OC Infra Funda SG
OC Infra Funda SG
OC Infra Funda SG
Fundamentals
Student Guide
D100804GC10
Edition 1.0 | September 2017
joseph Garcia This document contains proprietary information and is protected by copyright and
other intellectual property laws. You may copy and print this document solely for
your own use in an Oracle training course. The document may not be modified or
Publisher altered in any way. Except where your use constitutes "fair use" under copyright
Srividya Rameshkumar law, you may not use, share, download, upload, copy, print, display, perform,
reproduce, publish, license, post, transmit, or distribute this document in whole or in
part without the express authorization of Oracle.
Trademark Notice
Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other
names may be trademarks of their respective owners.
Contents
iii
IGW, DRG 3-6
Security Lists, Route Table 3-7
Stateful Security Lists 3-8
Stateless Security Lists 3-9
Default Security List 3-10
Default VCN components 3-11
Public Subnet 3-12
Private Subnet with a VPN 3-13
DNS Choice 3-15
DHCP Configuration 3-16
FastConnect 3-17
Off-box Network Virtualization 3-18
Bandwidth and Latency between BM instances 3-19
Summary 3-20
Practice 3: Network Management 3-21
4 Compute Service
Objectives 4-2
Compute: Bare Metal & Virtual Machines 4-3
Shape: Processor and Memory Resources 4-4
Available Shapes 4-5
NVMe SSD Devices 4-6
Protecting NVMe SSD Devices 4-7
BM.HighIO1.512 Options 4-8
BM.DenseIO1.512 Options 4-9
Images 4-10
Custom Images 4-11
Launching a Compute Instance 4-12
Creating a Key Pair 4-13
Choosing a Compartment 4-14
Using a Virtual Cloud Network 4-15
Launching an Instance 4-16
Getting the Public IP Address 4-17
Using a Block Volume 4-18
Attaching Volume to an Instance 4-19
Summary 4-20
Practice 4: Instance Management 4-21
iv
Overview of Block Volume Service 5-4
Block Volume Service Components 5-5
How Can I Use Block Storage with My Instance? 5-6
Creating and Attaching a Block Volume Using the Console 5-7
Managing Block Storage Volumes 5-8
Backup and Restoration 5-9
Whats a Mount Point? 5-10
Detaching and Deleting Block Volumes 5-11
Performance Benchmark 5-12
Overview of Object Storage Service 5-13
Object Storage Elements 5-15
Object Storage Service Features 5-16
Managing Buckets and Objects 5-17
Managing Multipart Uploads 5-18
Summary 5-20
Practice 5: Storage Management 5-21
7 Database Service
Objectives 7-2
Oracle Cloud Infrastructure Database Service 7-3
Use Cases 7-4
Exadata DB Systems 7-5
Exadata System Configuration 7-6
Whats New with Exadata DB Systems? 7-7
Database Backup to IaaS Object Store 7-8
Scaling Exadata DB Systems 7-9
Bare Metal Database System 7-10
Shapes for Bare Metal Database Systems 7-11
Storage 7-12
Managing the Database Systems 7-13
v
Provision Exadata CS in the Bare Metal Cloud 7-15
OCPU Bursting 7-65
Online Scale-up Through Compute Bursting 7-66
Exadata Cloud Service Management with EM 7-69
Availability of Advanced Database Features: Multitenant, In-Memory, etc. 7-78
Security!! All Tablespaces Created Encrypted in Oracle Cloud 7-86
Summary 7-94
Practice 7: Launching a Database System Instance 7-95
vi
1
Getting Started with Oracle Cloud
Infrastructure
September 2017
BROAD OPEN
ECOSYSTEM
Cloud apps & tools,
Cloud applications to Tools & services to build, extend, Third party apps, tools, and managed by Oracle,
accelerate your business & deploy cloud applications services to complete solutions behind your firewall
Our strategy is to give customers the best cloud applications and platform, partner with a broad and
open ecosystem, and run these technologies on the best infrastructure, either in the cloud or
on-premises, or both.
