primary contact associated with your Customer Support Identifier
(CSI) is available for Oracle support to coordinate maintenance-related activities.
The infrastructure maintenance Service Level Objective (SLO) is set to degraded
status without proper primary contact."
5-44
Chapter 5
Manage Oracle Exadata Database Service on Cloud@Customer Infrastructure
5-45
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
Related Topics
• REST APIs
• Security Credentials
• Software Development Kits and Command Line Interface
• ActivateExadataInfrastructure
• CreateExadataInfrastructure
• DeleteExadataInfrastructure
• DownloadExadataInfrastructureConfigFile
• GenerateRecommendedVmClusterNetwork
• GetExadataInfrastructure
• ListExadataInfrastructure
• UpdateExadataInfrastructure
• AddStorageCapacityExadataInfrastructure
5-46
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
Updating the software running on the infrastructure with the latest product and security fixes
protects your data and the overall compliance of the Oracle Cloud. These updates are
performed in an automated way and include all the best practices, relieving you of the need to
invest any effort in maintaining your infrastructure. Oracle updates include the physical
database server hosts, storage servers, network fabric switches, management switches, power
distribution units (PDUs), integrated lights-out management (ILOM) interfaces, and control
plane servers.
Oracle performs two types of infrastructure maintenance:
• Quarterly maintenance is applied every three months and can include product fixes,
enhancements, and security fixes.
• Monthly maintenance only applies critical security fixes that can be applied online to
ensure components are maintained at the highest security standards with any security
vulnerabilities fixed as soon as possible.
Quarterly Maintenance
Oracle minimizes the impact of quarterly maintenance on your applications using rolling
maintenance operations, preserving database availability throughout the update process.
Rolling maintenance reboots each database server, one at a time, with at most one server
offline at any time. Applications designed for high availability automatically and transparently
migrate their database connections between available database instances without disruption,
eliminating the need for scheduling downtime. Storage server updates are also applied in a
rolling manner. Rebooting storage servers has no effect on the database service, and thus has
no impact on your applications.
Oracle allows you to fully control quarterly maintenance schedules, so you can schedule
maintenance during a period which will have the least impact on your business users. You
have full control and visibility over when quarterly maintenance will be applied, even allowing
you to schedule the maintenance across multiple maintenance windows. Scheduling is
simplified using a Maintenance Scheduling Policy, which aims to standardize scheduling
across the fleet to ensure consistency and efficiency. By defining the policy once and applying
it to multiple resources, it streamlines the scheduling process. You may also reschedule
maintenance should unexpected business issues occur.
Monthly Security Maintenance
Monthly security maintenance is performed on the database servers online, with no reboot,
and no impact to your applications. Monthly updates are applied to storage servers in a rolling
manner, also with no impact to your applications.
Monthly security maintenance can also be scheduled at a specific time during the month, albeit
in a single maintenance window. Oracle will publish a schedule for monthly maintenance at
least one week prior to start of the maintenance period, and you can reschedule if required.
You may manage contacts who are notified regarding infrastructure maintenance, set a
maintenance window to determine the time your quarterly infrastructure maintenance will
begin, and also view scheduled maintenance runs and the maintenance history of your
Exadata Cloud@Customer in the Oracle Cloud Infrastructure Console. For details regarding
the infrastructure maintenance process and configuring the maintenance controls refer to the
following:
• About Oracle Managed Oracle Exadata Database Service on Cloud@Customer
Infrastructure Maintenance Updates
Oracle performs patches and updates to all of the Oracle-managed system components on
Oracle Exadata Database Service on Cloud@Customer.
5-47
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
5-48
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
5-49
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
weeks prior to the maintenance start and another precheck is run approximately 24 hours prior
to maintenance start. If the prechecks identify an issue that requires rescheduling the
maintenance notification is sent to the maintenance contacts.
The time taken to update infrastructure components varies depending on the number of
database servers and storage servers in the Exadata infrastructure, the maintenance method,
and whether custom action has been enabled. The approximate times provided are estimates.
Time for custom action, if configured, is not included in the estimates below. Database server
maintenance time may vary depending on the time required to shutdown each VM before the
update and then start each VM and associated resources after the update of each node before
proceeding to the next node. The storage server maintenance time will vary depending on the
time required for the ASM rebalance, which is not included in the estimates below. If issues are
encountered during maintenance this may also delay completion beyond the approximate time
listed. In such a situation, if Oracle cloud operations determine resolution would extend beyond
the expected window, they will send a notification and may reschedule the maintenance.
Related Topics
• Achieving Continuous Availability For Your Applications
• Maximum Availability Architecture (MAA) Best Practices
• https://support.oracle.com/rs?type=doc&id=2333222.1
Note:
For more information about the CVE release matrix, see Exadata Database Machine
and Exadata Storage Server Supported Versions (Doc ID 888828.1).
To view the CVE release matrix specific to an Exadata Infrastructure version, click the
Exadata version, for example, Exadata 23. Version-specific CVE release matrices are
listed in the Notes column of the table.
Security maintenance, when needed, is scheduled to be applied during a 21-day window that
begins between the 18th-21st of each month and will run till the 9th-12th of the next month.
Customers will receive notification of the proposed schedule at least 7 days before the start of
the monthly maintenance window and can reschedule monthly maintenance to another date in
the window if desired. The monthly security maintenance process updates the physical
database servers to fix critical security vulnerabilities and critical product issues. Monthly
maintenance also updates storage servers to an Exadata Storage Software image that
resolves known security vulnerabilities and product issues. No updates are applied to the
customer-managed guest VMs. Monthly maintenance also updates storage servers to an
Exadata Storage Software image that resolves known security vulnerabilities and product
issues.
Updates to database servers are applied online via Ksplice technology, and have no impact to
workloads running on the compute (database) servers, as database server security updates
are applied online to the host server while your VM and all processes within the VM, including
databases, remain up and running. Servers and VMs are not restarted. Updates to storage
servers are applied in a rolling fashion. As with quarterly maintenance, the impact of rebooting
storage servers should be minimal to applications.
5-50
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
While updating your services infrastructure, some operations including memory, and storage
scaling, operating system and Grid Infrastructure patching (including prechecks), and elastic
expansion of compute and storage servers may be blocked.
Note:
CPU scaling and VM startup/shutdown are the only operations supported during
monthly infrastructure maintenance.
Please plan to defer these operations until after the updates are complete. . If you attempt an
affected operation, the console will notify you of the ongoing security updates. No software is
updated in the guest VMs.
Related Topics
• https://support.oracle.com/rs?type=doc&id=888828.1
• View or Edit a Scheduled Security Maintenance
Learn how to view and edit the next scheduled security maintenance.
• Exadata Infrastructure Maintenance Event Types
Review the list of event types that Exadata Infrastructure Maintenance emits.
• https://support.oracle.com/rs?type=doc&id=2333222.1
5-51
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
5-52
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
maintenance to start at the same time (or up to 24 hours prior) as the quarterly
maintenance. The security maintenance will be deferred until the quarterly maintenance is
completed. Assuming you have been regularly applying monthly security maintenance, the
storage servers will be skipped by the quarterly maintenance and will be updated by the
security maintenance immediately upon the completion of the quarterly maintenance.
Note:
5-53
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
Related Topics
• Using the Console to Create Oracle Exadata Database Service on Cloud@Customer
Infrastructure
To create your Oracle Exadata Database Service on Cloud@Customer infrastructure, be
prepared to provide values for the fields required for configuring the infrastructure.
• Managing Infrastructure Maintenance Contacts
Learn to manage your Exadata infrastructure maintenance contacts.
Note:
If you use a scheduling policy, scheduling preferences defined locally on the
infrastructure are not used by Oracle automation to apply quarterly updates.
5-54
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
1. Open the navigation menu. Under Database, click Exadata Database Service on
Cloud@Customer.
2. Under Maintenance, click Scheduling policy.
The resulting Scheduling Policy page displays the list of policies.
3. Use the Compartment filter to view the list of policies created in a specific compartment.
4. Use the State to filter the policies by their states.
The policy states include:
• Creating
• Needs attention
• Available
• Updating
• Failed
• Deleting
• Deleted
Note:
To use the scheduling policy to plan and automate quarterly
infrastructure maintenance, you must create a policy with a 'Quarterly'
cadence and a scheduled start month value set to 'February.'
5-55
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
Note:
Six monthly cadence and monthly cadence are not supported for
applying infrastructure maintenance updates.
Note:
If an update or action is already underway and cannot be paused and
resumed without causing disruption, we will continue and complete the
action. Oracle automation will reschedule any action planned to start
after the configured window duration to a future maintenance window.
Note:
You can add additional maintenance windows to the scheduling policy after creation.
For detailed guidance on performing quarterly infrastructure maintenance using the scheduling
policy,see Using the Console to Configure Oracle-Managed Infrastructure Updates.
5-56
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
5-57
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
Note:
For security maintenance, you can add the scheduled start time within the 21-day
window.
5. In the resulting Add maintenance window page, add details and then click Add.
5-58
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
Note:
Only maintenance windows not used by any resources to plan and automate
maintenance activity can be deleted from the policy. Any window already used by
services to automate maintenance cannot be deleted.
1. Open the navigation menu. Under Database, click Exadata Database Service on
Cloud@Customer.
2. Under Maintenance, click Scheduling policy.
The resulting Scheduling Policy page displays the list of policies.
3. Click the name of the policy that you want to delete Maintenance windows.
The Maintenance windows section in the resulting Maintenance scheduling policy details
page lists the maintenance windows associated with the policy.
4. Click the Actions menu of the Maintenance window you want to delete and then select
Delete.
5. On the resulting Delete maintenance window dialog, enter the name of the Maintenance
window, and then click Delete.
Note:
You cannot move a policy across compartments if any resource uses it to plan and
automate maintenance activity.
1. Open the navigation menu. Under Database, click Exadata Database Service on
Cloud@Customer.
2. Under Maintenance, click Scheduling policy.
The resulting Scheduling Policy page displays the list of policies.
3. Click the name of the policy that you want to move to a different compartment.
4. On the resulting Maintenance scheduling policy details page, click the Actions menu and
then select Move resource.
5. On the resulting Move resource to a different compartment dialog, choose a compartment,
and then click Move.
5-59
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
Note:
You cannot move a policy across compartments if any resource uses it to plan and
automate maintenance activity.
1. Open the navigation menu. Under Database, click Exadata Database Service on
Cloud@Customer.
2. Under Maintenance, click Scheduling policy.
The resulting Scheduling Policy page displays the list of policies.
3. Click the name of the policy that you want to add tags to.
4. On the resulting Maintenance scheduling policy details page, click Add tags.
5. On the resulting Add tags dialog, add tags, and then click Add tags.
Note:
You cannot delete a policy if any resource uses it to plan and automate maintenance
activity.
1. Open the navigation menu. Under Database, click Exadata Database Service on
Cloud@Customer.
2. Under Maintenance, click Scheduling policy.
The resulting Scheduling Policy page displays the list of policies.
3. Click the name of the policy that you want to delete.
4. On the resulting Maintenance scheduling policy details page, click the Actions menu and
then select Delete.
5. On the resulting Delete maintenance policy dialog, enter the name of the policy, and then
click Delete.
Note:
You cannot delete a policy if it's used in a maintenance scheduling plan.
5-60
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
5-61
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
Note:
Changes made to maintenance preferences apply only to future maintenance,
not the maintenance that has already been scheduled.
Note:
Custom action timeout applies only to DB servers. Customer can
specify a minimum 15 minutes and a maximum of 120 minutes of
custom action time-out before DB server patching starts. Within this
time, they can perform whatever actions they have planned. In case,
they want to extend the custom action, they can extend the same by
going to "edit maintenance window" option. If custom action is in
progress, customer get 2 options - either extend Custom action
timeout or resume maintenance window.
Default: 15 minutes
Maximum: 120 minutes
– Click Save Changes.
Note:
From the next maintenance run onwards, executions will occur according
to Oracle's schedules.
5-62
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
Note:
Changes will take effect from the next maintenance run.
5-63
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
Note:
Custom action timeout applies only to DB servers. Customer can
specify a minimum 15 minutes and a maximum of 120 minutes of
custom action time-out before DB server patching starts. Within
this time, they can perform whatever actions they have planned.
In case, they want to extend the custom action, they can extend
the same by going to "edit maintenance window" option. If
custom action is in progress, customer get 2 options - either
extend Custom action timeout or resume maintenance window.
Default: 15 minutes
Maximum: 120 minutes
* Show advanced options:
* Enable monthly security infrastructure maintenance: Select this check box
to perform monthly security infrastructure maintenance.
– Maintenance schedule: Use maintenance window preferences from a scheduling
policy
During infrastructure provisioning, after the scheduling policy is selected, Oracle
generates a recommended maintenance scheduling plan to apply updates to all
the components in your infrastructure. The recommended plan schedules all DB
Servers, followed by Storage Servers and Network Switches, into the maintenance
windows from your policy based on duration. After provisioning the infrastructure,
you can update the scheduling plan by editing the 'Maintenance Scheduling Plan'
resource and customize the update to specific components to align with different
windows in your scheduling policy.
* Click Select policy.
* In the resulting Select maintenance scheduling policy window, choose a
compartment and a policy.
You can also create a maintenance scheduling policy and use it. For more
information, see Create a Maintenance Scheduling Policy. Note that you can
add additional maintenance windows to the policy after creating it. For more
information, see Add Additional Maintenance Windows to a Maintenance
Scheduling Policy.
* Click Save changes.
Note:
Changes will take effect from the next maintenance run.
You must confirm your choice by entering the currently used policy name in a
confirmation dialog before making any changes that delete the associated
maintenance plan created with the attached policy.
* Changing from one scheduling policy to another scheduling policy after the
recommended maintenance plan is created and saved for the
infrastructure
* Changing from using a scheduling policy to not using a policy and defining
your maintenance preference in line with your infrastructure
5-64
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
* Change from using the scheduling policy to not using the policy and apply
updates as per the Oracle-managed schedule.
All of the above changes delete the scheduling plan for your infrastructure
created with the current policy, and you will lose any customizations made to
the Oracle recommended plan if you attach the same policy later.
7. Click Save Changes.
If you switch from rolling to non-rolling maintenance method, then Confirm Non-rolling
Maintenance Method dialog is displayed.
a. Enter the name of the infrastructure in the field provided to confirm the changes.
b. Click Save Changes.
5-65
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
Note:
Changes will take effect from the next maintenance run.
• To change from one scheduling policy to another scheduling policy after the
recommended maintenance plan is created and saved for the infrastructure,
you must confirm your choice by entering the currently used policy name in a
confirmation dialog before.
• Policy change deletes the scheduling plan created with the current policy for
your infrastructure, and you will lose any customizations made to the Oracle
recommended plan if you attach the same policy later.
5-66
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
Note:
5-67
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
Note:
Custom action timeout applies only to DB servers.
Customer can specify a minimum 15 minutes and a
maximum of 120 minutes of custom action time-out
before DB server patching starts. Within this time,
they can perform whatever actions they have
planned. In case, they want to extend the custom
action, they can extend the same by going to "edit
maintenance window" option. If custom action is in
progress, customer get 2 options - either extend
Custom action timeout or resume maintenance
window.
Default: 15 minutes
Maximum: 120 minutes
* Add DB Servers:
* Select DB Servers: Updates to selected DB Servers will be
moved from their currently scheduled window to the window you
are adding the maintenance action.
* Storage Server Exadata full software update
* Configure maintenance method:
* Rolling: By default, Exadata Infrastructure is updated in a rolling
fashion, one server at a time with no downtime.
* Non-rolling: Update database and storage servers at the same
time. The non-rolling maintenance method minimizes maintenance
time but incurs full system downtime.
5-68
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
Note:
All storage servers in the infrastructure must be
scheduled to update in a single maintenance action to
apply non-rolling storage updates. While these updates
are applied, your database workloads will incur complete
downtime.
* Select storage server from: Select a window from where you want to
add storage servers from.
* Select maintenance action to add from: Select the action from
where you want to add storage servers from.
* Select number of storage servers to add: Select the number of
storage servers to add to this action.
* Network switch software update: A banner with the message "Network
switch update is already scheduled for the selected maintenance window."
if the network switch software update is already scheduled in the chosen
maintenance window.
– Move action from another window: When you are moving an action, you can
choose to move all components scheduled to update in a specific window to a new
window.
* Select the window to move action from: Choose a window from the
maintenance run.
* Select the action to move: Choose a specific action from the maintenance
window to move.
• Remove a scheduled action: Click the Actions menu (three dots) of the maintenance
action, and then select Remove.
Note:
5-69
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
Note:
An information block is displayed 6 hours before the start of a maintenance run,
regardless of whether you've chosen rolling or non-rolling maintenance method.
When the maintenance begins, it is automatically removed.
Note:
If you've opted to use a Scheduling Policy, link to the policy will appear. Click the
link to view the Maintenance scheduling policy details. To edit a maintenance
window, refer to the topics listed under Manage Quarterly Maintenance Run
created from Scheduling Plan.
Note:
If you select the Non-rolling option, an information block appears stating that
components will be updated simultaneously, resulting in full system
downtime.
5-70
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
5-71
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
b. In the VM Cluster Name field, you can find out what VM cluster a particular VM
belongs to.
c. Click Close.
9. Click Close to close the Estimated Maintenance Time Details page.
• View and Edit Maintenance While Maintenance is In Progress
While maintenance is in progress, you can enable or disable custom action and change
the custom action timeout. While maintenance is waiting for a custom action, you can
resume the maintenance prior to the timeout or extend the timeout.
• View and Edit Maintenance While Maintenance is Waiting for Custom Action
While maintenance is in progress, you can enable or disable custom action and change
the custom action timeout. While maintenance is waiting for custom action, you can
resume the maintenance prior to the timeout or extend the timeout.
Related Topics
• https://support.oracle.com/epmos/faces/DocContentDisplay?id=888828.1
Note:
You can only make edits to the custom action configuration, not the maintenance
method or scheduled start time. Enabling or disabling the custom action or
modifying the custom action timeout while maintenance is in progress will apply
to all database servers that have yet to be updated.
5-72
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
with a configured timeout before starting maintenance across all DB servers. The
maintenance run, while waiting for the custom action, may also be resumed prior to the
timeout.
– Custom action timeout (in minutes): Timeout available to perform custom action
before starting maintenance on the DB Servers.
Default: 30 minutes
Maximum: 120 minutes
8. Click Save Changes.
If you have configured the rolling maintenance method, then the View link is displayed in
the Total Estimated Maintenance Time field.
a. Click View.
Estimated Maintenance Time Details page is displayed with details that include:
• Total Estimated Maintenance Time
• Database Servers Estimated Maintenance Time
• Storage Servers Estimated Maintenance Time
• Network Switches Estimated Maintenance Time
• Order in which components are updated. In rolling maintenance, components are
updated in the sequence displayed.
b. Click Close.
View and Edit Maintenance While Maintenance is Waiting for Custom Action
While maintenance is in progress, you can enable or disable custom action and change the
custom action timeout. While maintenance is waiting for custom action, you can resume the
maintenance prior to the timeout or extend the timeout.
1. Open the navigation menu. Under Oracle Database, click Exadata Cloud at Customer.
2. Select Region and Compartment, and provide the region and the compartment where the
Oracle Exadata infrastructure you want to edit is located.
3. Click Exadata Infrastructure.
4. Click the name of the Exadata infrastructure that you want to edit.
The Infrastructure Details page displays information about the selected Oracle Exadata
infrastructure.
5. Click Maintenance.
Note:
• Editing a maintenance run is not available while waiting for custom action.
• While maintenance is waiting for custom action, an information block is
displayed. The information block is removed after the maintenance resumes.
5-73
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
Note:
Certain black-out dates are not available for security maintenance and are
grayed out in the rescheduling calendar.
5-74
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
5-75
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
• Start time (UTC): Window start time in UTC For example, Sun, Jun 23, 2024,
18:30:58 UTC.
The following restrictions apply:
– Oracle expects to be able to perform infrastructure maintenance at least once per
quarter. You should not defer maintenance beyond the end of a maintenance
quarter unless unexpected issues prevent your accommodating it before the next
maintenance quarter.
– In the event unexpected issues prevent your accommodating the scheduled
infrastructure maintenance run, you can reschedule the infrastructure maintenance
to another date no more than 180 days from the prior infrastructure maintenance.
Since normal maintenance should be performed quarterly, this provides
approximately 90 additional days for you to reschedule the infrastructure
maintenance. Oracle strongly recommends you not schedule maintenance at or
close to the 180 day limit, as you will have no flexibility to reschedule further if
additional unexpected issues arise.
– If a new maintenance release is announced prior to your rescheduled maintenance
run, the newer release will be applied on your specified date.
– You can reschedule your maintenance to take place earlier than it is currently
scheduled. You cannot reschedule the maintenance if the current time is within 2
hours of the scheduled maintenance start time.
– Oracle reserves certain dates each quarter for internal maintenance operations,
and you cannot schedule your maintenance on these dates.
• Type: Planned vs Unplanned. All windows created from the infrastructure maintenance
scheduling plan or added by you to this maintenance run are 'Planned' windows. All
other windows Oracle automation creates to address failures, duration enforcement, or
unforeseen events are defined as 'Unplanned' windows. Always review activities
scheduled to run in an 'Unplanned' window.
• Maintenance action: The summary of actions scheduled to update in a given window.
The server name identifies updates scheduled for DB servers. For example, Apply full
update to DB servers dbServer-1 and dbServer-2. The storage server updates are
identified as count since all storage servers have identical storage layouts. For
example, Apply full update to 2 Storage Servers. The Network switches are updated
as a pair and cannot be scheduled to update in different actions or maintenance
windows. For example, Apply full update to 2 Network switches.
• Estimated time: The estimated time for Oracle automation to complete maintenance
actions scheduled to apply updates to all infrastructure components across all
windows in the maintenance run.
Note:
You can update the window configuration, like window schedule start time, duration,
and duration enforcement, while the window is still in the 'Scheduled' life cycle state.
Once the window is in progress, you cannot make changes to the configuration. You
can choose to cancel a running maintenance for a window. Details covered in the
Cancel Maintenance Window Associated with a Maintenance Run section.'
5-76
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Under Resources, click Scheduling policy.
The resulting Scheduling Policy page displays the list of policies.
3. Choose a compartment from the Compartment filter.
4. Under Maintenance, click Activity.
The resulting Activity page lists maintenance activities in the chosen compartment.
5. Click the name of the activity you want to view associated maintenance windows.
The Maintenance Windows section in the resulting Maintenance run page lists the
maintenance windows associated with the chosen activity.
6. Click the Actions menu (three dots) of the Maintenance window you want to edit, and then
select Edit maintenance window.
7. In the resulting Edit maintenance window dialogs, update the Maintenance window start
time, Duration in hours, and Enforce window duration fields
8. Click Edit maintenance window.
5-77
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
The resulting Activity page lists maintenance activities in the chosen compartment.
5. Click the name of the activity you want to view associated maintenance windows.
The Maintenance Windows section in the resulting Maintenance run page lists the
maintenance windows associated with the chosen activity.
6. Click the Actions menu (three dots) of the Maintenance window you want to edit, and then
select Edit maintenance actions. The resulting Edit maintenance action page displays
the list of actions. You can either add more actions or delete the existing ones.
7. To add actions:
a. Click Add actions.
b. Do the following in the resulting Add maintenance action window:
• Create new action: When you are creating a new maintenance action, you can
choose to add components already scheduled to update in different maintenance
windows to a new window.
– Select action type:
* DB Server Exadata full software update
* Configure maintenance method:
* Rolling: By default, Exadata Infrastructure is updated in a rolling
fashion, one server at a time with no downtime.
* Non-rolling: Update database and storage servers at the same
time. The non-rolling maintenance method minimizes maintenance
time but incurs full system downtime.
* Enable custom action before performing maintenance on DB
servers: Enable custom action only if you want to perform
additional actions outside of Oracle’s purview. For maintenance
configured with a rolling software update, enabling this option will
force the maintenance run to wait for a custom action with a
configured timeout before starting maintenance on each DB
server. For maintenance configured with non-rolling software
updates, the maintenance run will wait for a custom action with a
configured timeout before starting maintenance across all DB
servers. The maintenance run, while waiting for the custom action,
may also be resumed prior to the timeout.
* Custom action timeout (in minutes): Timeout available to
perform custom action before starting maintenance on the DB
Servers.
5-78
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
Note:
Custom action timeout applies only to DB servers.
Customer can specify a minimum 15 minutes and a
maximum of 120 minutes of custom action time-out
before DB server patching starts. Within this time,
they can perform whatever actions they have
planned. In case, they want to extend the custom
action, they can extend the same by going to "edit
maintenance window" option. If custom action is in
progress, customer get 2 options - either extend
Custom action timeout or resume maintenance
window.
Default: 15 minutes
Maximum: 120 minutes
* Add DB Servers:
* Select DB Servers: Updates to selected DB Servers will be
moved from their currently scheduled window to the window you
are adding the maintenance action.
* Storage Server Exadata full software update
* Configure maintenance method:
* Rolling: By default, Exadata Infrastructure is updated in a rolling
fashion, one server at a time with no downtime.
* Non-rolling: Update database and storage servers at the same
time. The non-rolling maintenance method minimizes maintenance
time but incurs full system downtime.
Note:
All storage servers in the infrastructure must be
scheduled to update in a single maintenance action to
apply non-rolling storage updates. While these updates
are applied, your database workloads will incur complete
downtime.
* Select storage server from: Select a window from where you want to
add storage servers from.
* Select maintenance action to add from: Select the action from
where you want to add storage servers from.
* Select number of storage servers to add: Select the number of
storage servers to add to this action.
* Network switch software update: A banner with the message "Network
switch update is already scheduled for the selected maintenance window."
if the network switch software update is already scheduled in the chosen
maintenance window.
5-79
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
• Move action from another window: When you are moving an action, you can
choose to move all components scheduled to update in a specific window to a new
window.
– Select the window to move action from: Choose a window from the
maintenance run.
– Select the action to move: Choose a specific action from the maintenance
window to move.
8. To delete an action:
a. Click the Actions menu (three dots) of the maintenance action, and then select
Remove.
Note:
Note:
Maintenance In Progress status is displayed in the Next Quarterly
Maintenance field.
5-80
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
11. In the resulting Edit custom action configuration page, enter Custom action in
minutes.
Note:
While maintenance is in progress you can only change the custom action time for
DB Server action type. You cannot change the custom action time for support this
option for any other action type.
View and Edit Maintenance While Maintenance is Waiting for Custom Action
While maintenance is in progress, you can enable or disable custom action and change the
custom action timeout. While maintenance is waiting for a custom action, you can resume the
maintenance prior to the timeout or extend the timeout.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Select Region and Compartment, and provide the region and the compartment where the
Oracle Exadata infrastructure you want to edit is located.
3. Click Exadata Infrastructure.
4. Click the name of the Exadata infrastructure that you want to edit.
The Infrastructure Details page displays information about the selected Oracle Exadata
infrastructure.
Note:
Maintenance In Progress status is displayed in the Next Quarterly
Maintenance field.
5-81
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
Note:
You can cancel a running maintenance while the scheduled updates for a window are
in progress. Canceling the maintenance while the updates are in progress allows you
to reschedule all actions that have not yet started to a future maintenance window of
your choice. You can choose a new start time and duration to finish all the actions
rescheduled from the maintenance window you decided to cancel.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Under Resources, click Scheduling policy.
The resulting Scheduling Policy page displays the list of policies.
3. Choose a compartment from the Compartment filter.
4. Under Maintenance, click Activity.
The resulting Activity page lists maintenance activities in the chosen compartment.
5. Click the name of the activity you want to view associated maintenance windows.
The Maintenance Windows section in the resulting Maintenance run page lists the
maintenance windows associated with the chosen activity.
6. Click the Actions menu (three dots) of the Maintenance window you want to cancel, and
then select Cancel maintenance window.
5-82
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
Note:
The maintenance run will complete the current operation. All remaining actions
scheduled for this window will be rescheduled to a new maintenance window.
Note:
Maintenance activity lists all the maintenance updates scheduled to run for all
infrastructure resources in a given compartment for the selected Exadata cloud
service.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Under Resources, click Scheduling policy.
The resulting Scheduling Policy page displays the list of policies.
3. Choose a compartment from the Compartment filter.
4. Under Maintenance, click Activity.
The resulting Activity page lists maintenance activities in the chosen compartment.
5-83
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
5-84
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
unfinished updates to a future 'Unplanned' window, mark the current window as 'Duration
Exceeded,' and notify you to review the rescheduled maintenance activity.
• Any updates already in progress will continue past the enforced window duration to ensure
a consistent state of the underlying resources.
Note:
The prechecks are now done prior to the start of the maintenance.
• When Exadata database server maintenance starts, the infrastructure resource's lifecycle
state is Maintenance in Progress, and the associated lifecycle state message is, The
underlying infrastructure of this system (dbnodes) is being updated.
• When storage server maintenance starts, the infrastructure resource's lifecycle state is
Maintenance in Progress, and the associated lifecycle state message is, The underlying
infrastructure of this system (cell storage) is being updated and this will not impact
Database availability.
• After storage server maintenance is complete, the networking switches are updated one at
a time, in a rolling fashion.
• When maintenance is complete, the infrastructure resource's lifecycle state is Available,
and the Console and API-based tools do not provide a lifecycle state message.
Related Topics
• ListExadataInfrastructures
• Software Development Kits and Command Line Interface
• Command Line Interface (CLI)
5-85
Chapter 5
Configure Oracle-Managed Infrastructure Maintenance
information about all maintenance related events, see Oracle Exadata Cloud@Customer
Events. In case, if there are any failures, then Oracle reschedules your maintenance run,
generates related notification, and notifies your infrastructure maintenance contacts.
For more information about Oracle Cloud Infrastructure Events, see Overview of Events. To
receive additional notifications other than the ones sent to infrastructure maintenance contacts,
you can subscribe to infrastructure maintenance events and get notified using the Oracle
Notification service, see Notifications Overview.
Related Topics
• Oracle Exadata Database Service on Cloud@Customer Events
Oracle Exadata Database Service on Cloud@Customer resources emit events, which are
structured messages that indicate changes in resources.
• Overview of Events
• Notifications Overview
• Managing Infrastructure Maintenance Contacts
Learn to manage your Exadata infrastructure maintenance contacts.
5-86
Chapter 5
Manage VM Cluster Networks
• GetSchedulingWindow
• UpdateSchedulingWindow
• DeleteSchedulingWindow
• ListSchedulingPlans
• CreateSchedulingPlan
• GetSchedulingPlan
• DeleteSchedulingPlan
• ChangeSchedulingPlanCompartment
• ReorderScheduledActions
• CascadingDeleteSchedulingPlan
• ListScheduledActions
• CreateScheduledAction
• GetScheduledAction
• UpdateScheduledAction
• DeleteScheduledAction
• ListParamsForActionType
• ReorderScheduledActions
• ListExecutionWindows
• CreateExecutionWindow
• GetExecutionWindow
• UpdateExecutionWindow
• DeleteExecutionWindow
• ReorderExecutionActions
• CancelExecutionWindow
• ListExecutionActions
• CreateExecutionAction
• GetExecutionAction
• UpdateExecutionAction
• DeleteExecutionAction
• MoveExecutionActionMember
5-87
Chapter 5
Manage VM Cluster Networks
Note:
Avoid entering confidential information when assigning descriptions, tags, or friendly
names to your cloud resources through the Oracle Cloud Infrastructure Console, API,
or CLI.
5-88
Chapter 5
Manage VM Cluster Networks
Note:
The values "0" and "4095" are reserved and cannot be entered.
5-89
Chapter 5
Manage VM Cluster Networks
Note:
The values "0" and "4095" are reserved, and cannot be entered.
Note:
The values "0" and "4095" are reserved, and cannot be entered.
5-90
Chapter 5
Manage VM Cluster Networks
• Hostname Prefix: Specify the prefix that is used to generate the hostnames in the
backup network.
• Domain Name: Specify the domain name for the backup network.
f. Provide DNS and NTP server details.
The VM cluster network requires access to Domain Names System (DNS) and
Network Time Protocol (NTP) services. The following settings specify the servers that
provide these services:
• DNS Servers: Provide the IP address of a DNS server that is accessible using the
client network. You may specify up to three DNS servers.
• NTP Servers: Provide the IP address of an NTP server that is accessible using
the client network. You may specify up to three NTP servers.
g. Configure Advanced Options.
Network: (Optional) Assign a SCAN listener port (TCP/IP) in the range between 1024
and 8999. Default is 1521.
Tags: (Optional) You can choose to apply tags. If you have permission to create a
resource, then you also have permission to apply free-form tags to that resource. To
apply a defined tag, you must have permission to use the tag namespace. For more
information about tagging, refer to information about resource tags. If you are not sure
if you should apply tags, then skip this option (you can apply tags later) or ask your
administrator.
7. Click Review Configuration.
The Review Configuration page displays detailed information about the VM cluster
network, including the hostname and IP address allocations. These allocations are initially
system-generated and are based on your inputs.
8. (Optional) You can choose to adjust the system-generated network definitions on the
Review Configuration page.
a. Click Edit.
b. Use the Edit dialog to adjust the system-generated network definitions to meet your
requirements.
c. Click Save Changes.
9. Click Create VM Cluster Network.
The VM Cluster Network Details page is now displayed. Initially, after creation, the state of
the VM cluster network is Requires Validation.
Maximum and recommended CIDR block prefix lengths for each Exadata system shape
The following table specifies the maximum and recommended CIDR block prefix lengths for
each Exadata system shape. The maximum CIDR block prefix length defines the smallest
block of IP addresses that are required for the network. To allow for possible future expansion
within Exadata Database Service on Cloud@Customer, work with your network team to
reserve enough IP addresses to accommodate any future growth.
Max # Database Servers Client and DR Subnet Size Backup Subnet Size
5 /28 (16 IPs) /29 (8 IPs)
13 /27 (32 IPs) /28 (16 IPs)
29 /26 (64 IPs) /27 (32 IPs)
32 /25 (128 IPs) /26 (64 IPs)
5-91
Chapter 5
Manage VM Cluster Networks
Related Topics
• Resource Tags
5-92
Chapter 5
Manage VM Cluster Networks
4. Click the name of the Exadata infrastructure that is associated with the VM cluster network
that you are interested in.
The Infrastructure Details page displays information about the selected Exadata
infrastructure.
5. Click the name of the VM cluster network that you want to edit.
The VM Cluster Network Details page displays information about the selected VM cluster
network.
6. Click Edit VM Cluster Network.
7. Use the Edit dialog to edit the VM cluster network attributes:
a. Client Network
The client network is the primary channel for application connectivity to Exadata
Database Service on Cloud@Customer resources. You can edit the following client
network settings:
• VLAN ID: Provide a virtual LAN identifier (VLAN ID) for the client network between
1 and 4094, inclusive. To specify no VLAN tagging, enter "1". (This is equivalent to
a "NULL" VLAN ID tag value.)
Note:
The values "0" and "4095" are reserved and cannot be entered.
Note:
The values "0" and "4095" are reserved and cannot be entered.
5-93
Chapter 5
Manage VM Cluster Networks
If so equipped (for authorized customers only), you can edit the following disaster
recovery network settings:
• VLAN ID: Provide a virtual LAN identifier (VLAN ID) for the backup network
between 1 and 4094, inclusive. To specify no VLAN tagging, enter "1". (This is
equivalent to a "NULL" VLAN ID tag value.)
Note:
The values "0" and "4095" are reserved and cannot be entered.
5-94
Chapter 5
Manage VM Cluster Networks
Your browser downloads a file containing the VM cluster network configuration details.
You cannot download the network validation report for the following VM Cluster Network State
life cycle states:
• Validated (Successful validation run does not generate a results file)
• Requires Validation
• Updating
• Allocated
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Choose the Region and Compartment that contains the Exadata infrastructure that is
associated with the VM cluster network that you want to validate.
5-95
Chapter 5
Manage VM Cluster Networks
{
"Physical_Links":[
"Issue detected with Physical Links. Please check the cables connected
to ExaCC, or contact Oracle Support."
],
"VLAN":[
"Gateway <G1> is not accessible from source <ipaddr > with vlan id
<vlanId>. Please ensure vlan Id, IP address and Gateway are correct",
"Gateway <G2> is not accessible from source <ipaddr > with vlan id
<vlanId>. Please ensure vlan Id, IP address and Gateway are correct"
],
"Gateway":[
"Gateway <G1> is not accessible from source <ipaddr > with vlan id
<vlanId>. Please ensure vlan Id, IP address and Gateway are correct",
"Gateway <G2> is not accessible from source <ipaddr > with vlan id
<vlanId>. Please ensure vlan Id, IP address and Gateway are correct"
],
"DNS":[
"Missing reverse DNS entry(ies) <hostname> for <IP addr> in the DNS
server <dnsIP>. Please update the DNS Server with appropriate entry(ies).",
"Missing DNS entry(ies) <IP> for <hostname> in the DNS server <dnsIP>.
Please update the DNS Server with appropriate entry(ies).",
"Wrong reverse DNS entry(ies) <hostname> found for <IP addr> in the DNS
server <dnsIP>. Please update the DNS Server with appropriate entry(ies).",
"Wrong DNS entry(ies) <IP addr> found for <hostname> in the DNS server
<dnsIP>. Please update the DNS Server with appropriate entry(ies)."
],
"NTP":[
"NTP <ntpIP> is not accessible from source <domU_ipaddr> with vlan id
<vlanId> using gateway <gatewayIP>. Please ensure NTP, VlanId, IP address,
Gateway are correct."
],
"IP_Availability":[
"IP <IP1> is already in use. Please ensure this IP is available.",
"IP <IP2> is already in use. Please ensure this IP is available.",
"IP <IP3> is already in use. Please ensure this IP is available."
]
}
5-96
Chapter 5
Manage VM Cluster Networks
Note:
Oracle strongly recommends that customers use the latest GI version, or at least GI
version 19.11.
1. Click the name of the VM Cluster Network that you want to edit.
Exadata Infrastructure Details page displays the configured DB servers.
2. Click Add DB Servers to Network to assign IP addresses.
Add DB Servers to Network page is displayed.
3. Select one or more DB servers from the list.
4. Click Add DB Servers to Network.
5. Enter IP addresses in the Client network and Backup network sections.
6. Click Add DB Server to Network IP.
Exadata Infrastructure Details page displays a banner with the count of DB servers
selected.
If you want to change the IP addresses, click Edit VM Cluster Network. Make changes on
the Edit VM Cluster Network page and then click Save Changes.
7. Click Validate VM Cluster Network.
5-97
Chapter 5
Manage VM Clusters
Note:
You cannot remove network resources that are currently allocated to a virtual
machine.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Under Infrastructure, click Exadata Infrastructure.
3. In the list of Exadata Infrastructures, click the display name of the infrastructure you wish to
view details.
4. Click the VM Cluster Network from the list of VM Cluster Networks.
VM Cluster Network Details page is displayed.
5. Under Network Configuration, in the Client network or Backup network section,
identify the database server that you want to remove.
6. Click the Actions icon (three dots) for a virtual machine, and then click Remove.
7. Click Remove on the confirmation dialog displayed.
Manage VM Clusters
Learn how to manage your VM clusters on Oracle Exadata Database Service on
Cloud@Customer.
• About Managing VM Clusters on Oracle Exadata Database Service on Cloud@Customer
The VM cluster provides a link between your Oracle Exadata Database Service on
Cloud@Customer infrastructure and Oracle Databases you deploy.
• Overview of VM Cluster Node Subsetting
VM Cluster Node Subsetting enables you to allocate a subset of database servers to new
and existing VM clusters to enable maximum flexibility in the allocation of compute (CPU,
memory, local storage) resources.
• Overview of Automatic Diagnostic Collection
By enabling diagnostics collection and notifications, Oracle Cloud Operations and you will
be able to identify, investigate, track, and resolve guest VM issues quickly and effectively.
Subscribe to Events to get notified about resource state changes.
• Incident Logs and Trace Files
This section lists all of the files that can be collected by Oracle Support if you opt-in for
incident logs and trace collection.
• Health Metrics
Review the list of database and non-database health metrics collected by Oracle Trace
File Analyzer.
5-98
Chapter 5
Manage VM Clusters
Note:
Avoid entering confidential information when assigning descriptions, tags, or friendly
names to your cloud resources through the Oracle Cloud Infrastructure Console, API,
or CLI.
5-99
Chapter 5
Manage VM Clusters
• VM Cluster Node Subsetting capability is available for new and existing VM clusters in
Gen2 Exadata Cloud@Customer service.
• All VMs across a VM cluster will have the same resource allocation per VM irrespective of
whether the VM was created during cluster provisioning or added later by extending an
existing VM cluster.
• VM Clusters only need a minimum of 1 VM with node subsetting. However, Oracle
recommends a minimum of 2 VMs per VM Cluster to provide high availability.
• Each VM cluster network is pre-provisioned with IP addresses for every DB Server in the
infrastructure. One cluster network can only be used by a single VM cluster and is
validated to ensure the IP addresses do not overlap with other cluster networks. Adding or
removing VMs to the cluster does not impact the pre-provisioned IP addresses assigned to
each DB server in the associated cluster network.
For the Maximum number of VMs per DB server and Maximum number of VM Clusters per
System, see the System Shape and Configuration Tables. The Maximum number of VM
Clusters per System depends on the resources available per DB server and is subject to the
per DB Server maximum VM limit.
Note:
When a cluster contains a node-subsetted database, the attributed usage and cost
feature for pluggable databases will not work because the process of creating node-
subsetted databases happens on the backend, and the metadata for node-subsetted
databases doesn't get synchronized with the Control Plane Server.
However, if the database was originally created without using node-subsetting and
later converted to a node-subsetted database, this issue will not arise since the
metadata is already available in the Control Plane.
Related Topics
• Using the Console to Create an ASM VM Cluster
To create your ASM VM cluster, be prepared to provide values for the fields required for
configuring the infrastructure.
• Using the Console to Add VMs to a Provisioned Cluster
To add virtual machines to a provisioned cluster, use this procedure.
• Using the Console to View a List of DB Servers on an Exadata Infrastructure
To view a list of database server hosts on an Oracle Exadata Cloud@Customer system,
use this procedure.
• Using the Console to Remove a VM from a VM Cluster
To remove a virtual machine from a provisioned cluster, use this procedure.
5-100
Chapter 5
Manage VM Clusters
5-101
Chapter 5
Manage VM Clusters
Note:
• Oracle will create a service request (SR) against the infrastructure Customer
Support Identifier (CSI) when an issue is detected and needs customer
interaction to resolve.
• The customer's Oracle Cloud Infrastructure tenancy admin email will be used as
the CSI contact to create SR and attach logs to it. Ensure tenancy admin is
added as a CSI contact in My Oracle Support (MOS).
Note:
If have previously opted in for incident log and trace file collection and decide to opt
out when Oracle Cloud operations run a log collection job, then the job will run its
course and will not cancel. Future log collections won't happen until you opt-in again
to the incident logs and trace file collection option.
TFA is shipped with scripts that run when a particular component is requested, for
example, for CRS component, crscollect.pl will run a number of crsctl
commands and gather the input. By default, TFA does not redact collected logs.
Table 5-13 Oracle Trace File Analyze (TFA) Component Driven Logs Collections
5-102
Chapter 5
Manage VM Clusters
Table 5-13 (Cont.) Oracle Trace File Analyze (TFA) Component Driven Logs Collections
5-103
Chapter 5
Manage VM Clusters
Table 5-13 (Cont.) Oracle Trace File Analyze (TFA) Component Driven Logs Collections
5-104
Chapter 5
Manage VM Clusters
Table 5-13 (Cont.) Oracle Trace File Analyze (TFA) Component Driven Logs Collections
5-105
Chapter 5
Manage VM Clusters
Related Topics
• Overview of Automatic Diagnostic Collection
By enabling diagnostics collection and notifications, Oracle Cloud Operations and you will
be able to identify, investigate, track, and resolve guest VM issues quickly and effectively.
Subscribe to Events to get notified about resource state changes.
• Health Metrics
Review the list of database and non-database health metrics collected by Oracle Trace
File Analyzer.
• Using the Console to Create an ASM VM Cluster
To create your ASM VM cluster, be prepared to provide values for the fields required for
configuring the infrastructure.
• Using the Console to Enable, Partially Enable, or Disable Diagnostics Collection
You can enable, partially enable, or disable diagnostics collection for your Guest VMs after
provisioning the VM cluster. Enabling diagnostics collection at the VM cluster level applies
the configuration to all the resources such as DB home, Database, and so on under the
VM cluster.
Health Metrics
Review the list of database and non-database health metrics collected by Oracle Trace File
Analyzer.
Note:
Oracle may add more metrics in the future, but if you have already chosen to collect
metrics, you need not update your opt-in value. It will remain enabled/disabled based
on your current preference.
5-106
Chapter 5
Manage VM Clusters
5-107
Chapter 5
Manage VM Clusters
5-108
Chapter 5
Manage VM Clusters
5-109
Chapter 5
Manage VM Clusters
5-110
Chapter 5
Manage VM Clusters
Related Topics
• Overview of Automatic Diagnostic Collection
By enabling diagnostics collection and notifications, Oracle Cloud Operations and you will
be able to identify, investigate, track, and resolve guest VM issues quickly and effectively.
Subscribe to Events to get notified about resource state changes.
• Incident Logs and Trace Files
This section lists all of the files that can be collected by Oracle Support if you opt-in for
incident logs and trace collection.
• Using the Console to Create an ASM VM Cluster
To create your ASM VM cluster, be prepared to provide values for the fields required for
configuring the infrastructure.
• Using the Console to Enable, Partially Enable, or Disable Diagnostics Collection
You can enable, partially enable, or disable diagnostics collection for your Guest VMs after
provisioning the VM cluster. Enabling diagnostics collection at the VM cluster level applies
the configuration to all the resources such as DB home, Database, and so on under the
VM cluster.
Note:
Oracle doesn't stop billing when a VM or VM Cluster is stopped. To stop billing for a
VM Cluster, lower the OCPU (ECPUs for X11M) count to zero.
5-111
Chapter 5
Manage VM Clusters
Scaling up or down of these resources requires thorough auditing of existing usage and
capacity management by the customer DB administrator. Review the existing usage to avoid
failures during or after a scale down operation. While scaling up, consider how much of these
resources are left for the next VM cluster you are planning to create. Exadata
Cloud@Customer Cloud tooling calculates the current usage of memory, local disk, and ASM
storage in the VM cluster, adds headroom to it, and arrives at a "minimum" value below which
you cannot scale down, and expects that you specify the value below this minimum value.
Note:
• When creating or scaling a VM Cluster, setting the number of OCPUs (ECPUs for
X11M) to zero will shut down the VM Cluster and eliminate any billing for that VM
Cluster, but the hypervisor will still reserve the minimum 2 OCPUs (8 ECPUs for
X11M) for each VM. These reserved OCPUs (ECPUs for X11M)cannot be
allocated to any other VMs, even though the VM to which they are allocated is
shut down. The Control Plane does not account for reserved OCPUs (ECPUs for
X11M)when showing maximum available OCPU (ECPU for X11M), so you should
account for these reserved OCPUs (ECPUs for X11M)when performing any
subsequent scaling operations to ensure the operation can acquire enough
OCPUs (ECPUs for X11M) to successfully complete the operation.
• For memory and /u02 scale up or scale down operations, if the difference
between the current value and the new value is less than 2%, then no change
will be made to that VM. This is because memory change involves rebooting the
VM, and /u02 change involves bringing down the Oracle Grid Infrastructure
stack and un-mounting /u02. Production customers will not resize for such a
small increase or decrease, and hence, such requests are a no-op.
• You can scale the VM Cluster resources even if any of the DB servers in the VM
Cluster are down:
– If a DB server is down and scaling is performed, the VMs on that server will
not be automatically scaled to the new OCPUs when the DB server and the
VMs come back online. It's your responsibility to ensure that all the VMs in
the cluster have the same OCPU values.
– Even if the DB server is down, billing does not stop for the VM Cluster that
has the VMs on that DB server.
5-112
Chapter 5
Manage VM Clusters
large pages memory as a percentage of total memory, with a maximum limit of 60%. If large
pages are configured to use more than 60% of the total memory, cloud automation will
automatically resize it to this 60% limit.
Once the new large pages allocation is calculated, the automation will perform the following
checks:
• Condition 1: The current HugePages usage, multiplied by 1.15 (15% more than currently
used), must be less than the new large pages allocation.
• Condition 2: The current HugePages usage, multiplied by 1.15, must also be less than
60% of the new total memory size.
Note:
The current HugePages usage is determined by subtracting the free HugePages
from the total current HugePages.
If both conditions are met, cloud automation will apply the memory changes to the VMs. If
either condition is not met, the process will terminate with an error similar to the following:
EXACLOUD: Requested memory is insufficient. The new hugepage count is <<>>, which is
less than the minimum required for the VM. Not proceeding with the change.
This process ensures there is enough conventional memory for the VM to boot. Before
proceeding with the resize, automation performs a precheck to determine the current large
pages usage by running database instances. If the precheck indicates that there will not be
enough large pages memory after the resize to support the existing databases, the resize will
fail, and the process will not continue.
/u01/app/19.0.0.0/grid/bin/asmcmd lsdg
ASMCMD>
5-113
Chapter 5
Manage VM Clusters
• With SPARSE:
/u01/app/19.0.0.0/grid/bin/asmcmd lsdg
ASMCMD>
State Type Rebal Sector Logical_Sector Block AU Total_MB
Free_MB Req_mir_free_MB Usable_file_MB Offline_disks
Voting_files Name
MOUNTED HIGH N 512 512 4096 4194304 12591936
10426224 1399104 3009040 0
Y DATAC5/
MOUNTED HIGH N 512 512 4096 4194304 3135456
3036336 348384 895984 0
N RECOC5/
MOUNTED HIGH N 512 512 4096 4194304 31354560
31354500 3483840 8959840 0
N SPRC5/
ASMCMD>
Note:
The listed values of all attributes for SPARSE diskgroup (SPRC5) present the
virtual size. In Exadata DB Systems and Exadata Cloud@Customer, we use the
ratio of 1:10 for physicalSize:virtualSize. Hence, for all purposes of our
calculation we must use 1/10th of the values displayed above in case of SPARSE
for those attributes.
5-114
Chapter 5
Manage VM Clusters
Estimating How Much Local Storage You Can Provision On Your VMs
VM Images include the files necessary to boot and run the VM and its operating system, as
well as space for Oracle Homes stored in /u02. To estimate how much additional local storage
space beyond the minimum can be allocated to any file system associated with a VM, subtract
the size of the VM images for all VMs on a server from the total available space. If you have
not modified the default VM Image size by expanding any file systems, use the VM Image size
(default and minimum) below. If you have or plan to modify your VM Image size, you must use
the OCI console and "Scale VM Cluster" action to check the allocated and available for an
existing VM Cluster as expanding some non-/u02 file systems will consume more incremental
storage than was added to the file system. This information is also available in the "Configure
VM Cluster" action while creating a new VM Cluster.
X8-2 and X7-2 Systems
• Total space available for VM images (X7 All Systems): 1237 GB
• Total space available for VM images (X8 All Systems): 1037 GB
• VM Image size (default and minimum) including /u02: 244 GB
• Default (minimum) /u02: 60 GB
X8M-2 Systems
• Total space available for VM images (X8M Base System): 1237 GB
• Total space available for VM images (X8M Elastic): 2500 GB
• VM Image size (default and minimum) including /u02: 244 GB
• Default (minimum) /u02: 60 GB
X11M, X10M, and X9M-2 Systems
• Total Available for VM Images (Base System X9M): 1077 GB
• Total Available for VM Images (Elastic): 2243 GB
• VM Image size (default and minimum) including /u02: 244 GB
• Default (minimum) /u02: 60 GB
5-115
Chapter 5
Manage VM Clusters
Note:
• With the exception of /u02, you can only expand the file systems and cannot
reduce their size once they have been expanded.
• For X8M and later, a rolling restart is not required when expanding any of the
Guest VM file systems. However, a rolling restart of each VM is required when
the size of /u02 is reduced.
• Each file system can only be expanded to a maximum of 900 GB
• Ability to increase the size of additional local file systems is only supported on
X8M and later systems.
5-116
Chapter 5
Manage VM Clusters
For more information about resizing these file systems, see Estimating How Much Local
Storage You Can Provision to Your VMs.
Resource Limit Based On Current Utilization
• Any scale-down operation must leave 15% buffer on top of highest local space utilization
across all nodes in the cluster.
• The lowest local space per node allowed is higher of the above two limits.
• Run the df –kh command on each node to find out the node with the highest local storage.
• You can also use the utility like cssh to issue the same command from all hosts in a cluster
by typing it just once.
• Lowest value of local storage each node can be scaled down to would be = 1.15x (highest
value of local space used among all nodes).
ACFS File Systems
If requested by support, you can also resize the /acfs01 file system. This file system is used
by the system to stage software. It uses Exadata storage and is not subject to the limits
described above for /u02. It is a shared file system visible from all nodes in the cluster, and
can be online resized from the command line of any VM.
• Default size: The default size of /acfs01 is 100 GB.
• Scaling /acfs01: You can scale acfs01 as user grid from any VM via the /sbin/acfsutil
command. No reboot is required. The resize operation will not affect the availability of the
database service running in the VM Cluster. The following command issued by the grid
user will increase the size of /acfs01 by 100 GB: /sbin/acfsutil size +100 GB /
acfs01.
• You can create additional ACFS file systems if required. These will also consume storage
from the Exadata Storage diskgroups and may be shared across all VMs in the cluster.
Refer to the ACFS documentation for more information.
5-117
Chapter 5
Manage VM Clusters
5-118
Chapter 5
Manage VM Clusters
d. Select a VM Cluster Network: From the list, choose a VM cluster network definition to
use for the VM cluster. You must have an available and validated VM cluster network
before you can create a VM cluster.
e. VM Cluster Type:
Note:
You cannot change the VM cluster type after deploying the VM cluster. If you
wish to change the VM cluster type, you must create a new VM cluster and
migrate the database to the new cluster.
Note:
– Click Save.
• Specify the OCPU (ECPUs for X11M) count per VM: Specify the OCPU (ECPUs
for X11M) count to be provisioned for each VM in this cluster. The minimum value
5-119
Chapter 5
Manage VM Clusters
is 2 OCPUs per VM or 8 ECPUs per VM for X11M (for a live VM condition), unless
you are specifying zero OCPUs or 0 ECPUs for X11M (for a shutdown VM
condition).
If you specify a value of zero, then the VM cluster virtual machines are all shut
down at the end of the cluster creation process. In this case, you can later start the
virtual machines by scaling the OCPU (ECPUs for X11M) resources. See Using
the Console to Scale the Resources on a VM Cluster.
The OCPU (ECPUs for X11M) count for the whole VM Cluster will be calculated
automatically based on the per-VM OCPU (ECPUs for X11M) count you have
specified and the number of physical Database Servers configured for the VM
Cluster.
OCPU: An Oracle Compute Unit (OCPU) provides CPU capacity equivalent of one
physical core of an Intel Xeon processor with hyperthreading enabled. Each OCPU
corresponds to two hardware execution threads, known as vCPUs.
See, Oracle Platform as a Service and Infrastructure as a Service – Public Cloud
Service DescriptionsMetered & Non-Metered.
ECPU: An ECPU is an abstracted measure of compute resources. ECPUs are
based on the number of cores elastically allocated from a pool of compute and
storage servers.
• Requested OCPU (ECPUs for X11M) count for the VM Cluster: Displays the
total number of CPU cores allocated to the VM cluster based on the value you
specified in the Specify the OCPU (ECPUs for X11M) count per VM field. This
field is not editable.
• Specify the memory per VM (GB): Specify the memory for each individual VM.
The value must be a multiple of 1 GB and is limited by the available memory on
the Exadata infrastructure.
• Requested memory for the VM Cluster (GB): Displays the total amount of
memory allocated to the VM cluster based on the value you specified in the
Specify the memory per VM (GB) field. This field is not editable.
• Specify the local file system size per VM (GB): Click Show advanced options
to view additional local file systems configuration options. Specify the local file
system size for each individual VM. The value must be a multiple of 1 GB and is
limited by the available size of the file system on the X11M infrastructure.
Note that the minimum size of local system storage must be 60 GB. Each time
when you create a new VM cluster, the space remaining out of the total available
space is utilized for the new VM cluster.
For more information and instructions to specify the size for each individual VM,
see Introduction to Scale Up or Scale Down Operations.
i. Click Show advanced options to view additional local file systems
configuration options.
ii. Resize the /, /u01, /tmp, /var, /var/log, /var/log/audit, and /home
file systems as needed.
5-120
Chapter 5
Manage VM Clusters
Note:
– You can only expand these file systems and cannot reduce the
size once expanded.
– Due to backup partitions and mirroring, the / and /var file
systems will consume twice the space they were allocated,
which is indicated in the read-only Total allocated storage for /
(GB) due to mirroring and Total allocated storage for /var
(GB) due to mirroring fields.
– After creating the VM Cluster, check the Exadata Resources
section on the Exadata Infrastructure Details page to check the
file size allocated to the local storage (/u02) and local storage
(additional file systems).
• Reserved local storage per VM (GB): Displays the local storage size reserved
internally for root file systems, Oracle Grid Infrastructure Homes, and diagnostic
logs. This field is not editable.
g. Configure the Exadata Storage: The following settings define how the Exadata
storage is configured for use with the VM cluster. The storage type once selected
cannot be changed later on once the VM cluster is provisioned with the desired
storage type. You have two options to choose: Automatic storage type (ASM) and
Exascale. For more information about Exascale storage type, see Using the Console
to Create an Exascale VM Cluster.
Automatic Storage Management (ASM)
• Specify Usable Exadata Storage: Specify the size for each individual VM. The
minimum recommended size is 2 TB.
• Allocate Storage for Exadata Snapshots: Check this option to create a sparse
disk group, which is required to support Exadata snapshot functionality. Exadata
snapshots enable space-efficient clones of Oracle databases that can be created
and destroyed very quickly and easily.
• Allocate Storage for Local Backups: Check this option to configure the Exadata
storage to enable local database backups. If you select this option, more space is
allocated to the RECO disk group to accommodate the backups. If you do not
select this option, you cannot use local Exadata storage as a backup destination
for any databases in the VM cluster.
Storage Allocation DATA Disk Group RECO Disk Group SPARSE Disk Group
Exadata Snapshots: 80% 20% 0% (The SPARSE disk
No group is not created.)
Enable Backups on
Local Exadata
Storage: No
Exadata Snapshots: 40% 60% 0% (The SPARSE disk
No group is not created.)
Enable Backups on
Local Exadata
Storage: Yes
5-121
Chapter 5
Manage VM Clusters
Storage Allocation DATA Disk Group RECO Disk Group SPARSE Disk Group
Allocate Storage for 60% 20% 20%
Exadata Snapshots:
Yes
Enable Backups on
Local Exadata
Storage: No
Allocate Storage for 35% 50% 15%
Exadata Snapshots:
Yes
Enable Backups on
Local Exadata
Storage: Yes
h. Select version:
• Choose the Oracle Grid Infrastructure version: From the list, choose the Oracle
Grid Infrastructure release (19c and 23ai) that you want to install on the VM
cluster.
The Oracle Grid Infrastructure release determines the Oracle Database releases
that can be supported on the VM cluster. You cannot run an Oracle Database
release that is later than the Oracle Grid Infrastructure software release.
Note:
Minimum requirements for provisioning a VM Cluster with Grid
Infrastructure 23ai:
– Exadata Guest VM running Exadata System Software 23.1.8
– Exadata Infrastructure running Exadata System Software 23.1.x
5-122
Chapter 5
Manage VM Clusters
Six past versions including the latest versions of Exadata images 23.1.3.0
and 22.1.3.0 are displayed.
* Choose a version.
* Click Save Changes.
i. Add SSH Key: Specify the public key portion of an SSH key pair that you want to use
to access the VM cluster virtual machines. You can upload a file containing the key, or
paste the SSH key string.
To provide multiple keys, upload multiple key files or paste each key into a separate
field. For pasted keys, ensure that each key is on a single, continuous line. The length
of the combined keys cannot exceed 10,000 characters.
j. Choose a license type:
• Bring Your Own License (BYOL): Select this option if your organization already
owns Oracle Database software licenses that you want to use on the VM cluster.
Note:
BYOL is not available for Exadata Database-Developer VM Cluster type.
Note:
You are opting in with the understanding that the list of events, metrics, and
log files collected can change in the future. You can opt out of this feature at
any time.
• Enable Diagnostic Events: Allow Oracle to collect and publish critical, warning,
error, and information events to me.
• Enable Health Monitoring: Allow Oracle to collect health metrics/events such as
Oracle Database up/down, disk space usage, and so on, and share them with
Oracle Cloud operations. You will also receive notification of some events.
• Enable Incident Logs and Trace Collection: Allow Oracle to collect incident logs
and traces to enable fault diagnosis and issue resolution.
All three checkboxes are selected by default. You can leave the default settings as
is or clear the checkboxes as needed. You can view the Diagnostic Collection
settings on the VM Cluster Details page under General Information >>
Diagnostics Collection.
– Enabled: When you choose to collect diagnostics, health metrics, incident
logs, and trace files (all three options).
5-123
Chapter 5
Manage VM Clusters
– Disabled: When you choose not to collect diagnostics, health metrics, incident
logs, and trace files (all three options).
– Partially Enabled: When you choose to collect diagnostics, health metrics,
incident logs, and trace files ( one or two options).
l. Show Advanced Options:
• Time zone: The default time zone for the Exadata Infrastructure is UTC, but you
can specify a different time zone. The time zone options are those supported in
both the Java.util.TimeZone class and the Oracle Linux operating system.
Note:
If you want to set a time zone other than UTC or the browser-detected
time zone, then select the Select another time zone option, select a
Region or country, and then select the corresponding Time zone.
If you do not see the region or country you want, then select
Miscellaneous, and then select an appropriate Time zone.
• Tags: Optionally, you can apply tags. If you have permission to create a resource,
you also have permission to apply free-form tags to that resource. To apply a
defined tag, you must have permission to use the tag namespace. For more
information about tagging, see Resource Tags. If you are not sure if you should
apply tags, skip this option (you can apply tags later) or ask your administrator.
6. Optionally, you can save the resource configuration as a stack.
• To save the resource configuration as a Stack:
a. Click Save as Stack.
b. In the resulting Save as Stack dialog, provide the following details:
i. Name: (Optional) Provide an easy to remember descriptive name.
ii. Description: (Optional) Enter a short description.
iii. Compartment: Select a compartment where this Stack will reside.
c. Click Save.
After saving the Stack, the system displays a banner with a link to the saved
Stack.
d. Click the link to open the Stack in the Resource Manager Service console.
See, Resource Manager and Terraform.
• To view the details of a Stack:
a. Open the navigation menu. Under Developer Services, click Resource Manager.
b. Click Stacks.
c. Click the name of the Stack that you want to view details.
Or, click the Actions menu (three dots), and select the View stack details option.
7. Click Create VM Cluster.
The VM Cluster Details page is now displayed. While the creation process is running, the
state of the VM cluster is Pending. When the VM cluster creation process completes, the
state of the VM cluster changes to Available.
5-124
Chapter 5
Manage VM Clusters
The Exadata Database Storage section on the VM Cluster Details page shows the type of
storage configured, which, in this case, is ASM.
Related Topics
• Oracle Exadata Database Service on Cloud@Customer Service Description
Learn how you can leverage the combined capabilities of Oracle Exadata and Oracle
Cloud Infrastructure with Oracle Exadata Database Service on Cloud@Customer
• Using the Console to Scale the Resources on a VM Cluster
Starting in Oracle Exadata Database Service on Cloud@Customer, you can scale up or
down multiple resources at the same time. You can also scale up or down resources one
at a time.
• Introduction to Scale Up or Scale Down Operations
With the Multiple VMs per Exadata system (MultiVM) feature release, you can scale up or
scale down your VM cluster resources.
• Estimating How Much Local Storage You Can Provision On Your VMs
• Resource Tags
• Oracle PaaS/IaaS Cloud Service Description documents
• Oracle Platform as a Service and Infrastructure as a Service – Public Cloud Service
DescriptionsMetered & Non-Metered
• Getting Started with Events
• Overview of Database Service Events
• Overview of Automatic Diagnostic Collection
By enabling diagnostics collection and notifications, Oracle Cloud Operations and you will
be able to identify, investigate, track, and resolve guest VM issues quickly and effectively.
Subscribe to Events to get notified about resource state changes.
• Incident Logs and Trace Files
This section lists all of the files that can be collected by Oracle Support if you opt-in for
incident logs and trace collection.
• Health Metrics
Review the list of database and non-database health metrics collected by Oracle Trace
File Analyzer.
• Using the Console to Enable, Partially Enable, or Disable Diagnostics Collection
You can enable, partially enable, or disable diagnostics collection for your Guest VMs after
provisioning the VM cluster. Enabling diagnostics collection at the VM cluster level applies
the configuration to all the resources such as DB home, Database, and so on under the
VM cluster.
• Resource Manager and Terraform
5-125
Chapter 5
Manage VM Clusters
Note:
You cannot change the VM cluster type after deploying the VM cluster. If you
wish to change the VM cluster type, you must create a new VM cluster and
migrate the database to the new cluster.
5-126
Chapter 5
Manage VM Clusters
Note:
– Click Save.
• Specify the OCPU (ECPUs for X11M) count per VM: Specify the OCPU (ECPUs
for X11M) count to be provisioned for each VM in this cluster. The minimum value
is 2 OCPUs per VM or 8 ECPUs per VM for X11M (for a live VM condition), unless
you are specifying zero OCPUs or 0 ECPUs for X11M (for a shutdown VM
condition).
If you specify a value of zero, then the VM cluster virtual machines are all shut
down at the end of the cluster creation process. In this case, you can later start the
virtual machines by scaling the OCPU (ECPUs for X11M) resources. See Using
the Console to Scale the Resources on a VM Cluster.
The OCPU (ECPUs for X11M) count for the whole VM Cluster will be calculated
automatically based on the per-VM OCPU (ECPUs for X11M) count you have
specified and the number of physical Database Servers configured for the VM
Cluster.
OCPU: An Oracle Compute Unit (OCPU) provides CPU capacity equivalent of one
physical core of an Intel Xeon processor with hyperthreading enabled. Each OCPU
corresponds to two hardware execution threads, known as vCPUs.
See, Oracle Platform as a Service and Infrastructure as a Service – Public Cloud
Service DescriptionsMetered & Non-Metered.
ECPU: An ECPU is an abstracted measure of compute resources. ECPUs are
based on the number of cores elastically allocated from a pool of compute and
storage servers.
• Requested OCPU (ECPUs for X11M) count for the VM Cluster: Displays the
total number of CPU cores allocated to the VM cluster based on the value you
specified in the Specify the OCPU (ECPUs for X11M) count per VM field. This
field is not editable.
• Specify the memory per VM (GB): Specify the memory for each individual VM.
The value must be a multiple of 1 GB and is limited by the available memory on
the Exadata infrastructure.
• Requested memory for the VM Cluster (GB): Displays the total amount of
memory allocated to the VM cluster based on the value you specified in the
Specify the memory per VM (GB) field. This field is not editable.
5-127
Chapter 5
Manage VM Clusters
• Specify the local file system size per VM (GB): Specify the local file system size
for each individual VM. The value must be a multiple of 1 GB and is limited by the
available size of the file system on the X11M infrastructure.
Note that the minimum size of local system storage must be 60 GB. Each time
when you create a new VM cluster, the space remaining out of the total available
space is utilized for the new VM cluster.
For more information and instructions to specify the size for each individual VM,
see Introduction to Scale Up or Scale Down Operations.
i. Click Show advanced options to view additional local file systems
configuration options.
ii. Resize the /, /u01, /tmp, /var, /var/log, /var/log/audit, and /home
file systems as needed.
Note:
– You can only expand these file systems and cannot reduce the
size once expanded.
– Due to backup partitions and mirroring, the / and /var file
systems will consume twice the space they were allocated,
which is indicated in the read-only Total allocated storage for /
(GB) due to mirroring and Total allocated storage for /var
(GB) due to mirroring fields.
– After creating the VM Cluster, check the Exadata Resources
section on the Exadata Infrastructure Details page to check the
file size allocated to the local storage (/u02) and local storage
(additional file systems).
• Reserved local storage per VM (GB): Displays the local storage size reserved
internally for root file systems, Oracle Grid Infrastructure Homes, and diagnostic
logs. This field is not editable.
g. Configure the Exadata Storage: The following settings define how the Exadata
storage is configured for use with the VM cluster. The storage type once selected
cannot be changed later on once the VM cluster is provisioned with the desired
storage type. You have two options to choose: Automatic storage type (ASM) and
Exascale. For more information about ASM storage type, see Using the Console to
Create an ASM VM Cluster.
Note:
Minimum requirement to configure Exascale storage
• This feature is supported on Exadata Infrastructure Model X8M and later.
• This feature is available on Exadata system software release 24.1 and
later.
• This feature requires Oracle Grid Infrastructure version 23ai (24.3) and
supports Oracle database versions 23ai (23.4) and later.
Exascale option will be disabled If the minimum requirement is not met.
5-128
Chapter 5
Manage VM Clusters
Note:
If additional space is needed beyond the maximum shown, the
Exascale capacity must be increased. For more information, see
Using the Console to Scale an Exascale Storage Vault.
• Select existing storage vault: Select a vault that resides in the compartment of
your choice.
h. Select version:
Note:
Only Oracle database 23ai can be provisioned on the Exascale VM cluster.
• Choose the Oracle Grid Infrastructure version: The Oracle Grid Infrastructure
release defaults to 23ai.
• Choose an Exadata guest version:
– The Exadata guest version defaults to the latest (24.1.6.0)
– The Oracle Grid Infrastructure version defaults to 23ai
– The Change image button is enabled.
– Click Change image.
The resulting Change image panel displays the list of available major versions
of Exadata image (24.1.6.0 and later).
The most recent release for each major version is indicated by "(latest)"..
– Slide Display all available versions.
Six past versions including the latest versions of Exadata images 24.1.6.0 and
later are displayed.
– Choose a version.
– Click Save Changes.
i. Add SSH Key: Specify the public key portion of an SSH key pair that you want to use
to access the VM cluster virtual machines. You can upload a file containing the key, or
paste the SSH key string.
To provide multiple keys, upload multiple key files or paste each key into a separate
field. For pasted keys, ensure that each key is on a single, continuous line. The length
of the combined keys cannot exceed 10,000 characters.
j. Choose a license type:
5-129
Chapter 5
Manage VM Clusters
• Bring Your Own License (BYOL): Select this option if your organization already
owns Oracle Database software licenses that you want to use on the VM cluster.
Note:
BYOL is not available with Exadata Database-Developer VM Cluster
type.
Note:
You are opting in with the understanding that the list of events, metrics, and
log files collected can change in the future. You can opt out of this feature at
any time.
• Enable Diagnostic Events: Allow Oracle to collect and publish critical, warning,
error, and information events to me.
• Enable Health Monitoring: Allow Oracle to collect health metrics/events such as
Oracle Database up/down, disk space usage, and so on, and share them with
Oracle Cloud operations. You will also receive notification of some events.
• Enable Incident Logs and Trace Collection: Allow Oracle to collect incident logs
and traces to enable fault diagnosis and issue resolution.
All three checkboxes are selected by default. You can leave the default settings as
is or clear the checkboxes as needed. You can view the Diagnostic Collection
settings on the VM Cluster Details page under General Information >>
Diagnostics Collection.
– Enabled: When you choose to collect diagnostics, health metrics, incident
logs, and trace files (all three options).
– Disabled: When you choose not to collect diagnostics, health metrics, incident
logs, and trace files (all three options).
– Partially Enabled: When you choose to collect diagnostics, health metrics,
incident logs, and trace files ( one or two options).
l. Show Advanced Options:
• Time zone: The default time zone for the Exadata Infrastructure is UTC, but you
can specify a different time zone. The time zone options are those supported in
both the Java.util.TimeZone class and the Oracle Linux operating system.
5-130
Chapter 5
Manage VM Clusters
Note:
If you want to set a time zone other than UTC or the browser-detected
time zone, then select the Select another time zone option, select a
Region or country, and then select the corresponding Time zone.
If you do not see the region or country you want, then select
Miscellaneous, and then select an appropriate Time zone.
• Tags: Optionally, you can apply tags. If you have permission to create a resource,
you also have permission to apply free-form tags to that resource. To apply a
defined tag, you must have permission to use the tag namespace. For more
information about tagging, see Resource Tags. If you are not sure if you should
apply tags, skip this option (you can apply tags later) or ask your administrator.
6. Optionally, you can save the resource configuration as a stack.
• To save the resource configuration as a Stack:
a. Click Save as Stack.
b. In the resulting Save as Stack dialog, provide the following details:
i. Name: (Optional) Provide an easy to remember descriptive name.
ii. Description: (Optional) Enter a short description.
iii. Compartment: Select a compartment where this Stack will reside.
c. Click Save.
After saving the Stack, the system displays a banner with a link to the saved
Stack.
d. Click the link to open the Stack in the Resource Manager Service console.
See, Resource Manager and Terraform.
• To view the details of a Stack:
a. Open the navigation menu. Under Developer Services, click Resource Manager.
b. Click Stacks.
c. Click the name of the Stack that you want to view details.
Or, click the Actions menu (three dots), and select the View stack details option.
7. Click Create VM Cluster.
The VM Cluster Details page is now displayed. While the creation process is running, the
state of the VM cluster is Pending. When the VM cluster creation process completes, the
state of the VM cluster changes to Available.
The Exadata Database Storage section on the VM Cluster Details page shows the type of
storage configured, which, in this case, is Exascale.
Related Topics
• Oracle Exadata Database Service on Cloud@Customer Service Description
Learn how you can leverage the combined capabilities of Oracle Exadata and Oracle
Cloud Infrastructure with Oracle Exadata Database Service on Cloud@Customer
5-131
Chapter 5
Manage VM Clusters
5-132
Chapter 5
Manage VM Clusters
configuration to all the resources such as DB home, Database, and so on under the VM
cluster.
Note:
• You are opting in with the understanding that the list of events, metrics, and log
files collected can change in the future. You can opt-out of this feature at any
time.
• Oracle may add more metrics in the future, but if you have already chosen to
collect metrics, you need not update your opt-in value. It will remain enabled/
disabled based on your current preference.
• If have previously opted in for incident log and trace file collection and decide to
opt out when Oracle Cloud operations run a log collection job, then the job will
run its course and will not cancel. Future log collections won't happen until you
opt-in again to the incident logs and trace file collection option.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Choose the Region that contains your Exadata infrastructure.
3. Click Exadata VM Clusters.
4. Click the name of the VM cluster you want to enable or disable diagnostic data collection.
5. On the VM Cluster Details page, under General Information, enable, partially enable, or
disable Diagnostics Collection.
6. Click Edit.
Edit Diagnostics Collection Settings window is displayed.
7. Select or clear the checkboxes and then click Save.
Related Topics
• Overview of Automatic Diagnostic Collection
By enabling diagnostics collection and notifications, Oracle Cloud Operations and you will
be able to identify, investigate, track, and resolve guest VM issues quickly and effectively.
Subscribe to Events to get notified about resource state changes.
• Incident Logs and Trace Files
This section lists all of the files that can be collected by Oracle Support if you opt-in for
incident logs and trace collection.
• Health Metrics
Review the list of database and non-database health metrics collected by Oracle Trace
File Analyzer.
• Using the Console to Create an ASM VM Cluster
To create your ASM VM cluster, be prepared to provide values for the fields required for
configuring the infrastructure.
5-133
Chapter 5
Manage VM Clusters
Note:
Upgrade to Exadata System Software 23.1 for Exadata Cloud@Customer
Infrastructure will be available with February 2023 update cycle.
Consider reviewing the points below that will assist you in adding VMs to a provisioned cluster.
• The same Guest OS Image version running on the existing provisioned VMs in the cluster
is used to provision new VMs added to extend the VM cluster. However, any
customizations made to the Guest OS Image on the existing VMs must be manually
applied to the newly added VM.
• For VM clusters running a Guest OS Image version older than a year, you must update the
Guest OS Image version before adding a VM to extend the cluster.
• For databases not part of a Data Guard configuration, only databases that are running on
all VMs in the existing cluster will be added to the newly provisioned VM. Any database
running on a subset of VMs will not extend automatically to run on the newly added VM.
When you attempt to add a VM to a VM cluster, you might encounter the error [FATAL]
[INS-32156] Installer has detected that there are non-readable files
in oracle home. To resolve the issue, follow the steps outlined in Adding a VM to a VM
Cluster Fails before you try adding a cluster node.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
VM Clusters is selected by default.
2. Choose your Compartment.
A list of VM Clusters is displayed for the chosen Compartment.
3. Click the name of a VM cluster where you want to add virtual machines.
4. In the VM Cluster Details page, under Resources, click Virtual Machines, and then click
Add Virtual Machines.
5. On the Add Virtual Machines dialog, select additional DB servers on which to add the
VM.
You cannot unselect existing DB Servers. The maximum resources available per VM get
updated based on the newly added DB servers.
DB Server Statuses include In this VM cluster, Network not configured, Hosting a VM,
Available to add, and Insufficient resources. You can only add DB servers with the
Available to add selection eligibility.
DB servers that do not have a network configured are not available to add. To configure
the network, edit the VM Cluster Network of the associated infrastructure. For more
information, see Using the Console to Add Another DB Server to the VM Cluster Network.
5-134
Chapter 5
Manage VM Clusters
6. Select the DB servers with the Available to add selection eligibility and then click Add.
The statuses of the DB servers change to Allocated.
Note:
You cannot remove an allocated DB server.
To extend the database instance for Data Guard-enabled databases for the newly added VMs,
see Nodelist is not Updated for Data Guard-Enabled Databases.
Related Topics
• Using the Console to Add Another DB Server to the VM Cluster Network
To a DB server to the VM Cluster Network, complete this procedure.
• Adding a VM to a VM Cluster Fails
• Nodelist is not Updated for Data Guard-Enabled Databases
Note:
Terminating a VM from a cluster requires the removal of any database which is part
of a Data Guard configuration (either primary or standby) from the VM to proceed
with the terminate flow. For more information on manual steps, see My Oracle
Support note 2811352.1.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Choose the Region and Compartment that contains the VM cluster for which you want to
scale the CPU resources.
3. Click Exadata VM Clusters.
5-135
Chapter 5
Manage VM Clusters
4. Click the name of the VM cluster for which you want to remove a virtual machine.
5. Under Resources, click Virtual Machines.
6. In the list of virtual machines, click the Actions icon (three dots) for a virtual machine, and
then click Terminate.
7. On the Terminate Virtual Machine dialog, enter the name of the virtual machine, and then
click Terminate.
VM removed from the cluster. VM Cluster Details page displays the updated resource
allocation details under VM Cluster Resource Allocation.
Related Topics
• https://support.oracle.com/rs?type=doc&id=2811352.1
5-136
Chapter 5
Manage VM Clusters
• Upload SSH key files: Select this option to upload the file that contains SSH Key pair.
• Paste SSH keys: Select this option to paste the SSH key string.
To provide multiple keys, click Another SSH Key. For pasted keys, ensure that each
key is on a single, continuous line. The length of the combined keys cannot exceed
10,000 characters.
7. Click Save Changes.
Related Topics
• Managing Key Pairs on Linux Instances
5-137
Chapter 5
Manage VM Clusters
Note:
If you have explicitly set the CPU_COUNT database initialization parameter, that
setting is not affected by modifying the number of CPU cores that are
allocated to the VM cluster. Therefore, if you have enabled the Oracle
Database instance caging feature, the database instance does not use extra
CPU cores until you alter the CPU_COUNT setting. If CPU_COUNT is set to 0 (the
default setting), then Oracle Database continuously monitors the number of
CPUs reported by the operating system and uses the current count.
• Memory:
Specify the memory for each individual VM. The value must be a multiple of 1 GB and
is limited by the available memory on the Exadata infrastructure.
When you scale up or down the memory, the associated virtual machines are rebooted
in a rolling manner one virtual machine at a time to minimize the impact on the VM
cluster.
• Local file system size:
Specify the size for each individual VM. The value must be a multiple of 1 GB and is
limited by the available size of the file system on the Exadata infrastructure.
When you scale up or down the local file system size, the associated virtual machines
are rebooted in a rolling manner one virtual machine at a time to minimize the impact
on the VM cluster.
a. Click Show advanced options to view additional local file systems configuration
options.
b. Resize the /, /u01, /tmp, /var, /var/log, /var/log/audit, and /home file
systems as needed.
Note:
– You can only expand these file systems and cannot reduce the size
once expanded.
– Due to backup partitions and mirroring, the / and /var file systems
will consume twice the space they were allocated, which is indicated
in the read-only Total allocated storage for / (GB) due to mirroring
and Total allocated storage for /var (GB) due to mirroring fields.
5-138
Chapter 5
Manage VM Clusters
c. After creating the VM Cluster, check the Exadata Resources section on the
Exadata Infrastructure Details page to check the file size allocated to the local
storage (/u02) and local storage (additional file systems).
Reserved local storage per VM (GB): Displays the size reserved internally for root
file systems, Oracle Grid Infrastructure Homes, and diagnostic logs.
• Usable Exadata storage size:
Specify the total amount of Exadata storage that is allocated to the VM cluster. This
storage is allocated evenly from all of the Exadata Storage Servers. The minimum
recommended size is 2 TB.
You may reduce the Exadata storage allocation for a VM cluster. However, you must
ensure that the new amount covers the existing contents, and you should also allow
for anticipated data growth.
Note:
When you downsize, the new size must be at least 15% more than the
currently used size.
5-139
Chapter 5
Manage VM Clusters
5-140
Chapter 5
Manage VM Clusters
VM clusters:
• CreateVmCluster
• DeleteVmCluster
• GetVmCluster
• ListVmClusters
• UpdateVmCluster
5-141
Chapter 5
Manage VM Clusters
Note:
The use of the serial console feature requires Exadata Infrastructure version 22.1.10
or higher for 22.X users and version 23.1.1 or higher for 23.X users. The serial
console feature will be available on any new VM Clusters created immediately but will
only be available on previously existing VM Clusters after the next quarterly
maintenance cycle. Also, make sure to review all prerequisites stated below,
including setting a password for either the opc or the root user. Failure to make
necessary changes for meeting these requirements in advance will result in the
inability to urgently connect to the serial console when the need arises when the VM
is not otherwise accessible.
To connect to a running instance for administration and general use, use a Secure
Shell (SSH). For more information, see Connecting to a Virtual Machine with SSH
To make an SSH connection to the serial console, follow these configuration steps.
1. Ensure that you have the correct permissions.
2. Complete the prerequisites, including creating your SSH key pair (in case you don't have
one yet).
5-142
Chapter 5
Manage VM Clusters
Prerequisites
You must install an SSH client and create SSH key pairs.
• Ports to Open for Control Plane Connectivity
5-143
Chapter 5
Manage VM Clusters
Ensure that the firewall rules are correct so that the Control Plane Server (CPS) can reach the
required OCI endpoints. For more information, see Table 3-2
Microsoft Windows does not include an SSH client by default. If you are connecting from a
Windows client, you need to install an SSH client. You can use PuTTY plink.exe with Windows
PowerShell or software that includes a version of OpenSSH such as:
• Git for Windows
• Windows Subsystem for Linux
The instructions in this topic frequently use PuTTY and Windows PowerShell.
If you want to make the console connection from Windows with Windows PowerShell,
PowerShell might already be installed on your Windows operating system. If not, follow the
steps at the link. If you are connecting to the instance from a Windows client using PowerShell,
plink.exe is required. plink.exe is the command link connection tool included with PuTTY. You
can install PuTTY or install plink.exe separately. For installation information, see http://
www.putty.org.
To create the secure console connection, you need an SSH key pair. The method to use for
creating key pairs depends on your operating system. When connecting to the serial console,
you must use an RSA key. The instructions in this section show how to create an RSA SSH
key pair.
• Create the SSH key Pair for Linux
• Create the SSH Key Pair for Windows Using PuTTY
If you're using a UNIX-style system, you probably already have the ssh-keygen utility installed.
To determine whether the utility is installed, type ssh-keygen on the command-line. If the utility
isn't installed, you can download OpenSSH for UNIX from http://www.openssh.com/portable.html
and install it.
1. Open a shell or terminal for entering the commands.
2. At the prompt, enter ssh-keygen and provide a name for the key when prompted.
Optionally, include a passphrase.
The keys will be created with the default values: RSA keys of 2048 bits.
5-144
Chapter 5
Manage VM Clusters
Argument Description
-t rsa Use the RSA algorithm.
-N "<passphrase>" A passphrase to protect the use of the key (like a
password). If you don't want to set a passphrase,
don't enter anything between the quotes.
A passphrase is not required. You can specify
one as a security measure to protect the private
key from unauthorized use. If you specify a
passphrase, when you connect to the instance
you must provide the passphrase, which typically
makes it harder to automate connecting to an
instance.
-b 2048 Generate a 2048-bit key. You don't have to set
this if 2048 is acceptable, as 2048 is the default.
A minimum of 2048 bits is recommended for
SSH-2 RSA.
-C "<key_name>" A name to identify the key.
-f <path/root_name> The location where the key pair will be saved and
the root name for the files.
If you are using a Windows client to connect to the instance console connection, use an SSH
key pair generated by PuTTY.
Note:
Ensure that you are using the latest version of PuTTY, see http://www.putty.org.
1. Find puttygen.exe in the PuTTY folder on your computer, for example, C:\Program
Files (x86)\PuTTY. Double-click puttygen.exe to open it.
2. Specify a key type of SSH-2 RSA and a key size of 2048 bits:
• In the Key menu, confirm that the default value of SSH-2 RSA key is selected.
• For the Type of key to generate, accept the default key type of RSA.
• Set the Number of bits in a generated key to 2048 if not already set.
3. Click Generate.
4. To generate random data in the key, move your mouse around the blank area in the
PuTTY window.
When the key is generated, it appears under Public key for pasting into OpenSSH
authorized_keys file.
5. A Key comment is generated for you, including the date and timestamp. You can keep the
default comment or replace it with your own more descriptive comment.
5-145
Chapter 5
Manage VM Clusters
Note:
Do not use Save public key because it does not save the key in the OpenSSH
format.
You can name the key anything you want, but for consistency, use the same name as the
private key and a file extension of pub. For example: mykey.pub.
9. Write down the names and location of your public and private key files. You need the public
key when creating an instance console connection. You need the private key to connect to
the instance console connection using PuTTY. For
example: $HOME\Documents\mykey.ppk.
• To create a connection using the SSH key pair generated using PuTTY
To create a connection using the SSH key pair generated using PuTTY
For more information about generating SSH key pair, see Create the SSH Key Pair for
Windows Using PuTTY
Do the following on the Create serial console access window:
1. Paste the SSH Key generated from OpenSSH format or choose Upload SSH key file and
provide the path of the public key saved at step 8 in Create the SSH Key Pair for Windows
Using PuTTY.
2. Once the connection is Active, click Copy serial console connection for Windows.
3. Paste the connection string copied from the previous step into a text file.
4. In the text file, replace <PATH_FILE_PUTTY_PRIVATE.ppk> to point to your PuTTY
Private Key (PPK) file path on your computer. For example, if you have saved .ppk file
at $HOME\Documents\mykey.ppk.
5. Paste the modified connection string into the PowerShell window, and then press Enter to
connect to the console.
If you want to sign in to a virtual machine using a virtual machine console connection, you can
use Secure Shell (SSH) connection to sign in. If you want to sign in with a username and
password, you need a user account with a password. Oracle Exadata Cloud does not set a
default password for the opc or root users. Therefore, if you want to sign in as the opc or root
5-146
Chapter 5
Manage VM Clusters
user, you need to create a password for the opc or root user. Otherwise, add a different user
with a password and sign in as that user. This should be completed in-advance, before a
potential situation that might require you to log in to the serial console.
If the client you will use to access the serial console is behind a firewall, you must ensure that
this client is able to reach the required endpoint in order to access the serial console of the
virtual machine. The client system connecting to the serial console must be able to reach the
serial console server (for example, vm-console.exacc.us-ashburn-1.oci.oraclecloud.com)
over SSH using port 443, directly or through a proxy.
Note:
Virtual machine console connections are limited to one client at a time. If the client
fails, the connection remains active for approximately five minutes. During this time,
no other client can connect. After five minutes, the connection is closed, and a new
client can connect. During the five-minute timeout, any attempt to connect a new
client fails with the following message:
channel 0: open failed: administratively prohibited: console access is limited
to one connection at a time
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click the VM Cluster that you're interested in.
3. In the resulting VM Cluster Details page, click the name of the virtual machine that you're
interested in.
Under Resources, Console connection is selected by default.
4. Click Click Create console connection.
5. In the resulting Create serial console access window, you have three options for adding the
SSH key
• Generate a key pair for me: You can have Oracle Cloud Infrastructure generate an
SSH key pair to use. If you are using PowerShell or PuTTY to connect to the instance
from a Windows client, you cannot use the generated SSH key pair without first
converting it to a .ppk file.
• Upload public key file: Browse to a public key file on your computer. If you followed
the steps in Creating SSH Key Pairs in the Prerequisites section to create a key pair,
use this option to navigate to the .pub file.
• Paste public key: Paste the content of your public key file into the text box.
6. Click Create.
5-147
Chapter 5
Manage VM Clusters
When the console connection has been created and is available, the state changes to
Active.
Related Topics
• Create SSH Key Pairs
When you first connect to the serial console, you're prompted to validate the fingerprint of the
server host key. The fingerprint of the server host key is the SHA256 hash of the server host's
public SSH key. The server SSH handshake response is signed with the associated private
key. Validating the server host key's fingerprint protects against potential attacks.
When you make a manual connection to the serial console, the fingerprint of the server host
key is not automatically validated. To manually validate the fingerprint, compare the fingerprint
value displayed in the Oracle Cloud Infrastructure Console to the value of the RSA key
fingerprint that appears in the terminal when you connect.
To find the fingerprint of the server host key in the Console, on the Virtual Machine details
page, under Resources, click Console connection. The table displays the fingerprint of the
server host key. The fingerprint in the Console should match the value of the RSA key
fingerprint shown in the terminal when you connect to the serial console.
The server host keys are periodically rotated for security purposes. Key rotation reduces the
risk posed when keys are compromised by limiting the amount of data encrypted or signed by
one key version. When your key is rotated and you try to connect to the serial console, a
warning appears indicating a potential attack. The warning includes an Host key
verification failed error and a line number in your .ssh/known_hosts file. Delete
that line in your .ssh/known_hosts file and then reconnect to the serial console. You are
then prompted to accept a new server host key fingerprint.
Use an SSH client to connect to the serial console. Mac OS X and most Linux and UNIX-like
operating systems include the SSH client OpenSSH by default.
To connect to the serial console using OpenSSH on Mac OS X or Linux
5-148
Chapter 5
Manage VM Clusters
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click the VM Cluster that you're interested in.
3. In the resulting VM Cluster Details page, click the name of the virtual machine that you're
interested in.
4. On the Virtual Machine details page in the Oracle Cloud Infrastructure Console, under
Resources, click Console connection.
5. Click the Actions menu (three dots), and then click Copy serial console connection for
Linux/Mac.
6. Paste the connection string into a terminal window on a Mac OS X or Linux system, and
then press Enter to connect to the console.
If you are not using the default SSH key or ssh-agent, modify the serial console connection
string to include the identity file flag, -i to specify the private key portion for the SSH key to
use, for example, id_rsa. Specify this flag for both the SSH connection and the SSH
ProxyCommand, as shown in the following line:
7. If prompted, validate and accept the fingerprint of the server host key.
If you have previously accepted a fingerprint for the server host key but the key has been
rotated, a warning appears indicating a potential attack. The warning includes an Host
key verification failed error and a line number in your .ssh/known_hosts file.
Delete the specified line in your .ssh/known_hosts file and then reconnect to the serial
console. Validate and accept the new server host key fingerprint.
8. Press Enter again to activate the console.
If the connection is active, a message appears in the console:
=================================================
IMPORTANT: You are now connected to the serial console for this VM. This should be
used in emergency situations only.
See product documentation for more details and alternative connectivity options for
normal operations
=================================================
5-149
Chapter 5
Manage VM Clusters
The steps to connect to the serial console from Microsoft Windows PowerShell are different
from the steps for OpenSSH. The following steps do not work in the Windows terminal.
Note:
If you are connecting to the instance from a Windows client using PowerShell,
plink.exe is required. plink.exe is the command link connection tool included
with PuTTY. You can install PuTTY or install plink.exe separately. For more
information, see Installing an SSH Client and a Command-line Shell (Windows).
Note:
The copied connection string for Windows contains the parameter -i specifying
the location of the private key file. The default value for this parameter in the
connection string references an environment variable that might not be
configured on your Windows client, or it might not represent the location where
the private key file is saved. Verify the value specified for the -i parameter and
make any required changes before proceeding to the next step.
3. Paste the connection string copied from the previous step into a text file so that you can
add the file path to the private key file.
4. In the text file, replace $env:homedrive$env:homepath\oci\console.ppk with the
file path to the .ppk file on your computer. This file path appears twice in the string.
Replace it in both locations.
5. Paste the modified connection string into the PowerShell window or your OpenSSH client,
and then press Enter to connect to the console.
6. If prompted, validate and accept the fingerprint of the server host key.
If you have previously accepted a fingerprint for the server host key, but the key has been
rotated, a warning appears indicating a potential attack. The warning includes a Host key
verification failed error and a line number in your .ssh/known_hosts file. Delete the
specified line in your .ssh/known_hosts file and then reconnect to the serial console.
Validate and accept the new server host key fingerprint.
5-150
Chapter 5
Manage VM Clusters
To create a connection using the SSH key pair generated using the OCI Console
Note:
Ensure that you are using the latest version of PuTTY, see http://www.putty.org.
4. Find puttygen.exe in the PuTTY folder on your computer, for example, C:\Program
Files (x86)\PuTTY. Double-click puttygen.exe to open it.
5. On the PuTTY Key Generator, click the Conversions menu and then click Import.
6. On the Windows Explorer, select OCI Console generated SSH key (step 1) and then click
Open.
PuTTY imports the key and displays information about key on the PuTTY Key Generator
window.
7. Click Save private key.
8. Click Yes when prompted about saving the key without a passphrase.
The key pair is saved in the PuTTY Private Key (PPK) format, which is the proprietary
format that works only with the PuTTY tool set.
You can name the key anything you want, but use the .ppk file extension. For
example, $HOME\Desktop\key-vm-console.ppk.
5-151
Chapter 5
Manage VM Clusters
9. Use a text editor to change the command to point to your PuTTY Private Key (PPK) path.
Replace <PATH_FILE_PUTTY_PRIVATE.ppk> to point to your PuTTY Private Key (PPK)
file path on your computer. For example, if you have saved .ppk file
at $HOME\Desktop\key-vm-console.ppk.
10. Paste the modified connection string into the PowerShell window, and then press Enter to
connect to the console.
• To convert a generated .key private key file
To convert a generated .key private key file
1. Open PuTTYgen.
2. Click Load, and select the private key generated when you created the instance.
The extension for the key file is .key.
3. Click Save private key.
4. Specify a name for the key.
The extension for the new private key is .ppk.
5. Click Save.
Note:
• By default, Cloud Shell limits network access to OCI internal resources in your
tenancy home region only unless you have enabled the Cloud Shell managed
Public Network. Your administrator must configure an Identity policy to enable
Cloud Shell Public Network. For more information, see Cloud Shell Networking.
• You cannot concurrently connect to more than one DB node using Cloud Shell.
As an example, if you have an open connection to DBnode1 and want to connect
to DBnode2, you must first exit the active Cloud Shell from DBnode1 and then
establish a connection to DBnode2.
• Ensure that the firewall rules are correct so that the Control Plane Server (CPS)
can reach the required OCI endpoints. For more information, see Table 3-2
When you are finished with the serial console and have terminated the SSH connection, you
should delete the serial console connection. If you do not disconnect from the session, Oracle
Cloud Infrastructure terminates the serial console session after 24 hours and you must re-
authenticate to connect again.
• To connect to the serial console using Cloud Shell
5-152
Chapter 5
Manage VM Clusters
Related Topics
• Cloud Shell
• Using Cloud Shell
• Required IAM Policies
An administrator must grant you secure access to the virtual machine console on the
Exadata Database Service on Cloud@Customer system through an IAM policy.
Note:
To access the serial console and to use console history, firewall rules must be
configured so that the Control Plane Server (CPS) can access the necessary OCI
endpoints. Please review Table 3-2 details for Object Storage and VM console
connectivity requirements.
You can capture and display recent serial console data for a Virtual Machine. The data
includes configuration messages that occur when the Virtual Machine boots, such as kernel
and BIOS messages, and is useful for checking the status of the Virtual Machine or diagnosing
and troubleshooting problems.
The console history captures up to a megabyte of the most recent serial console data for the
specified Virtual Machine. Note that the raw console data, including multi-byte characters, is
captured.
The console history is a point-in-time record. To troubleshoot a malfunctioning Virtual Machine
using an interactive console connection, use a serial console connection.
• Managing Console History Data
5-153
Chapter 5
Manage VM Clusters
You can use the Console or API to manage console history captures. Console history lets you
see serial output from your Virtual Machine without having to connect to the instance remotely.
The console history can be used to audit previous access and actions taken with the serial
console.
On the instance details page in the Console, you can capture and download console histories,
view and edit metadata details, and delete console history captures.
• Using the Console to Capture the Console History
• Using the Console to Download Console History Captures
• Using the Console to View Console History Captures
• Using the Console to View and Edit the Metadata Details of a Console History Capture
• Using the Console to Delete Console History Captures
• Using the API to Manage the Console History Data
Review the list of API calls to manage console history data.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click the VM Cluster that you're interested in.
3. On the resulting VM Cluster Details page, click the name of the virtual machine that you're
interested in.
Under Resources, Console connection is selected by default.
4. Click Console history.
5. Click the name of the history that you're interested in.
6. On the resulting window, click Download to download a copy of the console history.
7. Click Save and close to save the history and close the window.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click the VM Cluster that you're interested in.
3. On the resulting VM Cluster Details page, click the name of the virtual machine that you're
interested in.
Under Resources, Console connection is selected by default.
4. Click Console history.
5. Click the name of the history that you're interested in.
6. On the resulting window, click Download to download a copy of the console history.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click the VM Cluster that you're interested in.
5-154
Chapter 5
Manage VM Clusters
3. On the resulting VM Cluster Details page, click the name of the virtual machine that you're
interested in.
Under Resources, Console connection is selected by default.
4. Click Console history.
5. Click the name of the history that you're interested in.
6. On the console history list, for the console history capture that you want to view, click the
Actions menu, and then click View details.
Using the Console to View and Edit the Metadata Details of a Console History Capture
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click the VM Cluster that you're interested in.
3. On the resulting VM Cluster Details page, click the name of the virtual machine that you're
interested in.
Under Resources, Console connection is selected by default.
4. Click Console history.
5. On the console history list, for the console history capture that you want to view, click the
Actions menu, and then click View details.
6. Optionally, edit the name for the console history. Avoid entering confidential information.
7. To view or edit tags, click Show tagging options.
8. To edit or remove tags, click the edit icon next to the tag. To edit a tag, in the Edit Tag
dialog, make any changes, and then click Save. To remove a tag, click Remove Tag.
9. Click Save and close.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click the VM Cluster that you're interested in.
3. On the resulting VM Cluster Details page, click the name of the virtual machine that you're
interested in.
Under Resources, Console connection is selected by default.
4. Click Console history.
5. On the console history list, for the console history capture that you want to view, click the
Actions menu, and then click Delete.
6. On the confirmation dialog, click Delete console history.
5-155
Chapter 5
Manage VM Clusters
Note:
Default user and password:
• Account: Grub boot loader
• Username: root
• Default Password: sos1Exadata
• Account Type: Operating system user
For more information, see Default User Accounts for Oracle Exadata.
5-156
Chapter 5
Manage VM Clusters
3. In the boot menu, highlight the top item in the menu, and press e to edit the boot entry.
4. In edit mode, use the down arrow key to scroll down through the entries until you reach
the line that starts with linux16.
5. At the end of that line, add the following:
init=/bin/bash
6. Reboot the instance from the terminal window by entering the keyboard shortcut CTRL+X.
When the instance has rebooted, you see the Bash shell command-line prompt, and you
can proceed with the following procedures.
Related Topics
• Default User Accounts for Oracle Exadata
1. From the Bash shell, run the following command to load the SElinux policies to preserve
the context of the files you are modifying:
/usr/sbin/load_policy -i
2. Run the following command to remount the root partition with read/write permissions:
/bin/mount -o remount, rw /
exec /usr/lib/systemd/systemd
/usr/sbin/reboot -f
1. From the Bash shell, run the following command to load the SElinux policies to preserve
the context of the files you are modifying:
/usr/sbin/load_policy -i
2. Run the following command to remount the root partition with read/write permissions:
/bin/mount -o remount, rw /
3. From the Bash shell, run the following command to change to the SSH key directory for the
opc user:
cd ~opc/.ssh
5-157
Chapter 5
Manage VM Clusters
Note:
You can edit the file and remove your previous key if you want to. However, make
sure to keep the cloud automation keys to prevent cloud automation from
breaking.
/usr/sbin/reboot -f
1. From the Bash shell, run the following command to load the SElinux policies to preserve
the context of the files you are modifying.
This step is necessary to sign in to your instance using SSH and the Console.
/usr/sbin/load_policy -i
2. Run the following command to remount the root partition with read/write permissions:
/bin/mount -o remount, rw /
3. Run the following command to reset the password for the opc user:
sudo reboot -f
Note:
Setting a root password would be an acceptable alternative to setting an opc
password.
5-158
Chapter 5
Manage Software Images
When using SSH, the ~ character at the beginning of a new line is used as an escape
character.
1. To exit the serial console, enter:
~.
~^z
~?
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click the VM Cluster that you're interested in.
3. In the resulting VM Cluster Details page, click the name of the virtual machine that you're
interested in.
Under Resources, Console connection is selected by default.
4. Click the Actions menu, and then click Delete. Confirm when prompted.
5-159
Chapter 5
Manage Software Images
• Using the OPatch lsinventory Command to Verify the Patches Applied to an Oracle
Database Home or Oracle Grid Infrastructure Home
OPatch utility enables you to apply the interim patches to Oracle Database Home or
Oracle Grid Infrastructure Home. You can find the opatch utility in the $ORACLE_HOME/
Opatch directory.
• Using the Console to Delete a Software Image
• Using the Console to View the Update Information of a Software Image
To view the Oracle Database version, update information (RU level), and included one-off
(interim) patches of a database software image, use the following instructions:
• Using the Console to Move a Software Image to a Different Compartment
Follow these steps to move a Software Image to a different compartment of your choice:
• Using the API for Managing Software Images
Review the list of API calls to manage Software Images.
Note:
The software images incur Object Storage usage costs.
Related Topics
• About Regions and Availability Domains
• Using the Console to Create a Database Software Image
To create an Oracle Database Software Image with the console, use this procedure.
5-160
Chapter 5
Manage Software Images
Note:
The Software Images are created and managed by the customer and they are
available for use until explicitly deleted.
Related Topics
• Using the Console to Create Oracle Database Home on Oracle Exadata Database Service
on Cloud@Customer
To create an Oracle Database home in an existing VM cluster with the Console, be
prepared to provide values for the fields required.
• Patching and Updating an Oracle Exadata Database Service on Cloud@Customer System
Learn how to perform patching operations on Exadata database virtual machines and
Database Homes by using the Console, API, or the CLI.
• Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
Learn to configure and manage Data Guard groups in your VM cluster.
5-161
Chapter 5
Manage Software Images
Related Topics
• Release Update Introduction and FAQ (Doc ID 2285040.1)
• Using the OPatch lsinventory Command to Verify the Patches Applied to an Oracle
Database Home or Oracle Grid Infrastructure Home
OPatch utility enables you to apply the interim patches to Oracle Database Home or
Oracle Grid Infrastructure Home. You can find the opatch utility in the $ORACLE_HOME/
Opatch directory.
• Resource Tags
5-162
Chapter 5
Manage Software Images
11. Click Show Advanced Options to add tags to your database software image. To apply a
defined tag, you must have permission to use the tag namespace. For more information
about tagging, see Resource Tags. If you are not sure if you should apply tags, skip this
option (you can apply tags later) or ask your administrator.
12. Click Create software image.
Related Topics
• Release Update Introduction and FAQ (Doc ID 2285040.1)
• Using the OPatch lsinventory Command to Verify the Patches Applied to an Oracle
Database Home or Oracle Grid Infrastructure Home
OPatch utility enables you to apply the interim patches to Oracle Database Home or
Oracle Grid Infrastructure Home. You can find the opatch utility in the $ORACLE_HOME/
Opatch directory.
• Resource Tags
$ORACLE_HOME/OPatch/opatch lsinventory
Oracle Interim Patch Installer version 12.2.0.1.21
Copyright (c) 2021, Oracle Corporation. All rights reserved.
5-163
Chapter 5
Manage Software Images
2. Use the lsinventory output file to extract the additional interim patches applied to a
specific Oracle Home.
5-164
Chapter 5
Manage Software Images
5-165
Chapter 5
Create Oracle Database Homes on an Oracle Exadata Database Service on Cloud@Customer System
Note:
Avoid entering confidential information when assigning descriptions, tags, or friendly
names to your cloud resources through the Oracle Cloud Infrastructure Console, API,
or CLI.
You can also add and remove Database homes, and perform other management tasks on a
Database home by using the dbaascli utility.
Related Topics
• Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Learn to use the dbaascli utility on Oracle Exadata Database Service on
Cloud@Customer.
5-166
Chapter 5
Create Oracle Database Homes on an Oracle Exadata Database Service on Cloud@Customer System
Note:
Minimum requirements for provisioning a Database 23ai home:
• Grid Infrastructure 23ai
• Exadata Guest VM running Exadata System Software 23.1.8
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
VM Clusters is selected by default.
2. Choose your Compartment.
A list of VM Clusters is displayed for the chosen Compartment.
3. In the list of VM clusters, click the VM cluster on which you want to create the Database
Home.
4. Under Resources, click Database Homes.
5. Click Create Database Home.
6. In the Create Database Home dialog, enter the following:
• Database Home display name: The display name for the Database Home.
• Unified Auditing: Select this check box to enable Unified Auditing framework.
Note:
You cannot disable Unified Auditing after provisioning the Database Home.
– For Oracle Database versions lower than 12.1: You cannot use the Unified
Auditing framework and should instead use the Traditional Audit, the legacy Oracle
Database audit framework.
– For Oracle Database versions 12.1 or higher: You can enable Unified Auditing
from the OCI Console. For Oracle Database versions 12.1 or higher but lower than
version 23ai, the Unified Auditing check box is not selected by default. However,
it is selected by default for Oracle Database version 23ai.
Unified Auditing field in the General Information section on the Database Home
Details page displays if Unified Auditing is Enabled or Disabled.
• Database image: Determines what Oracle Database version is used for the database.
You can mix database versions on the Exadata VM Cluster, but not editions. By
default, the latest Oracle-published database software image is selected.
5-167
Chapter 5
Create Oracle Database Homes on an Oracle Exadata Database Service on Cloud@Customer System
Note:
For the Oracle Database major version releases available in Oracle Cloud
Infrastructure, images are provided for the current version plus the three
most recent older versions (N through N - 3). For example, if an instance is
using Oracle Database 19c, and the latest version of 19c offered is
19.8.0.0.0, images available for provisioning are for versions 19.8.0.0.0,
19.7.0.0, 19.6.0.0 and 19.5.0.0.
A Database Software Image will not be available for Database Home creation if:
– The database version of Database Software Image is out of support. For example,
Database Software Images created using 11.2.0.4 will not be available for
Database Home provisioning after 31-Dec-2022.
– The Exadata model should support the PSU/RU version of the Database Software
Image. For example, for the 19c release, the X8M-2 model supports RU version
19.4 and greater.
– Only Database Software Images created specifically in the context of Exadata
Cloud@Customer service can be used while provisioning and patching Database
Homes within the Exadata Cloud@Customer service.
– The Database Software Image is not in Available state, that is, Deleted or is
being Updated.
• Show Advanced Options
You have the option to configure advanced options.
– Tags: (Optional) You can choose to apply tags. If you have permissions to create a
resource, then you also have permissions to apply free-form tags to that resource.
To apply a defined tag, you must have permissions to use the tag namespace. For
more information about tagging, see "Resource Tags". If you are not sure if you
should apply tags, then skip this option (you can apply tags later) or ask your
administrator.
Note that after Home install, patch to the latest if the latest patch is available.
7. Click Create.
5-168
Chapter 5
Manage Oracle Database Homes on Oracle Exadata Database Service on Cloud@Customer Systems
When the Database Home creation is complete, the status changes from Provisioning to
Available.
Related Topics
• Resource Tags
5-169
Chapter 5
Manage Oracle Database Homes on Oracle Exadata Database Service on Cloud@Customer Systems
Note:
Avoid entering confidential information when assigning descriptions, tags, or friendly
names to your cloud resources through the Oracle Cloud Infrastructure Console, API,
or CLI.
Related Topics
• Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Learn to use the dbaascli utility on Oracle Exadata Database Service on
Cloud@Customer.
5-170
Chapter 5
Manage Oracle Database Homes on Oracle Exadata Database Service on Cloud@Customer Systems
5-171
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
• DeleteDbHome
• Database Service API
If you terminate a Database Home using the dbaascli or dbaasapi, the status of the Database
Home is displayed as Terminated in the Database Service REST API based tools. If you
terminate a database, the status of the database is displayed as Failed.
5-172
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
5-173
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
Note:
Custom locale objects (such as language, territory, character set, and collation)
require deploying custom locale data files to both the database and storage servers,
which is not supported in Exadata Database Service on Cloud@Customer.
5-174
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
• Each database is configured with default instance parameter settings. While the defaults
are reasonable for many cases, you should review the instance parameter settings to
ensure that they meet your specific application needs.
In particular, review the Oracle Database system global area (SGA) and program global
area (PGA) instance parameter settings, especially if your VM cluster supports multiple
databases. Also, ensure that the sum of all Oracle Database memory allocations never
exceeds the available physical memory on each virtual machine.
– When creating a container database, the initialization parameter, SGA_TARGET is set by
the automation. This will automatically size the SGA memory pools. The setting will
vary depending on the size of the database VM total memory. If the VM has less than
or equal to 60 GB of system memory, SGA_TARGET is set to 3800 MB. If the VM has 60
GB or more system memory, SGA_TARGET is set to 7600 MB.
– The database initialization parameter USE_LARGE_PAGES is set to ONLY upon database
creation, which will require the use of large pages for SGA memory. If the VM is
configured with insufficient large pages, the instance will fail to start.
– The database initialization parameter INMEMORY_FORCE is set to CELLMEMORY_LEVEL for
all 19.8 and later databases created via the cloud automation. This setting will enable
the Exadata Columnar Cache feature, which dramatically speeds up analytic queries.
It is available for 19.8 and later databases and no In Memory license is required when
running in Exadata Cloud. For more information, see INMEMORY_FORCE
• Exadata Database Service will only create databases with 8K block size. This parameter
cannot be changed.
• Each database using Oracle Database 12c Release 1 or a later release is configured as a
container database (CDB). One pluggable database (PDB) is created inside the CDB. By
default:
– The first PDB is configured with a local PDB administration user account, named
PDBADMIN.
– The PDBADMIN user account is initially configured with the same administration
password as the CDB SYS and SYSTEM users.
– The PDBADMIN user account is initially configured with basic privileges assigned
through two roles; CONNECT and PDB_DBA. However, for most practical administrative
purposes you must assign extra privileges to the PDBADMIN user account, or to the
PDB_DBA role.
You can use native Oracle Database facilities to create extra PDBs, and to manage all of
your PDBs. The dbaascli utility also provides a range of convenient PDB management
functions.
Note:
Avoid entering confidential information when assigning descriptions, tags, or friendly
names to your cloud resources through the Oracle Cloud Infrastructure Console, API,
or CLI.
5-175
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
Note:
You cannot modify the db_name, db_unique_name, and SID prefix after creating
the database.
• Provide the database name: Specify a user-friendly name that you can use to identify
the database. The database name must contain only the permitted characters.
Review the following guidelines when selecting a database name.
– maximum of 8 characters
– contain only alphanumeric characters
– begin with an alphabetic character
– cannot be part of first 8 characters of a db_unique_name on the VM cluster
5-176
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
5-177
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
Note:
For the Oracle Database major version releases available in Oracle
Cloud Infrastructure, images are provided for the current version plus
the three most recent older versions (N through N - 3). For example,
if an instance is using Oracle Database 19c, and the latest version of
19c offered is 19.8.0.0.0, images available for provisioning are for
versions 19.8.0.0.0, 19.7.0.0, 19.6.0.0 and 19.5.0.0.
• Provide the administration password: Provide and confirm the Oracle Database
administration password. This password is used for administration accounts and
functions in the database, including:
– The password for the Oracle Database SYS and SYSTEM users.
– The Transparent Data Encryption (TDE) Keystore password.
For Oracle Database 12c Release 1 or later releases, the password for the PDB
administration user in the first PDB (PDBADMIN) must be nine to 30 characters and
contain at least two uppercase, two lowercase, two numeric, and two special
characters. The special characters must be _, #, or -. In addition, the password must
not contain the name of the tenancy or any reserved words, such as Oracle or Table,
regardless of casing.
– Use the administrator password for the TDE wallet: When this option is
checked, the password entered for the SYS user is also used for the TDE wallet.
To set the TDE wallet password manually, uncheck this option and enter the TDE
wallet password.
• Backup Destination Type: Select a backup destination for the database. From the
list, choose an option:
– Local: Select to store backups locally in the Oracle Exadata Storage Servers on
your Oracle Exadata Cloud at Customer system.
This option is available only if you enabled backups on local Oracle Exadata
storage in the VM cluster that you want to host the database.
– Object Storage: Select to store backups in an Oracle-managed object storage
container on Oracle Cloud Infrastructure.
To use this option, your Oracle Exadata Cloud@Customer system must have
egress connectivity to Oracle Cloud Infrastructure Object Storage.
– NFS: Select to store backups in one of your previously defined backup
destinations that use Network File System (NFS) storage. For more information,
refer to the information about backup destinations in this publication.
If you select this option, then you must also choose from the list of NFS Backup
Destinations.
– Recovery Appliance: Select to store backups in one of your previously defined
backup destinations that use Oracle Zero Data Loss Recovery Appliance. Refer to
the information about backup destination options in this document.
If you select Oracle Zero Data Loss Recovery Appliance as your backup option,
then you must also:
* Choose from the list of appliance Backup Destinations.
* Choose from the VPC User list, which contains the list of virtual private catalog
(VPC) user names that are defined in the Oracle Zero Data Loss Recovery
Appliance backup destination.
5-178
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
Note:
If you select a backup destination, then you cannot change a backup
location after the database is created. However, if you select None now,
then you can select a backup destination after the database is created.
– Enable automatic backups: Select this option to enable daily backups using the
policy for automatic backups.
This option is only enabled when you select a Backup Destination Type other
than None. You can change this setting after database creation.
• Key Management: Choose an encryption option, Oracle Wallet, Oracle Key Vault, or
External HSM. The default option is Oracle Wallet.
– Oracle Wallet:
Use the administrator password for the TDE wallet: When this option is
checked, the password entered for the SYS user is also used for the TDE wallet.
To set the TDE wallet password manually, uncheck this option and enter the TDE
wallet password and confirm it.
– Oracle Key Vault: Select the compartment where you have created the Key Store,
and then select the Key Store. As part of the CDB creation, a new wallet is created
for the CDB in Oracle Key Vault (OKV). Also, a TDE Master Key is generated for
the CDB and added to the wallet in OKV.
Note:
– External Keystore:
* TDE wallet password: Enter the TDE wallet password.
* External Keystore credential: Enter user credentials in the format your
external keystore provider supports.
• (Optional) Select Show Advanced Options. From this window, you can select the
following options:
5-179
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
Note:
Entering a SID prefix is only available for 12.1 databases and above.
Optionally, specify the Oracle SID prefix for the database. The instance number is
automatically appended to the SID prefix to become the instance_name database
parameter. If not provided, then the SID prefix defaults to the db_name.
Review the following guidelines when selecting a database name:
* maximum of 12 characters
* contain only alphanumeric characters
* begin with an alphabetic character
* unique in the VM cluster
– Encryption Key: Choose an encryption option, Encrypt using Oracle-managed
keys or Encrypt using customer-managed keys. The default option is Oracle-
managed keys.
To use customer-managed keys, select the Encrypt using customer-managed
keys option, select the compartment where you have created the Key Store, and
then select the Key Store. As part of the CDB creation, a new wallet is created for
the CDB in Oracle Key Vault (OKV). Also, a TDE Master Key is generated for the
CDB and added to the wallet in OKV.
Note:
– Backup retention period: From the list, you can choose the length of time that
you want automatic backups to be retained.
For backups to local Exadata storage, you can choose a retention period of 7 days
or 14 days. The default retention period is 7 days.
5-180
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
Note:
You can now:
• Create or delete a CDB while a Data Guard setup is running on another
database within the same Oracle home, and vice versa.
• Create or delete a CDB while concurrently performing Data Guard actions
(switchover, failover, and reinstate) within the same Oracle home, and vice versa.
• Create or delete a CDB while concurrently creating or deleting a PDB within the
same Oracle home, and vice versa.
• Create or delete a CDB concurrently on different databases within the same
Oracle home.
• Create or delete a CDB while simultaneously updating VM Cluster tags.
Related Topics
• Resource Tags
• Manage Database Backup and Recovery on Oracle Exadata Database Service on
Cloud@Customer
Learn how to work with the backup and recovery facilities provided by Oracle Exadata
Database Service on Cloud@Customer.
• Manage Keys Using an External Keystore
Review the use cases and implementation details of an external keystore.
Using the Console to Manage SYS User and TDE Wallet Passwords
Learn to manage administrator (SYS user) and TDE wallet passwords.
1. Open the navigation menu. Click Oracle Database, then click Exadata Database Service
on Cloud@Customer
5-181
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
2. Choose your Compartment that contains the VM cluster that hosts the database that you
want to change passwords.
3. Click the name of the VM cluster that contains the database that you want to change
passwords.
4. In the Resources list of the VM Cluster Details page, click Databases.
5. Click the name of the database that you want to change passwords.
The Database Details page displays information about the selected database.
6. On the Database Details page, click More actions, and then click Manage passwords.
7. In the resulting Manage passwords dialog, click Update Administrator Password or
Update TDE Wallet Password.
Depending on the option you select, the system displays the fields to edit.
• Update Administrator Password: Enter the new password in both the New
administrator password and Confirm administrator password fields.
Note:
The Update Administrator Password option will change the sys user
password only. Passwords for other administrator accounts such as system,
pdbadmin, and TDE wallet will not be changed.
• Update TDE Wallet Password: Enter the current wallet password in the Enter
existing TDE wallet password field, and then enter the new password in both the
New TDE wallet password and Confirm TDE wallet password fields.
8. Click Apply to update your chosen password.
Using the Console to Migrate Encryption Keys from Oracle Wallet to Other Encryption
Methods (Oracle Key Vault, External Keystore)
Learn to migrate encryption keys between different encryption methods.
Note:
• Migration requires the credentials for the encryption key, which must already be
present on the external keystore.
• Key migration works seamlessly in a Data Guard environment.
• You cannot migrate keys if other databases in the same VM cluster are already
using different encryption methods, such as an external keystore or Oracle Key
Vault (OKV).
• You will encounter an issue during PDB creation or cloning operations on
databases migrated to an external keystore. The fix for this issue will be included
in the January 2025 Release Update (RU) for database versions 19c and 23ai.
Until the RU becomes available, Oracle recommends applying the one-off patch
36930984 to address the issue.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
5-182
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
Note:
The "Rotate key" functionality applies only to databases that are not using Oracle
Wallet.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
VM Clusters is selected by default.
2. Select the compartment containing the VM cluster that hosts the database for which you
are rotating encryption keys.
3. Click the name of the VM cluster that contains the database that you want to rotate
encryption keys.
4. In the Resources list of the VM Cluster Details page, click Databases.
5. Click the name of the database that you want to rotate encryption keys.
The Database Details page displays information about the selected database.
6. In the Encryption section, click the Rotate key link.
7. On the resulting Rotate Key dialog, click Rotate.
Related Topics
• Manage Keys Using an External Keystore
Review the use cases and implementation details of an external keystore.
5-183
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
Note:
Oracle recommends using Database Homes, which are running the latest (N) to
3 versions from the latest (N-3) RU versions when updating the software version
of the database by moving them to a target DB Home. Only DB Homes
provisioned with database versions, which meet this best practice criterion are
available as target homes to move your database.
8. Click Move.
The database will be stopped in the current home and then restarted in the destination home.
While the database is being moved, the Database Home status displays as Moving Database.
When the operation completes, Database Home is updated with the current home. If the
operation is unsuccessful, the status of the database displays as Failed, and the Database
Home field provides information about the reason for the failure.
5-184
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
The Database Details page displays information about the selected database.
6. Click More actions, and then select Terminate.
7. In the resulting dialog, enter the name of the database, and then click Terminate
Database to confirm the action.
Note:
You can now:
• Terminate a CDB when Data Guard setup is running on another database in the
same Oracle home, and vice versa.
• Create or delete a CDB while concurrently performing Data Guard actions
(switchover, failover, and reinstate) within the same Oracle home, and vice versa.
5-185
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
Related Topics
• REST APIs
• Security Credentials
• Software Development Kits and Command Line Interface
• CreateDbHome
• DeleteDbHome
• GetDbHome
• ListDbHomes
• CreateDatabase
• GetDatabase
• ListDatabases
• UpdateDatabase
• UpdateDatabaseDetails
• GetDbNode
• List DbNodes
• Database Service API
Note:
if you are enabling Data Guard for a database, then the SYS password and the TDE
wallet password of the primary and standby databases must all be the same.
Note:
Using the dbaascli to change the SYS password will ensure the backup/restore
automation can parallelize channels across all nodes in the cluster.
5-186
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
2. Copy the blob file created to all the standby databases and update the file ownership to
oracle user.
3. Run the following command on all the standby databases:
5-187
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
container database. You can monitor all PDB operations performed using the Console or APIs
using the work request generated by the operation.
• Backup
You can take a backup of the PDB optionally during create, clone, or relocate operations
when the CDB is configured with the auto-backup feature. The PDB backup destination will
always be the same as CDB, and the backups cannot be accessed directly or created on
demand. Oracle recommends immediately backing up the PDB after you create or clone it.
This is because the PDB will not be recoverable until the next daily auto-backup completes
successfully, leading to a possible data loss.
• Restore
– Base Database Service / Oracle Exadata Database Service on Dedicated
Infrastructure:
* In place restore: You can restore a PDB within the same CDB to last known good
state or to a specified timestamp.
* Out of place restore: You can restore a PDB by creating a database (CDB) from
the backup, then selecting a PDB or a subset of them you want to restore on the
new database.
– Oracle Exadata Database Service on Cloud@Customer:
* In place restore: You can restore a PDB within the same CDB to last known good
state and specified timestamp.
* Out of place restore: It's not available.
You can perform an in-place restore when you want to move a PDB back to a specified
state or time. Both the CDB and PDB must be up and running and only one PDB can be
restored at a time.
– If you have multiple PDBs in your CDB and want to restore multiple of them to the
same CDB, then you could restore each individual PDB, one PDB at a time, from the
CDB backup.
– When the CDB is down, you could restore the complete CDB and all the PDBs in that
CDB will also be restored.
– You could either restore the database to the specified timestamp or to its last known
good state.
• Relocate
You can relocate a PDB from one CDB to another CDB within the same availability domain
(AD):
– Across compartments, VM clusters, DB system (for BaseDB only), or VCNs (not
applicable to ExaDB-C@C). If two different VCNs are used, then both VCNs must be
peered before relocating.
– To the same or a higher database version.
During relocate, the PDB will be removed from the source CDB and moved to the
destination CDB that is up and running. In a Data Guard association, a PDB relocated to
the primary will be synchronized with the standby as well.
• Clone
A clone is an independent and complete copy of the given database as it existed at the
time of the cloning operation. You can create clones of your PDB within the same CDB or a
different CDB and refresh the cloned PDB.
The following types of clones are supported:
5-188
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
– Local clone: A copy of the PDB is created within the same CDB.
– Remote clone: A copy of the PDB is created in a different CDB.
You can perform a remote clone of a PDB from one CDB to another CDB within the
same availability domain (AD):
* Across compartments, VM clusters, DB system (for BaseDB only), or VCNs (not
applicable to ExaDB-C@C). If two different VCNs are used, then both VCNs must
be peered before cloning.
* To the same or a higher database version.
– Refreshable clone: A copy of the PDB is created in a different CDB, and you will be
able to refresh the cloned PDB.
You can perform a refreshable clone of a PDB from one CDB to another CDB within
the same availability domain (AD):
* Across compartments, VM clusters, DB system (for BaseDB only), or VCNs (not
applicable to ExaDB-C@C). If two different VCNs are used, then both VCNs must
be peered before cloning.
* To the same or a higher database version.
• Refreshable Clone
A refreshable clone enables you to keep your remote clone updated with the source PDB.
You can only refresh while the PDB is in mount mode. The only open mode you can have
is read-only and refresh cannot be done while it is in read-only mode.
– A database link user credential is required for creating a refreshable clone.
– Clone, relocate, and in-place restore operations are not supported in the refreshable
clone. Relocate and in-place restore operations are not supported in the source, and
the source can only be deleted after disconnecting or deleting the refreshable clone.
– In a Data Guard association, a refreshable clone cannot be created on standby, but it
can be created on the primary. However, the primary will not be synced to the standby.
Note:
A PDB in standby cannot be used as the source for a refreshable PDB.
5-189
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
Note:
If the databases are created directly on Guest VM, the attributed usage data would
be delayed.
5-190
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
1. Open the navigation menu Under Oracle Database, and click Exadata Database Service
on Cloud@Customer.
VM Clusters is selected by default.
2. Choose your Compartment.
A list of VM Clusters is displayed for the chosen Compartment.
3. In the list of cloud VM clusters, click the name of the cluster in which you want to create the
PDB, and then click its name to display the database details page.
4. In the lower-left corner of the database details page, click Pluggable Databases.
A list of existing PDBs in this database is displayed.
5. Click Create Pluggable Database.
The Create Pluggable Database dialog box is displayed.
6. In the Create Pluggable Database dialog box, enter the following:
• Enter PDB Name: Enter a name for the PDB. The name must begin with an
alphabetic character and can contain a maximum of 30 alphanumeric characters.
• Unlock my PDB Admin Account:
– To enter the administrator's password, check this check box.
* PDB Admin Password: Enter PDB admin password. The password must
contain:
* a minimum of 9 and a maximum of 30 characters
* at least two uppercase characters
* at least two lowercase characters
* at least two special characters. The valid special characters are
underscore ( _ ), a pound or hash sign (#), and dash (-). You can use two
of the same characters or any combination of two of the same characters.
* at least two numeric characters (0 - 9)
* Confirm PDB Admin Password: Enter the same PDB Admin password in the
confirmation field.
– To skip entering the administrator's password, uncheck this check box. If you
uncheck this check box, then the PDB is created but you cannot use it. To use the
PDB, you must reset the administrator password.
Note:
When you create a new PDB, a local user in the PDB is created as the
administrator and granted the PDB_DBA role locally to the administrator.
5-191
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
For more information, see Administering a CDB and Administering PDBs in the
Oracle® Multitenant Administrator’s Guide.
b. Find the administrator name of your PDB:
• TDE Wallet password of database: Enter a wallet password for the CDB. This
password has the same rules as the PDB Admin Password.
• Take a backup of the PDB immediately after creating it: You must enable auto-
backup on the CDB to back up a PDB immediately after creating it. This check box is
checked by default if auto-backup was enabled on the CDB.
Note:
If the checkbox is unchecked, the system displays a warning stating that
PDB cannot be recovered until the next daily backup has been successfully
completed.
• Advanced Options:
– Tags: Optionally, you can apply tags. If you have permission to create a resource,
you also have permission to apply free-form tags to that resource. To apply a
defined tag, you must have permission to use the tag namespace. For more
information about tagging, see Resource Tags. If you are not sure if you should
apply tags, skip this option (you can apply tags later) or ask your administrator.
– Encryption Key Store: This shows if the encryption key for the CDB is managed
by Oracle or by the customer. In the case of customer-manager keys, the name of
the key store you have configured for CDB is displayed. You cannot edit this field.
7. Click Create.
The system starts the creation process and opens the Work Request page for the new
PDB. The Work request page shows the status of the creation process of the new PDB.
By default, the Work Request details page shows the log messages created by the system.
Click Error Messages or Associated Resources to see any error messages or
5-192
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
associated resources for the creation process, in the Resources area on the left side of the
page.
Note:
• The numbers at the right side of the Log Messages, Error Messages, and
Associated Resources links indicate how many of each item exists.
• Create or delete a PDB while a Data Guard setup is running on another
database within the same Oracle home, and vice versa.
• Create or delete a PDB while concurrently performing Data Guard actions
(switchover, failover, and reinstate) within the same Oracle home, and vice
versa.
• Create or delete a PDB concurrently on different databases within the same
Oracle home.
• Create or delete a PDB while simultaneously updating VM Cluster tags.
Related Topics
• Administering a CDB
• Administering PDBs
5-193
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
• Database TDE wallet password: Enter the TDE wallet password for the parent CDB
of the source PDB.
• Unlock my PDB Admin Account:
– To enter the administrator's password, check this check box.
* PDB Admin Password: Enter PDB admin password. The password must
contain:
* a minimum of 9 and a maximum of 30 characters
* at least two uppercase characters
* at least two lowercase characters
* at least two special characters. The valid special characters are
underscore ( _ ), a pound or hash sign (#), and dash (-). You can use two
of the same characters or any combination of two of the same characters.
* at least two numeric characters (0 - 9)
* Confirm PDB Admin Password: Enter the same PDB Admin password in the
confirmation field.
– To skip entering the administrator's password, uncheck this check box. If you
uncheck this check box, then the PDB is created but you cannot use it. To use the
PDB, you must reset the administrator password.
Note:
When you create a new PDB, a local user in the PDB is created as the
administrator and granted the PDB_DBA role locally to the administrator.
For more information, see Administering a CDB and Administering PDBs in the
Oracle® Multitenant Administrator’s Guide.
b. Find the administrator name of your PDB:
5-194
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
• TDE Wallet password of database: Enter a wallet password for the CDB. This
password has the same rules as the PDB Admin Password.
• Take a backup of the PDB immediately after creating it: You must enable auto-
backup on the CDB to back up a PDB immediately after creating it. This check box is
checked by default if auto-backup was enabled on the CDB.
Note:
If the checkbox is unchecked, the system displays a warning stating that
PDB cannot be recovered until the next daily backup has been successfully
completed.
• Advanced Options:
– Tags: Optionally, you can apply tags. If you have permission to create a resource,
you also have permission to apply free-form tags to that resource. To apply a
defined tag, you must have permission to use the tag namespace. For more
information about tagging, see Resource Tags. If you are not sure if you should
apply tags, skip this option (you can apply tags later) or ask your administrator.
7. Click Relocate.
Note:
Relocate will incur downtime during the process and that the time required is
based on the size of the PDB.
Related Topics
• Administering a CDB
• Administering PDBs
• Resource Tags
5-195
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
5-196
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
5-197
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
Note:
You can now delete a PDB when Data Guard setup is running on another database
in the same Oracle home, and vice versa.
5-198
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
Note:
When cloning a PDB from 19c to 23ai, the cloned PDB is automatically upgraded to
23ai. For example, if you use refreshable clones to clone to 23ai and then convert it
to regular PDB, all necessary upgrade steps are automatically handled, converting
the refreshable clone into a fully upgraded 23ai PDB.
5-199
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
Note:
When you create a new PDB, a local user in the PDB is created as the
administrator and granted the PDB_DBA role locally to the administrator.
For more information, see Administering a CDB and Administering PDBs in the
Oracle® Multitenant Administrator’s Guide.
b. Find the administrator name of your PDB:
5-200
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
• Take a backup of the PDB immediately after creating it: You must enable auto-
backup on the CDB to back up a PDB immediately after creating it. This check box is
checked by default if auto-backup was enabled on the CDB.
Note:
If the checkbox is unchecked, the system displays a warning stating that
PDB cannot be recovered until the next daily backup has been successfully
completed.
• Enable thin clone: All clones are thin clones by default. For more information about
thin clone, see Thin Cloning a Pluggable Database in the Oracle® Exadata Exascale
User's Guide. If you specifically want a thick clone (full copy), you need to deselect this
option.
• Advanced Options:
– Tags: Optionally, you can apply tags. If you have permission to create a resource,
you also have permission to apply free-form tags to that resource. To apply a
defined tag, you must have permission to use the tag namespace. For more
information about tagging, see Resource Tags. If you are not sure if you should
apply tags, skip this option (you can apply tags later) or ask your administrator.
9. Click Clone.
Related Topics
• Resource Tags
Using the Console to Create a Remote Clone of a Pluggable Database (PDB)
To create a remote clone of your PDBs, follow this procedure.
1. Open the navigation menu Under Oracle Database, and click Exadata
Cloud@Customer.
VM Clusters is selected by default.
2. Choose your Compartment.
A list of VM Clusters is displayed for the chosen Compartment.
3. In the list of VM clusters, click the name of the VM cluster that contains the PDB you want
to clone, and then click its name to display the details page.
5-201
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
4. Under Databases, find the database containing the PDB you want to clone.
5. Click Pluggable Databases in the Resources section of the page.
A list of existing PDBs in this database is displayed.
6. Click the name of the PDB that you want to clone.
The pluggable details page is displayed.
7. Click Clone.
8. In the Clone PDB dialog box, enter the following:
• Select clone type: Select Remote clone to create a copy of the source PDB to the
same CDB.
• VM Cluster: Use the menu to select the destination VM cluster.
• Destination database: Use the menu to select an existing database where the PDB
will be created. This database can be of the same version as the CDB the source PDB
is in or of a higher version.
• New PDB name for the clone: The name must begin with an alphabetic character
and can contain up to 30 characters.
• Database TDE wallet password: Enter the TDE wallet password for the parent CDB
of the source PDB.
• Unlock my PDB Admin Account:
– To enter the administrator's password, check this check box.
* PDB Admin Password: Enter PDB admin password. The password must
contain:
* a minimum of 9 and a maximum of 30 characters
* at least two uppercase characters
* at least two lowercase characters
* at least two special characters. The valid special characters are
underscore ( _ ), a pound or hash sign (#), and dash (-). You can use two
of the same characters or any combination of two of the same characters.
* at least two numeric characters (0 - 9)
* Confirm PDB Admin Password: Enter the same PDB Admin password in the
confirmation field.
– To skip entering the administrator's password, uncheck this check box. If you
uncheck this check box, then the PDB is created but you cannot use it. To use the
PDB, you must reset the administrator password.
Note:
When you create a new PDB, a local user in the PDB is created as the
administrator and granted the PDB_DBA role locally to the administrator.
5-202
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
a. Connect to the container where your PDB exists using the SQL*Plus CONNECT
statement.
For more information, see Administering a CDB and Administering PDBs in the
Oracle® Multitenant Administrator’s Guide.
b. Find the administrator name of your PDB:
Note:
If you do not provide database link information, cloud automation will create a
database link using the common user. However, you can specify the
database link information if you want cloud automation to use a specific
database link.
• Take a backup of the PDB immediately after creating it: You must enable auto-
backup on the CDB to back up a PDB immediately after creating it. This check box is
checked by default if auto-backup was enabled on the CDB.
5-203
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
Note:
If the checkbox is unchecked, the system displays a warning stating that
PDB cannot be recovered until the next daily backup has been successfully
completed.
• Enable thin clone: All clones are thin clones by default. For more information about
thin clone, see Thin Cloning a Pluggable Database in the Oracle® Exadata Exascale
User's Guide. If you specifically want a thick clone (full copy), you need to deselect this
option.
Note:
The thin clone option will be disabled (greyed out) if the source and target
VM clusters do not share the same vault. In such cases, only thick clones are
supported.
• Advanced Options:
– Tags: Optionally, you can apply tags. If you have permission to create a resource,
you also have permission to apply free-form tags to that resource. To apply a
defined tag, you must have permission to use the tag namespace. For more
information about tagging, see Resource Tags. If you are not sure if you should
apply tags, skip this option (you can apply tags later) or ask your administrator.
9. Click Clone.
Related Topics
• Resource Tags
Using the Console to Create a Refreshable Clone of a Pluggable Database (PDB)
To create a refreshable clone of your PDBs, follow this procedure.
1. Open the navigation menu Under Oracle Database, and click Exadata
Cloud@Customer.
VM Clusters is selected by default.
2. Choose your Compartment.
A list of VM Clusters is displayed for the chosen Compartment.
3. In the list of VM clusters, click the name of the VM cluster that contains the PDB you want
to clone, and then click its name to display the details page.
4. Under Databases, find the database containing the PDB you want to clone.
5. Click Pluggable Databases in the Resources section of the page.
A list of existing PDBs in this database is displayed.
6. Click the name of the PDB that you want to clone.
The pluggable details page is displayed.
7. Click Clone.
8. In the Clone PDB dialog box, enter the following:
• Select clone type: Select Refreshable clone to create a copy of the source PDB to
the same CDB.
For more information about refreshable clones, see About Refreshable Clone PDBs.
5-204
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
Note:
When you create a new PDB, a local user in the PDB is created as the
administrator and granted the PDB_DBA role locally to the administrator.
For more information, see Administering a CDB and Administering PDBs in the
Oracle® Multitenant Administrator’s Guide.
5-205
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
Note:
For a refreshable clone, the database link parameter is mandatory, and you
must provide this information.
• Enable thin clone: All clones are thin clones by default. For more information about
thin clone, see Thin Cloning a Pluggable Database in the Oracle® Exadata Exascale
User's Guide. If you specifically want a thick clone (full copy), you need to deselect this
option.
Note:
The thin clone option will be disabled (greyed out) if the source and target
VM clusters do not share the same vault. In such cases, only thick clones are
supported.
• Advanced Options:
– Tags: Optionally, you can apply tags. If you have permission to create a resource,
you also have permission to apply free-form tags to that resource. To apply a
defined tag, you must have permission to use the tag namespace. For more
information about tagging, see Resource Tags. If you are not sure if you should
apply tags, skip this option (you can apply tags later) or ask your administrator.
9. Click Clone.
5-206
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
5-207
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
• Database TDE wallet password: Enter the TDE wallet password for the parent CDB
of the source PDB.
• Take a backup of the PDB immediately after creating it: You must enable auto-
backup on the CDB to back up a PDB immediately after creating it. This check box is
checked by default if auto-backup was enabled on the CDB.
Note:
If the checkbox is unchecked, the system displays a warning stating that
PDB cannot be recovered until the next daily backup has been successfully
completed.
9. Click Convert.
5-208
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
5-209
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
• RemoteclonePluggabledatabase
For the complete list of APIs for the Database service, see Database Service API.
Related Topics
• REST APIs
• Security Credentials
• Software Development Kits and Command Line Interface
• LocalclonePluggableDatabase
• RemoteclonePluggabledatabase
• Database Service API
5-210
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
Related Topics
• Intermittent Failure in PDB Creation When Multiple PDBs are Getting Created in Parallel
Note:
It is supported only on Oracle Databases 19c and higher running in a multitenant
deployment.
With this enhancement to the Cost Analysis feature of the OCI Cost Management Service, you
can view the attributed usage and cost for all the PDBs in a VM Cluster. This data will be
available on the cost analysis dashboard and the reports.
Prerequisites:
• dbaastools: (minimum version) 24.3.2
– To check the version of the dbaastools rpm on the guest VM, run:
Confirm you have the minimum version of dbaastools needed after you update the
dbaastools rpm by running the rpm -qa | grep dbaastools command.
• dbcsagent needs to be running on the guest VM. Minimum version of dbcsagent needed is
23.3.2.
– To check the version of the dbcsagent on the guest VM, run:
– You will need to open a service request on My Oracle Support to update the dbcsagent
on the guest VM.
– To check the status of the dbcsagent, run:
Run systemctl start dbcsagent if the dbcsagent is not in active (running) state.
Check the status of the agent again to confirm that it is running.
• Network setup: The Control Plane Server must be able to establish a connection with the
endpoint specified in the Metering and Monitoring section of Table 3-2 in the Network
Requirements for Oracle Exadata Database Service on Cloud@Customer.
• Generate Attributed Cost Analysis Report for Pluggable Databases
Follow the steps below to view the attributed costs based on CPU utilization for all
pluggable databases within a VM Cluster.
5-211
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
5-212
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
• Oracle Cloud Infrastructure (OCI) Identity and Access Management (IAM) Authentication
with Oracle Database
Learn to enable an Oracle Database instance on Oracle Exadata Database Service on
Cloud@Customer to allow user access with an Oracle Cloud Infrastructure IAM database
password (using a password verifier), or SSO tokens.
• Prerequisites for Oracle Cloud Infrastructure (OCI) Identity and Access Management (IAM)
Authentication on Oracle Database
Review the prerequisites for Identity and Access Management (IAM) authentication on an
Oracle Database.
• Enabling the Database and Clients for IAM Integration
Follow the appropriate link below to configure IAM users to access your database.
About Oracle Cloud Infrastructure (OCI) Identity and Access Management (IAM) Authentication
with Oracle Database
You can enable an Oracle Database instance to use Oracle Cloud Infrastructure (IAM)
authentication and authorization for users.
Note:
Oracle Database supports the Oracle DBaaS integration for Oracle Cloud
Infrastructure (OCI) IAM with identity domains as well as the legacy IAM, which does
not include identity domains. Both default and non-default domain users and groups
are supported when using IAM with Identity Domains.
Support for IAM integration is only available with Oracle Database Release 19c,
Version 19.21 and higher (but not Oracle Database Release 21c).
Oracle Cloud Infrastructure IAM integration with Oracle Exadata Database Service on
Cloud@Customer supports the following:
5-213
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
Oracle Cloud Infrastructure (OCI) Identity and Access Management (IAM) Database Password
Authentication
You can enable an Oracle Database instance to allow user access with an Oracle Cloud
Infrastructure IAM database password (using a password verifier).
Note:
Any supported 12c and above database client can be used for IAM database
password access to Oracle Database.
An Oracle Cloud Infrastructure IAM database password allows an IAM user to log in to an
Oracle Database instance as Oracle Database users typically log in with a username and
password. The user enters their IAM user name and IAM database password. An IAM
database password is a different password than the Oracle Cloud Infrastructure Console
password. Using an IAM user with the password verifier, you can log in to Oracle Database
with any supported database client.
For password verifier database access, you create the mappings for IAM users and OCI
applications to the Oracle Database instance. The IAM user accounts themselves are
managed in IAM. The user accounts and user groups can be in either the default domain or in
a custom, non-default domain.
For more information about managing IAM database password, see Working with IAM
Database User Names and Passwords.
Oracle Cloud Infrastructure (OCI) Identity and Access Management (IAM) SSO Token Based
Authentication
You can enable an Oracle Database instance to use Oracle Cloud Infrastructure (OCI) Identity
and Access Management (IAM) SSO tokens.
To access the database using IAM tokens, you create the mappings for IAM users and OCI
applications to the Oracle Database instance. The IAM user accounts themselves are
managed in IAM. The user accounts and user groups can be in either the default domain or a
custom, non-default domain.
There are several ways a database client can obtain an IAM database token:
• A client application or tool can request the database token from IAM for the user and can
pass the database token through the client API. Using the API to send the token overrides
other settings in the database client. Using IAM tokens requires the latest Oracle Database
client 19c (at least 19.16). Some earlier clients (19c and 21c) provide a limited set of
capabilities for token access. Oracle Database client 21c does not fully support the IAM
token access feature. For more information about the clients supported for this type of IAM
database token usage, see Supported Client Drivers for IAM Connections.
5-214
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
• If the application or tool does not support requesting an IAM database token through the
client API, the IAM user can first use the Oracle Cloud Infrastructure command line
interface (CLI) to retrieve the IAM database token and save it in a file location. For
example, to use SQL*Plus and other applications and tools using this connection method,
you first obtain the database token using the Oracle Cloud Infrastructure (OCI) Command
Line Interface (CLI). For more information, see db-token get. If the database client is
configured for IAM database tokens, when a user logs in with the slash login form, the
database driver uses the IAM database token that has been saved in the default or
specified file location.
• A client application or tool can use an Oracle Cloud Infrastructure IAM instance principal or
resource principal to get an IAM database token and use the IAM database token to
authenticate itself to an Oracle Database instance.
• Some Oracle Database 23ai clients can also get a token directly from OCI IAM instead of
using the OCI command line interface. Please review the client documentation to see
which clients support this native IAM integration.
• IAM users and OCI applications can request a database token from IAM with several
methods, including using an API key. See Configuring a Client Connection for SQL*Plus
That Uses an IAM Token for an example. See Authenticating and Authorizing IAM Users
for Oracle DBaaS Databases for a description of other methods such as using a delegation
token within an OCI cloud shell.
In previous releases, you could only use the IAM username and database password to get a
password verifier from IAM. Getting a token with these credentials is more secure than getting
a password verifier because a password verifier is considered sensitive. Using a token means
that you do not need to pass or use the verifier. Applications cannot pass a token that was
retrieved by the IAM user name and password through the database client API. Only the
database client can retrieve this type of token. A database client can only retrieve a database
token using the IAM user name and IAM database password.
Prerequisites for Oracle Cloud Infrastructure (OCI) Identity and Access Management
(IAM) Authentication on Oracle Database
Review the prerequisites for Identity and Access Management (IAM) authentication on an
Oracle Database.
• Disable External Authentication Scheme
Review the prerequisites for enabling IAM user access to Oracle Database.
• Configure a Network Connection to OCI
Configure a network connection to OCI to be able to make calls to OCI IAM for the
database instances on Oracle Exadata Database Service on Cloud@Customer to accept
IAM database access tokens (db-tokens), or get IAM database password verifiers.
• Configure Proxy Settings
Configure network proxy settings in your environment to allow the database to access OCI
IAM. Replace the network proxy URL http://www-proxy.example.com:80/ and the
database name given in the example with yours.
• Configure TLS to Use IAM Tokens
When sending IAM tokens from the database client to the database server, a TLS
connection must be established. The TLS wallet with the database certificate for the
ExaDB-C@C service instance must be stored under the WALLET_ROOT location. Create a
tls directory so it looks like: WALLET_ROOT/<PDB GUID>/tls.
5-215
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
1. Consult your ExaDB-C@C administrator to determine the OCI region assigned to your
ExaDB-C@C installation.
2. Determine the OCI IAM endpoint for that OCI region. For more information, see Identity
and Access Management Service API.
3. Find the port number for Identity Service for name resolution of Oracle operators. For
more information, see Table 3-2 Ports to Open for Control Plane Connectivity in Network
Requirements for Oracle Exadata Database Service on Cloud@Customer.
For example, if your OCI region is Phoenix, then open port 443 to https://identity.us-
phoenix-1.oci.oraclecloud.com.
4. Configure your network to open this connection.
For more information on troubleshooting login failures, see Troubleshooting IAM Connections.
Related Topics
• Identity and Access Management Service API
• Network Requirements for Oracle Exadata Database Service on Cloud@Customer
5-216
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
3. Stop the database and verify that the variables have been set:
When configuring TLS between the database client and server there are several options to
consider.
• Using a self-signed database server certificate vs a database server certificate signed by a
commonly known certificate authority
• One-way TLS (TLS) vs Mutual or two-way TLS (mTLS)
• Client with or without a wallet
Self-Signed Certificate
Using a self-signed certificate is a common practice for internally facing IT resources since you
can create these yourself and it's free. The resource (in our case, the database server) will
have a self-signed certificate to authenticate itself to the database client. The self-signed
certificate and root certificate will be stored in the database server wallet. For the database
client to be able to recognize the database server certificate, a copy of the root certificate will
also be needed on the client. This self-created root certificate can be stored in a client-side
wallet or installed in the client system default certificate store (Windows and Linux only). When
the session is established, the database client will check to see that the certificate sent over by
the database server has been signed by the same root certificate.
One-Way TLS
In the standard TLS session, only the server provides a certificate to the client to authenticate
itself. The client doesn't need to have a separate client certificate to authenticate itself to the
server (similar to how HTTPS sessions are established). While the database requires a wallet
to store the server certificate, the only thing the client needs to have is the root certificate used
to sign the server certificate.
5-217
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
5-218
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
About Authorizing Microsoft Entra ID (MS-EI) Users for Oracle Databases on Oracle
Exadata Database Service on Cloud@Customer
Users for Oracle Exadata Database Service on Cloud@Customer can be centrally managed in
an MS-EI service.
The Oracle Database integration with MS-EI is supported for on-premises databases and most
Oracle OCI DBaaS platforms.
The instructions for configuring MS-EI use the term "Oracle Database" to encompass these
environments.
This type of integration enables the MS-EI user to access an Oracle Exadata Database
Service on Cloud@Customer instance. MS-EI users and applications can log in with MS-EI
Single Sign On (SSO) credentials to get an MS-EI OAuth2 access token to send to the
database.
The administrator creates and configures the application registration (app registration) of the
Oracle Exadata Database Service on Cloud@Customer instance with MS-EI. The
administrator also creates application (app) roles for the database app registration in MS-EI,
and assigns these roles to MS-EI users, groups, and applications. These app roles will be
mapped to the database global schemas and global roles. An MS-EI principal that is assigned
to an app role will be mapped to either a database global schema or database global role. An
Oracle global schema can also be mapped exclusively to an MS-EI user. When the principal is
a guest user or service principal, they can only be mapped to the database schema through an
MS-EI app role. An Oracle global role can only be mapped to an MS-EI app role.
Tools and applications that are updated to support MS-EI tokens can authenticate users
directly with MS-EI and pass the database access token to the Oracle Exadata Database
Service on Cloud@Customer instance. You can configure existing database tools such as
SQL*Plus to use an MS-EI token from a file location or get the token directly from MS-EI.
When using a utility to get the token to pass to the database client driver through a file location,
MS-EI tokens can be retrieved using tools like Microsoft PowerShell or Azure CLI and put into
a file location. An MS-EI OAuth2 database access token is a bearer token with an expiration
time. The Oracle Database client driver will ensure that the token is in a valid format and that it
has not expired before passing it to the database. The token is scoped for the database.
Assigned app roles for the Azure AD principal are included as part of the access token. The
directory location for the MS-EI token should only have enough permission for the user to write
the token file to the location and the database client to retrieve these files (for example, just
read and write by the process user). Because the token allows access to the database, it
should be protected within the file system.
MS-EI users can request a token as a client registered with MS-EI app registration by using
methods such as the following:
• Entering the MS-EI credentials into an MS-EI authentication screen with or without multi-
factor authentication
Oracle Exadata Database Service on Cloud@Customer supports the following MS-EI
authentication flows:
• Interactive flow (authorization code), which is used when a browser can be used to enter
credentials for the user
• Client credentials, which are for applications that connect as themselves (and not the end-
user)
5-219
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
The MS-EI integration with the Oracle Database on Oracle Exadata Database Service on
Cloud@Customer requires:
1. The Oracle Database to be version 19.18 or higher.
2. Connectivity to the database on TLS port 2484. Non TLS connections are not supported.
3. The Oracle Database to be registered with MS-EI.
4. Users and applications that need to request an MS-EI token must also be able to have
network connectivity to MS-EI. You may need to configure a proxy setting for the
connection.
5. Outbound network connectivity to MS-EI so that the database can request the MS-EI
public key.
a. Ensure that the ORACLE_SID, ORACLE_HOME, and PATH variables of the database are set
correctly.
b. Run the following srvctl commands as oracle user on the operating system:
5-220
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
c. The HTTP proxy settings must also be set in the ExaDB-C@C networking.
These settings are defined by your fleet administrator while creating the Exadata
infrastructure as described in Using the Console to Provision Oracle Exadata
Database Service on Cloud@Customer.
Note:
• The network configuration including the HTTP Proxy can only be edited
until the Exadata infrastructure is in Requires Activation state. Once it
is activated, you cannot edit those settings.
• Setting up an HTTP Proxy for an already provisioned Exadata
infrastructure needs a Service Request (SR) in My Oracle Support. See
Create a Service Request in My Oracle Support for details.
Related Topics
• Task 1: Create the service gateway
When sending MS-EI tokens from the database client to the database server, a TLS
connection must be established. The TLS wallet with the database certificate for the ExaDB-
C@C service instance must be stored under the WALLET_ROOT location. Create a tls directory
so it looks like: WALLET_ROOT/<PDB GUID>/tls.
When configuring TLS between the database client and server there are several options to
consider.
• Using a self-signed database server certificate vs a database server certificate signed by a
commonly known certificate authority
• One-way TLS (TLS) vs Mutual or two-way TLS (mTLS)
• Client with or without a wallet
Self-Signed Certificate
Using a self-signed certificate is a common practice for internally facing IT resources since you
can create these yourself and it's free. The resource (in our case, the database server) will
have a self-signed certificate to authenticate itself to the database client. The self-signed
certificate and root certificate will be stored in the database server wallet. For the database
client to be able to recognize the database server certificate, a copy of the root certificate will
also be needed on the client. This self-created root certificate can be stored in a client-side
wallet or installed in the client system default certificate store (Windows and Linux only). When
5-221
Chapter 5
Manage Databases on Oracle Exadata Database Service on Cloud@Customer
the session is established, the database client will check to see that the certificate sent over by
the database server has been signed by the same root certificate.
A Well-Known Certificate Authority
Using a commonly known root certificate authority has some advantages in that the root
certificate is most likely already stored in the client system default certificate store. There is no
extra step for the client to store the root certificate if it is a common root certificate. The
disadvantage is that this normally has a cost associated with it.
One-Way TLS
In the standard TLS session, only the server provides a certificate to the client to authenticate
itself. The client doesn't need to have a separate client certificate to authenticate itself to the
server (similar to how HTTPS sessions are established). While the database requires a wallet
to store the server certificate, the only thing the client needs to have is the root certificate used
to sign the server certificate.
Two-Way TLS (also called Mutual TLS, mTLS)
In mTLS, both the client and server have identity certificates that are presented to each other.
In most cases, the same root certificate will have signed both of these certificates so the same
root certificate can be used with the database server and client to authenticate the other
certificate. mTLS is sometimes used to authenticate the user since the user identity is
authenticated by the database server through the certificate. This is not necessary for passing
IAM tokens but can be used when passing IAM tokens.
Client with a Wallet
A client wallet is mandatory when using mTLS to store the client certificate. However, the root
certificate can be stored either in the same wallet or in the system default certificate store.
A Client without a Wallet
Clients can be configured without a wallet when using TLS under these conditions: 1) One-way
TLS is being configured where the client does not have its own certificate and 2) the root
certificate that signed the database server certificate is stored in the system default certificate
store. The root certificate would most likely already be there if the server certificate is signed by
a common certificate authority. If it's a self-signed certificate, then the root certificate would
need to be installed in the system default certificate store to avoid using a client wallet.
For details on how to configure TLS between the database client and database server
including the options described above, see:
• Configuring Transport Layer Security Authentication in the Oracle Database 19c Security
Guide.
• Configuring Transport Layer Security Encryption in the Oracle Database 23ai Security
Guide.
If you choose to use self-signed certificates and for additional wallet related tasks, see:
• Managing Public Key Infrastructure (PKI) Elements in the Oracle Database 19c Security
Guide.
• Configuring TLS Connection With a Client Wallet in the Oracle Database 23ai Security
Guide.
5-222
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
• Backup Destinations
A backup destination is a target for sending database backups. The target may be a local
filesystem, Object store, NFS mount or ZDLRA.
• Oracle Database Backup Methods in Exadata Cloud
Oracle Exadata Database Service on Cloud@Customer offers two approaches to
configure and take backups as a recommended solution: Oracle Managed Backup and
User Configured Backup.
• Configuring and Customizing Backups with dbaascli
In addition to the console-based automated backup option, use dbaascli to configure and
customize backups.
• Creating an On-Demand Backup by Using dbaascli
You can use the dbaascli to create an on-demand backup of a complete database or an
individual pluggable database (PDB):
• Disabling Automatic Backups to Facilitate Manual Backup and Recovery Management
• Customizing Real Time Redo Transport (RTRT) Behavior for Recovery Appliance Backups
• Alternative Backup Methods
Learn about alternative backup methods that are available in addition to the OCI Console.
Backup Destinations
A backup destination is a target for sending database backups. The target may be a local
filesystem, Object store, NFS mount or ZDLRA.
• About Managing Backup Destinations for Oracle Exadata Database Service on
Cloud@Customer
For backups, you can either use the Oracle Exadata Database Service on
Cloud@Customer backup facility, or you can configure a backup location on a location you
manage.
• Prerequisites for Backup Destinations for Oracle Exadata Database Service on
Cloud@Customer
To configure backup destinations on a Zero Data Loss Recovery Appliance location, or an
NFS backup location, review the prerequisites.
• Using the Console for Backup Destinations for Oracle Exadata Database Service on
Cloud@Customer
Learn how to use the console to create, edit, move, and terminate a backup destination for
your infrastructure for Oracle Exadata Database Service on Cloud@Customer.
• Using the API to Manage Oracle Exadata Database Service on Cloud@Customer Backup
Destinations
Review the list of API calls to manage your Oracle Exadata Database Service on
Cloud@Customer backup destinations.
5-223
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
Note:
Avoid entering confidential information when assigning descriptions, tags, or friendly
names to your cloud resources through the Oracle Cloud Infrastructure Console, API,
or CLI.
Related Topics
• Zero Data Loss Recovery Appliance
• Manage Oracle Database Homes on Oracle Exadata Database Service on
Cloud@Customer Systems
Learn to manage Oracle Database homes on Oracle Exadata Database Service on
Cloud@Customer.
• Using the Console to Create a Backup Destination
To create a backup destination, be prepared to provide values for the backup destination
configuration.
• Manage Database Backup and Recovery on Oracle Exadata Database Service on
Cloud@Customer
Learn how to work with the backup and recovery facilities provided by Oracle Exadata
Database Service on Cloud@Customer.
5-224
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
Note:
Oracle Autonomous Database on Exadata Cloud@Customer supports NFS
versions 3 and 4. Mounts with both versions enabled, however, default to
version 4.
* To ensure that the Autonomous VM cluster can access the NFS server over the
(preferred) Backup Network, enter valid Backup Network IP addresses while
configuring the VM Cluster Network.
If the backup destination is not accessible over the backup network but accessible
over the client network, the backup traffic will be routed over the client network.
* The NFS-mounted file system must be readable and writable by the oracle
operating system user on all of the VM cluster nodes.
* If permissions are being controlled at the user level, then the uid:gid of the
oracle user for the Autonomous VM cluster is 1001:1001.
* For NFSv4 servers that restrict port range, you must use the insecure option to
enable clients other than an Administrator user to connect to the NFS server.
Using the Console for Backup Destinations for Oracle Exadata Database Service on
Cloud@Customer
Learn how to use the console to create, edit, move, and terminate a backup destination for
your infrastructure for Oracle Exadata Database Service on Cloud@Customer.
• Using the Console to Create a Backup Destination
To create a backup destination, be prepared to provide values for the backup destination
configuration.
5-225
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
Note:
You can also set OCI Object Store as a backup destination. However, you
cannot set it from this screen. You can configure OCI Object Store as a
backup destination when creating a database. For more information, see
Backup Destination Type in Using the Console to Create a Database.
5-226
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
Note:
ADB customers must ensure to provide the connection string that
connects to the recovery appliance in an Oracle "easy connect"
string format, as shown below:
host:port/service name
Where host is the SCAN hostname of the Zero Data Loss Recovery
Appliance.
– Provide the Virtual Private Catalog (VPC) Users: Provide a VPC user name
for connecting to the Zero Data Loss Recovery Appliance. You can specify
multiple VPC user names in case you want to use the appliance as a backup
destination for multiple databases. This information is typically provided by the
Zero Data Loss Recovery Appliance administrator.
• If you select Network Storage (NFS), then you must also specify the following:
– Self-mount for non-autonomous databases:
Provide the local NFS mount point path: Specify the local directory path on
each VM cluster node where the NFS server location is mounted. The local
directory path and the NFS server location must each be the same across all
of the VM cluster nodes.
– Auto-mount for Autonomous Databases:
Use this destination for Autonomous Databases:
* NFS server: Specify the IP address of the NFS server. Optionally, you can
specify up to four IP addresses. These are just extra paths to the same
NFS server. Note that Oracle supports only one NFS device for backups.
* NFS export share: Specify the directory path where the exported file
system is mounted.
d. Configure Advanced Options.
• Tags: (Optional) You can choose to apply tags. If you have permissions to create a
resource, then you also have permissions to apply free-form tags to that resource.
To apply a defined tag, you must have permissions to use the tag namespace. For
more information about tagging, refer to information about resource tags. If you are
not sure if you should apply tags, then skip this option (you can apply tags later),
or ask your administrator.
6. Click Create Backup Destination.
The Backup Destination Details page displays the newly created backup destination.
Related Topics
• Using the Console to Create a Database
To create an Oracle Database with the console, use this procedure.
• Resource Tags
5-227
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
Note:
You cannot edit a Backup Destination if there is already a database attached to it.
• If you are editing a Zero Data Loss Recovery Appliance backup destination:
– Provide the Recovery Appliance connection string: Specify the Oracle Net
Services connection string that connects to the Recovery Appliance. This
information is typically provided by the Recovery Appliance administrator.
– Provide the Virtual Private Catalog (VPC) Users: Provide a VPC user name for
connecting to the Recovery Appliance. You can specify multiple VPC user names
in case you want to use the Recovery Appliance as a backup destination for
multiple databases. This information is typically provided by the Recovery
Appliance administrator.
• If you are editing an NFS backup destination:
– Self-mount for non-autonomous databases:
Provide the local NFS mount point path: Specify the local directory path on
each VM cluster node where the NFS server location is mounted. The local
directory path and the NFS server location must each be the same across all of
the VM cluster nodes.
– Auto-mount for Autonomous Databases:
Use this destination for Autonomous Databases:
* NFS server: Specify the IP address of the NFS server. Optionally, you can
specify up to four IP addresses.
* NFS export share: Specify the directory path where the exported file system
is mounted.
7. Click Save Changes.
5-228
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
5-229
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
5-230
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
Backup Destinations
A backup destination is a target for sending database backups. The target may be a local
filesystem, Object store, NFS mount or ZDLRA.
• About Managing Backup Destinations for Oracle Exadata Database Service on
Cloud@Customer
For backups, you can either use the Oracle Exadata Database Service on
Cloud@Customer backup facility, or you can configure a backup location on a location you
manage.
• Prerequisites for Backup Destinations for Oracle Exadata Database Service on
Cloud@Customer
To configure backup destinations on a Zero Data Loss Recovery Appliance location, or an
NFS backup location, review the prerequisites.
• Using the Console for Backup Destinations for Oracle Exadata Database Service on
Cloud@Customer
Learn how to use the console to create, edit, move, and terminate a backup destination for
your infrastructure for Oracle Exadata Database Service on Cloud@Customer.
• Using the API to Manage Oracle Exadata Database Service on Cloud@Customer Backup
Destinations
Review the list of API calls to manage your Oracle Exadata Database Service on
Cloud@Customer backup destinations.
5-231
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
Oracle Exadata Database Service on Cloud@Customer provides a backup facility, which you
can configure individually on each database.
See: Managing Databases on Exadata Cloud@Customer and Managing Database Backup
and Recovery on Exadata Cloud@Customer.
If you want to store backups on a Recovery Appliance, or on a network file storage (NFS)
location that you manage, then you must first create a backup destination. Each backup
destination defines the properties that are required to connect to the Recovery Appliance or
NFS location, and each backup destination must be accessible in your data center from the
VM cluster nodes.
The Oracle Exadata Database Service on Cloud@Customer backup facility can also store
backups on Oracle Cloud Infrastructure object storage, or on local Exadata storage on your
Oracle Exadata Database Service on Cloud@Customer system. However, you do not need to
create a backup destination for any of these other locations. Instead, applicable options for
backup to cloud object storage or local Exadata storage are available directly when you create
a database.
Note:
Avoid entering confidential information when assigning descriptions, tags, or friendly
names to your cloud resources through the Oracle Cloud Infrastructure Console, API,
or CLI.
Related Topics
• Zero Data Loss Recovery Appliance
• Manage Oracle Database Homes on Oracle Exadata Database Service on
Cloud@Customer Systems
Learn to manage Oracle Database homes on Oracle Exadata Database Service on
Cloud@Customer.
• Using the Console to Create a Backup Destination
To create a backup destination, be prepared to provide values for the backup destination
configuration.
• Manage Database Backup and Recovery on Oracle Exadata Database Service on
Cloud@Customer
Learn how to work with the backup and recovery facilities provided by Oracle Exadata
Database Service on Cloud@Customer.
5-232
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
– The appliance must be accessible from the Oracle Exadata Database Service on
Cloud@Customer system using the Oracle Net Services connection string, which is
provided by the Zero Data Loss Recovery Appliance administrator.
• For an NFS backup destination:
– Oracle Exadata Database Service on Cloud@Customer non-autonomous databases:
* You must mount the NFS server location to a local mount point directory on each
node in the VM cluster.
* The local mount point directory and the NFS server must be identical across all
nodes in the cluster.
* You must ensure that the NFS mount is maintained continuously on all of the VM
cluster nodes.
* The NFS-mounted file system must be readable and writable by the oracle
operating system user on all of the VM cluster nodes.
– Autonomous Database on Cloud@Customer:
Note:
Oracle Autonomous Database on Exadata Cloud@Customer supports NFS
versions 3 and 4. Mounts with both versions enabled, however, default to
version 4.
* To ensure that the Autonomous VM cluster can access the NFS server over the
(preferred) Backup Network, enter valid Backup Network IP addresses while
configuring the VM Cluster Network.
If the backup destination is not accessible over the backup network but accessible
over the client network, the backup traffic will be routed over the client network.
* The NFS-mounted file system must be readable and writable by the oracle
operating system user on all of the VM cluster nodes.
* If permissions are being controlled at the user level, then the uid:gid of the
oracle user for the Autonomous VM cluster is 1001:1001.
* For NFSv4 servers that restrict port range, you must use the insecure option to
enable clients other than an Administrator user to connect to the NFS server.
Using the Console for Backup Destinations for Oracle Exadata Database Service on
Cloud@Customer
Learn how to use the console to create, edit, move, and terminate a backup destination for
your infrastructure for Oracle Exadata Database Service on Cloud@Customer.
• Using the Console to Create a Backup Destination
To create a backup destination, be prepared to provide values for the backup destination
configuration.
• Using the Console to Edit a Backup Destination
To edit a backup destination, be prepared to provide values for the backup destination
configuration.
• Using the Console to Move a Backup Destination to Another Compartment
To move a backup destination, be prepared to provide values for the backup destination
configuration.
5-233
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
Note:
You can also set OCI Object Store as a backup destination. However, you
cannot set it from this screen. You can configure OCI Object Store as a
backup destination when creating a database. For more information, see
Backup Destination Type in Using the Console to Create a Database.
5-234
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
Note:
ADB customers must ensure to provide the connection string that
connects to the recovery appliance in an Oracle "easy connect"
string format, as shown below:
host:port/service name
Where host is the SCAN hostname of the Zero Data Loss Recovery
Appliance.
– Provide the Virtual Private Catalog (VPC) Users: Provide a VPC user name
for connecting to the Zero Data Loss Recovery Appliance. You can specify
multiple VPC user names in case you want to use the appliance as a backup
destination for multiple databases. This information is typically provided by the
Zero Data Loss Recovery Appliance administrator.
• If you select Network Storage (NFS), then you must also specify the following:
– Self-mount for non-autonomous databases:
Provide the local NFS mount point path: Specify the local directory path on
each VM cluster node where the NFS server location is mounted. The local
directory path and the NFS server location must each be the same across all
of the VM cluster nodes.
– Auto-mount for Autonomous Databases:
Use this destination for Autonomous Databases:
* NFS server: Specify the IP address of the NFS server. Optionally, you can
specify up to four IP addresses. These are just extra paths to the same
NFS server. Note that Oracle supports only one NFS device for backups.
* NFS export share: Specify the directory path where the exported file
system is mounted.
d. Configure Advanced Options.
• Tags: (Optional) You can choose to apply tags. If you have permissions to create a
resource, then you also have permissions to apply free-form tags to that resource.
To apply a defined tag, you must have permissions to use the tag namespace. For
more information about tagging, refer to information about resource tags. If you are
not sure if you should apply tags, then skip this option (you can apply tags later),
or ask your administrator.
6. Click Create Backup Destination.
The Backup Destination Details page displays the newly created backup destination.
Related Topics
• Using the Console to Create a Database
To create an Oracle Database with the console, use this procedure.
• Resource Tags
Using the Console to Edit a Backup Destination
5-235
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
To edit a backup destination, be prepared to provide values for the backup destination
configuration.
You can only edit a backup destination if it is not currently associated with database.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Choose the Region and Compartment that contains the backup destination that you want
to edit.
3. Click Backup Destinations.
4. Click the name of the backup destination that you want to edit.
The Backup Destination Details page displays information about the selected backup
destination.
5. Click Edit.
6. Use the Edit Backup Destination dialog to edit the backup destination attributes:
Note:
You cannot edit a Backup Destination if there is already a database attached to it.
• If you are editing a Zero Data Loss Recovery Appliance backup destination:
– Provide the Recovery Appliance connection string: Specify the Oracle Net
Services connection string that connects to the Recovery Appliance. This
information is typically provided by the Recovery Appliance administrator.
– Provide the Virtual Private Catalog (VPC) Users: Provide a VPC user name for
connecting to the Recovery Appliance. You can specify multiple VPC user names
in case you want to use the Recovery Appliance as a backup destination for
multiple databases. This information is typically provided by the Recovery
Appliance administrator.
• If you are editing an NFS backup destination:
– Self-mount for non-autonomous databases:
Provide the local NFS mount point path: Specify the local directory path on
each VM cluster node where the NFS server location is mounted. The local
directory path and the NFS server location must each be the same across all of
the VM cluster nodes.
– Auto-mount for Autonomous Databases:
Use this destination for Autonomous Databases:
* NFS server: Specify the IP address of the NFS server. Optionally, you can
specify up to four IP addresses.
* NFS export share: Specify the directory path where the exported file system
is mounted.
7. Click Save Changes.
Using the Console to Move a Backup Destination to Another Compartment
5-236
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
To move a backup destination, be prepared to provide values for the backup destination
configuration.
You can change the compartment that contains your backup destination by moving it.
When you move a backup destination, the compartment change does not affect other
associated resources. These other resources, such as the associated databases, remain in
their current compartment.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Choose the Region and Compartment that contains the backup destination that you want
to move.
3. Click Backup Destinations.
4. Click the name of the backup destination that you want to move.
The Backup Destination Details page displays information about the selected backup
destination.
5. Click Move Resource.
6. In the resulting dialog, choose the new compartment for the backup destination and click
Move Resource.
Using the Console to Delete a Backup Destination
To delete a backup destination, be prepared to provide values for the backup destination
configuration.
Before you can delete a backup destination, you must ensure that it is not associated with any
databases.
Deleting a backup destination:
• Does not remove any residual backups that are left in the backup destination
• Removes all references to the deleted backup destination from the Cloud Control Plane
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Choose the Region and Compartment that contains the backup destination that you want
to delete.
3. Click Backup Destinations.
4. Click the name of the backup destination that you want to delete.
The Backup Destination Details page displays information about the selected backup
destination.
5. Click Delete.
6. In the resulting dialog, enter the backup destination name and click Delete Backup
Destination to confirm the action.
Using the API to Manage Oracle Exadata Database Service on Cloud@Customer Backup
Destinations
Review the list of API calls to manage your Oracle Exadata Database Service on
Cloud@Customer backup destinations.
5-237
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
For information about using the API and signing requests, see "REST APIs" and "Security
Credentials". For information about SDKs, see "Software Development Kits and Command
Line Interface".
Use these API operations to manage Oracle Exadata Database Service on Cloud@Customer
backup destinations:
• CreateBackupDestination
• DeleteBackupDestination
• GetBackupDestination
• ListBackupDestination
• UpdateBackupDestination
• ChangeBackupDestinationCompartment
5-238
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
5-239
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
automatic backup operation fails, then the backup is deferred until the next day’s backup
window.
When required, you can restore Oracle Database to:
• The latest available restore point.
• A specific point in time by providing a time stamp.
• An Oracle Database System Change Number (SCN).
Note:
The backup and recovery facilities described in this topic cater only for database
backup and recovery, which includes Oracle Database data files, log files, control
files, and the server parameter (SP) file. You are responsible for backing up other
files on your virtual machines. In particular, Oracle strongly recommends that you
back up the Transparent Data Encryption (TDE) keystore (wallet). Without the TDE
keystore, the Oracle Database backups are effectively useless, because you cannot
read the data contained in the backup.
Note:
If TAG based recovery fails with error ORA-01152, then use Recovery Manager
(RMAN) directly to complete the recovery.
If the server parameter file (SPFILE) recovery fails for local configuration using
dbaascli, then use Recovery Manager (RMAN) directly to complete the recovery.
5-240
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
Note:
Only the managed backups are synced to the Console. If you configure backups
directly in the backend, then they are not synced to the Console. This is an expected
behavior and Oracle has no plans to change this behavior.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Choose the Region and Compartment that contains the VM cluster that hosts the
database in which you are interested.
3. Click VM Clusters.
4. Click the name of the VM cluster that hosts the database in which you are interested.
5. In the Resources list of the VM Cluster Details page, click Databases.
6. Click the name of the database in which you are interested.
The Database Details page displays information about the selected database, which
includes a list of the available backups.
Editing Backup Settings with the Console
To edit backup destinations, change backup schedules and other backup administration, you
can use with the Oracle Exadata Database Service on Cloud@Customer console.
Use this procedure to change the available backup settings:
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Choose the Region and Compartment that contains the VM cluster that hosts the
database for which you want to edit backup settings.
3. Click VM Clusters.
4. Click the name of the VM cluster that hosts the database for which you want to edit backup
settings.
5. In the Resources list of the VM Cluster Details page, click Databases.
6. Click the name of the database for which you want to edit backup settings.
The Database Details page displays information about the selected database.
7. Click Edit Backup Settings.
8. Your current backup configuration determines the changes that you can make in the
Backup Settings dialog, as follows:
• If automatic backups are not configured (Backup Destination Type is set to None),
then you can use the following settings to define the backup configuration for the
database:
– Backup Destination Type: From the list, choose an option.
* None Select if you do not define a backup configuration for the database.
* Local Select to store backups locally in the Exadata Storage Servers on your
Exadata Database Service on Cloud@Customer system.
5-241
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
This option is available only if you enabled backups on local Exadata storage
in the VM cluster that you want to host the database.
* Object Storage Select to store backups in an object storage container
managed by Oracle on Oracle Cloud Infrastructure.
To use this option, your Exadata Database Service on Cloud@Customer
system must have egress connectivity to Oracle Cloud Infrastructure Object
Storage.
* NFS Select to store backups in one of your previously defined backup
destinations that uses Network File System (NFS) storage. See "Managing
Backup Destinations for Exadata Database Service on Cloud@Customer".
If you select this option, then you must also choose from the list of NFS
Backup Destinations.
* Recovery Appliance Select to store backups in one of your previously
defined backup destinations that uses Oracle Zero Data Loss Recovery
Appliance. See Managing Backup Destinations for Exadata Database Service
on Cloud@Customer.
If you select this option, then you must also provide the following information:
* Choose Backup Destinations from the list of Recovery Appliance .
* Choose from the VPC User list, which contains the list of virtual private
catalog (VPC) user names that are defined in the Recovery Appliance
backup destination.
* Provide the Password for the VPC user.
Note:
If you select a backup destination (other than None), then you
cannot change it later.
5-242
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
• If automatic backups were previously configured, then you can make the following
changes:
– For Oracle Zero Data Loss Recovery Appliance backup destinations, you can
update the Password for the virtual private catalog (VPC) user that is used to
access the appliance.
– For backup destinations that do not use Oracle Zero Data Loss Recovery
Appliance, you can update the Backup retention period for automatic backups:
* For backups to local Exadata storage, you can choose a retention period of 7
days or 14 days. The default retention period is 7 days.
* For backups to Oracle Cloud Infrastructure Object Storage, or to an NFS
backup destination, you can choose one of the following preset retention
periods: 7 days, 14 days, 30 days, 45 days, or 60 days. The default retention
period is 30 days.
* For backups to Oracle Zero Data Loss Recovery Appliance, the retention
policy that is implemented in the appliance controls the retention period.
– You can set the option to Enable automatic backups. Select this option to enable
automatic database backups. Deselect this option to suspend automatic database
backups.
9. Click Save Changes.
Related Topics
• Backup Destinations
A backup destination is a target for sending database backups. The target may be a local
filesystem, Object store, NFS mount or ZDLRA.
• Customizing Real Time Redo Transport (RTRT) Behavior for Recovery Appliance Backups
Restoring a Database with the Console
To restore a database to a point in time, to a system change number (SCN), or to the latest
backup, use the Oracle Exadata Database Service on Cloud@Customer Console.
Note:
You can only restore a 23ai database in the same DB home (in-place restore).
5-243
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
8. In the resulting dialog box, select one of the following options, and click Restore
Database:
• Restore to latest: The database is restored and recovered with zero, or least
possible, data loss.
• Restore to a timestamp: The database is restored and recovered to the specified
timestamp.
• Restore to SCN: The database is restored and recovered to the specified Oracle
Database System Change Number (SCN). The specified SCN must be valid otherwise
the operation fails.
Note:
Backup fails after a point in time restore to a timestamp or SCN on NFS storage. Wait
for 10 minutes or so before proceeding with the backup.
5-244
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
Backups using dbaascli are not recognized as Oracle managed backups. Use the dbaascli
database backup, dbaascli pdb backup, dbaascli database recover, and dbaascli pdb
recover commands to configure and perform various backup and recover operations.
If customers configure backups to Object Storage using RMAN without using the OCI Control
Plane or OCI APIs, customers are responsible for manually configuring TDE Wallet backups.
By default, Oracle cloud automation cleans up archive log files every 24 hours. When you use
RMAN to perform manual backups, there is a risk of the archive logs being deleted. Refer to
dbaascli database backup for information on how to configure the archive log cleanup. The
recommendation is to use Oracle managed backups.
• How to Backup Using dbaascli for User Configured Backup
• How to Recover a Database
5-245
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
Related Topics
• Backup Destinations
A backup destination is a target for sending database backups. The target may be a local
filesystem, Object store, NFS mount or ZDLRA.
Returns the Backup configuration of the database in a file specified by the user. If the backup
is never configured, it returns the default template where the user can fill the configuration
parameters with their values and use it as input to --configure command option.
Using dbaascli database backup --configure, you can set the backup configuration
information for a database in the following cases:
1. User Managed Backup: Set complete backup configuration based on the destination.
2. Oracle Managed Backup: Set additional configuration parameters if a parameter is
compatible with Oracle Managed Backup.
Note that using dbaascli database backup --configure to set incompatible parameters
with Oracle Managed Backups can lead to backup/recovery issues. Currently, Oracle does
not validate whether a parameter is compatible or not. Until Oracle implements validation,
it is your responsibility to verify compatibility.
This asynchronous command generates a universally unique identifier (UUID), which you
can use to track the status.
Note:
When using Oracle Managed Backups, you may want to change some of the
backup configuration settings based on your application requirements. You can
use dbaascli to modify these parameters if they are tagged with Compatible
with console automatic backup.
5-246
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
Table 5-17 General Configuration Parameters (valid for all backup destinations except
Local Storage (FRA))
5-247
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
Table 5-17 (Cont.) General Configuration Parameters (valid for all backup destinations
except Local Storage (FRA))
Table 5-18 Configuration Parameters for Object Storage Service (OSS) Destination
5-248
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
Note:
Currently, Zero Data Loss Recovery Appliance (ZDLRA) destination is supported only
on Exadata Cloud@Customer.
Configuration Parameters for Zero Data Loss Recovery Appliance (ZDLRA) Destination
Table 5-19 Configuration Parameters for Zero Data Loss Recovery Appliance (ZDLRA)
Destination
For more information, see Customizing Real Time Redo Transport (RTRT) Behavior for
Recovery Appliance Backups.
Table 5-20 Configuration Parameters for Network File System (NFS) Destination
5-249
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
Table 5-20 (Cont.) Configuration Parameters for Network File System (NFS) Destination
Note:
Currently, Network File System (NFS) destination is supported only on Exadata
Cloud@Customer.
Note:
Currently, Local Storage (FRA) destination is supported only on Exadata
Cloud@Customer.
Related Topics
• Customizing Real Time Redo Transport (RTRT) Behavior for Recovery Appliance Backups
• dbaascli database backup
To configure Oracle Database with a backup storage destination, take database backups,
query backups, and delete a backup, use the dbaascli database backup command.
• dbaascli database recover
To recover a database, use the dbaascli database recover command.
5-250
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
Before performing a backup, you must set up the backup configuration using dbaascli
database backup --configure command as a prerequisite. For more information, see
dbaascli database backup.
Related Topics
• dbaascli database backup
To configure Oracle Database with a backup storage destination, take database backups,
query backups, and delete a backup, use the dbaascli database backup command.
You can also perform a backup of a specific PDB. This is useful if one or more PDBs need to
be backed up immediately or adhoc need basis, instead of backing up the complete CDB
which has its own schedule. For more information, see dbaascli pdb backup.
Related Topics
• dbaascli pdb backup
To backup a pluggable database (PDB), query PDB backups, and delete a PDB backup,
use the dbaascli pdb backup command.
As the backup operation is being run, its status can be monitored by providing the job ID that is
displayed to the user when the backup command is executed. For more information, see
dbaascli database backup and dbaascli pdb backup.
Related Topics
• dbaascli database backup
To configure Oracle Database with a backup storage destination, take database backups,
query backups, and delete a backup, use the dbaascli database backup command.
• dbaascli pdb backup
To backup a pluggable database (PDB), query PDB backups, and delete a PDB backup,
use the dbaascli pdb backup command.
To perform recovery of the database, there are various options depending on the type of fault,
availability of data, and its' backup and recovery requirement. For more information, see
dbaascli database recover.