Oracle Cloud Infrastructure combines the elasticity and utility of public cloud with the granular
control, security, and predictability of on-premises infrastructure to deliver high-performance and
cost-effective infrastructure services.
Oracle Cloud Infrastructure is the first cloud platform to implement off-box network virtualization. The
off-box network virtualization takes network and IO virtualization out of the software stack and puts it
in the network. As a result, customers can provision truly elastic, self-service, pay-as-you-go
physical, dedicated hosts with no hypervisor overhead, noisy neighbors or shared resources with a
full software-defined layer 3 network topology.
In addition, the off-box network virtualization enables you to run bare metal hosts side-by-side with
any class of systems from Virtual Machines (VMs) to Engineered Systems such as Exadata, all
using the same set of APIs. This implies that you can leverage Exadata hardware (such as
InfiniBand) and software (such as smart scan, flash cache, columnar compression) features for your
applications while leveraging the cloud-native security and governance capabilities of a layer 3
virtual cloud network.
Region 1 Region 3
Availability
Availbility Domain 1
Domain 1
Availability
Availability
Domain 2
Availability
Domain 3
Region 2 Domain 2
Availability
Domain 3
Availability
Domain 1
Availability Availability
Domain 2 Domain 3
Disaster recovery is a salient feature of cloud computing. In the case of Oracle Cloud Infrastructure,
while the availability domains provide the facility for high availability, regions provide the basis for
disaster recovery. Regions are completely independent of other regions and can be separated by
vast distancesacross countries or even continents. Generally, you would deploy an application in
the region where it is most heavily used, since using nearby resources is faster than using distant
resources. However, you can also deploy applications in different regions to:
Mitigate the risk of region-wide events, such as large weather systems or earthquakes
Meet varying requirements for legal jurisdictions, tax domains, and other business or social
criteria
Generally the network virtualization is rendered by relying on the hypervisor [the hardware
virtualization layer]. However, with Off-box Virtualization, the hypervisor layer is removed and
network virtualization is run on the hardware directly. This increases network performance and more
importantly gives a higher level of security by providing isolation. So that even if the hypervisor layer
is breached, the attack remains localized to that single virtual network and does not permeate to
other virtual networks.
Identity and Access Management Service (IAM) lets you control who has access to your
cloud resources
A Resource is a cloud object that you create and use in Oracle Cloud Infrastructure
Service
Example: Compute instances, block storage volumes, Virtual Cloud Networks
(VCNs), subnets, route tables, and so on are resources
IAM concepts Tenancy, Compartments, Users, Groups, Policies
Tenancy
Equivalent of an account; tenancy contains all of your Bare Metal Cloud Services
resources
Provisioned with a single, top-level compartment called the root compartment; you can
create other compartments
Compartment
Logical container used to organize and isolate cloud resources; each resource is in
exactly one compartment
Compartments are hierarchical; permissions in a parent compartment are inherited by
child compartments (*currently compartments are only one level deep)
Compartments are global and logical; distinct from physical containers like Regions and
Availability Domains
Resources can be connected/shared across compartments
Users
Users can be created and given console passwords to use the web console and/or API
signing keys to use the REST API and SDKs
User must be placed in groups to be given access to cloud resources
A new user has no permissions until you place the user in one or more groups and
there's at least one policy that gives that group permission to either the tenancy or a
compartment
Users can be members of multiple groups
Groups
Used to grant privileges to cloud resources
A group has no permissions until you write at least one policy that gives that group
permission to either the tenancy or a compartment
Tenancy
Users Groups
user_1 group_X
user_2 group_Y
Compartment A Compartment B
Supports security principle of least privilege; by default, users are not allowed to perform
any actions
Policies are comprised of one or more statements which specify what groups can access
what resources and what level of access users in that group have
Policies are written in human-readable format:
Allow group <group_name> to <verb> <resource-type> in tenancy <tenancy_name>
Allow group <group_name> to <verb> <resource-type> in compartment
<compartment_name> [where <conditions>]
Example: Allow group ProjectA_Admins to manage all-resources in compartment
ProjectA_compartment
Tenancy
Users Groups Policies
User_1 group_X PolicyA: Allow group_X to manage all-resources in compartmentA
User_2 group_Y PolicyB: Allow group_Y to manage all-resources in compartmentB
CompartmentA CompartmentB
PolicyA PolicyB
The IAM Service has no family resource-type, only individual ones; Audit and Load
Balancer have individual resources (load-balancer, audit-events)
CompanyA Tenancy
CompartmentA
IAM Service resources (compartments, users, groups, and policies) are global, so you can access
them across all regions
You can sign up for Oracle Cloud Infrastructure Services in the following ways:
Contact your Oracle sales representative
Visit Oracle Store, https://shop.oracle.com and sign up for the Oracle Cloud Infrastructure
Services
Sign up for a free trial at http://cloud.oracle.com/tryit
You can sign up for Oracle Cloud Infrastructure Services in the following ways:
Contact your Oracle sales representative: Your Oracle sales representative can provide you
information about the pricing options available to your company. Your sales representative
will collect some information from you and initiate the registration process.
Go to the Oracle Store: Visit https://shop.oracle.com/ and sign up for the Oracle Cloud
Infrastructure Services.
Sign up for a free trial at http://cloud.oracle.com/tryit
When your registration process is completed, you will be provisioned a Tenancy in Oracle Cloud
Infrastructure Services. Oracle will send you a notification email with instructions to sign in to the
web console for the first time. There is no charge until you start using the service.
Region based URL for the web-based console (for example: Ashburn region):
https://console.us-ashburn-1.oraclecloud.com
Use the console to access and manage your Oracle Cloud Infrastructure services
The services you can use depend on: Service Limits set for your tenancy, permissions
granted by administrator
Console is the web-based user interface that you use to access and manage Oracle Cloud
Infrastructure Services.
The supported browsers include the latest versions of Google Chrome, Firefox, Microsoft
Edge, and Internet Explorer 11.
When you sign in to the web console, you'll see the home page.
Use the service tabs in the upper right to create, manage, and view your cloud resources.
Links to the documentation and to Oracle Support give you quick access to help and detailed
information for using the services.
Tenancy OCID
Instance OCID
Console Password:
Sign in to the web console the first time with the one-time password, and change the
password, when prompted. Password requirements are shown in the console.
The one-time password expires in 7 days. You can change the password later.
Also, you or an administrator can reset the password using the console or the API. Resetting
the password creates a new one-time password that you'll be prompted to change the next
time you sign in to the console. If you're blocked from signing in to the console because
you've tried 10 times in a row unsuccessfully, contact your administrator.
API Signing Key:
After you've uploaded your first API key in the console, you can use the API to upload any
additional ones you want to use. If you provide the wrong kind of key (for example, your
instance SSH key, or a key that isn't at least 2048 bits), you'll get an InvalidKey error.
You can upload your PEM public key in the Console:
Open the Console, and sign in.
Click your username in the top-right corner of the Console, and then click User Settings.
- If you're an administrator doing this for another user, instead click Identity, click Users,
and then select the user from the list.
Click Add Public Key. Paste the contents of the PEM public key in the dialog box and click
Add.
USERS
USERS
USERS
USER U01 COMPARTMENT
COMPARTMENT
COMPARTMENT
COMPARTMENT
TENANCY
This is the first practice session. In this session, you explore the Oracle Cloud Infrastructure
environment that you have been provided. You will also set up users, group, and security policy rules
that you will use to build your highly available WordPress environment.
All participants share one tenancy. Each participant will work in their own compartment to create and
configure resources to set up the application in a highly available configuration.
ORACLE CLOUD DATA CENTER REGION Security List: A common set of firewall
rules associated with a subnet and applied
to all instances launched inside the subnet.
AVAILABILITY DOMAIN-1 AVAILABILITY DOMAIN-2
Security lists provide ingress and
egress rules that specify the types of
traffic allowed in and out of the
instances.