• Recovering a PDB
• Fetching Recover Job Status
5-251
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
Related Topics
• dbaascli database recover
To recover a database, use the dbaascli database recover command.
Recovering a PDB
You can also recover a particular PDB instead of complete CDB whenever that can be
avoided. It reduces the impact of the outage as only the particular PDB is being recovered
while the rest of the CDB and PDBs are still available for business and applications. For more
information, see dbaascli pdb recover.
Related Topics
• dbaascli pdb recover
To recover a pluggable database (PDB), use the dbaascli pdb recover command.
Similar to backup, the recovery commands' status can be monitored by providing the job ID
that is displayed to the user when the recovery command is executed. To know the status of
recovery operation: For more information, see dbaascli database recover and dbaascli pdb
recover.
Related Topics
• dbaascli database recover
To recover a database, use the dbaascli database recover command.
• dbaascli pdb recover
To recover a pluggable database (PDB), use the dbaascli pdb recover command.
Note:
bkup_api will be deprecated in a future release. Use the dbaascli database backup,
dbaascli pdb backup, dbaascli database recover, and dbaascli pdb recover
commands to backup and recover container databases and pluggable databases.
For more information, see User Configured Backup.
Note:
In dbaascli Release 25.1.2.0.0, the backup configuration parameters have been
renamed. However, you can still use the old parameter names, as they are retained
for backward compatibility.
5-252
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
WARNING:
In general, bkup_api configured backups, as described in this section, should not be
used in conjunction with console-enabled automatic backups, other than the
exceptions noted specifically below. If using parameters, other than those noted as
safe below, then do not enable console-based backups; otherwise, conflicting
conditions or over-writes of settings can occur, and backups may not execute
successfully.
Note:
In dbaascli Release 25.1.2.0.0, the backup configuration parameters have been
renamed. However, you can still use the old parameter names, as they are retained
for backward compatibility.
To generate a configuration file with the current backup settings and use it to update the
settings:
1. Connect to a virtual machine as opc user.
For detailed instructions, see Connecting to a Virtual Machine with SSH.
2. Start a root user command shell:
sudo -s
3. Use the dbaascli database backup --getconfig command to generate a file containing
the current backup settings for the database deployment:
dbaascli database backup --getconfig --dbname dbname
Where:
• dbname is the database name for the database that you want to act on
For example:
5-253
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
# vi /var/opt/oracle/log/dtrs/staging/tmpl/
backup-6b4fff1e-370c-429b-9a28-723e9c3ba953-2025128-03611.cfg
# dbaascli database backup --configure --configFile /var/opt/oracle/log/
dtrs/staging/tmpl/
backup-6b4fff1e-370c-429b-9a28-723e9c3ba953-2025128-03611.cfg --dbname
v23db8
4. Edit the parameter values in the generated file to change any settings you want to
customize in the backup configuration.
The following parameters can be modified to customize the backup configuration:
Note:
Compatible with Console Automatic Backups=Yes indicates the parameter is
safe to change, even when using console-based automatic backups. If using
parameters with Compatible with Console Automatic Backups=No, then do not
enable backups through the console.
5-254
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
medium
, and high.
Default value is low.
A value of NONE disables RMAN
compression.
If RMAN compression is
enabled, then any TDE
encrypted datafile will be
decrypted, compressed, and
RMAN encrypted.
Old name: RMAN section size that is used Yes
bkup_section_size for automatic backups.
New name: sectionSize Default value is 64G.
5-255
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
5-256
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
5-257
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
Note:
Zero Data Loss Recovery Appliance (ZDLRA) parameters are only valid for
Exadata Cloud@Customer installations.
Table 5-27 Backup Configuration Parameters - Zero Data Loss Recovery Appliance
(ZDLRA) Parameters
5-258
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
Table 5-27 (Cont.) Backup Configuration Parameters - Zero Data Loss Recovery
Appliance (ZDLRA) Parameters
Only the above parameters noted with *Compatible with Console Automatic Backups =
Yes are safe to alter in conjunction with console-based automatic backups. If any other
parameters are to be altered, then do not enable backups through the console.
5-259
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
5. Use the dbaascli database backup --configure command to update the backup
settings using the file containing your updated backup settings:
6. Use the dbaascli database backup --status to check the status of the configuration
update:
exit
Note:
Any changes you make by using the bkup_api command are not reflected in the
Oracle Database Exadata Cloud@Customer console.
Related Topics
• Disabling Automatic Backups to Facilitate Manual Backup and Recovery Management
• Connecting to a Virtual Machine with SSH
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
Note:
bkup_api will be deprecated in a future release. Use the dbaascli database backup,
dbaascli pdb backup, dbaascli database recover, and dbaascli pdb recover
commands to backup and recover container databases and pluggable databases.
For more information, see User Configured Backups and Recovery.
Note:
Using this method for a manual backup is safe to use in conjunction with automatic
backups managed through the Console. Manual backups done this way will appear in
the console after some time due to synchronization.
5-260
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
# sudo -s
#
Where dbname is the database name for the database that you want to back up.
• To create an on-demand backup of a specific PDB, use the following bkup_api
command:
You can use this option to manually perform an RMAN level 0 (full) backup if the
scheduled weekly level 0 backup fails or following a major structural change in the
database, such as adding a new data file or tablespace. This option is only valid for
backup configurations that use cloud storage only.
4. After you start an on-demand backup, the backup process runs in the background. To
check the progress of the backup process, run the following dbaascli command on the
same compute node where the backup is running:
5. Exit the root-user command shell and disconnect from the compute node:
# exit
# exit
Related Topics
• Connecting to a Virtual Machine with SSH
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
5-261
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
Note:
• Enabling or disabling RTRT works only for Oracle Database version 12.2 and
higher.
• If you have enabled Data Guard association between databases, then after
enabling RTRT on the Primary database, you must manually copy the password
file from the Primary to the Standby database. To learn more about copying the
password file from the primary to the standby database, refer to 12c: Data Guard
Physical Standby - Managing password files in a RAC Physical Standby (Doc ID
1984091.1).
5-262
Chapter 5
Manage Database Backup and Recovery on Oracle Exadata Database Service on Cloud@Customer
Related Topics
• dbaascli database backup
To configure Oracle Database with a backup storage destination, take database backups,
query backups, and delete a backup, use the dbaascli database backup command.
• 12c: Data Guard Physical Standby - Managing password files in a RAC Physical Standby
(Doc ID 1984091.1)
• About Real-Time Redo Transport
Note:
Use the dbaascli database backup, dbaascli pdb backup, dbaascli database
recover, and dbaascli pdb recover commands to backup and recover container
databases and pluggable databases. For more information, see User Configured
Backup.
RMAN is the backup tool included with the Oracle Database. For information about using
RMAN, see the Oracle Database Backup and Recovery User's Guide for Release 19. Using
RMAN to back up databases on Exadata Cloud Infrastructure provides the most flexibility in
terms of backup options, but also the most complexity.
Note:
While using RMAN for restoring databases backed up through any method described
herein is considered safe, RMAN should NEVER be used to set up backups in
conjunction with either console (and OCI API / CLI), nor in conjunction with dbaascli.
If you choose to orchestrate backups manually leveraging RMAN, you should not use
either console automated backups, nor should you use dbaascli. You must first
completely disable console based automated backups. For more information, see
Disabling Automatic Backups to Facilitate Manual Backup and Recovery
Management.
The dbaascli method offers a middle ground between RMAN and console automated backups
in terms of flexibility and simplicity. Use dbaascli if needed functionality is not supported with
console automated backups, but when you wish to avoid complexity of using RMAN directly. In
certain cases, dbaascli can be used to modify the console automated backup configuration,
but this is not generally the case. Generally, dbaascli must be used instead of enabling
backups in the console.
5-263
Chapter 5
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
Note:
While recovering using RMAN is safe, you must not use RMAN to initiate backups or
edit backup setting in conjunction with either dbaascli usage or in conjunction with
automated console backups. Doing so could result in conflicting conditions or over-
writes of settings, and backups may not execute successfully.
Related Topics
• Oracle Database Backup and Recovery User's Guide for Release 19
5-264
Chapter 5
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
5-265
Chapter 5
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
Related Topics
• Patching and Updating an Oracle Exadata Database Service on Cloud@Customer System
Manually
This topic describes the procedures for patching and updating various components in
Oracle Exadata Database Service on Cloud@Customer outside of the cloud automation.
For information related to patching and updating with dbaascli, refer to "Patching Oracle
Grid Infrastructure and Oracle Databases Using dbaascli."
• https://support.oracle.com/epmos/faces/DocContentDisplay?id=2701789.1
• Application Checklist for Continuous Service for MAA Solutions
5-266
Chapter 5
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
Related Topics
• Manage Database Backup and Recovery on Oracle Exadata Database Service on
Cloud@Customer
Learn how to work with the backup and recovery facilities provided by Oracle Exadata
Database Service on Cloud@Customer.
• Using the Console to Move a Database to Another Home
You can update the version of a VM cluster database by moving it to a Database Home
that is running the version of Oracle Database you are interested in.
Using the Console for Patching and Updating VM Cluster's GI and Database Homes
Learn how to use the console to view the history of patch operations on VM cluster and
Database Homes, apply patches, and monitor the status of patch operations.
Oracle recommends that you use the precheck action to ensure your VM cluster or Database
Home has met the requirements for the patch you want to apply.
• Using the Console to Perform Grid Infrastructure Updates
Learn to apply Grid Infrastructure updates on a VM cluster.
• Using the Console to Perform Update Operation on a Database Home
Learn to apply patches on a Database Home.
• Using the Console to View Update History
Each update history entry represents an attempted patch operation and indicates whether
the operation was successful or failed. You can retry a failed patch operation. Repeating
an operation results in a new patch history entry.
• Using the Console to Move a Database to Another Home
You can update the version of a VM cluster database by moving it to a Database Home
that is running the version of Oracle Database you are interested in.
5-267
Chapter 5
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
3. In the list of VM clusters, click the VM cluster on which you want to perform a patch
operation.
4. On the resulting VM Cluster Details page, click Updates.
5. Review the list of available patches for the VM cluster.
The Oracle Grid Infrastructure software images are generally available Oracle Grid
Infrastructure software images that you can use to patch your cluster. Oracle images that
can be used for patching have the update Type of "Patch".
The Custom Grid Infrastructure software images are the Grid Infrastructure software image
that you have created in advance.
Use the Select a Compartment selector to specify the compartment that contains the
database software image.
Use the Region filter to access the software images created in a different region.
6. Click the Actions icon (three dots) for the patch you are interested in, and then click one of
the following actions:
• Precheck: Check for any prerequisites to make sure that the patch can be
successfully applied. Oracle highly recommends that you run this operation before you
apply a patch. Precheck does not cause any availability impact to the cluster,
everything remains operational.
• Apply Grid Infrastructure update: Applies the selected patch.
7. Confirm when prompted.
The patch list displays the status of the operation. While the precheck is running, the patch's
status shows Checking. While a patch is being applied, the patch's status shows Applying and
the VM cluster's status shows Updating. During patching, lifecycle operations on the VM
cluster and its resources are temporarily unavailable. If patching completes successfully, the
patch's status changes to Applied and the VM cluster's status changes to Available. You can
view more details about an individual patch operation by clicking Update History. Grid
Infrastructure patching is done in a rolling fashion, node by node, and the cluster resources will
be stopped and restarted on each node.
5-268
Chapter 5
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
The Oracle Database Software Images are generally available Oracle Database software
images that you can use to update your database. Oracle images that can be used for
patching have the update Type of "Patch".
The Custom Database Software Images are the database software image that you have
created in advance.
Use the Select a Compartment selector to specify the compartment that contains the
database software image.
Use the Region filter to access the software images created in a different region.
8. Click the Actions icon (three dots) for the patch you are interested in, and then click one of
the following actions:
• Precheck: Check for any prerequisites to make sure that the patch can be
successfully applied. Oracle highly recommends that you run this operation before you
apply a patch. The Precheck does not cause any availability impact to the cluster,
everything remains operational.
• Apply Database update: Applies the selected patch.
9. Confirm when prompted.
The patch list displays the status of the operation. While the precheck is running, the patch's
status shows Checking. While a patch is being applied, the patch's status shows Applying, the
status of the Database Home and the databases in it display as Updating, and lifecycle
operations on the VM cluster and its resources are temporarily unavailable. Patches are
applied to the Database Home in a rolling fashion, node by node, and each database in the
home is stopped and then restarted. This may result in temporary service disruption. If
patching completes successfully, the patch's status changes to Applied and the Database
Home's status changes to Available. You can view more details about an individual patch
operation by clicking Update History.
5-269
Chapter 5
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
The history of patch operations for that VM cluster is displayed, along with the history of patch
operations on its Database Homes.
Using the Console to View the Update History of a Database Home
Learn how to view the history of patches applied on a Database Home.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
VM Clusters is selected by default.
2. Choose your Compartment.
A list of VM Clusters is displayed for the chosen Compartment.
3. In the list of VM clusters, click the VM cluster where the Database Home is located.
4. Click Database Homes.
A list of Database Homes is displayed.
5. In the list of Database Homes, click the Database Home you are interested in.
6. Click Update History.
The history of patch operations for that Database Home is displayed, along with the history of
patch operations on the VM cluster to which it belongs.
The database will be stopped in the current home and then restarted in the destination
home.
11. Confirm the move operation.
The database is moved in a rolling fashion. The database instance will be stopped, node by
node, in the current home and then restarted in the destination home. While the database is
being moved, the Database Home and Database statuses display as Updating. The Database
Home location, shown under Database Version, displays as Moving Database. When the
operation completes, Database Home is updated with the current home. Datapatch is executed
5-270
Chapter 5
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
automatically, as part of the database move, to complete post-patch SQL actions for all
patches, including one-offs, on the new Database Home. If the database move operation is
unsuccessful, then the status of the database displays as Failed, and the Database Home
field provides information about the reason for the failure.
Using the API for Patching and Updating VM Cluster and Database Homes
Use various API features to help manage patching an Oracle Exadata Database Service on
Cloud@Customer system.
For information about using the API and signing requests, see "REST APIs" and "Security
Credentials". For information about SDKs, see "Software Development Kits and Command
Line Interface".
Use these API operations to manage patching VM clusters, Database Homes and Databases.
VM cluster:
• UpdateVmCluster
Database Homes:
• CreateDbHome
• UpdateDbHome
• DeleteDbHome
Database:
• CreateDatabase
• UpdateDatabase
• DeleteDatabase
Use UpdateVMCluster to patch the Oracle Grid Infrastructure on the VM Cluster. Use
UpdateDbHome to patch the Database Software of the Database Home. Use UpdateDatabase to
move a database to a different Database Home, thereby updating the database to the same
version as the target Database Home.
For the complete list of APIs for the Database service, see "Database Service API".
Related Topics
• REST APIs
• Security Credentials
• Software Development Kits and Command Line Interface
• UpdateVmCluster
• CreateDbHome
• UpdateDbHome
• DeleteDbHome
• CreateDatabase
• UpdateDatabase
• DeleteDatabase
• Database Service API
5-271
Chapter 5
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
Note:
These are just the minimum requirements. If you want to update Grid Infrastructure
and/or Oracle Database to meet the Exadata 23.1 requirements, then the
recommendation is to update to the latest available versions of Grid Infrastructure
and Oracle Database, and not to the minimum.
• Exadata Image (Guest OS): Exadata image release 22.1.0 (May 2022) or 21.2.10 (March
2022). Systems running versions older than 21.2.10 will first need to upgrade to at least
22.1.0 (May 2022) or 21.2.10 (March 2022) before updating to 23.1.0.0.0. This applies to
both storage and database servers.
– In addition to performing minor version updates to the Exadata VM Cluster images,
you can update to a new major version if the currently installed version is 19.2 or
higher. For example, if the VM cluster is on version 20, then you can update it to
version 21.
– The latest 4 (N to N-3) or more minor versions of each major version of the VM Cluster
images are available through the console to apply.
• Oracle Grid Infrastructure: Exadata image release 23.1.0.0.0 supports the following
minimum or newer Oracle Grid Infrastructure versions.
5-272
Chapter 5
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
– Release 19c: Version 19.15, April 2022 Release Update (RU) and newer (Default)
– Release 21c: Version 21.6, April 2022 Release Update (RU) and newer
• Oracle Database: Exadata System Software 23.1 supports the following minimum
versions or newer for new database installations.
– Release 19c: Version 19.15, April 2022 Release Update (RU) and newer (Default)
– Additional supported database releases under Market Driven Support or Quarterly
Updates exception approval:
* Release 12.2.0.1, Release Update (RU) 12.2.0.1.220118 (Jan 2022)
* Release 12.1.0.2, Bundle Patch 12.1.0.2.220719 (Jul 2022) - requires patch
30159782
* Release 11.2.0.4, Bundle Patch 11.2.0.4.210119 (Jan 2021) - requires patch
30159782, patch 33991024
• If you have an Exadata infrastructure maintenance operation scheduled to start within the
next 24 hours, then the Exadata Image update feature is not available.
• Once the VM cluster is upgraded to Exadata Database Service Guest VM OS 23.1, you
will be able to add a new VM or a new database server to this VM cluster if Exadata
Cloud@Customer Infrastructure is running an Exadata System Software version 22.1.16
and later.
Note:
Upgrade to Exadata System Software 23.1 for Exadata Cloud@Customer
Infrastructure will be available with February 2024 update cycle.
Note:
Once the VM cluster is upgraded to Exadata Database Service Guest VM OS 23.1,
you will be able to add a new VM or a new database server to this VM cluster if
Exadata Cloud@Customer Infrastructure is running an Exadata System Software
version 22.1.16 and later.
Upgrade to Exadata System Software 23.1 for Exadata Cloud@Customer
Infrastructure will be available with February 2024 update cycle.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Choose your Compartment.
A list of VM Clusters is displayed for the chosen Compartment.
3. In the list of cloud VM clusters, click the name of the cluster you want to patch to display
the cluster details.
4. Click Updates (OS).
5-273
Chapter 5
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
5. Review the list of available software updates and locate the operating system patch you
are applying.
6. Click the Actions icon (three dots) at the end of the row listing the patch you are interested
in, and then click one of the following actions:
• Run Precheck. Precheck checks the prerequisites to ensure that the patch can be
successfully applied. Oracle highly recommends that you run the precheck operation
before you apply a patch. The reason is that things can change in a database any
time, and the precheck you run just before running a patch may find errors that the
previous precheck did not find.
Note:
If the precheck fails, the system displays a message in the Apply Exadata
OS Image Update dialog that the last precheck has failed. Oracle
recommends that you run the precheck again. Click the Actions icon (three
dots)at the end of the row listing the OS patch to view the dialog.
• Apply Exadata OS Image Update. This link displays the Apply Exadata Image
Update dialog that you use to apply the patch. The dialog shows the name of the
database system you are patching, the current version of the database, and the new
version of the database after the patch is applied. To start the process, click Apply
Exadata OS Image Update.
• Copy OCID. This copies the Oracle Cloud ID. This can be used when troubleshooting
a patch or to give to Support when contacting them.
Note:
While the patch is running:
– Run Precheck and Apply OS Image Update are not available. When the
patch has completed, these actions are available again.
– If the Exadata infrastructure containing this VM cluster is scheduled for
maintenance that conflicts with the patching operation, the patch fails
and the system displays a message explaining why. After the
infrastructure maintenance is complete, run the patch operation again.
Using the Console to Rollback or Retry Failed Guest VM Operating System Update
To update the guest VM operating system with the Console, be prepared to provide values for
the fields required.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Choose your Compartment.
A list of VM Clusters is displayed for the chosen Compartment.
3. In the list of VM Clusters, click the name of the cluster you want to patch to display the
cluster details.
5-274
Chapter 5
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
If applying update has failed, then on the VM Cluster Details page, a banner with the
options Roll Back and Retry Apply is displayed.
Choose an appropriate option.
a. Click Retry Apply.
Apply Exadata OS Image Update dialog is displayed with the options Apply Exadata
Image Update and Run Precheck.
Choose an appropriate option.
(or)
b. Click Roll Back.
Confirm Rollback Operation dialog is displayed.
Click Roll Back to confirm.
4. You can also Apply Exadata Image Update from the Updates (OS) page.
5-275
Chapter 5
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
5-276
Chapter 5
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Choose your Compartment.
A list of VM Clusters is displayed for the chosen Compartment.
3. In the list of cloud VM clusters, click the name of the cluster you want to patch to display
the cluster details.
4. Click Updates.
5. Click the Actions icon (three dots) at the end of the row listing the Oracle Grid
Infrastructure (GI) upgrade, then click Run Precheck.
6. In the Confirm dialog, confirm you want to upgrade to begin the precheck operation.
Note:
• When planning to upgrade your Grid Infrastructure to 23ai, make sure that for
each ASM diskgroup, compatible.rdbms has a value set to 19.0.0.0 and later.
• Minimum requirements for upgrading Grid Infrastructure from 19c to 23ai:
– Exadata Guest VM running Exadata System Software 23.1.8
– Exadata Infrastructure running Exadata System Software 23.1.x
Note:
Currently, Grid Infrastructure upgrade from 19c to 23ai is not supported for single
node VM clusters.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Choose your Compartment.
A list of VM Clusters is displayed for the chosen Compartment.
3. In the list of cloud VM clusters, click the name of the cluster you want to patch to display
the cluster details.
4. Click Updates.
5. Click the Actions icon (three dots) at the end of the row listing the Oracle Grid
Infrastructure (GI) upgrade, then click Upgrade Grid Infrastructure.
6. In the Upgrade Grid Infrastructure dialog, confirm you want to upgrade the GI by clicking
Upgrade Grid Infrastructure.
If you haven't run a precheck, you have the option of clicking Run Precheck in this dialog
to precheck your cloud VM cluster prior to the upgrade.
5-277
Chapter 5
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
5-278
Chapter 5
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
5-279
Chapter 5
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
5-280
Chapter 5
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
COMPATIBLE
parameter to reflect the new Oracle Database software version. See What Is Oracle
Database Compatibility? for more information.
• If your database uses a database_name.env file, ensure that the variables in the file
have been updated to point to the 19c Database Home. These variables should be
automatically updated during the upgrade process.
• If you are upgrading a non-container database to Oracle Database version 19c, you can
convert the database to a pluggable database after converting. See How to Convert Non-
CDB to PDB (Doc ID 2288024.1) for instructions on converting your database to a
pluggable database.
• If your old Database Home is empty and will not be reused, you can remove it. See Using
the Console to Delete an Oracle Database Home for more information.
Related Topics
• Configuring and Customizing Backups with dbaascli
In addition to the console-based automated backup option, use dbaascli to configure and
customize backups.
• What Is Oracle Database Compatibility?
• How to Convert Non-CDB to PDB - Step by Step Example (Doc ID 2288024.1)
• Using the Console to Delete an Oracle Database Home
To delete an Oracle Database home with the Console, use this procedure.
5-281
Chapter 5
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
Using the Console to Run Oracle Database Upgrade Precheck or Perform Upgrade
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Choose your Compartment.
A list of VM Clusters is displayed for the chosen Compartment.
3. In the list of VM clusters, click the name of the VM cluster that contains the database you
want to upgrade.
4. In the list of databases on the VM Cluster Details page, click the name of the database
you want to upgrade to view the Database Details page.
5. Click the Actions menu and then select Upgrade.
6. In the Upgrade Database dialog, select the following:
• Oracle Database version: The drop-down selector lists only Oracle Database
versions that are compatible with an upgrade from the current software version the
database is using. The target software version must be higher than the database's
current version.
• Target Database Home: Select a Database Home for your database. The list of
Database Homes is limited to those homes using the most recent versions of Oracle
Database 19c software. Moving the database to the new Database Home results in the
database being upgraded to the major release version and patching level of the new
Database Home.
7. Click one of the following:
• Run Precheck: This option starts an upgrade precheck to identify any issues with your
database that need mitigation before you perform an upgrade.
• Upgrade Database: This option starts upgrade operation. Oracle recommends
performing an upgrade only after you have performed a successful precheck on the
database.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Choose your Compartment.
A list of VM Clusters is displayed for the chosen Compartment.
3. In the list of VM clusters, click the name of the VM cluster that contains the database with
the failed upgrade.
5-282
Chapter 5
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
4. Find the database that was unsuccessfully upgraded, and click its name to display details
about it.
5. The database must display a banner at the top of the details page that includes a Rollback
button and details about what issues caused the upgrade failure.
6. Click Rollback.
7. In the Confirm rollback dialog, confirm that you want to initiate a rollback to the previous
Oracle Database version.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Choose your Compartment.
A list of VM Clusters is displayed for the chosen Compartment.
3. In the list of VM clusters, click the name of the VM cluster that contains the database you
want to upgrade
4. In the list of databases on the VM Cluster Details page, click the name of the database for
which you want to view the upgrade history.
5. On the Database Details page, click Update History.
5-283
Chapter 5
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
Note:
For more guidance on achieving continuous service during patching operations, see
the Application Checklist for Continuous Service for MAA Solutions white paper.
5-284
Chapter 5
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
Related Topics
• https://support.oracle.com/epmos/faces/DocumentDisplay?
cmd=show&type=NOT&id=412160.1
5-285
Chapter 5
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
Updating the Operating System on All Virtual Machines of an Oracle Exadata Database Service
on Cloud@Customer System
To update the operating system on the Database Server Virtual Machines (VMs), use the
patchmgr tool.
Note:
Customers who do not have My Oracle Support patch download privilege may obtain
the Exadata patchmgr update utility and recent Exadata System Software releases
using the Exadata Cloud@Customer Gen 2 utility exadata_updates.sh. For more
information, see My Oracle Support Doc 2730739.1.
The patchmgr utility manages the entire update of one or more virtual machines remotely,
including the pre-restart, restart, and post-restart steps of an Oracle Exadata Database Service
on Cloud@Customer system.
You can run the utility either from one of your Oracle Exadata Database Service on
Cloud@Customer virtual machines, or from another server running Oracle Linux. The server
on which you run the utility is known as the driving system. You cannot use the driving system
to update itself. Therefore, if the driving system is one of the virtual machines in a VM cluster
that you are updating, then you must run the patchmgr utility more than once. The following
scenarios describe typical ways of performing the updates:
• Non-Exadata Driving System
The simplest way to run the update the system is to use a separate Oracle Linux server to
update all virtual machines in one operation.
• Exadata Virtual Machine Driving System
You can use one virtual machine to drive the updates for the rest of the virtual machines in
the VM cluster. Then, you can use one of the updated nodes to drive the update on the
original driving system. For example, consider updating a half rack system with four virtual
machines; node1, node2, node3, and node4. You could first use node1 to drive the updates
of node2, node3, and node4. Then, you could use node2 to drive the update of node1.
The driving system requires root user SSH access to each virtual machine being updated.
sudo su -
5-286
Chapter 5
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
c. Run the following command to determine the current Exadata software version.
imageinfo -ver
For example:
d. Switch to the grid user, and identify all nodes in the cluster.
su - grid
olsnodes
For example:
olsnodes
node1
node2
ls /root/.ssh/id_rsa*
ls: cannot access /root/.ssh/id_rsa*: No such file or directory
ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/root/.ssh/id_rsa):
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /root/.ssh/id_rsa.
Your public key has been saved in /root/.ssh/id_rsa.pub.
The key fingerprint is:
93:47:b0:83:75:f2:3e:e6:23:b3:0a:06:ed:00:20:a5 [email protected]
The key's randomart image is:
+--[ RSA 2048]----+
|o.. + . |
|o. o * |
|E . o o |
| . . = |
| o . S = |
| + = . |
| + o o |
| . . + . |
| ... |
+-----------------+
5-287
Chapter 5
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
b. Distribute the public key to the target nodes, and verify this step. In the example, the
only target node is node2.
ls -al /tmp/id_rsa.node1.pub
-rw-r--r-- 1 opc opc 442 Feb 28 03:33 /tmp/id_rsa.node1.pub
date
Wed Feb 28 03:33:45 UTC 2018
c. On the target node (node2 in the example), add the root public key of node1 to the root
authorized_keys file.
d. Download patchmgr into /root/patch on the driving system (node1 in this example).
You can download the patchmgr bundle from Oracle Support by using My Oracle
Support Patch ID 21634633. Always obtain the latest available Exadata patchmgr
update utility to install any Exadata System Software release.
For further information, see also dbnodeupdate.sh and dbserver.patch.zip: Updating
Exadata Database Server Software using the DBNodeUpdate Utility and patchmgr: My
Oracle Support Doc ID 1553103.1.
e. Unzip the patchmgr bundle.
Depending on the version that you downloaded, the name of your ZIP file can differ.
cd /root/patch/18.1.4.0.0.180125.3
unzip dbserver.patch.zip
Archive: p21634633_181400_Linux-x86-64.zip creating:
dbserver_patch_5.180228.2/
creating: dbserver_patch_5.180228.2/ibdiagtools/
inflating: dbserver_patch_5.180228.2/ibdiagtools/cable_check.pl
inflating: dbserver_patch_5.180228.2/ibdiagtools/setup-ssh
inflating: dbserver_patch_5.180228.2/ibdiagtools/VERSION_FILE
extracting: dbserver_patch_5.180228.2/ibdiagtools/xmonib.sh
inflating: dbserver_patch_5.180228.2/ibdiagtools/monitord
inflating: dbserver_patch_5.180228.2/ibdiagtools/checkbadlinks.pl
creating: dbserver_patch_5.180228.2/ibdiagtools/topologies/
inflating: dbserver_patch_5.180228.2/ibdiagtools/topologies/
VerifyTopologyUtility.pm
inflating: dbserver_patch_5.180228.2/ibdiagtools/topologies/verifylib.pm
inflating: dbserver_patch_5.180228.2/ibdiagtools/topologies/Node.pm
inflating: dbserver_patch_5.180228.2/ibdiagtools/topologies/Rack.pm
inflating: dbserver_patch_5.180228.2/ibdiagtools/topologies/Group.pm
inflating: dbserver_patch_5.180228.2/ibdiagtools/topologies/Switch.pm
inflating: dbserver_patch_5.180228.2/ibdiagtools/topology-zfs
inflating: dbserver_patch_5.180228.2/ibdiagtools/dcli
creating: dbserver_patch_5.180228.2/ibdiagtools/netcheck/
inflating: dbserver_patch_5.180228.2/ibdiagtools/netcheck/
remoteScriptGenerator.pm
inflating: dbserver_patch_5.180228.2/ibdiagtools/netcheck/CommonUtils.pm
inflating: dbserver_patch_5.180228.2/ibdiagtools/netcheck/
5-288
Chapter 5
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
SolarisAdapter.pm
inflating: dbserver_patch_5.180228.2/ibdiagtools/netcheck/
LinuxAdapter.pm
inflating: dbserver_patch_5.180228.2/ibdiagtools/netcheck/
remoteLauncher.pm
inflating: dbserver_patch_5.180228.2/ibdiagtools/netcheck/
remoteConfig.pm
inflating: dbserver_patch_5.180228.2/ibdiagtools/netcheck/spawnProc.pm
inflating: dbserver_patch_5.180228.2/ibdiagtools/netcheck/
runDiagnostics.pm
inflating: dbserver_patch_5.180228.2/ibdiagtools/netcheck/OSAdapter.pm
inflating: dbserver_patch_5.180228.2/ibdiagtools/SampleOutputs.txt
inflating: dbserver_patch_5.180228.2/ibdiagtools/infinicheck
inflating: dbserver_patch_5.180228.2/ibdiagtools/ibping_test
inflating: dbserver_patch_5.180228.2/ibdiagtools/tar_ibdiagtools
inflating: dbserver_patch_5.180228.2/ibdiagtools/verify-topology
inflating: dbserver_patch_5.180228.2/installfw_exadata_ssh
creating: dbserver_patch_5.180228.2/linux.db.rpms/
inflating: dbserver_patch_5.180228.2/md5sum_files.lst
inflating: dbserver_patch_5.180228.2/patchmgr
inflating: dbserver_patch_5.180228.2/xcp
inflating: dbserver_patch_5.180228.2/ExadataSendNotification.pm
inflating: dbserver_patch_5.180228.2/ExadataImageNotification.pl
inflating: dbserver_patch_5.180228.2/kernelupgrade_oldbios.sh
inflating: dbserver_patch_5.180228.2/cellboot_usb_pci_path
inflating: dbserver_patch_5.180228.2/exadata.img.env
inflating: dbserver_patch_5.180228.2/README.txt
inflating: dbserver_patch_5.180228.2/exadataLogger.pm
inflating: dbserver_patch_5.180228.2/patch_bug_26678971
inflating: dbserver_patch_5.180228.2/dcli
inflating: dbserver_patch_5.180228.2/patchReport.py
extracting: dbserver_patch_5.180228.2/dbnodeupdate.zip
creating: dbserver_patch_5.180228.2/plugins/
inflating: dbserver_patch_5.180228.2/plugins/010-check_17854520.sh
inflating: dbserver_patch_5.180228.2/plugins/020-check_22468216.sh
inflating: dbserver_patch_5.180228.2/plugins/040-check_22896791.sh
inflating: dbserver_patch_5.180228.2/plugins/000-check_dummy_bash
inflating: dbserver_patch_5.180228.2/plugins/050-check_22651315.sh
inflating: dbserver_patch_5.180228.2/plugins/005-check_22909764.sh
inflating: dbserver_patch_5.180228.2/plugins/000-check_dummy_perl
inflating: dbserver_patch_5.180228.2/plugins/030-check_24625612.sh
inflating: dbserver_patch_5.180228.2/patchmgr_functions
inflating: dbserver_patch_5.180228.2/exadata.img.hw
inflating: dbserver_patch_5.180228.2/libxcp.so.1
inflating: dbserver_patch_5.180228.2/imageLogger
inflating: dbserver_patch_5.180228.2/ExaXMLNode.pm
inflating: dbserver_patch_5.180228.2/fwverify
f. In the directory that contains the patchmgr utility, create the dbs_group file, which
contains the list of virtual machines to update. Include the nodes listed after running
5-289
Chapter 5
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
the olsnodes command in step 1, except for the driving system. In this example,
dbs_group only contains node2.
cd /root/patch/18.1.4.0.0.180125.3/dbserver_patch_5.180228
cat dbs_group
node2
Note:
Run the precheck operation with the -nomodify_at_prereq option to prevent any
changes to the system that could impact the backup you take in the next step.
Otherwise, the backup might not be able to roll the system back to its original
state, should it be necessary.
***************************************************************************
*********************************
NOTE patchmgr release: 5.180228 (always check MOS 1553103.1 for the
latest release of dbserver.patch.zip)
NOTE
WARNING Do not interrupt the patchmgr session.
WARNING Do not resize the screen. It may disturb the screen layout.
WARNING Do not reboot database nodes during update or rollback.
WARNING Do not open logfiles in write mode and do not try to alter them.
***************************************************************************
*********************************
2018-02-28 21:22:45 +0000 :Working: DO: Initiate precheck on 1
node(s)
2018-02-28 21:24:57 +0000 :Working: DO: Check free space and verify
SSH equivalence for the root user to node2
2018-02-28 21:26:15 +0000 :SUCCESS: DONE: Check free space and
verify SSH equivalence for the root user to node2
2018-02-28 21:26:47 +0000 :Working: DO: dbnodeupdate.sh running a
precheck on node(s).
2018-02-28 21:28:23 +0000 :SUCCESS: DONE: Initiate precheck on
node(s).
5-290
Chapter 5
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
Note:
Ensure that you take the backup at this point, before any modifications are made
to the system.
***************************************************************************
*********************************
NOTE patchmgr release: 5.180228 (always check MOS 1553103.1 for the
latest release of dbserver.patch.zip)
NOTE
WARNING Do not interrupt the patchmgr session.
WARNING Do not resize the screen. It may disturb the screen layout.
WARNING Do not reboot database nodes during update or rollback.
WARNING Do not open logfiles in write mode and do not try to alter them.
***************************************************************************
*********************************
2018-02-28 21:29:00 +0000 :Working: DO: Initiate backup on 1
node(s).
2018-02-28 21:29:00 +0000 :Working: DO: Initiate backup on node(s)
2018-02-28 21:29:01 +0000 :Working: DO: Check free space and verify
SSH equivalence for the root user to node2
2018-02-28 21:30:18 +0000 :SUCCESS: DONE: Check free space and
verify SSH equivalence for the root user to node2
2018-02-28 21:30:51 +0000 :Working: DO: dbnodeupdate.sh running a
backup on node(s).
2018-02-28 21:35:50 +0000 :SUCCESS: DONE: Initiate backup on
node(s).
2018-02-28 21:35:50 +0000 :SUCCESS: DONE: Initiate backup on 1
node(s).
5. Remove all custom RPMs from the target virtual machines. Custom RPMs are reported in
precheck results. They include RPMs that were manually installed after the system was
provisioned.
• If you are updating the system from version 12.1.2.3.4.170111, and the precheck
results include krb5-workstation-1.10.3-57.el6.x86_64, then remove it. This item is
considered a custom RPM for this version.
• Do not remove exadata-sun-vm-computenode-exact or oracle-ofed-release-guest.
These two RPMs are handled automatically during the update process.
6. Perform the update. To ensure that the update process in not interrupted, use the
command nohup. For example:
5-291
Chapter 5
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
***************************************************************************
*********************************
NOTE patchmgr release: 5.180228 (always check MOS 1553103.1 for the
latest release of dbserver.patch.zip)
NOTE
NOTE Database nodes will reboot during the update process.
NOTE
WARNING Do not interrupt the patchmgr session.
WARNING Do not resize the screen. It may disturb the screen layout.
WARNING Do not reboot database nodes during update or rollback.
WARNING Do not open logfiles in write mode and do not try to alter them.
***************************************************************************
******************************
2018-02-28 21:36:26 +0000 :Working: DO: Initiate prepare steps on
node(s).
2018-02-28 21:36:26 +0000 :Working: DO: Check free space and verify
SSH equivalence for the root user to node2
2018-02-28 21:37:44 +0000 :SUCCESS: DONE: Check free space and
verify SSH equivalence for the root user to node2
2018-02-28 21:38:43 +0000 :SUCCESS: DONE: Initiate prepare steps on
node(s).
2018-02-28 21:38:43 +0000 :Working: DO: Initiate update on 1
node(s).
2018-02-28 21:38:43 +0000 :Working: DO: Initiate update on node(s)
2018-02-28 21:38:49 +0000 :Working: DO: Get information about any
required OS upgrades from node(s).
2018-02-28 21:38:59 +0000 :SUCCESS: DONE: Get information about any
required OS upgrades from node(s).
2018-02-28 21:38:59 +0000 :Working: DO: dbnodeupdate.sh running an
update step on all nodes.
2018-02-28 21:48:41 +0000 :INFO : node2 is ready to reboot.
2018-02-28 21:48:41 +0000 :SUCCESS: DONE: dbnodeupdate.sh running
an update step on all nodes.
2018-02-28 21:48:41 +0000 :Working: DO: Initiate reboot on node(s)
2018-02-28 21:48:57 +0000 :SUCCESS: DONE: Initiate reboot on node(s)
2018-02-28 21:48:57 +0000 :Working: DO: Waiting to ensure node2 is
down before reboot.
2018-02-28 21:56:18 +0000 :Working: DO: Initiate prepare steps on
node(s).
2018-02-28 21:56:19 +0000 :Working: DO: Check free space and verify
SSH equivalence for the root user to node2
2018-02-28 21:57:37 +0000 :SUCCESS: DONE: Check free space and
verify SSH equivalence for the root user to node2
2018-02-28 21:57:42 +0000 :SEEMS ALREADY UP TO DATE: node2
2018-02-28 21:57:43 +0000 :SUCCESS: DONE: Initiate update on node(s)
5-292
Chapter 5
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
7. After the update operation completes, verify the version of the Exadata software on the
virtual machine that was updated.
imageinfo -ver
18.1.4.0.0.180125.3
8. Repeat steps 2 through 7 of this procedure using the updated virtual machine as the
driving system to update the remaining virtual machine. In this example update, you would
now use node2 to update node1.
9. As root On each virtual machine, run the uptrack-install command to install the
available ksplice updates.
uptrack-install --all -y
uptrack-install --all -y
Related Topics
• Connecting to a Virtual Machine with SSH
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
• https://support.oracle.com/epmos/faces/DocumentDisplay?
cmd=show&type=NOT&id=2730739.1
• https://support.oracle.com/epmos/faces/DocumentDisplay?
cmd=show&type=NOT&id=1553103.1
• https://support.oracle.com/epmos/faces/ui/patch/PatchDetail.jspx?patchId=21634633
5-293
Chapter 5
Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
Note:
• If using the repo: format, ensure the referenced repository is defined in the target
server’s YUM configuration.
• Local files can reside in standard local directories, NFS mounts, or ACFS
mounts.
Example: additional-packages.txt
/u01/elfutils-debuginfod-client-0.190-2.el8.x86_64.rpm
/u01/elfutils-libelf-devel-0.190-2.el8.x86_64.rpm
5-294
Chapter 5
Interim Software Updates
/u01/keyutils-libs-devel-1.5.10-9.0.1.el8.x86_64.rpm
https://example.com/packages/krb5-devel-1.18.2-28.0.1.el8_10.x86_64.rpm
https://example.com/packages/memstrack-0.2.5-2.el8.x86_64.rpm
/u01/pigz-2.4-4.el8.x86_64.rpm
/u01/sssd-nfs-idmap-2.9.4-3.0.1.el8_10.x86_64.rpm
https://example.com/packages/timedatex-0.5-3.el8.x86_64.rpm
https://example.com/packages/zlib-devel-1.2.11-25.el8.x86_64.rpm
5-295
Chapter 5
Interim Software Updates
• Click the Actions button (three dots) for the patch you're interested in, and select
Download.
Note:
You can only download the patches that are in Available state.
• Click the Actions button (three dots) for the patch you're interested in, and select
Delete.
5-296
Chapter 5
Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
3. You can also move a patch from the Interim Software Updates details page.
• Click the Actions button (three dots) for the patch you're interested in, and select Move
Resource.
Related Topics
• REST APIs
• Security Credentials
• Software Development Kits and Command Line Interface
• OneoffPatch Reference
5-297
Chapter 5
Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
About Using Oracle Data Guard with Oracle Exadata Database Service on
Cloud@Customer
Oracle Data Guard provides a comprehensive set of services that create, maintain, manage,
and monitor one or more standby databases to enable production Oracle databases to survive
disasters and data corruptions.
Oracle Data Guard maintains these standby databases as copies of the production database.
Then, if the production database becomes unavailable because of a planned or an unplanned
outage, Oracle Data Guard can switch any standby database to the production role, minimizing
the downtime associated with the outage. Oracle Data Guard can be used with traditional
backup, restoration, and cluster techniques to provide a high level of data protection and data
availability. Oracle Data Guard transport services are also used by other Oracle features such
as Oracle Streams and Oracle GoldenGate for efficient and reliable transmission of redo from
a source database to one or more remote destinations.
For complete information on Oracle Data Guard, see the Oracle Data Guard Concepts and
Administration documentation and Oracle Data Guard Broker Concepts on the Oracle
Database Documentation portal.
This topic explains how to use the Console or the API to manage Data Guard resources in
your VM cluster.
When you use the Console or the API to enable Data Guard for an Exadata database compute
node database:
• The standby database is a physical standby.
• The versions of peer databases (primary and standby) are identical.
• The standby database is deployed as an open, read-only database (Active Data Guard).
• A primary database can support up to a maximum of six standby databases.
Prerequisites for Using Oracle Data Guard with Oracle Exadata Database
Service on Cloud@Customer
Review the list of prerequisites for using Data Guard with Oracle Exadata Database Service on
Cloud@Customer.
• VM Clusters
A VM cluster Data Guard implementation requires two Exadata database VM Clusters, one
containing the primary database and one containing the standby database.
5-298
Chapter 5
Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
• Password
To change the SYS password or rotate TDE keys, use OCI API.
• Adding a Node to a VM Cluster
When adding a node to a VM cluster, an instance of the Data Guard database is
automatically created on the new node.
• Removing a Node from a VM Cluster
When removing a node from a VM cluster, the instance and it's metadata on the removing
node is deleted automatically.
VM Clusters
A VM cluster Data Guard implementation requires two Exadata database VM Clusters, one
containing the primary database and one containing the standby database.
Note:
Oracle strongly recommends the primary and standby databases for any production
workloads be on different Exadata Cloud Infrastructures for better fault isolation and
disaster protection.
Password
To change the SYS password or rotate TDE keys, use OCI API.
5-299
Chapter 5
Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
Data Guard maintains the standby database by transmitting and applying redo data from the
primary database. If the primary database becomes unavailable, you can use Data Guard to
switchover or failover the standby database to the primary role. This is true even if you have
more than one standby database.
• Switchover
A switchover reverses the primary and standby database roles.
• Failover
A failover transitions the standby database into the primary role after the existing primary
database fails or becomes unreachable.
• Reinstate
Reinstates a database into the standby role in a Data Guard group.
Switchover
A switchover reverses the primary and standby database roles.
Each database continues to be part of the Data Guard group in its new role. A switchover
ensures no data loss. You can use a switchover before you perform planned maintenance on
the primary database. Performing planned maintenance on a Exadata database compute node
with a Data Guard group is typically done by switching the primary to the standby role,
performing maintenance on the standby, and then switching it back to the primary role.
Failover
A failover transitions the standby database into the primary role after the existing primary
database fails or becomes unreachable.
A failover might result in some data loss when you use Maximum Performance protection
mode.
Reinstate
Reinstates a database into the standby role in a Data Guard group.
You can use the reinstate command to return a failed database into service after correcting the
cause of failure.
Note:
You cannot terminate a primary database that is part of a Data Guard group that
contains one or more standby databases. You will have to terminate the standby
databases first. Alternatively, you can switch over the primary database to the
standby role, and then terminate the former primary.
You cannot terminate a VM cluster that includes Data Guard enabled databases. You
must first terminate the standby databases that are part of the Data Guard group.
5-300
Chapter 5
Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
When you enable Data Guard, a separate Data Guard group is created between the primary
and the standby databases.
• Using the Console to Enable Data Guard on an Oracle Exadata Database Service on
Cloud@Customer System
Learn to set up a Data Guard group between databases.
• Using the Console to View Data Guard group of Databases in an Exadata VM Cluster
To view the role of each database in a Data Guard group in an Exadata VM Cluster, follow
this procedure.
• Using the Console To View and Edit Data Guard group Details
You can switch between Data Guard types based on the Oracle Database software license
type you have deployed.
• Using the Console To Perform a Database Switchover
You can initiate a switchover operation on a standby database that is a member of the
Data Guard group.
• Using the Console To Perform a Database Failover
You can initiate a failover operation on a standby database that is a member of the Data
Guard group.
• Using the Console To Reinstate a Database
After you fail over a primary database to its standby, the standby assumes the primary role
and the old primary is identified as a disabled standby.
• Using the Console To Terminate a Data Guard group on an Oracle Exadata Database
Service on Cloud@Customer System
On a VM cluster, you remove a Data Guard group by terminating all the standby
databases.
Using the Console to Enable Data Guard on an Oracle Exadata Database Service on
Cloud@Customer System
Learn to set up a Data Guard group between databases.
Note:
Data Guard relies on a reliable network with sufficient throughput between the
primary and standby clusters. Since Oracle does not own the network, some
evaluation should be done prior to implementing Data Guard to ensure the required
network bandwidth is available. It is recommended that Assessing and Optimizing
Network Performance be followed to understand the achievable throughput between
the clusters and evaluate whether the requirements of the database are met. By
default, the maximum socket buffer size is set to a higher value for cross-region
ExaDB-C@C Data Guard configurations.
5-301
Chapter 5
Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
Note:
When you configure a Data Guard group, the primary and standby databases must
be on the same major release version while the standby database can be on a higher
minor version.
As part of the latest release we are introducing an enhanced user experience and
new APIs to improve performance and provide additional Data Guard capabilities
including support for multiple standby databases via cloud automation.
• With the new API, your new Data Guard configuration will be created as a Data
Guard group resource.
• If you have an existing Data Guard setup, you can continue to use current
capabilities with no impact. However, if you wish to create multiple standby
databases, you will need to migrate to the new API model, which can be done at
any time.
• If you currently have automation that manages Data Guard operations using the
existing Data Guard Association API, you will need to update your applications to
use the new API to take advantage of these new capabilities
Oracle currently supports both the existing Data Guard Association API and the
new Data Guard group API and the associated user interfaces.
Note:
A parallel operation on the Standby, if it fails, should be retried after a 5-minute
interval.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
VM Clusters is selected by default.
2. Select your Compartment.
A list of VM Clusters is displayed for the chosen Compartment.
3. In the list of VM clusters, click the VM cluster that contains the database for which you
want to assume the primary role, and then click the name of that database.
4. Under Resources, click Data Guard Associations.
5. Click Add standby.
6. On the Add standby page, configure your Data Guard group.
• – Choose the Data Guard experience:
* Use the new Data Guard group Resource With this option, your new Data
Guard configuration will be created as a Data Guard group resource. This
option with new APIs supports adding multiple standby databases and
provides other enhancements. If you currently have automation that manages
Data Guard operations using the existing Data Guard Association API, you
can update your applications to use the new API to take advantage of these
new capabilities.
* Use the existing Data Guard Association Resource Choose this option if
your automation for managing Data Guard operations relies on the existing
5-302
Chapter 5
Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
Data Guard Association API. However, you will not be able to add multiple
standby databases and will not get the enhancements provided by the new
API.
• Data Guard group details:
– Select a Data Guard type, Active Data Guard or Data Guard, based on the
Oracle Database software license type you have deployed. If you have deployed
Oracle Database Enterprise Edition Extreme Performance (License Included), then
you may choose either Data Guard or Active Data Guard. If you have deployed
Bring Your Own License (BYOL) Oracle Database Enterprise Edition without the
Active Data Guard option, then you would select Data Guard, which is the default.
* Active Data Guard: Active Data Guard is a licensed option to the Oracle
Database Enterprise Edition and enables advanced capabilities that extend
the basic Data Guard functionality. These capabilities include Real-Time Query
and DML Offload, Automatic Block Repair of physical data corruptions,
Standby Block Change Tracking, Global Data Services, and Application
Continuity.
* Data Guard: Oracle Data Guard ensures high availability, data protection, and
disaster recovery for enterprise data. Data Guard provides a comprehensive
set of services that create, maintain, manage, and monitor one or more
standby databases to enable production Oracle databases to survive disasters
and data corruptions. Data Guard maintains these standby databases as
transactionally consistent copies of the production database.
– Protection mode: The protection mode used for this Data Guard group.
Maximum Performance provides the highest level of data protection that is
possible without affecting the performance of a primary database.
Maximum Availability provides the highest level of protection of data with zero data
loss synchronous transport without compromising the availability of the database.
– Transport type: The redo transport type used for the Data Guard association
between the primary and this standby database.
* Async: Asynchronous transport mode used with Maximum Performance
protection mode.
* Sync: Synchronous transport mode used with Maximum Performance and
Maximum Availability protection mode.
Protection Mode and Transport Type: Rules for Standby Database Creation
* Creating the first standby: You cannot modify the Protection Mode or
Transport Type for the first standby database.
* The default settings are:
* Protection Mode: Max Performance
* Transport Type: Async
* Creating the second to Nth standby: You cannot modify the Protection
Mode or Transport Type for any subsequent standby databases.
* The Protection Mode is inherited from the first standby.
* The default Transport Type is set to Async.
• Select peer VM cluster: Specify the following values for the standby:
– Peer Region: The primary and standby databases could be running on two
different VM clusters on a shared ExaDB-C@C system or on two geographically
5-303
Chapter 5
Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
Note:
Although only Database homes of the same version and RU are listed,
the homes displayed may have different one-off patches than the
primary. Though acceptable to have different one-offs, the best practice
is to have identical database homes between primary and standby.
– Create a new Database Home: If no Database Homes exist for the database
version you have selected, then this option is selected by default. You can create
the new Database Home with the same DSI as the primary database, or choose a
different image. Note that DSIs are not available across regions. A separate DSI
must be created in the peer region using the same RU as the primary.
a. Click Change Database Image to select a database software image for the
new Database Home.
b. In the resulting Browse Database Images, do the following:
i. Select the compartment containing the database software image you want
to use to create the new Database Home.
ii. Select the Oracle Database software version that the new Database Home
will use, then choose an image from the list of available images for your
selected software version.
iii. Click Select.
Note:
If you are using the new Data Guard group resource, you must
first create the database home before adding the standby
database.
5-304
Chapter 5
Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
Note:
You cannot modify the db_name, db_unique_name, and SID prefix after
creating the database.
Optionally, specify a unique name for the database. This attribute defines the value
of the db_unique_name database parameter. The value is case insensitive. The
db_unique_name must contain only the permitted characters.
Review the following guidelines when selecting a database name:
* maximum of 30 characters
* can contain alphanumeric and underscore (_) characters
* begin with an alphabetic character
* unique across the fleet/tenancy
If a unique name is not entered, then the db_unique_name defaults to the following
format <db_name>_<3 char unique string>_<region-name>.
– Database password: Enter the database admin password of the primary
database in the Database password field. This same database admin password
will be used for the standby.
The admin password and the TDE password must be the same. If they are not,
follow the instructions in Changing the Database Passwords to align them.
– TDE wallet password: Enter the TDE wallet password.
• (Optional) Select Show Advanced Options.
– Provide the Oracle SID prefix: Optionally, specify the Oracle SID prefix for the
database. The instance number is automatically appended to the SID prefix to
become the instance_name database parameter. If not provided, then the SID
prefix defaults to the first 12 characters of the db_unique_name.
Review the following guidelines when selecting a database name:
* maximum of 12 characters
* contain only alphanumeric characters
* begin with an alphabetic character
* unique in the VM cluster
7. Click Add standby.
A work request is issued to configure the Data Guard association. The progress of the request
and the stages of provisioning can be viewed on the Work Requests page of the respective
Standby database.
When the association is created, the details for a database and its peer display their respective
roles as Primary or Standby.
Related Topics
• Network Requirements for Oracle Exadata Database Service on Cloud@Customer
To provide secure and reliable network connectivity for different application and
management functions, Exadata Database Service on Cloud@Customer uses different
networks.
5-305
Chapter 5
Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
Using the Console to View Data Guard group of Databases in an Exadata VM Cluster
To view the role of each database in a Data Guard group in an Exadata VM Cluster, follow this
procedure.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Choose your Compartment.
3. Click on the VM Cluster containing the databases you wish to view their roles in Data
Guard associations.
4. In the Databases section under Resources, the role of each database in this VM Cluster
is indicated in the Data Guard role column.
Using the Console To View and Edit Data Guard group Details
You can switch between Data Guard types based on the Oracle Database software license
type you have deployed.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
VM Clusters is selected by default.
2. Choose your Compartment.
A list of VM Clusters is displayed for the chosen Compartment.
3. In the list of VM clusters, click the VM cluster that contains the primary database you want
to switch Data Guard type.
4. Click the name of the primary database.
5. Under Resources, click Data Guard group.
A list of databases that are members of the Data Guard group is displayed with the Data
Guard type you have chosen for each Data Guard group member.
6. To edit Data Guard group details, click the Actions icon (three dots), and then click Edit.
Edit Data Guard group screen is displayed.
7. Do the following on the Edit Data Guard group screen.
• Select an applicable Data Guard type.
• Select the Protection mode.
Note:
Select the Transport type.
5-306
Chapter 5
Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
Note:
You can initiate a failover even if the primary database is in a healthy state; however,
exercise caution when performing a failover.
5-307
Chapter 5
Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
This database should now assume the role of the primary, and the old primary's role should
display as Disabled Standby.
Set your ORACLE_UNQNAME environment variable to the value of the Database Unique Name,
and then run these commands:
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
VM Clusters is selected by default.
2. Choose your Compartment.
A list of VM Clusters is displayed for the chosen Compartment.
3. In the list of VM clusters, click the VM cluster that contains the primary database.
4. Click the name of the primary database.
5. Under Resources, click Data Guard group.
You will see the database you want to reinstate listed.
6. Click the Actions icon (three dots), and then click Reinstate.
7. In the Reinstate database dialog box, enter the database admin password, and then click
Reinstate.
This database should now be reinstated as the standby in the Data Guard group.
Using the Console To Terminate a Data Guard group on an Oracle Exadata Database
Service on Cloud@Customer System
On a VM cluster, you remove a Data Guard group by terminating all the standby databases.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
VM Clusters is selected by default.
2. Choose your Compartment.
A list of VM Clusters is displayed for the chosen Compartment.
3. In the list of VM clusters, click the VM cluster that contains the standby database you want
to terminate.
5-308
Chapter 5
Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
Note:
In February 2026, the Data Guard Association model and its associated APIs will be
replaced by the new Data Guard Group model and APIs. Beginning February 2026,
all new Data Guard configurations provisioned from the Oracle Cloud Infrastructure
(OCI) Console will automatically use the Data Guard Group model.
For information about using the API and signing requests, see REST APIs and Security
Credentials. For information about SDKs, see Software Development Kits and Command Line
Interface.
The following table lists the REST API endpoints to manage Data Guard associations.
5-309
Chapter 5
Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
Note:
In February 2026, the Data Guard Association model and its associated APIs will be
replaced by the new Data Guard Group model and APIs. Beginning February 2026,
all new Data Guard configurations provisioned from the Oracle Cloud Infrastructure
(OCI) Console will automatically use the Data Guard Group model.
For information about using the API and signing requests, see REST APIs and Security
Credentials. For information about SDKs, see Software Development Kits and Command Line
Interface.
The following table lists the REST API endpoints to manage Data Guard group.
5-310
Chapter 5
Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
5-311
Chapter 5
Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
5-312
Chapter 5
Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
5-313
Chapter 5
Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
5-314
Chapter 5
Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
5-315
Chapter 5
Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
5-316
Chapter 5
Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
5-317
Chapter 5
Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
5-318
Chapter 5
Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
5-319
Chapter 5
Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
5-320
Chapter 5
Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
5-321
Chapter 5
Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
5-322
Chapter 5
Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
5-323
Chapter 5
Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
5-324
Chapter 5
Use Oracle Data Guard with Oracle Exadata Database Service on Cloud@Customer
5-325
Chapter 5
Manage Keys Using an External Keystore
5-326
Chapter 5
Manage Keys Using an External Keystore
Network Configuration: Ensure that a connection is established between the Guest VM and
the external keystore server by:
• Setting up the required network.
• Opening the necessary ports.
• Enabling the protocol specified by the external keystore vendor.
PKCS#11 Library Installation: Install the PKCS#11-related software and configure the
PKCS#11 library on the VMs according to the external keystore vendor's documentation.
Limitations:
• Only one vendor PKCS#11 library can be present on a Guest VM at a time.
• External keystore interfaces cannot be used to associate keys with Oracle Databases on
Oracle Exadata Database Service on Cloud@Customer.
• While the external keystore interface allows you to view the keys associated with the
databases, it may not support performing key management operations directly from the
interface.
Communication Validation: Verify that the PKCS#11 library can successfully communicate
with the external keystore. Note that cloud automation does not perform prechecks to validate
this connection. If the key is inaccessible, the database will return an error with the relevant
details.
For more information, see https://support.oracle.com/support/?kmExternalId=FAQ2403.
5-327
Chapter 5
Managing Encryption Keys on External Devices
"While you should be able to add the virtual machine to the existing VM cluster, the
database instance will not be extended to the newly created VM. This is because one or
more databases on this VM cluster are configured with an external keystore. You must
configure the external keystore on the newly created VM, then run the dbaascli command
to extend the database instances to the new VM."
5-328
Chapter 5
Managing Encryption Keys on External Devices
Note:
The Oracle Key Vault is a customer-provisioned and managed system and it is not
part of Oracle Cloud Infrastructure managed services.
Related Topics
• Oracle Key Vault
5-329
Chapter 5
Managing Encryption Keys on External Devices
5-330
Chapter 5
Managing Encryption Keys on External Devices
If you're new to policies, then see "Getting Started with Policies" and "Common Policies". If you
want to dig deeper into writing policies for databases, then see "Details for the Database
Service".
Related Topics
• Let database admins manage DB systems
• Getting Started with Policies
• Common Policies
• Details for the Database Service
Tagging Resources
You can apply tags to your resources to help you organize them according to your business
needs.
You can apply tags at the time you create a resource, or you can update the resource later with
the desired tags. For general information about applying tags, see "Resource Tags".
Related Topics
• Resource Tags
5-331
Chapter 5
Managing Encryption Keys on External Devices
For more information, see Network Port Requirements, Managing Oracle Key Vault Users, and
Managing Administrative Roles and User Privileges
• Step 1: Create a Vault in OKV Vault Service and Add a Secret to the Vault to Store OKV
REST Administrator Password
• Step 2: Create a Dynamic Group and a Policy Statement for Key Store to Access Secret in
OKV Vault
• Step 3: Create a Dynamic Group and a Policy Statement for Exadata Infrastructure to Key
Store
• Step 4: Create a Policy Statement for Database Service to Use Secret from OKV Vault
Service
• Step 5: Create Key Store
Related Topics
• Network Port Requirements
• Managing Oracle Key Vault Users
• Managing Administrative Roles and User Privileges
Step 1: Create a Vault in OKV Vault Service and Add a Secret to the Vault to Store
OKV REST Administrator Password
Your Exadata Cloud@Customer infrastructure communicates with OKV over REST each time
an Oracle Database is provisioned to register the Oracle Database and request a wallet on
OKV. Therefore, Exadata infrastructure needs access to the REST admin credentials to
register with the OKV server.
These credentials are stored securely in the Oracle Vault Service in OCI as a Secret and
accessed by your Exadata Cloud@Customer infrastructure only when needed. When needed,
the credentials are stored in a password-protected wallet file.
To store the OKV administrator password in the OKV Vault service, create a vault by following
the instructions outlined in Managing Vaults and create a Secret in that vault by following the
instructions outlined in Managing Secrets.
Related Topics
• Managing Vaults
• Managing Secrets
Step 2: Create a Dynamic Group and a Policy Statement for Key Store to Access
Secret in OKV Vault
To grant your Key Store resources permission to access Secret in OKV Vault, you create an
IAM dynamic group that identifies these resources and then create an IAM policy that grants
this dynamic group access to the Secret you created in the OKV Vaults and Secrets.
When defining the dynamic group, you identify your Key Store resources by specifying the
OCID of the compartment containing your Key Store.
1. Copy the OCID of the compartment containing your Key Store resource.
You can find this OCID on the Compartment Details page of the compartment.
5-332
Chapter 5
Managing Encryption Keys on External Devices
2. Create a dynamic group by following the instructions in "To create a dynamic group" in
Oracle Cloud Infrastructure Documentation. When following these instructions, enter a
matching rule of this format:
where <compartment-ocid> is the OCID of the compartment containing your Key Store
resource.
3. After creating the dynamic group, navigate to (or create) an IAM policy in a compartment
higher up in your compartment hierarchy than the compartment containing your vaults and
secrets. Then, add a policy statement of this format:
where <dynamic-group> is the name of the dynamic group you created and <vaults-and-
secrets-compartment> is the name of the compartment in which you created your vaults
and secrets.
Related Topics
• To create a dynamic group
Step 3: Create a Dynamic Group and a Policy Statement for Exadata Infrastructure to
Key Store
To grant your Exadata infrastructure resources permission to access Key Store, you create an
IAM dynamic group that identifies these resources and then create an IAM policy that grants
this dynamic group access to the Key Store you created.
When defining the dynamic group, you identify your Exadata infrastructure resources by
specifying the OCID of the compartment containing your Exadata infrastructure.
1. Copy the OCID of the compartment containing your Exadata infrastructure resource.
You can find this OCID on the Compartment Details page of the compartment.
2. Create a dynamic group by following the instructions in "To create a dynamic group" in
Oracle Cloud Infrastructure Documentation. When following these instructions, enter a
matching rule of this format:
5-333
Chapter 5
Managing Encryption Keys on External Devices
where <dynamic-group> is the name of the dynamic group you created and <key-store-
compartment> is the name of the compartment in which you created your Key Store.
Step 4: Create a Policy Statement for Database Service to Use Secret from OKV
Vault Service
To grant the Exadata Database service permission to use the secret in OKV Vault to log in to
the OKV REST interface, navigate to (or create) an IAM policy in a compartment higher up in
your compartment hierarchy than the compartment containing your OKV Vaults and Secrets.
Then, add a policy statement of this format:
5-334
Chapter 5
Managing Encryption Keys on External Devices
option (you can apply tags later) or ask your administrator. Avoid entering confidential
information.
6. Click Create Key Store.
7. Ensure that you use the same "okv_rest_user" user credentials, while provisioning
Autonomous Database.
For more information, see Managing Vaults, Managing Keys, and Managing Secrets.
Related Topics
• Managing Vaults
• Managing Keys
• Managing Secrets
5-335
Chapter 5
Managing Encryption Keys on External Devices
5-336
Chapter 5
Managing Encryption Keys on External Devices
Related Topics
• REST APIs
• Security Credentials
• Software Development Kits and Command Line Interface
5-337
Chapter 5
Managing Encryption Keys on External Devices
Note:
1. Open the navigation menu. Click Oracle Database, then click Exadata Database Service
on Cloud@Customer.
2. Choose your compartment from the Compartment drop-down.
3. Navigate to the VM Cluster that contains the database for which you want to change
encryption management or rotate a key.
a. Under Exadata Database Service on Cloud@Customer Infrastructure, click Exadata
VM Clusters.
b. In the list of VM clusters, locate the VM cluster you want to access and click its
highlighted name to view the details page for the cluster.
4. In the Databases section, click the name of the database for which you want to change
encryption management or rotate a key to display its details page.
5. Click the More Actions drop-down.
6. Click Administer Encryption Key.
To change key management type from Oracle-managed keys to customer-managed keys:
a. Click Change Key Management Type.
b. Select Encrypt using customer-managed keys.
You must have a valid encryption key in the Oracle Key Vault service and provide the
information in the subsequent steps. For more information, see Key and Secret
Management Concepts.
c. Choose a region.
d. Choose a compartment.
You can change the compartment by clicking the Change Compartment link.
e. Click Save Changes.
5-338
Chapter 5
Managing Encryption Keys on External Devices
Note:
You can rotate customer-managed encryption keys only.
Note:
Caution:
After changing key management to customer-managed keys, deleting the key from
the OKV will cause the database to become unavailable.
On the database details page for this database, the Encryption section displays the
encryption key name and the encryption key OCID.
Related Topics
• Key and Secret Management
Note:
To decrypt / encrypt the data during a remote clone, the container database must
have access to MEK. The MEK must be made available to the target CDB when it is
stored in the OKV server.
5-339
Chapter 5
Managing Encryption Keys on External Devices
• Source CDB and Target CDB are Encrypted with MEK in the Same OKV Server
• Source CDB and Target CDB are Encrypted with MEK in a Different OKV Server
Related Topics
• dbaascli pdb localClone
To create a new pluggable database (PDB) as a clone of an existing PDB in the same
container database (CDB), use the dbaascli pdb localClone command.
• dbaascli pdb remoteClone
To create a new pluggable database (PDB) as a clone of an existing PDB in another
container database (CDB), use the dbaascli pdb remoteClone command.
Source CDB and Target CDB are Encrypted with MEK in the Same OKV Server
1. Get the OKV object ID of the source PDB.
a. Get the latest encryption key of the source PDB using SQL*Plus.
Connected to:
Oracle Database 19c EE Extreme Perf Release 19.0.0.0.0 - Production
Version 19.19.0.0.0
Session altered.
0648E5D8D5559B4F0EBFB8AA5EE730401A
SOFTWARE KEYSTORE
25-MAR-23 12.01.41.075932 AM +00:00
06AFF5B6E27A954F6EBFFC77296B27C9EC
SOFTWARE KEYSTORE
25-MAR-23 11.42.51.336955 AM +00:00
SQL> exit
Disconnected from Oracle Database 19c EE Extreme Perf Release
19.0.0.0.0 - Production
Version 19.19.0.0.0
[oracle@testserver oracle]$
b. Get the OKV object ID (uuid) of the newest MEK obtained from the step above.
5-340
Chapter 5
Managing Encryption Keys on External Devices
Enter the OKV Endpoint password when prompted and hit the Enter key on your
keyboard.
5-341
Chapter 5
Managing Encryption Keys on External Devices
<source_db_name>/okv_rest_cli/conf/okvrestcli_logging.properties
[oracle@testserver okv_rest_cli]$ cat /var/opt/oracle/dbaas_acfs/
<source_db_name>/okv_rest_cli/conf/okvrestcli_logging.properties
handlers=java.util.logging.FileHandler
java.util.logging.FileHandler.pattern=/var/opt/oracle/dbaas_acfs/
<source_db_name>/okv_rest_cli/logs/okvrest.log
java.util.logging.FileHandler.limit=200000
java.util.logging.FileHandler.count=1
java.util.logging.FileHandler.formatter=com.oracle.okv.rest.log.OkvForma
tter
java.util.logging.ConsoleHandler.level=FINER
java.util.logging.ConsoleHandler.formatter=com.oracle.okv.rest.log.OkvFo
rmatter
[oracle@testserver okv_rest_cli]$
e. Create OKV REST wallet using the OKV REST command-line interface.
Enter the source OKV REST password when prompted.
3. Create a new OKV wallet to store only the PDB MEK obtained in step #1.
a. Get the OKV wallet name from the source PDB in the format
EXA_DB_NAME_DBID_PDB_NAME_WL.
For example, the wallet name would be EXA_NEWDB1_37508325141_PDB_NAME_WL.
5-342
Chapter 5
Managing Encryption Keys on External Devices
Connected to:
Oracle Database 19c EE Extreme Perf Release 19.0.0.0.0 - Production
Version 19.19.0.0.0
VALUE
------------------------------------------------------------------------
--------
newdb11
SQL> exit
Disconnected from Oracle Database 19c EE Extreme Perf Release
19.0.0.0.0 - Production
Version 19.19.0.0.0
[oracle@testserver newdb1]$
5-343
Chapter 5
Managing Encryption Keys on External Devices
}
}
[root@testserver oracle]# export JAVA_HOME=/usr/java/latest; export
OKV_RESTCLI_CONFIG=/var/opt/oracle/dbaas_acfs/<source_db_name>/
okv_rest_cli/conf/okvrestcli.ini; /var/opt/oracle/dbaas_acfs/
<source_db_name>/okv_rest_cli/bin/okv manage-access wallet check-status
--wallet <SOURCE_PDB_OKV_WALLET>
{
"result" : "Success",
"value" : {
"status" : "ACTIVE",
"wallet" : "<SOURCE_PDB_OKV_WALLET>"
}
}
[root@testserver oracle]#
4. Add Read and Modify, and Manage Wallet permissions from the source database OKV
Endpoints to the OKV wallet created in step #3.
a. Get the Endpoint names from the source database. One per VM.
Usually, the structure is in the format, EXA_DB_UNIQUE_NAME_DBID_SID_EP.
For example, the Endpoint name of node 1 would be
EXA_NEWDB1_UNIQ_3750832514_NEWDB11_EP.
Connected to:
Oracle Database 19c EE Extreme Perf Release 19.0.0.0.0 - Production
Version 19.19.0.0.0
VALUE
------------------------------------------------------------------------
--------
newdb11
SQL> exit
Disconnected from Oracle Database 19c EE Extreme Perf Release
19.0.0.0.0 - Production
Version 19.19.0.0.0
[oracle@testserver newdb1]$
5-344
Chapter 5
Managing Encryption Keys on External Devices
b. Add Read and Modify, and Manage Wallet permissions using the OKV REST
command-line interface.
5. Store MEK from the source PDB obtained in step #1 into the OKV wallet created in step
#3.
• Add MEK (uuid obtained in step #1.b) using the OKV REST command-line interface.
Enter the source OKV Endpoint password when prompted.
5-345
Chapter 5
Managing Encryption Keys on External Devices
e. Create OKV REST wallet using the OKV REST command-line interface.
5-346
Chapter 5
Managing Encryption Keys on External Devices
7. Add Read Only and Manage Wallet permissions from the target database OKV Endpoints
to the source PDB OKV wallet created in step #3.
a. Get the Endpoint names from the target database. One per VM.
Usually, the structure is in the format, EXA_DB_UNIQUE_NAME_DBID_SID_EP.
For example, the Endpoint name of node 1 would be
EXA_NEWDB1_UNIQ_3750832514_NEWDB11_EP.
Connected to:
Oracle Database 19c EE Extreme Perf Release 19.0.0.0.0 - Production
Version 19.19.0.0.0
VALUE
------------------------------------------------------------------------
--------
newdb11
5-347
Chapter 5
Managing Encryption Keys on External Devices
SQL> exit
Disconnected from Oracle Database 19c EE Extreme Perf Release
19.0.0.0.0 - Production
Version 19.19.0.0.0
[oracle@testserver newdb1]$
b. Add permissions Read Only and Manage Wallet using the OKV REST command-line
interface.
Loading PILOT...
Session ID of the current execution is: 6848
Log file location: /var/opt/oracle/log/alyokv1/pdb/remoteClone/
pilot_2023-06-12_10-32-35-PM_204184
-----------------
Running Plugin_initialization job
Enter REMOTE_DB_SYS_PASSWORD
5-348
Chapter 5
Managing Encryption Keys on External Devices
***************
Completed Plugin_initialization job
-----------------
Running Validate_input_params job
Completed Validate_input_params job
-----------------
Running Perform_dbca_prechecks job
Completed Perform_dbca_prechecks job
-----------------
Running PDB_creation job
Completed PDB_creation job
-----------------
Running Load_pdb_details job
Completed Load_pdb_details job
-----------------
Running Configure_pdb_service job
Completed Configure_pdb_service job
-----------------
Running Configure_tnsnames_ora job
Completed Configure_tnsnames_ora job
-----------------
Running Set_pdb_admin_user_profile job
Completed Set_pdb_admin_user_profile job
-----------------
Running Lock_pdb_admin_user job
Completed Lock_pdb_admin_user job
-----------------
Running Register_ocids job
Skipping. Job is detected as not applicable.
-----------------
Running Prepare_blob_for_standby_in_primary job
Skipping. Job is detected as not applicable.
-----------------
Running Generate_dbsystem_details job
Completed Generate_dbsystem_details job
dbaascli execution completed
[root@testserver oracle]#
9. Delete the source PDB OKV wallet created in step #3 using the OKV REST command-line
interface.
5-349
Chapter 5
Managing Encryption Keys on External Devices
Source CDB and Target CDB are Encrypted with MEK in a Different OKV Server
1. Get the OKV object ID of the source PDB.
a. Get the latest encryption key of the source PDB using SQL*Plus.
Connected to:
Oracle Database 19c EE Extreme Perf Release 19.0.0.0.0 - Production
Version 19.19.0.0.0
Session altered.
0648E5D8D5559B4F0EBFB8AA5EE730401A
SOFTWARE KEYSTORE
25-MAR-23 12.01.41.075932 AM +00:00
06AFF5B6E27A954F6EBFFC77296B27C9EC
SOFTWARE KEYSTORE
25-MAR-23 11.42.51.336955 AM +00:00
SQL> exit
Disconnected from Oracle Database 19c EE Extreme Perf Release
19.0.0.0.0 - Production
Version 19.19.0.0.0
[oracle@testserver oracle]$
5-350
Chapter 5
Managing Encryption Keys on External Devices
b. Get the OKV object ID (uuid) of the newest MEK obtained from the step above.
Enter the OKV Endpoint password when prompted and hit the Enter key on your
keyboard.
5-351
Chapter 5
Managing Encryption Keys on External Devices
3. Create a new OKV wallet to store only the PDB MEK obtained in step #1.
a. Create a new wallet using the OKV REST command-line interface. Name suggested:
EXA_DB_NAME_DBID_PDB_NAME_WL
5-352
Chapter 5
Managing Encryption Keys on External Devices
4. Add Read and Modify, and Manage Wallet permissions from the source database OKV
Endpoints to the OKV wallet created in step #3.
a. Get the Endpoint names from the source database. One per VM.
Usually, the structure is in the format, EXA_DB_UNIQUE_NAME_DBID_SID_EP.
For example, the Endpoint name of node 1 would be
EXA_NEWDB1_UNIQ_3750832514_NEWDB11_EP.
5-353
Chapter 5
Managing Encryption Keys on External Devices
Connected to:
Oracle Database 19c EE Extreme Perf Release 19.0.0.0.0 - Production
Version 19.19.0.0.0
VALUE
------------------------------------------------------------------------
--------
newdb11
SQL> exit
Disconnected from Oracle Database 19c EE Extreme Perf Release
19.0.0.0.0 - Production
Version 19.19.0.0.0
[oracle@testserver newdb1]$
b. Add permissions Read and Modify, and Manage Wallet using the OKV REST
command-line interface.
5. Store MEK from the source PDB obtained in step #1 into OKV wallet created in step #3.
• Add MEK (uuid obtained in step #1.b) using the OKV REST command-line interface.
Enter the source OKV Endpoint password when prompted.
5-354
Chapter 5
Managing Encryption Keys on External Devices
<SOURCE_PDB_OKV_WALLET>
Password:
{
"result" : "Success"
}
[root@testserver oracle]#
6. Download OKV wallet created in step #3 from the OKV server to the local filesystem.
a. Create a new directory with permissions for oracle user.
This directory will store the wallet that will contain only the MEK of the source PDB.
b. Download the OKV wallet created in step #3 to the directory created in step #6.a using
okvutil.
It will prompt twice for a password to encrypt the local wallet. Use the same password
as the source Endpoint password. Also, enter the source Endpoint password when
prompted.
5-355
Chapter 5
Managing Encryption Keys on External Devices
9. Copy the source PDB wallet downloaded to the focal filesystem in step #6 to the target
Cluster VM.
10. Delete the source PDB wallet from the source local filesystem created in step #6.
a. Delete the wallet directory.
5-356
Chapter 5
Managing Encryption Keys on External Devices
<target_db_name>/okv_rest_cli/conf/okvrestcli.ini
[Default]
server=<target_okv_server_ip1>
user=<target_okv_rest_user>
client_wallet=/var/opt/oracle/dbaas_acfs/<target_db_name>/okv_rest_cli/
client_wallet
log_property=/var/opt/oracle/dbaas_acfs/<target_db_name>/okv_rest_cli/
conf/okvrestcli_logging.properties
okv_client_config=/u02/app/oracle/admin/<target_db_name>/okv_home/conf/
okvclient.ora
e. Create OKV REST wallet using the OKV REST command-line interface.
Enter the target OKV REST password when prompted.
5-357
Chapter 5
Managing Encryption Keys on External Devices
12. Upload the source PDB wallet created in step #6 and copied to the target Cluster VM in
step #9.
a. Unzip the source PDB wallet.
b. Get OKV wallet name from the target database in the format EXA_DB_NAME_DBID_WL.
For example, the wallet name would be EXA_NEWDB1_37508325141_WL.
Connected to:
Oracle Database 19c EE Extreme Perf Release 19.0.0.0.0 - Production
Version 19.19.0.0.0
VALUE
------------------------------------------------------------------------
--------
newdb11
SQL> exit
Disconnected from Oracle Database 19c EE Extreme Perf Release
19.0.0.0.0 - Production
Version 19.19.0.0.0
[oracle@testserver newdb1]$
c. Upload the source PDB wallet to the target OKV wallet using okvutil.
Enter the source PDB wallet password when prompted. Use the same password as
the source Endpoint password.
5-358
Chapter 5
Managing Encryption Keys on External Devices
Loading PILOT...
Session ID of the current execution is: 6857
Log file location: /var/opt/oracle/log/alyokv1/pdb/remoteClone/
pilot_2023-06-13_01-29-21-AM_196991
-----------------
Running Plugin_initialization job
Enter REMOTE_DB_SYS_PASSWORD
*************
Completed Plugin_initialization job
-----------------
Running Validate_input_params job
Completed Validate_input_params job
-----------------
Running Perform_dbca_prechecks job
Completed Perform_dbca_prechecks job
-----------------
Running PDB_creation job
Completed PDB_creation job
-----------------
Running Load_pdb_details job
Completed Load_pdb_details job
-----------------
Running Configure_pdb_service job
Completed Configure_pdb_service job
5-359
Chapter 5
Managing Encryption Keys on External Devices
-----------------
Running Configure_tnsnames_ora job
Completed Configure_tnsnames_ora job
-----------------
Running Set_pdb_admin_user_profile job
Completed Set_pdb_admin_user_profile job
-----------------
Running Lock_pdb_admin_user job
Completed Lock_pdb_admin_user job
-----------------
Running Register_ocids job
Skipping. Job is detected as not applicable.
-----------------
Running Prepare_blob_for_standby_in_primary job
Skipping. Job is detected as not applicable.
-----------------
Running Generate_dbsystem_details job
Completed Generate_dbsystem_details job
dbaascli execution completed
[root@testserver oracle]#
# su oracle
$ /u02/app/oracle/admin/<dbname>/okv_home/okv/bin/okvutil
okvutil version 21.6.0.0.0
Usage: okvutil <command> [-v <verbosity>] [<command args>]
<command> := list | upload | download | sign | sign-verify |
changepwd | diagnostics
Options:
-v, --verbose <verbosity>
Print extra information to standard out.
Possible verbosity values are 0, 1 and 2 (more detailed information
with higher verbosity level).
5-360
Chapter 5
Managing Encryption Keys on External Devices
b. Get the OKV Server version by logging in to the OKV Server console through the
browser. In this case the Version is 21.7.0.0.0.
2. Install OKV REST wallet in the source database. This step must be done in only one node.
a. If not existing, create the okv_rest_cli directory.
# su oracle
$ mkdir /var/opt/oracle/dbaas_acfs/<dbname>/okv_rest_cli
$ cd /var/opt/oracle/dbaas_acfs/<dbname>/okv_rest_cli
$ curl -O -k https://100.75.59.249:5695/okvrestclipackage.zip
% Total % Received % Xferd Average Speed Time Time Time
Current
Dload Upload Total Spent Left
Speed
100 3865k 100 3865k 0 0 5102k 0 --:--:-- --:--:--
--:--:-- 5106k
$ unzip -q okvrestclipackage.zip
$ vi /var/opt/oracle/dbaas_acfs/<dbname>/okv_rest_cli/conf/
okvrestcli.ini
$ cat !$
cat /var/opt/oracle/dbaas_acfs/<dbname>/okv_rest_cli/conf/okvrestcli.ini
#Provide absolute path for log_property, okv_client_config properties
[Default]
#log_property=./conf/okvrestcli_logging.properties
#server=[OKV IP Address]
#okv_client_config=./conf/okvclient.ora
#user=[OKV username]
#password=[user password]
#[Profile1]
#server=
#okv_client_config=
#user=
#[Profile2]
#server=
#okv_client_config=
#user=
server=<okv_server_ip>
user=<okv_rest_user>
client_wallet=/var/opt/oracle/dbaas_acfs/<dbname>/okv_rest_cli/
client_wallet
5-361
Chapter 5
Managing Encryption Keys on External Devices
$ mkdir /var/opt/oracle/dbaas_acfs/<dbname>/okv_rest_cli/client_wallet
e. Create OKV REST Wallet using OKV REST CLI. It will prompt for the source OKV
REST password.
$ mv /u02/app/oracle/admin/<dbname>/okv_home/okv /u02/app/oracle/admin/
<dbname>/okv_home/okv<current_okv_home_version>
$ mkdir /u02/app/oracle/admin/<dbname>/okv_home/okv<okv_server_version>
c. Create a symlink of regular OKV Home name to the directory created in step 3.b.
$ ln -s /u02/app/oracle/admin/<dbname>/okv_home/
okv<okv_server_version> /u02/app/oracle/admin/<dbname>/okv_home/okv
$ /u02/app/oracle/admin/<dbname>/okv_home/okv/bin/okvutil list
Enter Oracle Key Vault endpoint password:
Unique ID Type Identifier
DC690343-5694-4FC8-BFE4-6C7F1A550F67 Opaque Object TDE Wallet
Metadata
9E317DDB-0542-553B-A47D-FCC31AB6DD7C Symmetric Key TDE Master
Encryption Key: MKID AaTAGyAWyk/fv7pnl8qx4s0AAAAAAAAAAA
D9D840AF-A60E-5850-AA86-8C9F216F5501 Symmetric Key TDE Master
Encryption Key: MKID AUP0Tq+un08Mv1+onNhT4RUAAAAAAAAAAA
364EFC2F-1909-4F34-BF1B-90D3D03DA7EB Private Key Private Key
A9D0134F-C895-4F33-BF85-351B754E9FF9 Opaque Object TDE Wallet
Metadata
E1AC8D2F-90E9-4F88-BFEE-2883FCBB7271 Opaque Object TDE Wallet
Metadata
25B7DE14-3849-4F67-BFBE-1934BFE3559B Opaque Object TDE Wallet
5-362
Chapter 5
Managing Encryption Keys on External Devices
Metadata
4ED713ED-FE2B-4F35-BF7D-BCBEA8327A0B Symmetric Key TDE Master
Encryption Key: MKID 06EA813441C26B4F53BFD58E55C4BE90F4
6162E200-EF0A-4F89-BF25-A8596B3AD7B0 Opaque Object Certificate
Request
85A55486-28E5-4FFB-BF1C-B93C4C0BAD74 Secret Data Oracle Secret Data:
ID HSM_PASSWORD
67E74D97-56F6-407A-A035-009D953F907A Template Default template
for EXA_DB1902_7274B2A2-6F71-4516-B2BB-6D67CC3824FC_SCAQAE08DV0308_EP
E621EA72-5DD1-4F4F-BFD4-451E5B7DB8A9 Symmetric Key TDE Master
Encryption Key: MKID 0625BA455B03CD4F57BFA5D2290FD379A1
c. Provision Endpoint in DomU 1. It will prompt for OKV Endpoint password (TDE
password).
$ /u02/app/oracle/admin/db1902/okv_home/okv/bin/okvutil list
Enter Oracle Key Vault endpoint password:
Unique ID Type Identifier
DC690343-5694-4FC8-BFE4-6C7F1A550F67 Opaque Object TDE Wallet
Metadata
9E317DDB-0542-553B-A47D-FCC31AB6DD7C Symmetric Key TDE Master
Encryption Key: MKID AaTAGyAWyk/fv7pnl8qx4s0AAAAAAAAAAA
D9D840AF-A60E-5850-AA86-8C9F216F5501 Symmetric Key TDE Master
Encryption Key: MKID AUP0Tq+un08Mv1+onNhT4RUAAAAAAAAAAA
364EFC2F-1909-4F34-BF1B-90D3D03DA7EB Private Key Private Key
A9D0134F-C895-4F33-BF85-351B754E9FF9 Opaque Object TDE Wallet
Metadata
E1AC8D2F-90E9-4F88-BFEE-2883FCBB7271 Opaque Object TDE Wallet
Metadata
25B7DE14-3849-4F67-BFBE-1934BFE3559B Opaque Object TDE Wallet
Metadata
5-363
Chapter 5
Migrate to Oracle Exadata Database Service on Cloud@Customer
b. Get the OKV Home version by running okvutil. The version should be the same as
OKV Server version. In this case the value should be 21.7.0.0.0.
# su oracle
$ /u02/app/oracle/admin/<dbname>/okv_home/okv/bin/okvutil
okvutil version 21.7.0.0.0
Usage: okvutil <command> [-v <verbosity>] [<command args>]
<command> := list | upload | download | sign | sign-verify |
changepwd | diagnostics
Options:
-v, --verbose <verbosity>
Print extra information to standard out.
Possible verbosity values are 0, 1 and 2 (more detailed information
with higher verbosity level).
For help on a particular command, use [okvutil <command> -h].
You have new mail in /var/spool/mail/root
# /u02/app/oracle/admin/<dbname>/okv_home/okv/bin/root.sh
10. Start the DomU 1 instances of all databases with OKV-based TDE. This can be done via
the Console, srvctl command or SQL* Plus.
11. Repeat the Steps 8 - 10 in the rest of the DomUs.
5-364
Chapter 5
Overview of Exadata Cloud@Customer Gen1 to Out-of-Place Cloud Upgrade to Oracle Exadata Database Service on Cloud@Customer
Gen2 Infrastructure
5-365
Chapter 5
Overview of Exadata Cloud@Customer Gen1 to Out-of-Place Cloud Upgrade to Oracle Exadata Database Service on Cloud@Customer
Gen2 Infrastructure
5-366
Chapter 5
Overview of Exadata Cloud@Customer Gen1 to Out-of-Place Cloud Upgrade to Oracle Exadata Database Service on Cloud@Customer
Gen2 Infrastructure
• Configure network
– Provide network access path from the Exadata Cloud@Customer Gen1 servers and
the Gen2 servers to the ZDM servers used for the upgrade.
– Provide network access and SSH access from the ZDM server to the respective
Exadata Cloud@Customer infrastructure.
– For any client access to the target databases, ensure that a network path is available
from the client host to the new Exadata Cloud@Customer Gen2 deployed databases.
• Software
– The upgrade will require minimum versions of the software stack so prior to the
upgrade, install the appropriate version of Oracle Grid Infrastructure on the target
Exadata Cloud@Customer Gen2 infrastructure.
– Oracle Database versions supported on Exadata Cloud@Customer Gen1 will continue
to be supported. On the target Gen2 infrastructure, install appropriate versions of the
Oracle Database software and the one-off patches that exist in the source database.
– Complete all requirements for ZDM servers in terms of installation, configuration,
network access, and SSH access.
• Security
– Exadata Cloud@Customer Gen2 does not use Oracle Advanced Support Gateway
Security (OASG) so cannot request OASG logs.
• Ensure that automatic backup is not configured on the Gen2 target prior to migration.
5-367
Chapter 5
Overview of Exadata Cloud@Customer Gen1 to Out-of-Place Cloud Upgrade to Oracle Exadata Database Service on Cloud@Customer
Gen2 Infrastructure
Related Topics
• Preparing for Oracle Exadata Database Service on Cloud@Customer
Review OCI as well as the site, network and storage requirements to prepare and deploy
Oracle Exadata Database Service on Cloud@Customer in your data center.
• Prepare a Host for Zero Downtime Migration Software Installation
• Best Practices for Out-of-Place Cloud Upgrade to New Oracle Exadata Database Service
on Cloud@Customer Gen2 Infrastructure
For the purpose of the upgrade, the recommended tool to use is Oracle Zero Downtime
Migration (ZDM).