SUBNET A, SUBNET B,
10.0.1.0/24 10.0.2.0/24 You can choose whether a given rule is
stateful or stateless.
VCN, 10.0.0.0/16
Route Table: A set of route rules that provide
mapping for the traffic from subnets through
gateways to destinations outside the VCN.
ORACLE CLOUD DATA CENTER REGION Create a VCN, provide a CIDR range
Create an Internet Gateway
AVAILABILITY DOMAIN-1
Create a Route Rule with traffic to Internet
Gateway (for all IP addresses, 0.0.0.0/0)
Default RT
ORACLE CLOUD DATA CENTER REGION Create a VCN, provide a CIDR range
AVAILABILITY DOMAIN-2 Create a Dynamic Routing Gateway (DRG);
attach it to the VCN
Custom Route
Table Create a new Route Table so its default route is
directed toward DRG and thus to the VPN
SUBNET B,
10.0.2.0/24
Create a Route Rule with traffic to DRG - add a
CIDR block of 0.0.0.0/0 (all non-intra-VCN traffic
VCN, 10.0.0.0/16 that is not already covered by other rules in the
route table will go to the DRG)
Create Security List rules that allow the traffic (for
CUSTOMER
DATA CENTER example: port 1521 for Oracle databases)
Create a Private Subnet within a specific AD with
the Route Table and Security List
ORACLE CLOUD DATA CENTER REGION Create an IPSec connection for VPN
AVAILABILITY DOMAIN-2 Data center admin must configure the on-
premises router before network traffic can flow
Custom Route
Table
between your on-premises network and VCN
At your end of the IPSec VPN is the actual
SUBNET B,
10.0.2.0/24 router in your on-premises network (hardware or
software). A virtual representation of the router
VCN, 10.0.0.0/16 in Bare Metal Cloud Services is referred to
as Customer-Premises Equipment (CPE)
CUSTOMER
DATA CENTER
The Domain Name System (DNS) enables lookup of other computers using host names.
You choose the DNS for each subnet in the cloud network.
Default Choice: Internet and VCN Resolver. This is an Oracle-provided option that
includes two parts:
Internet Resolver: Lets instances use host names that are publicly published on the
Internet. The instances do not need to have Internet access by way of either an IGW or
an IPSec VPN DRG.
VCN Resolver: Lets instances use host names (which you can assign) to communicate
with other instances in the VCN.
Custom Resolver: Use your own DNS servers. These could be Internet IP
addresses for DNS servers in your VCN, or DNS servers in your on-premises
network, which is connected to your VCN by way of an IPSec VPN connection.
Instance FQDN: <hostname>.<subnet DNS label>.<VCN DNS label>.oraclevcn.com
(you can specify VCN, Subnet and hostname DNS labels)
If you choose to use the default option of DNS, that is, Internet and VCN Resolver with DNS
Hostnames Across the VCN, then all instances in the VCN can communicate with each other without
knowing their IP addresses. Make sure to assign a DNS label to the VCN and every subnet. Then
make sure to assign every instance a host name (or at least a display name) at launch. The
instances can then communicate with each other using FQDNs instead of IP addresses. If you also
set the Search Domain DHCP option to the VCN domain name, the instances can then communicate
with each other using just <hostname>.<subnet DNS label> instead of the FQDN.
If you use Custom DNS Servers to Resolve DNS Hostnames, then you can set up an instance to be
a custom DNS server within your VCN and configure that instance to resolve the hostnames for your
instances. You must configure the servers to use 169.254.169.254 as the forwarder for the VCN
domain.
Your cloud network uses DHCP options to automatically provide configuration information to the
instances when they boot up. Each cloud network comes with a default set of DHCP options with an
initial value that you can change. If you don't specify otherwise, every subnet will use the VCN's
default set of DHCP options.
You can't change which set of DHCP options is associated with a subnet after the subnet is created.
If you don't want to use the default set, make sure to create your desired set of DHCP options before
creating the subnet. However, remember that you can also change the values for the options.
Whenever you change the value of one of the DHCP options, you need to either restart the DHCP
client on the instance, or reboot the instance, for the change to take effect on existing instances in
the subnets associated with that set of DHCP options.
Be sure to keep the DHCP client running so you can always access the instance. If you stop the
DHCP client manually or disable Network Manager, the instance can't renew its DHCP lease and will
become inaccessible when the lease expires (typically within 24 hours). Do not disable Network
Manager unless you use another method to ensure renewal of the lease. Stopping the DHCP client
might remove the host route table when the lease expires. Also, loss of network connectivity to your
iSCSI connections might result in loss of the boot drive.
Gray VCN
Red VCN
Off-Box Network
Virtualization
Physical Network
We use Off Box Network Virtualization. Note that the virtualization layer is well isolated from the
Bare-Metal nodes and as a result, it is much harder for a bad actor to compromise the virtualization
layer.
[opc@iperf-client ~]$ sudo iperf3 -c 10.0.0.5 [opc@iperf-client ~]$ sudo iperf3 -c 129.213.56.64
Connecting to host 10.0.0.5, port 5201 Connecting to host 129.213.56.64, port 5201
[ 4] local 10.0.2.3 port 45988 connected to 10.0.0.5 port 5201 [ 4] local 10.0.2.3 port 34528 connected to 129.213.56.64 port 5201
[ ID] Interval Transfer Bandwidth Retr Cwnd [ ID] Interval Transfer Bandwidth Retr Cwnd
[ 4] 0.00-1.00 sec 1.13 GBytes 9.67 Gbits/sec 25 2.54 MBytes [ 4] 0.00-1.00 sec 666 MBytes 5.59 Gbits/sec 428 1.43 MBytes
[ 4] 1.00-2.00 sec 1.15 GBytes 9.87 Gbits/sec 0 3.02 MBytes [ 4] 1.00-2.00 sec 462 MBytes 3.88 Gbits/sec 556 1.32 MBytes
[ 4] 2.00-3.00 sec 1.15 GBytes 9.86 Gbits/sec 66 3.02 MBytes [ 4] 2.00-3.00 sec 462 MBytes 3.88 Gbits/sec 550 1.22 MBytes
[ 4] 3.00-4.00 sec 1.15 GBytes 9.86 Gbits/sec 6 2.12 MBytes [ 4] 3.00-4.00 sec 461 MBytes 3.87 Gbits/sec 499 1.25 MBytes
[ 4] 4.00-5.00 sec 1.15 GBytes 9.87 Gbits/sec 3 3.02 MBytes [ 4] 4.00-5.00 sec 462 MBytes 3.88 Gbits/sec 509 1.24 MBytes
[ 4] 5.00-6.00 sec 1.15 GBytes 9.87 Gbits/sec 0 3.02 MBytes [ 4] 5.00-6.00 sec 476 MBytes 3.99 Gbits/sec 512 446 KBytes
[ 4] 6.00-7.00 sec 1.15 GBytes 9.87 Gbits/sec 0 3.02 MBytes [ 4] 6.00-7.00 sec 491 MBytes 4.12 Gbits/sec 600 428 KBytes
[ 4] 7.00-8.00 sec 1.15 GBytes 9.87 Gbits/sec 0 3.02 MBytes [ 4] 7.00-8.00 sec 486 MBytes 4.08 Gbits/sec 565 376 KBytes
[ 4] 8.00-9.00 sec 1.15 GBytes 9.86 Gbits/sec 0 3.02 MBytes [ 4] 8.00-9.00 sec 480 MBytes 4.03 Gbits/sec 522 376 KBytes
[ 4] 9.00-10.00 sec 1.15 GBytes 9.87 Gbits/sec 0 3.02 MBytes [ 4] 9.00-10.00 sec 482 MBytes 4.05 Gbits/sec 590 227 KBytes
------------------------- -------------------------
[ ID] Interval Transfer Bandwidth Retr [ ID] Interval Transfer Bandwidth Retr
[ 4] 0.00-10.00 sec 11.5 GBytes 9.85 Gbits/sec 100 sender [ 4] 0.00-10.00 sec 4.82 GBytes 4.14 Gbits/sec 5331 sender
[ 4] 0.00-10.00 sec 11.5 GBytes 9.84 Gbits/sec receiver [ 4] 0.00-10.00 sec 4.81 GBytes 4.13 Gbits/sec receiver
USER U01
VCN01
COMPARTMENT
TENANCY
Compute Service
September 2017
Hypervisor
VM compute instances runs on the same hardware as a Bare Metal instances, leveraging the
same cloud-optimized hardware, firmware, software stack, and networking infrastructure
Latency: Same Random and Sequential: ~90 sec Read, ~20 sec Write
Oracle Compute Cloud Service enables you to select from a range of predefined shapes
that determine the number of CPUs available in an instance and the amount of RAM
available in an instance.