5-368
Chapter 5
Overview of Exadata Cloud@Customer Gen1 to Out-of-Place Cloud Upgrade to Oracle Exadata Database Service on Cloud@Customer
Gen2 Infrastructure
TGT_DB_UNIQUE_NAME=z19tgt1_uniq2
MIGRATION_METHOD=ONLINE_PHYSICAL
DATA_TRANSFER_MEDIUM=DIRECT
PLATFORM_TYPE=EXACC
SRC_HTTP_PROXY_URL=
SRC_HTTP_PROXY_PORT=
SRC_CONFIG_LOCATION=
SRC_BASTION_HOST_IP=
SRC_BASTION_PORT=
SRC_BASTION_USER=
SRC_BASTION_IDENTITY_FILE=
SRC_HOST_IP=
SRC_TIMEZONE=
SRC_OSS_PROXY_HOST=
SRC_OSS_PROXY_PORT=
SRC_SSH_RETRY_TIMEOUT=
SRC_PDB_NAME=
SRC_DB_LISTENER_PORT=
TGT_HTTP_PROXY_URL=
TGT_HTTP_PROXY_PORT=
TGT_CONFIG_LOCATION=
TGT_BASTION_HOST_IP=
TGT_BASTION_PORT=
TGT_BASTION_USER=
TGT_BASTION_IDENTITY_FILE=
TGT_HOST_IP=
TGT_SSH_TUNNEL_PORT=
TGT_SSH_RETRY_TIMEOUT=
TGT_OSS_PROXY_HOST=
TGT_OSS_PROXY_PORT=
TGT_DATADG=
TGT_REDODG=
TGT_RECODG=
TGT_DATAACFS=
5-369
Chapter 5
Overview of Exadata Cloud@Customer Gen1 to Out-of-Place Cloud Upgrade to Oracle Exadata Database Service on Cloud@Customer
Gen2 Infrastructure
TGT_REDOACFS=
TGT_RECOACFS=
BACKUP_PATH=
HOST=
OPC_CONTAINER=
SRC_ZDLRA_WALLET_LOC=
TGT_ZDLRA_WALLET_LOC=
ZDLRA_CRED_ALIAS=
NONCDBTOPDB_CONVERSION=FALSE
NONCDBTOPDB_SWITCHOVER=TRUE
SKIP_FALLBACK=TRUE
TGT_RETAIN_DB_UNIQUE_NAME=
TGT_SKIP_DATAPATCH=FALSE
MAX_DATAPATCH_DURATION_MINS=
DATAPATCH_WITH_ONE_INSTANCE_RUNNING=
SHUTDOWN_SRC=
SKIP_SRC_SERVICE_RETENTION=
SRC_RMAN_CHANNELS=6
TGT_RMAN_CHANNELS=16
ZDM_LOG_OSS_PAR_URL=
ZDM_BACKUP_FULL_SRC_MONITORING_INTERVAL=10
ZDM_BACKUP_INCREMENTAL_SRC_MONITORING_INTERVAL=10
ZDM_BACKUP_DIFFERENTIAL_SRC_MONITORING_INTERVAL=10
ZDM_CLONE_TGT_MONITORING_INTERVAL=10
ZDM_OSS_RESTORE_TGT_MONITORING_INTERVAL=10
ZDM_OSS_RECOVER_TGT_MONITORING_INTERVAL=10
ZDM_BACKUP_RETENTION_WINDOW=
ZDM_BACKUP_TAG=
ZDM_USE_EXISTING_BACKUP=
ZDM_OPC_RETRY_WAIT_TIME=
ZDM_OPC_RETRY_COUNT=
ZDM_SRC_TNS_ADMIN=
ZDM_CURL_LOCATION=
ZDM_USE_EXISTING_UNDO_SIZE=
ZDM_SKIP_DG_CONFIG_CLEANUP=
ZDM_RMAN_COMPRESSION_ALGORITHM=LOW
ZDM_SRC_DB_RESTORE_SERVICE_NAME=
ZDM_RMAN_DIRECT_METHOD=ACTIVE_DUPLICATE
5-370
Chapter 5
Overview of Exadata Cloud@Customer Gen1 to Out-of-Place Cloud Upgrade to Oracle Exadata Database Service on Cloud@Customer
Gen2 Infrastructure
TGT_DB_UNIQUE_NAME=z12tgt1s_uniq
MIGRATION_METHOD=ONLINE_PHYSICAL
DATA_TRANSFER_MEDIUM=DIRECT
PLATFORM_TYPE=EXACC
SRC_HTTP_PROXY_URL=
SRC_HTTP_PROXY_PORT=
SRC_CONFIG_LOCATION=
SRC_BASTION_HOST_IP=
SRC_BASTION_PORT=
SRC_BASTION_USER=
SRC_BASTION_IDENTITY_FILE=
SRC_HOST_IP=
SRC_TIMEZONE=
SRC_OSS_PROXY_HOST=
SRC_OSS_PROXY_PORT=
SRC_SSH_RETRY_TIMEOUT=
SRC_PDB_NAME=
SRC_DB_LISTENER_PORT=
TGT_HTTP_PROXY_URL=
TGT_HTTP_PROXY_PORT=
TGT_CONFIG_LOCATION=
TGT_BASTION_HOST_IP=
TGT_BASTION_PORT=
TGT_BASTION_USER=
TGT_BASTION_IDENTITY_FILE=
TGT_HOST_IP=
TGT_SSH_TUNNEL_PORT=
TGT_SSH_RETRY_TIMEOUT=
TGT_OSS_PROXY_HOST=
TGT_OSS_PROXY_PORT=
TGT_DATADG=
TGT_REDODG=
5-371
Chapter 5
Overview of Exadata Cloud@Customer Gen1 to Out-of-Place Cloud Upgrade to Oracle Exadata Database Service on Cloud@Customer
Gen2 Infrastructure
TGT_RECODG=
TGT_DATAACFS=
TGT_REDOACFS=
TGT_RECOACFS=
BACKUP_PATH=
HOST=
OPC_CONTAINER=
SRC_ZDLRA_WALLET_LOC=
TGT_ZDLRA_WALLET_LOC=
ZDLRA_CRED_ALIAS=
NONCDBTOPDB_CONVERSION=FALSE
NONCDBTOPDB_SWITCHOVER=TRUE
SKIP_FALLBACK=TRUE
TGT_RETAIN_DB_UNIQUE_NAME=
TGT_SKIP_DATAPATCH=FALSE
MAX_DATAPATCH_DURATION_MINS=
DATAPATCH_WITH_ONE_INSTANCE_RUNNING=
SHUTDOWN_SRC=
SKIP_SRC_SERVICE_RETENTION=
SRC_RMAN_CHANNELS=6
TGT_RMAN_CHANNELS=16
ZDM_LOG_OSS_PAR_URL=
ZDM_BACKUP_FULL_SRC_MONITORING_INTERVAL=10
ZDM_BACKUP_INCREMENTAL_SRC_MONITORING_INTERVAL=10
ZDM_BACKUP_DIFFERENTIAL_SRC_MONITORING_INTERVAL=10
ZDM_CLONE_TGT_MONITORING_INTERVAL=10
ZDM_OSS_RESTORE_TGT_MONITORING_INTERVAL=10
ZDM_OSS_RECOVER_TGT_MONITORING_INTERVAL=10
ZDM_BACKUP_RETENTION_WINDOW=
ZDM_BACKUP_TAG=
ZDM_USE_EXISTING_BACKUP=
ZDM_OPC_RETRY_WAIT_TIME=
ZDM_OPC_RETRY_COUNT=
ZDM_SRC_TNS_ADMIN=
ZDM_CURL_LOCATION=
ZDM_USE_EXISTING_UNDO_SIZE=
ZDM_SKIP_DG_CONFIG_CLEANUP=
ZDM_RMAN_COMPRESSION_ALGORITHM=LOW
ZDM_SRC_DB_RESTORE_SERVICE_NAME=
ZDM_RMAN_DIRECT_METHOD=
Related Topics
• Introduction to Zero Downtime Migration
• Preparing for Database Migration
• Migrating Your Database with Zero Downtime Migration
5-372
Chapter 5
Overview of Exadata Cloud@Customer Gen1 to Out-of-Place Cloud Upgrade to Oracle Exadata Database Service on Cloud@Customer
Gen2 Infrastructure
Backups: Backups are done from the Exadata Cloud@Customer Gen1 VM cluster and they
will continue to work during the upgrade. Post-migration to Oracle Exadata Database Service
on Cloud@Customer Gen2, backups to the Gen1 Oracle Cloud At Customer (OCC) Object
Storage Service (OSS) is not allowed and you must use supported backup methods for Oracle
Exadata Database Service on Cloud@Customer Gen2.
Note:
The software stack will be upgraded to the latest versions at that point in time when
you perform Out-of-Place Cloud Upgrade to New Gen2 Hardware.
Patching: The infrastructure patching process and notification are different in Gen2. For more
information, see Maintaining an Exadata Cloud@Customer System.
Note:
Post-migration to Exadata Cloud@Customer Gen2, Oracle recommends using
supported backup methods for Exadata Cloud@Customer Gen2. It's your
responsibility to manually manage any backups to the Gen1 Oracle Cloud At
Customer (OCC) Object Storage Service (OSS), and Oracle does not offer it through
the OCI Console, API, or CLI.
Related Topics
• Perform User Managed Maintenance Updates
• About Oracle Managed Oracle Exadata Database Service on Cloud@Customer
Infrastructure Maintenance Updates
Oracle performs patches and updates to all of the Oracle-managed system components on
Oracle Exadata Database Service on Cloud@Customer.
5-373
Chapter 5
Overview of Exadata Cloud@Customer Gen1 to Out-of-Place Cloud Upgrade to Oracle Exadata Database Service on Cloud@Customer
Gen2 Infrastructure
Note:
It is not recommended to use either Gen1 Oracle Cloud At Customer OSS or OCI
Object Storage for this migration.
5-374
6
Autonomous Database on Exadata
Cloud@Customer
6-1
Chapter 6
What’s New in Autonomous Database on Exadata Cloud@Customer
6-2
Chapter 6
What’s New in Autonomous Database on Exadata Cloud@Customer
6-3
Chapter 6
What’s New in Autonomous Database on Exadata Cloud@Customer
6-4
Chapter 6
What’s New in Autonomous Database on Exadata Cloud@Customer
• DBMS_CLOUD_ADMIN Package
6-5
Chapter 6
What’s New in Autonomous Database on Exadata Cloud@Customer
To get a list of AI profiles and their attributes created in your Autonomous Database or schema,
you can use the DBMS_CLOUD_AI views.
6-6
Chapter 6
What’s New in Autonomous Database on Exadata Cloud@Customer
Related Topics
• Create an Autonomous Data Guard Enabled Autonomous Container Database
Follow these steps to create an Autonomous Data Guard Enabled Autonomous Container
Database on an Oracle Exadata Cloud@Customer system.
• Edit Autonomous Container Database Backup Settings
If automatic backups were disabled while provisioning an Autonomous Container Database
(ACD), you can enable them later from the Oracle Cloud Infrastructure (OCI) console.
6-7
Chapter 6
What’s New in Autonomous Database on Exadata Cloud@Customer
• Services: Database
• Release Date: October 24, 2023
You now have the option to choose between rolling or non-rolling maintenance methods to
apply quarterly automatic maintenance patches. You can configure the maintenance method
while provisioning an Autonomous Container Database (ACD) or for an existing ACD. The non-
rolling maintenance method involves a full system downtime.
Related Topics
• Create an Autonomous Container Database
• View Details of an Autonomous Container Database
• Update Autonomous Container Database Maintenance Preferences
• Schedule a Quarterly Maintenance Update
6-8
Chapter 6
What’s New in Autonomous Database on Exadata Cloud@Customer
With this enhancement, you will be able to choose between ECPU or OCPU compute models
while configuring your Autonomous Database resources.
During AVM creation, you will have the option to allocate CPUs to the AVM using either ECPU
or OCPU. On ADB-C@C, where Multi VM is supported, you will also be able to size the AVM
by assigning the number of ECPUs per Node and Memory per ECPU in the sizing widget.
ACDs and ADBs will inherit the CPU type from their parent AVM. For example, if the AVM is
configured using OCPU, the usage of the ACD and ADB resources in that AVM will be tracked
using OCPU, such as Total/Available/Reclaimable/Provisionable OCPUs, and so on. There is
no mixing of ADB CPU types inside an AVM.
• ECPU: An ECPU is an abstracted measure of compute resources. ECPU is based on the
number of cores elastically allocated from a pool of compute and storage servers.
While provisioning a new database, cloning an existing database, and scaling up or down
the CPU resources of an existing database:
– The CPU count defaults to 2 ECPUs.
– For databases that need 2 or more ECPUs, you must specify the number of assigned
ECPUs in increment of 1.
– CPU over-provisioning is not supported on ECPUs. This applies to all ADB-C@C
workloads.
• OCPU: An OCPU is a physical measure of compute resources. OCPUs are based on the
physical core of a processor with hyper-threading enabled.
While provisioning a new database, cloning an existing database, and scaling up or down
the CPU resources of an existing database:
– The CPU count defaults to 1 OCPU.
– For databases that do not need an entire OCPU, you can assign OCPU count from 0.1
to 0.9 in increments of 0.1 OCPU. This allows you to over-provision CPU at the system
level and run more databases on each infrastructure instance.
– For databases that need more than 1 OCPU, you must specify the number of assigned
cores as an integer. For example, you cannot assign 3.5 OCPUs to a database. The
next available number of OCPUs above 3 is 4.
Related Topics
• Create an Autonomous Exadata VM Cluster
• Create an Autonomous Data Guard Enabled Autonomous Container Database
Follow these steps to create an Autonomous Data Guard Enabled Autonomous Container
Database on an Oracle Exadata Cloud@Customer system.
• Create an Autonomous Data Guard Enabled Autonomous Database
• Enable or Disable Auto Scaling for an Autonomous Database
• Create an Autonomous Database
• Clone an Autonomous Database
• Clone an Autonomous Database Backup
• Clone a Standby Database
• Clone a Standby Database Backup
6-9
Chapter 6
What’s New in Autonomous Database on Exadata Cloud@Customer
• Services: Database
• Release Date: September 13, 2023
Autonomous Database on Exadata Cloud@Customer has been extended to support X10M
system.
Related Topics
• Available Exadata Infrastructure Hardware Shapes
6-10
Chapter 6
What’s New in Autonomous Database on Exadata Cloud@Customer
Related Topics
• In-Memory Column Store Architecture
• In-Memory Initialization Parameters
• Initialization Parameters
• CreateAutonomousDatabase
• UpdateAutonomousDatabase
• GetAutonomousDatabase
• ListAutonomousDatabases
• Create an Autonomous Database
• Scale the CPU Core Count or Storage of an Autonomous Database, or Enable/Disable or
Alter the Percentage of System Global Area (SGA) for IM Column Store
• View Details of an Autonomous Database
• Create an Autonomous Data Guard Enabled Autonomous Container Database
Follow these steps to create an Autonomous Data Guard Enabled Autonomous Container
Database on an Oracle Exadata Cloud@Customer system.
• Clone an Autonomous Database
• Clone an Autonomous Database Backup
6-11
Chapter 6
What’s New in Autonomous Database on Exadata Cloud@Customer
6-12
Chapter 6
What’s New in Autonomous Database on Exadata Cloud@Customer
Choose a method to seed and rotate both database and ORDS SSL certificates with the
following seeding and rotation options.
• Stick to the default service-provided self-signed certificates (default option).
• Integrate with OCI Certificate service to pick up CA, CA Bundle, and Certificate.
Related Topics
• Create an Autonomous Exadata VM Cluster
• Rotate Oracle Database TLS Certificate and Oracle REST Data Services (ORDS) TLS
Certificate
Long-Term Backup
• Services: Database
• Release Date: March 07, 2023
With this enhancement, you can take an on-demand backup that lives outside of the defined
ACD retention period. In a range of 90 days to 10 years, you can specify any number of days,
months, or years.
• In Data Guard environments, long-term backups will happen on the primary or standby
database wherever the action was initiated. So, you must make two separate requests to
back up the primary and standby databases, if desired.
• A long-term backup will be available as long as the ADB is available either in a running or
stopped state (not terminated).
• You can use a long-term backup only to create a new database. You cannot use it for an
in-place/PITR restore.
• Long-term backups include all the necessary data files, archive logs, control file, and
server parameter file (SPFILE) to restore the database on the same or different ADB-D
infrastructure.
• You can delete a long-term backup whenever you want.
• Creating an ADB from a long-term backup will always be upgraded to the currently
supported version (target ACD version).
For example, a 5-year-old backup may not have 19c available and Oracle will upgrade the
database to 23c. However, the ADB thus created will not guarantee that an application will
work just because the data is available.
Related Topics
• Create a Long-Term Backup
6-13
Chapter 6
What’s New in Autonomous Database on Exadata Cloud@Customer
Save as Stack
• Services: Database
• Release Date: February 15, 2023
Stack is a collection of Oracle Cloud Infrastructure resources corresponding to a given
Terraform configuration. Each stack resides in the compartment you specify, in a single region;
however, resources on a given stack can be deployed across multiple regions. For more
information, see stack.
With this enhancement, while provisioning an Exadata Infrastructure, VM Cluster, Autonomous
VM Cluster, Autonomous Container Database, and Autonomous Database, you can save
resource configuration as a stack. Use the stack to install, configure, and manage the resource
through the Resource Manager service. For requirements and recommendations for Terraform
configurations used with Resource Manager, see Terraform Configurations for Resource
Manager. To provision, the resources defined in your stack, follow the steps outlined in
Creating an Apply Job.
Related Topics
• stack
• Creating an Apply Job
• Terraform Configurations for Resource Manager
• Using the Console to Create Oracle Exadata Database Service on Cloud@Customer
Infrastructure
To create your Oracle Exadata Database Service on Cloud@Customer infrastructure, be
prepared to provide values for the fields required for configuring the infrastructure.
• Using the Console to Create an ASM VM Cluster
To create your ASM VM cluster, be prepared to provide values for the fields required for
configuring the infrastructure.
• Create an Autonomous Exadata VM Cluster
• Create an Autonomous Container Database
• Create an Autonomous Database
6-14
Chapter 6
What’s New in Autonomous Database on Exadata Cloud@Customer
• Create a smaller Autonomous Exadata VM Cluster to host databases that have low
resource and scalability requirements or to host a smaller number of databases that
require isolation from the rest of the workload.
Consider reviewing the points below that will assist you in subsetting Autonomous Exadata VM
Cluster nodes.
• Autonomous Exadata VM Cluster node subsetting capability is available for new
Autonomous Exadata VM Clusters in Gen2 Exadata Cloud@Customer service.
• All VMs across an Autonomous Exadata VM Cluster will have the same resource allocation
per VM irrespective of whether the VM was created during cluster provisioning or added
later by extending an existing Autonomous Exadata VM Cluster.
• Any Autonomous Exadata VM Cluster should have a minimum of 2 VMs even with the
node subsetting capability. We currently do not support clusters with a single VM.
• Each Autonomous Exadata VM Cluster network is pre-provisioned with IP addresses for
every DB Server in the infrastructure. One cluster network can only be used by a single
Autonomous Exadata VM Cluster and is validated to ensure the IP addresses do not
overlap with other cluster networks.
Maximum number of clusters across the infrastructure depends on the resources available per
DB Server and is subject to the per DB Server maximum VM limit.
Related Topics
• Create an Autonomous Exadata VM Cluster
• View a List of DB Servers on an Exadata Infrastructure
6-15
Chapter 6
What’s New in Autonomous Database on Exadata Cloud@Customer
Related Topics
• Create an Autonomous Data Guard Enabled Autonomous Container Database
Follow these steps to create an Autonomous Data Guard Enabled Autonomous Container
Database on an Oracle Exadata Cloud@Customer system.
• Configure Automatic Maintenance Schedule for a Data Guard Enabled Autonomous
Container Database
6-16
Chapter 6
What’s New in Autonomous Database on Exadata Cloud@Customer
• Services: Database
• Release Date: November 15, 2022
This feature enables you to:
• Choose a Single Client Access Name (SCAN) listener port for Transport Layer Security
(TLS) and non-TLS from a range of available ports. For TLS, the default is 2484; for non-
TLS, it is 1521.
• Choose between one-way TLS and mutual TLS (mTLS) for database client connections.
ORDS is always one-way TLS as it currently is.
Related Topics
• Create an Autonomous Exadata VM Cluster
6-17
Chapter 6
What’s New in Autonomous Database on Exadata Cloud@Customer
Autonomous VM Clusters
As a Fleet Administrator, you will be able to identify:
• Total OCPUs: The number of CPU cores allocated to the VM Cluster.
• Exadata Storage (TB): The storage allocated to the VM Cluster in TBs.
• Total Autonomous Database Storage (TB): Total Autonomous Database Storage
storage allocated to the Autonomous VM Cluster.
6-18
Chapter 6
What’s New in Autonomous Database on Exadata Cloud@Customer
Note:
You cannot create an ACD if 2 OCPUs are not available in the VM Cluster or Exadata
Infrastructure.
Autonomous Database
As a Database Administrator, you will be able to identify the OCPU count that you can use to
provision or scale an ADB.
• OCPU: The number of OCPU cores to be made available to the database.
• Storage: The quantity of storage available to store data in the database, in terabytes.
• While provisioning an ADB, if you specify an OCPU count that the service cannot provision
in the existing ACD, then the service displays an error message and suggests 2 values in
close proximity to the value that you have specified.
For example, assume that you are creating an ADB with 15 OCPUs on a Quarter Rack
Exadata Infrastructure that has 20 OCPUs available. However, there are only 10 OCPUs
available on each node. In this case, the service will not be able to provision the ADB
because 15 OCPUs is less than the split threshold of 16 OCPUs. Therefore, the nearest
possible values are 17 and 18.
6-19
Chapter 6
What’s New in Autonomous Database on Exadata Cloud@Customer
• While scaling an ADB, if you specify an OCPU count that the service cannot use to scale
the ADB, then the service displays an error message and suggests 2 values in close
proximity to the value that you have specified.
Table 6-1 REST API Endpoints to Track and Manage Resource Usage
Related Topics
• View a List of Autonomous Exadata VM Clusters
• View Details of an Autonomous Exadata VM Cluster
• Restart an Autonomous Container Database
• Create an Autonomous Data Guard Enabled Autonomous Container Database
Follow these steps to create an Autonomous Data Guard Enabled Autonomous Container
Database on an Oracle Exadata Cloud@Customer system.
• Create an Autonomous Data Guard Enabled Autonomous Database
• Scale the CPU Core Count or Storage of an Autonomous Database, or Enable/Disable or
Alter the Percentage of System Global Area (SGA) for IM Column Store
• Clone an Autonomous Database
• Clone an Autonomous Database Backup
• GetAutonomousContainerDatabase
• GetAutonomousDatabase
6-20
Chapter 6
What’s New in Autonomous Database on Exadata Cloud@Customer
6-21
Chapter 6
What’s New in Autonomous Database on Exadata Cloud@Customer
6-22
Chapter 6
What’s New in Autonomous Database on Exadata Cloud@Customer
Create Autonomous Databases with less than 1 OCPU count using fractional units from 0.1 to
0.9 OCPU and GB sizing between 32 GB and the maximum usable storage for your Exadata
shape.
Related Topics
• Create an Autonomous Database
• Scale the CPU Core Count or Storage of an Autonomous Database, or Enable/Disable or
Alter the Percentage of System Global Area (SGA) for IM Column Store
• Clone an Autonomous Database
Infrastructure Patching
• Services: Database
• Release Date: May 04, 2021
ADB-Dedicated maintenance involves patching Exadata Infrastructure(EI) Autonomous VM
Cluster, and Autonomous Container Database (ACD).
Related Topics
• Patching Autonomous Database on Exadata Cloud@Customer Infrastructure
6-23
Chapter 6
What’s New in Autonomous Database on Exadata Cloud@Customer
• Services: Database
• Release Date: January 26, 2021
An access control list (ACL) provides additional protection to your database by allowing only
the clients with specific IP addresses to connect to the database. You can add IP addresses
individually, or in CIDR blocks.
Related Topics
• Create an Autonomous Data Guard Enabled Autonomous Database
• Manage Access Control List of an Autonomous Database
6-24
Chapter 6
Introduction to Autonomous Database on Exadata Cloud@Customer
6-25
Chapter 6
Introduction to Autonomous Database on Exadata Cloud@Customer
Resource Types
Each level of the architecture model corresponds to one of the following resources types:
• Oracle Exadata Cloud@Customer infrastructure: Hardware rack that includes compute
nodes and storage servers, tied together by a high-speed, low-latency InfiniBand network
and intelligent Exadata software.
Oracle Exadata Cloud@Customer infrastructure is common for both Autonomous and
Non-Autonomous resources.
For a list of the hardware and Oracle Cloud resource characteristics of Oracle Exadata
Cloud@Customer infrastructure resources that support Autonomous Databases, see
Available Exadata Infrastructure Hardware Shapes.
– Only the Oracle Exadata Cloud@Customer infrastructures deployed before Oracle
announced support for Autonomous Databases on Oracle Exadata Cloud@Customer
do not support Autonomous resources listed below. Please contact your Oracle sales
representative to understand the infrastructure upgrades required for supporting
Oracle Autonomous Databases.
– You can create only one Autonomous VM cluster in an Exadata Infrastructure.
• Autonomous VM clusters on Oracle Exadata Cloud@Customer infrastructure: VM cluster
is a set of symmetrical VMs across all Compute nodes. Autonomous Container and
Database run all the VMs across all nodes enabling high availability. It consumes all the
resources of the underlying Exadata Infrastructure.
Before you can create any Autonomous Databases on your Oracle Exadata
Cloud@Customer infrastructure, you must create an Autonomous VM cluster network, and
you must associate it with a VM cluster.
• Autonomous Container Database: Provides a container for multiple Autonomous
Databases.
• Autonomous Database: You can create multiple autonomous databases within the same
autonomous container database. You can configure Oracle Autonomous Database for
either transaction processing or data warehouse workloads.
6-26
Chapter 6
Introduction to Autonomous Database on Exadata Cloud@Customer
Related Topics
• Available Exadata Infrastructure Hardware Shapes
Deployment Order
You must create the dedicated Exadata infrastructure resources in the following order:
1. Exadata Infrastructure. For more information, see Preparing for Exadata
Cloud@Customer and Provisioning Exadata Cloud@Customer System.
2. Autonomous Exadata VM cluster. For more information, see Managing Autonomous
Exadata VM Clusters.
3. Autonomous Container Database. For more information, see Managing Autonomous
Container Databases.
4. Autonomous Database. For more information, see Managing Autonomous Databases.
Related Topics
• Preparing for Oracle Exadata Database Service on Cloud@Customer
Review OCI as well as the site, network and storage requirements to prepare and deploy
Oracle Exadata Database Service on Cloud@Customer in your data center.
• Using the Console to Provision Oracle Exadata Database Service on Cloud@Customer
Learn how to provision an Oracle Exadata Database Service on Cloud@Customer system.
• Managing Autonomous Exadata VM Clusters
An Autonomous Exadata VM Cluster is a set of symmetrical VMs across all Compute
nodes.
• Managing Autonomous Container Databases
Learn how you can create, view, move, change backup policies, manage maintenance
schedules, and perform other Oracle Autonomous Container Database management.
• Managing Autonomous Databases
An Autonomous Database resource is a user database. When you create an Autonomous
Database, you choose the Autonomous Container Database for it and you specify "Data
Warehouse" or "Transaction Processing" as its workload type to create an Autonomous
Data Warehouse database or an Autonomous Transaction Processing database.
User Roles
Your organization may choose to split the administration of the Autonomous Database on
Exadata Cloud@Customer into the following roles:
• Fleet Administrator: Fleet administrators create, monitor and manage Autonomous
Exadata Infrastructure and Autonomous Container Database resources. They must also
setup customer managed Backup Destinations, such as Recovery Appliance and NFS to
be used by Autonomous Databases. A fleet administrator must have permissions for using
the networking resources required by the Oracle Exadata Database Service on
Cloud@Customer infrastructure, and permissions to manage the infrastructure and
container database resources.
• Database Administrator: Database administrators create, monitor and manage
Autonomous Databases. They also create and manage users within the database.
Database administrators must have permissions for using container databases, for
managing autonomous databases and backups, and for using the related networking
resources. At the time of provisioning an Autonomous Database, the administrator
6-27
Chapter 6
Introduction to Autonomous Database on Exadata Cloud@Customer
provides user credentials for the automatically created ADMIN account, which provides
administrative rights to the new database.
• Database User: Database users are the developers who write applications that connect to
and use an Autonomous Database to store and access the data. Database users do not
need Oracle Cloud Infrastructure accounts. They gain network connectivity to and
connection authorization information for the database from the database administrator.
Note:
It is possible to provision more Autonomous Databases than those mentioned in the
above recommended limits table, especially with CPU overprovisioning. However,
this implies compromising the Service Level Objectives (SLOs) to return an
application online following an unplanned outage or a planned maintenance activity.
To know the SLO details for Autonomous Database on Dedicated Exadata
Infrastructure deployments, see Availability Service Level Objectives (SLOs).
6-28
Chapter 6
Introduction to Autonomous Database on Exadata Cloud@Customer
6-29
Chapter 6
Introduction to Autonomous Database on Exadata Cloud@Customer
6-30
Chapter 6
Introduction to Autonomous Database on Exadata Cloud@Customer
6-31
Chapter 6
Introduction to Autonomous Database on Exadata Cloud@Customer
For more information, see Oracle Exadata Database Service on Exadata Cloud@Customer
X9M datasheet.
6-32
Chapter 6
Introduction to Autonomous Database on Exadata Cloud@Customer
6-33
Chapter 6
Introduction to Autonomous Database on Exadata Cloud@Customer
6-34
Chapter 6
Introduction to Autonomous Database on Exadata Cloud@Customer
6-35
Chapter 6
Managing Autonomous Exadata VM Clusters
Related Topics
• Availability Service Level Objectives (SLOs)
• Oracle Exadata Database Service on Exadata Cloud@Customer X9M
6-36
Chapter 6
Managing Autonomous Exadata VM Clusters
Resource Terminology
It is important to understand the various terms used with resource allocation and usage. So,
let's look at the important terms you see on the Oracle Cloud Infrastructure (OCI) console and
understand what they mean:
• Available CPUs: CPUs available for allocation to provision new Autonomous Databases
or scale existing Autonomous Databases.
• Provisioned CPUs: Total CPUs allocated for all the Autonomous Database within the
Autonomous VM Cluster.
• Reserved CPUs: Total CPUs reserved to support auto-scaling of Autonomous Databases,
Autonomous Database failover on node failure, and lifecycle management of empty
Autonomous Container Databases.
• Reclaimable CPUs: Total CPUs from all terminated and scaled-down Autonomous
Databases in all the Autonomous Container Databases within the Autonomous VM
Cluster.Reclaimable CPUs are not returned to the Available state until Autonomous
Container Database is restarted.
• Provisionable ACDs: Number of Autonomous Container Databases that can be created
in the Autonomous VM Cluster.
6-37
Chapter 6
Managing Autonomous Exadata VM Clusters
• Provisioned ACDs: Number of Autonomous Container Databases that have been created
in the Autonomous VM Cluster.
• Non-provisionable ACDs: Number of Autonomous Container Databases that cannot be
created because of a shortage of available CPUs in the Autonomous VM Cluster.
• Total Storage (in TBs): Total storage allocated to the AVMC.
• Available Storage (in TBs): Storage available for Autonomous Databases’ use in this
AVMC.
• Used Storage (in TBs): Storage currently used by Autonomous Database(s) in this
AVMC.
• Memory per CPU (in GBs): Memory allocated to the AVMC per CPU.
Note:
You can create 23ai databases only on AVMCs provisioned on or after May 28, 2024,
with the appropriate tags. See 23ai Database Software Version Tag Requirements for
details.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click Autonomous Exadata VM Clusters.
3. Click Create Autonomous Exadata VM Cluster.
4. In the Create Autonomous Exadata VM Cluster dialog, enter the following general
information:
• Compartment: Specify the compartment in which the Autonomous Exadata VM
Cluster will be created.
• Display Name: A user-friendly description or other information that helps you easily
identify the infrastructure resource. The display name does not have to be unique.
Avoid entering confidential information.
• Exadata Infrastructure: Select an Exadata Infrastructure.
• VM Cluster Network: Select a VM Cluster Network.
• Configure Autonomous VM Cluster Resources
All DB Servers that have the minimum resources to create an Autonomous VM Cluster
are selected by default.
a. Click Edit DB Server selection for VM placement to allocate VM resources.
b. In the resulting Add Virtual Machines dialog, select a minimum of two database
servers for VM placement. Maximum resources available for allocation per VM are
based on the number of database servers selected.
6-38
Chapter 6
Managing Autonomous Exadata VM Clusters
Note:
If the DB server is not added to the VM Cluster Network resources, then
that DB server cannot be selected.
Note:
The minimum and maximum values for these parameters change in relation
to each other, for example, the OCPU count allocation will impact the number
of ACDs you can create.
Compute Model: Choose a compute model for your Autonomous Exadata VM Cluster
resource.
The default model is ECPU. ECPU is based on the number of cores elastically
allocated from a pool of compute and storage servers.
Click Change compute model if you wish to select OCPU. OCPU compute model is
based on the physical core of a processor with hyper-threading enabled.
Note:
The compute model chosen here will apply to all the Autonomous Container
Databases and Autonomous Database instances created in this Autonomous
Exadata VM Cluster resource.
6-39
Chapter 6
Managing Autonomous Exadata VM Clusters
• Specify a schedule: Choose your preferred month, week, weekday, start time,
and lead time for infrastructure maintenance.
– Under Maintenance months, specify at least one month for each quarter
during which Exadata infrastructure maintenance will take place. You can
select more than one month per quarter. If you specify a long lead time for
advanced notification (for example, 4 weeks), you may wish to specify 2 or 3
months per quarter during which maintenance runs can occur. This will ensure
that your maintenance updates are applied in a timely manner after accounting
for your required lead time. Lead time is discussed in the following steps.
– Optional. Under Week of the month, specify which week of the month
maintenance will take place. Weeks start on the 1st, 8th, 15th, and 22nd days
of the month, and have a duration of 7 days. Weeks start and end based on
calendar dates, not days of the week. Maintenance cannot be scheduled for
the fifth week of months that contain more than 28 days. If you do not specify a
week of the month, Oracle will run the maintenance update in a week to
minimize disruption.
– Optional. Under Day of the week, specify the day of the week on which the
maintenance will occur. If you do not specify a day of the week, Oracle will run
the maintenance update on a weekend day to minimize disruption.
– Optional. Under Start hour, specify the hour during which the maintenance
run will begin. If you do not specify a start hour, Oracle will pick the least
disruptive time to run the maintenance update.
– Under Lead Time, specify the minimum number of weeks ahead of the
maintenance event you would like to receive a notification message. Your lead
time ensures that a newly released maintenance update is scheduled to
account for your required minimum period of advanced notification.
b. Click Save Changes.
6. Choose the license type you wish to use.
Your choice affects metering for billing. You have the following options:
• Bring your own license: If you choose this option, make sure you have proper
entitlements to use for new service instances that you create.
• License included: With this choice, the cost of the cloud service includes a license for
the Database service.
7. The following Advanced Options are available:
• Time zone: The default time zone for the Exadata Infrastructure is UTC, but you can
specify a different time zone. The time zone options are those supported in both the
Java.util.TimeZone class and the Oracle Linux operating system.
Note:
If you want to set a time zone other than UTC or the browser-detected time
zone, then select the Select another time zone option, select a Region or
country, and then select the corresponding Time zone.
If you do not see the region or country you want, then select Miscellaneous,
and then select an appropriate Time zone.
6-40
Chapter 6
Managing Autonomous Exadata VM Clusters
• Listener: VM Cluster Networks are created with the default ports (non-TLS: 1521 and
TLS: 2484). You can select a non-default SCAN listener port for both TLS and non-
TLS connections within the permissible range of ports.
Note:
– Non-TLS port:
* Default: 1521
* Permissible range:1024 - 8999
* Exceptions:
* Agent port: 7070
* Admin port: 7879
* Connect to agent port: 7060
* Oracle notification service: 6100, 6200
– TLS port:
* Default: 2484
* Permissible range:1024 - 8999
* Exceptions:
* Agent port: 7070
* Admin port: 7879
* Connect to agent port: 7060
* Oracle notification service: 6100, 6200
– Enable mutual TLS (mTLS) authentication: Select or deselect this check box to
choose between one-way TLS and mutual TLS for database SSL certificates.
• Tags: Optionally, you can apply tags. If you have permission to create a resource, you
also have permission to apply free-form tags to that resource. To apply a defined tag,
you must have permission to use the tag namespace. For more information about
tagging, see Resource Tags. If you are not sure if you should apply tags, skip this
option (you can apply tags later) or ask your administrator. Avoid entering confidential
information.
8. Optionally, you can save the resource configuration as a stack.
• To save the resource configuration as a Stack:
a. Click Save as Stack.
b. In the resulting Save as Stack dialog, provide the following details:
i. Name: (Optional) Provide an easy-to-remember descriptive name.
ii. Description: (Optional) Enter a short description.
6-41
Chapter 6
Managing Autonomous Exadata VM Clusters
c. Click Save.
After saving the Stack, the system displays a banner with a link to the saved
Stack.
d. Click the link to open the Stack in the Resource Manager Service console.
See, Resource Manager and Terraform.
• To view the details of a Stack:
a. Open the navigation menu. Under Developer Services, click Resource Manager.
b. Click Stacks.
c. Click the name of the Stack that you want to view details.
Or, click the Actions menu (three dots), and select the View stack details option.
9. Click Create Autonomous Exadata VM Cluster.
The state of the Autonomous VM Cluster changes to Provisioning. Likewise, the newly added
Autonomous Virtual Machines will be in the Provisioning state. Upon successful completion of
the operation, the state of the Autonomous Virtual Machine Cluster and the Autonomous
Virtual Machines will change to Available.
Related Topics
• Resource Tags
• Resource Manager and Terraform
6-42
Chapter 6
Managing Autonomous Exadata VM Clusters
6-43
Chapter 6
Managing Autonomous Exadata VM Clusters
6-44
Chapter 6
Managing Autonomous Exadata VM Clusters
and reserved bars will open a new panel with the breakdown of those CPU
components by ACDs.
* Autonomous Container Database (ACD) usage: Depicts the Total
number of ACDs that can be created in this AVMC along with a break-up
of Provisionable ACDs, Provisioned ACDs, and Non-provisionable ACDs.
See Resource Terminology to understand what each of these means. This
is a doughnut chart with the total number of ACDs shown in the center of
the chart.
* Autonomous Database (ADB) storage (in TBs) usage: This is a
doughnut chart depicting the available, used, and total Autonomous
Database storage in TBs. The total storage value is shown in the center of
the chart with available and used storage values shown on the chart in
different colors.
– Table View: To see the resource usage details of an AVMC in the table view,
select Table View from the drop-down list at the top-right corner of the
Resource usage visualizations section. The table view shows the exact same
details as the chart view, in the form of tables. The four tables you can see are:
* CPU usage: Lists the number of total, available, provisioned, reserved,
and reclaimable CPUs in this AVMC.
* CPU usage at VM level: Lists the number of available, provisioned,
reserved, and reclaimable CPUs for each VM in this VM cluster.
* Autonomous Container Database (ACD) usage: Lists the number of
provisionable, provisioned, and non-provisionable ACDs in this AVMC.
* Autonomous Database (ADB) storage (in TBs) usage: Shows the
available and used Autonomous Database storage in TBs.
Autonomous Container Database: This tab lists the following details for all the
ACDs, in the selected AVMC, created in any compartment in the tenancy:
• ACD's display name
• CPU value of the largest provisionable Autonomous Database.
• The number of CPUs provisioned to Autonomous Databases.
• The number of reserved CPUs.
• The number of reclaimable CPUs.
6-45
Chapter 6
Managing Autonomous Exadata VM Clusters
Note:
Modifying CPU count per VM or the maximum number of Autonomous Container
Databases of an AVMC triggers a rolling restart of the AVMC. This results in
restarting all the ACDs and Autonomous Databases created in that AVMC.
Note:
In case of an ongoing maintenance activity on this AVMC or the ACDs and
Autonomous Databases within it, your scale request fails with an appropriate
message.
6-46
Chapter 6
Managing Autonomous Exadata VM Clusters
6. Under Maintenance months, specify at least one month for each quarter during which
Autonomous Exadata VM Cluster maintenance will take place.
You can select more than one month per quarter. If you specify a long lead time for
advanced notification (for example, 4 weeks), you may wish to specify 2 or 3 months per
quarter during which maintenance runs can occur. This will ensure that your maintenance
updates are applied in a timely manner after accounting for your required lead time. Lead
time is discussed in the following steps.
7. Optional. Under Week of the month, specify which week of the month maintenance will
take place.
Weeks start on the 1st, 8th, 15th, and 22nd days of the month, and have a duration of 7
days. Weeks start and end based on calendar dates, not days of the week. Maintenance
cannot be scheduled for the fifth week of months that contain more than 28 days. If you do
not specify a week of the month, Oracle will run the maintenance update in a week to
minimize disruption.
8. Optional. Under Day of the week, specify the day of the week on which the maintenance
will occur.
If you do not specify a day of the week, Oracle will run the maintenance update on a
weekend day to minimize disruption.
9. Optional. Under Start hour, specify the hour during which the maintenance run will begin.
If you do not specify a start hour, Oracle will pick the least disruptive time to run the
maintenance update.
10. Under Lead Time, specify the minimum number of weeks ahead of the maintenance event
you would like to receive a notification message.
Your lead time ensures that a newly released maintenance update is scheduled to account
for your required minimum period of advanced notification.
11. Click Save Changes.
View or Edit the Time of the Next Scheduled Maintenance for Autonomous Exadata
VM Cluster
Learn how to view and edit the time of the next scheduled maintenance.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click Autonomous Exadata VM Clusters.
3. In the list of Autonomous Exadata VM Clusters, find the Autonomous Exadata VM Cluster
you want to set the maintenance window for and click its highlighted name.
4. On the Autonomous Exadata VM Cluster details page, under Maintenance, click the
view link in the Next Maintenance field.
5. On the Maintenance page, scheduled maintenance events are listed.
6. Optional. To change the time of the next scheduled maintenance, click the Edit link in the
Scheduled Start Time field.
7. In the Edit Infrastructure Maintenance Scheduled Start Time page, enter a date and
time in the Scheduled Start time field.
The following restrictions apply:
• You can reschedule the infrastructure maintenance to a date no more than 180 days
from the prior infrastructure maintenance. If a new maintenance release is announced
6-47
Chapter 6
Managing Autonomous Exadata VM Clusters
prior to your rescheduled maintenance run, the newer release will be applied on your
specified date. You can reschedule your maintenance to take place earlier than it is
currently scheduled. You cannot reschedule the maintenance if the current time is
within 2 hours of the scheduled maintenance start time.
• Oracle reserves certain dates each quarter for internal maintenance operations, and
you cannot schedule your maintenance on these dates.
6-48
Chapter 6
Managing Autonomous Exadata VM Clusters
3. In the list of Autonomous Exadata VM Clusters, click the display name of the Exadata VM
cluster you wish to administer.
4. Click Move Resource.
5. Select the new compartment.
6. Click Move Resource.
Rotate Oracle Database TLS Certificate and Oracle REST Data Services
(ORDS) TLS Certificate
To rotate the database TLS certificate or ORDS TLS certificate, use this procedure.
6-49
Chapter 6
Managing Autonomous Exadata VM Clusters
Note:
Rotating the Database TLS certificate or ORDS TLS certificate is a disruptive
operation. When a database TLS certificate is rotated, the listener is restarted,
disrupting database availability. During ORDS TLS certificate rotation, ORDS
restarts, disrupting application connectivity. It is recommended that you rotate your
certificates at an appropriate time.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click Autonomous Exadata VM Clusters.
3. In the list of Autonomous Exadata VM Clusters, click the display name of the Exadata VM
cluster for which you want to rotate certificates.
The Network section provides an overview of the SCAN listener ports (TLS, non-TLS),
authentication mode (One way TLS, Mutual TLS), and the expiry dates for the Database
and ORDS TLS certificates.
Note:
Note:
6-50
Chapter 6
Managing Encryption Keys on External Devices
• System generated: Select this option if you want to use Oracle provided
certificate.
• Bring your own certificate: Select this option to choose your own certificate.
– Certificate source: Defaults to VM Cluster managed certificate. You cannot
edit this field.
– Certificate: Select a certificate from a compartment of your choice.
– Specify CA certificate: Select this check box to provide CA details.
* Certificate Authority: Select a CA from the compartment of your choice.
* CA Bundle: Select a CA bundle from the compartment of your choice.
b. Click Save changes.
Confirm Database TLS certificate update dialog is displayed.
c. Review the information on the banner.
d. Click Update DB TLS certificate.
The status of Autonomous Exadata VM Cluster changes to Updating and the status
changes to Available after updating the changes successfully.
ORDS TLS Certificate: Select this option to rotate the TLS certificate for APEX
application.
A warning banner is displayed six weeks prior to the certificate expires.
a. Select a certificate generation type.
• System generated: Select this option if you want to use Oracle provided
certificate.
• Bring your own certificate: Select this option to choose your own certificate.
– Certificate source: You cannot edit this field.
– Certificate: Select a certificate from a compartment of your choice.
– Specify CA certificate: Select this check box to provide CA details.
* Certificate Authority: Select a CA from the compartment of your choice.
* CA Bundle: Select a CA bundle from the compartment of your choice.
b. Click Save changes.
Confirm ORDS TLS certificate update dialog is displayed.
c. Review the information on the banner.
d. Click Update ORDS TLS certificate.
The status of Autonomous Exadata VM Cluster changes to Updating and the status
changes to Available after updating the changes successfully.
Related Topics
• Resource Tags
• Resource Manager and Terraform
6-51
Chapter 6
Managing Encryption Keys on External Devices
Note:
The Oracle Key Vault is a customer-provisioned and managed system and it is not
part of Oracle Cloud Infrastructure managed services.
Related Topics
• Oracle Key Vault
6-52
Chapter 6
Managing Encryption Keys on External Devices
OKV also provides a REST interface for clients to auto-enroll endpoints and setup wallets and
keys. For Autonomous Databases on Exadata Cloud@Customer to connect to OKV REST
interface, create a key store in your tenancy to store the IP address and administrator
credentials of your OKV. Exadata Cloud@Customer temporarily stores the OKV REST user
administrator password required to connect to the OKV appliance in a password-protected
wallet file so that the software running in the customer VM can connect to the OKV server.
Following the migration of the TDE keys to OKV, the cloud automation software will remove the
password from the wallet file. Ensure that you create a secret with Oracle's Vault Service,
which will store the password required for autonomous databases to connect to OKV for key
management.
For more information, see "Oracle Key Vault".
Related Topics
• Oracle Key Vault
Tagging Resources
You can apply tags to your resources to help you organize them according to your business
needs.
6-53
Chapter 6
Managing Encryption Keys on External Devices
You can apply tags at the time you create a resource, or you can update the resource later with
the desired tags. For general information about applying tags, see "Resource Tags".
Related Topics
• Resource Tags
6-54
Chapter 6
Managing Encryption Keys on External Devices
Step 1: Create a Vault in OKV Vault Service and Add a Secret to the Vault to Store
OKV REST Administrator Password
Your Exadata Cloud@Customer infrastructure communicates with OKV over REST each time
an Oracle Database is provisioned to register the Oracle Database and request a wallet on
OKV. Therefore, Exadata infrastructure needs access to the REST admin credentials to
register with the OKV server.
These credentials are stored securely in the Oracle Vault Service in OCI as a Secret and
accessed by your Exadata Cloud@Customer infrastructure only when needed. When needed,
the credentials are stored in a password-protected wallet file.
To store the OKV administrator password in the OKV Vault service, create a vault by following
the instructions outlined in Managing Vaults and create a Secret in that vault by following the
instructions outlined in Managing Secrets.
Related Topics
• Managing Vaults
• Managing Secrets
Step 2: Create a Policy Statement for Database Service to Use Secret from OKV
Vault Service
To grant the Exadata Database service permission to use the secret in OKV Vault to log in to
the OKV REST interface, navigate to (or create) an IAM policy in a compartment higher up in
your compartment hierarchy than the compartment containing your OKV Vaults and Secrets.
Then, add a policy statement of this format:
6-55
Chapter 6
Managing Encryption Keys on External Devices
7. Ensure that you use the same "okv_rest_user" user credentials, while provisioning
Autonomous Database.
For more information, see Managing Vaults, Managing Keys, and Managing Secrets.
Related Topics
• Managing Vaults
• Managing Keys
• Managing Secrets
6-56
Chapter 6
Managing Encryption Keys on External Devices
6-57
Chapter 6
Managing Encryption Keys on External Devices
6-58
Chapter 6
Managing Autonomous Container Databases
Related Topics
• REST APIs
• Security Credentials
• Software Development Kits and Command Line Interface
Note:
You can create Autonomous Container Databases (ACD) with the 23ai database
software version only on Autonomous Exadata VM Clusters (AVMC) created on or
after May 28, 2024, with the appropriate Tags. See 23ai Database Software Version
Tag Requirements for details.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
6-59
Chapter 6
Managing Autonomous Container Databases
6-60
Chapter 6
Managing Autonomous Container Databases
b. Add the database to the Recovery Appliance using the intended unique name of the
database (db_unique_name) and intended protection policy.
For example:
EXEC dbms_ra.add_db(db_unique_name=>'OETADCD',
protection_policy_name=>'BRONZE', reserved_space=>'1024G');
For example:
EXEC dbms_ra.grant_db_access(db_unique_name=>'OETADCD',
username=>'RAVPC1');
6-61
Chapter 6
Managing Autonomous Container Databases
Note:
• Tags: Optionally, you can apply tags. If you have permission to create a resource, you
also have permission to apply free-form tags to that resource. To apply a defined tag,
you must have permission to use the tag namespace. For more information about
tagging, see Resource Tags. If you are not sure if you should apply tags, skip this
option (you can apply tags later) or ask your administrator. Avoid entering confidential
information.
10. Click Create Autonomous Container Database.
Related Topics
• Resource Tags
6-62
Chapter 6
Managing Autonomous Container Databases
You can also filter out to view Autonomous Container Databases in a particular
compartment. Under List Scope, select a compartment from the Compartment drop-
down list.
Note:
OKV Wallet Name represents the name of the wallet in which keys for this CDB
are generated on the OKV.
6-63
Chapter 6
Managing Autonomous Container Databases
3. In the list of Autonomous Container Databases, click the display name of the database you
wish to view details.
4. Click More actions, and then click Edit Maintenance Preferences.
5. In the resulting Edit automatic Maintenance panel, enter the following details:
• Configure maintenance method:
– Rolling: The Rolling method updates the ACD, one node at a time, with no
downtime for the Autonomous Databases.
– Non-rolling The Non-rolling method shuts down and updates the ACD in parallel
across all nodes. This method minimizes maintenance time but it requires full
downtime for the ACD and all associated Autonomous Databases.
– Optionally, you can also select Enable time-zone update. Time-zone files can
only be updated using the non-rolling configuration method.
Note:
All the RUs that include time-zone updates will be patched using the
non-rolling maintenance method (with full system downtime) only. So, if
you configure your maintenance to the rolling method and enable time
zone update, all the RUs that include a time-zone update are applied in
the non-rolling method only. Only those RUs without a time-zone update
are applied in the rolling method.
6-64
Chapter 6
Managing Autonomous Container Databases
Note:
For on-demand maintenance updates with a time-zone file update, the standby ACD
will be patched 3 days before the primary ACD in autonomous Data Guard-enabled
ACDs.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click Autonomous Container Databases.
3. In the list of Autonomous Container Databases, click the display name of the database you
wish to view details.
4. Click More actions, and then click Schedule maintenance.
5. In the resulting Schedule Maintenance panel, enter the following details:
• Configure update type
– Release Update (RU): Click to schedule a release update (RU) along with a time
zone file update. This option is disabled if your ACD is already patched to the
latest RU.
– Time-zone file update: Click to schedule time zone file update only.
Note:
Time zone files can only be updated using the non-rolling configuration
method that involves full system downtime.
6-65
Chapter 6
Managing Autonomous Container Databases
Note:
The maintenance settings selected from the Schedule maintenance dialog apply
to the maintenance update scheduled from this dialog only. These changes do
not apply to the maintenance preferences defined at the ACD level.
Note:
You can rotate both Oracle-managed and customer-managed encryption keys.
1. Open the navigation menu. Under Oracle Database, click Exadata Cloud@Customer.
2. Click Autonomous Container Databases.
3. In the list of Autonomous Container Databases, click the display name of the database you
wish to view details.
4. On the Autonomous Container Database Details page, click Rotate Encryption Key.
5. On the Rotate Encryption Key dialog, click Rotate Encryption Key.
Note:
By default, database backups are retained for 30 days if you have chosen Object
Storage or NFS as a backup destination. You have the option of retaining backups for
7, 15, 30, or 60 days. If you have chosen Local storage as a backup destination, then
by default, database backups are retained for a maximum of 7 days. If you have
chosen Recovery Appliance as a backup destination, then you cannot update the
backup retention policy.
The current backup retention policy for an Autonomous Container Database is
displayed on the Autonomous Container Database details page.
6-66
Chapter 6
Managing Autonomous Container Databases
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click Autonomous Container Databases.
3. In the list of Autonomous Container Databases, click the display name of the container
database you are interested in.
4. On the Autonomous Container Database details page, under Backup, click the Edit link in
the Backup retention policy field.
5. Specify a backup retention period from the list of choices.
6. Click Update.
Note:
You cannot restart an autonomous container database if a backup is in progress on
any of its autonomous databases.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click Autonomous Container Databases.
6-67
Chapter 6
Managing Autonomous Container Databases
3. In the list of Autonomous Container Databases, click the display name of the container
database you are interested in.
Autonomous Container Database details page is displayed.
Autonomous Container Database details page displays details that include total OCPU,
available OCPU, reclaimable OCPU, and database memory per OCPU in GB.
4. On the Autonomous Container Database details page, click Restart.
5. In the confirmation dialog, type the name of the Autonomous Container Database.
6. Click Restart.
(or)
a. Open the navigation menu. Under Oracle Database, click Exadata Database Service
on Cloud@Customer.
b. Click Autonomous Container Databases.
c. In the list of Autonomous Container Databases, click the Actions icon (three dots) for
the container database you are interested in, and then select Restart.
d. In the confirmation dialog, type the name of the Autonomous Container Database.
e. Click Restart.
Note:
• To move an autonomous container database you must have the right to manage
it in its current compartment and in the compartment you are moving it to.
• As soon as you move an autonomous container database to a different
compartment, the policies that govern the new compartment apply immediately
and affect access to the autonomous container database. Therefore, both your
and other Oracle Cloud users' access to it may change, depending on the
policies governing the user account's access to resources. For example, a user
may lose the ability to create autonomous databases in the autonomous
container database, given its new compartment.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click Autonomous Container Databases.
3. In the list of Autonomous Container Databases, click the display name of the container
database you wish to move.
4. Click Move Resource.
5. Select the new compartment.
6. Click Move Resource.
6-68
Chapter 6
Managing Autonomous Container Databases
Note:
You must terminate all Autonomous Databases within a container database before
you can terminate the container database itself.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click Autonomous Container Databases.
3. In the list of Autonomous Container Databases, click the display name of the infrastructure
resource you are interested in.
4. Click Terminate.
5. In the confirmation dialog, type the name of the Autonomous Container Database, and
then click Terminate Autonomous Container Database.
6-69
Chapter 6
Managing Autonomous Databases
6-70
Chapter 6
Managing Autonomous Databases
Requirements
To create an Autonomous Database for Developers instance, you must have access to Oracle
Exadata Database Service or Autonomous Database on either a Dedicated Exadata
Infrastructure or Exadata Cloud@Customer. In other words, only those customers with active
subscriptions to any of the following service platforms can create developer databases:
• Autonomous Database on Dedicated Exadata Infrastructure
• Exadata Database Service on Dedicated Exadata Infrastructure
• Autonomous Database on Exadata Cloud@Customer
• Exadata Database Service on Cloud@Customer
There is no limit on the number of free developer databases; it’s limited by the capacity of your
Exadata infrastructure.
Provisioning Workflow
You can provision an Autonomous Database for Developers instance from the Oracle Cloud
Infrastructure (OCI) console or using API. To create a developer database, you need an ACD
without an Autonomous Data Guard in an ECPU-based AVMC. If you do not have these
resources provisioned already, create the ECPU-based AVMC first and then create an ACD
without disaster recovery (Autonomous Data Guard) using that AVMC.
After creating or identifying (if they already exist) the AVMC and ACD, you can create an
Autonomous Database for Developers using them. Provisioning a developer database using
the OCI console follows the same workflow as creating a regular Autonomous Database, as
described in Create Autonomous Database. Once created, the Autonomous Database for
Developers instances appear with a Developer label in the list of Autonomous Databases on
the OCI console.
Specifications
Each developer database comes with the following specifications:
• Compute: Fixed 4 ECPUs, with no CPU scaling
• Storage: Fixed 32 GB ( ~ 20 GB of DATA)
• Session limits: 30 concurrent database sessions
• Workload Type: Data Warehouse, Transaction Processing
6-71
Chapter 6
Managing Autonomous Databases
Excluded Features
Autonomous Database for Developers supports all the features offered by a regular
Autonomous Database except those listed below. These limitations are in place to ensure that
the developer databases are optimally used as a development sandbox.
Developer database instances:
• Do not support Autonomous Data Guard. Hence, they can only be provisioned in an ACD
without Autonomous Data Guard.
• Support ECPU only. Therefore, you can provision them only on an ECPU based ACD.
• Come with fixed compute and storage sizing, do not support manual or auto-scaling and
storage scaling.
• Can not have long-term backups.
• Do not provide Database In-memory.
Supported Features
• Cloning: Autonomous Database for Developers offers fewer resources and features than
a regular autonomous database. For non-development use, such as load/stress testing
and production, or to get access to all features, users can use cloning to clone from a
developer database to a regular Autonomous database. You can also clone a regular
database into a developer database; however, to successfully clone a regular database
into a developer database, the source database's actual used space, rounded up to the
next GB, must be <= 32GB.
• Backup and Recovery: You can enable automatic backups or trigger manual backups of
your developer database, as needed. If the backup destination is an Object Storage and
Recovery Service, the backups will be billed.
• Service Maintenance: Developer databases follow the same patching schedule as regular
Autonomous Database; however, there will be no support for critical one-off patches.
• Database Application Development and Developer Tools: With Autonomous Database
for Developers, you can use all the developer-related features and built-in tools an
Autonomous Database offers.
Autonomous Database for Developers comes with a service level objective (SLO) of 99.5%
and you can log service requests (SR) to Oracle Support for assistance. However, there is no
Severity 1 SR support for developer databases. See Create a Service Request in My Oracle
Support to learn how to contact Oracle Support for assistance.
6-72
Chapter 6
Managing Autonomous Databases
Note:
• If the standby ACD is in snapshot standby mode, then you cannot create an ADB
in the primary ACD.
• For better management and sharing of the underlying SGA/memory resources,
Oracle recommends that all Autonomous Databases configured for In-Memory
be in the same Autonomous Container Database.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click Autonomous Databases.
3. Click Create Autonomous Database.
4. In the Create Autonomous Database dialog, enter the following:
Basic Database Information
• Compartment: Select the compartment of the Autonomous Database.
• Display Name: A user-friendly description or other information that helps you easily
identify the resource. The display name does not have to be unique. Avoid entering
confidential information.
• Database Name: The database name must consist of letters and numbers only,
starting with a letter. The maximum length is 14 characters. Avoid entering confidential
information.
Workload Type
Select the desired workload type.
• Data Warehouse
• Transaction Processing
See About Autonomous Database for information about each workload type.
Autonomous Container Database: Select an Autonomous Container Database.
Compartment: Specify the compartment containing the Autonomous Container Database
you wish to use.
Configure the database: Free Instance:
Note:
As developer database instances can only be created on ECPU-based ACDs
without Autonomous Data Guard, the Free instance toggle button is disabled for
ACDs with OCPU, Autonomous Data Guard, or both.
Toggle the Free instance button on, if you want to create an Autonomous Database for
Developers instance.
ECPU count and Storage (GB) are auto-populated with 4 and 32 respectively because
Autonomous Database for Developers comes fixed at 4 ECPUs and 32GB storage
Compute auto-scaling is disabled because developer database instances do not support
manual or auto-scaling.
6-73
Chapter 6
Managing Autonomous Databases
Note:
CPU Overprovisioning is not allowed with ECPUs.
Databases with CPU over-provisioning can only connect using tp and low services.
Auto scaling: Enable or disable auto-scaling, which permits Autonomous Database to
automatically use up to three times the allocated CPUs as the workload on the
database increases.
• Storage (GB): Specify the storage you wish to make available to your Autonomous
Database, in GB. The available storage depends on the infrastructure shape and what
is already consumed by other Autonomous Databases.
– Default: 1024 GB
– Minimum: 32 GB
– Increment: 1 GB
Administrator Credentials
Set the password for the Autonomous Database Admin user by entering a password that
meets the following criteria. Use this password when accessing the Autonomous Database
service console and when using an SQL client tool.
• Contains from 12 to 30 characters
• Contains at least one lowercase letter
• Contains at least one uppercase letter
• Contains at least one number
• Does not contain the double quotation mark (")
• Does not contain the string "admin", regardless of casing
Configure network access You can optionally create an ACL during database
provisioning, or at any time thereafter.
• Select the Enable database level access control checkbox.
• Click Access Control Rule.
6-74
Chapter 6
Managing Autonomous Databases
Note:
The database-level access control will be enabled without any IP addresses
in the access control list. Enabling an access control list with an empty list of
IP addresses makes the database inaccessible to all clients
• Specify the following types of addresses in your list by using the IP notation type drop-
down selector:
– IP Address allows you to specify one or more individual public IP addresses. Use
commas to separate your addresses in the input field.
– CIDR Block allows you to specify one or more ranges of public IP addresses using
CIDR notation. Use commas to separate your CIDR block entries in the input field.
Advanced Options:
• Encryption Key: ADB inherits encryption settings from the parent ACD. If the parent
ACD is configured for customer-managed OKV-based encryption, then the child ADB
will also have a TDE Master Key generated and managed in the same OKV wallet
used to store ACD master keys. Additionally, any backups taken on the Autonomous
Database will have the OKV-based key associated with it.
• Database In-memory:
– Enable database In-memory: It requires at least four OCPUs and a percentage of
the System Global Area (SGA) to enable in-memory. If you enable In-memory,
select the percentage of SGA to allocate to the IM Column Store. In-memory may
have an impact on the autonomous database's performance if a large amount of
memory is allocated or if it is disabled.
• Management: Choose a Character Set and National Character from the drop-down
list.
• Tags: Optionally, you can apply tags. If you have permission to create a resource, you
also have permission to apply free-form tags to that resource. To apply a defined tag,
you must have permission to use the tag namespace. For more information about
tagging, see Resource Tags. If you are not sure if you should apply tags, skip this
option (you can apply tags later) or ask your administrator. Avoid entering confidential
information.
5. Optionally, you can save the resource configuration as a stack.
• To save the resource configuration as a Stack:
a. Click Save as Stack.
b. In the resulting Save as Stack dialog, provide the following details:
i. Name: (Optional) Provide an easy-to-remember descriptive name.
ii. Description: (Optional) Enter a short description.
iii. Compartment: Select a compartment where this Stack will reside.
c. Click Save.
After saving the Stack, the system displays a banner with a link to the saved
Stack.
d. Click the link to open the Stack in the Resource Manager Service console.
See, Resource Manager and Terraform.
6-75
Chapter 6
Managing Autonomous Databases
Note:
The following naming restrictions apply to Autonomous Transaction Processing
and Autonomous Data Warehouse databases:
• Names associated with databases terminated within the last 60 days cannot
be used when creating a new database.
• A database name cannot be used concurrently for both an Autonomous Data
Warehouse and an Autonomous Transaction Processing database.
Related Topics
• About Autonomous Database
• GetAutonomousContainerDatabase
• Resource Tags
• Resource Manager and Terraform
6-76
Chapter 6
Managing Autonomous Databases
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Choose your Compartment.
3. In the list of Autonomous Databases, click the display name of the database you want to
administer.
4. Under Network in the database details, find the Access Control List field and click Edit
to enable or disable your database-level access control and make changes to the ACL
rules.
Note:
Autonomous Data Guard enabled Automonous databases:
• You can only view ACLs for standby databases.
• You can reset ACL for both the primary and standby databases from the
primary database details page. You cannot configure ACL from the standby
database details page.
6-77
Chapter 6
Managing Autonomous Databases
Note:
For databases that use Autonomous Data Guard, go to the details page of the
primary database.
6-78
Chapter 6
Managing Autonomous Databases
Note:
Oracle recommends using the email address of an administrator group rather
than an individual's, whenever possible, to ensure no important notifications
or announcements are missed.
Note:
You can rotate both Oracle-managed and customer-managed encryption keys.
1. Open the navigation menu. Under Oracle Database, click Exadata Cloud@Customer.
2. Click Autonomous Databases.
3. In the list of Autonomous Databases, click the display name of the database you wish to
view details.
4. On the Autonomous Database Details page, from the More Actions drop-down list, select
Rotate Encryption Key.
5. On the Rotate Encryption Key dialog, click Rotate Encryption Key.
6-79
Chapter 6
Managing Autonomous Databases
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click Autonomous Databases.
3. In the list of Autonomous Databases, click the display name of the database you wish to
administer.
4. From the More Actions drop-down list, select Admin Password.
The Admin Password dialog opens.
5. Enter a password for the Autonomous Database.
The password must meet the following criteria:
• Contains from 12 to 30 characters
• Contains at least one lowercase letter
• Contains at least one uppercase letter
• Contains at least one number
• Does not contain the double quotation mark (")
• Does not contain the string "admin", regardless of case
• Is not one of the last four passwords used for the database
• Is not a password you previously set within the last 24 hours
6. Enter the password again in the Confirm Password field.
7. Click Update.
Note:
• If the standby ACD is in snapshot standby mode, then you cannot scale an ADB
in the primary ACD.
• For better management and sharing of the underlying SGA/memory resources,
Oracle recommends that all Autonomous Databases configured for In-Memory
be in the same Autonomous Container Database.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click Autonomous Databases.
3. In the list of Autonomous Databases, click the display name of the database you wish to
view details.
4. Click Scale Up/Down.
6-80
Chapter 6
Managing Autonomous Databases
Note:
This option is not enabled for an Autonomous Database for Developers instance.
6-81
Chapter 6
Managing Autonomous Databases
Related Topics
• Service Limits
• GetAutonomousContainerDatabase
• GetAutonomousDatabase
Tip:
You can view the number of CPUs the database is currently using by running the
following SQL statements:
• ECPU:
• OCPU:
6-82
Chapter 6
Managing Autonomous Databases
Note:
• To move an autonomous database you must have the right to manage it in its
current compartment and in the compartment you are moving it to.
• As soon as you move an autonomous database to a different compartment, the
policies that govern the new compartment apply immediately and affect access to
the autonomous database. Therefore, both your and other Oracle Cloud users'
access to it may change, depending on the policies governing the user account's
access to resources. For example, a user may lose the ability to manage the
autonomous databae, given its new compartment.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click Autonomous Databases.
3. In the list of Autonomous Databases, click the display name of the database you wish to
move.
4. From the More Actions drop-down list, select Move Resource.
5. Select the new compartment.
6. Click Move Resource.
6-83
Chapter 6
Managing Autonomous Databases
Note:
Stopping your database has the following consequences:
• On-going transactions are rolled back.
• You will not be able to connect to your database using database clients or tools.
Note:
During the backup operation, your autonomous database remains available.
However, lifecycle management operations such as stopping it, scaling it, or
terminating it are disabled.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click Autonomous Databases.
3. In the list of Autonomous Databases, click the display name of the database you wish to
back up.
4. On the Details page, under Resources, click Backups.
5. Click Create Manual Backup.
6-84
Chapter 6
Managing Autonomous Databases
6. In the Create Manual Backup dialog, enter a name for your backup. Avoid entering
confidential information.
7. Click Update.
The backup operation begins. This operation may take several hours to complete,
depending on the size of the database.
Optionally, you can check the state of your backup in the list of backups on the database
details page. For some states, an information icon is displayed to provide additional details
regarding the state or ongoing operations like deletions. The backup has one of the following
states:
• Creating
• Active
• Deleting
• Deleted
• Failed
Note:
Long-term backups are not available with Autonomous Database for Developers
instances. See Oracle Autonomous Database for Developers for more details.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click Autonomous Databases.
3. In the list of Autonomous Databases, click the display name of the database you wish to
create a long-term backup.
Autonomous Details page is displayed.
4. Under Resources, click Backups.
5. In the Backups section, click Create long-term backup.
6. In the resulting window, enter the following details:
• Name: Enter a user-friendly description or other information that helps you easily
identify the backup.
• Backup destination type: Network File System (NFS) is selected by default. In this
release only NFS is supported, so you cannot change it no matter what destination
type (Object Storage, Network File System, or Oracle Zero Data Loss Recovery
Appliance) you have chosen for the ACD.
• Backup destinations: Specify an NFS destination. You can use an existing NFS
destination or create one for this long-term backup.
– To choose an existing NFS destination:
* Click Backup Destinations under Infrastructure.
6-85
Chapter 6
Managing Autonomous Databases
* Choose an NFS destination from the list of NFS backup destinations in the
chosen compartment.
– To create an NFS backup destination, see Using the Console to Create a Backup
Destination.
• Retention period: Set the retention period.
7. Click Create
Related Topics
• Using the Console to Create a Backup Destination
6-86
Chapter 6
Managing Autonomous Databases
Note:
6-87
Chapter 6
Managing Autonomous Databases
Note:
Autonomous Databases with 23ai software version can not be cloned into an
Autonomous Database with 19c version and vice-versa.
Note:
If IM is enabled, the source In-Memory Column Store settings or parameters will not
be applied to the clone. However, you can enable In-Memory Column Store like a
normal ADB creation flow.
Clone Types
The clone feature offers the following two types of Autonomous Database clones:
• The full-clone option creates a database that includes the metadata and data from the
source database.
• The metadata-clone option creates a database that includes only the metadata from the
source database.
Steps
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click Autonomous Databases.
3. In the list of Autonomous Databases, click the display name of the database you want to
clone.
4. From the More Actions drop-down list, select Create Clone.
5. On the Create Autonomous Database Clone page, provide the following information:
In the Clone Type section, select the type of clone you want to create. Choose either Full
Clone or Metadata Clone.
Clone Source: The clone source selection allows you to specify whether the clone is
created from a running database or from a database backup. Select one of the following
options:
• Clone from a database instance: Creates a clone of a running database as it exists
at the current moment.
• Clone from a backup: Creates a clone from a database backup. If you choose this
option, select one of the following options:
6-88
Chapter 6
Managing Autonomous Databases
Note:
6-89
Chapter 6
Managing Autonomous Databases
Note:
CPU Overprovisioning is not allowed with ECPUs.
Databases with CPU over-provisioning can only connect to the tp and low services for
the Autonomous Database for Transaction Processing and Mixed Workloads
workloads. In the case of an Autonomous Database for Analytics and Data
Warehousing workloads, you can only connect to the low services when create on
over-provisioned CPUs.
For ECPUs, this value defaults to 2 ECPUs. For databases that need 2 or more
ECPUs, you must specify the number of assigned ECPUs in increment of 1.
• Storage (GB): Specify the amount of storage, in GB, that you want to make available
to your cloned Autonomous Database, and it depends on the storage available to use.
For full clones, the size of the source database determines the minimum amount of
storage you can make available.
– Default: 1024 GB
– Minimum: 32 GB
– Increment: 1 GB
• Auto scaling: Enable or disable auto scaling, which permits Autonomous Database to
automatically use up to three times the allocated CPUs as the workload on the
database increases.
Create administrator credentials
Set the password for the Autonomous Database administrator user by entering a password
that meets the following criteria.
• Password cannot be one of the three most recently used passwords of the source
database
• Between 12 and 30 characters long
• Contains at least one lowercase letter
• Contains at least one uppercase letter
• Contains at least one number
• Does not contain the double quotation mark (")
• Does not contain the string "admin", regardless of casing
Use this password when accessing the service console and when using a SQL client tool.
Configure Network Access
6-90
Chapter 6
Managing Autonomous Databases
You can change the access control list to enable or disable database-level access control
or add or modify entries to the access control list.
• Click Modify Access Control.
• Select the Enable database level access control check box.
• Click Access Control Rule.
Note: The database-level access control will be enabled without any IP addresses in
the access control list. Enabling an access control list with an empty list of IP
addresses makes the database inaccessible to all clients.
• Specify the following types of addresses in your list by using the IP notation type drop-
down selector:
– IP Address allows you to specify one or more individual public IP addresses. Use
commas to separate your addresses in the input field.
– CIDR Block allows you to specify one or more ranges of public IP addresses using
CIDR notation. Use commas to separate your CIDR block entries in the input field.
Advanced Options:
• Encryption Key:
– Clone from a database instance: The source and the target ACD must be the
same Keystore type. When the source is OKV, the target must also be the same
OKV destination.
– Clone from a backup: The source and the target ACDs can be different Keystore
types. When the source is OKV, the target must also be the same OKV
destination.
• Database In-memory:
– Enable database In-memory: It requires at least four OCPUs and a percentage of
the System Global Area (SGA) to enable in-memory. If you enable In-memory,
select the percentage of SGA to allocate to the IM Column Store. In-memory may
have an impact on the autonomous database's performance if a large amount of
memory is allocated or if it is disabled.
• Management: Choose a Character Set and National Character from the drop-down
list.
• Tags: Optionally, you can apply tags. If you have permission to create a resource, you
also have permission to apply free-form tags to that resource. To apply a defined tag,
you must have permission to use the tag namespace. For more information about
tagging, see Resource Tags. If you are not sure if you should apply tags, skip this
option (you can apply tags later) or ask your administrator. Avoid entering confidential
information.
6. Click Create Autonomous Database Clone.
The Console displays the details page for the new clone of your database and the service
begins provisioning the Autonomous Database. Note the following:
• The new clone displays the Provisioning lifecycle state until the provisioning process
completes.
• The source database remains in the Available lifecycle state.
• Backups associated with the source database are not cloned for either the full-clone or the
metadata-clone option.
6-91
Chapter 6
Managing Autonomous Databases
The Clone source is displayed in the General Information section of the cloned database
details page. Click the name to view details of the source database. Note that if the source
database is deleted, then this key/value pair is not displayed.
Related Topics
• GetAutonomousContainerDatabase
• Resource Tags
Note:
If IM is enabled, the source In-Memory Column Store settings or parameters will not
be applied to the clone. However, you can enable In-Memory Column Store like a
normal ADB creation flow.
Clone Types
The clone feature offers the following two types of Autonomous Database clones:
• The full-clone option creates a database that includes the metadata and data from the
source database.
• The metadata-clone option creates a database that includes only the metadata from the
source database.
Steps
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click Autonomous Databases.
3. In the list of Autonomous Databases, click the display name of the database you want to
clone.
4. Under Resources, click Backups.
5. In the list of backups, find the backup that you want to clone, click the action icon (three
dots), and then click Create Clone.
6. On the Create Autonomous Database Clone page, provide the following information:
Provide basic information for the Autonomous Database.
• Choose a compartment: Your current compartment is the default selection but you
can select a different compartment in which to create the clone from the drop-down list.
• Source database name: The name of the source database displays in the read-only
Source database name field.
6-92
Chapter 6
Managing Autonomous Databases
• Display name: Enter a description or other information to identify the database clone.
You can change the display name any time and it does not have to be unique. Avoid
entering confidential information.
• Database name: Enter a database name for the clone that contains only letters and
numbers, begins with a letter. Avoid entering confidential information.
• Region: Choose your preferred region to place the clone database.
• Exadata Infrastructure: You can choose to create the database clone in the same
Exadata Infrastructure where the source database resides, or you can choose a
different compartment by clicking CHANGE COMPARTMENT and choosing one from
the drop-down list.
• Autonomous Exadata VM Cluster: You can choose to create the database clone in
the same Autonomous Exadata VM Cluster where the source database resides, or you
can choose a different compartment by clicking CHANGE COMPARTMENT and
choosing one from the drop-down list.
• Autonomous Container Database: You can choose to create the database clone in
the same compartment and container database as the source database, or you can
choose a different compartment by clicking CHANGE COMPARTMENT, and a
different container database by choosing one from the drop-down list.
Note:
When the target Autonomous Exadata VM Cluster is the same as the source,
then the database name cannot be the same as the source database name.
• Configure the database: Free Instance: Toggle the Free instance button on, if you
want to create an Oracle Autonomous Database for Developers instance. ECPU
count and Storage (GB) are auto-populated with 4 and 32 respectively because
Oracle Autonomous Database for Developers comes fixed at 4 ECPUs and 32GB
storage Compute auto-scaling is disabled because developer database instances do
not support manual or auto-scaling.
Note:
6-93
Chapter 6
Managing Autonomous Databases
databases on each infrastructure instance. Note that fractional CPU applies to OCPU
only.
There is a minimum requirement of 1 OCPU or 4 ECPUs for an Autonomous Database
clone from Backup.
The total number of CPUs available to all databases within the Autonomous Exadata
VM Cluster depends on the infrastructure shape and what is already allocated to other
Autonomous Databases.
The CPU type, that is, OCPU or ECPU is determined by the parent Autonomous
Exadata VM Cluster resource's compute type.
The time taken to clone an Autonomous Database depends on the CPU Count and the
network bandwidth between the Backup Destination and the target Autonomous
Container Database.
You can also select a fractional OCPU value for databases that do not need an entire
OCPU. This allows you to overprovision CPU and run more databases on each
infrastructure instance. Refer to CPU Overprovisioning for more details.
For databases that need 2 or more ECPUs, you must specify the number of assigned
ECPUs in increment of 1.
Note:
CPU Overprovisioning is not allowed with ECPUs.
Databases with CPU over-provisioning can only connect to the tp and low services for
the Autonomous Database for Transaction Processing and Mixed Workloads
workloads. In the case of an Autonomous Database for Analytics and Data
Warehousing workloads, you only connect to the low services when created on over-
provisioned CPUs.
• Storage (GB): Specify the amount of storage, in GB, that you want to make available
to your cloned Autonomous Database, and it depends on the storage available to use.
– Default/Minimum: Allocated storage of the source database
– Increment: 1 GB
• Auto scaling: Enable or disable auto-scaling, which permits Autonomous Database to
automatically use up to three times the allocated CPUs as the workload on the
database increases.
Create administrator credentials
Set the password for the Autonomous Database administrator user by entering a password
that meets the following criteria.
• Password cannot be one of the three most recently used passwords of the source
database
• Between 12 and 30 characters long
• Contains at least one lowercase letter
• Contains at least one uppercase letter
• Contains at least one number
• Does not contain the double quotation mark (")
6-94
Chapter 6
Managing Autonomous Databases
6-95
Chapter 6
Managing Autonomous Databases
Related Topics
• GetAutonomousContainerDatabase
• Resource Tags
6-96
Chapter 6
Managing Autonomous Databases
Note:
Note:
CPU Overprovisioning is not allowed with ECPUs.
For OCPUs, you can assign a fractional OCPU value from 0.1 to 0.9 (in increments of
0.1 OCPU) to databases that do not need a full OCPU. For databases that need 1 or
more OCPUs, you must specify the number of assigned OCPUs as an integer. For
6-97
Chapter 6
Managing Autonomous Databases
example, you cannot assign 3.5 OCPUs to a database. The next available number of
OCPUs above 3 is 4.
Databases with CPU over-provisioning can only connect to the tp and low services for
the Autonomous Database for Transaction Processing and Mixed Workloads
workloads. In the case of an Autonomous Database for Analytics and Data
Warehousing workloads, you only connect to the low services when created on over-
provisioned CPUs.
• Storage (GB): Specify the amount of storage, in GB, that you want to make available
to your cloned Autonomous Database, and it depends on the storage available to use.
For full clones, the size of the source database determines the minimum amount of
storage you can make available.
– Default: 1024 GB
– Minimum: 32 GB
– Increment: 1 GB
• Auto scaling: Enabling auto-scaling allows the system o automatically use up to three
times more CPU and I/O resources to meet the workload demand.
Create administrator credentials
Set the password for the Autonomous Database administrator user by entering a password
that meets the following criteria.
• Password cannot be one of the three most recently used passwords of the source
database
• Between 12 and 30 characters long
• Contains at least one lowercase letter
• Contains at least one uppercase letter
• Contains at least one number
• Does not contain the double quotation mark (")
• Does not contain the string "admin", regardless of casing
Use this password when accessing the service console and when using a SQL client tool.
Configure Network Access
You can change the access control list to enable or disable database-level access control
or add or modify entries to the access control list.
• Click Modify Access Control.
• Select the Enable database level access control check box.
• Click Access Control Rule.
Note: The database-level access control will be enabled without any IP addresses in
the access control list. Enabling an access control list with an empty list of IP
addresses makes the database inaccessible to all clients.
• Specify the following types of addresses in your list by using the IP notation type drop-
down selector:
– IP Address allows you to specify one or more individual public IP addresses. Use
commas to separate your addresses in the input field.
– CIDR Block allows you to specify one or more ranges of public IP addresses using
CIDR notation. Use commas to separate your CIDR block entries in the input field.
6-98
Chapter 6
Managing Autonomous Databases
Advanced Options:
• Encryption Key:
– Clone from a database instance: The source and the target ACD must be the
same Keystore type. When the source is OKV, the target must also be the same
OKV destination.
– Clone from a backup: The source and the target ACDs can be different Keystore
types. When the source is OKV, the target must also be the same OKV
destination.
• Management: Choose a Character Set and National Character from the drop-down
list.
• Tags: Optionally, you can apply tags. If you have permission to create a resource, you
also have permission to apply free-form tags to that resource. To apply a defined tag,
you must have permission to use the tag namespace. For more information about
tagging, see Resource Tags. If you are not sure if you should apply tags, skip this
option (you can apply tags later) or ask your administrator. Avoid entering confidential
information.
8. Click Create Autonomous Database Clone.
The Console displays the details page for the new clone of your database and the service
begins provisioning the Autonomous Database. Note the following:
• The new clone displays the Provisioning lifecycle state until the provisioning process
completes.
• The source database remains in the Available lifecycle state.
• Backups associated with the source database are not cloned for either the full-clone or the
metadata-clone option.
The Clone source is displayed in the General Information section of the cloned database
details page. Click the name to view details of the source database. Note that if the source
database is deleted, then this key/value pair is not displayed.
Related Topics
• Resource Tags
6-99
Chapter 6
Managing Autonomous Databases
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click Autonomous Databases.
3. In the list of Autonomous Databases, click the display name of the primary database.
4. Under Resources, click Autonomous Data Guard.
5. In the list of standby databases, find the database that you want to clone, and then click
the display name to view details.
6. Under Resources, click Backups.
7. In the list of backups, find the backup that you want to clone, click the action icon (three
dots), and then click Create Clone.
8. On the Create Autonomous Database Clone page, provide the following information:
In the Clone Type section, select Full Clone.
Clone Source: The clone source section displays the source backup details.
Provide basic information for the Autonomous Database.
• Choose a compartment: Your current compartment is the default selection but you
can select a different compartment in which to create the clone from the drop-down list.
• Source database name: The name of the source database displays in the read-only
Source database name field.
• Display name: Enter a description or other information to identify the database clone.
You can change the display name any time and it does not have to be unique. Avoid
entering confidential information.
• Database name: Enter a database name for the clone that contains only letters and
numbers, begins with a letter. Avoid entering confidential information.
• Exadata Infrastructure: You can choose to create the database clone in the same
Exadata Infrastructure where the source database resides, or you can choose a
different compartment by clicking CHANGE COMPARTMENT and choosing one from
the drop-down list.
• Autonomous Exadata VM Cluster: You can choose to create the database clone in
the same Autonomous Exadata VM Cluster where the source database resides, or you
can choose a different compartment by clicking CHANGE COMPARTMENT and
choosing one from the drop-down list.
• Autonomous Container Database: You can choose to create the database clone in
the same compartment and container database as the source database, or you can
choose a different compartment by clicking CHANGE COMPARTMENT, and a
different container database by choosing one from the drop-down list.
Note:
When the target Autonomous Exadata VM Cluster is the same as the source,
then the database name cannot be the same as the source database name.
• Configure the database: Free Instance: Toggle the Free instance button on, if you
want to create an Oracle Autonomous Database for Developers instance. ECPU
count and Storage (GB) are auto-populated with 4 and 32 respectively because
Oracle Autonomous Database for Developers comes fixed at 4 ECPUs and 32GB
6-100
Chapter 6
Managing Autonomous Databases
Note:
Note:
The time taken to clone an ADB depends on the CPU Count and the network
bandwidth between the Backup Destination and the target ACD.
The selected CPU count is validated against a list of provisionable CPUs, and if the
database can not be scaled up to the chosen CPU count, you will be provided with the
two nearest provisionable CPU values.
You can use the GetAutonomousContainerDatabase API to get a complete list of
provisionable CPU values.
There is a minimum requirement of 1 OCPUs or 4 ECPUs for an Autonomous
Database clone from Backup.
The CPU type, that is, OCPU or ECPU is determined by the parent Autonomous
Exadata VM Cluster resource's compute type.
For databases that need 2 or more ECPUs, you must specify the number of assigned
ECPUs in increment of 1.
Note:
CPU Overprovisioning is not allowed with ECPUs.
For OCPUs, you can assign a fractional OCPU value from 0.1 to 0.9 (in increments of
0.1 OCPU) to databases that do not need a full OCPU. For databases that need 1 or
more OCPUs, you must specify the number of assigned OCPUs as an integer. For
6-101
Chapter 6
Managing Autonomous Databases
example, you cannot assign 3.5 OCPUs to a database. The next available number of
OCPUs above 3 is 4.
Databases with CPU over-provisioning can only connect to the tp and low services for
the Autonomous Database for Transaction Processing and Mixed Workloads
workloads. In the case of an Autonomous Database for Analytics and Data
Warehousing workloads, you only connect to the low services when created on over-
provisioned CPUs.
• Storage (GB): Specify the amount of storage, in GB, that you want to make available
to your cloned Autonomous Database, and it depends on the storage available to use.
– Default/Minimum: Allocated storage of the source database
– Increment: 1 GB
• Auto scaling: Enabling auto-scaling allows the system o automatically use up to three
times more CPU and I/O resources to meet the workload demand.
Create administrator credentials
Set the password for the Autonomous Database administrator user by entering a password
that meets the following criteria.
• Password cannot be one of the three most recently used passwords of the source
database
• Between 12 and 30 characters long
• Contains at least one lowercase letter
• Contains at least one uppercase letter
• Contains at least one number
• Does not contain the double quotation mark (")
• Does not contain the string "admin", regardless of casing
Use this password when accessing the service console and when using a SQL client tool.
Configure Network Access
You can change the access control list to enable or disable database-level access control
or add or modify entries to the access control list.
• Click Modify Access Control.
• Select the Enable database level access control check box.
• Click Access Control Rule.
Note: The database-level access control will be enabled without any IP addresses in
the access control list. Enabling an access control list with an empty list of IP
addresses makes the database inaccessible to all clients.
• Specify the following types of addresses in your list by using the IP notation type drop-
down selector:
– IP Address allows you to specify one or more individual public IP addresses. Use
commas to separate your addresses in the input field.
– CIDR Block allows you to specify one or more ranges of public IP addresses using
CIDR notation. Use commas to separate your CIDR block entries in the input field.
Advanced Options:
• Encryption Key:
6-102
Chapter 6
Managing Autonomous Databases
– Clone from a database instance: The source and the target ACD must be the
same Keystore type. When the source is OKV, the target must also be the same
OKV destination.
– Clone from a backup: The source and the target ACDs can be different Keystore
types. When the source is OKV, the target must also be the same OKV
destination.
• Management: Choose a Character Set and National Character from the drop-down
list.
• Tags: Optionally, you can apply tags. If you have permission to create a resource, you
also have permission to apply free-form tags to that resource. To apply a defined tag,
you must have permission to use the tag namespace. For more information about
tagging, see Resource Tags. If you are not sure if you should apply tags, skip this
option (you can apply tags later) or ask your administrator. Avoid entering confidential
information.
9. Click Create Autonomous Database Clone.
The Console displays the details page for the new clone of your database and the service
begins provisioning the Autonomous Database. Note the following:
• The new clone displays the Provisioning lifecycle state until the provisioning process
completes.
• The source database remains in the Available lifecycle state.
Related Topics
• GetAutonomousContainerDatabase
• Resource Tags
Note:
If the standby ACD is in snapshot standby mode, then you cannot delete an ADB in
the primary ACD.
WARNING:
Terminating an Autonomous Database permanently deletes it. The database data will
be lost when the system is terminated. However, automatic backups are not deleted if
you have chosen Recovery Appliance or NFS as a backup destination. You can
delete automatic backups directly from the Recovery Appliance or NFS.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click Autonomous Databases.
6-103
Chapter 6
Managing Autonomous Databases
3. In the list of Autonomous Databases, click the display name of the database you wish to
terminate.
4. From the More Actions drop-down list, select Terminate.
5. Confirm that you wish to terminate your Autonomous Database in the confirmation dialog.
6. Click Terminate Autonomous Database.
6-104
Chapter 6
Managing Autonomous Databases
6-105
Chapter 6
Connecting to Autonomous Databases
3. If there are multiple Autonomous Databases in the compartment you can show metrics
aggregated across the Autonomous Databases by selecting Aggregate Metric Streams.
4. If you want to limit the metrics you see, next to Dimensions click Add (click Edit if you
have already added dimensions).
a. In the Dimension Name field select a dimension.
b. In the Dimension Value field select a value.
c. Click Done.
d. In the Edit dimensions dialog click +Additional Dimension to add an additional
dimension. Click x to remove a dimension.
To create an alarm on a specific metric, click Options and select Create an Alarm on this
Query. See Managing Alarms for information on setting and using alarms.
6-106
Chapter 6
Connecting to Autonomous Databases
To provide the secure TCPS connection, certification authentication uses an encrypted key
stored in a wallet on both the client (where the application is running) and the server (where
the autonomous database is running). The key on the client must match the key on the server
to make a connection. A wallet contains a collection of files, including the key and other
information needed to connect to your database . All communications between the client and
the server are encrypted.
• Download the Wallet for an Autonomous Database
• Get the APEX and SQL Developer Web URLs for an Autonomous Database
Note:
This password protects the downloaded Client Credentials wallet. This wallet is
not the same as the Transparent Data Encryption (TDE) wallet for the database;
therefore, use a different password to protect the Client Credentials wallet.
6-107
Chapter 6
Authenticate Autonomous Database Users with Kerberos
Note:
Wallet files, along with the Database user ID and password, provide access to data in
your autonomous database. Store wallet files in a secure location. Share wallet files
only with authorized users. If wallet files are transmitted in a way that might be
accessed by unauthorized users (for example, over public email), transmit the wallet
password separately and securely.
Get the APEX and SQL Developer Web URLs for an Autonomous Database
Follow these steps to get the URLs to use to connect to APEX (Oracle Application Express)
and Oracle SQL Developer Web in an autonomous database on an Oracle Exadata Database
Service on Cloud@Customer system.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click Autonomous Databases.
3. In the list of Autonomous Databases, click the display name of the database whose APEX
and SQL URLs you wish to get.
4. Click DB Connections.
5. Select the Application Connection option.
6. Application URLs are displayed in plain text in the Application URL field. Copy the URL
string using the Copy link.
Paste the URL into a browser running on a system with network access to your autonomous
database.
6-108
Chapter 6
Authenticate Autonomous Database Users with Kerberos
storage, database link authentication, and enhanced PC security. It does this through a
Kerberos authentication server.
• The Kerberos system revolves around the concept of a ticket. A ticket is a set of electronic
information that identifies a user or a service. A ticket identifies you and your network
access privileges.
• In Kerberos-based authentication, you transparently send a request for a ticket to a Key
Distribution Center (KDC). The Key Distribution Center authenticates you and grants you a
ticket to access the database.
To enable Kerberos authentication for your Autonomous Database, you must keep your
Kerberos configuration files (krb.conf) and service key table file (v5srvtab) ready. For
more information on these files and steps to obtain them, please see About Kerberos
Configuration Files.
6-109
Chapter 6
Authenticate Autonomous Database Users with Kerberos
• If you enable Kerberos authentication for your Autonomous Database, you can still use
password-based database authentication for your database.
• Only one external authentication method can be used for your Autonomous Database at
any time. That is, you can only have Oracle Cloud Infrastructure (IAM), Centrally Managed
User with Active Directory (CMU-AD), Azure AD, or Kerberos authentication schemes
enabled at any time.
Note:
The only exception is that Kerberos authentication can be configured on top of
CMU-AD to provide CMU-AD Kerberos authentication for Microsoft Active
Directory users.
BEGIN
DBMS_CLOUD_ADMIN.DISABLE_EXTERNAL_AUTHENTICATION;
END;
/
2. Obtain the Kerberos configuration files: krb.conf and the service key table file
v5srvtab. For more information on these files and steps required to obtain them, see
Configuring Kerberos Authentication.
6-110
Chapter 6
Authenticate Autonomous Database Users with Kerberos
3. Copy the Kerberos configuration files krb.conf and v5srvtab to a bucket in your Object
Store.
Note:
Oracle recommends that you store the Kerberos configuration files in a private
bucket in your Object Store.
If you are using Oracle Cloud Infrastructure Object Store, see Putting Data into Object
Storage for details on uploading files.
4. To enable Kerberos as the external authentication for your Autonomous Database, run the
DBMS_CLOUD_ADMIN.ENABLE_EXTERNAL_AUTHENTICATION procedure and pass in a location
URI with the params JSON argument. You must place the configuration files krb.conf
and v5srvtab in the Object Storage location specified in the location_uri parameter.
For example:
BEGIN
DBMS_CLOUD_ADMIN.ENABLE_EXTERNAL_AUTHENTICATION(
type => 'KERBEROS',
params => JSON_OBJECT('location_uri' value 'https://
objectstorage.us-phoenix-1.oraclecloud.com/n/namespace-string/b/
bucketname/o',
'credential_name' value
'my_credential_name')
);
END;
/
Note:
To provide CMU-AD Kerberos authentication for Microsoft Active Directory users,
you can enable Kerberos authentication on top of CMU-AD by setting type to CMU
in the above example.
6-111
Chapter 6
Patching Autonomous Database on Exadata Cloud@Customer Infrastructure
See Navigate to Oracle Cloud Infrastructure Object Storage and Create Bucket for more
information on Object Storage.
See ENABLE_EXTERNAL_AUTHENTICATION Procedure for more information.
To run this procedure, you must be logged in as ADMIN user or have the EXECUTE privilege on
DBMS_CLOUD_ADMIN.
BEGIN
DBMS_CLOUD_ADMIN.DISABLE_EXTERNAL_AUTHENTICATION;
END;
/
Note:
To provide CMU-AD Kerberos authentication for the Microsoft Active Directory users,
you must continue to configure CMU-AD authentication without disabling Kerberos
authentication.
6-112
Chapter 6
Patching Autonomous Database on Exadata Cloud@Customer Infrastructure
Oracle schedules and performs all patching and other maintenance operations on all dedicated
Exadata infrastructure resources. You can also specify when such maintenance operations can
occur, and what kind of patching is performed.
Note:
Oracle recommends that you set a maintenance window for at least Exadata
Infrastructure resources. Doing so will prevent maintenance operations from
occurring at times that would be disruptive to regular database operations.
You can set the maintenance window for an Exadata Infrastructure and Autonomous Container
Database resources when you create them or you can set or change it later. Once a
maintenance activity is scheduled based on the maintenance window you set, you can manage
the actual timing of the activity, even to the point of changing the patch version, applying the
patch immediately, or skipping the activity.
Related Topics
• Using the Console to Create Oracle Exadata Database Service on Cloud@Customer
Infrastructure
To create your Oracle Exadata Database Service on Cloud@Customer infrastructure, be
prepared to provide values for the fields required for configuring the infrastructure.
• Using the Console to Configure Oracle-Managed Infrastructure Updates
Full Exadata infrastructure software updates are scheduled on a quarterly basis. In
addition, important security updates are scheduled monthly. While you cannot opt-out of
these infrastructure updates, Oracle alerts you in advance through the Cloud Notification
Portal and allows scheduling flexibility to help you plan for them.
• Patch and Update an Oracle Exadata Database Service on Cloud@Customer System
Learn to update and patch the Oracle Exadata Database Service on Cloud@Customer
System
• Create an Autonomous Container Database
• Change the Maintenance Schedule of an Autonomous Container Database
6-113
Chapter 6
Migrating On-Premises Databases to Oracle Autonomous Database on Exadata Cloud@Customer
them. By default, Oracle applies quarterly Release Updates (RUs). Currently, the Release
Update Revision (RUR) maintenance type is not supported.
To help you decide whether to have Oracle apply RUs or RURs to a given Autonomous
Container Database, see My Oracle Support Note 2285040.1.
Related Topics
• https://support.oracle.com/epmos/faces/DocContentDisplay?id=2285040.1
6-114
Chapter 6
Using Autonomous Data Guard with Autonomous Database on Exadata Cloud@Customer
Note:
Replication of data happens only over the client network.
6-115
Chapter 6
Using Autonomous Data Guard with Autonomous Database on Exadata Cloud@Customer
Note:
For better management and sharing of the underlying SGA/memory resources,
Oracle recommends that all Autonomous Databases configured for In-Memory be in
the same Autonomous Container Database.
6-116
Chapter 6
Using Autonomous Data Guard with Autonomous Database on Exadata Cloud@Customer
Note:
If the selected Autonomous Exadata VM Cluster does not have 2 available
OCPUs or 8 available ECPUs per node, which is the minimum requirement for
creating an Autonomous Container Database, then this field is greyed out. Select
an Autonomous Exadata VM Cluster that has enough resources to create an
autonomous container database.
Note:
If the selected Autonomous Exadata VM Cluster does not have 2
available OCPUs per node, which is the minimum requirement for
creating an Autonomous Container Database, then this field is greyed
out. Select an Autonomous Exadata VM Cluster that has enough
resources to create an Autonomous Container Database.
• Data Protection Mode: Specify the protection mode used for this Data Guard
association.
– Maximum Performance: Provides the highest level of data protection that is
possible without compromising the availability of a primary database.
– Maximum Availability: Provides the highest level of data protection that is
possible without affecting the performance of a primary database. This is the
default protection mode.
6-117
Chapter 6
Using Autonomous Data Guard with Autonomous Database on Exadata Cloud@Customer
See Oracle Data Guard Concepts and Administration for more information about
Oracle Data Guard Protection Modes.
• Enable automatic failover: Select this checkbox to enable automatic failover and set
the FSFO lag limit.
Fast-Start Failover (FSFO) lag limit: Set Fast-Start Failover (FSFO) lag limit in
increments of 1. Minimum: 5 and Maximum: 3600 seconds. Default: 30 seconds.
Note:
FSFO Lag Limit is applicable only to Maximum Performance protection
mode.
6-118
Chapter 6
Using Autonomous Data Guard with Autonomous Database on Exadata Cloud@Customer
Note:
If disabled for an ACD, automatic backups can be enabled anytime later from the
Oracle Cloud Infrastructure (OCI) console by following the steps outlined in Edit
Autonomous Container Database Backup Settings. However, once enabled you
can not disable automatic backups for the ACD.
If enabling automatic backups fail for some reason, the ACD provisioning also
fails with an error message. As a workaround, you can provision the ACD with
automatic backups disabled, and enable them from the ACD's Details page later.
Note:
The backup destination type can only be set while enabling automatic backups
on an ACD and cannot be changed later.
• Backup retention period: Specify a Backup retention period value to meet your
needs. You can choose any value between 7 to 95 days.
For the Object Storage and Network File System (NFS) backup destination types, the
backup retention policy value defaults to 30 days.
For the Recovery Appliance backup destination type, this value is controlled by the
Recovery Appliance protection policy.
All the backups are automatically deleted after the backup retention period.
• Encryption Key: Choose an encryption option, Encrypt using Oracle-managed keys
or Encrypt using customer-managed keys. The default option is Oracle-managed
keys.
6-119
Chapter 6
Using Autonomous Data Guard with Autonomous Database on Exadata Cloud@Customer
Note:
• Management: Choose a Character Set and National Character from the drop-down
list.
• Database In-memory:
– Enable database In-memory: It requires at least four OCPUs and a percentage of
the System Global Area (SGA) to enable in-memory. If you enable In-memory,
select the percentage of SGA to allocate to the IM Column Store. In-memory may
have an impact on the autonomous database's performance if a large amount of
memory is allocated or if it is disabled.
Note:
If you enable In-memory in a primary database with Data Guard enabled,
the configuration will be replicated to the standby database as read-only.
• Tags: Optionally, you can apply tags. If you have permission to create a resource, you
also have permission to apply free-form tags to that resource. To apply a defined tag,
you must have permission to use the tag namespace. For more information about
tagging, see Resource Tags. If you are not sure if you should apply tags, skip this
option (you can apply tags later) or ask your administrator. Avoid entering confidential
information.
Your tenancies come with a library of standard tags that would apply to most
resources. These tags are currently available as a set of Tag Namespaces that your
governance administrators can deploy. OCI best practices recommend applying these
tags to all resources. Besides reporting and governance, OCI service automation can
deliver workload-specific optimizations based on standard tag values.
6-120
Chapter 6
Using Autonomous Data Guard with Autonomous Database on Exadata Cloud@Customer
For example, database deployments for the PeopleSoft application require a specific
configuration. Setting the appropriate application tag key in the Oracle-
ApplicationName tag namespace while deploying an Autonomous Database, can
ensure that the database is configured and ready for the particular application, for
example, PeopleSoft out of the box.
For more information, see Tagging Oracle Exadata Database Service on
Cloud@Customer Resources.
12. Click Create Autonomous Container Database.
Related Topics
• Oracle Data Guard Protection Modes
• Management Operations
• Resource Tags
• Tagging Oracle Exadata Database Service on Cloud@Customer Resources
Tagging is a powerful foundational service for Oracle Cloud Infrastructure (OCI) that
enables users to search, control access, and do bulk actions on a set of resources based
on the tag.
• In the resulting Update Autonomous Data Guard dialog, make changes and click Save
Changes.
6. Under Resources, click Autonomous Data Guard to view association details.
6-121
Chapter 6
Using Autonomous Data Guard with Autonomous Database on Exadata Cloud@Customer
Note:
You can also edit the backup settings by clicking the Edit link under the Backup
section on the Autonomous Container Database Information tab.
Note:
The backup destination type can only be set while enabling automatic
backups on an ACD and cannot be changed later.
6-122
Chapter 6
Using Autonomous Data Guard with Autonomous Database on Exadata Cloud@Customer
Note:
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click Autonomous Container Databases.
3. In the list of Autonomous Container Databases, click the display name of the physical
standby database you are interested in.
Autonomous Container Database Details page is displayed.
4. Select Convert to snapshot standby from the More Actions drop-down list.
Note:
You cannot convert a physical standby to a snapshot standby with Automatic
Failover enabled. Disable Automatic Failover to convert your standby database
to snapshot standby mode.
6-123
Chapter 6
Using Autonomous Data Guard with Autonomous Database on Exadata Cloud@Customer
Note:
Convert to physical standby ACD will only be enabled when ACD is in
SNAPSHOT_STANDBY mode.
• Converting to physical standby ACD will discard all local updates from all
ADBs and apply redo data from primary ACD.
• Converting to physical standby will revert the standby ACD role and all its
ADBs roles to STANDBY.
Note:
If you convert your snapshot standby Autonomous Container Database to
physical standby, all local updates to your snapshot standby will be discarded
and data from your primary Autonomous Container Database will be applied.
5. Click Convert.
6-124
Chapter 6
Using Autonomous Data Guard with Autonomous Database on Exadata Cloud@Customer
Note:
You can rotate both Oracle-managed and customer-managed encryption keys.
1. Open the navigation menu. Under Oracle Database, click Exadata Cloud@Customer.
2. Click Autonomous Container Databases.
3. In the list of Autonomous Container Databases, click the display name of the primary or
standby database you wish to view details.
4. On the Autonomous Container Database Details page, click Rotate Encryption Key.
5. On the Rotate Encryption Key dialog, click Rotate Encryption Key.
6-125
Chapter 6
Using Autonomous Data Guard with Autonomous Database on Exadata Cloud@Customer
Note:
• After automatic failover concludes, a message displays on the details page of the
disabled standby database advising you that failover has occurred.
• Automatic failover is optional while configuring Autonomous Data Guard. You can
enable or disable automatic failover after configuring Autonomous Data Guard.
• The FastStartFailoverLagLimit configuration attribute establishes an
acceptable limit, in seconds, up to which the standby database can fall behind
the primary database, with respect to the redo applied. If the limit is reached,
then a fast-start failover does not occur. This attribute is used when fast-start
failover is enabled and the configuration is operating in maximum performance
mode.
The FastStartFailOverLagLimit attribute:
– Has a default value of 30 seconds
– Cannot be configured
– Is only applicable when in maximum performance protection mode
After the service resolves the issues with the former primary Autonomous Container Database,
you can perform a manual switchover to return both databases to their initial roles.
Once you provision the standby database, you can perform various management tasks related
to the standby database, including:
• Manually switching over a primary database to a standby database
• Manually failing over a primary database to a standby database
• Reinstating a primary database to standby role after failover
• Terminating a standby database
6-126
Chapter 6
Using Autonomous Data Guard with Autonomous Database on Exadata Cloud@Customer
WARNING:
Your standby database is in a snapshot standby role. Failover will convert your
snapshot standby database to physical standby by discarding all local updates to
your snapshot standby and applying data from your primary database.
5. Click Failover.
6. In the Confirm Manual Failover to Standby dialog box, enter the name of the Autonomous
Container Database you want to failover, and then click Failover.
Alternatively,
a. Under Resources, click Autonomous Data Guard to display a list of peer databases
for the primary database you are managing.
b. For the Data Guard association on which you want to perform a failover, click the
Actions icon (three dots), and then click Failover.
c. In the Confirm Manual Failover to Standby dialog box, enter the name of the
Autonomous Container Database you want to failover, and then click Failover.
Note:
After successful completion of failover, the standby ACDs role will change to
primary and the primay's role will become disabled-standby.
6-127
Chapter 6
Using Autonomous Data Guard with Autonomous Database on Exadata Cloud@Customer
6-128
Chapter 6
Using Autonomous Data Guard with Autonomous Database on Exadata Cloud@Customer
6-129
Chapter 6
Using Autonomous Data Guard with Autonomous Database on Exadata Cloud@Customer
Related Topics
• REST APIs
• Security Credentials
• Software Development Kits and Command Line Interface
6-130
Chapter 6
Using Autonomous Data Guard with Autonomous Database on Exadata Cloud@Customer
Note:
You cannot create an Autonomous Database for Developers instance on an
Autonomous Data Guard-enabled container database.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click Autonomous Databases.
3. Click Create Autonomous Database.
4. In the Create Autonomous Database dialog, enter the following:
Basic Database Information
• Compartment: Select the compartment of the Autonomous Database.
• Display Name: A user-friendly description or other information that helps you easily
identify the resource. The display name does not have to be unique. Avoid entering
confidential information.
• Database Name: The database name must consist of letters and numbers only,
starting with a letter. Avoid entering confidential information.
Workload Type
Select the desired workload type. See Autonomous Data Warehouse and Autonomous
Transaction Processing for information about each workload type.
Autonomous Container Database: Select the Autonomous Data Guard-enabled
Autonomous Container Databases checkbox, and then select an Autonomous Container
Database.
Compartment: Specify the compartment containing the Autonomous Container Database
you wish to use.
Database CPU Core Count and Storage Configuration
• CPU Count: The total number of cores available to all databases within the
Autonomous Exadata Infrastructure depends on the infrastructure shape and what is
already allocated to other Autonomous Databases.
The CPU type, that is, OCPU or ECPU is determined by the parent Autonomous
Exadata VM Cluster resource's compute type.
The selected CPU count is validated against a list of provisionable CPUs, and if the
database can not be scaled up to the chosen CPU count, you will be provided with the
two nearest provisionable CPU values.
Based on the resource utilization on each node; not all the values of the available
CPUs can be used to provision or scale Autonomous Databases. For example,
suppose you have 20 CPUs available at the AVMC level, not all the values from 1 to
20 CPUs can be used to provision or scale Autonomous Databases depending on the
resource availability at the node level. The list of CPU values that can be used to
provision or scale an Autonomous Database is called Provisionable CPUs.
6-131
Chapter 6
Using Autonomous Data Guard with Autonomous Database on Exadata Cloud@Customer
On the console, when you try to provision or scale an Autonomous Database, the CPU
count will be validated against the list of provisionable CPUs, and if the value is not
provisionable, you will be provided with the two nearest provisionable CPU values.
Alternatively, if you want to see the complete list of provisionable CPU values for an
Autonomous Exadata VM Cluster, you can use the following API:
GetAutonomousContainerDatabase returns a list of provisionable OCPU values that
can be used to create a new Autonomous Database in the given Autonomous
Container Database. See GetAutonomousContainerDatabase for more details.
For ECPUs, this value defaults to 2 ECPUs. For databases that need 2 or more
ECPUs, you must specify the number of assigned ECPUs in increment of 1.
Note:
CPU Overprovisioning is not allowed with ECPUs.
For OCPUs, the default value is 1 OCPU. However, you can assign a fractional OCPU
value from 0.1 to 0.9 (in increments of 0.1 OCPU) to databases that do not need a full
OCPU. This allows you to over-provision CPU and run more databases on each
infrastructure instance. For databases that need 1 or more OCPUs, you must specify
the number of assigned OCPUs as an integer. For example, you cannot assign 3.5
OCPUs to a database. The next available number of OCPUs above 3 is 4.
Databases with CPU over-provisioning can only connect using tp and low services.
Deselect Auto Scaling to disable auto-scaling. By default, auto-scaling is enabled to
allow the system to automatically use up to three times more CPU and IO resources to
meet workload demand.
• Storage (TB): Specify the storage you wish to make available to your Autonomous
Database, in terabytes. The available storage depends on the infrastructure shape and
what is already consumed by other Autonomous Databases.
Administrator Credentials
Set the password for the Autonomous Database Admin user by entering a password that
meets the following criteria. You use this password when accessing the Autonomous
Database service console and when using an SQL client tool.
• Contains from 12 to 30 characters
• Contains at least one lowercase letter
• Contains at least one uppercase letter
• Contains at least one number
• Does not contain the double quotation mark (")
• Does not contain the string "admin", regardless of casing
Configure network access
You can optionally create an ACL during database provisioning, or at any time thereafter.
a. Click Modify Access Control.
b. In the Edit Access Control List dialog, select the Enable database level access
control checkbox.
c. Under the Primary database access control list, specify the following types of
addresses in your list by using the IP notation type drop-down selector:
6-132
Chapter 6
Using Autonomous Data Guard with Autonomous Database on Exadata Cloud@Customer
IP Address allows you to specify one or more individual public IP addresses. Use
commas to separate your addresses in the input field.
CIDR Block allows you to specify one or more ranges of public IP addresses using
CIDR notation. Use commas to separate your CIDR block entries in the input field.
d. Under Standby database access control, do the following:
(Default) Same as primary database: Leave as is if you want the same access control
list for the secondary database.
Define standby database access control: Initialized with the same details as primary.
Add or modify entries, as applicable.
Advanced Options
Tags: Optionally, you can apply tags. If you have permission to create a resource, then you
also have permission to apply free-form tags to that resource. To apply a defined tag, you
must have permission to use the tag namespace. For more information about tagging, see
Resource Tags. If you are not sure if you should apply tags, skip this option (you can apply
tags later) or ask your administrator. Avoid entering confidential information.
Encryption Key: ADB inherits encryption settings from the parent ACD. If the parent ACD
is configured for customer-managed OKV-based encryption, then the child ADB will also
have TDE Master Key generated and managed in the same OKV wallet used to store ACD
master keys. Additionally, any backups taken on the Autonomous Database will have the
OKV-based key associated with it.
5. Click Create Autonomous Database.
Note:
The following naming restrictions apply to Autonomous Transaction Processing
and Autonomous Data Warehouse databases:
• Names associated with databases terminated within the last 60 days cannot
be used when creating a new database.
• A database name cannot be used concurrently for both an Autonomous Data
Warehouse and an Autonomous Transaction Processing database.
Related Topics
• About Autonomous Database
• GetAutonomousContainerDatabase
• Resource Tags
6-133
Chapter 6
Using Autonomous Data Guard with Autonomous Database on Exadata Cloud@Customer
4. In the Autonomous Database Details page, check the Autonomous Data Guard association
status and peer database state.
5. Under Resources, click Autonomous Data Guard to view association details.
Note:
You can rotate both Oracle-managed and customer-managed encryption keys.
1. Open the navigation menu. Under Oracle Database, click Exadata Cloud@Customer.
2. Click Autonomous Databases.
3. In the list of Autonomous Databases, click the display name of the database you wish to
view details.
4. On the Autonomous Database Details page, from the More Actions drop-down list, select
Rotate Encryption Key.
5. On the Rotate Encryption Key dialog, click Rotate Encryption Key.
6-134
Chapter 6
Using Autonomous Data Guard with Autonomous Database on Exadata Cloud@Customer
3. In the list of Autonomous Container Databases, click the display name of the container
database you are interested in.
4. On the Autonomous Container Database details page, click Edit Maintenance
Preferences.
In the Edit Automatic Maintenance dialog that opens, you can configure both the
maintenance schedule and the patch type.
Note:
The standby database will have No preference by default. Standby Maintenance
depends on the primary maintenance schedule.
5. Optionally, you can change the maintenance patch type. To edit this setting, select either
Release Update (RU) or Release Update Revision (RUR).
Release Update (RU): Autonomous Database installs only the most current release
update.
Release Update Revision (RUR): Autonomous Database installs the release update plus
additional fixes.
Note:
Standby will be always patched before primary and the default gap between
standby and primary is 7 days. You have have an option to change the default
gap to anytime between 1 - 7 days.
Note:
Maintenance quarters begin in February, May, August, and November, with
the first maintenance quarter of the year beginning in February.
• Under Week of the month, specify which week of the month maintenance will take
place. Weeks start on the 1st, 8th, 15th, and 22nd days of the month, and have a
duration of 7 days. Weeks start and end based on calendar dates, not days of the
week. Maintenance cannot be scheduled for the fifth week of months that contain more
than 28 days.
6-135
Chapter 6
Using Autonomous Data Guard with Autonomous Database on Exadata Cloud@Customer
• Under Day of the week, specify the day of the week on which the maintenance will
occur.
• Under Start hour, specify the hour during which the maintenance run will begin.
• Choose the buffer period between primary and standby maintenance execution. Buffer
period is the number of days before which the standby Autonomous Container
Database Maintenance will be scheduled before primary Autonomous Container
Database Maintenance
7. Click Save Changes.
View the Next Scheduled Maintenance Run of a Data Guard Enabled Autonomous
Container Database
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click Autonomous Databases.
3. In the list of Autonomous Container Databases, click the display name of the container
database you are interested in.
4. On the Autonomous Container Database details page, under Maintenance, click the View
link in the Next Maintenance field.
5. On the Maintenance page, under Autonomous Database Maintenance, click
Maintenance.
In the list of maintenance events, you can the details of scheduled maintenance runs.
Maintenance event details include the following:
• The status of the scheduled maintenance run
• The type of maintenance run (quarterly software maintenance or a critical patch)
• The OCID of the maintenance event
• The start time and date of the maintenance
6-136
Chapter 6
Using Autonomous Data Guard with Autonomous Database on Exadata Cloud@Customer
Note:
Patching primary immediately will result in standby being patched first, if standby is
not already patched.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click Autonomous Databases.
3. In the list of Autonomous Container Databases, click the display name of the Autonomous
Container Database that you want to patch.
4. On the Autonomous Container Database Details page, in the Maintenance section, click
the View link in the Next Maintenance field to display the Maintenance page for the
Autonomous Container Database that you want to patch.
5. In the Autonomous Container Database section, click Patch Now in the Scheduled
Start Time field to display the Run Maintenance dialog.
6. Click Patch Now to start the patching operation.
Note:
Skipping primary will skip standby also. If standby is patched, then skipping on
primary is not allowed.
1. Open the navigation menu. Under Oracle Database, click Exadata Database Service on
Cloud@Customer.
2. Click Autonomous Databases.
3. In the list of Autonomous Container Databases, click the display name of the container
database that you want to manage.
4. On the Autonomous Container Database details page, in the Maintenance section, click
the View link in the Next Maintenance field.
5. On the Maintenance page, any container database maintenance events planned for the
next 15 days will appear in the list of maintenance events.
To skip scheduled maintenance for a container database, click Skip.
6-137
Chapter 6
Using Performance Hub
Note:
You cannot skip scheduled maintenance more than twice, consecutively.
To reschedule maintenance, click Edit and enter a start time for the update in the
Edit Maintenance dialog. Ensure that your specified container database
maintenance window is later in the quarter than your scheduled Exadata
infrastructure maintenance.
6-138
7
Reference Guides for Oracle Exadata
Database Service on Cloud@Customer
• Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Learn to use the dbaascli utility on Oracle Exadata Database Service on
Cloud@Customer.
• Monitoring and Managing Exadata Storage Servers with ExaCLI
Learn to use the ExaCLI command-line utility to perform monitoring and management
functions on Exadata storage servers in the Exadata Cloud Service.
• Monitor Metrics for VM Cluster Resources
You can monitor the health, capacity, and performance of your VM clusters and databases
with metrics, alarms, and notifications. You can use Oracle Cloud Infrastructure Console,
Monitoring APIs, or Database Management APIs to view metrics.
• Metrics for Oracle Exadata Database Service on Cloud@Customer in the Monitoring
Service
Review the metrics emitted by the Oracle Exadata Database Service on Cloud@Customer
service in the oci_database_cluster and oci_database namespaces for Oracle
Databases.
• Oracle Exadata Database Service on Cloud@Customer Events
Oracle Exadata Database Service on Cloud@Customer resources emit events, which are
structured messages that indicate changes in resources.
• Policy Details for Oracle Exadata Database Service on Cloud@Customer
Learn to write policies to control access to Oracle Exadata Database Service on
Cloud@Customer resources.
• Managing Exadata Resources with Oracle Enterprise Manager Cloud Control
To manage and monitor Exadata Cloud and Exadata Cloud@Customer resources, use
Oracle Enterprise Manager Cloud Control.
• Observability and Management for Oracle Exadata Database Service on Cloud@Customer
• Security Guide for Oracle Exadata Database Service on Cloud@Customer Systems
This guide describes security for an Oracle Exadata Database Service on
Cloud@Customer system. It includes information about the best practices for securing the
Oracle Exadata Database Service on Cloud@Customer system.
• Troubleshooting Oracle Exadata Database Service on Cloud@Customer Systems
These topics cover some common issues you might run into and how to address them.
• About Using the dbaascli Utility on Oracle Exadata Database Service on Cloud@Customer
You can use the dbaascli utility to perform various database lifecycle and administration
operations on Oracle Exadata Database Service on Cloud@Customer such as creating an
7-1
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
To use the utility, you must be connected to an Exadata Cloud@Customer virtual machine. See
Connecting to a Virtual Machine with SSH.
To get possible commands available with dbaascli, run dbaascli --help.
To get command-specific help, run dbaascli command --help. For example, dbaascli
database create --help.
7-2
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
sudo -s
exit
For more details on advanced supported options, see dbaascli cswlib showImages.
Example 7-1 dbaascli cswlib showImages
2.IMAGE_TAG=19.8.0.0.0-NC
VERSION=19.8.0.0.0
DESCRIPTION=19c JUL 2020 Non CDB Image
IMAGE_ALIASES=19000-NC19800,19000-NCJUL2020
3.IMAGE_TAG=19.9.0.0.0
7-3
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
VERSION=19.9.0.0.0
DESCRIPTION=19c OCT 2020 DB Image
IMAGE_ALIASES=19000-19900,19000-OCT2020
4.IMAGE_TAG=19.9.0.0.0-NC
VERSION=19.9.0.0.0
DESCRIPTION=19c OCT 2020 Non CDB Image
IMAGE_ALIASES=19000-NC19900,19000-NCOCT2020
Note:
You can specify the target version in dbaascli dbhome create command as --
version value from the dbaascli cswlib showImages command output.
Related Topics
• Connecting to a Virtual Machine with SSH
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
• dbaascli cswlib showImages
To view the list of available Database and Grid Infrastructure images, use the dbaascli
cswlib showImages command.
Note:
You can create an Oracle Database home with a specified Oracle home name. If you
do not specify, then this is computed automatically (recommended).
sudo -s
dbaascli dbhome create --version Oracle Home Version --imageTag image Tag
Value
Where:
• --version specifies the Oracle Database version
• --imageTag specifies the Image Tag of the image to be used
7-4
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
For example:
Note:
Specifying imageTag is optional. To view the Image Tags, refer to command
dbaascli cswlib showImages. Image Tags are typically same as the version of
the database. However, it is kept as a provision for cases where multiple images
may need to be released for the same version - each catering to a specific
customer requirement.
exit
For more details on advanced supported options, see dbaascli dbhome create.
Related Topics
• Connecting to a Virtual Machine with SSH
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
• dbaascli dbhome create
To create an Oracle Database home of desired version, use the dbaascli dbhome create
command.
Note:
Databases created on a subset of nodes will not be displayed in the OCI console.
• Create Oracle Database version 12.1.0.2 or higher with the release update JAN 2021 or
higher. For databases with lower versions, it is recommended to use the OCI Console
based API.
1. Connect to the virtual machine as the opc user.
For detailed instructions, see Connecting to a Virtual Machine with SSH.
7-5
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
sudo -s
Where:
• --dbName specifies the name of the database
• --oracleHome specifies Oracle home location
To create a CDB, run the following command:
exit
For more details on advanced supported options, see dbaascli database create.
7-6
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
sudo -s
Where:
• --dbName specifies the name of the database
• --oracleHome specifies the Oracle home location
4. Exit the root user command shell:
exit
For more details on advanced supported options, see dbaascli database create.
Related Topics
• Connecting to a Virtual Machine with SSH
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
• dbaascli database create
To create Oracle Database, use the dbaascli database create command. When
prompted, enter the sys and tde passwords.
dbaascli database create --dbName database name --oracleHome Oracle Home Path
--resume
Note:
• While using the --resume or --revert command options, ensure that you use the
same command from the same node that was used for actual create operation
flow.
• You can resume database creation only if there is a failure in the post database
creation step.
7-7
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Related Topics
• Connecting to a Virtual Machine with SSH
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
• dbaascli database create
To create Oracle Database, use the dbaascli database create command. When
prompted, enter the sys and tde passwords.
Note:
if you are enabling Data Guard for a database, then the SYS password and the TDE
wallet password of the primary and standby databases must all be the same.
Note:
Using the dbaascli to change the SYS password will ensure the backup/restore
automation can parallelize channels across all nodes in the cluster.
2. Copy the blob file created to all the standby databases and update the file ownership to
oracle user.
7-8
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Note:
You can create custom database software images for your Oracle Exadata Database
Service on Cloud@Customer instances using the Console or API. These images are
stored in Object Storage, and can be used to provision a Database Home in your
Exadata instance. See Oracle Database Software Images more information.
You can control the version of Oracle binaries that is installed when you provision a new
database on an Oracle Exadata Database Service on Cloud@Customer instance by
maintaining the software images on the system. Oracle provides a library of cloud software
images that you can view and download onto your instance by using the dbaascli utility.
• Listing Available Software Images and Versions for Database and Grid Infrastructure
To produce a list of available supported versions for patching, use the dbaascli cswlib
showImages command.
• To download a software image
You can download available software images onto your Oracle Exadata Database Service
on Cloud@Customer instance by using the cswlib download subcommand of the
dbaascli utility.
Listing Available Software Images and Versions for Database and Grid Infrastructure
To produce a list of available supported versions for patching, use the dbaascli cswlib
showImages command.
7-9
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
sudo -s
exit
For more details on advanced supported options, see dbaascli cswlib showImages.
Example 7-2 dbaascli cswlib showImages
############
List of Available Database Images
#############
17.IMAGE_TAG=18.17.0.0.0
VERSION=18.17.0.0.0
DESCRIPTION=18c JAN 2022 DB Image
18.IMAGE_TAG=19.10.0.0.0
VERSION=19.10.0.0.0
DESCRIPTION=19c JAN 2021 DB Image
19.IMAGE_TAG=19.11.0.0.0
VERSION=19.11.0.0.0
DESCRIPTION=19c APR 2021 DB Image
20.IMAGE_TAG=19.12.0.0.0
VERSION=19.12.0.0.0
DESCRIPTION=19c JUL 2021 DB Image
21.IMAGE_TAG=19.13.0.0.0
VERSION=19.13.0.0.0
DESCRIPTION=19c OCT 2021 DB Image
Images can be downloaded using their image tags. For details, see help using
7-10
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Related Topics
• Connecting to a Virtual Machine with SSH
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
• dbaascli cswlib showImages
To view the list of available Database and Grid Infrastructure images, use the dbaascli
cswlib showImages command.
1. Connect to a compute node as the opc user. For detailed instructions, see Connecting to a
Virtual Machine with SSH.
2. Start a root user command shell:
$ sudo -s
#
The command displays the location of software images that are downloaded to your Oracle
Exadata Database Service on Cloud@Customer environment.
The optional parameters are:
• version: specifies an Oracle Database software version. For example, 19.14.0.0.0.
• imageTag: specifies the image tag of the image.
4. Exit the root user command shell:
# exit
$
Related Topics
• Connecting to a Virtual Machine with SSH
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
7-11
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
This will patch all databases running in the specified home, and the databases will remain in
the home after the patching is complete. The following apply to using the dbHome patch
command for in-place patching operations:
• You can patch all of your database nodes or a subset of nodes.
• Multi-node patching takes place in a rolling fashion.
• Optionally, you can perform a software-only patch operation. Then, when you are ready,
you can run datapatch to perform post-patch SQL actions.
• You can patch an Oracle home containing one or more databases.
To patch an Oracle Home (dbhome):
1. Connect to the virtual machine as the opc user.
For detailed instructions, see Connecting to a Virtual Machine with SSH.
2. Start a root user command shell:
sudo -s
7-12
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Where:
• --oracleHome identifies the path of the Oracle home to be patched.
• --targetVersion specifies the target Oracle Database version to use for patching,
specified as five numeric segments separated by periods (e.g. 19.12.0.0.0).
For example:
exit
For more details on advanced supported options, see dbaascli dbHome patch.
Related Topics
• Connecting to a Virtual Machine with SSH
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
• dbaascli dbHome patch
To patch Oracle home from one patch level to another, use the dbaascli dbHome patch
command.
After the database move operation is complete, the database runs using the Oracle Database
software version of the target Oracle Home.
To patch a database by moving it to a different Oracle Home:
1. Connect to the virtual machine as the opc user.
For detailed instructions, see Connecting to a Virtual Machine with SSH.
2. Start a root user command shell:
sudo -s
Where:
7-13
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
• --oracleHome identifies the path of the target Oracle home that uses the desired
Oracle Database software version. Note that the target Oracle home must exist in your
system prior to using the database move command.
• --dbname specifies the name of the database that is being moved.
For example:
exit
For more details on advanced supported options, see dbaascli database move.
Related Topics
• Connecting to a Virtual Machine with SSH
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
• dbaascli database move
To move the database from one home to another, use the dbaascli database move
command.
sudo -s
Where --targetVersion identifies target software version that the Oracle Grid
Infrastructure will be patched to.
For example:
exit
For more details on advanced supported options, see dbaascli grid patch.
7-14
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Related Topics
• Connecting to a Virtual Machine with SSH
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
• dbaascli grid patch
To patch Oracle Grid Infrastructure to the specified minor version, use the dbaascli grid
patch command.
Once the patched software image creation is completed, the image can then be used for
performing the patching operation.
2. Perform the patching operation.
Listing Available Software Images and Versions for Database and Grid Infrastructure
To produce a list of available supported versions for patching, use the dbaascli cswlib
showImages command.
sudo -s
7-15
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
exit
For more details on advanced supported options, see dbaascli cswlib showImages.
Example 7-3 dbaascli cswlib showImages
############
List of Available Database Images
#############
17.IMAGE_TAG=18.17.0.0.0
VERSION=18.17.0.0.0
DESCRIPTION=18c JAN 2022 DB Image
18.IMAGE_TAG=19.10.0.0.0
VERSION=19.10.0.0.0
DESCRIPTION=19c JAN 2021 DB Image
19.IMAGE_TAG=19.11.0.0.0
VERSION=19.11.0.0.0
DESCRIPTION=19c APR 2021 DB Image
20.IMAGE_TAG=19.12.0.0.0
VERSION=19.12.0.0.0
DESCRIPTION=19c JUL 2021 DB Image
21.IMAGE_TAG=19.13.0.0.0
VERSION=19.13.0.0.0
DESCRIPTION=19c OCT 2021 DB Image
Images can be downloaded using their image tags. For details, see help using
'dbaascli cswlib download --help'.
dbaascli execution completed
Related Topics
• Connecting to a Virtual Machine with SSH
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
• dbaascli cswlib showImages
To view the list of available Database and Grid Infrastructure images, use the dbaascli
cswlib showImages command.
7-16
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
sudo -s
Where:
• --oracleHome identifies the path of the Oracle home to be prechecked.
• --targetVersion specifies the target Oracle Database version to be patched to,
specified as five numeric segments separated by periods (e.g. 19.12.0.0.0).
4. Exit the root user command shell:
exit
Related Topics
• Connecting to a Virtual Machine with SSH
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
• dbaascli dbHome patch
To patch Oracle home from one patch level to another, use the dbaascli dbHome patch
command.
7-17
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
sudo -s
Where:
• --oracleHome identifies the path of the target Oracle Home that uses the desired
Oracle Database software version. Note that the target Oracle Home must exist in your
system prior to using the database move command.
• --dbname specifies the name of the database that is being moved
4. Exit the root user command shell:
exit
Related Topics
• Connecting to a Virtual Machine with SSH
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
• dbaascli database move
To move the database from one home to another, use the dbaascli database move
command.
sudo -s
7-18
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Where --targetVersion identifies target software version that the Oracle Grid
Infrastructure will be patched to, specified as five numeric segments separated by periods,
for example, 19.12.0.0.0
4. Exit the root user command shell:
exit
Related Topics
• Connecting to a Virtual Machine with SSH
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
• dbaascli grid patch
To patch Oracle Grid Infrastructure to the specified minor version, use the dbaascli grid
patch command.
sudo -s
exit
Related Topics
• Connecting to a Virtual Machine with SSH
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
7-19
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
sudo -s
3. Run the original patching command to roll back (revert) a patching operation:
For example:
Note:
• Resume and Rollback operations are supported for Oracle Home patching,
Oracle Grid Infrastructure patching, and database move operations.
• When resuming or rolling back a patching operation, you must run the
resume or rollback command from the same node that was used to run the
original patching command, and you must run the original command with the
addition of the --resume or --rollback flag.
exit
Related Topics
• Connecting to a Virtual Machine with SSH
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
• dbaascli dbHome patch
To patch Oracle home from one patch level to another, use the dbaascli dbHome patch
command.
• dbaascli grid patch
To patch Oracle Grid Infrastructure to the specified minor version, use the dbaascli grid
patch command.
7-20
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
The cloud tooling is automatically updated by Oracle when new releases are made available. If
needed, you can follow the steps below to ensure you have the latest version of the cloud-
specific tooling on all of the virtual machines in the VM cluster.
Note:
You can update the cloud-specific tooling by downloading and applying a software
package containing the updated tools.
sudo -s
3. To update to the latest available cloud tooling release, run the following command:
The command takes care of updating the cloud tooling release on all the nodes of the
cluster.
For more details and other available options, refer to dbaascli admin updateStack --
help.
Related Topics
• Connecting to a Virtual Machine with SSH
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
• dbaascli admin updateStack
To install or update a dbaastools RPM, use the dbaascli admin updateStack command.
7-21
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Note:
If a database is configured with OCI Vault for TDE encryption and you want to
duplicate a database, then refer to the following sections.
Note:
If source database is using OKV for TDE keystore management, current duplicate
database operation does not support this configuration.
7-22
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
• Make sure that there is a network path setup to access an on-prem database from the OCI
node through the EZConnect string.
• If an on-prem database is configured with TDE, copy the TDE wallet file (ewallet.p12 )
to the OCI node, where you decide to run the dbaascli command.
• Create an Oracle home on the OCI node if required. The Oracle home version must be the
same as the source or of a higher RU version.
dbaascli --version
DBAAS CLI version 23.3.2.0.0
For example:
dbaascli database duplicate --sourceDBConnectionString xyzhost.oracle.com:1521/
dbuniquename.oracle.com --dbName orcl --oracleHome /u02/app/oracle/product/
19.0.0.0/dbhome_1 --sourceDBTDEWalletLocation /tmp/wallet_copy/tde --
waitForCompletion false
Upon successful completion of this command, the database is duplicated to Cloud and ready
for sanity checks for application usage. Once verification is done, application connections can
be migrated to the Cloud database.
Refer to dbaascli database duplicate –help for additional configuration options.
7-23
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
management, make sure to adjust memory parameter values accordingly on the OCI side
by providing values for --sgaSizeInMB and --pgaSizeInMB.
• Verify that the on-prem database does not contain any deprecated or invalid initialization
parameters.
• Database initialization parameters related to database storage (datafile location, redo
location, recovery area destination, control file multiplexing) may be changed using the --
initParams argument.
For example, to override db_create_online_log_dest value for the duplicate database: --
initParams
db_create_online_log_dest_1=+DATAC1,db_create_online_log_dest_2=+RECOC1
Release Notes
Review the changes made in various releases of dbaascli.
7-24
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
7-25
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
7-26
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
– dbaascli system getGridHomes - This command gives details on the available Grid
Infrastructure homes on the system. For details, see dbaascli system getGridHomes
--help.
• Pluggable Database Operations
– Improvements in the area of refreshable pluggagble database lifecycle.
• Database Backup and Recovery
– Added support to configure backups on standby sites in case of Data Guard
configurations. The backups configuration are Data Guard site-specific, that is, the
change of roles (for example, with Data Guard switchover operation) will not impact
the backup operations of the database on primary or standby sites. Backups, if
configured on primary site or stand-by site, will continue regardless of the role-change.
• – Includes AHF version 23.5.2 - Release 23.3.1.0.0 (230817)
– Includes AHF version 23.5.4 - Release 23.3.1.0.0 (231020)
• Includes syslens version 2.3.6.9
• Various bug fixes and stability improvements
• Additional critical product fixes (231020)
7-27
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
– Introduced dbaascli pdb refresh to refresh a pluggable database that was created
using manual refresh option. For details, see dbaascli pdb refresh --help.
– Added option to convert refreshable pluggable database to a regular pluggable
database. For details, see dbaascli pdb open --help.
– Creation of a refreshable pluggable database now requires existing source database
user for creation of database link to the source pluggable database. For details, see
dblinkUserName argument in dbaascli pdb remoteClone --help.
• Includes AHF version 23.2.0
• Various bug fixes and stability improvements
7-28
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
– Introduced dbaascli tde rotateMasterKey to rotate the master key for database
encryption. For details, see dbaascli tde rotateMasterKey --help. The command
dbaascli tde rotate masterkey is now deprecated.
– Revamped workflow for all TDE operations. For details, see dbaascli tde --help
• Grid Infrastructure (GI) Patching
– Added support to allow parallel execution of patching operation on nodes. This option
needs to be carefully exercised as it results into reduced database availability.
• Database Backup and Recovery
– Revamped workflow for creating database from standalone backups
• Includes AHF version 22.2.4
• Various bug fixes and stability improvements
7-29
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
7-30
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
7-31
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
– Deprecated the support for dbaascli cswlib list command for cloud software library
listing operations. The new command is dbaascli cswlib showImages that lists the
images along with its of ImageTag. It is recommended to use Image tags to download
the images from the cloud software library. For details on downloads using image tags,
see dbaascli cswlib download –help.
– Various bug fixes and stability improvements
Release 21.4.1.1.0
• Enabled encryption of the system level tablespaces (SYSTEM, SYSAUX, UNDO, and TEMP) for
databases that will get created with this version of dbaastools onwards. This feature is
enabled for Oracle Database version 19.6.0.0.0 and above.
• Grid Patching:
– Prerequisite condition added to check for following file ownership to be owned by grid
user.
* <gi_home>/suptools/tfa/release/tfa_home/jlib/jdev-rt.jar
* <gi_home>/suptools/tfa/release/tfa_home/jlib/jewt4.jar
• Database Patching:
7-32
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Release 21.3.1.2.0
• Improved the timing of dbaascli operations with enhanced Control Plane metadata
synchronization logic.
• Enhanced dbaascli logs to have millisecond-level information along with the associated
thread.
• Introduced more prerequisite checks in database home patching and database move
operations to catch potential failures scenarios with suggestions to corrective action.
• Database patching operations now retain the state of the databases to be same as it was
prior to patching. For pluggable databases, pdb saved state is honored.
• Various bug fixes and stability improvements.
Release 21.3.1.1.0
• Added support to unlock PDB Admin user account as part of PDB creation, localClone, or
remoteClone operation. For details, see option --lockPDBAdminAccount in dbaascli pdb
create --help.
7-33
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
• Fixed an issue that updates the database resource registered with Oracle Grid
Infrastructure in existing environments with the correct value of database name.
• Enhanced PDB lifecycle operations.
• Various bug fixes and stability improvements.
Release 21.3.1.0.1
• Support for the following dbaascli commands to be run as oracle user.
– dbaascli pdb bounce
– dbaascli pdb close
– dbaascli pdb connectString
– dbaascli pdb create
– dbaascli pdb delete
– dbaascli pdb getDetails
– dbaascli pdb list
– dbaascli pdb localClone
– dbaascli pdb open
– dbaascli pdb remoteClone
• Revamped out-of-place patching of database. For details, see dbaascli database move –
help.
• Timing related enhancements in Oracle Grid Infrastructure patching workflow. For details,
see dbaascli grid patch –help.
• Deprecated the support for exadbcpatchmulti / dbaascli patch for patching operations.
The dbaascli dbhome patch and dbaascli grid patch commands are provided for
patching operation for database homes and Oracle Grid Infrastructure. Refer to the
Patching Oracle Grid Infrastructure and Oracle Database Using dbaascli section for
details. Also see, dbaascli Command Reference section.
• Deprecated the support for dbaascli tools patch command to bring consistency in the
dbaascli command conventions. The new command is dbaascli admin updateStack. For
details, see section Updating Cloud Tooling using dbaascli.
• Ability to run dbaascli in disconnected mode for long running operations. Executing
dbaascli command with --waitForCompletion false gets you a job ID that can be
queried later to get the status of the operation, using dbaascli job getStatus –jobid
job_id. This is useful for long running operations where users may want to get the control
back immediately after command execution. In this release, this option is available only for
dbaascli database create command. More commands will be added in subsequent
releases to have this support. The help output for those commands will reflect the support
of --waitForCompletion option.
• Deprecated the support for dbaascli shell. It is recommended that users run the complete
dbaascli commands on the command prompt as suggested in all the document examples.
Execution of just dbaascli will show the output of its usage help instead of entering into a
dbaascli shell.
• Various bug fixes and stability improvements.
7-34
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Release 21.2.1.x.x
• Redesigned Oracle Grid Infrastructure patching operation and added ability to resume from
failed point, patch on subset of nodes, instance draining, and other enhancements. For
details, see dbaascli grid patch --help. Also refer to the Patching Oracle Grid
Infrastructure and Oracle Database Using dbaascli section.
• Deprecated the support for exadbcpatchmulti / dbaascli patch for patching operations.
dbaascli dbhome patch and dbaascli grid patch commands are provided for patching
operation for database homes and Oracle Grid Infrastructure. Refer to the Patching Oracle
Grid Infrastructure and Oracle Database Using dbaascli section for details. Also see,
dbaascli Command Reference section.
• Deprecated the support for dbaascli tools patch command to bring consistency in the
command conventions. The new command is dbaascli admin updateStack.
• Redesigned PDB management APIs for create, local clone, and remote clone operations.
For details, see dbaascli pdb --help.
• Redesigned database delete API. For details, see dbaascli database delete --help.
• Revamped dbhome creation (support for custom software image, scale-out operation). For
details, see dbaascli dbhome create --help.
• Support for database creation on subset of cluster nodes. For details, see dbaascli
database create --help.
• Ability to run dbaascli in disconnected mode for long running operations. Executing
dbaascli command with --waitForCompletion false gets you a job ID that can be
queried later to get the status of the operation, using dbaascli job getStatus –jobid
job_id. This is useful for long running operations where users may want to get the control
back immediately after command execution. In this release, this option is available only for
dbaascli database create command. More commands will be added in subsequent
releases to have this support. The help output for those commands will reflect the support
of --waitForCompletion option.
• Enhanced dbhome patching experience with introduction of multiple options like skipPDBs,
continueWithDowntime, and so on. For details, see dbaascli dbhome patch --help.
• Support for better diagnostic collection. For details, see dbaascli diag collect --help.
• Minor improvements in the area of database upgrade automation.
• Various bug fixes and stability improvements.
7-35
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
7-36
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
7-37
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Prerequisites
Run the command as the root user.
To use the utility, you must connect to an Exadata Database Service on Cloud@Customer
virtual machine.
See, Connecting to a Virtual Machine with SSH.
Syntax
Where:
• --resume resumes the previous execution
• --prechecksOnly runs only the prechecks for this operation
• --nodes specifies a comma-delimited list of nodes to install the RPM on. If you do not pass
this argument, then the RPM will be installed on all of the cluster nodes
7-38
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: Ensure you are running the command as the root user and that you are connected to an
Exadata Cloud Infrastructure virtual machine. Check if there are any specific error messages
and consult the command documentation or Oracle support if needed.
Q: How do I connect to an Exadata Cloud Infrastructure virtual machine to use the
dbaascli admin updateStack command?
A: You need to use SSH to connect to the virtual machine. Refer to the section on "Connecting
to a Virtual Machine with SSH" in the documentation for detailed instructions.
Installs or updates the dbaastools RPM on all nodes of the Exadata Cloud@Customer
environment.
Example 2: Running prechecks only before installing or updating the RPM
dbaascli admin updateStack --prechecksOnly
Runs only the prechecks for the dbaastools RPM update, without actually performing the
installation. It ensures that all prerequisites are satisfied before proceeding with the update.
Example 3: Resuming a previously interrupted updateStack operation
dbaascli admin updateStack --resume
Resumes a previous dbaastools RPM update operation that was interrupted or did not
complete successfully.
Example 4: Installing or updating dbaastools on specific nodes
dbaascli admin updateStack --nodes node1,node2
Installs or updates the dbaastools RPM on the specified nodes node1 and node2 only, without
affecting other nodes in the cluster.
Example 5: Resuming the updateStack process on specific nodes
dbaascli admin updateStack --resume --nodes node3,node4
Resumes the update process for dbaastools on the specific nodes node3 and node4 only, if
the previous execution was interrupted.
Related Topics
• Connecting to a Virtual Machine with SSH
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
Prerequisite
Run the command as the root user.
To use the utility, you must connect to an Exadata Cloud@Customer virtual machine.
7-39
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Syntax
Where:
• --jodID specifies the job ID
Checks the status of the job with the ID 12345. The output will show the current state of the job
(e.g., in progress, completed, or failed).
Example 2: Checking the status of a patching job using job ID
dbaascli job getStatus --jobID 98765
Retrieves the status of a patching job with the ID 98765 to see whether the patch has been
applied successfully or is still running.
Example 3: Checking the status of a database backup job
dbaascli job getStatus --jobID 45678
Checks the status of a database backup job with the ID 45678. The output will provide details
about the progress or completion of the backup.
Example 4: Checking a long-running job’s progress
dbaascli job getStatus --jobID 23456
Check the progress of a long-running job (ID 23456) to see if it’s still executing or has finished.
Example 5: Viewing the status of a database creation job
dbaascli job getStatus --jobID 67890
Checks the status of a database creation job identified by the job ID 67890.
Related Topics
• Connecting to a Virtual Machine with SSH
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
CPU Scaling
This section focuses on adjusting CPU resources in a VM cluster. It includes commands like
dbaascli cpuscale get_status to check the status of current or past scaling requests, and
7-40
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
dbaascli cpuscale update to increase or decrease the number of CPU cores allocated to a
virtual machine, allowing flexible resource management based on workload demands.
• dbaascli cpuscale get_status
To check the status of current or last scale request performed when network connectivity
between the Control Plane Server and OCI region is disrupted, use the dbaascli
cpuscale get_status command.
• dbaascli cpuscale update
To scale up or down the CPU core count for a virtual machine in a VM cluster when
network connectivity between the Control Plane Server and OCI region is disrupted, use
the dbaascli cpuscale update command.
Prerequisites
Run the command as the root user.
To use the utility, you must connect to an Exadata Cloud@Customer virtual machine.
See, Connecting to a Virtual Machine with SSH.
Syntax
Displays various command execution states as it progresses from scheduled, running, and
finally to success or failure.
7-41
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Checks the status of the current or last CPU scaling request. It will provide information on
whether the scaling is scheduled, running, or has completed with success or failure.
Example 2: Checking the status after a scaling request failed
A scaling operation was requested but encountered network issues between the Control Plane
Server and the OCI region.
dbaascli cpuscale get_status
Checks the status of the scaling request. Since the scaling process failed due to network
issues, the output will provide details about the failure state.
Example 3: Checking the status when scaling is in progress
A CPU scaling operation is ongoing, and the user wants to monitor its progress.
dbaascli cpuscale get_status
Checks the current status, showing that the scaling request is in the "running" state. It allows
the user to track the operation until it completes or fails.
Example 4: Checking the status after successful scaling completion
A scaling operation was performed and completed successfully.
dbaascli cpuscale get_status
Checks the status and confirms that the scaling operation has successfully completed. It
reports the final state as "success."
Related Topics
• Connecting to a Virtual Machine with SSH
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
Prerequisites
Run the command as the root user.
To use the utility, you must connect to an Exadata Cloud@Customer virtual machine.
7-42
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Syntax
Exadata Database Service on Cloud@Customer is considered to be in a Disconnected mode
when there is a loss of connectivity with the DBaaS control plane running on Oracle Cloud
Infrastructure (OCI).
Where:
• --coreCount specifies the target number of CPUs you want to scale up or down for each
VM in the cluster
• --message optionally, you can include a message for your reference
7-43
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Scales the CPU core count up to 20, and includes a message "Scaling up for increased
demand" for reference.
Example 2: Scaling down CPU cores to 8
The VM cluster is currently using 12 cores, but you want to reduce the count to 8 to save
resources.
dbaascli cpuscale update --coreCount 8 --message "Reducing CPU for maintenance
period"
Reduces the number of CPU cores to 8 and provides a message for future reference about
why the scaling operation was performed.
Example 3: Scaling CPU without a message
You need to scale the CPU cores from 32 to 24, but no additional message is necessary.
dbaascli cpuscale update --coreCount 24
This command scales the core count down to 24 without any message. The operation will be
carried out with the default logging of actions.
Example 4: Verifying the status after scaling CPU
After running the scaling command, you want to check if the update was successful.
dbaascli cpuscale get_status
Checks the status of the current or last scaling request, allowing you to confirm whether the
scale-up or scale-down operation was successful.
Example 5: Attempting to scale when VM is already at maximum cores
The VM cluster already has the maximum allowed CPU cores (48), but an attempt is made to
scale up.
dbaascli cpuscale update --coreCount 50 --message "Attempt to scale beyond limit"
Fail since the VM cluster cannot exceed its maximum allowed cores. The status will reflect the
failure after attempting to scale to 50 cores.
Related Topics
• Connecting to a Virtual Machine with SSH
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
7-44
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
software images. You can also view available images locally with dbaascli cswlib listLocal
or check all available Database and Grid Infrastructure images using dbaascli cswlib
showImages. These commands help manage and maintain software libraries efficiently.
Syntax
Where:
• --imageTag specifies Oracle home image tag
7-45
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: What happens if I run the dbaascli cswlib deleteLocal command without specifying
the --imageTag?
A: The command will fail because the --imageTag is required to identify which local image
should be deleted.
Q: Is it possible to recover a local image after it has been deleted using this command?
A: No, once the local image is deleted using the dbaascli cswlib deleteLocal command, it
cannot be recovered. Make sure to verify the image tag before proceeding.
Q: When would I need to use the dbaascli cswlib deleteLocal command?
A: You would use this command when you need to remove an unused or outdated Oracle
home image from the local system to free up space or clean up your environment.
Example 7-4 dbaascli cswlib deletelocal
Related Topics
• Connecting to a Virtual Machine with SSH
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
Prerequisites
Run the command as the root user.
To use the utility, you must connect to an Exadata Database Service on Cloud@Customer
virtual machine.
See, Connecting to a Virtual Machine with SSH.
Syntax
Where:
• --version specifies an Oracle home image version
• --imageTag specifies the image tag of the image
• --product specifies the image type. Valid values: database or grid
7-46
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: How do I use the --imageTag option in the dbaascli cswlib download command?
A: The --imageTag option is used to specify the image tag of the software image you want to
download.
Q: What is the purpose of the --product option in the command?
A: The --product option specifies the type of image you want to download. The valid values
are database or grid.
Q: Can I download both database and grid images simultaneously?
A: No, you must specify either database or grid using the --product option, so each
download operation is specific to one type of image.
Q: What happens if I do not specify a version or image tag?
A: The command will likely fail or prompt you for the required information since the --version
or --imageTag options are necessary to identify the specific software image to download.
7-47
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Related Topics
• Connecting to a Virtual Machine with SSH
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
Syntax
Where:
• --product identifies Oracle home product type. Valid values: database or grid.
Q: What does the --product option represent in the dbaascli cswlib listLocal command?
A: The --product option identifies the Oracle home product type, allowing you to filter the list
of available images to either database or grid types.
7-48
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: The --product option lets you filter the list, so by specifying database or grid, you will only
see the images relevant to that product type, making it easier to differentiate.
Q: Is there any risk associated with running the dbaascli cswlib listLocal command?
A: No, this command is non-destructive and only displays information about locally available
images. It does not modify or delete any files.
Q: Does this command display remote or cloud-stored images?
A: No, the dbaascli cswlib listLocal command only displays images that are available
locally on your system, not those stored remotely or in the cloud.
Example 7-7 dbaascli cswlib listlocal
Related Topics
• Connecting to a Virtual Machine with SSH
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
Syntax
Where:
• --product identifies Oracle home product type. Valid values: database or grid.
7-49
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
7-50
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Related Topics
• Connecting to a Virtual Machine with SSH
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
Database Management
This section covers comprehensive tasks for managing Oracle Databases. It includes
commands for creating (dbaascli database create), deleting (dbaascli database delete),
and upgrading databases (dbaascli database upgrade). Other key tasks include adding and
deleting instances (dbaascli database addInstance, dbaascli database deleteInstance),
managing backups (dbaascli database backup), and handling database recovery (dbaascli
database recover). You can also modify database parameters, manage pluggable databases,
patch databases, and convert non-CDB databases to PDBs. These commands ensure efficient
control over the entire database lifecycle.
• dbaascli database addInstance
To add the database instance on the specified node, use the dbaascli database
addInstance command.
• dbaascli database backup
To configure Oracle Database with a backup storage destination, take database backups,
query backups, and delete a backup, use the dbaascli database backup command.
• dbaascli database bounce
To shut down and restart a specified Exadata Database Service on Cloud@Customer
database, use the dbaascli database bounce command.
• dbaascli database changepassword
To change the password of a specified Oracle Database user, use the dbaascli database
changePassword command. When prompted enter the user name for which you want to
change the password and then enter the password.
• dbaascli database convertToPDB
To convert the specified non-CDB database to PDB, use the dbaascli database
convertToPDB command.
• dbaascli database create
To create Oracle Database, use the dbaascli database create command. When
prompted, enter the sys and tde passwords.
• dbaascli database createTemplate
Use this command to create database templates (DBCA templates) that can subsequently
be used to create databases.
• dbaascli database delete
To delete an Oracle Database, use the dbaascli database delete command.
• dbaascli database deleteInstance
To delete the database instance on the specified node, use the dbaascli database
deleteInstance command.
• dbaascli database duplicate
To create a database from an active database, use the dbaascli database duplicate
command.
• dbaascli database getDetails
This command shows the detailed information of a given database e.g. dbname, node
information, pluggable databases information etc.
7-51
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Prerequisite
• Run the command as the root user.
Syntax
Where:
• --dbname specifies Oracle Database name
• --node specifies the node name for the database instance
– --newNodeSID specifies SID for the instance to add in the new node
7-52
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: What is the --node option used for in the dbaascli database addInstance command?
A: The --node option specifies the name of the node where the new database instance will be
added.
Q: What is the purpose of the --newNodeSID option in this command?
A: The --newNodeSID option allows you to specify the SID (System Identifier) for the new
database instance that will be created on the specified node.
Q: Is it mandatory to specify the --newNodeSID option when adding a new instance?
A: The --newNodeSID option is optional. If not provided, Oracle will automatically generate an
SID for the new database instance.
Q: When should I use the dbaascli database addInstance command?
A: Use this command when you want to scale your database by adding a new instance to an
additional node in a multi-node Oracle Database setup.
Q: Can I add multiple database instances to different nodes using this command?
A: Yes, you can run the command multiple times to add database instances to different nodes
by specifying the appropriate --node and --dbname values.
Q: What happens if the node specified in the --node option is not available?
A: The command will fail if the specified node is not available or reachable. Ensure that the
node is properly configured and accessible before running the command.
Q: Can this command be used in a Data Guard environment?
A: Yes, you can use the dbaascli database addInstance command in a Data Guard
environment to add instances, but it is recommended to follow the necessary Data Guard
guidelines for such configurations.
Q: Will this command cause database downtime?
A: Adding an instance to a new node typically does not cause downtime for the existing
database instances, but it’s recommended to check your environment for any specific
dependencies.
Prerequisite
• Run the command as the root user.
Syntax
7-53
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
{
[--archival --tag <value>]
| [--archivelog]
}
| --delete --backupTag <value>
| --status --uuid <value> [--json <value>]
| --getBackupReport
{
--tag <value>
| --latest
}
--json <value>
| --configure
{
--configFile <value>
| --enableRTRT
| --disableRTRT
| --disableCatalog
| --deleteImmutableConfiguration
}
| --getConfig
{
[--configFile <value>]
| [--showOldParams]
}
| --validate [--untilTime <value>]
| --showHistory [--all]
| --getSchedules
}
Where:
--dbname specifies Oracle Database name
--list returns database backup information
[--backupType | --json]
[--backupType specifies backupType (REGULAR-L0 | REGULAR-L1 | ARCHIVELOG |
LONGTERM). ]
[--json specifies file Name for JSON output. ]
--start begins database backup.
[--level0 creates a Level-0 (full) backup. ]
[--level1 creates a Level-1 (incremental) backup. ]
[--archival | --archivelog]
[--archival creates an archival full backup. ]
--tag specifies backup tag.
[--archivelog ]
--delete deletes Archival backup.
--backupTag specifies backup tag to delete.
--status displays the details about a backup job process.
--uuid unique identifier of the backup operation. Input format: xxxxxxxx-
xxxx-xxxx-xxxx-xxxxxxxxxxxx.
[--json specifies file Name for JSON output. ]
--getBackupReport returns BackupReport.
--tag | --latest
--tag specifies backup tag.
--latest returns latest backup report (all types of database backup).
--json specifies file Name for JSON output.
--configure configures database for backup.
--configFile | --enableRTRT | --disableRTRT | --disableCatalog | --
deleteImmutableConfiguration
7-54
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Note:
enableRTRT and disableRTRT are applicable only for ZDLRA backup destination on
Exadata Database Service on Cloud@Customer.
7-55
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: How can I check the status of a specific backup using the command?
A: You can check the status of a backup by using the --status option with the --uuid
parameter, like this:
dbaascli database backup --dbname <value> --status --uuid <backup_uuid>
To enable RTRT:
dbaascli database backup --dbname <value> --configure --enableRTRT
Q: What does the --validate option do in the dbaascli database backup command?
A: The --validate option checks if backups are complete and free from corruption. You can
specify a time range using the --untilTime option:
dbaascli database backup --dbname <value> --validate --untilTime "DD-MON-YYYY
HH24:MI:SS"
7-56
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: What are RTRT (Real-Time Redo Transport) options and when should I use them?
A: The RTRT options (--enableRTRT and --disableRTRT) are used to control Real-Time Redo
Transport, applicable only for ZDLRA (Zero Data Loss Recovery Appliance) backup
destinations in Exadata Cloud@Customer environments. Enable RTRT to ensure real-time
redo log shipping.
Example 7-9 Examples
• To change the archive log retention period follow the below steps:
• To set backup configuration for a database myTestDB by modifying the config file with
configuration details:
7-57
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Prerequisites
Run the command as the oracle user.
Syntax
Where:
• --dbname specifies the name of the database
• --rolling specifies true or false to bounce the database in a rolling manner. Default
value is false.
The command performs a database shutdown in immediate mode. The database is then
restarted and opened. In Oracle Database 12c or later, all of the PDBs are also opened.
7-58
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: Yes, if the database is running Oracle Database 12c or later, the command will automatically
open all Pluggable Databases (PDBs) after restarting the database.
Q: Can the dbaascli database bounce command be used in a multi-node or RAC (Real
Application Clusters) environment?
A: Yes, in a multi-node or RAC environment, you can use the --rolling option to restart the
database instances one by one, minimizing downtime.
Q: What happens if I do not specify the --rolling option?
A: If the --rolling option is not specified, or if it's set to false, the command will shut down
and restart all database instances at the same time, which may cause a brief downtime.
Q: Is there a default value for the --rolling option in the dbaascli database bounce
command?
A: Yes, the default value for the --rolling option is false, meaning the database will be
bounced in a non-rolling fashion unless otherwise specified.
Q: How do I restart a database in rolling mode?
A: To restart the database in rolling mode, use the following syntax:
dbaascli database bounce --dbname <value> --rolling true
Q: Is it safe to run the dbaascli database bounce command during active sessions?
A: While the command uses an immediate shutdown, which rolls back uncommitted
transactions, it is always recommended to ensure there are no critical or active sessions before
bouncing the database.
Q: Can this command be used for specific PDBs in a multitenant database?
A: No, the dbaascli database bounce command operates on the entire database. In Oracle
12c or later, it will bounce the Container Database (CDB) and open all PDBs, but it does not
allow for bouncing individual PDBs.
Q: What should I do if the database does not come back online after bouncing it?
A: If the database fails to restart, check the logs for any errors during the shutdown or startup
process. Investigating the Oracle alert logs may provide insight into what caused the issue.
Example 7-10 dbaascli database bounce
Prerequisites
Run the command as the root or oracle user.
7-59
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Syntax
Where:
• --dbname specifies the name of the Oracle Database that you want to act on
• --user specifies the user name whose password change is required
• --prepareStandbyBlob specifies true to generate a blob file containing the artifacts
needed to change the password in a Data Guard environment. Valid values: true|false
• --blobLocation specifies the custom path where blob file will be generated
• --standbyBlobFromPrimary specifies the standby blob file, which is prepared from the
primary database
• --resume specifies to resume the previous execution
– --sessionID specifies to resume a specific session ID
7-60
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
7-61
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Syntax
Where:
• --dbname specifies the name of Oracle Database
• --cdbName specifies the name of the target CDB in which the PDB will be created. If the
CDB does not exist, then it will be created in the same Oracle home as the source non-
CDB
• --executePrereqs specifies to run only the pre-conversion checks
• --copyDatafiles specifies to create a new copy of the data files instead of using the ones
from the source database
• --backupPrepared flag to acknowledge that a proper database backup is in place for the
non-CDB prior to performing the conversion to PDB
• --targetPDBName specifies the name of the PDB that will be created as part of the
operation
• --waitForCompletion specifies false to run the operation in the background. Valid values:
true|false
• --resume specifies to resume the previous execution
– --sessionID specifies to resume a specific session ID
7-62
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
7-63
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
To run a full conversion with a copy of the data files from the non-CDB:
Use this command to create Oracle Database version 12.1.0.2 or higher with the release
update JAN 2021 or higher. For databases with lower versions, it is recommended to use the
OCI Console based API.
Prerequisite
Run the command as the root user.
Syntax
Where:
• --dbname specifies the name of the database
• --oracleHome specifies the location of the Oracle home
• --oracleHomeName specifies the name of the Oracle home
• --dbUniqueName specifies database unique name
7-64
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
7-65
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: How can I specify the database character set and national character set?
A: Use the --dbCharset option to specify the database character set and the --dbNCharset
option to specify the national character set. For example:
dbaascli database create --dbName <db_name> --dbCharset AL32UTF8 --dbNCharset
AL16UTF16
Q: How do I set the memory settings (SGA and PGA) for the database?
A: Use the --sgaSizeInMB option to specify the SGA size and the --pgaSizeInMB option to
specify the PGA size, both in megabytes.
Q: How do I specify the destination for datafiles and Fast Recovery Area (FRA)?
A: Use the --datafileDestination option to specify the ASM disk group for datafiles, and the
--fraDestination option to specify the ASM disk group for the FRA. You can also set the FRA
size with the --fraSizeInMB option.
7-66
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: Can I lock the PDB admin account during the creation of a CDB?
A: Yes, you can use the --lockPDBAdminAccount option and set it to true to lock the PDB
admin account after database creation. By default, this value is set to true.
Syntax
Create a new DBCA template from the specified database.
Where:
• --dbname specifies the name of the database
• --templateLocation specifies the template name
• --uploadToObjectStorage: specifies to upload the template to Object Storage
– --objectStorageLoginUser: specifies the Object Storage login user
7-67
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: How do I specify the Object Storage login details when uploading the template?
A: Use the following options to specify Object Storage details:
--objectStorageLoginUser: Specifies the Object Storage login user.
--objectStorageUrl: (Optional) Specifies the URL of the Object Storage if it is different from
the default one.
For example:
dbaascli database createTemplate --dbname <db_name> --uploadToObjectStorage --
objectStorageLoginUser <user> --objectStorageBucketName <bucket_name>
7-68
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: The --rmanParallelism option specifies the level of parallelism for RMAN operations during
the template creation process. For example:
dbaascli database createTemplate --dbname <db_name> --rmanParallelism 4
Prerequisite
Run the command as the root user.
Syntax
Where:
• --dbname specifies the name of the database.
• --deleteArchiveLogs specifies true or false to indicate deletion of database archive
logs.
• --deleteBackups specifies true or false to indicate deletion of database backups.
7-69
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
• --precheckOnly specifies yes to run only the prechecks for this operation. Valid values:
yes or no.
• --waitForCompletion specifies false to run the operation in the background. Valid values:
true or false.
• –-force flag to force delete database.
• --dbSID specify database SID.
• --resume to resume the previous execution.
• --sessionID to resume a specific session id.
Q: How can I run only the prechecks for the delete operation without actually deleting
the database?
A: You can use the --precheckOnly option and set it to yes to run the prechecks without
deleting the database. For example:
dbaascli database delete --dbname <db_name> --precheckOnly yes
7-70
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: Yes, you can specify the SID of the database using the --dbSID option. For example:
dbaascli database delete --dbname <db_name> --dbSID <sid>
Q: What user privileges are required to run the dbaascli database delete command?
A: The command must be run as the root user.
Q: What does the --precheckOnly option do in the dbaascli database delete command?
A: The --precheckOnly option allows you to run only the prechecks for the delete operation
without actually deleting the database. It ensures that all checks pass before proceeding with
the actual deletion.
Q: Can I delete a database without waiting for the operation to complete?
A: Yes, by setting the --waitForCompletion option to false, the delete operation will run in the
background, and you don't have to wait for it to complete.
Example 7-14 dbaascli database delete
Prerequisite
• Run the command as the root user.
Syntax
Where:
• --dbname specifies Oracle Database name
• --node specifies the node name for database instance
• --continueOnUnreachableNode specifies to perform the operation even if the node is
unreachable
7-71
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: What happens if the node specified is unreachable during the delete instance
operation?
A: If the node is unreachable and the --continueOnUnreachableNode option is not used, the
operation will fail. If the option is used, the operation will continue even if the node cannot be
accessed.
Q: How do I delete a database instance from a specific node?
A: Use the following command to delete a database instance from a specific node:
dbaascli database deleteInstance --dbname <db_name> --node <node_name>
Q: What user privileges are required to run the dbaascli database deleteInstance
command?
A: The command must be run as the root user.
7-72
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Prerequisite
• Run the command as the root user.
Syntax
Where:
• --dbName specifies Oracle Database name
• --sourceDBConnectionString specifies source database connection string in the format of
<scan_name>:<scan_port>/<database_service_name>
• --oracleHome specifies Oracle home location
• --oracleHomeName specifies Oracle home name
• --dbSID specifies database SID
• --dbUniqueName specifies database unique name
• --sgaSizeInMB specifies sga_target value in mega byte unit
• --pgaSizeInMB specifies pga_aggregate_target value in mega byte unit
7-73
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
• --datafileDestination specifies ASM disk group name to use for database datafiles
• --fraDestination specifies ASM disk group name to use for database fast recovery area
• --fraSizeInMB specifies fast recovery area size value in mega byte unit
• --sourceDBWalletLocation specifies source database TDE wallet file location. This is
required to duplicate database from active database
• --nodeList specifies a comma-delimited list of nodes for the database
• --resume specifies to resume the previous execution
– --sessionID specifies to resume a specific session ID
• --revert specifies to rollback the previous execution
– --sessionID specifies to rollback a specific session ID
• --rmanParallelism specifies parallelsim value
• --rmanSectionSizeInGB specifies RMAN section size in GB
• --tdeConfigMethod specifies TDE configuration method. Allowed values are FILE and KMS.
• --kmsKeyOCID specifies KMS key OCID to use for TDE. This is applicable only if KMS is
selected for TDE.
• --sourceDBTdeConfigMethod specifies source database TDE configuration method.
Allowed values are FILE and KMS.
• --sourceDBKmsKeyOCID specifies source database KMS key OCID to use for TDE. This is
applicable only if KMS is selected for TDE.
• --executePrereqs specifies yes to run only the prereqs for this operation. Valid values:
yes|no
• --waitForCompletion specifies false to run the operation in background. Valid values:
true|false
• --skipPDBs specifies a comma-delimited list of source database PDB names, which needs
to be excluded for the duplicate database operation. Example: pdb1,pdb2...
Q: How do I specify the location of the Oracle Home for the new database?
A: You can specify the Oracle Home location using the --oracleHome option or the Oracle
Home name using the --oracleHomeName option. For example:
7-74
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
--oracleHome <value>
or
--oracleHomeName <value>
or
--tdeConfigMethod KMS --kmsKeyOCID <value>
7-75
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Prerequisites
Run the command as the root user or the oracle user
Syntax
Where :
• --dbname - Oracle database name.
Q: What does the --dbname option specify in the dbaascli database getDetails
command?
A: The --dbname option specifies the name of the Oracle database for which detailed
information is being retrieved.
Q: What kind of information does the dbaascli database getDetails command provide?
A: The command provides details such as the database name, node information, and
information about pluggable databases (PDBs) associated with the container database.
7-76
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Syntax
Where:
• --dbname specifies the name of the container database
Prerequisite
Run the command as the root user.
7-77
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Syntax
Where:
• --dbname specifies the name of the database.
• --setParameters specifies a comma-delimited list of parameters to modify with new
values. For example: parameter1=valueA,parameter2=valueB, and so on. For blank values
use parameter1=valueA,parameter2='',etc.
• --resetParameters specifies a comma-delimited list of parameters to be reset to their
corresponding default values. For example, parameter1,parameter2, and so on.
• --instance specifies the name of the instance on which the parameters will be processed.
If not specified, then the operation will be performed at the database level.
• --backupPrepared acknowledges that a proper database backup is in place prior to
modifying critical or sensitive parameters.
• --allowBounce grants permission to bounce the database in order to reflect the changes
on applicable static parameters.
• --waitForCompletion specify false to run the operation in background. Valid values : true|
false.]
7-78
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: What happens if I don't allow the database to bounce when changing static
parameters?
A: If you do not use the --allowBounce option when modifying static parameters, the changes
will not take effect until the next manual database restart.
Q: Can I resume modifying parameters if an earlier session was interrupted?
A: No, this command does not support session resumption. You will need to re-run the
command from the beginning.
Example 7-18 dbaascli database modifyParameters
Prerequisite
• Run the command as the root user.
• Database must have been configured with backup storage destination details where
backups are stored.
Syntax
7-79
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
| --untilSCN <value>
| --latest
| --tag <value>
}
| --status --uuid <value>
}
Where:
--dbname: Oracle Database name.
--start | --status
--start: Begins database recovery.
--untilTime | --untilSCN | --latest | --tag
--untilTime: Recovers database until time. Input format: DD-MON-YYYY
HH24:MI:SS.
--untilSCN: Recovers database until SCN.
--latest: Recovers database to last known state.
--tag: Recovers database to archival tag.
--status
--uuid <value>
Q: What are the recovery options available with the dbaascli database recover
command?
A: The recovery options are:
--untilTime: Recover the database to a specific time.
7-80
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: Use the --latest option to recover the database to the most recent state possible. For
example:
--latest
Prerequisites
• Before performing a runDatapatch operation, ensure that all of the database instances
associated with the database are up and running.
• Run the command as the root user.
7-81
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Syntax
Where:
• --dbname specifies the name of the database
• --resume resumes the previous run
– --sessionID specifies to resume a specific session ID
• --skipPdbs skips running the datapatch on a specified comma-delimited list of PDBs. For
example: pdb1,pdb2...
• --pdbs runs the datapatch only on a specified comma-delimited list of PDBs. For example:
pdb1,pdb2...
• --executePrereqs runs prerequisite checks
• --patchList applies or rolls back the specified comma-delimited list of patches. For
example: patch1,patch2...
• --skipClosedPdbs skips running the datapatch on closed PDBs
• --rollback rolls back the patches applied
7-82
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: Use the --skipPdbs option followed by a comma-delimited list of PDB names to skip. For
example:
--skipPdbs pdb1,pdb2
Prerequisites
Run the command as the root user.
Syntax
Where:
• --dbname specifies the name of the database
• --mode specifies mount or nomount to start database in the corresponding mode
7-83
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
The command starts and opens the database. In Oracle Database 12c or later, all of the PDBs
are also opened.
Q: What must be done before running the dbaascli database start command?
A: The command must be run as the root user.
Q: What are the possible modes in which I can start the database?
A: You can start the database in mount or nomount mode using the --mode option. For example:
--mode mount
Q: Will this command open all PDBs in Oracle Database 12c or later?
A: Yes, when starting the database in Oracle Database 12c or later, all pluggable databases
(PDBs) will also be opened.
Q: How can I start a database in nomount mode?
A: Use the --mode option and set it to nomount. For example:
--mode nomount
Q: Is it mandatory to specify a database name when running the dbaascli database start
command?
A: Yes, it is recommended to specify the database name using the --dbname option to ensure
the correct database is started.
Example 7-20 dbaascli database start
Prerequisites
Run the command as the root user.
7-84
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Syntax
Where:
• --dbname specifies the name of the database that you want to stop
• --mode specifies the mode of the database. Valid values: abort, immediate, normal,
transactional
The command performs a database shutdown in immediate mode. No new connections or new
transactions are permitted. Active transactions are rolled back, and all connected users are
disconnected.
Q: What are the prerequisites for using the dbaascli database stop command?
A: You must run the command as the root user, and you must connect to an Exadata
Cloud@Customer virtual machine using SSH.
Q: How do I specify which database to stop?
A: You can specify the database by using the --dbname option followed by the name of the
database. For example:
--dbname myDatabase
Q: What are the valid shutdown modes for the dbaascli database stop command?
A: The valid shutdown modes are:
abort
immediate
normal
transactional
7-85
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Prerequisite
Run the command as the root user.
Syntax
Where:
• --dbname (mandatory) specifies the name of the database.
• --targetHome specifies the target Oracle home location
• --targetHomeName specifies the name of the target Oracle Database home
• --standBy use this option to upgrade standby databases in Data Guard configurations
• --allStandbyPrepared required for Data Guard configured primary databases. Flags to
acknowledge that all the required operations are performed on the standby databases prior
to upgrading primary database
• --removeGRP automatically removes the Guaranteed Restore Point (GRP) backup only if
the database upgrade was successful
• --increaseCompatibleParameter automatically increases the compatible parameter as
part of the database upgrade. The parameter will get increased only if the database
upgrade was successful
7-86
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: How can I specify the target Oracle home for the upgrade?
A: You can specify the target Oracle home location with the --targetHome option or the name
of the target Oracle Database home with the --targetHomeName option.
7-87
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: The --executePrereqs option runs only the pre-upgrade checks to ensure that the database
is ready for the upgrade.
Q: How do I handle a failed post-upgrade step?
A: Use the --postUpgrade option to rerun the post-upgrade steps if the initial post-upgrade
attempt fails.
Q: What is the purpose of the --revert option?
A: The --revert option reverts the Oracle Database to its original Oracle home, undoing the
upgrade.
Q: How can I pass additional arguments specific to DBUA for the upgrade?
A: Use the --upgradeOptions option to pass DBUA-specific arguments for the Oracle
Database upgrade. Refer to the Oracle documentation for supported arguments and options.
Q: Is it mandatory to specify the target Oracle home for the upgrade?
A: Yes, you must specify either the --targetHome or --targetHomeName to indicate the target
Oracle home for the upgrade.
Q: What should I do if I need to perform a pre-upgrade check but not proceed with the
upgrade?
A: Use the --executePrereqs option to perform only the pre-upgrade checks without
proceeding with the actual upgrade.
Example 7-22 dbaascli database upgrade pre-upgrade requisite checks
7-88
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Syntax
Where:
• --dbname specifies the Oracle Database name
• --blobLocation specifies the custom directory location where the standby blob file will be
generated in a Data Guard environment
7-89
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: How do I specify the name of the Oracle Database for which I want to prepare the
standby blob?
A: Use the --dbname option followed by the name of the Oracle Database. For example:
--dbname myDatabase
Q: How do I specify the location where the standby blob file will be generated?
A: Use the --blobLocation option to specify the custom directory path where the standby blob
file will be generated. For example:
--blobLocation /path/to/standby_blob
Q: Do I need to perform any additional steps after generating the standby blob file?
A: Yes, after generating the standby blob file, you need to transfer it to the standby site and use
it for the Data Guard configuration.
Syntax
Where:
• --attributes contains the Data Guard automation attributes that are to be modified.
Accepts comma-delimited values in the format <attribute=value>. Attributes must be
predefined in the Data Guard configuration file.
7-90
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: How do I specify the attributes that I want to update using this command?
A: Use the --attributes option followed by the attributes to be modified. The attributes should
be in a comma-delimited format, such as attribute=value. For example:
--attributes attribute1=value1,attribute2=value2
Q: What happens if I provide an attribute that is not predefined in the Data Guard
configuration file?
A: If you provide an attribute that is not predefined, the command may fail or ignore the
unrecognized attribute. Ensure that all attributes are predefined in the Data Guard
configuration file.
Q: Do I need to restart any services after updating Data Guard automation attributes?
A: In most cases, you do not need to restart services after updating attributes. However, check
the specific attributes and their impact to determine if a restart is required.
Q: How can I verify if the Data Guard attributes have been successfully updated?
A: After running the command, you can verify the updated attributes by checking the Data
Guard configuration or using appropriate verification commands/tools specific to your setup.
Q: What should I do if the command fails to update the attributes?
A: Check the error messages for details on what went wrong. Ensure that you have specified
the correct attributes and that they are predefined in the Data Guard configuration file. Verify
user permissions and command syntax.
Q: Is it possible to update attributes for only specific nodes using this command?
A: No, the dbaascli dataguard updateDGConfigAttributes command updates attributes
across all cluster nodes. If you need to update attributes for specific nodes, you may need to
use different methods or commands.
7-91
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Run this command as the oracle user on the target standby database.
Syntax
Where:
• --dbname specifies the Oracle Database name.
• --useImmediateFailover use this flag when the Oracle Data Guard configuration in a
warning or error state.
• --executePrereqs runs the prerequisite checks and report the results.
• --waitForCompletion specifies whether to wait for the operation to complete. Set to false
to run the operation in the background. Valid values: true|false.
• --resume resumes the previous operation.
• --sessionID resumes a specific session by its ID.
1. Connect to the virtual machine in the Oracle Data Guard configuration that will host the
new primary database as the opc user.
For detailed instructions, see Connecting to a Virtual Machine with SSH.
2. Start a root-user command shell and then switch to the oracle user:
$ sudo -s
# su - oracle
$
$ exit
#
7-92
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
5. Exit the root-user command shell and disconnect from the virtual machine.
# exit
$ exit
Run this command as the oracle user on where reinstate is required (that is failed standby
database).
Syntax
Where:
• --dbname specifies the Oracle Database name.
• --primaryDBUniqueName specifies database unique name of the current primary database
in the Oracle Data Guard setup.
• --executePrereqs runs the prerequisite checks and report the results.
• --waitForCompletion specifies whether to wait for the operation to complete. Set to false
to run the operation in the background. Valid values: true|false.
• --resume resumes the previous operation.
• --sessionID resumes a specific session by its ID.
7-93
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
$ exit
Syntax
Where:
• --dbname specifies the Oracle Database name.
• --targetStandbyDBUniqueName specifies the standby database unique name to change
the role from standby to primary database.
• --executePrereqs runs the prerequisite checks and report the results.
• --enableDGDebug enables the traces while performing the operation.
• --waitForCompletion specifies whether to wait for the operation to complete. Set to false
to run the operation in the background. Valid values: true|false.
• --resume resumes the previous operation.
• --sessionID resumes a specific session by its ID.
1. Connect to the virtual machine in the Oracle Data Guard configuration that will host the
new primary database as the opc user.
For detailed instructions, see Connecting to a Virtual Machine with SSH.
7-94
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
2. Start a root-user command shell and then switch to the oracle user.
$ sudo -s
# su - oracle
$
$ exit
#
5. Exit the root-user command shell and disconnect from the virtual machine.
# exit
$ exit
Note:
For Disaster Recovery (DR) configurations on Exadata Cloud@Customer (ExaDB-
C@C), you must use the Oracle Cloud Infrastructure (OCI) Console or the OCI SDK
to set up Data Guard. The dbaascli utility is not supported for this use case and
should not be used.
Syntax
7-95
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Where:
• --dbname specifies the Oracle Database name.
• --standbyDBUniqueName specifies the standby database unique name for which the
primary database will be configured.
• --standbyDBDomain specifies the standby database domain for which the primary
database will be configured.
• --noDBDomain specifies not to use the database domain name for standby database.
• --standbyScanIPAddresses specifies a comma-delimited list of IP addresses
corresponding to the standby database SCAN listener, or the SCAN name of the standby
database.
• --standbyScanPort specifies the corresponding SCAN port number of the standby
database.
• --standbyServiceName specifies the name of the standby database service for which the
primary database will be configured.
• --primaryScanIPAddresses specifies a comma-delimited list of IP addresses
corresponding to the primary database SCAN listener, or the SCAN name of the primary
database.
• --primaryScanPort specifies the corresponding SCAN port number of the primary
database.
• --executePrereqs runs the prerequisite checks and report the results.
• --resume resumes the previous operation.
• --sessionID resumes a specific session by its ID.
• --revert rolls back the previous operation.
• --waitForCompletion specifies whether to wait for the operation to complete. Set to false
to run the operation in the background. Valid values: true|false.
• --skipDRConfiguration specifies whether to skip Disaster Recovery (DR) configuration as
part of the standby database setup. Valid values: true (skip DR configuration) or false
(configure DR).
• Performing PrepareForStandby Operation Using the dbaascli Utility
To prepare the primary database for creating a new standby database, use the dbaascli
dataguard prepareForStandby command.
1. Connect to the Virtual Machine where you want to host the primary database as the opc
user.
For detailed instructions, see Connecting to a Virtual Machine with SSH.
2. Start a root-user command shell.
$ sudo -s
7-96
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
3. Run the prepareForStandby command. Enter the SYS password when prompted.
Upon completion, the command displays the location where the standby BLOB file is
created.
4. Exit the root-user command shell and disconnect from the virtual machine.
# exit
Syntax
Where:
• --dbname specifies the Oracle Database name.
• --oracleHome specifies the Oracle home path.
• --oracleHomeName specifies the Oracle home name.
• --standbyDBUniqueName specifies the database unique name for the standby database.
• --standbyDBDomain specifies the standby database domain for which the primary
database will be configured.
• --noDBDomain specifies not to use the database domain name for standby database.
• --primaryScanIPAddresses specifies a comma-delimited list of IP addresses
corresponding to the primary database SCAN listener, or the SCAN name of the primary
database.
7-97
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
7-98
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
• --waitForCompletion specifies whether to wait for the operation to complete. Set to false
to run the operation in the background. Valid values: true|false.
• --enableFIPS specifies whether to enable FIPS. Set to false to disable it. Valid values:
true|false.
• --skipDRConfiguration specifies whether to skip Disaster Recovery (DR) configuration as
part of the standby database setup. Valid values: true (skip DR configuration) or false
(configure DR).
• --okvServer specifies the Oracle Key Vault server. Comma-delimited list of multiple IP
addresses.
• --okvAdminUserName specifies the Oracle Key Vault admin user name.
• --okvServerRestPort specifies the REST port number for Oracle Key Vault.
• --okvWalletName specifies the Oracle Key Vault wallet name.
1. Connect to the Virtual Machine where you want to host the standby database as the opc
user.
For detailed instructions, see Connecting to a Virtual Machine with SSH.
2. Start a root-user command shell.
$ sudo -s
4. Enter the primary database SYS, TDE, and AWR passwords when prompted.
Upon successful completion of the command, the standby database starts and becomes
operational.
7-99
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Run this command as the root user on the primary cluster. Additionally, in a multiple-standby
setup, run the command on all standby clusters except the newly created standby database
cluster.
Syntax
Where:
• --dbname specifies the Oracle Database name.
• --standbyDBUniqueName specifies the database unique name of the standby database to
be registered with the Oracle Data Guard Broker configuration.
• --standbyDBDomain specifies the standby database domain for which the primary
database will be configured.
• --noDBDomain specifies not to use the database domain name for standby database.
• --standbyScanIPAddresses specifies a comma-delimited list of IP addresses
corresponding to the standby database SCAN listener, or the SCAN name of the standby
database.
• --standbyScanPort specifies the corresponding SCAN port number of the standby
database.
• --standbyServiceName specifies the name of the standby database service for which the
primary database will be configured.
• --executePrereqs runs the prerequisite checks and report the results.
• --resume resumes the previous operation.
• --sessionID resumes a specific session by its ID.
• --revert rolls back the previous operation.
• --waitForCompletion specifies whether to wait for the operation to complete. Set to false
to run the operation in the background. Valid values: true|false.
7-100
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
For single standby use cases, the registerStandby command must be run only on the primary
cluster, as there is a one-to-one association between the primary and the standby.
However, in configurations with multiple standby databases, you must run the
registerStandby command on both the primary cluster and all existing standby clusters—
excluding the new standby database being added.
For example, consider a setup with two standby databases: stdby1 and stdby2, where stdby2
is the new standby to be registered. In this case, run the registerStandby command on the
primary cluster and on stdby1, but not on stdby2.