Several predefined shapes are available for both bare metal and virtual machine
instances.
While creating Compute instances, you can assign CPU and memory resources by selecting from a
wide range of resource profiles (called shapes), each of which is a carefully designed combination of
processor and memory limits.
In the case of standard VM instances, NVMe storage is not available. For all the shapes, Block
Volume storage is offered.
The Dense I/O instances are configured with 28.8 TB of local NVMe storage and are ideal for
extreme transactional workloads that work on large datasets and require low latency and high
throughput, such as Big Data and High Performance Compute (HPC) applications.
RAID 1: An exact copy RAID 10: Stripes data across multiple mirrored RAID 6: Block-level striping with two parity
(or mirror) of a set of pairs. As long as one disk in each mirrored pair blocks distributed across all member disks
data on two or more is functional, data can be retrieved
disks
RAID 10 across all 4 SSDs with 6.4 TB RAID 6 across all 4 SSDs with 6.4 TB
usable space, can survive the failure of usable space, but can survive the failure of
one device; fast performance two devices; slower, but higher durability
Canonical-Ubuntu-16.x-
Ubuntu 16.04 LTS Ubuntu is a free, open-source Linux distribution
<date>-<number>
Windows Server 2012 R2 Windows-Server-2012-R2-
Windows Server 2012 R2 Standard Edition
Bare Metal (BM) Standard-Edition-BM
Windows Server 2012 R2 - Windows-Server-2012-R2-
Windows Server 2012 R2 Standard Edition
Virtual Machine (VM) Standard-Edition-VM
All Oracle-provided images include rules that allow only "root" on Linux instances or "Administrators"
on Windows instances to make outgoing connections to the iSCSI network endpoint
(169.254.0.2:3260) that serves the instance's boot and block volumes.
Oracle recommends that you do not reconfigure the firewall on your instance to remove these rules.
Removing these rules allows non-root users or non-administrators to access the instances boot disk
volume. Oracle recommends that you do not create custom images without these rules unless you
understand the security risks.
Possible to create a custom image of an instances boot disk and use it to launch other
instances.
Instances you launch from your image include customizations, configuration, and
software installed when you created the image.
When you create an image of a running instance, the instance shuts down and remains
unavailable for several minutes. When the process completes, the instance restarts.
Custom images do not include the data from any attached block volumes.
Custom images cannot be > 50 GB in size.
Custom images cannot be downloaded or exported.
Support Generalized and Specialized images for Windows.
Generalized image - generalized OS disk, cleaned of computer-specific information.
Specialized image - OS disk that is already fully installed, and a copy of the original
BM or VM.
While use of PuTTY is shown in the slide for accessing from Windows environments, you could also
install a bash shell such as the Ubuntu based bash shell or Git bash in a Windows environment.
When you use a bash environment, the Linux commands work the same way in bash shell in
Windows environment.
Before you can launch an instance, you need to have a Virtual Cloud Network (VCN). In the VCN,
you launch the instance into a subnet. A subnet is a subdivision of your VCN that you define in a
single Availability Domain. The subnet directs traffic according to a route table. The subnet also uses
a security list to control traffic in and out of the instance.