In summary, when adding a new standby database to an existing Oracle Data Guard
configuration, run the registerStandby command on the primary and on all other previously
registered standby clusters, except the new standby being added.
1. Connect to the primary cluster of the Data Guard configuration as the opc user.
For detailed instructions, see Connecting to a Virtual Machine with SSH.
2. Start a root-user command shell.
$ sudo -s
Upon successful completion of the command, the specified standby database will be
registered with the Oracle Data Guard Broker configuration.
4. Repeat steps 1 through 3, as performed on the primary cluster, on all existing standby
clusters in the Oracle Data Guard Broker configuration, except the one being registered.
Syntax
Where:
7-101
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
In summary, while deleting a standby database from an existing Oracle Data Guard
configuration, run the deregisterStandby command on the primary and on all other existing
standby clusters before the delete database operation on desired standby cluster.
1. Connect to the primary cluster of the Oracle Data Guard configuration as the opc user.
For detailed instructions, see Connecting to a Virtual Machine with SSH.
2. Start a root-user command shell.
$ sudo -s
Upon successful completion of the command, the specified standby database will be
deregistered (removed) from the Oracle Data Guard Broker configuration.
4. Repeat steps 1 through 3, as performed on the primary cluster, on all existing standby
clusters in the Oracle Data Guard Broker configuration, except the one being deregistered.
7-102
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Run this command as the root user on the Active Data Guard standby cluster where you want
to enable or disable AWR configuration. Use this command if AWR was not configured during
the standby addition process.
Syntax
Where:
• --dbname specifies the Oracle Database name.
• --action specifies whether to enable or disable AWR. Use --action enable to enable
AWR and --action disable to disable it.
The --action argument is retained for backward compatibility. However, it is
recommended to use --enable or --disable, as they provide the same functionality but
are more explicit
• --executePrereqs runs the prerequisite checks and report the results.
• --resume resumes the previous operation.
• --sessionID resumes a specific session by its ID.
$ sudo -s
7-103
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
When the update transport mode command is run on the primary, only the transport mode of
the primary database is updated. To update the transport mode of a standby database, the
command must be run separately on that standby.
In contrast, when the update protection mode command is run on the primary, the protection
mode is updated for both the primary and standby databases. The protection mode can also
be updated from the standby side, in which case both the primary and standby databases are
updated.
When updating the transport or protection mode from the primary, the system checks the
current modes on both the primary and standby databases and proceeds with the update only
if all required conditions are met.
Syntax
Where:
• --dbname specifies the Oracle Database name.
• --protectionMode specifies the Data Guard protection mode to be set when configuring
the standby database. Valid values: MAX_PERFORMANCE|MAX_AVAILABILITY.
• --transportType specifies the Data Guard transport type to be set when configuring the
standby database. Valid values: ASYNC|SYNC.
• --standbyDGType specifies the standby database Data Guard type to be set. Valid values:
ADG|DG.
• --executePrereqs runs the prerequisite checks and report the results.
• --resume resumes the previous operation.
• --sessionID resumes a specific session by its ID.
• --waitForCompletion specifies whether to wait for the operation to complete. Set to false
to run the operation in the background. Valid values: true|false.
7-104
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
1. Connect to the Virtual Machine where your ADG standby database is hosted as the opc
user.
For detailed instructions, see Connecting to a Virtual Machine with SSH.
2. Start a root-user command shell.
$ sudo -s
Upon successful completion of the command, the specified Data Guard will be configured
with specified transport mode or protection mode.
Prerequisite
Run the command as the root user.
Syntax
7-105
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
[--enableUnifiedAuditing <value>]
[--imageTag <value>]
[--ImageLocation <value>
Where:
• --version specifies the version of Oracle Home specified as five numeric segments
separated by periods, for example, 19.12.0.0.0
• --oracleHome specifies the location of Oracle home
• --oracleHomeName specifies user-defined Oracle home name. If not provided, then the
default name will be used
• --enableUnifiedAuditing specifies true or false to enable or disable unified auditing link
option in Oracle home
• --imageTag specifies Oracle home image tag
• --imageLocation - path of the image to be used.
• --waitForCompletion specifies false to run the operation in background. Valid values:
true or false.
Q: How do I specify the Oracle Database version while creating a new Oracle Home?
A: Use the --version option followed by the Oracle Database version in the format of five
numeric segments separated by periods, such as 19.11.0.0.0.
Q: What does the --oracleHome option specify?
A: The --oracleHome option specifies the location where you want to install the Oracle Home.
If not provided, the default location will be used.
Q: Can I assign a custom name to the new Oracle Home?
A: Yes, you can use the --oracleHomeName option to specify a user-defined name for the
Oracle Home. If not specified, a default name will be used.
Q: How do I enable or disable Unified Auditing in the new Oracle Home?
A: Use the --enableUnifiedAuditing option and specify true to enable or false to disable
Unified Auditing for the Oracle Home.
Q: What does the --imageTag option do?
A: The --imageTag option specifies the Oracle Home image tag, which can be used in cases
where the image tag differs from the version.
Q: What is an example of using the dbaascli dbhome create command with version and
image tag?
7-106
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
This creates an Oracle Home for version 19.8.0.0.0 with the corresponding image tag.
Q: What happens if I don't provide the --oracleHome or --oracleHomeName options?
A: If --oracleHome is not provided, the Oracle Home will be installed in the default location. If
--oracleHomeName is not specified, a default name will be assigned to the Oracle Home.
Q: Is it possible to create multiple Oracle Homes with different versions on the same
system?
A: Yes, you can create multiple Oracle Homes with different versions by specifying different
values for the --version and --oracleHomeName options.
Prerequisite
Run the command as the root user.
Syntax
Where:
• --oracleHome specifies the location of the Oracle home
• --oracleHomeName specifies the name of the Oracle home
• --resume resumes the previous execution
– --sessionID specifies to resume a specific session ID
7-107
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: What is the --sessionID option used for in the dbaascli dbHome delete command?
A: The --sessionID option is used to resume a specific session that was previously interrupted
or failed during the deletion process.
Q: What happens if I do not provide the --resume or --sessionID options?
A: If the --resume or --sessionID options are not provided, the command will initiate a new
deletion process instead of resuming an interrupted one.
Q: Is there any way to confirm the deletion of the Oracle Home after running the
command?
A: You can verify the deletion by checking the output logs for success messages and ensuring
the Oracle Home directory is no longer present at the specified location.
Q: Can I delete an Oracle Home that is currently in use by a running database?
A: No, the Oracle Home should not be in use by any running databases or services during the
deletion process. Make sure to stop any related databases before running the delete
command.
Q: What should I do if the dbaascli dbHome delete command fails?
A: Review the output logs for any error messages. Ensure that the Oracle Home is not in use,
verify the correct Oracle Home location or name, and confirm that you have the necessary
permissions. After resolving any issues, rerun the command or use the --resume option if
needed.
Q: Can I delete multiple Oracle Homes at once using the dbaascli dbHome delete
command?
7-108
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: No, the command only allows you to delete one Oracle Home at a time by specifying either
the --oracleHome or --oracleHomeName option.
Syntax
Where:
• --oracleHomeName specifies user-defined Oracle home name
• --oracleHome specifies the location (path) of Oracle home
--oracleHome <value> to specify the full location (path) of the Oracle home.
7-109
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
--oracleHome refers to the physical location (or directory path) of the Oracle home on the
system.
Q: How do I run the dbaascli dbHome getDatabases command?
A: To run the command, use the following syntax:
dbaascli dbHome getDatabases --oracleHomeName <value>
or
dbaascli dbHome getDatabases --oracleHome <value>
Q: Can I specify both the Oracle home name and Oracle home location in the same
command?
A: No, you can only specify either --oracleHomeName or --oracleHome in a single command
execution. Choose one option based on how you identify the Oracle home.
Q: What kind of information does the dbaascli dbHome getDatabases command return?
A: The command returns information about all Oracle Databases running from the specified
Oracle home. This includes details such as database names and statuses.
Q: What is an example of using dbaascli dbHome getDatabases with the Oracle home
location?
A: Here is an example of using the command with the Oracle home location:
dbaascli dbHome getDatabases --oracleHome /u01/app/oracle/product/19.0.0/dbhome_1
This command retrieves the list of databases running from the Oracle home located
at /u01/app/oracle/product/19.0.0/dbhome_1.
Q: What is an example of using dbaascli dbHome getDatabases with the Oracle home
name?
A: Here is an example of using the command with the Oracle home name:
dbaascli dbHome getDatabases --oracleHomeName myOracleHome
This command retrieves the list of databases running from the Oracle home named
myOracleHome.
Q: Do I need any special permissions to run this command?
A: Yes, you must run the command as the root user to view the information about Oracle
Databases running from a specified Oracle home.
Q: What should I check if the dbaascli dbHome getDatabases command returns no
databases?
A: Ensure that you have specified the correct Oracle home name or location and that there are
databases running from that Oracle home. Additionally, confirm that the Oracle home is
properly configured and active.
Q: Can I use the dbaascli dbHome getDatabases command on multiple Oracle homes at
once?
A: No, the command works on a single Oracle home at a time. You must run the command
separately for each Oracle home you want to query.
7-110
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: Is there a way to verify that the Oracle home specified in the command is correct?
A: You can verify the Oracle home by checking the directory structure or the configuration
details in your system to ensure the path or name provided matches the actual Oracle home.
Q: What happens if I run the command without specifying an Oracle home or Oracle
home name?
A: The command requires either the --oracleHome or --oracleHomeName option to be
specified. If neither option is provided, the command will fail to execute.
Q: Can this command retrieve databases that are currently stopped?
A: Yes, the command will list all databases associated with the specified Oracle home,
regardless of whether they are currently running or stopped.
Example 7-24 dbaascli dbHome getDatabases --oracleHome
Prerequisite
Run the command as the root user.
Syntax
Where:
• --oracleHomeName specifies user-defined Oracle home name
• --oracleHome specifies the location of Oracle home
--oracleHome <value> to specify the full location (path) of the Oracle home.
7-111
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
--oracleHome refers to the full directory path where the Oracle home is located.
or
dbaascli dbHome getDetails --oracleHome <value>
This command retrieves detailed information about the Oracle home located at /u01/app/
oracle/product/19.0.0/dbhome_1.
This command retrieves detailed information about the Oracle home named myOracleHome.
Q: Do I need any special permissions to run this command?
A: Yes, you must run the command as the root user to view details about the Oracle home.
Q: What should I do if the dbaascli dbHome getDetails command returns no
information?
A: Ensure that you have correctly specified the Oracle home name or location, and that the
Oracle home is properly configured and exists on the system.
Q: Can I use the dbaascli dbHome getDetails command on multiple Oracle homes
simultaneously?
A: No, the command only works on a single Oracle home at a time. You must run the
command separately for each Oracle home.
Q: Is it possible to verify the Oracle home name before running the command?
A: Yes, you can verify the Oracle home name by checking your system’s configuration files or
by listing all Oracle homes available on your system.
Q: What happens if I do not specify an Oracle home name or location in the command?
7-112
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Prerequisite
Run the command as the root user.
Syntax
Where:
• --components specifies a list of components for log collection.
7-113
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Valid values:
– db
– gi
– os
– dbaastools
– all
• --startTime specifies the start time for log collection. Valid date and time format: YYYY-MM-
DDTHH24:MM:SS
• --endTime specifies the end time for log collection. Valid date and time format: YYYY-MM-
DDTHH24:MM:SS
• --nodes specifies a comma-delimited list of nodes to collect logs
• --dbNames specifies the database name for which to collect logs. You can specify only one
database name.
• --objectStoreBucketURI specifies an Object Storage service pre-authenticated request
(PAR) URL used to upload collected logs. Logs are collected from Guest VM. For more
information, see Using Pre-Authenticated Requests.
• --destLocation specifies the location on Guest VM to collect logs. Default: /var/opt/
oracle/dbaas_acfs
• --waitForCompletion Values: true|false. Default true. Specify false to run in the
background.
7-114
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: What should I do if I want to collect all available logs for all components?
A: Use --components all to collect logs from all components, including the database, Grid
Infrastructure, operating system, and DBaaS tools.
Q: What is an example command to collect logs for the database component from a
specific time range?
7-115
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: What is an example command to collect logs and upload them to Object Storage?
A: Here's an example command:
dbaascli diag collect --components db --objectStoreBucketUri https://
objectstorage.example.com/n/namespace-string/b/bucket-name/o/PAR-URL
Q: What should I do if I encounter an error while using the dbaascli diag collect
command?
A: Double-check that you have provided valid component names, date/time formats, and
destination options. Also, ensure you are running the command as the root user.
Related Topics
• Using Pre-Authenticated Requests
Prerequisite
Run the command as the root user.
Syntax
Where:
• --destLocation specifies the location on Guest VM to collect logs. Default: /var/opt/
oracle/dbaas_acfs
• --nodes specifies a comma-delimited list of nodes to collect logs
• --objectStoreBucketURI specifies an Object Storage service pre-authenticated request
(PAR) URL used to upload collected logs. Logs are collected from Guest VM. For more
information, see Using Pre-Authenticated Requests.
7-116
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: What is the default location for log collection if I don’t specify --destLocation?
A: The default directory for log collection is /var/opt/oracle/dbaas_acfs.
Q: How can I store the logs in Object Storage instead of on the local machine?
A: You can provide a pre-authenticated request (PAR) URL using the --objectStoreBucketURI
option to store the logs in Object Storage.
Q: Can I specify both --destLocation and --objectStoreBucketURI at the same time?
A: Yes, you can specify both --destLocation for local storage and --objectStoreBucketURI
to upload logs to Object Storage.
Q: What should I do if I encounter an error while running the dbaascli diag healthCheck
command?
A: Ensure that you are running the command as the root user and have provided valid options
for --destLocation, --nodes, or --objectStoreBucketURI. Verify that the node names are
correct if specified.
Q: Can I run the health check in the background?
A: The dbaascli diag healthCheck command does not have an explicit background mode,
but you can run it in the background by appending & at the end of the command.
7-117
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Related Topics
• Using Pre-Authenticated Requests
7-118
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Prerequisite
Run the command as the root user.
Syntax
Where:
• --version specifies the Grid home version
• --resume resumes the previous run
– --sessionID specifies to resume a specific session ID
• --waitForCompletion specifies false to run the operation in the background. Valid values:
true|false
Q: What does the --resume option do in the dbaascli gridHome create command?
A: The --resume option allows you to resume a previously interrupted or incomplete operation.
7-119
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: If --waitForCompletion is not specified, the operation will run in the foreground, and the
command will wait for the operation to complete before returning control to the user.
Q: What is the purpose of the --sessionID option?
A: The --sessionID option is used to specify the ID of a previous session that you want to
resume, in case of an incomplete or interrupted operation.
Q: Can I use the dbaascli gridHome create command to upgrade an existing Grid home?
A: No, this command is used specifically for configuring a new Grid Infrastructure home, not for
upgrading an existing one.
Q: What is an example command to create a Grid home with version 19.9.0.0.0?
A: Here’s an example command:
dbaascli gridHome create --version 19.9.0.0.0
Prerequisite
Run the command as the root user.
7-120
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Syntax
Note:
By default, TCPS is enabled for databases on Oracle Exadata Database Service on
Dedicated Infrastructure systems.
Note:
TCPS is not enabled for databases on Exadata Database Service on
Cloud@Customer systems. To enable TCPS for a given database, update the
database specific sqlnet.ora file with WALLET_LOCATION = (SOURCE=(METHOD=FILE)
(METHOD_DATA=(DIRECTORY=/var/opt/oracle/dbaas_acfs/grid/tcps_wallets)))
on all database nodes and then bounce the database. This will enable TCPS usage
for the database. However, enabling TCPS will cause ZDLRA connection to fail. On
Exadata Database Service on Cloud@Customer systems, you can enable either
ZDLRA or TCPS configuration. Enabling both ZDLRA and TCPS simultaneously will
not work.
Where:
• --pkcs12WalletFilePath specifies the absolute path of the certificate file, which is in the
pkcs12 wallet format
• --caCertChain concatenated list of certs, containing intermediate CA's and root CA certs
• --precheckOnly specifies yes to run only the prechecks for this operation. Valid values:
yes or no.
• --serverCert specifies the path of PEM certificate to use or rotate for TCPS configuration.
• --privateKey specifies the path of the private key file of the certificate.
• --certType type of the cert to be added to the Grid Infrastructure wallet. Accepted values
are: SELF_SIGNED_CERT, CA_SIGNED_CERT, or PKCS12_CERT. Default: SELF_SIGNED_CERT
• --privateKeyPasswordProtected specifies if the private key is password protected or not.
Valid values: true or false. Default: true.
7-121
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: What is the prerequisite for running the dbaascli grid configureTCPS command?
A: The command must be run as the root user.
7-122
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: What should I verify before running the dbaascli grid configureTCPS command?
A: Verify that you have the correct certificate files, private key files, and that you are logged in
as the root user. Also, ensure you understand the implications if you're using ZDLRA as it
cannot run simultaneously with TCPS.
Example 7-27 dbaascli grid configureTCPS
To configure grid using self-signed certificate:
7-123
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Prerequisite
Run the command as the root user.
Syntax
Where:
• --subject specifies subject of the certificate
• --userCert flag to indicate user certificate
• --trustedCert flag to indicate trusted certificate
• --requestedCert flag to indicate requested certificate
• --serialNumber specifies the serial number of the certificate
• --executePrereqs runs the prerequisite checks and reports the results
• --resume resumes the previous run
– --sessionID specifies to resume a specific session ID
• --bounceListeners flag to bounce the Grid Infrastructure listener and scan listener
Q: What does the --subject option specify in the dbaascli grid removeTCPSCert
command?
A: The --subject option specifies the subject of the certificate to be removed from the Grid
Infrastructure wallet.
Q: What is the purpose of the --userCert flag?
A: The --userCert flag indicates that the certificate to be removed is a user certificate.
7-124
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: Use the --trustedCert flag when removing a trusted certificate from the Grid Infrastructure
wallet.
Q: What does the --requestedCert flag do?
A: The --requestedCert flag indicates that the certificate being removed is a requested
certificate.
Q: What does the --serialNumber option specify?
A: The --serialNumber option specifies the serial number of the certificate to be removed. It is
useful for uniquely identifying a certificate when there are multiple certificates with the same
subject.
Q: What is the purpose of the --executePrereqs option?
A: The --executePrereqs option runs prerequisite checks before removing the certificate and
reports the results, ensuring that the environment is properly prepared for the operation.
Q: What does the --resume option do?
A: The --resume option resumes the removal operation if it was previously interrupted.
7-125
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Prerequisite
Run the command as the root user.
Syntax
Where:
• --pkcs12WalletFilePath specifies the absolute path of the certificate file, which is in the
pkcs12 wallet format
• --caCertChain concatenated list of certs, containing intermediate CA's and root CA certs
• --precheckOnly specifies yes to run only the prechecks for this operation. Valid values:
yes or no.
• --serverCert specifies the path of PEM certificate to use or rotate for TCPS configuration.
• --privateKey specifies the path of the private key file of the certificate.
• --certType type of the cert to be added to the Grid Infrastructure wallet. Accepted values
are: SELF_SIGNED_CERT, CA_SIGNED_CERT, or PKCS12_CERT. Default: SELF_SIGNED_CERT
• --privateKeyPasswordProtected specifies if the private key is password protected or not.
Valid values: true or false. Default: true.
7-126
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: Can I run the dbaascli grid rotateTCPSCert command without rotating the
certificates?
A: Yes, by using the --precheckOnly yes option, you can run only the prechecks without
rotating the certificates.
Q: What is an example of a command to rotate a certificate using a PKCS12 wallet?
A: Here’s an example command:
dbaascli grid rotateTCPSCert --pkcs12WalletFilePath /path/to/wallet.p12 --
certType PKCS12_CERT
7-127
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Prerequisite
Run the command as the root user.
Syntax
Where:
7-128
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
7-129
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: How do I use the dbaascli grid upgrade command to upgrade only the software?
A: Use the following syntax to upgrade only the software:
dbaascli grid upgrade --version <target_version> --softwareOnly
Q: What does the --revert option do in the dbaascli grid upgrade command?
A: The --revert option rolls back a failed or interrupted Grid Infrastructure upgrade to its
original state.
Q: Can I perform a full upgrade without configuring the Grid Infrastructure immediately?
A: Yes, you can first install only the software using the --softwareOnly option and then
configure it later.
Q: What should I do if an upgrade fails and I want to undo the changes?
A: Use the --revert option to roll back the failed upgrade:
dbaascli grid upgrade --version <target_version> --revert
7-130
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Prerequisites
Run the command as the root user.
Syntax
Where:
• --targetVersion specifies the target version of Oracle Home specified as five numeric
segments separated by periods (e.g. 19.12.0.0.0)
• --targetHome specifies the fully qualified path of the target Grid Infrastructure home for the
out of place patching
• --containerURL specifies custom URL for fetching Grid Infrastructure image
• --executePrereqs option to run prereqs
• --nodeList specifies a comma-delimited list of nodes if patching has to be performed on a
subset of nodes
• --patchInParallel specifies to perform patching remote nodes in parallel
• --rollback specifies to roll back patched Oracle home
• --resume resumes the previous run
– --sessionID specifies to resume a specific session ID
• --continueWithDbDowntime continues patching with database downtime. This option can
be used in environments wherein there is only 1 active instance up and the patching
operation can be continued even with a downtime.
• --drainTimeoutInSeconds specifies the time (in seconds) to complete the resource
draining while stopping the database
7-131
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
• --createImage creates an image from a copy of the active Grid home, patched to the
specified target version
– --createImageDir specifies fully qualified path of the directory where the image is to
be created
• --imageFile specifies fully qualified path of the image to be used
• --patchInParallel performs the patching of the remote nodes in parallel
• --waitForCompletion specifies false to run the operation in background. Valid values:
true|false
Q: What does the --containerURL option do in the dbaascli grid patch command?
A: The --containerURL option allows you to specify a custom URL for fetching the Grid
Infrastructure image.
Q: What is the purpose of the --executePrereqs option?
A: The --executePrereqs option is used to run prerequisite checks before applying the patch.
Q: How can I patch a subset of nodes using the dbaascli grid patch command?
A: Use the --nodeList option followed by a comma-delimited list of node names to patch only
a subset of nodes.
Q: What happens if I use the --rollback option?
A: The --rollback option will roll back the patched Oracle home to its previous state.
7-132
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: How do I handle a patching operation if my environment only has one active instance
and I need to continue with downtime?
A: Use the --continueWithDbDowntime option to continue patching even with database
downtime.
Q: Can I create an image of the patched Grid home?
A: Yes, you can use the --createImage option to create an image of the patched Grid home. If
needed, specify the directory where the image should be saved using --createImageDir.
7-133
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
7-134
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Patches Grid Infrastructure to version 19.12.0.0.0, using a custom container URL to fetch the
Grid Infrastructure image.
Example 3: Patching with Prerequisite Checks
dbaascli grid patch --targetVersion 19.12.0.0.0 --executePrereqs
Patches Grid Infrastructure to version 19.12.0.0.0 after running the prerequisite checks.
Example 4: Patching on a Subset of Nodes
dbaascli grid patch --targetVersion 19.12.0.0.0 --nodeList node1,node2,node3
Patches Grid Infrastructure to version 19.12.0.0.0 on the specified nodes (node1, node2, and
node3).
Example 5: Rolling Back the Patch
dbaascli grid patch --rollback
Rolls back the last applied patch on the Oracle Grid Infrastructure.
Example 6: Resuming a Previous Patch Operation
dbaascli grid patch --resume
Patches the Grid Infrastructure to version 19.12.0.0.0 while allowing downtime of the database
if needed.
Example 9: Creating a Patched Image
7-135
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Creates an image of the patched Grid home (version 19.12.0.0.0) and stores it in the specified
directory.
Example 10: Using an Existing Image File
dbaascli grid patch --targetVersion 19.12.0.0.0 --imageFile /path/to/image/
file.zip
Patches Grid Infrastructure to version 19.12.0.0.0 using an existing image file located at /
path/to/image/file.zip.
Example 11: Running the Patching Operation in the Background
dbaascli grid patch --targetVersion 19.12.0.0.0 --waitForCompletion false
Patches Grid Infrastructure to version 19.12.0.0.0 and runs the operation in the background.
Example 12: Combination of Prerequisites, Custom URL, and Subset of Nodes
dbaascli grid patch --targetVersion 19.12.0.0.0 --executePrereqs --containerURL
https://example.com/custom/url --nodeList node1,node2
Patches Grid Infrastructure to version 19.12.0.0.0, runs prerequisite checks, uses a custom
URL for the image, and applies the patch only on node1 and node2.
Example 13: Creating a Patched Image with an Existing Image File
dbaascli grid patch --targetVersion 19.12.0.0.0 --createImage --createImageDir /
path/to/dir --imageFile /path/to/existing/image.zip
Creates a patched image and stores it in the specified directory while using an existing image
file for the patch.
Example 14: Verifying Prerequisites Without Patching
dbaascli grid patch --targetVersion 19.12.0.0.0 --executePrereqs
Verifies whether all prerequisites are met for patching to version 19.12.0.0.0 without actually
applying the patch.
Example 15: Running Patch and Ignoring Prerequisite Failures
dbaascli grid patch --targetVersion 19.12.0.0.0 --continueWithDbDowntime --
executePrereqs
Runs the patch even if some prerequisite checks fail. This is useful in scenarios where
downtime is allowed, and certain prerequisites can be ignored.
Example 16: Checking Patch Logs for Issues
tail -f /u01/app/grid/logs/grid_patch.log
Monitors the patch log in real time to diagnose any issues during the patching process.
Example 17: Applying the Patch in a Parallel Environment
dbaascli grid patch --targetVersion 19.12.0.0.0 --nodeList node1,node2 --
waitForCompletion false
Patches Grid Infrastructure on a subset of nodes (node1 and node2) and runs the process in
the background.
7-136
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Patches Grid Infrastructure using a pre-downloaded image file located on an external storage
device.
Example 19: Running Patch with a Custom Session ID
dbaascli grid patch --targetVersion 19.12.0.0.0 --resume --sessionID 67890
Schedules the patching command to run at 2:00 AM using the at command in Linux.
Example 21: Specifying Timeout for Completion
dbaascli grid patch --targetVersion 19.12.0.0.0 --waitForCompletion true --
continueWithDbDowntime --timeout 7200
Patches Grid Infrastructure while allowing downtime, but waits up to 7200 seconds (2 hours)
for completion before timeout.
Example 22: Creating a Custom Image for Another Environment
dbaascli grid patch --targetVersion 19.12.0.0.0 --createImage --createImageDir /
backups/images/grid_patch
Creates a custom image of the patched Grid Infrastructure to store in the /backups/images/
grid_patch directory for use in other environments.
Recovers and resumes the patching process if it was interrupted, with database downtime
allowed.
Example 24: Combining Prerequisites Check with Background Execution
dbaascli grid patch --targetVersion 19.12.0.0.0 --executePrereqs --
waitForCompletion false
Patches Grid Infrastructure to version 19.12.0.0.0 in parallel across nodes, with database
downtime allowed, and without creating an image to speed up the process.
Example 26: Monitoring Patch Progress Through Logs
tail -f /u01/app/grid/logs/grid_patch_progress.log
Monitors the log file for patching progress in real-time, providing insights into each step of the
patching process.
7-137
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Patches Grid Infrastructure and sets a custom timeout of 1 hour (3600 seconds) to allow
graceful resource draining during database downtime.
Example 28: Applying a Patch to Specific Nodes with Prerequisite Checks
dbaascli grid patch --targetVersion 19.12.0.0.0 --nodeList node1,node4 --
executePrereqs
Patches only nodes node1 and node4 to version 19.12.0.0.0 and runs the prerequisite checks
beforehand.
Example 29: Patching Without Waiting for Completion
dbaascli grid patch --targetVersion 19.12.0.0.0 --waitForCompletion false
Begins patching the Grid Infrastructure to version 19.12.0.0.0 in the background, allowing other
tasks to be performed without waiting for the process to complete.
Example 30: Reapplying a Failed Patch After a Drain Timeout Issue
dbaascli grid patch --resume --drainTimeoutInSeconds 7200
Resumes the previous patching session and extends the resource draining timeout to 2 hours
(7200 seconds) in case it failed due to insufficient time in the previous attempt.
Example 31: Viewing Patch Logs in Real-Time with Specific Session ID
tail -f /u01/app/grid/logs/grid_patch_12345.log
Monitors the log file for the patching session with session ID 12345 in real-time.
Example 32: Patching to a New Target Home
dbaascli grid patch --targetHome /u01/app/grid_home_19c --executePrereqs
Stops a background patch job by finding and killing the associated process ID (PID).
Example 34: Verifying Patch Completion Without Logs
dbaascli grid status --targetVersion 19.12.0.0.0
Verifies if the patch to version 19.12.0.0.0 has been successfully applied by checking the
current Grid Infrastructure version status.
Prerequisite
Run the command as the root user.
7-138
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Syntax
{
--oracleHome <value>
| --oracleHomeName <value>
}
[--imageFilePath <value>] [--executePrereqs] [--nodes <value>]
{
[--resume [--sessionID <value>]]
| [--rollback [--sessionID <value>]]
}
[--skipDatapatch]
[--skipClosedPDBs]
[--skipPDBs <value>]
[--continueWithDbDowntime]
[--skipUnreachableNodes]
[--drainTimeoutInSeconds <value>]
[--waitForCompletion <value>]
Where:
• --oracleHome specifies the path of Oracle home
• --oracleHomeName specifies the name of Oracle home
• --targetVersion specifies the target version of Oracle Home specified as five numeric
segments separated by periods, for example, 19.12.0.0.0.
• --resume resumes the previous run
– --sessionID specifies to resume a specific session ID
• --continueWithDbDowntime continues patching with database downtime. This option can
be used in environments wherein there is only one active instance up and the patching
operation can be continued even with a downtime.
• --skipUnreachableNodes skips operation on unreachable nodes
• --nodes specifies a comma-delimited list of nodes if patching has to be performed on a
subset of nodes
• --executePrereqs runs prereqs
• --skipDatapatch skips running datapatch on the databases
• --imageFilePath specifies the absolute path of the image file to be used
• --skipPDBs skips running the datapatch on a specified comma-delimited list of PDBs. For
example: cdb1:pdb1,cdb2:pdb2, and so on
• --skipClosedPdbs skips running datapatch on closed PDBs
• --rollback rolls back patched Oracle home.
• --waitForCompletion specifies false to run the operation in background. Valid values :
true|false
• --drainTimeoutInSeconds specifies time (in seconds) to complete the resource draining
while stopping the database
7-139
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: How do I specify the Oracle home path or name for the patch?
A: Use the --oracleHome option to specify the path of the Oracle home, or --oracleHomeName
to specify the name of the Oracle home.
Q: How can I define the target version for the patch?
A: Use the --targetVersion option followed by the version number in the format 19.12.0.0.0.
7-140
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: Use the --skipClosedPDBs option to skip datapatch on PDBs that are closed.
Q: How can I patch an Oracle home by its name rather than the path?
A: Use the --oracleHomeName option followed by the name of the Oracle home.
Q: What should I do if I want to avoid applying datapatch during the patching process?
A: Use the --skipDatapatch option to skip the datapatch step.
Q: How can I specify a different location for the database image used in the patching
process?
A: Use the --imageLocation option to specify a custom location for the image.
Q: How can I check if all prerequisites are met before applying the patch?
A: Run the patch command with the --executePrereqs option to ensure all prerequisites are
satisfied.
7-141
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: What if the patching operation does not complete successfully and I need to retry?
A: Use the --resume option to retry the patching operation from where it left off. If needed, you
can specify a --sessionID to resume a specific session.
Q: Can I run the patching command in a dry run mode to preview actions?
A: No, the dbaascli dbHome patch command does not have a dry-run feature. However, you
can use the --executePrereqs option to run prerequisite checks before actually applying the
patch.
Q: Is it possible to apply multiple patches in one run?
A: The dbaascli dbHome patch command only allows for one target version at a time. You
would need to run the command separately for each patch version.
Q: How do I handle patching if the environment uses multiple Oracle homes?
A: You can specify the Oracle home you want to patch using either the --oracleHome or --
oracleHomeName options, depending on whether you're specifying the path or the name of the
Oracle home.
Q: Can I skip both PDB and CDB datapatching in one command?
A: Yes, you can combine the --skipPDBs and --skipDatapatch options to skip datapatching
for both PDBs and the CDB in a single patch run.
Q: Can I apply a patch and rollback immediately if it causes issues?
A: Yes, after applying a patch, you can use the --rollback option to revert to the previous
patch level if any issues arise.
Q: Can I patch multiple Oracle homes simultaneously?
A: No, you need to run the dbaascli dbHome patch command individually for each Oracle
home.
Q: How do I track the progress of the patching operation?
A: During the patching process, the command provides output messages that show the
progress. You can also check the log files for detailed information.
Q: Can I run patching in parallel on a clustered environment?
A: Patching operations can be applied to a subset of nodes using the --nodes option.
However, simultaneous patching should be handled carefully, and you should ensure no
overlapping sessions.
Q: How can I identify which patches are available for my Oracle home?
A: You can check the available patches via the Oracle support portal or by running the opatch
lsinventory command to see the current patches applied to your Oracle home.
Q: Can I specify a timeout for draining resources when stopping the database during
patching?
A: Yes, you can use the --drainTimeoutInSeconds option to specify the time in seconds for
resource draining when stopping the database.
7-142
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: What happens if the patch fails on one of the nodes in a multi-node environment?
A: You can use the --skipUnreachableNodes option to skip the failed node and continue the
patching process on the remaining nodes. You can then address the issue on the failed node
separately.
Q: How can I make the patching process run in the background?
A: Use the --waitForCompletion option with a value of false to allow the patching process to
run in the background. This way, you don't need to wait for the process to complete
interactively.
Q: Can I perform a rollback operation on a subset of nodes in a clustered environment?
A: Yes, you can use the --nodes option along with the --rollback option to roll back the
patching on a specific set of nodes.
Q: What if I need to update the image location after starting the patch process?
A: The --resume option does not allow changing the image location. However, you can stop
the session and start a new patch process with the updated --imageLocation.
Q: Is there a way to check which session IDs are available for resuming a patch?
A: You can check the log files or use Oracle Cloud tools to identify active or paused patching
sessions and their session IDs.
Q: Can I limit the downtime during patching?
A: If you need to limit downtime, use the --continueWithDbDowntime option carefully. This
allows you to proceed even when downtime is expected but requires planning for minimal
service impact.
Resumes the previous patching operation for the Oracle home located at /u01/app/
oracle/product/19.0.0/dbhome_1.
Resumes the patching operation for Oracle home DB_HOME_NAME using session ID 12345.
7-143
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Patches Oracle home to version 19.12.0.0.0 while skipping any unreachable nodes.
Example 7: Patching a Subset of Nodes
dbaascli dbHome patch --oracleHome /u01/app/oracle/product/19.0.0/dbhome_1 --
targetVersion 19.12.0.0.0 --nodes node1,node2
Patches Oracle home DB_HOME_NAME to version 19.12.0.0.0 after running prerequisite checks.
Patches Oracle home to version 19.12.0.0.0 without running datapatch on the databases.
Example 10: Using an Image File for Patching
dbaascli dbHome patch --oracleHome /u01/app/oracle/product/19.0.0/dbhome_1 --
targetVersion 19.12.0.0.0 --imageFilePath /path/to/image/file.zip
Patches Oracle home to version 19.12.0.0.0 using an image file located at /path/to/image/
file.zip.
Patches Oracle home to version 19.12.0.0.0 and skips running datapatch on the specified
PDBs (pdb1 in cdb1 and pdb2 in cdb2).
Example 12: Skipping Datapatch on Closed PDBs
dbaascli dbHome patch --oracleHome /u01/app/oracle/product/19.0.0/dbhome_1 --
targetVersion 19.12.0.0.0 --skipClosedPDBs
Patches Oracle home to version 19.12.0.0.0 while skipping running datapatch on any closed
PDBs.
Example 13: Rolling Back Oracle Home
dbaascli dbHome patch --oracleHomeName DB_HOME_NAME --rollback
7-144
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Rolls back the last applied patch on the Oracle home named DB_HOME_NAME.
Example 14: Combination of Patching with Prerequisite Checks and Specific Nodes
dbaascli dbHome patch --oracleHome /u01/app/oracle/product/19.0.0/dbhome_1 --
targetVersion 19.12.0.0.0 --executePrereqs --nodes node1,node2
Patches Oracle home to version 19.12.0.0.0, runs prerequisite checks, and applies the patch
only on node1 and node2.
Example 15: Skipping Unreachable Nodes and Specific PDBs
dbaascli dbHome patch --oracleHomeName DB_HOME_NAME --targetVersion 19.12.0.0.0
--skipUnreachableNodes --skipPDBs cdb1:pdb1
Patches Oracle home DB_HOME_NAME to version 19.12.0.0.0 while skipping unreachable nodes
and avoiding running datapatch on pdb1 within cdb1.
Example 16: Checking Oracle Home Version Post-Patch
dbaascli dbHome patch --oracleHome /u01/app/oracle/product/19.0.0/dbhome_1 --
targetVersion 19.12.0.0.0
opatch lsinventory
This example shows how to check the Oracle home version after a successful patch by
running opatch lsinventory.
Patches the Oracle home but skips the prerequisite checks before applying the patch.
Example 19: Applying a Patch to a Custom Oracle Home Image
dbaascli dbHome patch --oracleHomeName DB_HOME_NAME --targetVersion 19.12.0.0.0
--imageLocation /custom/location/image.zip
Skips patching unreachable nodes and runs prerequisite checks before applying the patch.
Example 21: Skipping Datapatch on All PDBs in Multiple CDBs
dbaascli dbHome patch --oracleHome /u01/app/oracle/product/19.0.0/dbhome_1 --
targetVersion 19.12.0.0.0 --skipPDBs cdb1:pdb1,cdb2:pdb2,cdb3:pdb3
Patches Oracle home but skips datapatch on the specified PDBs in multiple CDBs.
Example 22: Continuing Patching with Downtime on Multiple Nodes
7-145
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Patches Oracle home while skipping both the datapatch and closed PDBs.
Example 24: Rolling Back and Reapplying Patch
dbaascli dbHome patch --oracleHome /u01/app/oracle/product/19.0.0/dbhome_1 --
rollback
dbaascli dbHome patch --oracleHome /u01/app/oracle/product/19.0.0/dbhome_1 --
targetVersion 19.12.0.0.0
Rolls back the current patch and then reapplies the patch to the Oracle home.
Example 25: Skipping Datapatch and Allowing Downtime on a Specific Node
dbaascli dbHome patch --oracleHome /u01/app/oracle/product/19.0.0/dbhome_1 --
targetVersion 19.13.0.0.0 --skipDatapatch --continueWithDbDowntime --nodes node1
Patches Oracle home to version 19.13.0.0.0 on node1, skipping the datapatch step and
allowing downtime.
Example 26: Specifying Drain Timeout During Database Shutdown
dbaascli dbHome patch --oracleHomeName DB_HOME_NAME --targetVersion 19.13.0.0.0
--drainTimeoutInSeconds 300
Patches the Oracle home DB_HOME_NAME to version 19.13.0.0.0 and allows a 5-minute timeout
(300 seconds) for draining resources during shutdown.
Example 27: Running Patching in the Background
dbaascli dbHome patch --oracleHome /u01/app/oracle/product/19.0.0/dbhome_1 --
targetVersion 19.13.0.0.0 --waitForCompletion false
Patches Oracle home to version 19.13.0.0.0 and runs the patching process in the background
without waiting for completion.
Example 28: Rolling Back Patch on a Subset of Nodes
dbaascli dbHome patch --oracleHome /u01/app/oracle/product/19.0.0/dbhome_1 --
rollback --nodes node1,node2
Rolls back the last applied patch on node1 and node2 only for the specified Oracle home.
Example 29: Skipping Prerequisites and Patching Multiple Nodes
dbaascli dbHome patch --oracleHome /u01/app/oracle/product/19.0.0/dbhome_1 --
targetVersion 19.13.0.0.0 --skipPrereqs --nodes node3,node4
Patches Oracle home to version 19.13.0.0.0 on node3 and node4 without running prerequisite
checks.
Example 30: Rolling Back Patch and Skipping Unreachable Nodes
7-146
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Rolls back the last patch on Oracle home DB_HOME_NAME and skips unreachable nodes during
the rollback process.
Prerequisites
• Before performing a move operation, ensure that all of the database instances associated
with the database are up and running.
• Run the command as the root user.
Syntax
Where:
• --oracleHome specifies Oracle home path
• --oracleHomeName specifies the name of Oracle home
• --dbname specifies the name of the database
• --executePrereqs runs the prerequisite checks and report the results
• --resume resumes the previous run
– --sessionID specifies to resume a specific session ID
• --rollback rolls the database back to previous home
– --sessionID specifies to resume a specific session ID
• --skipDatapatch skips running the datapatch on the databases
• --skipPdbs skips running the datapatch on a specified comma-delimited list of PDBs. For
example: pdb1,pdb2...
• --skipClosedPDBs skips patching closed PDBs
7-147
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
7-148
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
7-149
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: In a multi-node environment, you can restrict the move operation to specific nodes by
providing a comma-delimited list of node names with --nodeList.
Q: Can I move the database to a new Oracle home while skipping specific nodes in a
multi-node environment?
A: Yes, you can use the --nodeList option to specify which nodes to include in the move
operation. Any nodes not listed will be skipped.
Q: What is the maximum number of nodes I can specify with the --nodeList parameter?
A: The --nodeList parameter allows you to specify a comma-delimited list of as many nodes
as needed, limited only by your environment configuration. Ensure all nodes are valid and
reachable.
Q: How do I know which PDBs are closed before using the --skipClosedPDBs option?
A: You can query the v$pdbs view to check the status of your PDBs. Any PDBs with a status of
"MOUNTED" or "CLOSED" will be skipped when using --skipClosedPDBs.
Moves the database ORCL to the Oracle home while running the prerequisite checks
beforehand.
Example 4: Resuming a Previous Move Operation
dbaascli database move --oracleHome /u01/app/oracle/product/19.0.0/dbhome_1 --
dbname ORCL --resume
7-150
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Resumes the move operation for the ORCL database using session ID 12345.
Example 6: Rolling Back a Move Operation
dbaascli database move --oracleHome /u01/app/oracle/product/19.0.0/dbhome_1 --
dbname ORCL --rollback
Rolls back the move operation for the ORCL database, restoring it to the previous Oracle
home.
Example 7: Rolling Back a Move Operation with a Session ID
dbaascli database move --oracleHomeName DB_HOME_NAME --dbname ORCL --rollback --
sessionID 67890
Rolls back the move operation for ORCL using session ID 67890.
Example 8: Skipping Datapatch
dbaascli database move --oracleHome /u01/app/oracle/product/19.0.0/dbhome_1 --
dbname ORCL --skipDatapatch
Moves the ORCL database to a new Oracle home but skips running datapatch on the specified
PDBs (pdb1 and pdb2).
Example 10: Skipping Datapatch on Closed PDBs
dbaascli database move --oracleHome /u01/app/oracle/product/19.0.0/dbhome_1 --
dbname ORCL --skipClosedPDBs
Moves the ORCL database and skips running datapatch on any closed PDBs.
Moves the ORCL database to the specified Oracle home while allowing downtime of the
database during the move process.
Example 12: Moving Database in Parallel
dbaascli database move --oracleHome /u01/app/oracle/product/19.0.0/dbhome_1 --
dbname ORCL --allowParallelDBMove
Moves the database ORCL to the specified Oracle home with the option to run the move in
parallel for better performance.
Example 13: Running the Operation in the Background
dbaascli database move --oracleHome /u01/app/oracle/product/19.0.0/dbhome_1 --
dbname ORCL --waitForCompletion false
7-151
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Moves the database ORCL to a new Oracle home but runs the operation in the background.
Moves the database ORCL to the specified Oracle home but performs the operation only on
node1 and node2.
Example 15: Combination of Move with Prerequisite Checks, Skipping Specific PDBs,
and Allowing Downtime
dbaascli database move --oracleHomeName DB_HOME_NAME --dbname ORCL --
executePrereqs --skipPDBs pdb1 --continueWithDbDowntime
Moves the ORCL database to the specified Oracle home, runs prerequisite checks, skips
running datapatch on pdb1, and allows database downtime during the operation.
Example 16: Combination of Move in Parallel and Running in the Background
dbaascli database move --oracleHome /u01/app/oracle/product/19.0.0/dbhome_1 --
dbname ORCL --allowParallelDBMove --waitForCompletion false
Moves the ORCL database to a new Oracle home, runs the move in parallel, and executes the
operation in the background.
Example 17: Combining Move with Parallel Execution and Skipping Closed PDBs
dbaascli database move --oracleHome /u02/app/oracle/product/19.0.0/dbhome_2 --
dbname TESTDB --allowParallelDBMove --skipClosedPDBs
Checks the prerequisites for moving the PRODDB database to the Oracle home located
at /u02/app/oracle/product/19.0.0/dbhome_2 without actually performing the move.
Moves the HRDB database to the new Oracle home, but skips running datapatch for pdb1 and
pdb3.
Example 20: Running the Move on Specific Nodes
dbaascli database move --oracleHome /u02/app/oracle/product/19.0.0/dbhome_2 --
dbname FINDB --nodeList node1,node3
Moves the FINDB database to the new Oracle home only on node1 and node3.
7-152
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Moves the ORCL database to the specified Oracle home while allowing downtime during the
move operation.
Example 22: Combination of Parallel Move and Skipping Datapatch
dbaascli database move --oracleHome /u02/app/oracle/product/19.0.0/dbhome_2 --
dbname CRMDB --allowParallelDBMove --skipDatapatch
Moves the SALESDB database to the specified Oracle home in the background, and the
operation is applied only on node2 and node3.
Example 24: Database Move with Prerequisite Check and Allowing Parallel Move
dbaascli database move --oracleHome /u01/app/oracle/product/19.0.0/dbhome_2 --
dbname ORCL --executePrereqs --allowParallelDBMove
Moves the ORCL database to the new Oracle home after performing the prerequisite checks
and running the move operation in parallel.
Example 25: Rolling Back a Move Operation and Skipping Closed PDBs
dbaascli database move --oracleHome /u02/app/oracle/product/19.0.0/dbhome_2 --
dbname DEVDB --rollback --skipClosedPDBs
Rolls back the move operation for the DEVDB database, skipping any closed PDBs.
Example 26: Moving the Database with Specific Downtime and Parallel Execution
dbaascli database move --oracleHome /u02/app/oracle/product/19.0.0/dbhome_2 --
dbname FINDB --allowParallelDBMove --continueWithDbDowntime
Moves the FINDB database to the specified Oracle home while allowing database downtime
and enabling parallel execution to speed up the process.
Example 27: Checking Database Move Prerequisites without Executing the Move
dbaascli database move --oracleHome /u01/app/oracle/product/19.0.0/dbhome_1 --
dbname HRDB --executePrereqs
Runs prerequisite checks to validate that the HRDB database can be moved to the specified
Oracle home without executing the move itself.
Example 28: Moving Database and Running the Command in the Background on
Specific Nodes
dbaascli database move --oracleHome /u02/app/oracle/product/19.0.0/dbhome_3 --
dbname PRODDB --waitForCompletion false --nodeList node1,node4
Moves the PRODDB database to a new Oracle home, executing the operation in the background,
and applying it only on node1 and node4.
Example 29: Combining Prerequisite Checks, Skipping Closed PDBs, and Allowing
Parallel Execution
dbaascli database move --oracleHome /u02/app/oracle/product/19.0.0/dbhome_2 --
dbname CRMDB --executePrereqs --skipClosedPDBs --allowParallelDBMove
7-153
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Performs prerequisite checks before moving the CRMDB database to the new Oracle home,
skips patching closed PDBs, and allows the operation to run in parallel for faster execution.
Example 30: Database Move with Rollback on Specific Session ID and Skipping
Datapatch
dbaascli database move --oracleHomeName DB_HOME_NAME --dbname DEVDB --rollback --
sessionID 45678 --skipDatapatch
Rolls back a previously executed move operation for the DEVDB database to its prior Oracle
home using session ID 45678, skipping the datapatch process during the rollback.
Example 31: Moving Database with Allow Parallel Execution and Specifying Datapatch
Skipping for PDBs
dbaascli database move --oracleHome /u02/app/oracle/product/19.0.0/dbhome_3 --
dbname ANALYTICDB --allowParallelDBMove --skipPDBs pdb2,pdb4
Moves the ANALYTICDB database in parallel to the specified Oracle home and skips the
datapatch process for pdb2 and pdb4.
Miscellaneous
Q: How can I skip the catbundle run while patching Oracle Database 11.2.0.4.0?
A: To skip the catbundle run during the Oracle Database patching process, use the --
skipDatapatch option with the dbaascli database move or dbaascli dbHome patch
command.
Q: What are the best practices to follow during Oracle Database patching?
A: Oracle recommends performing out-of-place patching using the dbaascli database move
command to minimize the patching window.
Oracle advises using the --allowParallelDBMove option to enable parallel patching, which can
expedite the process.
Q: Can warnings reported during Oracle Database patch prerequisites be ignored?
A: It is advisable to address and resolve any warnings reported during the prerequisites check
before proceeding with the patching process. Ignoring warnings may lead to issues during the
actual patching.
Q: How can I continue with Oracle Database patching if only one database instance is
up and running?
A: It is recommended to have at least two instances running to avoid database downtime. If
running two instances is not possible, you can use the --continueWithDbDowntime option with
the dbaascli database move or dbaascli dbHome patch command to proceed with patching
despite the downtime.
Q: In a Data Guard environment, does datapatch get executed on both the primary and
standby databases?
A: No, in a Data Guard environment, datapatch is executed only as part of the primary
database patching process.
Q: Can Interim Software Updates (one-off patches) or individual patches be applied
manually on Oracle Homes in Exadata Cloud@Customer (ExaDB-C@C) environments?
7-154
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: Yes, one-off patches or individual patches can be applied manually to Oracle Homes in
ExaDB-C@C environments. However, it is recommended to use the Oracle Database Software
Image option for a more streamlined and supported patching process.
Q: How do I patch multiple Oracle databases running from the same Oracle Home when
each database is running on just one node?
A: Use the dbaascli dbHome patch command to patch the specified Oracle Home, which will
apply the patch to all databases running from that home. It is recommended to have multiple
instances running to avoid downtime. If running multiple instances is not possible, you can use
the --continueWithDbDowntime option to proceed with patching despite the downtime.
7-155
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Prerequisite
• Run the command as the root user.
Syntax
Where:
--pdbName: PDB name.
--dbname: Oracle Database name.
--start | --delete | --status | --getBackupReport | --list
--start: Begins PDB backup.
[--level1 | --archival]
[--level1: Creates a Level-1 (incremental) backup.]
[--archival: Creates an archival full backup.]
--tag: Specify backup tag.
--delete: Deletes archival backup.
--backupTag: Specify backup tag to delete.
--status
--uuid <value>
--getBackupReport: Returns backup report.
--json: Specify the file name for JSON output.
--tag: Specify backup tag.
--list: Returns PDB backup information.
[--json: Specify the file name for JSON output.]
7-156
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
--archival for a full archival backup (which also requires a --tag to specify the backup tag)
7-157
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Optionally, you can output the list in JSON format using the --json flag:
dbaascli pdb backup --pdbName <PDB_Name> --dbname <DB_Name> --list --json
<file_name>
Related Topics
• Connecting to a Virtual Machine with SSH
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
Prerequisite
Run the command as the oracle user.
7-158
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Syntax
Where:
• --dbname specifies the name of the container database that hosts the PDB
• --pdbName specifies the name of the PDB
• --pdbUID specifies the identifier of the PDB
• --openMode specifies the target OPEN MODE of PDB
7-159
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: Is it mandatory to specify the open mode when using the dbaascli pdb bounce
command?
A: No, specifying the --openMode is optional. If not provided, the PDB will open in its default
mode.
Q: What happens if I don't specify the --openMode flag?
A: If the --openMode flag is not specified, the PDB will be opened in its default mode, which is
typically READ_WRITE.
dbaascli pdb bounce --dbname cdb_name --pdbName pdb name associated with the
CDB
Optional:
• --openMode READ_WRITE
• --openMode READ_ONLY
Prerequisite
Run the command as the oracle user.
Syntax
7-160
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Where:
• --dbname specifies the name of the container database that hosts the PDB.
• --pdbname specifies the name of the PDB that you want to close.
• --pdbUID specifies the identifier of the PDB
Upon successful completion of running this command, the PDB is closed on all of the container
database instances.
Q: What does the --dbname option do in the dbaascli pdb close command?
A: The --dbname option specifies the name of the container database (CDB) that hosts the
pluggable database (PDB) you want to close.
Q: What does the --pdbName option do in the dbaascli pdb close command?
A: The --pdbName option specifies the name of the pluggable database (PDB) that you want to
close.
Q: What is the purpose of the --pdbUID option in the dbaascli pdb close command?
A: The --pdbUID option allows you to specify the unique identifier (UID) of the pluggable
database (PDB) that you want to close.
Q: Can I close the PDB on a specific instance of the CDB?
A: No, upon successful completion, the PDB is closed on all instances of the container
database (CDB).
Q: Is it possible to specify both --pdbName and --pdbUID in the same command?
A: No, you can specify either --pdbName or --pdbUID, but not both in the same command.
Q: What happens when the dbaascli pdb close command completes successfully?
A: When the command completes successfully, the pluggable database (PDB) is closed on all
instances of the container database (CDB).
Q: How do I close a specific PDB within a CDB using its UID?
7-161
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
dbaascli pdb close --dbname cdb name --pdbName pdb name associated with the
CDB
dbaascli pdb close --dbname cdb name --pdbUID con_uid of that pdb
Prerequisite
Run the command as the oracle user.
Syntax
Where:
• --pdbName specifies the name of the new PDB that you want to create
• --dbName specifies the name of the container database that hosts the new PDB
• --maxCPU optionally specifies the maximum number of CPUs that are available to the PDB.
Setting this option is effectively the same as setting the CPU_COUNT parameter in the PDB
• --maxSize optionally specifies the maximum total size of data files and temporary files for
tablespaces belonging to the PDB. Setting this option is effectively the same as setting the
MAXSIZE PDB storage clause in the CREATE PLUGGABLE DATABASE SQL command. You can
impose a limit by specifying an integer followed by a size unit (K, M, G, or T), or you can
specify UNLIMITED to explicitly enforce no limit
• --pdbAdminUserName specifies the new PDB admin user name
7-162
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
• --lockPDBAdminAccount specifies true or false to lock the PDB admin user account.
Default value is true.
• --resume resumes the previous run
– --sessionID specifies to resume a specific session ID
• --executePrereqs specifies yes to run only the prereqs for this operation. Valid values: yes
or no
• --waitForCompletion specifies false to run the operation in the background. Valid values:
true or false
• --blobLocation custom directory location where the standby blob file will be generated in
a DG environment.
• --standbyBlobFromPrimary specifies the location of the standby blob file, which is
prepared from the primary database. This is required only for standby database PDB
operations.
Note:
the parametersblobLocation and standbyBlobFromPrimary are mutually
exclusive.
During the PDB creation process, you are prompted to specify the administration password for
the new PDB.
7-163
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: What does the --resume option do in the dbaascli pdb create command?
A: The --resume option allows you to resume a previously failed PDB creation process.
7-164
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Prerequisite
Run the command as the oracle user.
Syntax
Where:
• --dbName specifies the name of the container database that hosts the PDB
• --pdbName specifies the name of the PDB that you want to delete
• --pdbUID specifies the UID of the PDB that you want to delete
• --executePrereqs specifies yes to run only the prereqs for this operation. Valid values: yes
or no
• --waitForCompletion specifies false to run the operation in the background. Valid values:
true or false
• --resume specifies to resume the previous execution
– --sessionID specifies to resume a specific session ID
• --allStandbyPrepared specifies to confirm that the operation has been successfully run
on all the standby databases
• --cleanupRelocatedPDB - option to cleanup source database after a PDB has been
relocated.
7-165
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: The dbaascli pdb delete command is used to delete a pluggable database (PDB) from a
container database (CDB) in an Exadata Cloud@Customer environment.
Q: What are the prerequisites for running the dbaascli pdb delete command?
A: The command must be run as the oracle user, and you must be connected to an Exadata
Cloud@Customer virtual machine.
Q: What does the --dbName option specify in the dbaascli pdb delete command?
A: The --dbName option specifies the name of the container database (CDB) that hosts the
PDB you want to delete.
Q: How can I specify which PDB to delete using the dbaascli pdb delete command?
A: You can specify the PDB to delete using either the --pdbName option (specifies the PDB
name) or the --pdbUID option (specifies the PDB UID).
Q: Can I run the prerequisite checks without actually deleting the PDB?
A: Yes, you can use the --executePrereqs option and set it to yes to run only the prerequisite
checks for the PDB deletion operation.
Q: How can I run the PDB deletion process in the background?
A: Use the --waitForCompletion option and set it to false to run the deletion process in the
background.
Q: What does the --resume option do in the dbaascli pdb delete command?
A: The --resume option allows you to resume a previously failed PDB deletion process.
7-166
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: Setting --waitForCompletion to false allows the delete process to run in the background,
letting you continue working without waiting for the operation to finish.
Example: dbaascli pdb delete
To delete a PDB from a standard database in a non-Data Guard environment or from Standby
database in Data Guard environment.
Prerequisite
Run the command as the oracle user.
Syntax
Where:
• --dbname specifies the name of the container database that hosts the PDB
• --pdbname specifies the name of the PDB for which you want to display connect string
information
• --pdbUID specifies the identifier of the PDB
Q: How do I retrieve the connect string of a PDB by specifying its unique identifier
(UID)?
A: To retrieve the connect string using the PDB's unique identifier (UID), use the following
syntax:
7-167
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: What does the --dbname option do in the dbaascli pdb getConnectString command?
A: The --dbname option specifies the name of the container database (CDB) that hosts the
pluggable database (PDB) for which you want to display the connect string information.
Q: What does the --pdbName option do in the dbaascli pdb getConnectString
command?
A: The --pdbName option specifies the name of the pluggable database (PDB) for which you
want to retrieve the Oracle Net connect string information.
Q: What is the purpose of the --pdbUID option in the dbaascli pdb getConnectString
command?
A: The --pdbUID option allows you to specify the unique identifier (UID) of the pluggable
database (PDB) for which you want to display the connect string.
Q: Can I use both --pdbName and --pdbUID in the same command?
A: No, you can use either --pdbName or --pdbUID, but not both in the same command.
7-168
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Prerequisite
Run the command as the oracle user.
Syntax
Where:
• --dbname specifies the name of the container database that hosts the PDB
• --pdbname specifies the name of the PDB that you want to delete
• --pdbUID specifies the identifier of the PDB
7-169
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
dbaascli pdb getDetails--dbname cdb name --pdbName pdb name associated with
the CDB
Prerequisite
Run the command as the oracle user.
Syntax
Where:
• --dbname specifies the name of the container database that hosts the PDB
7-170
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: No, the dbaascli pdb list command allows you to list the PDBs from only one container
database (CDB) at a time, specified by the --dbname option.
Q: What information is displayed when using the dbaascli pdb list command?
A: The command returns a list of all pluggable databases (PDBs) within the specified container
database (CDB). The list typically includes the names of the PDBs and possibly other details
like their status.
Q: Can I filter the PDB list using additional options?
A: No, the dbaascli pdb list command does not support additional filtering options. It simply
returns the complete list of PDBs within the specified CDB.
Q: What happens if the specified --dbname does not exist or is incorrect?
A: If the specified --dbname is incorrect or does not exist, the command will return an error, and
no PDB list will be displayed.
Q: Can the dbaascli pdb list command be used for any Oracle database environment?
A: No, the dbaascli pdb list command is specifically designed for use in Exadata
Cloud@Customer environments.
Example 7-36 dbaascli pdb list
Prerequisite
Run the command as the oracle user.
Syntax
7-171
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Where:
• --pdbName specifies the name of the new PDB that you want to clone
• --dbName specifies the name of the database
• --targetPDBName specifies the name for the target PDB (new cloned PDB)
• --powerLimit specifies the degree of parallelism to be used for the clone operation. Valid
value is between 1 and 128
• --maxCPU specifies the maximum number of CPUs to be allocated for the PDB
• --maxSize specifies the maximum storage size in GB for the new PDB
• --resume resumes the previous run
– --sessionID specifies to resume a specific session ID
• --executePrereqs specifies yes to run only the prereqs for this operation. Valid values: yes
or no
• --waitForCompletion specifies false to run the operation in the background. Valid values:
true or false
• --blobLocation custom directory location where the standby blob file will be generated in
a DG environment.
• --standbyBlobFromPrimary specifies the location of the standby blob file which is
prepared from the primary database. This is required only for standby database PDB
operations.
Note:
The parameters --blobLocation and --standbyBlobFromPrimary are mutually
exclusive.
7-172
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: The command must be run as the oracle user, and you must be connected to an Exadata
Cloud@Customer virtual machine. Additionally, the source PDB must already exist in the
specified CDB.
Q: What does the --dbName option specify in the dbaascli pdb localClone command?
A: The --dbName option specifies the name of the container database (CDB) that hosts the
source PDB from which the new PDB will be cloned.
Q: What does the --pdbName option specify in the dbaascli pdb localClone command?
A: The --pdbName option specifies the name of the new PDB that you want to create as a clone
of the existing PDB in the same CDB.
Q: Can I clone a PDB with a different name using the dbaascli pdb localClone
command?
A: Yes, you can specify a different name for the cloned PDB using the --targetPDBName
option. If this option is not provided, the cloned PDB will inherit the name of the source PDB.
Q: What does the --resume option do in the dbaascli pdb localClone command?
A: The --resume option allows you to resume a previously interrupted PDB cloning operation.
7-173
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: If the cloning operation fails or is interrupted, you can resume it by using the --resume
option to continue from where the operation stopped.
Example 7-37 dbaascli pdb localClone
Syntax
Where:
• --pdbName specifies the name of the PDB that you want to open
• --pdbUID specifies the identifier of the PDB
• --dbname specifies the name of the container database that hosts the PDB.
• --openMode specifies the target OPEN MODE of PDB
• --startServices: specifies to start all or list all services corresponding to a PDB.
Accepted values are all or a comma-delimited list of PDB services.
• --waitForCompletion: specify false to run the operation in the background. Valid values:
true|false
• --setPDBRefreshModeNone: specifies to convert a refreshable PDB to non-refreshable PDB
– --skipPDBRefresh: specifies to skip refreshable PDB refresh
– --pdbAdminUserName: specifies new PDB admin user name
Upon successful completion, the PDB is opened on all of the container database instances.
Q: What does the --pdbName option specify in the dbaascli pdb open command?
7-174
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: The --pdbName option specifies the name of the PDB that you want to open.
Q: What does the --pdbUID option specify in the dbaascli pdb open command?
A: The --pdbUID option specifies the unique identifier (UID) of the PDB that you want to open.
Q: What does the --dbname option specify in the dbaascli pdb open command?
A: The --dbname option specifies the name of the container database (CDB) that hosts the
PDB.
Q: What is the purpose of the --openMode option?
A: The --openMode option specifies the mode in which the PDB will be opened. Valid values
are READ_WRITE and READ_ONLY.
7-175
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
dbaascli pdb open --dbname cdb name --pdbName pdb name associated with the CDB
dbaascli pdb open --dbname cdb name --pdbUID con_uid of that pdb
Prerequisite
• Run the command as the root user.
• Database must be configured with backup storage destination details where backups are
stored.
Syntax
Where:
--pdbName: PDB name.
--dbname: Oracle Database name.
--start | --status
--start
--untilTime | --untilSCN | --latest | --tag
--untilTime: Recovers PDB until time. Input format: DD-MON-YYYY HH24:MI:SS.
--untilSCN: Recovers PDB until SCN.
--latest: Recovers PDB to last known state.
--tag: Recovers PDB to archival tag.
--status
--uuid <value>
7-176
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: What is the format required for specifying the time in the --untilTime option?
A: The time must be in the format DD-MON-YYYY HH24:MI:SS.
Q: How can I recover a PDB to the latest state using dbaascli pdb recover?
A: To recover the PDB to the latest known state, use the --latest option:
dbaascli pdb recover --pdbName <value> --dbname <value> --start --latest
Q: What does the --status option do in the dbaascli pdb recover command?
A: The --status option is used to check the status of a recovery operation. You must provide
the --uuid to specify the recovery session.
7-177
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Related Topics
• Connecting to a Virtual Machine with SSH
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
Syntax
Where:
• --dbname: specifies the name of the Oracle Database
• --pdbName: specifies the name of the pluggable database
• --pdbUID: specifies the identifier of the pluggable database
• --waitForCompletion: specify false to run the operation in the background. Valid values:
true|false
Q: What does the --dbname option specify in the dbaascli pdb refresh command?
7-178
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: The --dbname option specifies the name of the container database (CDB) that hosts the
pluggable database (PDB) to be refreshed.
Q: What does the --pdbName option specify in the dbaascli pdb refresh command?
A: The --pdbName option specifies the name of the pluggable database (PDB) that you want to
refresh.
Q: What does the --pdbUID option specify in the dbaascli pdb refresh command?
A: The --pdbUID option specifies the unique identifier (UID) of the pluggable database (PDB)
that you want to refresh.
Q: What does the --waitForCompletion option do in the dbaascli pdb refresh command?
A: The --waitForCompletion option specifies whether the operation should be run in the
foreground or background. If set to true, the operation will run in the foreground and wait for
completion. If set to false, the operation will run in the background.
Q: How can I refresh a PDB and run the operation in the background?
A: To refresh a PDB and run the operation in the background, use the --waitForCompletion
false option:
dbaascli pdb refresh --dbname <value> --pdbName <value> --waitForCompletion false
Q: Can I specify both --pdbName and --pdbUID together in the dbaascli pdb refresh
command?
A: No, you must specify either --pdbName or --pdbUID, but not both, when refreshing a PDB.
7-179
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Syntax
Where:
• --pdbName specifies the name of the source PDB that you want to clone
• --dbname specifies the name (DB_NAME) of the CDB that hosts the newly cloned PDB
• --sourceDBConnectionString specifies the source database connection string in the
format scan_name:scan_port/database_service_name
• --targetPDBName specifies the name for the target PDB (new cloned PDB)
• --powerLimit specifies the degree of parallelism to be used for the clone operation. Valid
value is between 1 and 128
• --maxCPU specifies the maximum number of CPUs to be allocated for the PDB
• --maxSize specifies the maximum storage size in GB for the new PDB
• --resume resumes the previous run
– --sessionID specifies to resume a specific session ID
• --executePrereqs specifies yes to run only the prereqs for this operation. Valid values: yes
or no
• --waitForCompletion specifies false to run the operation in the background. Valid values:
true or false
• --sourcePDBExportedTDEKeyFile specifies the source PDB exported key file. This variable
is applicable to only 12.1 database.
• --blobLocation specifies the custom path where the standby blob file will be generated in
a Data Guard environment
• --standbyBlobFromPrimary specify the location of the standby blob file, which is prepared
from the primary database. This is required only for standby database PDB operations
7-180
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Note:
The parameters --blobLocation and --standbyBlobFromPrimary are mutually
exclusive.
Q: What is required when prompted during the dbaascli pdb remoteClone operation?
A: You must supply the SYS user password for the source PDB.
Q: What does the --pdbName parameter specify?
A: The --pdbName parameter specifies the name of the source PDB that you want to clone.
7-181
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
7-182
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: The --excludeUserTablespaces option allows you to skip specific user tablespaces from
being cloned. For example, t1,t2,t3.
Q: What is the effect of --excludePDBData?
A: The --excludePDBData option specifies whether to skip user data from the source PDB
during cloning. Valid values are true or yes.
7-183
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: You will need to reset or recover the SYS user password for the source PDB. Without it, the
cloning operation cannot be completed.
Example 7-40 dbaascli pdb remoteClone
Prerequisite
Run the command as the oracle user. When prompted, you must supply the SYS user
password for the source database.
Syntax
Where:
• --pdbName specifies the source PDB name to relocate
• --dbName specifies the target database name
• --sourceDBConnectionString specifies the source database connection string in the
format <scan_name>:<scan_port>/<database_service_name>
• --targetPDBName specifies a name for the target PDB (new relocated PDB)
7-184
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
• --powerLimit specifies the degree of parallelism to be used for the relocate operation
• --maxCpu specifies the maximum number of CPUs to be allocated for the PDB
• --maxSize specifies the maximum storage size in GB for the new PDB
• --resume specifies to resume the previous execution
– --sessionID specifies to resume a specific session ID
• --executePrereqs specifies yes to run only the prereqs for this operation. Valid values:
yes|no
• --sourcePDBServices specifies a list of comma-delimited source PDB services
• --sourcePDBReadOnlyServices specifies a comma-delimited list of source PDB read-only
services
• --waitForCompletion specifies false to run the operation in the background. Valid values:
true|false
• --blobLocation specifies the location of a custom directory where the standby BLOB file
will be generated in a Data Guard environment.
• --standbyBlobFromPrimary specifies the location of the standby BLOB file, which is
prepared from the primary database. This is required only for standby operations.
Note:
The parameters --blobLocation and mutually exclusive.
• --upgradePDB specifies true to upgrade the PDB as part of this operation. Valid values :
true | false.
• --updateDBBlockCachesize option to enable application to set db block cache size
initialization parameters to support data copy with different block size.
• --skipOpenPDB - indicates that the PDB should not be opened at the end of the current
operation.
• --completePDBRelocate - completes the PDB relocation if done as a two-step operation.
Q: What is required when prompted during the dbaascli pdb relocate operation?
A: You must supply the SYS user password for the source database.
Q: What does the --pdbName parameter specify?
A: The --pdbName parameter specifies the name of the source PDB to be relocated.
7-185
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: The --dbName parameter specifies the target database name where the PDB will be
relocated.
Q: How should the --sourceDBConnectionString be formatted?
A: The --sourceDBConnectionString should be formatted as <scan_name>:<scan_port>/
<database_service_name>.
7-186
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: Use --standbyBlobFromPrimary to specify the location of the standby BLOB file, which is
prepared from the primary database. This is required only for standby operations.
Q: Can I use --blobLocation and --standbyBlobFromPrimary together?
A: No, the --blobLocation and --standbyBlobFromPrimary parameters are mutually exclusive
and cannot be used together.
Q: What does --upgradePDB do?
A: The --upgradePDB parameter specifies whether to upgrade the PDB as part of the relocation
operation. Valid values are true or false.
System Management
This section focuses on overseeing and managing Oracle homes within the system. It includes
commands like dbaascli system getDBHomes to view details about all Oracle Database homes
and dbaascli system getGridHomes to list the details of all Grid Infrastructure homes. These
commands provide essential information for maintaining and troubleshooting the overall
system environment.
• dbaascli system getDBHomes
To view information about all the Oracle homes, use the dbaascli system getDBHomes
command.
• dbaascli system getGridHomes
To list the details of all Grid homes, use the dbaascli system getGridHomes command.
7-187
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Prerequisite
Run the command as the root or oracle user.
Syntax
Q: Are there any parameters for the dbaascli system getDBHomes command?
A: No, the dbaascli system getDBHomes command does not have any parameters.
Q: What kind of information does the dbaascli system getDBHomes command provide?
A: The command provides details about all Oracle homes on the system, including their paths
and other relevant information.
Q: How can I interpret the output from the dbaascli system getDBHomes command?
A: The output will list all Oracle homes with information such as the location of each Oracle
home. This information can help in managing and configuring Oracle environments.
Q: What should I do if the dbaascli system getDBHomes command does not return any
output?
A: Ensure that you are running the command as the root or oracle user and verify that Oracle
homes are properly installed on the system. You may also want to check system permissions
and configurations.
Q: What if I receive an error message while executing the dbaascli system getDBHomes
command?
A: Check the error message for specific details, verify that you have the appropriate
permissions, and ensure that the dbaascli tool is correctly installed and configured.
7-188
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Prerequisite
Run the command as the root or oracle user.
Syntax
Q: Are there any parameters for the dbaascli system getGridHomes command?
A: No, the dbaascli system getGridHomes command does not have any parameters.
7-189
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
7-190
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Prerequisite
Run the command as the root user.
Syntax
Where:
• --secondaryKmsKeyOCID specifies the secondary KMS key to add to the existing HSM
(KMS) configuration
• --dbname specifies the name of the database
• --executePrereqs sexecute the prerequisites checks and report the results.
7-191
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: The --dbname option allows you to specify the name of the database for which the
secondary KMS key should be added. It is optional.
Q: What does the --precheckOnly option do?
A: The --precheckOnly option, when set to yes, runs a precheck of the operation without
making any actual changes. The valid values are yes or no.
7-192
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Prerequisite
Run the command as the root user.
Syntax
Where:
• --dbname specifies the name of the database
• --prepareStandbyBlob - specify true to generate a blob file containing the artifacts needed
to perform the operation in a DG environment.
• --blobLocation - custom path where the standby blob file will be generated in a DG
environment.
• --standbyBlobFromPrimary - specify the location of the standby blob file which is prepared
from the primary database. This is required only for standby operations.
• --resume - to resume the previous execution
• --sessionID - to resume a specific session id.
7-193
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: How do I run the command for a specific PDB within a multitenant database?
A: You can specify the PDB name using this syntax:
dbaascli tde changePassword --dbname mydatabase --pdbName mypdb
Q: What are the prerequisites for running the dbaascli tde changePassword command?
A: You must run the command as the root user and have access to the Exadata
Cloud@Customer virtual machine where the database is running.
Q: Do I need to stop the database to change the TDE keystore password?
A: No, the database does not need to be stopped to change the TDE keystore password.
Q: What should I do if the command fails?
A: Ensure that you are running the command as the root user and that the database name (--
dbname) and PDB name (--pdbName, if applicable) are correct.
Q: What if I get an "invalid password" error when changing the TDE keystore password?
A: Make sure the new password meets your system's password complexity requirements, and
that you are entering the correct old password if prompted.
Q: How do I check if the TDE keystore password has been changed successfully?
A: You can check the database logs or use the Oracle Database Vault and Key Management
views to verify that the TDE keystore password change was successful.
Q: Can I change the TDE keystore password for a multitenant database and all PDBs at
once?
A: No, the dbaascli tde changePassword command needs to be run for each PDB individually
if you need to change the password for multiple PDBs.
Q: What happens if I forget the new TDE keystore password?
A: If the new password is forgotten, you may need to restore the keystore from a backup or
follow Oracle's recovery process to reset it, depending on your setup.
Q: Can I automate the process of changing the TDE keystore password?
7-194
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: While the dbaascli tde changePassword command itself is not designed for automation,
you can script it as part of your regular database maintenance procedures if needed.
Q: How often should I change the TDE keystore password?
A: Oracle recommends periodically changing your TDE keystore password based on your
organization's security policies. Best practices typically involve rotating encryption keys and
keystore passwords regularly.
Prerequisite
Run the command as the root user.
Syntax
Where:
• --dbname specifies the name of the Oracle Database.
• --dbrestart specifies the database restart option. Valid values are: rolling or full.
Default value: rolling
If you do not pass the dbrestart argument, then the database restarts in a rolling
manner.
• --precheckOnly runs only the precheck for this operation. Valid values are: yes or no
• --resume to resume the previous execution
• --sessionID to resume a specific session id.
7-195
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: What are the prerequisites for running the dbaascli tde enableWalletRoot command?
7-196
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: You must run the command as the root user and be connected to the correct Exadata
Cloud@Customer virtual machine.
Q: Do I need to restart the database to enable wallet_root?
A: Yes, the database will need to restart either in a rolling manner (default) or fully, depending
on the option you choose.
Q: What should I do if the command fails?
A: Ensure that you are running the command as the root user, and verify that the database
name (--dbname) is correct. Check for any precheck errors if you are running with --
precheckOnly.
7-197
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Prerequisite
Run the command as the root user.
Syntax
Where:
• --pdbName specifies the name of the PDB to encrypt all the tablespaces.
• --dbname specifies the name of the Oracle Database.
• --executePrereqs execute the prerequisites checks and report the results.
7-198
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: What are the prerequisites for running the dbaascli tde encryptTablespacesInPDB
command?
A: You must run the command as the root user and have access to the Exadata
Cloud@Customer virtual machine.
Q: Do I need to restart the database to encrypt the tablespaces?
A: No, the command does not require a database restart. The encryption is performed while
the database is online.
Q: Do I need SYSDBA credentials to encrypt tablespaces?
A: You may need SYSDBA credentials for this operation if specified using the --
useSysdbaCredential option.
7-199
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Prerequisite
Run the command as the root user.
Syntax
Where:
• --kmsKeyOCID specifies the KMS key OCID to use for TDE. This is applicable only if KMS
is selected for TDE
• --dbname specifies the name of the database
7-200
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
• --skipPatchCheck skips validation check for required patches if the value passed for this
argument is true. Valid values: true or false
• --executePrereqs sexecute the prerequisites checks and report the results.
• --primarySuc specify this property in the standby database of the Data Guard
environment once the command is successfully run on the primary database
• --resume specifies to resume the previous run
– --sessionID specifies to resume a specific session ID
• --revert specifies to rollback the previous run
– --sessionID specifies to rollback a specific session ID
• --waitForCompletion specify false to run the operation in background. Valid values : true|
false.
7-201
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: To revert a previous TDE conversion, use the --revert parameter. You can also provide the
specific session ID you want to revert using --sessionID.
Q: Can I run dbaascli tde fileToHsm without converting the TDE immediately?
A: Yes, you can use the --executePrereqs yes parameter to perform only the prechecks for
the conversion, without making any changes to the TDE.
Q: In a Data Guard environment, how do I handle the standby database after converting
TDE on the primary?
A: After successfully running the conversion on the primary database, you need to specify --
primarySuc when running the command on the standby database.
Prerequisite
Run the command as the root user.
7-202
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Syntax
Where:
• --dbname specifies the name of the database
• --infoFile specifies the file path where the list of OCIDs will be saved. The output is in
JSON format
Q: What are the prerequisites for running the dbaascli tde getHsmKeys command?
A: You must run the command as the root user and be connected to the Exadata
Cloud@Customer virtual machine.
Q: Do I need SYSDBA credentials to retrieve TDE key details?
7-203
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: No, SYSDBA credentials are not required to run the dbaascli tde getHsmKeys command.
Q: In what format is the TDE key information saved when using the --infoFile option?
A: The output is saved in JSON format.
Q: What information is included in the TDE key details?
A: The details include key OCIDs and other metadata about the active encryption keys stored
in the HSM for the specified database.
Q: What should I do if the command fails to retrieve the key details?
A: Ensure that you are running the command as the root user and that the database name (--
dbname) is correct. Check your connection to the Exadata Cloud@Customer virtual machine.
Q: How can I use the output file from the --infoFile option in other operations?
A: Since the output is in JSON format, you can parse the file programmatically or use it as
input for other database or encryption management tasks.
Q: Can I get historical TDE key details using this command?
A: No, the command only retrieves details about the currently active keys in the HSM.
Q: How do I verify that the keys retrieved are correct?
A: You can verify the keys by cross-referencing them with the Oracle Cloud Infrastructure (OCI)
console or using database views related to encryption management.
Example 7-47 dbaascli tde getHsmKeys
Prerequisite
Run the command as the root user.
7-204
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Syntax
Where:
• --kmsKeyVersionOCID specifies the KMS key version OCID to set
• --dbname specifies the name of the database
• --waitForCompletion specify false to run the operation in background. Valid values :
true|false.
7-205
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: What happens if I run the command without specifying a database name using --
dbname?
A: If the --dbname parameter is not provided, the command will attempt to retrieve the MKID for
the default database configured on the system.
Q: What should I do if I encounter an error while retrieving the MKID?
A: Ensure that:
• You are running the command as the root user.
• You are correctly connected to the Exadata Cloud@Customer virtual machine.
• The KMS key version OCID you provided is valid. If the error persists, check the system
logs for more details.
Q: How do I connect to the Exadata Cloud@Customer virtual machine?
A: You can connect to the virtual machine via SSH. Refer to the Exadata Cloud@Customer
documentation for steps on how to securely connect.
Example 7-48 dbaascli tde getMkidForKeyVersionOCID
Prerequisite
Run the command as the root user.
Syntax
Where:
• --dbname specifies the name of the database
7-206
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
7-207
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Syntax
Where:
• --dbname specifies the name of the database
• --prepareStandbyBlob specify true to generate a blob file containing the artifacts needed
to perform the operation in a DG environment.
• --blobLocation custom directory location where the standby blob file will be generated in
a DG environment.
• --standbyBlobFromPrimary specify the location of the standby blob file which is prepared
from the primary database. This is required only for standby operations. ]
• --skipPatchCheck skips validation check for required patches if the value passed for this
argument is true. Valid values: true or false
• --executePrereqs execute the prerequisites checks and report the results.
• --primarySuc specify this property in the standby database of the Data Guard
environment once the command is successfully run on the primary database
• --resume resumes the previous run
– --sessionID specifies to resume a specific session ID
• --revert specifies to roll back the previous run
– --sessionID specifies to rollback a specific session ID
• --waitForCompletion specifies false to run the operation in background. Valid values:
true|false
7-208
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: The dbaascli tde hsmToFile command is used to convert a Hardware Security Module
(HSM)-based Transparent Data Encryption (TDE) to a file-based TDE in Oracle Database
Cloud Service environments.
Q: What are the prerequisites for running the dbaascli tde hsmToFile command?
A: You must:
• Run the command as the root user.
• Ensure you have the necessary permissions and configurations set in the database
environment.
Q: What does the --dbname parameter specify?
A: The --dbname parameter specifies the name of the database for which you are converting
TDE from HSM-based to file-based.
Q: When is the --primaryDBWalletTar parameter required?
A: The --primaryDBWalletTar parameter is required only when performing the hsmToFile
conversion on a standby database. It specifies the tar file of the primary database’s wallet.
Q: What is the purpose of the --skipPatchCheck parameter?
A: The --skipPatchCheck parameter allows you to skip the validation check for required
patches. Set this to true to skip the check or false to enforce it.
Q: How do I run only prechecks for the conversion process without performing the
actual conversion?
A: You can use the --executePrereqs parameter and set it to yes to run only the prechecks.
Set it to no to perform the full conversion.
7-209
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: What should I do if I want to skip checking for required patches during the
conversion?
A: You can skip the patch check by using the --skipPatchCheck parameter and setting it to
true.
Q: How do I check if the system is ready for the hsmToFile conversion without making
changes?
A: You can perform only the prechecks by using the --executePrereqs parameter and setting
it to yes.
Prerequisite
Run the command as the root user.
Syntax
Where:
• --dbname specifies the name of the database
• --infoFilePath specify the absolute path of the file where the results will be saved.
7-210
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
7-211
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: Yes, the command can be executed while the database is running. It simply lists the TDE
master keys and does not alter the state of the database.
Q: Do I need special permissions to run this command?
A: You must run this command as the root user. Without root permissions, you will not be able
to execute the command.
Q: What is the purpose of listing TDE master keys?
A: Listing TDE master keys allows you to review the encryption keys being used for protecting
your database’s data. It is essential for monitoring and managing encryption settings.
Q: How do I connect to the Exadata Cloud@Customer virtual machine to run the
command?
A: You can connect to the virtual machine using SSH. Refer to the Exadata Cloud@Customer
documentation for instructions on how to establish a secure connection.
Example 7-51 dbaascli tde listKeys
Prerequisite
Run the command as the root user.
Syntax
Where:
• --dbname specifies the name of the database
• --confirmDeletion if not specified the user will be prompted while deleting all existing
HSM(KMS) keys.
• --secondaryKmsKeyOCID secondary KMS key to be removed from existing HSM(KMS)
configuration. If not specified all secondary KMS keys will be removed.
• --executePrereqs execute the prerequisites checks and report the results.
7-212
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: How can I test whether the system is ready to remove the secondary HSM key
without actually removing it?
A: You can use the --precheckOnly parameter set to yes to perform a precheck:
7-213
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
7-214
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Prerequisites:
Run the command as the root user.
Syntax
Where:
• --dbname specifies the name of the Oracle Database
• --rotateMasterKeyOnAllPDBs specifies true to rotate master key of all PDBs in CDB.
Valid values: true|false
• --pdbName specifies the name of the PDB
• --executePrereqs runs the prerequisites checks and report the results
• --resume specifes to resume the previous execution
• --sessionID specifies to resume a specific session ID
• --prepareStandbyBlob specifies true to generate a BLOB file containing the artifacts
needed to perform the operation in a Data Guard environment
• --blobLocation specifies the location of the custom directory where the standby BLOB file
will be generated in a Data Guard environment
• --standbyBlobFromPrimary specifies the location of the standby BLOB file, which is
prepared from the primary database. This is required only for standby operations.
7-215
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
7-216
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: How do I run a check to validate that the system is ready for master key rotation
without performing the actual operation?
A: You can use the --executePrereqs parameter to run the prerequisite checks. This will
report any issues that might prevent the master key rotation:
dbaascli tde rotateMasterKey --dbname DB_NAME --executePrereqs
Q: What should I do if the operation was interrupted, and I want to resume it?
A: You can use the --resume parameter to resume the previously interrupted operation. If you
have a session ID, provide it with the --sessionID parameter:
dbaascli tde rotateMasterKey --dbname DB_NAME --resume --sessionID <value>
Q: How do I apply the standby BLOB file from the primary database when rotating keys
on a standby database?
A: Use the --standbyBlobFromPrimary parameter to specify the location of the BLOB file that
was prepared on the primary database:
dbaascli tde rotateMasterKey --dbname DB_NAME --standbyBlobFromPrimary /path/to/
blob
7-217
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: No, restarting the database is not required after rotating the master key. The key rotation will
take effect immediately without any service disruption.
Syntax
Where:
• --kmsKeyVersionOCID specifies the KMS key version OCID to set.
• --dbname specifies the name of the database.
• --pdbName name of the PDB to use the key version OCID.
• --masterKeyID specifies the master key ID of the given key version OCID. This is
applicable to the Data Guard environment.
• --standbySuc specify this property in the primary database of the Data Guard environment
once the command is successfully run on the standby database
• --executePrereqs execute the prerequisites checks and report the results.
• --waitForCompletion specify false to run the operation in background. Valid values:
true|false
7-218
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: Is the --pdbName parameter required if setting the key version for a CDB?
A: No, the --pdbName parameter is only required if you are setting the key version for a specific
Pluggable Database (PDB). It is optional if you are setting the key version for the entire
Container Database (CDB).
Q: Is the --masterKeyID parameter necessary for non-Data Guard environments?
A: No, the --masterKeyID parameter is typically only used in Data Guard environments. For
standalone databases, this parameter is not required.
Q: How do I set the key version for a database?
A: You can set the key version for a database by running:
dbaascli tde setKeyVersion --kmsKeyVersionOCID <value> --dbname <DB_NAME>
Q: How can I ensure that all prerequisites are met before setting the key version?
A: You can run the prerequisite checks by using the --executePrereqs parameter:
dbaascli tde setKeyVersion --kmsKeyVersionOCID <value> --executePrereqs yes
7-219
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: How can I run the operation in the background without waiting for it to complete?
A: You can run the operation asynchronously by setting --waitForCompletion to false:
dbaascli tde setKeyVersion --kmsKeyVersionOCID <value> --waitForCompletion false
Q: Why is it important to set the correct KMS key version for a database?
A: Setting the correct KMS key version ensures that the database is using the appropriate
encryption key version for TDE, which helps maintain data security and compliance with
organizational policies.
Q: What happens if I use the wrong KMS key version OCID?
A: If an incorrect KMS key version OCID is used, the encryption may fail, and the database will
not be able to use the incorrect key for encryption operations. You should ensure that the
correct key version OCID is provided.
Q: Do I need to restart the database after setting the key version?
A: No, restarting the database is not necessary after setting the key version. The new key
version will take effect immediately without requiring a restart.
Example 7-53 dbaascli tde setKeyVersion
7-220
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
frankfurt-1.bjqnwclvaafak.bc4hmd3olgaaa.abtheljsyxtgn4vzi2bbpcej6a7abcwvylkd2l
x56lu2s6iwnxwgigu23nha
Syntax
Where:
• --primaryKmsKeyOCID specifies the primary KMS key to set
• --dbname specifies the name of the database
• --allStandbyPrepared specify to confirm that the operation has been successfully run on
all the standby databases.
• --bounceDatabase specify this flag to do rolling database bounce for this operation
• --executePrereqs execute the prerequisites checks and report the results.
• --resume to resume the previous execution
• --sessionID to resume a specific session id.
7-221
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: The command must be executed as the root user, and the environment should be an
Exadata Cloud@Customer virtual machine.
Q: What does the --primaryKmsKeyOCID parameter specify?
A: The --primaryKmsKeyOCID parameter specifies the OCID (Oracle Cloud Identifier) of the
primary KMS key to be set for the TDE environment.
Q: What is the function of the --dbname parameter?
A: The --dbname parameter specifies the name of the Oracle Database for which the primary
HSM/KMS key will be set.
Q: What does the --standbySuc parameter do?
A: The --standbySuc parameter is used in a Data Guard environment. It specifies that the
command should be run on the primary database after successfully executing it on the standby
database.
Q: What is the purpose of the --precheckOnly parameter?
A: The --precheckOnly parameter allows you to run only the prechecks for this operation. It
validates the environment without making any actual changes. Valid values are yes or no.
Q: How do I ensure that the operation can be executed without any issues?
A: Run the operation with the --precheckOnly parameter to verify that all prerequisites are
met:
dbaascli tde setPrimaryHsmKey --primaryKmsKeyOCID <key_OCID> --precheckOnly yes
Then, run the command on the primary database with the --standbySuc parameter:
dbaascli tde setPrimaryHsmKey --primaryKmsKeyOCID <key_OCID> --dbname <DB_NAME>
--standbySuc yes
7-222
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
A: Yes, you should specify the --dbname parameter to indicate the target database for which
the primary KMS key should be set.
Q: Is it mandatory to use the --standbySuc parameter in a Data Guard environment?
A: Yes, the --standbySuc parameter must be used when running the command on the primary
database after successfully executing it on the standby database.
Q: Can I skip the bounce operation for the database?
A: Yes, if you do not specify the --bounceDatabase parameter, the database will not be
bounced (restarted) as part of the operation.
Q: What should I do if the command fails during execution?
A: If the command fails, ensure:
• You are running it as the root user.
• The correct --primaryKmsKeyOCID and --dbname values are provided.
• The environment passes all prerequisite checks (run with --precheckOnly).
7-223
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Prerequisite
Run the command as the oracle user.
Syntax
Where:
• --dbname specifies the name of the database that you want to check.
Output from the command includes the type of keystore, and the status of the keystore.
7-224
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Q: How can I know if the keystore is open or closed using the dbaascli tde status
command?
A: The status of the keystore, including whether it is open or closed, is part of the output
returned by the dbaascli tde status command.
Q: How do I check the status of the TDE keystore for a specific database?
A: To check the TDE keystore status for a specific database, run:
dbaascli tde status --dbname <DB_NAME>
Q: Can the dbaascli tde status command be run as the root user?
A: No, the command should be executed as the oracle user, not the root user.
7-225
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Note:
dbaascli patch db prereq and dbaascli patch db apply commands have been
deprecated in dbaascli release 21.2.1.2.0, and replaced with dbaascli grid patch,
dbaascli dbhome patch, and dbaascli database move commands.
For more information, see:
• dbaascli grid patch
• dbaascli dbhome patch
• dbaascli database move
• Patching Oracle Grid Infrastructure and Oracle Databases Using dbaascli
Related Topics
• dbaascli grid patch
To patch Oracle Grid Infrastructure to the specified minor version, use the dbaascli grid
patch command.
• dbaascli dbHome patch
To patch Oracle home from one patch level to another, use the dbaascli dbHome patch
command.
7-226
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Note:
dbaascli patch db prereq and dbaascli patch db apply commands have been
deprecated in dbaascli release 21.2.1.2.0, and replaced with dbaascli grid patch,
dbaascli dbhome patch, and dbaascli database move commands.
For more information, see:
• dbaascli grid patch
• dbaascli dbhome patch
• dbaascli database move
• Patching Oracle Grid Infrastructure and Oracle Databases Using dbaascli
Related Topics
• dbaascli grid patch
To patch Oracle Grid Infrastructure to the specified minor version, use the dbaascli grid
patch command.
• dbaascli dbHome patch
To patch Oracle home from one patch level to another, use the dbaascli dbHome patch
command.
• dbaascli database move
To move the database from one home to another, use the dbaascli database move
command.
• Patching Oracle Grid Infrastructure and Oracle Databases Using dbaascli
Learn to use the dbaascli utility to perform patching operations for Oracle Grid
Infrastructure and Oracle Database on an Exadata Cloud@Customer system.
Prerequisite
Run the command as the oracle user.
Syntax
7-227
Chapter 7
Using the dbaascli Utility with Oracle Exadata Database Service on Cloud@Customer
Where:
• --dbname specifies the name of the database that you want to check.
Output from the command includes the type of keystore, and the status of the keystore.
Q: How do I check the status of the TDE keystore for a specific database?
A: To check the TDE keystore status for a specific database, run:
dbaascli tde status --dbname <DB_NAME>
Q: Can the dbaascli tde status command be run as the root user?
A: No, the command should be executed as the oracle user, not the root user.
7-228
Chapter 7
Monitoring and Managing Exadata Storage Servers with ExaCLI
7-229
Chapter 7
Monitoring and Managing Exadata Storage Servers with ExaCLI
• ExaCLI Command
Use ExaCLI (exacli) to configure cell, database node configuration, and objects in the
remote node environment, and to monitor your Oracle Exadata Database Service on
Cloud@Customer service and objects.
• Connecting to a Storage Server with ExaCLI
To use ExaCLI on storage servers, you will need to know your target storage server's IP
address.
The password for cloud_user_clustername is initially set to a random value, which you can
view by running the following command as the opc user on any cluster node:
/opt/exacloud/get_cs_data.py
ExaCLI Command
Use ExaCLI (exacli) to configure cell, database node configuration, and objects in the remote
node environment, and to monitor your Oracle Exadata Database Service on
Cloud@Customer service and objects.
Purpose
ExaCLI (exacli) enables you configure your Oracle Exadata Database Service on
Cloud@Customer system, and to obtain real-time information about your Exadata Cloud
Service. To obtain information about the services and options on your system, run ExaCLI
using the monitoring command parameter that you require.
To obtain a list of the system monitoring parameters you can use with ExaCLI, run the LIST
parameter.
7-230
Chapter 7
Monitoring and Managing Exadata Storage Servers with ExaCLI
Syntax
exacli -c [username@]remotehost[:port]
[-l username]
[--xml]
[--cookie-jar filename]
[-e {command | 'command; command' | @batchfile}]
Options
Option Description
-c [username@]remotehost or --connect Specifies the remote node to which you want to
[username@]remotehost[:port] connect. ExaCLI prompts for the user name if not
specified.
-l username or --login-name username Specifies the user name to log into the remote
node. The preconfigured user is
cloud_user_clustername.
--xml Displays the output in XML format.
--cookie-jar [filename] Specifies the file name of the cookie jar to use. If
you do not specify a file name, then the cookie is
stored in a default cookie jar located at
HOME/.exacli/cookiejar, where HOME is
the home directory of the operating system user
running the exacli command.
The presence of a valid cookie allows the ExaCLI
user to run commands without requiring the user to
log in during subsequent ExaCLI sessions.
-e command or -e 'command[; command]' or - Specifies either the ExaCLI commands to run, or a
e @batchFile batch file. After running the commands, ExaCLI
quits.
If you are specifying multiple commands to run,
then enclose the commands in single quotes to
prevent the shell from interpreting the semicolon.
To start an interactive ExaCLI session, omit this
command.
--cert-proxy proxy[:port] Specifies the proxy server that you want to use
when downloading certificates. If port is omitted,
then port 80 is used by default.
-n or --no-prompt Suppresses prompting for user input.
Command Parameters
To obtain information about objects and services on your system, use these ExaCLI command
parameters.
7-231
Chapter 7
Monitoring and Managing Exadata Storage Servers with ExaCLI
7-232
Chapter 7
Monitoring and Managing Exadata Storage Servers with ExaCLI
METRICDEFINITION Lists metric definitions for the object that you can
then get details for. With the command LIST
metricDefinition WHERE objectType=cell,
you can get all the metrics for that object type. You
can then use the metric definition object again to
get details for one of those specific metrics just
listed:
7-233
Chapter 7
Monitoring and Managing Exadata Storage Servers with ExaCLI
7-234
Chapter 7
Monitoring and Managing Exadata Storage Servers with ExaCLI
Usage Notes
• Notes for the --cookie-jar option:
– The user name and password are sent to the remote node for authentication. On
successful authentication, the remote node issues a cookie (the login credentials) that
is stored in the specified filename on the database node. If filename is not specified,
the cookie is stored in a default cookie jar located at HOME/.exacli/cookiejar, where
HOME is the home directory of the operating system user running the ExaCLI command.
For the opc user, the home is /home/opc.
– The operating system user running the ExaCLI command is the owner of the cookie jar
file.
– A cookie jar can contain multiple cookies from multiple users on multiple nodes in
parallel sessions.
– Cookies are invalidated after 24 hours.
– If the cookie is not found or is no longer valid, ExaCLI prompts for the password. The
new cookie is stored in the cookie jar identified by filename, or the default cookie jar if
filename is not specified.
– Even without the --cookie-jar option, ExaCLI still checks for cookies from the default
cookie jar. However, if the cookie does not exist or is no longer valid, the new cookie
will not be stored in the default cookie jar if the --cookie-jar option is not specified.
• Notes for the -e option:
– ExaCLI exits after running the commands.
– If specifying multiple commands to run, be sure to enclose the commands in single
quotes to prevent the shell from interpreting the semi-colon.
– The batch file is a text file that contains one or more ExaCLI commands to run.
• Notes for the -n (--no-prompt) option:
7-235
Chapter 7
Monitoring and Managing Exadata Storage Servers with ExaCLI
– If ExaCLI needs additional information from the user, for example, if ExaCLI needs to
prompt the user for a password (possibly because there were no valid cookies in the
cookie-jar) or to prompt the user to confirm the remote node’s identity, then ExaCLI
prints an error message and exits.
Examples
Example 7-57 Starting an Interactive ExaCLI Session on a Storage Server
This example shows the user on an Exadata compute node issuing the command to log in to
ExaCLI start an interactive ExaCLI session on a storage server:
See "Finding the IP addresses of storage cells using the cellip.ora file" for information about
how to determine your storage server IP address.
After you are logged in, run additional commands as follows:
Related Topics
• Connecting to a Storage Server with ExaCLI
To use ExaCLI on storage servers, you will need to know your target storage server's IP
address.
The following example illustrates how to do so on the UNIX command line for a quarter rack
system. (Note that a quarter rack has three storage cells, and each cell has two connections,
so a total of six IP addresses are shown.)
cat /etc/oracle/cell/
network-config/cellip.oracle
cell="192.168.136.5;cell="192.168.136.6"
7-236
Chapter 7
Monitor Metrics for VM Cluster Resources
cell="192.168.136.7;cell="192.168.136.8"
cell="192.168.136.9;cell="192.168.136.10"
If you are connecting to a storage cell for the first time using ExaCLI, you may be prompted to
accept an SSL certificate. The ExaCLI output in this case will look like the following:
Accept the self-signed Oracle certificate by pressing "y" to continue using ExaCLI.
Note:
To view metrics you must have the required access as specified in an Oracle Cloud
Infrastructure policy (whether you're using the Console, the REST API, or another
tool). For more information on policies, see Getting Started with Policies.
7-237
Chapter 7
Monitor Metrics for VM Cluster Resources
If the defaultocimonitoring flag is set to OFF, then run the tfactl set
defaultocimonitoring=on or tfactl set defaultocimonitoring=ON command to turn it
on:
• The network communication uses the existing path that the Control Plane Server uses to
reach the OCI Services. For more information, see Network Requirements for Oracle
Exadata Database Service on Cloud@Customer.
Related Topics
• Network Requirements for Oracle Exadata Database Service on Cloud@Customer
Review the network requirements for provisioning Oracle Exadata Database Service on
Cloud@Customer at your site.
• Manage Oracle Trace File Analyzer
7-238
Chapter 7
Monitor Metrics for VM Cluster Resources
Note:
When there is a network problem and Oracle Trace File Analyzer (TFA) is unable to
post metrics, TFA will wait for one hour before attempting to retry posting the metrics.
This is required to avoid creating a backlog of metrics processing on TFA.
Potentially one hour of metrics will be lost between network restore and the first
metric posted.
1. Open the navigation menu. Click Oracle Database, then click Exadata Database Service
on Cloud@Customer.
2. Choose your Compartment.
A list of VM Clusters is displayed.
3. In the list of VM Clusters, click the VM Cluster for which you want to view the metrics.
Details of the VM Cluster you selected are displayed.
4. Under Resources, click Metrics.
A chart for each metric is displayed. By default, the metrics for the last hour are displayed.
You can only select the oci_database_cluster namespace from the Metric namespace
drop-down.
5. If you want to change the interval, select the required start time and end time.
Alternatively, you can select the interval from the Quick Selects drop-down menu. The
metrics are refreshed immediately for the selected interval.
6. For each metric, you can choose the interval and statistic independently.
• Interval: The time period for which the metric is calculated.
• Statistic: The mathematical method by which the metric is calculated.
7. For each metric, you can choose the following options from the Options drop-down menu.
• View Query in Metrics Explorer
• Copy Chart URL
• Copy Query (MQL)
• Create an Alarm on this Query
• Table View
For Detailed information on various options for viewing the metrics chart, see Viewing
Default Metric Charts.
Related Topics
• Viewing Default Metric Charts
7-239
Chapter 7
Monitor Metrics for VM Cluster Resources
Note:
When there is a network problem and Oracle Trace File Analyzer (TFA) is unable to
post metrics, TFA will wait for one hour before attempting to retry posting the metrics.
This is required to avoid creating a backlog of metrics processing on TFA.
Potentially one hour of metrics will be lost between network restore and the first
metric posted.
1. Open the navigation menu. Click Oracle Database, then click Exadata Database Service
on Cloud@Customer.
2. Choose your Compartment.
A list of VM Clusters is displayed.
3. In the list of VM Clusters, click the VM Cluster for which you want to view the metrics.
Details of the VM Cluster you selected are displayed.
4. In the list of databases, click the database for which you want to view the metrics.
5. Under Resources, click Metrics.
A chart for each metric is displayed. By default, the metrics for the last hour are displayed.
You can only select the oci_database namespace from the Metric namespace drop-
down.
6. If you want to change the interval, select the required start time and end time.
Alternatively, you can select the interval from the Quick Selects drop-down menu. The
metrics are refreshed immediately for the selected interval.
7. For each metric, you can choose the interval and statistic independently.
• Interval: The time period for which the metric is calculated.
• Statistic: The mathematical method by which the metric is calculated.
8. For each metric, you can choose the following options from the Options drop-down menu.
• View Query in Metrics Explorer
• Copy Chart URL
• Copy Query (MQL)
• Create an Alarm on this Query
• Table View
For Detailed information on various options for viewing the metrics chart, see Viewing
Default Metric Charts.
Related Topics
• Viewing Default Metric Charts
7-240
Chapter 7
Monitor Metrics for VM Cluster Resources
Note:
When there is a network problem and Oracle Trace File Analyzer (TFA) is unable to
post metrics, TFA will wait for one hour before attempting to retry posting the metrics.
This is required to avoid creating a backlog of metrics processing on TFA.
Potentially one hour of metrics will be lost between network restore and the first
metric posted.
1. Open the Oracle Cloud Infrastructure Console by clicking the menu icon next to Oracle
Cloud.
2. From the left navigation list click Observability & Management.
3. Under Monitoring, click Service Metrics.
4. On the Service Metrics page, under Compartment, select your compartment.
5. On the Service Metrics page, under Metric Namespace, select oci_database_cluster.
6. If there are multiple VM Clusters in the compartment, then you can show metrics
aggregated across the clusters by selecting Aggregate Metric Streams.
7. If you want to limit the metrics you see, next to Dimensions, click Add (click Edit if you
have already added dimensions).
8. In the Dimension Name field, select a dimension.
9. In the Dimension Value field, select a value.
10. Click Done.
11. In the Edit dimensions dialog click +Additional Dimension to add an additional
dimension. Click X to remove a dimension.
12. To create an alarm on a specific metric, click Options and select Create an Alarm on this
Query. See Managing Alarms for information on setting and using alarms.
Note:
If you don't see any metrics, check the network settings and AHF version listed in
the prerequisites section.
Related Topics
• Managing Alarms
7-241
Chapter 7
Monitor Metrics for VM Cluster Resources
Note:
When there is a network problem and Oracle Trace File Analyzer (TFA) is unable to
post metrics, TFA will wait for one hour before attempting to retry posting the metrics.
This is required to avoid creating a backlog of metrics processing on TFA.
Potentially one hour of metrics will be lost between network restore and the first
metric posted.
1. Open the Oracle Cloud Infrastructure Console by clicking the menu icon next to Oracle
Cloud.
2. From the left navigation list click Observability & Management.
3. Under Monitoring, click Service Metrics.
4. On the Service Metrics page, under Compartment, select your compartment.
5. On the Service Metrics page, under Metric Namespace, select oci_database.
6. If there are multiple databases in the compartment, then you can show metrics aggregated
across the databases by selecting Aggregate Metric Streams.
7. If you want to limit the metrics you see, next to Dimensions, click Add (click Edit if you
have already added dimensions).
8. In the Dimension Name field, select a dimension.
9. In the Dimension Value field, select a value.
10. Click Done.
11. In the Edit dimensions dialog click +Additional Dimension to add an additional
dimension. Click X to remove a dimension.
12. To create an alarm on a specific metric, click Options and select Create an Alarm on this
Query. See Managing Alarms for information on setting and using alarms.
Note:
If you don't see any metrics, check the network settings and AHF version listed in
the prerequisites section.
Related Topics
• Managing Alarms
7-242
Chapter 7
Monitor Metrics for VM Cluster Resources
The deployment of the cloud-certified Autonomous Health Framework (AHF), which includes
Oracle Trace File Analyzer, is managed by Oracle. You shouldn’t install this manually on the
guest VMs.
• To check the run status of Oracle Trace File Analyzer, run the tfactl status command as
root or a non-root user:
# tfactl status
.--------------------------------------------------------------------------
-----------------------.
| Host | Status of TFA | PID | Port | Version | Build
ID | Inventory Status|
+----------------+---------------+--------+------+------------
+----------------------+------------+
| node1 | RUNNING | 41312 | 5000 | 22.1.0.0.0 |
22100020220310214615| COMPLETE |
| node2 | RUNNING | 272300 | 5000 | 22.1.0.0.0 |
22100020220310214615| COMPLETE |
'----------------+---------------+--------+------+------------
+----------------------+------------'
• To start the Oracle Trace File Analyzer daemon on the local node, run the tfactl start
command as root:
# tfactl start
Starting TFA..
Waiting up to 100 seconds for TFA to be started..
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
Successfully started TFA Process..
. . . . .
TFA Started and listening for commands
• To stop the Oracle Trace File Analyzer daemon on the local node, run the tfactl stop
command as root:
# tfactl stop
Stopping TFA from the Command Line
Nothing to do !
Please wait while TFA stops
Please wait while TFA stops
TFA-00002 Oracle Trace File Analyzer (TFA) is not running
TFA Stopped Successfully
Successfully stopped TFA..
7-243
Chapter 7
Metrics for Oracle Exadata Database Service on Cloud@Customer in the Monitoring Service
Dimensions
All the metrics discussed in this topic include the following dimensions.
• RESOURCEID: The OCID of the VM Cluster.
• RESOURCENAME: The name of the VM Cluster.
NOT_SUPPORTED
The metrics listed in the following table are automatically available for the VM cluster.
7-244
Chapter 7
Metrics for Oracle Exadata Database Service on Cloud@Customer in the Monitoring Service
NOT_SUPPORTED
The metrics listed in the following table are automatically available for the database.
7-245
Chapter 7
Metrics for Oracle Exadata Database Service on Cloud@Customer in the Monitoring Service
7-246
Chapter 7
Metrics for Oracle Exadata Database Service on Cloud@Customer in the Monitoring Service
7-247
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
7-248
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
7-249
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
Related Topics
• Overview of Events
• Notifications Overview
7-250
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
{
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.createexadatainfrastructure.begin",
"source": "databaseservice",
"eventTypeVersion": "version",
"eventTime": "2019-08-29T21:16:04Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_exadata_infra",
"resourceId": "ExadataInfra-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeUpdated": "2019-08-29T12:30:00.000Z",
"lifecycleDetails": "detail message",
"shape": "ExadataCC.Base3.48",
"timeZone": "US/Pacific",
"displayName": "testDisplayName"
}
}
}
{
"eventType" :
"com.oraclecloud.databaseservice.exadatainfrastructureconnectstatus",
"cloudEventsVersion" : "0.1",
7-251
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"eventTypeVersion" : "2.0",
"source" : "DatabaseService",
"eventTime" : "2020-06-02T06:07:40.141Z",
"contentType" : "application/json",
"data" : {
"compartmentId" :
"ocid1.compartment.oc1..aaaaaaaayrygl4guhplo5rtiumx3eh4mk7grrkrqspzaltmvbxecnb
vhkrga",
"compartmentName" : "DBaaSInteg20160918ExaccTest",
"resourceName" : "MVM_HR",
"resourceId" : "ocid1.exadatainfrastructure.oc1.ap-
hyderabad-1.abuhsljrp2vzzenmqmctqciwro6euhhsmlrewiiemiktov5xyfsu5hiufjsq",
"availabilityDomain" : "",
"additionalDetails" : {
"timeCreated" : "2020-05-28T00:23:18Z",
"timeUpdated" : "2020-06-02T06:07:40Z",
"lifecycleState" : "DISCONNECTED",
"lifecycleDetails" : "Exadata Infrastructure is not reachable. Please
lodge a Service Request (SR) with Oracle Support and provide Infrastructure-
id: ocid1.exadatainfrastructure.oc1.ap-
hyderabad-1.abuhsljrp2vzzenmqmctqciwro6euhhsmlrewiiemiktov5xyfsu5hiufjsq.",
"shape" : "ExadataCC.Half3.200",
"timeZone" : "UTC"
},
"definedTags" : {
"Oracle-Tags" : {
"CreatedBy" : "[email protected]",
"CreatedOn" : "2020-05-28T00:23:18.291Z"
}
}
},
"eventID" : "cde92d45-a06b-4b69-a125-6005dd8c2f0c",
"extensions" : {
"compartmentId" :
"ocid1.compartment.oc1..aaaaaaaayrygl4guhplo5rtiumx3eh4mk7grrkrqspzaltmvbxecnb
vhkrga"
}
}
This is a reference event for Exadata Infrastructure - Custom action time Begin:
{
"id":
"ocid1.eventschema.oc1.phx.abyhqlasasjrs5agc5dbs2dupjpkv56dyepsuqkdbyklzaei7kk
ut442gd7taksq5q",
"serviceName": "Database",
"displayName": "Exadata Infrastructure - Custom action time Begin",
"eventType":
"com.oraclecloud.databaseservice.exaccinframtncustomactiontime.begin",
"source": "databaseservice",
"eventTypeVersion": "2.0",
"eventTime": "2019-06-27T21:16:04.000Z",
"contentType": "application/json",
"additionalDetails": [
{
7-252
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"name": "id",
"type": "string"
},
{
"name": "defineTags",
"type": [
"null",
"string"
]
},
{
"name": "freeFormTags",
"type": [
"null",
"string"
]
},
{
"name": "timeCreated",
"type": "string"
},
{
"name": "timeScheduled",
"type": "string"
},
{
"name": "timeStarted",
"type": "string"
},
{
"name": "availabilityDomain",
"type": [
"null",
"string"
]
},
{
"name": "lifecycleState",
"type": "string"
},
{
"name": "message",
"type": [
"null",
"string"
]
},
{
"name": "description",
"type": [
"null",
"string"
]
},
{
"name": "shape",
7-253
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"type": [
"null",
"string"
]
},
{
"name": "displayName",
"type": [
"null",
"int"
]
}
],
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "b28fcda6-3d7b-4044-aa8e-7c21cde84b44",
"eventType":
"com.oraclecloud.databaseservice.exaccinframtncustomactiontime.begin",
"source": "databaseservice",
"eventTypeVersion": "2.0",
"eventTime": "2019-06-27T21:16:04.000Z",
"contentType": "application/json",
"data": {
"eventGroupingId": "4976b940-2c2d-4380-a669-1d70d071b187",
"eventName": "ExaccInfraMtnCustomActionTime",
"compartmentId": "ocid1.compartment.oc1.......unique_id",
"compartmentName": "example_compartment",
"resourceName": "my_exacc_infrastructure",
"resourceId": "ocid1.exadatainfrastructure.oc1.....unique_id",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.dbmaintenancerun.oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeScheduled": "2019-08-29T12:30:00.000Z",
"timeStarted": "2019-08-29T12:30:00.000Z",
"description": "ExaCC Infrastructure Maintenance Notifications",
"message": "detail message",
"shape": "ExadataCC.Base3.48",
"displayName": "testDisplayName"
}
}
},
"timeCreated": "2020-06-15T16:31:31.979Z"
}
This is a reference event for Exadata Infrastructure - Custom action time End:
{
"id":
"ocid1.eventschema.oc1.phx.abyhqljrs5agc5dbs2dupjpkv56dyepsuqdfdfkdbyklzaei7kk
ut442gd7taksq5q",
"serviceName": "Database",
7-254
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
7-255
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
{
"name": "description",
"type": [
"null",
"string"
]
},
{
"name": "shape",
"type": [
"null",
"string"
]
},
{
"name": "displayName",
"type": [
"null",
"int"
]
}
],
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "b28fcda6-3d7b-4044-aa8e-7c21cde84b44",
"eventType":
"com.oraclecloud.databaseservice.exaccinframtncustomactiontime.end",
"source": "databaseservice",
"eventTypeVersion": "2.0",
"eventTime": "2019-06-27T21:16:04.000Z",
"contentType": "application/json",
"data": {
"eventGroupingId": "4976b940-2c2d-4380-a669-1d70d071b187",
"eventName": "ExaccInfraMtnCustomActionTime",
"compartmentId": "ocid1.compartment.oc1.......unique_id",
"compartmentName": "example_compartment",
"resourceName": "my_exacc_infrastructure",
"resourceId": "ocid1.exadatainfrastructure.oc1.....unique_id",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.dbmaintenancerun.oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeScheduled": "2019-08-29T12:30:00.000Z",
"timeStarted": "2019-08-29T12:30:00.000Z",
"description": "ExaCC Infrastructure Maintenance Notifications",
"message": "detail message",
"shape": "ExadataCC.Base3.48",
"displayName": "testDisplayName"
}
}
},
"timeCreated": "2020-06-15T16:31:31.979Z"
}
7-256
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
{
"id":
"ocid1.eventschema.oc1.phx.abyhqljrs5agc5dbs2dupjpkv56asasdyepsuqkdbyklzaei7kk
ut442gd7taksq5q",
"serviceName": "Database",
"displayName": "Exadata Infrastructure - IB Switch maintenance Begin",
"eventType":
"com.oraclecloud.databaseservice.exaccinfrastructuremaintenanceibswitch.begin"
,
"source": "databaseservice",
"eventTypeVersion": "2.0",
"eventTime": "2019-06-27T21:16:04.000Z",
"contentType": "application/json",
"additionalDetails": [
{
"name": "id",
"type": "string"
},
{
"name": "defineTags",
"type": [
"null",
"string"
]
},
{
"name": "freeFormTags",
"type": [
"null",
"string"
]
},
{
"name": "timeCreated",
"type": "string"
},
{
"name": "timeScheduled",
"type": "string"
},
{
"name": "timeStarted",
"type": "string"
},
{
"name": "availabilityDomain",
"type": [
"null",
"string"
]
},
{
"name": "lifecycleState",
"type": "string"
7-257
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
},
{
"name": "message",
"type": [
"null",
"string"
]
},
{
"name": "description",
"type": [
"null",
"string"
]
},
{
"name": "shape",
"type": [
"null",
"string"
]
},
{
"name": "displayName",
"type": [
"null",
"int"
]
}
],
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "b28fcda6-3d7b-4044-aa8e-7c21cde84b98",
"eventType":
"com.oraclecloud.databaseservice.exaccinfrastructuremaintenanceibswitch.begin"
,
"source": "databaseservice",
"eventTypeVersion": "2.0",
"eventTime": "2019-06-27T21:16:04.000Z",
"contentType": "application/json",
"data": {
"eventGroupingId": "4976b940-2c2d-4380-a669-1d70d071b187",
"eventName": "ExaccInfrastructureMaintenanceIBSwitch",
"compartmentId": "ocid1.compartment.oc1.......unique_id",
"compartmentName": "example_compartment",
"resourceName": "my_exacc_infrastructure",
"resourceId": "ocid1.exadatainfrastructure.oc1.....unique_id",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.dbmaintenancerun.oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeScheduled": "2019-08-29T12:30:00.000Z",
"timeStarted": "2019-08-29T12:30:00.000Z",
7-258
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
{
"id":
"ocid1.eventschema.oc1.phx.abyhqljrs5agc5dbs2dupjpkv56dyepsusdsdqkdbyklzaei7kk
ut442gd7taksq5q",
"serviceName": "Database",
"displayName": "Exadata Infrastructure - IB Switch maintenance End",
"eventType":
"com.oraclecloud.databaseservice.exaccinfrastructuremaintenanceibswitch.end",
"source": "databaseservice",
"eventTypeVersion": "2.0",
"eventTime": "2019-06-27T21:16:04.000Z",
"contentType": "application/json",
"additionalDetails": [
{
"name": "id",
"type": "string"
},
{
"name": "defineTags",
"type": [
"null",
"string"
]
},
{
"name": "freeFormTags",
"type": [
"null",
"string"
]
},
{
"name": "timeCreated",
"type": "string"
},
{
"name": "timeScheduled",
"type": "string"
},
{
"name": "timeStarted",
"type": "string"
},
7-259
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
{
"name": "availabilityDomain",
"type": [
"null",
"string"
]
},
{
"name": "lifecycleState",
"type": "string"
},
{
"name": "message",
"type": [
"null",
"string"
]
},
{
"name": "description",
"type": [
"null",
"string"
]
},
{
"name": "shape",
"type": [
"null",
"string"
]
},
{
"name": "displayName",
"type": [
"null",
"int"
]
}
],
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "b28fcda6-3d7b-4044-aa8e-7c21cde84b98",
"eventType":
"com.oraclecloud.databaseservice.exaccinfrastructuremaintenanceibswitch.end",
"source": "databaseservice",
"eventTypeVersion": "2.0",
"eventTime": "2019-06-27T21:16:04.000Z",
"contentType": "application/json",
"data": {
"eventGroupingId": "4976b940-2c2d-4380-a669-1d70d071b187",
"eventName": "ExaccInfrastructureMaintenanceIBSwitch",
"compartmentId": "ocid1.compartment.oc1.......unique_id",
"compartmentName": "example_compartment",
"resourceName": "my_exacc_infrastructure",
"resourceId": "ocid1.exadatainfrastructure.oc1.....unique_id",
7-260
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.dbmaintenancerun.oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeScheduled": "2019-08-29T12:30:00.000Z",
"timeStarted": "2019-08-29T12:30:00.000Z",
"description": "ExaCC Infrastructure Maintenance Notifications",
"message": "detail message",
"shape": "ExadataCC.Base3.48",
"displayName": "testDisplayName"
}
}
},
"timeCreated": "2020-06-15T16:31:31.979Z"
}
This is a reference event for Exadata Infrastructure - Storage server maintenance Begin:
{
"id":
"ocid1.eventschema.oc1.phx.abyhqljrsasas5agc5dbs2dupjpkv56dyepsuqkdbyklzaei7kk
ut442gd7taksq5q",
"serviceName": "Database",
"displayName": "Exadata Infrastructure - Storage server maintenance Begin",
"eventType":
"com.oraclecloud.databaseservice.exaccinfrastructuremaintenancestorageservers.
begin",
"source": "databaseservice",
"eventTypeVersion": "2.0",
"eventTime": "2019-06-27T21:16:04.000Z",
"contentType": "application/json",
"additionalDetails": [
{
"name": "id",
"type": "string"
},
{
"name": "defineTags",
"type": [
"null",
"string"
]
},
{
"name": "freeFormTags",
"type": [
"null",
"string"
]
},
{
"name": "timeCreated",
7-261
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"type": "string"
},
{
"name": "timeScheduled",
"type": "string"
},
{
"name": "timeStarted",
"type": "string"
},
{
"name": "availabilityDomain",
"type": [
"null",
"string"
]
},
{
"name": "lifecycleState",
"type": "string"
},
{
"name": "message",
"type": [
"null",
"string"
]
},
{
"name": "description",
"type": [
"null",
"string"
]
},
{
"name": "shape",
"type": [
"null",
"string"
]
},
{
"name": "displayName",
"type": [
"null",
"int"
]
}
],
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "b28fcda6-3d7b-4044-aa8e-7c21cde84b55",
"eventType":
"com.oraclecloud.databaseservice.exaccinfrastructuremaintenancestorageservers.
begin",
7-262
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"source": "databaseservice",
"eventTypeVersion": "2.0",
"eventTime": "2019-06-27T21:16:04.000Z",
"contentType": "application/json",
"data": {
"eventGroupingId": "4976b940-2c2d-4380-a669-1d70d071b187",
"eventName": "ExaccInfrastructureMaintenanceStorageServers",
"compartmentId": "ocid1.compartment.oc1.......unique_id",
"compartmentName": "example_compartment",
"resourceName": "my_exacc_infrastructure",
"resourceId": "ocid1.exadatainfrastructure.oc1.....unique_id",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.dbmaintenancerun.oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeScheduled": "2019-08-29T12:30:00.000Z",
"timeStarted": "2019-08-29T12:30:00.000Z",
"description": "ExaCC Infrastructure Maintenance Notifications",
"message": "detail message",
"shape": "ExadataCC.Base3.48",
"displayName": "testDisplayName"
}
}
},
"timeCreated": "2020-06-15T16:31:31.979Z"
}
This is a reference event for Exadata Infrastructure - Storage server maintenance End:
{
"id":
"ocid1.eventschema.oc1.phx.abyhqljasrs5agddc5dbs2dupjpkv56dyepsuqkdbyklzaei7kk
ut442gd7taksq5q",
"serviceName": "Database",
"displayName": "Exadata Infrastructure - Storage server maintenance End",
"eventType":
"com.oraclecloud.databaseservice.exaccinfrastructuremaintenancestorageservers.
end",
"source": "databaseservice",
"eventTypeVersion": "2.0",
"eventTime": "2019-06-27T21:16:04.000Z",
"contentType": "application/json",
"additionalDetails": [
{
"name": "id",
"type": "string"
},
{
"name": "defineTags",
"type": [
"null",
"string"
7-263
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
]
},
{
"name": "freeFormTags",
"type": [
"null",
"string"
]
},
{
"name": "timeCreated",
"type": "string"
},
{
"name": "timeScheduled",
"type": "string"
},
{
"name": "timeStarted",
"type": "string"
},
{
"name": "availabilityDomain",
"type": [
"null",
"string"
]
},
{
"name": "lifecycleState",
"type": "string"
},
{
"name": "message",
"type": [
"null",
"string"
]
},
{
"name": "description",
"type": [
"null",
"string"
]
},
{
"name": "shape",
"type": [
"null",
"string"
]
},
{
"name": "displayName",
"type": [
7-264
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"null",
"int"
]
}
],
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "b28fcda6-3d7b-4044-aa8e-7c21cde84b55",
"eventType":
"com.oraclecloud.databaseservice.exaccinfrastructuremaintenancestorageservers.
end",
"source": "databaseservice",
"eventTypeVersion": "2.0",
"eventTime": "2019-06-27T21:16:04.000Z",
"contentType": "application/json",
"data": {
"eventGroupingId": "4976b940-2c2d-4380-a669-1d70d071b187",
"eventName": "ExaccInfrastructureMaintenanceStorageServers",
"compartmentId": "ocid1.compartment.oc1.......unique_id",
"compartmentName": "example_compartment",
"resourceName": "my_exacc_infrastructure",
"resourceId": "ocid1.exadatainfrastructure.oc1.....unique_id",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.dbmaintenancerun.oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeScheduled": "2019-08-29T12:30:00.000Z",
"timeStarted": "2019-08-29T12:30:00.000Z",
"description": "ExaCC Infrastructure Maintenance Notifications",
"message": "detail message",
"shape": "ExadataCC.Base3.48",
"displayName": "testDisplayName"
}
}
},
"timeCreated": "2020-06-15T16:31:31.979Z"
}
7-265
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
{
"cloudEventsVersion": "0.1",
7-266
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.createvmclusternetwork.begin",
"source": "databaseservice",
"eventTypeVersion": "version",
"eventTime": "2019-08-29T21:16:04Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_vmcluster_network",
"resourceId": "VmClusterNetwork-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeUpdated": "2019-08-29T12:30:00.000Z",
"lifecycleDetails": "detail message",
"exadataInfrastructureId": "ExadataInfra-unique_ID",
"displayName": "testDisplayName"
}
}
}
7-267
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
{
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.createvmclusternetwork.begin",
"source": "databaseservice",
"eventTypeVersion": "version",
"eventTime": "2019-08-29T21:16:04Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_vmcluster_network",
"resourceId": "VmClusterNetwork-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeUpdated": "2019-08-29T12:30:00.000Z",
"lifecycleDetails": "detail message",
"exadataInfrastructureId": "ExadataInfra-unique_ID",
"displayName": "testDisplayName"
}
}
}
{
"cloudEventsVersion": "0.1",
"eventId": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType": "com.oraclecloud.databaseservice.createvmcluster.begin",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-06-27T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_database",
"resourceId": "Vmcluster-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
7-268
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-09-03T12:00:00.000Z",
"timeUpdated": "2019-09-03T12:30:00.000Z",
"displayName": "testDisplayName",
"lifecycleDetails": "detail message",
"exadataInfrastructureId": "ExatraInfra-unique_ID",
"vmClusterNetworkId": "VmCluster-unique_ID",
"cpuCoreCount": 2,
"dataStorageSizeInTBs": 4,
"dbVersion": "19.0.0.0",
"licenseType": "BRING_YOUR_OWN_LICENSE",
"giVersion": "19.0.0.0",
"dbNodeIds": "[ocid1.dbnode.1, ocid1.dbnode.2,...]",
"timeZone": "US/Pacific"
}
}
}
{
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType": "com.oraclecloud.databaseservice.createbackupdestination",
"source": "databaseservice",
"eventTypeVersion": "version",
"eventTime": "2019-08-29T21:16:04Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
7-269
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_backupdestination",
"resourceId": "BackupDestination-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {}
}
}
{
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType": "com.oraclecloud.databaseservice.dbnodeaction.begin",
"source": "databaseservice",
"eventTypeVersion": "version",
"eventTime": "2019-06-27T21:16:04Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_dbnode",
"resourceId": "DbNode-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-08-26T12:00:00.000Z",
"timeUpdated": "2019-08-26T12:30:00.000Z",
"dbSystemId": "ocid1.dbsystem.oc1.phx.unique_ID",
"lifecycleDetails": "detail message",
7-270
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"vmClusterId": "VmCluster-unique_ID",
"dbHostId": "dbHost-unique_ID",
"nodeNumber": 2,
"powerAction": "HardReset",
"hostName": "testHostName"
}
}
}
{
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType": "com.oraclecloud.databaseservice.createdbhome.begin",
"source": "databaseservice",
"eventTypeVersion": "version",
"eventTime": "2019-08-29T21:16:04Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_dbhome",
"resourceId": "DbHome-unique_ID",
"availabilityDomain": "all",
7-271
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeUpdated": "2019-08-29T12:30:00.000Z",
"lifecycleDetails": "detail message",
"dbSystemId": "DbSystem-unique_ID",
"dbVersion": "19.0.0.0",
"recordVersion": 4,
"displayName": "testDisplayName"
}
}
}
7-272
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
{
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType": "com.oraclecloud.databaseservice.restoredatabase.begin",
"source": "databaseservice",
"eventTypeVersion": "version",
"eventTime": "2019-06-27T21:16:04Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_database",
"resourceId": "Database-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-08-26T12:00:00.000Z",
"timeUpdated": "2019-08-26T12:30:00.000Z",
"dbSystemId": "dbSystem-unique_ID",
"displayName": "testDisplayName",
"lifecycleDetails": "detail message",
"vmClusterId": "VmCluster-unique_ID",
"backupType": "FULL",
"dbHomeId": "dbHome-unique_ID",
"dbVersion": "19.0.0.0",
"databaseEdition": "ENTERPRISE_EDITION_EXTREME",
"autoBackupsEnabled": "true",
"recoveryWindow": 30,
"backupDestinationId": "backupDestination-unique_ID",
"backupDestinationType": "OBJECT_STORAGE",
"backupDestinationName": "my_backup_destination_name",
"exadataInfrastructureId": "ExadataInfrastructure-unique_ID",
"dbUniqueName": "akv_tgh_unqna"
}
}
}
7-273
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
{
"cloudEventsVersion": "0.1",
"eventId": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType": "com.oraclecloud.databaseservice.patchvmcluster.begin",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-06-27T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_database",
"resourceId": "Vmcluster-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-09-03T12:00:00.000Z",
"timeUpdated": "2019-09-03T12:30:00.000Z",
"displayName": "testDisplayName",
"lifecycleDetails": "detail message",
"exadataInfrastructureId": "ExatraInfra-unique_ID",
"vmClusterNetworkId": "VmCluster-unique_ID",
"cpuCoreCount": 2,
"dataStorageSizeInTBs": 4,
"dbVersion": "19.0.0.0",
"licenseType": "BRING_YOUR_OWN_LICENSE",
7-274
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"giVersion": "19.0.0.0",
"dbNodeIds": "[ocid1.dbnode.1, ocid1.dbnode.2,...]",
"timeZone": "US/Pacific"
}
}
}
{
"cloudEventsVersion": "0.1",
"eventId": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType": "com.oraclecloud.databaseservice.patchdbhome.begin",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-08-29T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_dbhome",
"resourceId": "DbHome-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeUpdated": "2019-08-29T12:30:00.000Z",
"lifecycleDetails": "detail message",
"dbSystemId": "DbSystem-unique_ID",
"dbVersion": "19.0.0.0",
"recordVersion": 4,
"displayName": "testDisplayName"
}
}
}
{
"cloudEventsVersion": "0.1",
"eventId": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType": "com.oraclecloud.databaseservice.movedatabase.begin",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-06-27T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
7-275
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_database",
"resourceId": "Database-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-08-26T12:00:00.000Z",
"timeUpdated": "2019-08-26T12:30:00.000Z",
"dbSystemId": "ocid1.dbsystem.oc1.phx.unique_ID",
"displayName": "testDisplayName",
"lifecycleDetails": "detail message",
"vmClusterId": "VmCluster-unique_ID",
"dbSystemId": "dbSystem-unique_ID",
"backupType": "FULL",
"dbHomeId": "dbHome-unique_ID",
"dbVersion": "19.0.0.0",
"databaseEdition": "ENTERPRISE_EDITION_EXTREME",
"autoBackupsEnabled": "true",
"recoveryWindow": 30,
"backupDestinationId": "backupDestination-unique_ID",
"backupDestinationType": "OBJECT_STORAGE",
"backupDestinationName": "my_backup_destination_name",
"exadataInfrastructureId": "ExadataInfrastructure-unique-ID",
"dbUniqueName": "akv_tgh_unqna"
}
}
}
7-276
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
{
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.changeautonomousvmclustercompartment",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-06-27T21:16:04Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_database",
"resourceId": "AutonomousVmCluster-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-09-03T12:00:00.000Z",
"timeUpdated": "2019-09-03T12:30:00.000Z",
"displayName": "testDisplayName",
"lifecycleDetails": "detail message",
"exadataInfrastructureId": "ExatraInfra-unique_ID",
"vmClusterNetworkId": "VmClusterNetwork-unique_ID",
"cpuCoreCount": "2",
"availableCpus": "1",
"dataStorageSizeInTBs": "4",
"availableDataStorageSizeInTBs": "1",
"licenseType": "BRING_YOUR_OWN_LICENSE",
"timeZone": "US/Pacific"
}
}
}
{
"cloudEventsVersion": "0.1",
7-277
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.createautonomousvmcluster.begin",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-06-27T21:16:04Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_database",
"resourceId": "AutonomousVmCluster-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-09-03T12:00:00.000Z",
"timeUpdated": "2019-09-03T12:30:00.000Z",
"displayName": "testDisplayName",
"lifecycleDetails": "detail message",
"exadataInfrastructureId": "ExatraInfra-unique_ID",
"vmClusterNetworkId": "VmClusterNetwork-unique_ID",
"cpuCoreCount": "2",
"availableCpus": "1",
"dataStorageSizeInTBs": "4",
"availableDataStorageSizeInTBs": "1",
"licenseType": "BRING_YOUR_OWN_LICENSE",
"timeZone": "US/Pacific"
}
}
}
{
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.deleteautonomousvmcluster.begin",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-06-27T21:16:04Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_database",
7-278
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"resourceId": "AutonomousVmCluster-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-09-03T12:00:00.000Z",
"timeUpdated": "2019-09-03T12:30:00.000Z",
"displayName": "testDisplayName",
"lifecycleDetails": "detail message",
"exadataInfrastructureId": "ExatraInfra-unique_ID",
"vmClusterNetworkId": "VmClusterNetwork-unique_ID",
"cpuCoreCount": "2",
"availableCpus": "1",
"dataStorageSizeInTBs": "4",
"availableDataStorageSizeInTBs": "1",
"licenseType": "BRING_YOUR_OWN_LICENSE",
"timeZone": "US/Pacific"
}
}
}
{
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.updateautonomousvmcluster.begin",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-06-27T21:16:04Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_database",
"resourceId": "AutonomousVmCluster-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-09-03T12:00:00.000Z",
"timeUpdated": "2019-09-03T12:30:00.000Z",
"displayName": "testDisplayName",
"lifecycleDetails": "detail message",
"exadataInfrastructureId": "ExatraInfra-unique_ID",
"vmClusterNetworkId": "VmClusterNetwork-unique_ID",
"cpuCoreCount": "2",
7-279
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"availableCpus": "1",
"dataStorageSizeInTBs": "4",
"availableDataStorageSizeInTBs": "1",
"licenseType": "BRING_YOUR_OWN_LICENSE",
"timeZone": "US/Pacific"
}
}
}
7-280
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
{lifecycleState=AVAILABLE,
autonomousVmClusterId=ocid1.autonomousvmcluster.oc1.sea.abzwkljrevsjcfuskw7mgi
6ulzfg2epjjxhbnhwj63q7q3kzvuwg3djqnd2a,
displayName=CDB2-NFS,
dbName=wqxtzzfn,
dbUniqueName=wqxtzzfn_sea1td,
freeTags={},
autonomousContainerDatabaseId=ocid1.autonomouscontainerdatabase.oc1.sea.abzwkl
jrxkuruqe3qzgw432adr5ug7ridmwi4ifvjlsahcdqdhbhzbf543xa,
compartmentId=ocid1.compartment.region1..aaaaaaaass5x4witduxzgrs7qmzqk3m5kmogu
ve7urwploqef6763w3o42ta,
timeUpdated=2020-06-15 21:52:24.085,
tenantId=ocid1.tenancy.region1..aaaaaaaagyw5okosjg54csr3u5qgaxvtjufz55537h44mj
y2umiqur4z5w3a,
timeCreated=2020-06-15 19:08:03.797,
id=ocid1.autonomouscontainerdatabase.oc1.sea.abzwkljrxkuruqe3qzgw432adr5ug7rid
mwi4ifvjlsahcdqdhbhzbf543xa,
definedTags={}}
7-281
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
Note:
To receive events related to Data Guard actions on multiple standby databases,
subscribe to the Data Guard group resource events. If you have not switched to the
new model, you can continue to subscribe to the Data Guard Associations resource
events. However, after switching to the new model, you will need to explicitly
subscribe to the new Data Guard Group resource events.
7-282
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
7-283
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
{
"cloudEventsVersion": "0.1",
"eventID": "<unique_ID>",
"eventType":
"com.oraclecloud.DatabaseService.CreateAutonomousDataGuardAssociation.begin",
"source": "databaseservice",
"eventTypeVersion": "2.0",
"eventTime": "2019-06-27T21:16:04Z",
"contentType": "application/json",
"data": {
"eventGroupingId": "<unique_ID>",
"eventName"="CreateAutonomousDataGuardAssociation"
"compartmentId": "ocid1.compartment.oc1..<unique_ID>",
"compartmentName": "example_name",
"resourceVersion":null,
"resourceName": "my_container_database",
"resourceId": "<unique_ID>",
"availabilityDomain": "all",
"tagSlug": "<slug_ID>",
"definedTags": {},
"additionalDetails": {
"lifecycleState": "PROVISIONING",
7-284
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"DGConfigId"="91f298da-b890-42ce-935b-9b841e908756",
"ApplyLag"=null,
"LastRoleChangeTime"=null,
"TransportLag"=null,
"autonomousContainerDatabaseId"="ocid1.autonomouscontainerdatabase.oc1.sea.<un
ique_ID>",
"DGConfigState"=null,
"lifeCycleMessage"=null,
"lastUpdatedIdentifier"=null,
"SyncState"=null,
"autonomousExadataInfrastructureId"="ocid1.autonomousvmcluster.oc1.sea.<unique
_ID>",
"timeUpdated"="2020-10-18 23:02:34.864",
"timeCreated"="2020-10-18 23:02:34.864",
"dbHomeId"="ocid1.autonomouspodhome.oc1.sea.<unique_ID>",
"LastSyncedTime"=null,
"dcsDgUpdateTimestamp"=null,
}
}
}
This is a reference event for Autonomous Data Guard Association - Switchover Begin:
{
"cloudEventsVersion": "0.1",
"eventID": "<unique_ID>",
"eventType":
"com.oraclecloud.DatabaseService.CreateAutonomousDataGuardAssociation.begin",
"source": "databaseservice",
"eventTypeVersion": "2.0",
"eventTime": "2019-06-27T21:16:04Z",
"contentType": "application/json",
"data": {
"eventGroupingId": "<unique_ID>",
"eventName"="SwitchoverAutonomousDataguardAssociation"
"compartmentId": "ocid1.compartment.oc1..<unique_ID>",
"compartmentName": "example_name",
"resourceVersion":null,
"resourceName": "my_container_database",
"resourceId": "ocid1.autonomousdgassociation.oc1.sea.<unique_ID>",
"availabilityDomain": "all",
"tagSlug": "<slug_ID>",
"definedTags": {},
"stateChange": {
"previous"=null,
"current: {
"lifecycleState"="ROLE_CHANGE_IN_PROGRESS
}
}
"additionalDetails": {
"lifecycleState": "ROLE_CHANGE_IN_PROGRESS",
"DGConfigId"="<unique_ID>",
"ApplyLag"="0 seconds computed 2 seconds ago",
7-285
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"LastRoleChangeTime"=null,
"TransportLag"="0 seconds computed 2 seconds ago",
"autonomousContainerDatabaseId"="ocid1.autonomouscontainerdatabase.oc1.sea.<un
ique_ID>",
"DGConfigState"="SUCCESS",
"lifeCycleMessage"=null,
"lastUpdatedIdentifier"=null,
"SyncState"="SYNCED",
"autonomousExadataInfrastructureId"="ocid1.autonomousvmcluster.oc1.sea.<unique
_ID>",
"timeUpdated"="2020-10-18 23:02:34.864",
"timeCreated"="2020-10-18 23:02:34.864",
"dbHomeId"="ocid1.autonomouspodhome.oc1.sea.<unique_ID>",
"LastSyncedTime"=null,
"dcsDgUpdateTimestamp"=null,
}
}
}
This is a reference event for Autonomous Data Guard Association - Failover Begin:
{
"cloudEventsVersion": "0.1",
"eventID": "<unique_ID>",
"eventType":
"com.oraclecloud.DatabaseService.CreateAutonomousDataGuardAssociation.begin",
"source": "databaseservice",
"eventTypeVersion": "2.0",
"eventTime": "2019-06-27T21:16:04Z",
"contentType": "application/json",
"data": {
"eventGroupingId": "<unique_ID>",
"eventName"="FailoverAutonomousDataguardAssociation"
"compartmentId": "ocid1.compartment.oc1..<unique_ID>",
"compartmentName": "example_name",
"resourceVersion":null,
"resourceName": "my_container_database",
"resourceId": "ocid1.autonomousdgassociation.oc1.sea.<unique_ID>",
"availabilityDomain": "all",
"tagSlug": "<slug_ID>",
"definedTags": {},
"stateChange": {
"previous"=null,
"current: {
"lifecycleState"="ROLE_CHANGE_IN_PROGRESS
}
}
"additionalDetails": {
"lifecycleState": "ROLE_CHANGE_IN_PROGRESS",
"DGConfigId"="<unique_ID>",
"ApplyLag"="0 seconds computed 2 seconds ago",
"LastRoleChangeTime"=null,
"TransportLag"="0 seconds computed 2 seconds ago",
7-286
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"autonomousContainerDatabaseId"="ocid1.autonomouscontainerdatabase.oc1.sea.<un
ique_ID>",
"DGConfigState"="SUCCESS",
"lifeCycleMessage"=null,
"lastUpdatedIdentifier"=null,
"SyncState"="SYNCED",
"autonomousExadataInfrastructureId"="ocid1.autonomousvmcluster.oc1.sea.<unique
_ID>",
"timeUpdated"="2020-10-18 23:02:34.864",
"timeCreated"="2020-10-18 23:02:34.864",
"dbHomeId"="ocid1.autonomouspodhome.oc1.sea.<unique_ID>",
"LastSyncedTime"=null,
"dcsDgUpdateTimestamp"=null,
}
}
}
This is a reference event for Autonomous Data Guard Association - Reinstate Begin:
{
"cloudEventsVersion": "0.1",
"eventID": "<unique_ID>",
"eventType":
"com.oraclecloud.DatabaseService.CreateAutonomousDataGuardAssociation.begin",
"source": "databaseservice",
"eventTypeVersion": "2.0",
"eventTime": "2019-06-27T21:16:04Z",
"contentType": "application/json",
"data": {
"eventGroupingId": "<unique_ID>",
"eventName"="ReinstateAutonomousDataGuardAssociation"
"compartmentId": "ocid1.compartment.oc1..<unique_ID>",
"compartmentName": "example_name",
"resourceVersion":null,
"resourceName": "my_container_database",
"resourceId": "ocid1.autonomousdgassociation.oc1.sea.<unique_ID>",
"availabilityDomain": "all",
"tagSlug": "<slug_ID>",
"definedTags": {},
"stateChange": {
"previous"=null,
"current: {
"lifecycleState"="ROLE_CHANGE_IN_PROGRESS
}
}
"additionalDetails": {
"lifecycleState": "ROLE_CHANGE_IN_PROGRESS",
"DGConfigId"="<unique_ID>",
"ApplyLag"="0 seconds computed 2 seconds ago",
"LastRoleChangeTime"=null,
"TransportLag"="0 seconds computed 2 seconds ago",
"autonomousContainerDatabaseId"="ocid1.autonomouscontainerdatabase.oc1.sea.<un
7-287
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
ique_ID>",
"DGConfigState"="SUCCESS",
"lifeCycleMessage"=null,
"lastUpdatedIdentifier"=null,
"SyncState"="SYNCED",
"autonomousExadataInfrastructureId"="ocid1.autonomousvmcluster.oc1.sea.<unique
_ID>",
"timeUpdated"="2020-10-18 23:02:34.864",
"timeCreated"="2020-10-18 23:02:34.864",
"dbHomeId"="ocid1.autonomouspodhome.oc1.sea.<unique_ID>",
"LastSyncedTime"=null,
"dcsDgUpdateTimestamp"=null,
}
}
}
{
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType": "com.oraclecloud.databaseservice.createkeystore",
"source": "databaseservice",
"eventTypeVersion": "version",
"eventTime": "2020-10-27T21:16:04Z",
7-288
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_keystore",
"resourceId": "KeyStore-unique_ID",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"timeUpdated"="2020-10-27 21:16:34.864",
"timeCreated"="2020-10-27 21:16:34.864",
"keyStoreType": "all",
"connectionIps": "ip1,ip2",
"adminUsername": "username",
}
}
}
7-289
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
7-290
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
7-291
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
7-292
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
7-293
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
7-294
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
7-295
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.addstoragecapacityexadatainfrastructure.begin
",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-08-29T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_exadata_infra",
"resourceId": "ExadataInfra-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeUpdated": "2019-08-29T12:30:00.000Z",
"lifecycleDetails": "detail message",
"shape": "ExadataCC.X8",
"timeZone": "US/Pacific",
"displayName": "testDisplayName"
}
}
}
This is a reference event for Exadata Infrastructure - Add Storage Capacity End:
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.addstoragecapacityexadatainfrastructure.end",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-08-29T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_exadata_infra",
7-296
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"resourceId": "ExadataInfra-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeUpdated": "2019-08-29T12:30:00.000Z",
"lifecycleDetails": "detail message",
"shape": "ExadataCC.X8",
"timeZone": "US/Pacific",
"displayName": "testDisplayName"
}
}
}
7-297
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
{
"eventType":
"com.oraclecloud.DatabaseService.CreateDatabaseSoftwareImage.begin",
"cloudEventsVersion": "0.1",
"eventTypeVersion": "2.0",
"source": "DatabaseService",
"eventId": "6dcad2c5-de0a-4e46-9a18-25c66f292dcf",
"eventTime": "2021-06-18T04:04:35.451Z",
"contentType": "application/json",
"data": {
"eventGroupingId": "csid68e598ea4474b18860cdd476af4a/
b46a0a70da064d57a149c3c49b7cc588/FB22262C016611EFC401A9292187861D",
"eventName": "CreateDatabaseSoftwareImage",
"compartmentId":
"ocid1.tenancy.region1..aaaaaaaae34gwbez3dbo7urtcf462wj3mnmanbba5xqinczgm2z5d6
4cnl5q",
"compartmentName": "sic-dbaas",
"resourceName": "DBImage_19c",
"resourceId":
"ocid1.databasesoftwareimage.oc1.sea.abzwkljsbpu3kxb54loym5sgkn2z4briz4xbokhou
xywkir764ht4txx4nya",
"availabilityDomain": "AD2",
"freeformTags": null,
"definedTags": null,
"identity": {
"principalName": "xxxx",
"principalId":
"ocid1.user.region1..aaaaaaaaedlsln4welqy3upwitxqrss3fnu6potqmds4xo3xld5sqyzwb
veq",
"authType": "natv",
"callerName": null,
"callerId": null,
"tenantId":
"ocid1.tenancy.region1..aaaaaaaae34gwbez3dbo7urtcf462wj3mnmanbba5xqinczgm2z5d6
4cnl5q",
"ipAddress": "160.34.124.111",
"credentials": ""
},
"request": {
"id": "csid68e598ea4474b18860cdd476af4a/
b46a0a70da064d57a149c3c49b7cc588/FB22262C016611EFC401A9292187861D",
"path": "/20160918/databaseSoftwareImages",
"action": "POST",
"parameters": {},
"headers": {}
},
"response": {
"status": "200",
"responseTime": "2021-06-18T04:04:36.457Z",
"headers": {},
"payload": null,
"message": "CreateDatabaseSoftwareImage succeeded"
7-298
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
},
"stateChange": {
"previous": null,
"current": {
"displayName": "DBImage_19c",
"lifecycleState": "PROVISIONING"
}
},
"additionalDetails": {
"dbVersion": "19.0.0.0",
"displayName": "DBImage_19c",
"lifecycleState": "PROVISIONING",
"timeCreated": "2021-06-18T04:04:35.739Z"
}
}
}
{
"eventType":
"com.oraclecloud.DatabaseService.CreateDatabaseSoftwareImage.end",
"cloudEventsVersion": "0.1",
"eventTypeVersion": "2.0",
"source": "DatabaseService",
"eventId": "7bf14762-1ec7-4230-99d0-6323c5e8b3cb",
"eventTime": "2021-06-18T04:26:24.119Z",
"contentType": "application/json",
"data": {
"eventGroupingId": "csid68e598ea4474b18860cdd476af4a/
b46a0a70da064d57a149c3c49b7cc588/FB22262C016611EFC401A9292187861D",
"eventName": "CreateDatabaseSoftwareImage",
"compartmentId":
"ocid1.tenancy.region1..aaaaaaaae34gwbez3dbo7urtcf462wj3mnmanbba5xqinczgm2z5d6
4cnl5q",
"compartmentName": "sic-dbaas",
"resourceName": "DBImage_19c",
"resourceId":
"ocid1.databasesoftwareimage.oc1.sea.abzwkljsbpu3kxb54loym5sgkn2z4briz4xbokhou
xywkir764ht4txx4nya",
"availabilityDomain": null,
"freeformTags": null,
"definedTags": null,
"identity": {
"principalName": null,
"principalId": null,
"authType": null,
"callerName": null,
"callerId": null,
"tenantId": null,
"ipAddress": null,
"credentials": null,
"userAgent": null,
"consoleSessionId": null
},
7-299
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"request": {
"id": "d2030b31-16aa-4e71-9b06-dabc7545ad65",
"path": null,
"action": null,
"parameters": null,
"headers": null
},
"response": {
"status": null,
"responseTime": "2021-06-18T04:26:24.119Z",
"headers": null,
"payload": null,
"message": "CreateDatabaseSoftwareImage"
},
"stateChange": {
"previous": null,
"current": {
"displayName": "DBImage_19c",
"lifecycleState": "AVAILABLE"
}
},
"additionalDetails": {
"dbVersion": "19.0.0.0",
"displayName": "DBImage_19c",
"lifecycleState": "AVAILABLE",
"timeCreated": "2021-06-18T04:04:35.739Z"
}
}
}
{
"eventType":
"com.oraclecloud.DatabaseService.DeleteDatabaseSoftwareImage.begin",
"cloudEventsVersion": "0.1",
"eventTypeVersion": "2.0",
"source": "DatabaseService",
"eventId": "b789f327-ad93-45e1-a739-45fdb97c24d2",
"eventTime": "2021-06-25T05:06:25.316Z",
"contentType": "application/json",
"data": {
"eventGroupingId": "csidd793a61a40689138814477fa5c6e/
ffe9b65c8dcf425c9b30ae1a30ae5687/B7CA65C1DDBEDB55052051EF1113DB73",
"eventName": "DeleteDatabaseSoftwareImage",
"compartmentId":
"ocid1.tenancy.region1..aaaaaaaae34gwbez3dbo7urtcf462wj3mnmanbba5xqinczgm2z5d6
4cnl5q",
"compartmentName": "sic-dbaas",
"resourceName": "DBImage_202106152041",
"resourceId":
"ocid1.databasesoftwareimage.oc1.sea.abzwkljrzqt4tr326jtdmyudcziz6h5uhce36jbnd
xojgeg5kpwjcipxelga",
"availabilityDomain": "AD2",
"freeformTags": null,
7-300
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"definedTags": null,
"identity": {
"principalName": "xxx",
"principalId":
"ocid1.user.region1..aaaaaaaaedlsln4welqy3upwitxqrss3fnu6potqmds4xo3xld5sqyzwb
veq",
"authType": "natv",
"callerName": null,
"callerId": null,
"tenantId":
"ocid1.tenancy.region1..aaaaaaaae34gwbez3dbo7urtcf462wj3mnmanbba5xqinczgm2z5d6
4cnl5q",
"ipAddress": "160.34.124.245",
"credentials": ""
},
"request": {
"id": "csidd793a61a40689138814477fa5c6e/
ffe9b65c8dcf425c9b30ae1a30ae5687/B7CA65C1DDBEDB55052051EF1113DB73",
"path": "/20160918/databaseSoftwareImages/
ocid1.databasesoftwareimage.oc1.sea.abzwkljrzqt4tr326jtdmyudcziz6h5uhce36jbndx
ojgeg5kpwjcipxelga",
"action": "DELETE",
"parameters": {},
"headers": {}
},
"response": {
"status": "204",
"responseTime": "2021-06-25T05:06:26.074Z",
"headers": {},
"payload": null,
"message": "DeleteDatabaseSoftwareImage succeeded"
},
"stateChange": {
"previous": null,
"current": {
"displayName": "DBImage_202106152041",
"lifecycleState": "AVAILABLE"
}
},
"additionalDetails": {
"dbVersion": "19.0.0.0",
"displayName": "DBImage_202106152041",
"lifecycleState": "AVAILABLE",
"timeCreated": "2021-06-15T15:11:53.672Z"
}
}
}
{
"eventType":
"com.oraclecloud.DatabaseService.DeleteDatabaseSoftwareImage.end",
"cloudEventsVersion": "0.1",
"eventTypeVersion": "2.0",
7-301
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"source": "DatabaseService",
"eventId": "6a1a808f-f5dd-4fb5-9d77-3bad38591998",
"eventTime": "2021-06-25T05:07:21.454Z",
"contentType": "application/json",
"data": {
"eventGroupingId": "csidd793a61a40689138814477fa5c6e/
ffe9b65c8dcf425c9b30ae1a30ae5687/B7CA65C1DDBEDB55052051EF1113DB73",
"eventName": "DeleteDatabaseSoftwareImage",
"compartmentId":
"ocid1.tenancy.region1..aaaaaaaae34gwbez3dbo7urtcf462wj3mnmanbba5xqinczgm2z5d6
4cnl5q",
"compartmentName": "sic-dbaas",
"resourceName": "DBImage_202106152041",
"resourceId":
"ocid1.databasesoftwareimage.oc1.sea.abzwkljrzqt4tr326jtdmyudcziz6h5uhce36jbnd
xojgeg5kpwjcipxelga",
"availabilityDomain": null,
"freeformTags": null,
"definedTags": null,
"identity": {
"principalName": null,
"principalId": null,
"authType": null,
"callerName": null,
"callerId": null,
"tenantId": null,
"ipAddress": null,
"credentials": null,
"userAgent": null,
"consoleSessionId": null
},
"request": {
"id": "676465d5-e066-43e4-bb21-77dc468ce1f9",
"path": null,
"action": null,
"parameters": null,
"headers": null
},
"response": {
"status": null,
"responseTime": "2021-06-25T05:07:21.454Z",
"headers": null,
"payload": null,
"message": "DeleteDatabaseSoftwareImage"
},
"stateChange": {
"previous": null,
"current": {
"displayName": "DBImage_202106152041",
"lifecycleState": "TERMINATED"
}
},
"additionalDetails": {
"dbVersion": "19.0.0.0",
"displayName": "DBImage_202106152041",
"lifecycleState": "TERMINATED",
7-302
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"timeCreated": "2021-06-15T15:11:53.672Z"
}
}
}
{
"eventType": "com.oraclecloud.DatabaseService.ListDatabaseSoftwareImages",
"cloudEventsVersion": "0.1",
"eventTypeVersion": "2.0",
"source": "DatabaseService",
"eventId": "762072e3-52a0-437c-9956-334aad767db8",
"eventTime": "2021-06-24T05:39:41.344Z",
"contentType": "application/json",
"data": {
"eventGroupingId": null,
"eventName": "ListDatabaseSoftwareImages",
"compartmentId":
"ocid1.tenancy.region1..aaaaaaaae34gwbez3dbo7urtcf462wj3mnmanbba5xqinczgm2z5d6
4cnl5q",
"compartmentName": "sic-dbaas",
"resourceName": "",
"resourceId": null,
"availabilityDomain": "AD2",
"freeformTags": null,
"definedTags": null,
"identity": {
"principalName": "xxx",
"principalId":
"ocid1.user.region1..aaaaaaaaedlsln4welqy3upwitxqrss3fnu6potqmds4xo3xld5sqyzwb
veq",
"authType": "natv",
"callerName": null,
"callerId": null,
"tenantId":
"ocid1.tenancy.region1..aaaaaaaae34gwbez3dbo7urtcf462wj3mnmanbba5xqinczgm2z5d6
4cnl5q",
"ipAddress": "160.34.125.213",
"credentials": "",
"userAgent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.77 Safari/537.36",
"consoleSessionId": "csidc25d57894f49986ae07157ab5e03"
},
"request": {
"id": "csidc25d57894f49986ae07157ab5e03/
dc74ad5a75d7494bb35408a33a99c0ad/084F718D53FBC66D46B573CF8D5D1A5A",
"path": "/20160918/databaseSoftwareImages",
"action": "GET",
"parameters": {},
"headers": {}
},
"response": {
"status": "200",
"responseTime": "2021-06-24T05:39:41.998Z",
7-303
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"headers": {},
"payload": null,
"message": "ListDatabaseSoftwareImages succeeded"
},
"stateChange": {
"previous": null,
"current": null
},
"additionalDetails": null
}
}
{
"eventType": "com.oraclecloud.DatabaseService.GetDatabaseSoftwareImage",
"cloudEventsVersion": "0.1",
"eventTypeVersion": "2.0",
"source": "DatabaseService",
"eventId": "179471f3-c628-4e55-98d0-959b0913b327",
"eventTime": "2021-06-24T04:11:10.738Z",
"contentType": "application/json",
"data": {
"eventGroupingId": "csid31b4236f4f1ebc4ee66169d17b0a/
1f2e5dbf57ca40c886b111616b02c33f/CA5B5AD4C8678E2C428DA9AF0C62A082",
"eventName": "GetDatabaseSoftwareImage",
"compartmentId":
"ocid1.tenancy.region1..aaaaaaaae34gwbez3dbo7urtcf462wj3mnmanbba5xqinczgm2z5d6
4cnl5q",
"compartmentName": "sic-dbaas",
"resourceName": "DBImage_19c",
"resourceId":
"ocid1.databasesoftwareimage.oc1.sea.abzwkljsbpu3kxb54loym5sgkn2z4briz4xbokhou
xywkir764ht4txx4nya",
"availabilityDomain": "AD2",
"freeformTags": null,
"definedTags": null,
"identity": {
"principalName": "xxx",
"principalId":
"ocid1.user.region1..aaaaaaaalkib75hbawg6xh6rlys5ztumfx3cxf2ktwbon5ryv6xjev7oe
ctq",
"authType": "natv",
"callerName": null,
"callerId": null,
"tenantId":
"ocid1.tenancy.region1..aaaaaaaae34gwbez3dbo7urtcf462wj3mnmanbba5xqinczgm2z5d6
4cnl5q",
"ipAddress": "192.188.170.109",
"credentials": "",
"userAgent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7)
AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.106 Safari/537.36",
"consoleSessionId": "csid31b4236f4f1ebc4ee66169d17b0a"
},
"request": {
7-304
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"id": "csid31b4236f4f1ebc4ee66169d17b0a/
1f2e5dbf57ca40c886b111616b02c33f/CA5B5AD4C8678E2C428DA9AF0C62A082",
"path": "/20160918/databaseSoftwareImages/
ocid1.databasesoftwareimage.oc1.sea.abzwkljsbpu3kxb54loym5sgkn2z4briz4xbokhoux
ywkir764ht4txx4nya",
"action": "GET",
"parameters": {},
"headers": {}
},
"response": {
"status": "200",
"responseTime": "2021-06-24T04:11:10.966Z",
"headers": {},
"payload": null,
"message": "GetDatabaseSoftwareImage succeeded"
},
"stateChange": {
"previous": null,
"current": {
"displayName": "DBImage_19c",
"lifecycleState": "AVAILABLE"
}
},
"additionalDetails": {
"dbVersion": "19.0.0.0",
"displayName": "DBImage_19c",
"lifecycleState": "AVAILABLE",
"timeCreated": "2020-09-24T18:06:00.395Z"
}
}
}
7-305
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
eventType": "com.oraclecloud.DatabaseService.MoveDatabase.begin"
"eventName": "MoveDatabase"
{
"eventType": "com.oraclecloud.DatabaseService.MoveDatabase.begin",
"cloudEventsVersion": "0.1",
"eventTypeVersion": "2.0",
"source": "DatabaseService",
"eventId": "c78fb931-adda-4813-ab75-b9cc51b96847",
"eventTime": "2021-07-15T11:03:52.582Z",
"contentType": "application/json",
"data": {
"eventGroupingId": "csidff49902144a1a3c98bd4e5f49c1c/
37d3a7113f1e462fbd5a741dc5d52ef7/57472323A2FFABC31623FB7660F519AB",
"eventName": "MoveDatabase",
"compartmentId":
"ocid1.tenancy.region1..aaaaaaaae34gwbez3dbo7urtcf462wj3mnmanbba5xqinczgm2z5d6
4cnl5q",
"compartmentName": "sic-dbaas",
"resourceName": "DB211507",
"resourceId":
"ocid1.database.oc1.sea.abzwkljs5xinda6nughtf5tzapxhcq7at54bpsmdricyq4o4trsr3p
yiqhpq",
"availabilityDomain": "",
"freeformTags": {},
"definedTags": {
"Operators": {
"Created_By": "[email protected]",
"Created_Time": "2021-07-15T11:01:24.085Z"
}
},
"identity": {
"principalName": null,
"principalId": null,
"authType": null,
"callerName": null,
"callerId": null,
"tenantId": null,
"ipAddress": null,
"credentials": null,
"userAgent": null,
"consoleSessionId": null
},
"request": {
"id": "8f7b5283-4896-4ce0-aefa-a4156971e07b",
"path": null,
"action": null,
"parameters": null,
"headers": null
},
"response": {
"status": null,
"responseTime": null,
7-306
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"headers": null,
"payload": null,
"message": "MoveDatabase"
},
"stateChange": {
"previous": null,
"current": {
"definedTags": {
"Operators": {
"Created_By": "[email protected]",
"Created_Time": "2021-07-15T11:01:24.085Z"
}
},
"displayName": "DB211507",
"freeTags": {},
"lifecycleState": "UPGRADING"
}
},
"additionalDetails": {
"databaseEdition": "ENTERPRISE_EDITION_EXTREME",
"databaseId":
"ocid1.database.oc1.sea.abzwkljs5xinda6nughtf5tzapxhcq7at54bpsmdricyq4o4trsr3p
yiqhpq",
"dbHomeId":
"ocid1.dbhome.oc1.sea.abzwkljskjhqcc4bkzuai6kybx3hp3jznvxcgwlghqjnklpchrktcynw
nloq",
"dbUniqueName": "Audit_check",
"dbVersion": "18.14.0.0",
"exadataInfrastructureId":
"ocid1.exadatainfrastructure.oc1.sea.abzwkljsqtwpumvorlttjuxcx6qtkxhuasvmyu4qy
3bng74sqolpwjunsrqa",
"lifecycleState": "UPGRADING",
"timeCreated": "2021-07-15T11:01:24Z",
"timeUpdated": "2021-07-15T11:02:34Z",
"vmClusterId":
"ocid1.vmcluster.oc1.sea.abzwkljsghfg7e3q3xh3gzqqxijt72fepczowmk35t554wxbpew7t
xnooprq"
}
}
}
eventType": "com.oraclecloud.DatabaseService.MoveDatabase.end"
"eventName": "MoveDatabase"
{
"eventType": "com.oraclecloud.DatabaseService.MoveDatabase.end",
"cloudEventsVersion": "0.1",
"eventTypeVersion": "2.0",
"source": "DatabaseService",
"eventId": "97429610-9b8f-4da7-8f99-2f7cd5455c24",
"eventTime": "2021-07-15T11:03:56.359Z",
"contentType": "application/json",
"data": {
7-307
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"eventGroupingId": "csidff49902144a1a3c98bd4e5f49c1c/
37d3a7113f1e462fbd5a741dc5d52ef7/57472323A2FFABC31623FB7660F519AB",
"eventName": "MoveDatabase",
"compartmentId":
"ocid1.tenancy.region1..aaaaaaaae34gwbez3dbo7urtcf462wj3mnmanbba5xqinczgm2z5d6
4cnl5q",
"compartmentName": "sic-dbaas",
"resourceName": "DB211507",
"resourceId":
"ocid1.database.oc1.sea.abzwkljs5xinda6nughtf5tzapxhcq7at54bpsmdricyq4o4trsr3p
yiqhpq",
"availabilityDomain": "",
"freeformTags": {},
"definedTags": {
"Operators": {
"Created_By": "[email protected]",
"Created_Time": "2021-07-15T11:01:24.085Z"
}
},
"identity": {
"principalName": null,
"principalId": null,
"authType": null,
"callerName": null,
"callerId": null,
"tenantId": null,
"ipAddress": null,
"credentials": null,
"userAgent": null,
"consoleSessionId": null
},
"request": {
"id": "8f7b5283-4896-4ce0-aefa-a4156971e07b",
"path": null,
"action": null,
"parameters": null,
"headers": null
},
"response": {
"status": null,
"responseTime": null,
"headers": null,
"payload": null,
"message": "MoveDatabase"
},
"stateChange": {
"previous": null,
"current": {
"definedTags": {
"Operators": {
"Created_By": "[email protected]",
"Created_Time": "2021-07-15T11:01:24.085Z"
}
},
"displayName": "DB211507",
"freeTags": {},
7-308
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"lifecycleState": "AVAILABLE"
}
},
"additionalDetails": {
"databaseEdition": "ENTERPRISE_EDITION_EXTREME",
"databaseId":
"ocid1.database.oc1.sea.abzwkljs5xinda6nughtf5tzapxhcq7at54bpsmdricyq4o4trsr3p
yiqhpq",
"dbHomeId":
"ocid1.dbhome.oc1.sea.abzwkljs7obwmwq2kgkjgeko4voudfcd5chu6iuonnew7uuxculsvdra
lzda",
"dbUniqueName": "Audit_check",
"dbVersion": "19.10.0.0",
"exadataInfrastructureId":
"ocid1.exadatainfrastructure.oc1.sea.abzwkljsqtwpumvorlttjuxcx6qtkxhuasvmyu4qy
3bng74sqolpwjunsrqa",
"lifecycleState": "AVAILABLE",
"timeCreated": "2021-07-15T11:01:24Z",
"timeUpdated": "2021-07-15T11:03:56Z",
"vmClusterId":
"ocid1.vmcluster.oc1.sea.abzwkljsghfg7e3q3xh3gzqqxijt72fepczowmk35t554wxbpew7t
xnooprq"
}
}
}
{
"eventType": "com.oraclecloud.DatabaseService.UpgradeDatabase.begin",
"cloudEventsVersion": "0.1",
"eventTypeVersion": "2.0",
"source": "DatabaseService",
"eventId": "96c66a03-fa53-4008-b86c-619b9f44ef31",
"eventTime": "2021-07-15T11:02:33.948Z",
"contentType": "application/json",
"data": {
"eventGroupingId": "csidff49902144a1a3c98bd4e5f49c1c/
37d3a7113f1e462fbd5a741dc5d52ef7/57472323A2FFABC31623FB7660F519AB",
"eventName": "UpgradeDatabase",
"compartmentId":
"ocid1.tenancy.region1..aaaaaaaae34gwbez3dbo7urtcf462wj3mnmanbba5xqinczgm2z5d6
4cnl5q",
"compartmentName": "sic-dbaas",
"resourceName": "DB211507",
"resourceId":
"ocid1.database.oc1.sea.abzwkljs5xinda6nughtf5tzapxhcq7at54bpsmdricyq4o4trsr3p
yiqhpq",
"availabilityDomain": "",
"freeformTags": {},
"definedTags": {
"Operators": {
7-309
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"Created_By": "[email protected]",
"Created_Time": "2021-07-15T11:01:24.085Z"
}
},
"identity": {
"principalName": "[email protected]",
"principalId":
"ocid1.user.region1..aaaaaaaac5dskxmhmemrbyhaeabru4kgpituqmvgxjcm5y22mlxre26om
4zq",
"authType": "natv",
"callerName": null,
"callerId": null,
"tenantId":
"ocid1.tenancy.region1..aaaaaaaae34gwbez3dbo7urtcf462wj3mnmanbba5xqinczgm2z5d6
4cnl5q",
"ipAddress": "160.34.92.141",
"credentials":
"ST$eyJraWQiOiJhc3dfcmVnaW9uMV8yMDIxLTA1LTE0IiwiYWxnIjoiUlMyNTYifQ.eyJzdWIiOiJ
vY2lkMS51c2VyLnJlZ2lvbjEuLmFhYWFhYWFhYzVkc2t4bWhtZW1yYnloYWVhYnJ1NGtncGl0dXFtd
md4amNtNXkyMm1seHJlMjZvbTR6cSIsIm1mYV92ZXJpZmllZCI6ImZhbHNlIiwiaXNzIjoiYXV0aFN
lcnZpY2Uub3JhY2xlLmNvbSIsInB0eXBlIjoidXNlciIsInNlc3NfZXhwIjoiRnJpLCAxNiBKdWwgM
jAyMSAxMDo1OToxNyBVVEMiLCJhdWQiOiJvY2kiLCJwc3R5cGUiOiJuYXR2IiwidHR5cGUiOiJsb2d
pbiIsImV4cCI6MTYyNjM1MDM1OSwiaWF0IjoxNjI2MzQ2NzU5LCJqdGkiOiJhNWE2YmRhNC02OGJkL
TQ0ZjktODFlNS0yZGRiZGMyZWU4MTQiLCJ0ZW5hbnQiOiJvY2lkMS50ZW5hbmN5LnJlZ2lvbjEuLmF
hYWFhYWFhZTM0Z3diZXozZGJvN3VydGNmNDYyd2ozbW5tYW5iYmE1eHFpbmN6Z20yejVkNjRjbmw1c
SIsImp3ayI6IntcImtpZFwiOlwicHVia2V5LWU5Y2RmMWY4LTJjNTEtNGEyNi1hZjkyLTNlZjlkNTl
hNWEzN1wiLFwiblwiOlwicjE1azFxR0s1MXJaVUZzLVdFNDFrU2ZLRWozanlndlZ2bG9pZVM5Y3RLO
DJ4QmxZT1F3SkZwX19HUXVGTFktWk45MVZabXdSQkpFeHJYbE1hNHV6aE5VS1BNQ3M5OG9XTENpQmo
2UlVMekFLZHVtbHZlbHEwTUcwVmtMMjVXb1hONzU2N19wUUx3NDc0T2w2VzNJUl9Jd2tBVy1QZnF5Q
zdpY1NOekI2UXh2aGlVMXRpTUFUZ09RUjQ1Ty1md3NnVnl5WW14eVNCbm1sN1BDUEtoaGpBLTlFOFo
zeV94cnlPWFBuYjl1QlFrczZOblgzX08yRkZ1UGxualN5QXdlSEZLSzd6MUJNVVdONUMtLV9Uemw5T
0VaOENMeGdKNkpzeUUtRUVMeEZEUkZ0MlVHZGNubUVBY2hNQ1gxNEtnWEFELVk5a2dkVS1HczNaUU1
VTW5pYmFRXCIsXCJlXCI6XCJBUUFCXCIsXCJrdHlcIjpcIlJTQVwiLFwiYWxnXCI6XCJSUzI1NlwiL
FwidXNlXCI6bnVsbH0ifQ.GGPB9TMU_CkqOfLNCgO2J6-
QwvHEEaY6jky5T92PBoPOBUkXb_ruNOe6C8RwQhs2pmIsIBybTP7Ueene4cJ9nNKzsoTzNAUrSp971
4Be2noQgqJL-ZtFIApThz1vXdfFWZtQQInxx-jALpsvkhvD_EVdbfx6FvlwDfm-
ReNDSnrUoFkfx8NpIrkqP8KUFhnX-
TRy0nUvqlaiB9C1L8FZGOJbBn0uiyloZe4DNP3Z39jViy37UntHeuMPnIqOYEsmPrSMTiJUBAypy4_
I5irWuR0PpxfrttP6nlEi80V5YrmO3l2-ZJBRDKz8TdMkxclw3IT0qulTzFPqB3cXg45PGQ",
"userAgent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:78.0)
Gecko/20100101 Firefox/78.0",
"consoleSessionId": "csidff49902144a1a3c98bd4e5f49c1c"
},
"request": {
"id": "csidff49902144a1a3c98bd4e5f49c1c/
37d3a7113f1e462fbd5a741dc5d52ef7/57472323A2FFABC31623FB7660F519AB",
"path": "/20160918/databases/
ocid1.database.oc1.sea.abzwkljs5xinda6nughtf5tzapxhcq7at54bpsmdricyq4o4trsr3py
iqhpq/actions/upgrade",
"action": "POST",
"parameters": {},
"headers": {}
},
"response": {
"status": "200",
"responseTime": "2021-07-15T11:02:36.072Z",
7-310
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"headers": {},
"payload": null,
"message": "UpgradeDatabase succeeded"
},
"stateChange": {
"previous": null,
"current": {
"definedTags": {
"Operators": {
"Created_By": "[email protected]",
"Created_Time": "2021-07-15T11:01:24.085Z"
}
},
"displayName": "DB211507",
"freeTags": {},
"lifecycleState": "UPGRADING"
}
},
"additionalDetails": {
"action": "UPGRADE",
"currentDbVersion": "18.14.0.0",
"lifecycleState": "IN_PROGRESS",
"source": "DATABASE_HOME",
"targetDbVersion": "19.10.0.0",
"timeStarted": "2021-07-15T11:02:34Z",
"upgradeHistoryEntryId":
"ocid1.dbupgradehistory.oc1.sea.abzwkljstw7dymj6mfnaotkxpuie2bdxmlizqr5ie46dew
cuzdh35md7fuhq"
}
}
}
{
"eventType": "com.oraclecloud.DatabaseService.UpgradeDatabase.end",
"cloudEventsVersion": "0.1",
"eventTypeVersion": "2.0",
"source": "DatabaseService",
"eventId": "e6c8a9e4-53b0-4bb8-be65-a39d157f04b2",
"eventTime": "2021-07-15T11:03:56.028Z",
"contentType": "application/json",
"data": {
"eventGroupingId": "csidff49902144a1a3c98bd4e5f49c1c/
37d3a7113f1e462fbd5a741dc5d52ef7/57472323A2FFABC31623FB7660F519AB",
"eventName": "UpgradeDatabase",
"compartmentId":
"ocid1.tenancy.region1..aaaaaaaae34gwbez3dbo7urtcf462wj3mnmanbba5xqinczgm2z5d6
4cnl5q",
"compartmentName": "sic-dbaas",
"resourceName": "DB211507",
"resourceId":
7-311
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"ocid1.database.oc1.sea.abzwkljs5xinda6nughtf5tzapxhcq7at54bpsmdricyq4o4trsr3p
yiqhpq",
"availabilityDomain": "",
"freeformTags": {},
"definedTags": {
"Operators": {
"Created_By": "[email protected]",
"Created_Time": "2021-07-15T11:01:24.085Z"
}
},
"identity": {
"principalName": null,
"principalId": null,
"authType": null,
"callerName": null,
"callerId": null,
"tenantId": null,
"ipAddress": null,
"credentials": null,
"userAgent": null,
"consoleSessionId": null
},
"request": {
"id": "8f7b5283-4896-4ce0-aefa-a4156971e07b",
"path": null,
"action": null,
"parameters": null,
"headers": null
},
"response": {
"status": null,
"responseTime": null,
"headers": null,
"payload": null,
"message": "UpgradeDatabase"
},
"stateChange": {
"previous": null,
"current": {
"definedTags": {
"Operators": {
"Created_By": "[email protected]",
"Created_Time": "2021-07-15T11:01:24.085Z"
}
},
"displayName": "DB211507",
"freeTags": {},
"lifecycleState": "AVAILABLE"
}
},
"additionalDetails": {
"databaseEdition": "ENTERPRISE_EDITION_EXTREME",
"databaseId":
"ocid1.database.oc1.sea.abzwkljs5xinda6nughtf5tzapxhcq7at54bpsmdricyq4o4trsr3p
yiqhpq",
"dbHomeId":
7-312
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"ocid1.dbhome.oc1.sea.abzwkljs7obwmwq2kgkjgeko4voudfcd5chu6iuonnew7uuxculsvdra
lzda",
"dbUniqueName": "Audit_check",
"dbVersion": "19.10.0.0",
"exadataInfrastructureId":
"ocid1.exadatainfrastructure.oc1.sea.abzwkljsqtwpumvorlttjuxcx6qtkxhuasvmyu4qy
3bng74sqolpwjunsrqa",
"lifecycleState": "AVAILABLE",
"timeCreated": "2021-07-15T11:01:24Z",
"timeUpdated": "2021-07-15T11:03:56Z",
"vmClusterId":
"ocid1.vmcluster.oc1.sea.abzwkljsghfg7e3q3xh3gzqqxijt72fepczowmk35t554wxbpew7t
xnooprq"
}
}
}
7-313
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
{
“eventID”: “af1cdf4e-4001-11eb-9fb6-f45c89b1cb17",
“eventTime”: “2020-12-17T00:49:14.123Z”,
“extensions”: {
“compartmentId”: “ocid1.compartment.oc1..unique_id”
},
“eventType”:
“com.oraclecloud.databaseservice.createexternalpluggabledatabase”,
“eventTypeVersion”: “2.0”,
“cloudEventsVersion”: “0.1”,
“source”: “databaseservice”,
“contentType”: “application/json”,
“definedTags”: {},
“data”: {
“compartmentId”: “ocid1.compartment.oc1.......unique_id”,
“compartmentName”: “MyCompartment”,
“resourceName”: “11092020_PKS_PDB1”,
“resourceId”: “ocid1.externalpluggabledatabases.oc1.phx.unique_id”,
7-314
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
“availabilityDomain”: “XXIT:PHX-AD-1”,
“freeFormTags”: {},
“definedTags”: {},
“additionalDetails”: {
“id”: “ocid1.externalpluggabledatabases.oc1.phx.unique_id”,
“timeCreated”: “2020-11-13T21:15:59.000Z”,
“timeUpdated”: “2020-11-13T21:15:59.000Z”,
“externalCDBId”: “ocid1.externalcontainerdatabase.oc1.....unique_id”,
“lifecycleState”: “AVAILABLE”,
“lifecycleDetails”: “External Pluggable Database is available”,
“dbUniqueName”: “CDB122_phx16q”,
“dbId”: “3455094890",
“dbVersion”: “12.2.0.1.0",
“dbEdition”: “ENTERPRISE_EDITION_EXTREME_PERFORMANCE”,
“timeZone”: “US/Pacific”,
“databaseManagementServiceStatus”: “ENABLED”,
“databaseManagementServiceConnectorId”:
“ocid1.externaldatabaseconnector.oc1.....unique_id”,
“displayName”: “External Pluggable Database - Create”
}
}
}
"exampleEvent": {
"eventID": "unique_id",
"eventTime": "2021-03-23T00:49:14.123Z",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_id"
},
"eventType":
"com.oraclecloud.databaseservice.pluggabledatabase.converttoregular.begin",
"eventTypeVersion": "2.0",
"cloudEventsVersion": "0.1",
"source": "databaseservice",
"contentType": "application/json",
"definedTags": {},
"data": {
"compartmentId": "ocid1.compartment.oc1.......unique_id",
"compartmentName": "MyCompartment",
"resourceName": "11092020_PKS_PDB1",
"resourceId": "ocid1.pluggabledatabases.oc1.phx.unique_id",
"availabilityDomain": "XXIT:PHX-AD-1",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.pluggabledatabases.oc1.phx.unique_id",
"isRefreshableClone": true,
"timeCreated": "2021-03-13T21:15:59.000Z",
"timeUpdated": "2021-03-13T21:15:59.000Z",
"databaseId": "ocid1.database.oc1.....unique_id",
"lifecycleState": "UPDATING",
"displayName": "Pluggable Database - Convert to Regular Begin"
}
7-315
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
}
},
"activationTime": "2021-03-23T15:00:00.000Z",
"eventTypeVersion": "2.0"
}
"exampleEvent": {
"eventID": "unique_id",
"eventTime": "2021-03-23T00:49:14.123Z",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_id"
},
"eventType":
"com.oraclecloud.databaseservice.pluggabledatabase.converttoregular.end",
"eventTypeVersion": "2.0",
"cloudEventsVersion": "0.1",
"source": "databaseservice",
"contentType": "application/json",
"definedTags": {},
"data": {
"compartmentId": "ocid1.compartment.oc1.......unique_id",
"compartmentName": "MyCompartment",
"resourceName": "11092020_PKS_PDB1",
"resourceId": "ocid1.pluggabledatabases.oc1.phx.unique_id",
"availabilityDomain": "XXIT:PHX-AD-1",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.pluggabledatabases.oc1.phx.unique_id",
"isRefreshableClone": false,
"timeCreated": "2021-03-13T21:15:59.000Z",
"timeUpdated": "2021-03-13T21:15:59.000Z",
"databaseId": "ocid1.database.oc1.....unique_id",
"lifecycleState": "AVAILABLE",
"displayName": "Pluggable Database - Convert to Regular End"
}
}
},
"activationTime": "2021-03-23T15:00:00.000Z",
"eventTypeVersion": "2.0"
}
"exampleEvent": {
"eventID": "unique_id",
"eventTime": "2021-03-23T00:49:14.123Z",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_id"
},
"eventType":
"com.oraclecloud.databaseservice.pluggabledatabase.inplacerestore.begin",
"eventTypeVersion": "2.0",
7-316
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"cloudEventsVersion": "0.1",
"source": "databaseservice",
"contentType": "application/json",
"definedTags": {},
"data": {
"compartmentId": "ocid1.compartment.oc1.......unique_id",
"compartmentName": "MyCompartment",
"resourceName": "11092020_PKS_PDB1",
"resourceId": "ocid1.pluggabledatabases.oc1.phx.unique_id",
"availabilityDomain": "XXIT:PHX-AD-1",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.pluggabledatabases.oc1.phx.unique_id",
"timeCreated": "2021-03-13T21:15:59.000Z",
"timeUpdated": "2021-03-13T21:15:59.000Z",
"databaseId": "ocid1.database.oc1.....unique_id",
"lifecycleState": "RESTORE_IN_PROGRESS",
"isRefreshableClone": false,
"displayName": "Pluggable Database - Inplace Restore Begin"
}
}
},
"activationTime": "2021-03-23T15:00:00.000Z",
"eventTypeVersion": "2.0"
}
"exampleEvent": {
"eventID": "unique_id",
"eventTime": "2021-03-23T00:49:14.123Z",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_id"
},
"eventType":
"com.oraclecloud.databaseservice.pluggabledatabase.inplacerestore.end",
"eventTypeVersion": "2.0",
"cloudEventsVersion": "0.1",
"source": "databaseservice",
"contentType": "application/json",
"definedTags": {},
"data": {
"compartmentId": "ocid1.compartment.oc1.......unique_id",
"compartmentName": "MyCompartment",
"resourceName": "11092020_PKS_PDB1",
"resourceId": "ocid1.pluggabledatabases.oc1.phx.unique_id",
"availabilityDomain": "XXIT:PHX-AD-1",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.pluggabledatabases.oc1.phx.unique_id",
"timeCreated": "2021-03-13T21:15:59.000Z",
"timeUpdated": "2021-03-13T21:15:59.000Z",
"databaseId": "ocid1.database.oc1.....unique_id",
7-317
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"lifecycleState": "AVAILABLE",
"isRefreshableClone": false,
"lifecycleDetails": "Pluggable Database is available",
"displayName": "Pluggable Database - Inplace Restore End"
}
}
},
"activationTime": "2021-03-23T15:00:00.000Z",
"eventTypeVersion": "2.0"
}
"exampleEvent": {
"eventID": "unique_id",
"eventTime": "2021-03-23T00:49:14.123Z",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_id"
},
"eventType":
"com.oraclecloud.databaseservice.pluggabledatabase.localclone.begin",
"eventTypeVersion": "2.0",
"cloudEventsVersion": "0.1",
"source": "databaseservice",
"contentType": "application/json",
"definedTags": {},
"data": {
"compartmentId": "ocid1.compartment.oc1.......unique_id",
"compartmentName": "MyCompartment",
"resourceName": "11092020_PKS_PDB1",
"resourceId": "ocid1.pluggabledatabases.oc1.phx.unique_id",
"availabilityDomain": "XXIT:PHX-AD-1",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.pluggabledatabases.oc1.phx.unique_id",
"timeCreated": "2021-03-13T21:15:59.000Z",
"timeUpdated": "2021-03-13T21:15:59.000Z",
"databaseId": "ocid1.database.oc1.....unique_id",
"lifecycleState": "AVAILABLE",
"isRefreshableClone": false,
"lifecycleDetails": "Pluggable Database is available",
"displayName": "Pluggable Database - Local Clone Begin"
}
}
},
"activationTime": "2021-03-23T15:00:00.000Z",
"eventTypeVersion": "2.0"
}
"exampleEvent": {
"eventID": "unique_id",
"eventTime": "2021-03-23T00:49:14.123Z",
7-318
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_id"
},
"eventType":
"com.oraclecloud.databaseservice.pluggabledatabase.localclone.end",
"eventTypeVersion": "2.0",
"cloudEventsVersion": "0.1",
"source": "databaseservice",
"contentType": "application/json",
"definedTags": {},
"data": {
"compartmentId": "ocid1.compartment.oc1.......unique_id",
"compartmentName": "MyCompartment",
"resourceName": "11092020_PKS_PDB1",
"resourceId": "ocid1.pluggabledatabases.oc1.phx.unique_id",
"availabilityDomain": "XXIT:PHX-AD-1",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.pluggabledatabases.oc1.phx.unique_id",
"timeCreated": "2021-03-13T21:15:59.000Z",
"timeUpdated": "2021-03-13T21:15:59.000Z",
"databaseId": "ocid1.database.oc1.....unique_id",
"lifecycleState": "AVAILABLE",
"isRefreshableClone": false,
"lifecycleDetails": "Pluggable Database is available",
"displayName": "Pluggable Database - Local Clone End"
}
}
},
"activationTime": "2021-03-23T15:00:00.000Z",
"eventTypeVersion": "2.0"
}
"exampleEvent": {
"eventID": "unique_id",
"eventTime": "2021-03-23T00:49:14.123Z",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_id"
},
"eventType":
"com.oraclecloud.databaseservice.pluggabledatabase.refresh.begin",
"eventTypeVersion": "2.0",
"cloudEventsVersion": "0.1",
"source": "databaseservice",
"contentType": "application/json",
"definedTags": {},
"data": {
"compartmentId": "ocid1.compartment.oc1.......unique_id",
"compartmentName": "MyCompartment",
"resourceName": "11092020_PKS_PDB1",
"resourceId": "ocid1.pluggabledatabases.oc1.phx.unique_id",
"availabilityDomain": "XXIT:PHX-AD-1",
7-319
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.pluggabledatabases.oc1.phx.unique_id",
"timeCreated": "2021-03-13T21:15:59.000Z",
"timeUpdated": "2021-03-13T21:15:59.000Z",
"isRefreshableClone": true,
"databaseId": "ocid1.database.oc1.....unique_id",
"lifecycleState": "AVAILABLE",
"lifecycleDetails": "Pluggable Database is available",
"displayName": "Pluggable Database - Refresh Begin"
}
}
},
"activationTime": "2021-03-23T15:00:00.000Z",
"eventTypeVersion": "2.0"
}
"exampleEvent": {
"eventID": "unique_id",
"eventTime": "2021-03-23T00:49:14.123Z",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_id"
},
"eventType":
"com.oraclecloud.databaseservice.pluggabledatabase.refresh.end",
"eventTypeVersion": "2.0",
"cloudEventsVersion": "0.1",
"source": "databaseservice",
"contentType": "application/json",
"definedTags": {},
"data": {
"compartmentId": "ocid1.compartment.oc1.......unique_id",
"compartmentName": "MyCompartment",
"resourceName": "11092020_PKS_PDB1",
"resourceId": "ocid1.pluggabledatabases.oc1.phx.unique_id",
"availabilityDomain": "XXIT:PHX-AD-1",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.pluggabledatabases.oc1.phx.unique_id",
"timeCreated": "2021-03-13T21:15:59.000Z",
"timeUpdated": "2021-03-13T21:15:59.000Z",
"databaseId": "ocid1.database.oc1.....unique_id",
"lifecycleState": "AVAILABLE",
"isRefreshableClone": true,
"lifecycleDetails": "Pluggable Database is available",
"displayName": "Pluggable Database - Refresh End"
}
}
},
"activationTime": "2021-03-23T15:00:00.000Z",
7-320
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"eventTypeVersion": "2.0"
}
"exampleEvent": {
"eventID": "unique_id",
"eventTime": "2021-03-23T00:49:14.123Z",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_id"
},
"eventType":
"com.oraclecloud.databaseservice.pluggabledatabase.relocate.begin",
"eventTypeVersion": "2.0",
"cloudEventsVersion": "0.1",
"source": "databaseservice",
"contentType": "application/json",
"definedTags": {},
"data": {
"compartmentId": "ocid1.compartment.oc1.......unique_id",
"compartmentName": "MyCompartment",
"resourceName": "11092020_PKS_PDB1",
"resourceId": "ocid1.pluggabledatabases.oc1.phx.unique_id",
"availabilityDomain": "XXIT:PHX-AD-1",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.pluggabledatabases.oc1.phx.unique_id",
"timeCreated": "2021-03-13T21:15:59.000Z",
"timeUpdated": "2021-03-13T21:15:59.000Z",
"databaseId": "ocid1.database.oc1.....unique_id",
"lifecycleState": "AVAILABLE",
"isRefreshableClone": false,
"lifecycleDetails": "Pluggable Database is available",
"displayName": "Pluggable Database - Relocate Begin"
}
}
},
"activationTime": "2021-03-23T15:00:00.000Z",
"eventTypeVersion": "2.0"
}
"exampleEvent": {
"eventID": "unique_id",
"eventTime": "2021-03-23T00:49:14.123Z",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_id"
},
"eventType":
"com.oraclecloud.databaseservice.pluggabledatabase.relocate.end",
"eventTypeVersion": "2.0",
"cloudEventsVersion": "0.1",
"source": "databaseservice",
7-321
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"contentType": "application/json",
"definedTags": {},
"data": {
"compartmentId": "ocid1.compartment.oc1.......unique_id",
"compartmentName": "MyCompartment",
"resourceName": "11092020_PKS_PDB1",
"resourceId": "ocid1.pluggabledatabases.oc1.phx.unique_id",
"availabilityDomain": "XXIT:PHX-AD-1",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.pluggabledatabases.oc1.phx.unique_id",
"timeCreated": "2021-03-13T21:15:59.000Z",
"timeUpdated": "2021-03-13T21:15:59.000Z",
"databaseId": "ocid1.database.oc1.....unique_id",
"lifecycleState": "AVAILABLE",
"lifecycleDetails": "Pluggable Database is available",
"displayName": "Pluggable Database - Relocate End"
}
}
},
"activationTime": "2021-03-23T15:00:00.000Z",
"eventTypeVersion": "2.0"
}
"exampleEvent": {
"eventID": "unique_id",
"eventTime": "2021-03-23T00:49:14.123Z",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_id"
},
"eventType":
"com.oraclecloud.databaseservice.pluggabledatabase.remoteclone.begin",
"eventTypeVersion": "2.0",
"cloudEventsVersion": "0.1",
"source": "databaseservice",
"contentType": "application/json",
"definedTags": {},
"data": {
"compartmentId": "ocid1.compartment.oc1.......unique_id",
"compartmentName": "MyCompartment",
"resourceName": "11092020_PKS_PDB1",
"resourceId": "ocid1.pluggabledatabases.oc1.phx.unique_id",
"availabilityDomain": "XXIT:PHX-AD-1",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.pluggabledatabases.oc1.phx.unique_id",
"timeCreated": "2021-03-13T21:15:59.000Z",
"timeUpdated": "2021-03-13T21:15:59.000Z",
"databaseId": "ocid1.database.oc1.....unique_id",
"lifecycleState": "AVAILABLE",
"isRefreshableClone": false,
7-322
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"exampleEvent": {
"eventID": "unique_id",
"eventTime": "2021-03-23T00:49:14.123Z",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_id"
},
"eventType":
"com.oraclecloud.databaseservice.pluggabledatabase.remoteclone.end",
"eventTypeVersion": "2.0",
"cloudEventsVersion": "0.1",
"source": "databaseservice",
"contentType": "application/json",
"definedTags": {},
"data": {
"compartmentId": "ocid1.compartment.oc1.......unique_id",
"compartmentName": "MyCompartment",
"resourceName": "11092020_PKS_PDB1",
"resourceId": "ocid1.pluggabledatabases.oc1.phx.unique_id",
"availabilityDomain": "XXIT:PHX-AD-1",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.pluggabledatabases.oc1.phx.unique_id",
"timeCreated": "2021-03-13T21:15:59.000Z",
"timeUpdated": "2021-03-13T21:15:59.000Z",
"databaseId": "ocid1.database.oc1.....unique_id",
"lifecycleState": "AVAILABLE",
"isRefreshableClone": false,
"lifecycleDetails": "Pluggable Database is available",
"displayName": "Pluggable Database - Remote Clone End"
}
}
},
"activationTime": "2021-03-23T15:00:00.000Z",
"eventTypeVersion": "2.0"
}
7-323
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.vmclusteraddvirtualmachine.begin",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-06-27T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_database",
"resourceId": "Vmcluster-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-09-03T12:00:00.000Z",
"timeUpdated": "2019-09-03T12:30:00.000Z",
"displayName": "testDisplayName",
"lifecycleDetails": "detail message",
"exadataInfrastructureId": "ExatraInfra-unique_ID",
"vmClusterNetworkId": "VmCluster-unique_ID",
"cpuCoreCount": 2,
"dataStorageSizeInTBs": 4,
"memorySizeInGBs": 30,
"dbNodeStorageSizeInGBs": 60,
"dbVersion": "19.0.0.0",
"licenseType": "BRING_YOUR_OWN_LICENSE",
"giVersion": "19.0.0.0",
"dbNodeIds": "[ocid1.dbnode.1, ocid1.dbnode.2,...]",
7-324
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.vmclusteraddvirtualmachine.end",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-06-27T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_database",
"resourceId": "Vmcluster-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-09-03T12:00:00.000Z",
"timeUpdated": "2019-09-03T12:30:00.000Z",
"displayName": "testDisplayName",
"lifecycleDetails": "detail message",
"exadataInfrastructureId": "ExatraInfra-unique_ID",
"vmClusterNetworkId": "VmCluster-unique_ID",
"cpuCoreCount": 2,
"dataStorageSizeInTBs": 4,
"memorySizeInGBs": 30,
"dbNodeStorageSizeInGBs": 60,
"dbVersion": "19.0.0.0",
"licenseType": "BRING_YOUR_OWN_LICENSE",
"giVersion": "19.0.0.0",
"dbNodeIds": "[ocid1.dbnode.1, ocid1.dbnode.2,...]",
"dbServerIds": "[ocid1.dbserver.1, ocid1.dbserver.2,...]",
"timeZone": "US/Pacific"
}
}
}
"exampleEvent": {
"cloudEventsVersion": "0.1",
7-325
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.vmclusterterminatevirtualmachine.begin",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-06-27T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_database",
"resourceId": "Vmcluster-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-09-03T12:00:00.000Z",
"timeUpdated": "2019-09-03T12:30:00.000Z",
"displayName": "testDisplayName",
"lifecycleDetails": "detail message",
"exadataInfrastructureId": "ExatraInfra-unique_ID",
"vmClusterNetworkId": "VmCluster-unique_ID",
"cpuCoreCount": 2,
"dataStorageSizeInTBs": 4,
"memorySizeInGBs": 30,
"dbNodeStorageSizeInGBs": 60,
"dbVersion": "19.0.0.0",
"licenseType": "BRING_YOUR_OWN_LICENSE",
"giVersion": "19.0.0.0",
"dbNodeIds": "[ocid1.dbnode.1, ocid1.dbnode.2,...]",
"dbServerIds": "[ocid1.dbserver.1, ocid1.dbserver.2,...]",
"timeZone": "US/Pacific"
}
}
}
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.vmclusterterminatevirtualmachine.end",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-06-27T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
7-326
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_database",
"resourceId": "Vmcluster-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-09-03T12:00:00.000Z",
"timeUpdated": "2019-09-03T12:30:00.000Z",
"displayName": "testDisplayName",
"lifecycleDetails": "detail message",
"exadataInfrastructureId": "ExatraInfra-unique_ID",
"vmClusterNetworkId": "VmCluster-unique_ID",
"cpuCoreCount": 2,
"dataStorageSizeInTBs": 4,
"memorySizeInGBs": 30,
"dbNodeStorageSizeInGBs": 60,
"dbVersion": "19.0.0.0",
"licenseType": "BRING_YOUR_OWN_LICENSE",
"giVersion": "19.0.0.0",
"dbNodeIds": "[ocid1.dbnode.1, ocid1.dbnode.2,...]",
"dbServerIds": "[ocid1.dbserver.1, ocid1.dbserver.2,...]",
"timeZone": "US/Pacific"
}
}
}
7-327
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
It is possible that Oracle Database or Clusterware may not be healthy or various system
components may be running out of space in the Guest VM. Customers are not notified of this
situation.
Database Service Events feature implementation generates events for Data Plane operations
and conditions, as well as Notifications for customers by leveraging the existing OCI Events
service and Notification mechanisms in their tenancy. Customers can then create topics and
subscribe to these topics through email, functions, or streams.
Note:
Events flow on ExaDB-C@C depends on the following components: Oracle Trace
File Analyzer (TFA), sysLens, and Oracle Database Cloud Service (DBCS) agent.
Ensure that these components are up and running.
# tfactl status
.--------------------------------------------------------------------------
-----------------------.
| Host | Status of TFA | PID | Port | Version | Build ID
| Inventory Status|
+----------------+---------------+--------+------+------------
+----------------------+------------+
| node1 | RUNNING | 41312 | 5000 | 22.1.0.0.0 |
22100020220310214615 | COMPLETE |
| node2 | RUNNING | 272300 | 5000 | 22.1.0.0.0 |
22100020220310214615 | COMPLETE |
'----------------+---------------+--------+------+------------
+----------------------+------------'
• To start the Oracle Trace File Analyzer daemon on the local node, run the tfactl start
command as root:
# tfactl start
Starting TFA..
Waiting up to 100 seconds for TFA to be started..
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
Successfully started TFA Process..
. . . . .
TFA Started and listening for commands
7-328
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
• To stop the Oracle Trace File Analyzer daemon on the local node, run the tfactl stop
command as root:
# tfactl stop
Stopping TFA from the Command Line
Nothing to do !
Please wait while TFA stops
Please wait while TFA stops
TFA-00002 Oracle Trace File Analyzer (TFA) is not running
TFA Stopped Successfully
Successfully stopped TFA..
Manage sysLens
• If sysLens is running, then once every 15 minutes data is collected in the local domU to
discover the events to be reported.
To check if sysLens is running, run the systemctl status syslens command as root in
the domU:
• If sysLens is enabled, when there is a reboot of the domU, then sysLens starts
automatically.
7-329
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
• To check the status of the Database Service Agent, run the systemctl status command:
• To start the agent if it is not running, run the systemctl start command as the root user:
Related Topics
• Using the Console to Create an ASM VM Cluster
To create your ASM VM cluster, be prepared to provide values for the fields required for
configuring the infrastructure.
• Using the Console to Enable, Partially Enable, or Disable Diagnostics Collection
You can enable, partially enable, or disable diagnostics collection for your Guest VMs after
provisioning the VM cluster. Enabling diagnostics collection at the VM cluster level applies
the configuration to all the resources such as DB home, Database, and so on under the
VM cluster.
• Overview of Events
7-330
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
• Notifications Overview
Note:
• Critical events are triggered due to several types of critical conditions and errors
that cause disruption to the database and other critical components. For
example, database hang errors, and availability errors for databases, database
nodes, and database systems to let you know if a resource becomes unavailable.
• Information events are triggered when the database and other critical
components work as expected. For example, a clean shutdown of CRS, CDB,
client, or scan listener, or a startup of these components will create an event with
the severity of INFO.
• Threshold limits reduce the number of notifications customers will receive for
similar incident events whilst at the same time ensuring they receive the incident
events and are reminded in a timely fashion.
7-331
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
7-332
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
7-333
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
7-334
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
7-335
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
7-336
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
7-337
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
7-338
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
7-339
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
{
"eventType" : "com.oraclecloud.databaseservice.dbnode.critical",
"cloudEventsVersion" : "0.1",
"eventTypeVersion" : "2.0",
"source" : "SYSLENS/host_Name/DomU",
"eventTime" : "2022-03-07T23:17:47Z",
"contentType" : "application/json",
"data" : {
"compartmentId" : "compartment_ID",
"compartmentName" : "compartment_Name",
"resourceName" : "resource_Name",
"resourceId" : "resource_ID",
"additionalDetails" : {
"serviceType" : "EXACC",
"hostName" : "host_Name",
"description" : "EXACHK is reporting 6 checks in critical status.
Results in: /u02/oracle.ahf/data/host_Name/exachk/user_root/output/
exachk_host_Name_v1c2_030722_150746.zip",
"eventName" : "HEALTH.DB_CLUSTER.EXACHK.CRITICAL_ALERT",
"status" : "online"
}
},
"eventID" : "cce55ca2-9e6c-11ec-90e6-00163e9b4de8",
"extensions" : {
"compartmentId" : "compartment_ID"
}
}
{
"eventType" : "com.oraclecloud.databaseservice.dbnode.critical",
"cloudEventsVersion" : "0.1",
"eventTypeVersion" : "2.0",
"source" : "SYSLENS/host_Name/DomU",
"eventTime" : "2022-03-06T18:14:57Z",
"contentType" : "application/json",
"data" : {
"compartmentId" : "compartment_ID",
"compartmentName" : "compartment_Name",
"resourceName" : "resource_Name",
"resourceId" : "resource_ID",
"additionalDetails" : {
"serviceType" : "EXACC",
"hostName" : "host_Name",
"description" : "Parameter ClientAliveCountMax has incorrect value.",
"eventName" : "CONFIGURATION.DB_GUEST.SSHD.INVALID",
"status" : "online"
}
},
"eventID" : "5453554e-9d79-11ec-8096-00163eb980bb",
"extensions" : {
"compartmentId" : "compartment_ID"
7-340
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
}
}
{
"eventType" : "com.oraclecloud.databaseservice.dbnode.critical",
"cloudEventsVersion" : "0.1",
"eventTypeVersion" : "2.0",
"source" : "SYSLENS/host_Name/DomU",
"eventTime" : "2022-03-04T18:19:42Z",
"contentType" : "application/json",
"data" : {
"compartmentId" : "compartment_ID",
"compartmentName" : "compartment_Name",
"resourceName" : "resource_Name",
"resourceId" : "resource_ID",
"additionalDetails" : {
"serviceType" : "EXACC",
"hostName" : "host_Name",
"description" : "The '/' filesystem is over 90% used.",
"eventName" : "HEALTH.DB_GUEST.FILESYSTEM.FREE_SPACE",
"status" : "online"
}
},
"eventID" : "a9752630-9be7-11ec-a203-00163eb980bb",
"extensions" : {
"compartmentId" : "compartment_ID"
}
}
{
"eventType" : "com.oraclecloud.databaseservice.dbnode.critical",
"cloudEventsVersion" : "0.1",
"eventTypeVersion" : "2.0",
"source" : "SYSLENS/host_Name/DomU",
"eventTime" : "2022-03-04T18:49:25Z",
"contentType" : "application/json",
"data" : {
"compartmentId" : "compartment_ID",
"compartmentName" : "compartment_Name",
"resourceName" : "resource_Name",
"resourceId" : "resource_ID",
"additionalDetails" : {
"serviceType" : "EXACC",
"hostName" : "host_Name",
"description" : "Huge Pages is configured more than 90% of total memory
amount.",
"eventName" : "CONFIGURATION.DB_GUEST.MEMORY.HUGEPAGES_TOO_LARGE",
"status" : "online"
}
},
"eventID" : "d0724fac-9beb-11ec-a203-00163eb980bb",
"extensions" : {
"compartmentId" : "compartment_ID"
7-341
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
}
}
If you set blackout for a target, then Oracle Trace File Analyzer stops automatic diagnostic
collections if it finds events in the alert logs for that target while scanning. By default, blackout
will be in effect for 24 hours.
You can also restrict automatic diagnostic collection at a granular level, for example, only for
ORA-00600 or even only ORA-00600 with specific arguments.
Syntax
Parameters
Parameter Description
add|remove|print| Adds, removes, or prints blackout conditions.
7-342
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
Parameter Description
targettype type Limits blackout only to the specified target type.
Target type: host|crs|asm| host: The whole node is under blackout. If there is host blackout, then
asmdg|database|dbbackup every blackout element that's shown true in the Telemetry JSON will have
|db_dataguard| the reason for the blackout.
db_tablespace | crs: Blackout the availability of the Oracle Clusterware resource or events
pdb_tablespace|pdb| in the Oracle Clusterware logs.
listener|service|os asm: Blackout the availability of Oracle Automatic Storage Management
(Oracle ASM) on this machine or events in the Oracle ASM alert logs.
asmdg: Blackout an Oracle ASM disk group.
database: Blackout the availability of an Oracle Database, Oracle
Database backup, tablespace, and so on, or events in the Oracle
Database alert logs.
dbbackup: Blackout Oracle Database backup events (such as CDB or
archive backups).
db_dataguard: Blackout Oracle Data Guard events.
db_tablespace: Blackout Oracle Database tablespace events (container
database).
pdb_tablespace: Blackout Oracle Pluggable Database tablespace
events (Pluggable database).
pdb: Blackout Oracle Pluggable Database events.
listener: Blackout the availability of a listener.
service: Blackout the availability of a service.
os: Blackout one or more operating system records.
target all|name Specify the target for blackout. You can specify a comma-delimited list of
targets.
By default, the target is set to all.
container name Specify the database container name (db_unique_name) where the
blackout will take effect (for PDB, DB_TABLESPACE, and
PDB_TABLESPACE).
pdb pdb_name Specify the PDB where the blackout will take effect (for PDB_TABLESPACE
only).
events all|"str1,str2" Limits blackout only to the availability events, or event strings, which
should not trigger auto collections, or be marked as blacked out in
telemetry JSON.
all: Blackout everything for the target specified.
string: Blackout for incidents where any part of the line contains the
strings specified.
Specify a comma-delimited list of strings.
timeout nh|nd|none Specify the duration for blackout in number of hours or days before timing
out. By default, the timeout is set to 24 hours (24h).
c|local Specify if blackout should be set to cluster-wide or local.
By default, blackout is set to local.
reason comment Specify a descriptive reason for the blackout.
docollection Use this option to do an automatic diagnostic collection even if a blackout
is set for this target.
7-343
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
tfactl blackout add -targettype host -event all -target all -timeout 1h -
reason "Disabling all events during patching"
.--------------------------------------------------------------------------
---------------------------------------------------------------------------
--------------------------.
|
myhostname
|
+---------------+---------------------+-----------
+------------------------------+------------------------------+--------
+---------------+--------------------------------------+
| Target Type | Target | Events | Start
Time | End Time | Status | Do
Collection | Reason |
+---------------+---------------------+-----------
+------------------------------+------------------------------+--------
+---------------+--------------------------------------+
| HOST | ALL | ALL | Thu Mar 24 16:48:39
UTC 2022 | Thu Mar 24 17:48:39 UTC 2022 | ACTIVE | false |
Disabling all events during patching |
7-344
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
• To remove blackout for event: ORA-00600 on target type: database, target: mydb
• To remove blackout for db backup events on target type: dbbackup, target: mydb
• To remove blackout for host events on target type: host, target: all
Remediation
These topics cover some common issues you might run into and how to address them.
• HEALTH.DB_GUEST.FILESYSTEM.FREE_SPACE
• HEALTH.DB_GUEST.FILESYSTEM.CORRUPTION
• CONFIGURATION.DB_GUEST.MEMORY.HUGEPAGES_TOO_LARGE
• CONFIGURATION.DB_GUEST.SSHD.INVALID
• HEALTH.DB_CLUSTER.EXACHK.CRITICAL_ALERT
• AVAILABILITY.DB_GUEST.CRS_INSTANCE.DOWN
• AVAILABILITY.DB_CLUSTER.SCAN_LISTENER.DOWN
• AVAILABILITY.DB_GUEST.CLIENT_LISTENER.DOWN
• AVAILABILITY.DB_GUEST.CDB_INSTANCE.DOWN
7-345
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
• HEALTH.DB_CLUSTER.CDB.CORRUPTION
• HEALTH.DB_CLUSTER.CDB.ARCHIVER_HANG
• HEALTH.DB_CLUSTER.CDB.DATABASE_HANG
• HEALTH.DB_CLUSTER.CDB.BACKUP_FAILURE
• HEALTH.DB_CLUSTER.DISK_GROUP.FREE_SPACE
• Managing the Log and Diagnostic Files on Oracle Exadata Database Service on
Cloud@Customer
• HEALTH.DB_GUEST.PDB.HIGH_IO_LATENCY
• HEALTH.DB_GUEST.CDB.HIGH_IO_LATENCY_HISTOGRAM
• HEALTH.DB_GUEST.PDB.HIGH_CPU_WAITS
• HEALTH.DB_GUEST.PDB.EXCESSIVE_WAITS
• HEALTH.DB_GUEST.PDB.EXCESSIVE_CPU_THROTTLING
HEALTH.DB_GUEST.FILESYSTEM.FREE_SPACE
Problem Statement: One or more VM guest file systems has free space below 10% free.
Risk: Insufficient VM guest file system free space can cause disk space allocation failure,
which can result in wide-ranging errors and failures in Oracle software (Database, Clusterware,
Cloud, Exadata).
Action:
Oracle Cloud and Exadata utilities run automatically to purge old log files and trace files
created by Oracle software to reclaim file system space.
If the automatic file system space reclamation utilities cannot sufficiently purge old files to clear
this event, then perform the following actions:
1. Remove unneeded files and/or directories created manually or by customer-installed
applications or utilities. Files created by customer-installed software are outside the scope
of Oracle's automatic file system space reclamation utilities. The following operating
system command, run as the opc user, is useful for identifying directories consuming
excessive disk space:
Only remove files or directories you are certain can be safely removed.
2. Reclaim /u02 file system disk space by removing Database Homes that have no
databases. For more information about managing Database Homes, see Manage Oracle
Database Homes on Exadata Database Service on Cloud@Customer Systems.
3. (Exadata Cloud@Customer only) Increase /u02 file system size. For more information
about scaling up local storage, see Introduction to Scale Up or Scale Down Operations.
4. Open service request to receive additional guidance about reducing file system space use.
7-346
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
Related Topics
• Manage Oracle Database Homes on Oracle Exadata Database Service on
Cloud@Customer Systems
Learn to manage Oracle Database homes on Oracle Exadata Database Service on
Cloud@Customer.
• Introduction to Scale Up or Scale Down Operations
With the Multiple VMs per Exadata system (MultiVM) feature release, you can scale up or
scale down your VM cluster resources.
HEALTH.DB_GUEST.FILESYSTEM.CORRUPTION
Problem Statement: A file system that is expected to be read-write can no longer be written
to.
Risk: Oracle software (Linux, Database, Clusterware, Cloud, Exadata) requires write access to
file systems to operate correctly.
Action:
/u01 and /u02 file systems:
1. Stop running services, if any, that are using the file system, such as Oracle Clusterware,
Trace File Analyzer (TFA), and Enterprise Manager (EM) agent.
2. Unmount the file system.
3. Run file system check and repair.
• ext4: Refer to Checking and Repairing a File System.
• xfs: Refer to Checking and Repairing an XFS File System.
• If the file system cannot be repaired then open a service request with Oracle Support
for assistance.
4. Mount the file system.
5. Start the services.
/ (root) file system:
Related Topics
• Checking and Repairing a File System
• Checking and Repairing an XFS File System
CONFIGURATION.DB_GUEST.MEMORY.HUGEPAGES_TOO_LARGE
7-347
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
Action:
1. Reduce HugePages memory use. To determine the proper setting for operating system
parameter vm.nr_hugepages, see My Oracle Support document 361323.1.
2. Scale up VM memory. For more information about scaling VM memory, see Introduction to
Scale Up or Scale Down Operations.
Related Topics
• https://support.oracle.com/rs?type=doc&id=361323.1
• Introduction to Scale Up or Scale Down Operations
With the Multiple VMs per Exadata system (MultiVM) feature release, you can scale up or
scale down your VM cluster resources.
CONFIGURATION.DB_GUEST.SSHD.INVALID
7-348
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
Risk: SSHD configuration is unexpected which may cause Oracle Cloud automation failure or
prevent customer SSH access to the VM.
Action: Change SSHD to match expected configuration.
1. Verify SSHD service is active.
3. Change SSHD configuration to match the expected values according to the table shown in
the Problem Statement section above.
7-349
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
HEALTH.DB_CLUSTER.EXACHK.CRITICAL_ALERT
Problem Statement: A CRITICAL Exachk check failed and should be reviewed and
addressed as soon as possible.
Risk: A CRITICAL check is expected to impact a large number of customers AND should be
addressed immediately (for example, within 24 hours) AND meets one or more of the following
criteria:
1. On-disk corruption or data loss
2. Intermittent wrong results with Exadata feature usage (e.g. smart scan)
3. System wide availability impact
4. Severe system wide performance impact seriously affecting application service Service
Level Agreements (SLAs)
5. Compromised redundancy and inability to restore redundancy
6. Inability to update software in a rolling manner
7. Configuration error that could lead to an unexpected or unknown impact
Action:
Recommend that you bring up the EXAchk HTML report from the latest EXAchk zip file and
click "view" on each CRITICAL check and follow the recommendation guidance that contains:
Benefit/Impact, Risk, and Action/Repair guidance. Once the CRITICAL check is addressed, the
next EXAchk run will pass that check. For more information about Oracle EXAchk, see Oracle
Exadata Database Machine Exachk (Doc ID 1070954.1).
As the root user, you can re-run EXAchk command by issuing:
If the check results are returning false data, then log a Service Request.
7-350
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
If there is a CRITICAL check that needs to be temporarily excluded, then follow the "Skipping
Specific Best Practice Checks in Exadata Cloud" section of Oracle Exadata Database
Machine Exachk (Doc ID 1070954.1).
Related Topics
• Oracle Exadata Database Machine Exachk (Doc ID 1070954.1)
AVAILABILITY.DB_GUEST.CRS_INSTANCE.DOWN
Problem Statement: The Cluster Ready Stack is in an offline state or has failed.
Risk: If the Cluster Ready Service is offline on a node, then the node cannot provide database
services for the application.
Action:
1. Check if CRS was stopped by your administrator, as part of a planned maintenance event,
or a scale up or down of local storage.
a. The following patching events will stop CRS:
i. GRID Patching
ii. Exadata VM patching of Guest
iii. Exadata VM Patching of Host
2. If CRS has stopped unexpectedly, then the current status can be checked by issuing the
crsctl check crs command.
a. If the node is not responding, then the VM node may be rebooting. Wait for the node
reboot to finish, CRS will normally be started through the init process.
3. If CRS is still down, then investigate the cause of the failure by referring to the alert.log
found in /u01/app/grid/diag/crs/<node_name>/crs/trace.
Review the log entries corresponding to the date/time of the down event. Act on any
potential remediation.
4. Restart the CRS, by issuing the crsctl start crs command.
5. A successful restart of CRS will generate the clearing event:
AVAILABILITY.DB_GUEST.CRS_INSTANCE.DOWN_CLEARED.
AVAILABILITY.DB_CLUSTER.SCAN_LISTENER.DOWN
Problem Statement: A SCAN listener is down and unable to accept application connections.
Risk: If all SCAN listeners are down, then application connections to the database through the
SCAN listener will fail.
Action:
Start the SCAN listener to receive the DOWN_CLEARED event.
7-351
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
AVAILABILITY.DB_GUEST.CLIENT_LISTENER.DOWN
Problem Statement: A client listener is down and unable to accept application connections.
Risk:
• If the node's client listener is down, then the database instances on the node cannot
provide services for the application.
• If the client listener is down on all nodes, then any application that connects to any
database using the SCAN or VIP will fail.
Action:
Start the client listener to receive the DOWN_CLEARED event.
7-352
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
AVAILABILITY.DB_GUEST.CDB_INSTANCE.DOWN
[oracle@vm ~] . <dbName>.env
7-353
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
HEALTH.DB_CLUSTER.CDB.CORRUPTION
Problem Statement: Corruptions can lead to application or database errors and in worse case
result in significant data loss if not addressed promptly.
A corrupt block is a block that was changed so that it differs from what Oracle Database
expects to find. Block corruptions can be categorized as physical or logical:
• In a physical block corruption, which is also called a media corruption, the database does
not recognize the block at all; the checksum is invalid or the block contains all zeros. An
example of a more sophisticated block corruption is when the block header and footer do
not match.
• In a logical block corruption, the contents of the block are physically sound and pass the
physical block checks; however, the block can be logically inconsistent. Examples of
logical block corruption include incorrect block type, incorrect data or redo block sequence
number, corruption of a row piece or index entry, or data dictionary corruptions.
For more information, see Physical and Logical Block Corruptions. All you wanted to know
about it. (Doc ID 840978.1).
Block corruptions can also be divided into interblock corruption and intrablock corruption:
• In an intrablock corruption, the corruption occurs in the block itself and can be either a
physical or a logical block corruption.
• In an interblock corruption, the corruption occurs between blocks and can only be a logical
block corruption.
Oracle checks for the following errors in the alert.log:
• ORA-01578
• ORA-00752
• ORA-00753
• ORA-00600 [3020]
• ORA-00600 [kdsgrp1]
• ORA-00600 [kclchkblk_3]
• ORA-00600 [13013]
7-354
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
• ORA-00600 [5463]
Risk: A data corruption outage occurs when a hardware, software, or network component
causes corrupt data to be read or written. The service-level impact of a data corruption outage
may vary, from a small portion of the application or database (down to a single database block)
to a large portion of the application or database (making it essentially unusable). If remediation
action is not taken promptly, then potential downtime and data loss can increase.
Action:
The current event notification currently triggers on physical block corruptions (ORA-01578),
lost writes (ORA-00752, ORA-00753 and ORA-00600 with first argument 3020), and logical
corruptions (typical detected from ORA-00600 with first argument of kdsgrp1, kdsgrp1,
kclchkblk_3, 13013 OR 5463).
Oracle recommends the following steps:
1. Confirm that these corruptions were reported in the alert.log trace file. Log a Service
Request (SR) with latest EXAchk report, excerpt of the alert.log and trace file containing
the corruption errors, any history of recent application, database or software changes and
any system, clusterware and database logs for the same time period. For all these cases,
a TFA collection should be available and should be attached to the SR.
2. For repair recommendations, refer to Handling Oracle Database Corruption Issues (Doc ID
1088018.1).
For physical corruptions or ORA-1578 errors, the following notes will be helpful:
• Doc ID 1578.1 : OERR: ORA-1578 "ORACLE data block corrupted (file # %s, block # %s)"
Primary Note
• Doc ID 472231.1 : How to identify all the Corrupted Objects in the Database reported by
RMAN
• Doc ID 819533.1 : How to identify the corrupt Object reported by ORA-1578 / RMAN /
DBVERIFY
• Depending on the object that has the corruption, follow the guidance in Doc ID 1088018.1.
Note RMAN can be used to recover one or many data block that are physically corrupted.
Also using Active Data Guard with real time apply, auto block repair of physical data
corruptions would have occurred automatically.
For logical corruptions caused by lost writes (ORA-00752, ORA-00753 and ORA-00600 with
first argument 3020) on the primary or standby databases, they will be detected on the primary
or with standby's redo apply process. The following notes will be helpful:
• Follow the guidance, follow Doc ID 1088018.1.
• If you have a standby and lost write corruption on the primary or standby, refer to
Resolving ORA-00752 or ORA-00600 [3020] During Standby Recovery (Doc ID
1265884.1)
For logical corruptions (typical detected from ORA-00600 with arguments of kdsgrp1,
kclchkblk_3, 13013 OR 5463):
• Follow the guidance, follow Doc ID 1088018.1 for specific guidance on the error that was
detected.
• If you have a standby and logical corruption on the primary, refer to Resolving Logical
Block Corruption Errors in a Physical Standby Database (Doc ID 2821699.1)
7-355
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
Related Topics
• Physical and Logical Block Corruptions. All you wanted to know about it. (Doc ID
840978.1)
• OERR: ORA-1578 "ORACLE data block corrupted (file # %s, block # %s)" Primary Note
(Doc ID 1578.1)
• How to identify all the Corrupted Objects in the Database with RMAN (Doc ID 472231.1)
• How to identify the corrupt Object reported by ORA-1578 / RMAN / DBVERIFY (Doc ID
819533.1)
• Resolving ORA-00752 or ORA-600 [3020] During Standby Recovery (Doc ID 1265884.1)
• Resolving Logical Block Corruption Errors in a Physical Standby Database (Doc ID
2821699.1)
HEALTH.DB_CLUSTER.CDB.ARCHIVER_HANG
Problem Statement: CDB RAC Instance may temporarily or permanently stall due to the log
writer's (LGWR) inability to write the log buffers to an online redo log. This occurs because all
online logs need archiving. Once the archiver (ARC) can archive at least one online redo log,
LGWR will be able to resume writing the log buffers to online redo logs and the application
impact will be alleviated.
Risk: If the archiver hang is temporary, then this can result in a small application brown out or
stall for application processes attempting to commit their database changes. If the archiver is
not unblocked, applications can experience extended delay in processing.
Action:
• See, Script To Find Redo log Switch History And Find Archivelog Size For Each instance In
RAC (Doc ID 2373477.1) to determine the hourly frequency for each thread/instance.
• If any hourly bucket is greater than 12, then consider resizing the online redo logs. See
item 2 below for resizing steps.
• If the database hangs are temporary, then the archiver may be unable to keep up with the
redo log generated. Check the alert.log, $ORACLE_BASE/diag/rdbms/<dbName>/
<instanceName>/trace/alert_<instanceName>.log, for "All online logs need
archiving", multiple events in a short period can indicate 2 possible solutions.
– If the number of redo logs groups per thread is less than 4, then consider adding
additional logs groups to reach 4, see item 1 below for add redo log steps.
– The other possible solution is to resize the redo logs, see item 2 below for resizing
steps.
• For Data Guard and Non Data Guard review the Configure Online Redo Logs
Appropriately of section Oracle Database High Availability Overview and Best Practices for
sizing guidelines.
1. Add a redo log group for each thread. The additional redo log should equal the current log
size.
a. Use the following query:
7-356
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
b. Add one new group per thread using the same size as the current redo logs.
alter database add logfile thread <thread_number> Group <max group + 1>
('<DATA_DISKGROUP>') size <redo_size_in_bytes>
2. Resize the online redo logs by adding larger redo logs and dropping the current smaller
redo logs.
a. Use the following query:
b. Add the same number of redo logs for each thread <number_of_groups_per_thread>
that currently exist. The <new_redo_size_in_bytes> should be based on Configure
Online Redo Logs Appropriately of section Oracle Database High Availability Overview
and Best Practices.
ii. The original smaller redo logs should be deleted. A redo log can only be deleted if
its status is inactive.
To determine the status of a redo logs issue:
• If the database is hung, the primary log archive destination and alternate may be full.
Review the HEALTH.DB_CLUSTER.DISK_GROUP.FREE_SPACE for details on freeing
space in RECO and DATA disk groups.
Related Topics
• Script To Find Redolog Switch History And Find Archivelog Size For Each Instances In
RAC (Doc ID 2373477.1)
• Configure Online Redo Logs Appropriately
• HEALTH.DB_CLUSTER.DISK_GROUP.FREE_SPACE
HEALTH.DB_CLUSTER.CDB.DATABASE_HANG
7-357
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
1. Review TFA events for the database for the following message patterns corresponding to
the date/time of the event: ORA-32701, "DIA0 Critical Database Process Blocked" or "DIA0
Critical Database Process As Root".
$ORACLE_BASE/diag/rdbms/<dbName>/<instanceName>/trace/
alert_<instanceName>.log
3. For ora-32701: An overloaded system can cause slow progress, which can be interpreted
as a hang.
The hang manager may attempt to resolve the hang by terminating the final blocker
process.
4. For DIA0 Critical Database Process messages: Review the related diagnostic lines
indicating the process and the reason for the hang.
HEALTH.DB_CLUSTER.CDB.BACKUP_FAILURE
7-358
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
HEALTH.DB_CLUSTER.DISK_GROUP.FREE_SPACE
7-359
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
Related Topics
• Introduction to Scale Up or Scale Down Operations
With the Multiple VMs per Exadata system (MultiVM) feature release, you can scale up or
scale down your VM cluster resources.
• Overview of Elastic Storage Expansion
With elastic storage expansion, you can dynamically increase your storage capacity to
meet your growing workload requirements.
• Dropping Data Files
• Using the Console to Terminate a Database
You can terminate a database and thereby remove the terminated database from the
Cloud Control Plane.
• Using Normal and Guaranteed Restore Points
• Maintaining the Fast Recovery Area
• Managing Exadata Snapshots
• Managing the Log and Diagnostic Files on Oracle Exadata Database Service on
Cloud@Customer
Managing the Log and Diagnostic Files on Oracle Exadata Database Service on
Cloud@Customer
Note:
Configure an optimal retention period for each type of log or diagnostic file. An
insufficient retention period will hinder root cause analysis and problem investigation.
7-360
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
7-361
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
$ cd /var/opt/oracle/cleandb
$ ./cleandblogs.pl
When running the script manually, you can specify an alternate configuration file to use
instead of cleandblogs.cfg by using the --pfile option:
$ exit
Related Topics
• Automatic Diagnostic Repository (ADR)
• Connecting to a Virtual Machine with SSH
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
HEALTH.DB_GUEST.PDB.HIGH_IO_LATENCY
HEALTH.DB_GUEST.CDB.HIGH_IO_LATENCY_HISTOGRAM
Problem Statement: High wait count values pertaining to IO wait class exceeding 32 ms, can
indicate a potential problem with underlying Exadata Infrastructure.
Risk: Increased I/O latency directly translates to slower database operations and SQL query
response times. High latency can cause significant.
Action: To investigate high cell single block physical read waits on Exadata, follow My Oracle
Support (MOS) notes: 2119510.1 and 2530864.1.
7-362
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
HEALTH.DB_GUEST.PDB.HIGH_CPU_WAITS
HEALTH.DB_GUEST.PDB.EXCESSIVE_WAITS
Problem Statement: Foreground wait event is consuming more than 20% of DB time.
Risk: High wait event times indicate that the database is spending a significant amount of time
waiting for resources, processes, or I/O operations, leading to performance bottlenecks and
potentially impacting application responsiveness.
Action: To investigate high waits in the Database, follow My Oracle Support (MOS) notes:
1377446.1.
HEALTH.DB_GUEST.PDB.EXCESSIVE_CPU_THROTTLING
7-363
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
{
"id":
"ocid1.eventschema.oc1.phx.abyhqljrdsa7ybmw6mjndfutmibmw6a4ztvu7sgm562ojbudo3l
e6qwsspdq",
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.adddbservervmclusternetwork.begin",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-08-29T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_vmcluster_network",
"resourceId": "VmClusterNetwork-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "UPDATING",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeUpdated": "2019-08-29T12:30:00.000Z",
"lifecycleDetails": "detail message",
"exadataInfrastructureId": "ExadataInfra-unique_ID",
"displayName": "testDisplayName"
}
}
},
"serviceName": "Database",
"displayName": "VM Cluster Network - Add DB Server Network Begin",
"eventType":
"com.oraclecloud.databaseservice.adddbservervmclusternetwork.begin",
"additionalDetails": [
{ "name": "id", "type": "string" },
{ "name": "timeCreated", "type": "string" },
{ "name": "timeUpdated", "type": "string" },
{ "name": "displayName", "type": "string" },
{ "name": "lifecycleState", "type": "string" },
{ "name": "lifecycleDetails", "type": ["null", "string"] },
{ "name": "exadataInfrastructureId", "type": ["null", "string"] }
],
"timeCreated": "2019-06-26T13:31:31.979Z"
}
7-364
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
This is a reference event for VM Cluster Network - Add DB Server Network Begin:
{
"id":
"ocid1.eventschema.oc1.phx.abyhqljrupbmw5ksic23bmwnqc4rssbmwc23eslydoumcnr6rcu
m6mtmgg3a",
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.adddbservervmclusternetwork.end",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-08-29T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_vmcluster_network",
"resourceId": "VmClusterNetwork-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "NEEDS_ATTENTION",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeUpdated": "2019-08-29T12:30:00.000Z",
"lifecycleDetails": "detail message",
"displayName": "testDisplayName",
"exadataInfrastructureId": "ExadataInfra-unique_ID"
}
}
},
"serviceName": "Database",
"displayName": "VM Cluster Network - Add DB Server Network End",
"eventType":
"com.oraclecloud.databaseservice.adddbservervmclusternetwork.end",
"additionalDetails": [
{ "name": "id", "type": "string" },
{ "name": "timeCreated", "type": "string" },
{ "name": "timeUpdated", "type": "string" },
{ "name": "displayName", "type": "string" },
{ "name": "lifecycleState", "type": "string" },
{ "name": "lifecycleDetails", "type": ["null", "string"] },
{ "name": "exadataInfrastructureId", "type": ["null", "string"] }
],
"timeCreated": "2019-06-26T13:31:31.979Z"
}
7-365
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
This is a reference event for VM Cluster Network - Remove DB Server Network Begin:
{
"id":
"ocid1.eventschema.oc1.phx.abyhqljrdsa7ybmw6mjndfutmifv46a4ztvu7sgm562ojbudo3l
e6qwsspdq",
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.removedbservervmclusternetwork.begin",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-08-29T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_vmcluster_network",
"resourceId": "VmClusterNetwork-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "UPDATING",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeUpdated": "2019-08-29T12:30:00.000Z",
"lifecycleDetails": "detail message",
"exadataInfrastructureId": "ExadataInfra-unique_ID",
"displayName": "testDisplayName"
}
}
},
"serviceName": "Database",
"displayName": "VM Cluster Network - Remove DB Server Network Begin",
"eventType":
"com.oraclecloud.databaseservice.removedbservervmclusternetwork.begin",
"additionalDetails": [
{ "name": "id", "type": "string" },
{ "name": "timeCreated", "type": "string" },
{ "name": "timeUpdated", "type": "string" },
{ "name": "displayName", "type": "string" },
{ "name": "lifecycleState", "type": "string" },
{ "name": "lifecycleDetails", "type": ["null", "string"] },
{ "name": "exadataInfrastructureId", "type": ["null", "string"] }
],
"timeCreated": "2019-06-26T13:31:31.979Z"
}
7-366
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
This is a reference event for VM Cluster Network - Remove DB Server Network End:
{
"id":
"ocid1.eventschema.oc1.phx.abyhqljrupbmw5ksic23bmwnqc4rsskxwc23eslydoumcnr6rcu
m6mtmgg3a",
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.removedbservervmclusternetwork.end",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-08-29T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_vmcluster_network",
"resourceId": "VmClusterNetwork-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "ALLOCATED",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeUpdated": "2019-08-29T12:30:00.000Z",
"lifecycleDetails": "detail message",
"displayName": "testDisplayName",
"exadataInfrastructureId": "ExadataInfra-unique_ID"
}
}
},
"serviceName": "Database",
"displayName": "VM Cluster Network - Remove DB Server Network End",
"eventType":
"com.oraclecloud.databaseservice.removedbservervmclusternetwork.end",
"additionalDetails": [
{ "name": "id", "type": "string" },
{ "name": "timeCreated", "type": "string" },
{ "name": "timeUpdated", "type": "string" },
{ "name": "displayName", "type": "string" },
{ "name": "lifecycleState", "type": "string" },
{ "name": "lifecycleDetails", "type": ["null", "string"] },
{ "name": "exadataInfrastructureId", "type": ["null", "string"] }
],
"timeCreated": "2019-06-26T13:31:31.979Z"
}
7-367
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.createdbnodeconsoleconnection.begin",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-08-29T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"resourceId": "ocid1.dbnodeconsoleconnection.oc1..unique_ID",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.dbnodeconsoleconnection.oc1..unique_ID",
"lifecycleState": "CREATING",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeUpdated": "2019-08-29T12:30:00.000Z",
"lifecycleDetails": "detail message",
"dbnodeId": "ocid1.dbnode.oc1..unique_ID",
"tenantId": "ocid1.tenant.oc1..unique_ID",
"compartmentId": "ocid1.compartment.oc1..unique_ID"
}
7-368
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
}
}
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.createdbnodeconsoleconnection.end",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-08-29T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"resourceId": "ocid1.dbnodeconsoleconnection.oc1..unique_ID",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.dbnodeconsoleconnection.oc1..unique_ID",
"lifecycleState": "ACTIVE",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeUpdated": "2019-08-29T12:30:00.000Z",
"lifecycleDetails": "detail message",
"dbnodeId": "ocid1.dbnode.oc1..unique_ID",
"tenantId": "ocid1.tenant.oc1..unique_ID",
"compartmentId": "ocid1.compartment.oc1..unique_ID"
}
}
}
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.deletedbnodeconsoleconnection.begin",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-08-29T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"resourceId": "ocid1.dbnodeconsoleconnection.oc1..unique_ID",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
7-369
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"id": "ocid1.dbnodeconsoleconnection.oc1..unique_ID",
"lifecycleState": "DELETING",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeUpdated": "2019-08-29T12:30:00.000Z",
"lifecycleDetails": "detail message",
"dbnodeId": "ocid1.dbnode.oc1..unique_ID",
"tenantId": "ocid1.tenant.oc1..unique_ID",
"compartmentId": "ocid1.compartment.oc1..unique_ID"
}
}
}
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.deletedbnodeconsoleconnection.end",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-08-29T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"resourceId": "ocid1.dbnodeconsoleconnection.oc1..unique_ID",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.dbnodeconsoleconnection.oc1..unique_ID",
"lifecycleState": "DELETED",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeUpdated": "2019-08-29T12:30:00.000Z",
"lifecycleDetails": "detail message",
"dbnodeId": "ocid1.dbnode.oc1..unique_ID",
"tenantId": "ocid1.tenant.oc1..unique_ID",
"compartmentId": "ocid1.compartment.oc1..unique_ID"
}
}
}
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.updatedbnodeconsoleconnection",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-08-29T21:16:04.000Z",
"contentType": "application/json",
7-370
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"resourceId": "ocid1.dbnodeconsoleconnection.oc1..unique_ID",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.dbnodeconsoleconnection.oc1..unique_ID",
"lifecycleState": "ACTIVE",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeUpdated": "2019-08-29T12:30:00.000Z",
"lifecycleDetails": "detail message",
"dbnodeId": "ocid1.dbnode.oc1..unique_ID",
"tenantId": "ocid1.tenant.oc1..unique_ID",
"compartmentId": "ocid1.compartment.oc1..unique_ID"
}
}
}
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType": "com.oraclecloud.databaseservice.updatedbnode",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-06-27T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_dbnode",
"resourceId": "DbNode-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-08-26T12:00:00.000Z",
"timeUpdated": "2019-08-26T12:30:00.000Z",
"dbSystemId": "ocid1.dbsystem.oc1.phx.unique_ID",
"lifecycleDetails": "detail message",
"vmClusterId": "VmCluster-unique_ID",
"dbHostId": "dbHost-unique_ID",
"nodeNumber": 2,
"powerAction": "HardReset",
"hostName": "testHostName"
}
7-371
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
}
}
"eventType": "VmConsoleConnected",
"cloudEventsVersion": "0.1",
"eventTypeVersion": "2.0",
"source": "VmConsoleConnectionAPI",
"eventId": "2367d627-cff8-11ed-bfd3-02001714f979",
"eventTime": "2023-03-31T19:13:37.120Z",
"contentType": "application/json",
"data": {
"eventGroupingId": "2367d62d-cff8-11ed-bfd3-02001714f979",
"eventName": "VmConsoleConnected",
"compartmentId": "ocid1.compartment.oc1..<TRUNCATED>aaaaxxxxx",
"compartmentName": "exacc-dev",
"resourceName": "",
"resourceId":
"ocid1.dbnodeconsoleconnection.oc1.iad.<TRUNCATED>aaaaaaxxxxx",
"availabilityDomain": null,
"freeformTags": null,
"definedTags": null,
"identity": {
"principalName": "dsaes",
"principalId": "ocid1.user.oc1..<TRUNCATED>aaaaaaaaaxxxxxxxxxx",
"authType": "Native",
"callerName": null,
7-372
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"callerId": null,
"tenantId": "ocid1.tenancy.oc1..<TRUNCATED>aaaaaaxxxxx",
"ipAddress": null,
"credentials": null,
"userAgent": null,
"consoleSessionId": null
},
"request": {
"id": "",
"path": "",
"action": "",
"parameters": null,
"headers": null
},
"response": {
"status": "",
"responseTime": "0001-01-01T00:00:00.000Z",
"headers": null,
"payload": null,
"message": ""
},
"stateChange": null,
"additionalDetails": {
"DBNodeId": "ocid1.dbnode.oc1.iad.<TRUNCATED>aaaaaxxxxxxx"
}
}
}
Related Topics
• Overview of Audit
• Viewing Audit Log Events
• Setting Audit Log Retention Period
7-373
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.createdbnodeconsolehistory.begin",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-08-29T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"resourceId": "ocid1.dbnodeconsolehistory.oc1..unique_ID",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.dbnodeconsolehistory.oc1..unique_ID",
"displayName": "console-history-20230808-0012",
"lifecycleState": "REQUESTED",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeUpdated": "2019-08-29T12:30:00.000Z",
"lifecycleDetails": "detail message",
"dbnodeId": "ocid1.dbnode.oc1..unique_ID",
"tenantId": "ocid1.tenant.oc1..unique_ID",
"compartmentId": "ocid1.compartment.oc1..unique_ID"
}
}
7-374
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.createdbnodeconsolehistory.end",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-08-29T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"resourceId": "ocid1.dbnodeconsolehistory.oc1..unique_ID",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.dbnodeconsolehistory.oc1..unique_ID",
"displayName": "console-history-20230808-0012",
"lifecycleState": "SUCCEEDED",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeUpdated": "2019-08-29T12:30:00.000Z",
"lifecycleDetails": "detail message",
"dbnodeId": "ocid1.dbnode.oc1..unique_ID",
"tenantId": "ocid1.tenant.oc1..unique_ID",
"compartmentId": "ocid1.compartment.oc1..unique_ID"
}
}
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.deletedbnodeconsolehistory.begin",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-08-29T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"resourceId": "ocid1.dbnodeconsolehistory.oc1..unique_ID",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.dbnodeconsolehistory.oc1..unique_ID",
"displayName": "console-history-20230808-0012",
"lifecycleState": "DELETING",
7-375
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeUpdated": "2019-08-29T12:30:00.000Z",
"lifecycleDetails": "detail message",
"dbnodeId": "ocid1.dbnode.oc1..unique_ID",
"tenantId": "ocid1.tenant.oc1..unique_ID",
"compartmentId": "ocid1.compartment.oc1..unique_ID"
}
}
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.deletedbnodeconsolehistory.end",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-08-29T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"resourceId": "ocid1.dbnodeconsolehistory.oc1..unique_ID",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.dbnodeconsolehistory.oc1..unique_ID",
"displayName": "console-history-20230808-0012",
"lifecycleState": "DELETED",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeUpdated": "2019-08-29T12:30:00.000Z",
"lifecycleDetails": "detail message",
"dbnodeId": "ocid1.dbnode.oc1..unique_ID",
"tenantId": "ocid1.tenant.oc1..unique_ID",
"compartmentId": "ocid1.compartment.oc1..unique_ID"
}
}
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType": "com.oraclecloud.databaseservice.updatedbnodeconsolehistory",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-08-29T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
7-376
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"resourceId": "ocid1.dbnodeconsolehistory.oc1..unique_ID",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.dbnodeconsolehistory.oc1..unique_ID",
"displayName": "console-history-20230808-0012",
"lifecycleState": "SUCCEEDED",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeUpdated": "2019-08-29T12:30:00.000Z",
"lifecycleDetails": "detail message",
"dbnodeId": "ocid1.dbnode.oc1..unique_ID",
"tenantId": "ocid1.tenant.oc1..unique_ID",
"compartmentId": "ocid1.compartment.oc1..unique_ID"
}
}
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.getdbnodeconsolehistorycontent",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-08-29T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"resourceId": "ocid1.dbnodeconsolehistory.oc1..unique_ID",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.dbnodeconsolehistory.oc1..unique_ID",
"displayName": "console-history-20230808-0012",
"lifecycleState": "SUCCEEDED",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeUpdated": "2019-08-29T12:30:00.000Z",
"lifecycleDetails": "detail message",
"dbnodeId": "ocid1.dbnode.oc1..unique_ID",
"tenantId": "ocid1.tenant.oc1..unique_ID",
"compartmentId": "ocid1.compartment.oc1..unique_ID"
}
}
7-377
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
{
"id":
"ocid1.eventschema.oc1.phx.abyhqljrsllp7rfneajgq2knxbqopwux24za7qzoe3mfj2bzfxt
nwqcxpbcq",
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b59a-1de3e6042f57",
"eventType": "com.oraclecloud.databaseservice.createoneoffpatch.begin",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2020-06-27T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_oneoffpatch",
"resourceId": "OneOffPatch-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2020-08-26T12:00:00.000Z",
"displayName": "testDisplayName",
"databaseVersion": "19.6.0.0",
"patchSet": "test_patch_set"
}
}
7-378
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
},
"serviceName": "Database",
"displayName": "Oneoff Patch - Create Begin",
"eventType": "com.oraclecloud.databaseservice.createoneoffpatch.begin",
"additionalDetails": [
{ "name": "id", "type": "string" },
{ "name": "lifecycleState", "type": "string" },
{ "name": "timeCreated", "type": "string" },
{ "name": "displayName", "type": "string" },
{ "name": "dbVersion", "type": "string" },
{ "name": "patchType", "type": "string" },
{ "name": "patchShapeFamily", "type": "string" },
{ "name": "releaseUpdate", "type": "string" }
],
"timeCreated": "2020-06-26T13:31:31.979Z"
}
{
"id":
"ocid1.eventschema.oc1.phx.abyhqljrj4vvuph4qvj5eateeel6axblhkq3caqndgmjvwl3sld
pgb255j2q",
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b59a-1de3e6042f57",
"eventType": "com.oraclecloud.databaseservice.createoneoffpatch.end",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2020-06-27T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_oneoffpatch",
"resourceId": "OneOffPatch-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2020-08-26T12:00:00.000Z",
"displayName": "testDisplayName",
"databaseVersion": "19.6.0.0",
"patchSet": "test_patch_set"
}
}
},
"serviceName": "Database",
"displayName": "Oneoff Patch - Create End",
"eventType": "com.oraclecloud.databaseservice.createoneoffpatch.end",
7-379
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
"additionalDetails": [
{ "name": "id", "type": "string" },
{ "name": "lifecycleState", "type": "string" },
{ "name": "timeCreated", "type": "string" },
{ "name": "displayName", "type": "string" },
{ "name": "dbVersion", "type": "string" },
{ "name": "patchType", "type": "string" },
{ "name": "patchShapeFamily", "type": "string" },
{ "name": "releaseUpdate", "type": "string" }
],
"timeCreated": "2020-06-26T13:31:31.979Z"
}
{
"id":
"ocid1.eventschema.oc1.phx.abyhqljrdripga5rryplwmv4ws6hqzr3pjyl7wfvoaqutvg2ey2
vtycn5onq",
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b59a-1de3e6042f57",
"eventType": "com.oraclecloud.databaseservice.deleteoneoffpatch.begin",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2020-06-27T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_oneoffpatch",
"resourceId": "OneOffPatch-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2020-08-26T12:00:00.000Z",
"displayName": "testDisplayName",
"databaseVersion": "19.6.0.0",
"patchSet": "test_patch_set"
}
}
},
"serviceName": "Database",
"displayName": "Oneoff Patch - Delete Begin",
"eventType": "com.oraclecloud.databaseservice.deleteoneoffpatch.begin",
"additionalDetails": [
{ "name": "id", "type": "string" },
{ "name": "lifecycleState", "type": "string" },
{ "name": "timeCreated", "type": "string" },
7-380
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
{
"id":
"ocid1.eventschema.oc1.phx.abyhqljrgwk2gvx5lmx6fiwotgdy32mdmrnkyzznz37dpb4mmeh
gzt37vl7a",
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b59a-1de3e6042f57",
"eventType": "com.oraclecloud.databaseservice.deleteoneoffpatch.end",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2020-06-27T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_oneoffpatch",
"resourceId": "OneOffPatch-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2020-08-26T12:00:00.000Z",
"displayName": "testDisplayName",
"databaseVersion": "19.6.0.0",
"patchSet": "test_patch_set"
}
}
},
"serviceName": "Database",
"displayName": "Oneoff Patch - Delete End",
"eventType": "com.oraclecloud.databaseservice.deleteoneoffpatch.end",
"additionalDetails": [
{ "name": "id", "type": "string" },
{ "name": "lifecycleState", "type": "string" },
{ "name": "timeCreated", "type": "string" },
{ "name": "displayName", "type": "string" },
{ "name": "dbVersion", "type": "string" },
{ "name": "patchType", "type": "string" },
{ "name": "patchShapeFamily", "type": "string" },
7-381
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
{
"id":
"ocid1.eventschema.oc1.phx.abyhqljr3vkb7klt5hkbsnqzjaxmszsqomanlbqmr2tsrcq7xaf
cv2c74l2q",
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b59a-1de3e6042f57",
"eventType": "com.oraclecloud.databaseservice.downloadoneoffpatch.begin",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2020-06-27T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_oneoffpatch",
"resourceId": "OneOffPatch-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2020-08-26T12:00:00.000Z",
"displayName": "testDisplayName",
"databaseVersion": "19.6.0.0",
"patchSet": "test_patch_set"
}
}
},
"serviceName": "Database",
"displayName": "Oneoff Patch - Download Begin",
"eventType": "com.oraclecloud.databaseservice.downloadoneoffpatch.begin",
"additionalDetails": [
{ "name": "id", "type": "string" },
{ "name": "lifecycleState", "type": "string" },
{ "name": "timeCreated", "type": "string" },
{ "name": "displayName", "type": "string" },
{ "name": "dbVersion", "type": "string" },
{ "name": "patchType", "type": "string" },
{ "name": "patchShapeFamily", "type": "string" },
{ "name": "releaseUpdate", "type": "string" }
],
"timeCreated": "2020-06-26T13:31:31.979Z"
}
7-382
Chapter 7
Oracle Exadata Database Service on Cloud@Customer Events
{
"id":
"ocid1.eventschema.oc1.phx.abyhqljrn2lruez55ah56kqksi5qfg6m7igvven7o2qkahlk5tk
wrj5ll3oa",
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b59a-1de3e6042f57",
"eventType": "com.oraclecloud.databaseservice.downloadoneoffpatch.end",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2020-06-27T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_oneoffpatch",
"resourceId": "OneOffPatch-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2020-08-26T12:00:00.000Z",
"displayName": "testDisplayName",
"databaseVersion": "19.6.0.0",
"patchSet": "test_patch_set"
}
}
},
"serviceName": "Database",
"displayName": "Oneoff Patch - Download End",
"eventType": "com.oraclecloud.databaseservice.downloadoneoffpatch.end",
"additionalDetails": [
{ "name": "id", "type": "string" },
{ "name": "lifecycleState", "type": "string" },
{ "name": "timeCreated", "type": "string" },
{ "name": "displayName", "type": "string" },
{ "name": "dbVersion", "type": "string" },
{ "name": "patchType", "type": "string" },
{ "name": "patchShapeFamily", "type": "string" },
{ "name": "releaseUpdate", "type": "string" }
],
"timeCreated": "2020-06-26T13:31:31.979Z"
}
7-383
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
Note:
For more information on Policies, see "How Policies Work".
For a sample policy, see "Let database admins manage Oracle Exadata Database
Service on Cloud@Customer instances".
• About Resource-Types
Learn about resource-types you can use in your policies.
• Resource-Types for Oracle Exadata Database Service on Cloud@Customer
Review the list of resource-types specific to Oracle Exadata Database Service on
Cloud@Customer.
• Supported Variables
Use variables when adding conditions to a policy.
• Details for Verb + Resource-Type Combinations
Review the list of permissions and API operations covered by each verb.
• Permissions Required for Each API Operation
Review the list of API operations for Oracle Exadata Database Service on
Cloud@Customer resources in a logical order, grouped by resource type.
Related Topics
• How Policies Work
• Let database admins manage Exadata Database Service on Cloud@Customer instances
About Resource-Types
Learn about resource-types you can use in your policies.
An aggregate resource-type covers the list of individual resource-types that directly follow.
For example, writing one policy to allow a group to have access to the database-family is
equivalent to writing eight separate policies for the group that would grant access to the
exadata-infrastructures, vmcluster-networks, vmclusters, backup-destinations, db-
nodes, dbnode-console-connection, and the rest of the individual resource-types.
For example, writing one policy to allow a group to have access to the autonomous-database-
family is equivalent to writing four separate policies for the group that would grant access to
the autonomous-databases, autonomous-backups, autonomous-container-databases, and
cloud-autonomous-vmclusters resource-types.
7-384
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
Aggregate Resource-Type
database-family
7-385
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
Individual Resource-Types
exadata-infrastructures
vmclusters
backup-destinations
db-nodes
db-homes
databases
backups
database-software-images
exascale-db-storage-vaults
autonomous-vmclusters
autonomous-container-databases
autonomous-databases
key-stores
autonomousContainerDatabaseDataguardAssociations
AutonomousDatabaseDataguardAssociation
dbnode-console-connection
dbnode-console-history
scheduling-policies
scheduling-windows
7-386
scheduling-plan
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
Supported Variables
Use variables when adding conditions to a policy.
Exadata Database Service on Cloud@Customer supports only the general variables. For more
information, see "General Variables for All Requests".
Related Topics
• General Variables for All Requests
7-387
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
The table below lists permissions and API operations for exadata-infrastructures.
7-388
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
The table below lists permissions and API operations for exadata-infrastructures.
7-389
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
The table below lists permissions and API operations for vmcluster-networks.
7-390
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
7-391
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
Note:
The VM_CLUSTER_UPDATE_SSH_KEY permission is a highly privileged permission that
allows the user to be a root user on the guest VM and gives them the ability to run
other cluster update operations on the guest VM using dbaascli.
7-392
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
7-393
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
7-394
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
7-395
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
7-396
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
7-397
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
Permissions and API operation details for Autonomous Container Database Data
Guard Associations
The table below lists permissions and API operations for
autonomousContainerDatabaseDataguardAssociations.
7-398
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
Permissions and API operation details for Autonomous Database Data Guard
Association
The table below lists permissions and API operations for
AutonomousDatabaseDataguardAssociation.
7-399
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
7-400
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
7-401
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
7-402
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
Related Topics
• OneoffPatch Reference
7-403
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
7-404
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
The table below lists permissions and API operations for scheduling-plan.
7-405
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
7-406
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
The table below lists permissions and API operations for execution-windows.
7-407
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
7-408
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
7-409
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
7-410
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
7-411
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
7-412
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
7-413
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
7-414
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
7-415
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
7-416
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
7-417
Chapter 7
Policy Details for Oracle Exadata Database Service on Cloud@Customer
Related Topics
• Permissions
7-418
Chapter 7
Managing Exadata Resources with Oracle Enterprise Manager Cloud Control
7-419
Chapter 7
Observability and Management for Oracle Exadata Database Service on Cloud@Customer
"Single Pane of Glass" View of On-Premises and Oracle Cloud Infrastructure Exadata
Resources
Enterprise Manager Cloud Control 's use of a single Exadata target type provides a consistent
Enterprise Manager experience across on-premises, Exadata Cloud, and Exadata
Cloud@Customer resources. The common Exadata target menu allows you to easily navigate
to, monitor and manage all of your Exadata systems.
Visualization
Enterprise Manager Cloud Control allows you to visualize the database and related targets
associated with each Exadata Cloud and Exadata Cloud@Customer system.
7-420
Chapter 7
Security Guide for Oracle Exadata Database Service on Cloud@Customer Systems
Responsibilities
Exadata Cloud@Customer is jointly managed by the customer and Oracle. The Exadata
Cloud@Customer deployment is divided into two major areas of responsibilities:
• Customer accessible services:
Components that the customer can access as part of their subscription to Exadata
Cloud@Customer:
– Customer accessible virtual machines (VM)
– Customer accessible database services
• Oracle-managed infrastructure:
– Power Distribution Units (PDUs)
– Out-of-band (OOB) management switches » InfiniBand switches
– Exadata Storage Servers
– Physical Exadata database servers
Customers control and monitor access to customer services, including network access to their
VMs (through layer 2 VLANs and firewalls implemented in the customer VM), authentication to
access the VM, and authentication to access databases running in the VMs. Oracle controls
and monitors access to Oracle-managed infrastructure components. Oracle staff are not
authorized to access customer services, including customer VMs and databases.
Customers access Oracle Databases running on Exadata Cloud@Customer through a layer 2
(tagged VLAN) connection from customer equipment to the databases running in the customer
7-421
Chapter 7
Security Guide for Oracle Exadata Database Service on Cloud@Customer Systems
VM using standard Oracle Database connection methods, such as Oracle Net on port 1521.
Customers access the VM running the Oracle Databases through standard Oracle Linux
methods, such as token based SSH on port 22.
7-422
Chapter 7
Security Guide for Oracle Exadata Database Service on Cloud@Customer Systems
Security Features
• Hardened Operating System Image
– Minimal package installation:
Only the necessary packages required to run an efficient system are installed. By
installing a smaller set of packages, the attack surface of the operating system is
reduced and the system remains more secure.
– Secure configuration:
Many non-default configuration parameters are set during installation to enhance the
security posture of the system and its content. For example, SSH is configured to only
listen on certain network interfaces, sendmail is configured to only accept localhost
connections, and many other similar restrictions are implemented during installation.
– Run only necessary services:
Any services that may be installed on the system, but not required for normal operation
are disabled by default. For example, while NFS is a service often configured by
customers for various application purposes, it is disabled by default as it is not required
for normal database operations. Customers may choose to optionally configure
services per their requirements.
• Minimized Attack Surface
As part of the hardened image, attack surface is reduced by disabling services.
• Additional Security Features Enabled (grub passwords, secure boot)
– Leveraging Exadata image capabilities, Exadata Cloud@Customer enjoys the features
integrated into the base image such as grub passwords and secure boot in addition to
many others.
– Through customization, customers may wish to further enhance their security posture
with additional configurations detailed later in this chapter.
• Secure Access Methods
– Accessing database servers through SSH using strong cryptographic ciphers. Weak
ciphers are disabled by default.
– Accessing databases via encrypted Oracle Net connections. By default, our services
are available using encrypted channels and a default configured Oracle Net client will
use encrypted sessions.
– Accessing diagnostics through Exadata MS web interface (https).
• Auditing and Logging
By default, auditing is enabled for administrative operations and those audit records are
communicated to OCI internal systems for automated review and alerting when required.
• Deployment-Time Considerations
7-423
Chapter 7
Security Guide for Oracle Exadata Database Service on Cloud@Customer Systems
– Wallet file download contents and sensitivity: The wallet file download that is obtained
by a customer to enable the deployment to occur contains sensitive information and
should be handled appropriately to ensure the contents are protected. The content of
the wallet file download is not needed after deployment is completed, so it should be
destroyed to ensure no information leakage occurs.
– Control Plane Server (CPS):
* Deployment requirements for the CPS include permitting outbound HTTPS access
so the CPS can connect to Oracle and enable remote administration, monitoring,
and maintenance. Find more details in the Deployment Guide.
* Customer responsibilities include providing physical security to the Exadata
Cloud@Customer equipment in their data center. While Exadata Cloud@Customer
employs many software security features, physical server compromise must be
addressed by customer physical security to ensure the safety of the servers'
contents.
bin:x:1:1:bin:/bin:/bin/false
daemon:x:2:2:daemon:/sbin:/bin/false
adm:x:3:4:adm:/dev/null:/bin/false
mail:x:8:12:mail:/var/spool/mail:/bin/false
nobody:x:99:99:Nobody:/:/bin/false
systemd-network:x:192:192:systemd Network Management:/:/bin/false
dbus:x:81:81:System message bus:/:/bin/false
rpm:x:37:37::/var/lib/rpm:/bin/false
sshd:x:74:74:Privilege-separated SSH:/var/empty/sshd:/bin/false
rpc:x:32:32:Rpcbind Daemon:/var/lib/rpcbind:/bin/false
nscd:x:28:28:NSCD Daemon:/:/bin/false
saslauth:x:999:76:Saslauthd user:/run/saslauthd:/bin/false
mailnull:x:47:47::/var/spool/mqueue:/bin/false
smmsp:x:51:51::/var/spool/mqueue:/bin/false
chrony:x:998:997::/var/lib/chrony:/bin/false
rpcuser:x:29:29:RPC Service User:/var/lib/nfs:/bin/false
uucp:x:10:14:Uucp user:/var/spool/uucp:/bin/false
7-424
Chapter 7
Security Guide for Oracle Exadata Database Service on Cloud@Customer Systems
dbmmonitor:x:2003:2003::/home/dbmmonitor:/bin/rbash
root:x:0:0:root:/root:/bin/bash
oracle:x:1001:1001::/home/oracle:/bin/bash
grid:x:1000:1001::/home/grid:/bin/bash
opc:x:2000:2000::/home/opc:/bin/bash
dbmadmin:x:2002:2002::/home/dbmadmin:/bin/bash
– root: Linux requirement, used sparingly to run local privileged commands. root is also
used for some processes like Oracle Trace File Analyzer Agent and ExaWatcher.
– grid: Owns Oracle Grid Infrastructure software installation and runs Grid Infastructure
processes.
– oracle: Owns Oracle database software installation and runs Oracle Database
processes.
– opc:
* Used by Oracle Cloud automation for automation tasks.
7-425
Chapter 7
Security Guide for Oracle Exadata Database Service on Cloud@Customer Systems
* Has the ability to run certain privileged commands without further authentication
(to support automation functions).
* Runs the local agent, also known as “DCS Agent” that performs lifecycle
operations for Oracle Database and Oracle Grid Infastructure software (patching,
create database, and so on).
– dbmadmin:
* The dbmadmin user is used for Oracle Exadata Database Machine Command-Line
Interface (DBMCLI) utility.
* The dbmadmin user should be used to run all services on the database server. For
more information, see Using the DBMCLI Utility.
Related Topics
• Using the DBMCLI Utility
root:x:0:
bin:x:1:
daemon:x:2:
sys:x:3:
adm:x:4:
tty:x:5:
disk:x:6:
lp:x:7:
mem:x:8:
kmem:x:9:
wheel:x:10:
cdrom:x:11:
mail:x:12:
man:x:15:
dialout:x:18:
tape:x:33:
video:x:39:
lock:x:54:
audio:x:63:
nobody:x:99:
users:x:100:
utmp:x:22:
utempter:x:35:
input:x:999:
systemd-journal:x:190:
systemd-network:x:192:
dbus:x:81:
ssh_keys:x:998:
sshd:x:74:
rpm:x:37:
rpc:x:32:
unbound:x:997:
nscd:x:28:
7-426
Chapter 7
Security Guide for Oracle Exadata Database Service on Cloud@Customer Systems
tss:x:59:
saslauth:x:76:
mailnull:x:47:
smmsp:x:51:
chrony:x:996:
rpcuser:x:29:
ldap:x:55:
slocate:x:21:
uucp:x:14:
tcpdump:x:72:
exawatch:x:510:
cgred:x:509:
fuse:x:508:
screen:x:84:
sssd:x:507:
printadmin:x:506:
docker:x:505:
dbmsvc:x:2001:
dbmadmin:x:2002:
dbmmonitor:x:2003:
dbmusers:x:2004:
floppy:x:19:
oinstall:x:1001:
asmdba:x:1004:
asmoper:x:1005:
asmadmin:x:1006:
dba:x:1002:
racoper:x:1003:
opc:x:2000:
Oracle Linux 8
root:x:0:
bin:x:1:
daemon:x:2:
sys:x:3:
adm:x:4:
tty:x:5:
disk:x:6:
lp:x:7:
mem:x:8:
kmem:x:9:
wheel:x:10:
cdrom:x:11:
mail:x:12:
man:x:15:
dialout:x:18:
tape:x:33:
video:x:39:
lock:x:54:
audio:x:63:
users:x:100:
nobody:x:2001:
utmp:x:22:
utempter:x:35:
7-427
Chapter 7
Security Guide for Oracle Exadata Database Service on Cloud@Customer Systems
dbus:x:81:
input:x:999:
kvm:x:36:
render:x:998:
systemd-journal:x:190:
systemd-coredump:x:997:
systemd-resolve:x:193:
tss:x:59:
ssh_keys:x:996:
sshd:x:74:
unbound:x:995:
nscd:x:28:
rpc:x:32:
saslauth:x:76:
mailnull:x:47:
smmsp:x:51:
rpcuser:x:29:
ldap:x:55:
slocate:x:21:
chrony:x:994:
tcpdump:x:72:
cgred:x:993:
fapolicyd:x:992:
printadmin:x:991:
polkitd:x:990:
sssd:x:989:
rpm:x:37:
screen:x:84:
dnsmasq:x:988:
exawatch:x:510:
dbmsvc:x:2002:
dbmadmin:x:2003:
dbmmonitor:x:2004:
dbmusers:x:2005:
uucp:x:14:
floppy:x:19:
mausers:x:2006:
secscan:x:1009:
oinstall:x:1001:
asmdba:x:1004:
asmoper:x:1005:
asmadmin:x:1006:
dba:x:1002:
racoper:x:1003:
opc:x:2000:
7-428
Chapter 7
Security Guide for Oracle Exadata Database Service on Cloud@Customer Systems
Related Topics
• Security Features of Oracle Exadata Database Machine
7-429
Chapter 7
Security Guide for Oracle Exadata Database Service on Cloud@Customer Systems
the Oracle Database and Oracle Clusterware, which in turn helps with problem resolution
when dealing with Oracle Support.
– Runs as root user.
– Runs as initd demon, /etc/init.d/init.tfa.
– Process tables show a Java application, oracle.rat.tfa.TFAMain.
• ExaWatcher:
– Runs as root and exawatch users.
– Runs as backgroud script, ExaWatcher.sh and all its child process run as a Perl
process.
– Process table shows as multiple Perl applications.
• Oracle Database and Oracle Grid Infrastructure (Oracle Clusterware):
– Runs as dbmsvc and grid users.
– Process table shows following applications:
* oraagent.bin, apx_*, and ams_* as grid user.
* dbrsMain, and Java applications, derbyclient.jar and weblogic.Server as
oracle user.
• Management Server (MS): Part of Exadata image software for managing and monitoring
the image functions.
– Runs as dbmadmin user.
– Process table shows it running as a Java process.
7-430
Chapter 7
Security Guide for Oracle Exadata Database Service on Cloud@Customer Systems
7-431
Chapter 7
Security Guide for Oracle Exadata Database Service on Cloud@Customer Systems
Note:
TNS listener opens dynamic ports after initial contact to well known ports (1521,
1525).
#iptables -L -n -v
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
Customer Responsibilities
7-432
Chapter 7
Security Guide for Oracle Exadata Database Service on Cloud@Customer Systems
Option Description
-s, --status Displays current user password aging.
-u USER, --user=USER A valid interactive user's username.
--defaults Sets all password-aging values to *Exadata factory
defaults for all interactive users.
7-433
Chapter 7
Security Guide for Oracle Exadata Database Service on Cloud@Customer Systems
Option Description
--secdefaults Sets all password-aging values to **Exadata
secure defaults for all interactive users.
--policy Sets all password-aging values to the aging policy
as defind by the password-policy command
(or /etc/login.defs) for all interactive users.
-M int, --maxdays=int Maximum number of days a password may be
used. Input limited to from 1 to 99999.
-m int, --mindays=int Minimum number of days allowed between
password changes. Input limited to from 0 to
99999, 0 for anytime.
-W int, --warndays=int Number of days warning given before a password
expires. Input limited to from 0 to 99999.
host_access_control password-policy --PASS_MAX_DAYS integer (60)*
--PASS_MIN_DAYS integer ( 1)*
--PASS_MIN_LEN integer ( 8)*
--PASS_WARN_AGE integer ( 7)*
--defaults
--status
Options Description
-h, --help Shows this help message and exits.
-d DENY, --deny=DENY Number of failed login attempts before an account
will be locked. Input is limited to from 1 to 10.
(*Exadata factory default is 5)
-l LOCK_TIME, --lock=LOCK_TIME Number of seconds (integer) an account will be
locked due to a single failed login attempt. Input is
limited to from 0 to 31557600 (one year) (*Exadata
factory default is 600 (10m))
7-434
Chapter 7
Security Guide for Oracle Exadata Database Service on Cloud@Customer Systems
Options Description
-p list, --passwdqc=list FOR SYSTEMS RUNNING ON LESS THAN OL7
Comma-separated set of 5 values:
N0,N1,N2,N3,N4 defining the minimum allowed
length for different types of password/passphrases.
Each subsequent number is required to be no
larger than the preceding one. The keyword
"disabled" can be used to disallow passwords of a
given kind regardless of their length. (Refer to the
pam_passwdqc manpage for an explanation).
Passwords must use three character classes.
Character classes for passwords are digits,
lowercase letters, uppercase letters, and other
characters. Minimum password length is 12
characters when using three character classes.
Minimum password length is 8 characters when
using four character classes. ( *Exadata factory
default is 5,5,5,5,5) (**Exadata secure default is
disabled,disabled,16,12,8)
-q PWQUALITY, --pwquality=PWQUALITY FOR SYSTEMS RUNNING ON OL7 AND
GREATER
Integer, ranging from 6 to 40, defining the minimum
allowed password length. defined by the Exadata
secure defaults. All classes will be required for
password changes as well as other checks
enforced for lengths >7. For lengths <8, class
requirements are not used.
(*Exadata factory default is: minlen=8 dcredit=-1
ucredit=-1 lcredit=-1 ocredit=-1 difok=8
maxrepeat=3 maxclassrepeat=4)
(**Exadata secure default is: minlen=15 dcredit=-1
ucredit=-1 lcredit=-1 ocredit=-1 difok=8
maxrepeat=3 maxclassrepeat=4)
(Refer to the pam_pwquality manpage for details)
-r REMEMBER, --remember=REMEMBER The last n passwords to remember for password
change history. Valid range is an integer from 0 to
1000.
(*Exadata factory default is 10)
--defaults Sets all pam-auth values to *Exadata factory
defaults.
--secdefaults Sets all pam-auth values to **Exadata secure
defaults.
-s, --status Displays current PAM authentication settings.
man iptables : To get iptables help. Various websites online have many tutorials as well.
7-435
Chapter 7
Security Guide for Oracle Exadata Database Service on Cloud@Customer Systems
Refer to earlier section "Guest VM Network Security" for details on what ports may be required
on Guest VM. To configure the firewall manually, create commands like the following example.
Note that it is possible to lock yourself out of the system by blocking the ports over which you
connect, so it's recommended to consult a test system and engage an experienced iptables
administrator if possible.
1. At the command prompt, enter the appropriate command for each port to be opened, for
example:
7-436
Chapter 7
Troubleshooting Oracle Exadata Database Service on Cloud@Customer Systems
Pay Attention to What Actions May Impact Service-Related Logins for Cloud Automation
For example, procedures will include ensuring that authorized keys used for cloud automation
actions remain intact.
For more information about Physical Network access controls including guidelines for Oracle
Cloud Automation, see Oracle Gen2 Exadata Cloud@Customer Security Controls.
Oracle Cloud Automation access to the customer VM is controlled through token based SSH.
Public keys for Oracle Cloud Automation access are stored in the authorized keys files of the
oracle, opc, and root users of the customer VM. The private keys used by the automation are
stored and protected by the Oracle Cloud Automation software running in the Exadata
Cloud@Customer hardware in the customer’s data center. The customer’s OCI Identity and
Access Management (IAM) controls govern if and how a customer can execute Oracle Cloud
Automation functionality against the customer VM and databases. The customer may further
control access through the management network and Oracle Cloud Automation keys by
blocking network access (firewall rules, disabling network interface), and by revoking the
credentials used by the Oracle Cloud Automation (remove the public keys from the authorized
keys files). Oracle Cloud Automation Access may be temporarily restored by the customer to
permit the subset of functionality required to access the customer VM and customer
databases, such as customer VM operating system patching. Oracle Cloud Automation does
not need network access the customer VM to perform OCPU scaling, and OCPU scaling
functionality will function normally when customers block Oracle Cloud Automation network
access to the customer VM.
7-437
Chapter 7
Troubleshooting Oracle Exadata Database Service on Cloud@Customer Systems
• Using Custom SCAN Listener Port With Data Guard On Disaster Recovery Network
Causes Data Guard Association Verification Failures
• PDB Creation Fails After Moving Database to a New DB Home (23ai)
• Intermittent Failure in PDB Creation When Multiple PDBs are Getting Created in Parallel
7-438
Chapter 7
Troubleshooting Oracle Exadata Database Service on Cloud@Customer Systems
If Oracle Grid Infrastructure is down, then restart by running the following commands:
7-439
Chapter 7
Troubleshooting Oracle Exadata Database Service on Cloud@Customer Systems
Use the following command to check the state of your database, and ensure that any problems
that might have put the database in an improper state are resolved:
The system returns a message including the database instance status. The instance status
must be Open for the patching operation to succeed.
If the database is not running, use the following command to start it:
DBAASCLI Logs
/var/opt/oracle/log/dbaascli
• dbaascli.log
7-440
Chapter 7
Troubleshooting Oracle Exadata Database Service on Cloud@Customer Systems
Description: This is an intermittent issue. During virtual machine operating system update with
19c Grid Infrastructure and running databases, dbnodeupdate.sh waits for RHPhelper to drain
the connections, which will not progress because of a known bug "DBNODEUPDATE.SH
HANGS IN RHPHELPER TO DRAIN SESSIONS AND SHUTDOWN INSTANCE".
Symptoms: There are two possible outcomes due to this bug:
1. VM operating system update hangs in rhphelper
• Hangs the automation
• Some or none of the database connections will have drained, and some or all of the
database instances will remain running.
2. VM operating system update does not drain database connections because rhphelper
crashed
• Does not hang automation
• Some or none of the database connection draining completes
/var/log/cellos/dbnodeupdate.trc will show this as the last line:
(ACTION:) Executing RHPhelper to drain sessions and shutdown instances.
(trace:/u01/app/grid/crsdata/scaqak04dv0201/rhp//executeRHPDrain.150721125206.trc)
Action:
1. Upgrade Grid Infrastructure version to 19.11 or above.
(OR)
Disable rhphelper before updating and enable it back after updating.
To disable before updating is started:
/u01/app/19.0.0.0/grid/srvm/admin/rhphelper /u01/app/19.0.0.0/grid
19.10.0.0.0 -setDrainAttributes ENABLE=false
If you disable rhphelper, then there will be no database connection draining before
database services and instances are shutdown on a node before the operating system is
updated.
2. If you missed disabling RHPhelper and upgrade is not progressing and hung, then it is
observed that the draining of services is taking time:
a. Inspect the /var/log/cellos/dbnodeupdate.trc trace file, which contains a
paragraph similar to the following:
(ACTION:) Executing RHPhelper to drain sessions and shutdown instances.
(trace: /u01/app/grid/crsdata/<nodename>/rhp//executeRHPDrain.150721125206.trc)
If rhphelper hangs, then the trace file contains the message as follows:
7-441
Chapter 7
Troubleshooting Oracle Exadata Database Service on Cloud@Customer Systems
c. Identify the rhphelper processes running at the operating system level and kill them.
There are two commands that will have the string “rhphelper” in the name – a Bash
shell, and the underlying Java program, which is really rhphelper executing.
rhphelper runs as root, so must be killed as root (sudo from opc).
For example:
d. Verify that the dbnodeupdate.trc file moves and the Grid Infrastructure stack on the
node is shutdown.
For more information about RHPhelper, see Using RHPhelper to Minimize Downtime
During Planned Maintenance on Exadata (Doc ID 2385790.1).
Related Topics
• Using RHPhelper to Minimize Downtime During Planned Maintenance on Exadata (Doc ID
2385790.1)
7-442
Chapter 7
Troubleshooting Oracle Exadata Database Service on Cloud@Customer Systems
Cause: Data Guard-enabled databases will not be extended to the newly added VM. And
therefore, the <db>.ini file will also not be updated because the database instance is not
configured in the new VM.
Action: To add an instance to primary and standby databases and to the new VMs (Non-Data
Guard), and to remove an instance from a Data Guard environment, see My Oracle Support
note 2811352.1.
Related Topics
• https://support.oracle.com/epmos/faces/DocContentDisplay?id=2811352.1
common_dcs_agent_bindHost=<IP_Address>
common_dcs_agent_port=7070
Note:
The common_dcs_agent_port value is 7070 always.
For example:
7-443
Chapter 7
Troubleshooting Oracle Exadata Database Service on Cloud@Customer Systems
You can specify either of the two IP addresses, <IP address 1> or <IP address 2> for the
common_dcs_agent_bindHost parameter.
Using Custom SCAN Listener Port With Data Guard On Disaster Recovery
Network Causes Data Guard Association Verification Failures
Description: If the SCAN listener port for the client network and disaster recovery network
(DR network) are different, then Data Guard (DG) configuration fails during verification phase
of create data guard association.
Action: Use the same SCAN listener ports (or default port) on all networks. To fix the listener
port after the cluster has been configured, run the GI home/bin/srvctl modify listener -
listener listener_name -endpoints endpoints command. For more information, see srvctl
modify listener in the Oracle Real Application Clusters Administration and Deployment Guide.
7-444
Chapter 7
Troubleshooting Oracle Exadata Database Service on Cloud@Customer Systems
7-445