When you created a VCN, you would have noted the details of the VCN that you just created. The
VCN has the following resources and characteristics:
CIDR block range of 10.0.0.0/16
An Internet Gateway
A route table with a default route rule to enable traffic to and from the Internet Gateway
A Default Security List that allows specific ingress traffic to and all egress traffic from the
instance
A public subnet in each Availability Domain.
The VCN will automatically use the Internet and VCN Resolver for DNS.
The instance is displayed in the Console in a provisioning state. Expect provisioning to take a few
minutes before the status changes to Running. Do not refresh the page. Once the instance is
running, wait a few more minutes for the operating system to boot before you attempt to connect.
The shape you select determines the number of CPUs, memory to be allocated to your Compute
instances.
The public IP address of your instance is what you need to connect to the instance and configure
other resources within that instance.
Use the following SSH command to access the instance. Enter the passphrase welcome1 when
prompted.
$ ssh opc@<public-ip-address>
<public-ip-address> is your instance IP address that you retrieved from the Console.
Block Volume Service provides network storage to use with your Compute instances. After you
create, attach, and mount a volume to your instance, you can use it just as you would a physical
hard drive on your computer. A volume can be attached to a single instance at a time, but you can
detach it from one instance and attach to another instance, keeping your data intact.
Challenge-Handshake Authentication Protocol (CHAP) is a security protocol. When you set up your
production environment, Oracle recommends that you use CHAP credentials.
SUBNET01
Mounts the block volume and
transfers some content
Customizes the instance and USER U01
COMPARTMENT
TENANCY
Block Volume Service lets you dynamically add storage capacity to an instance.
You can create, attach, connect, and move volumes, as needed, to meet your storage
and application requirements.
Once attached and connected to an instance, you can use a volume like a regular hard
drive.
Volumes can also be disconnected and attached to another instance without the loss of
data, thereby providing persistence and portability.
Elastic block storage volumes are configurable from 50GB to 2TB
The service offers 60 IOPS per GB and scales linearly
Data is encrypted at rest in both volumes and backups
All volumes are automatically replicated for you helping to protect against data loss.
Typically used for persistent and durable storage.
A common usage of Block Volume Service is to add storage capacity to an instance. To use a bock
storage volume, you should:
Create a block storage volume through the console or the API
Attach the volume to an instance using a volume attachment
Connect to the volume from your instance's guest OS using iSCSI
Mount the volume and use within your instance
A Block Volume Service volume can be detached from an instance and moved to a different instance
without loss of data. This data persistence allows you to easily migrate data between instances and
ensures that your data is safely stored, even when it is not connected to an instance. Any data will
remain intact until you reformat or delete the volume.
To move your volume to another instance, unmount the drive from the initial instance, terminate the
iSCSI connection, and attach it to the second instance. From there, you simply connect and mount
the drive from that instance's guest OS to instantly have access to all of your data. Additionally,
Block Volume Service volumes offer a high level of data durability compared to standard, attached
drives. All volumes are automatically replicated for you, helping to protect against data loss.
The components required to create a volume and attach it to an instance are briefly
described as follows:
Instance
An Oracle Cloud Infrastructure compute host
iSCSI
A TCP/IP-based standard used for communication between the instance and the
attached volume
Volume
A detachable block storage device that allows you to dynamically expand the storage
capacity of an instance
Resource Identifier
Each Oracle Bare Metal Cloud Services resource has a unique, Oracle-assigned
identifier called an Oracle Cloud ID (OCID).
The Internet Small Computer System Interface (iSCSI) is an IP-based standard for connecting
storage devices. iSCSI encapsulates SCSI commands in IP network packets, which allows data
transfer over long distances and sharing of storage by client systems. As iSCSI uses the existing IP
infrastructure, it does not require the purchase and installation of fiber-optic cabling and interface
adapters that are needed to implement Fibre Channel (FC) storage area networks.
Oracle Linux supports iSCSI initiator functionality in software. The kernel-resident device driver uses
the existing network interface card (NIC) and network stack to emulate a hardware iSCSI initiator. As
the iSCSI initiator functionality is not available at the level of the system BIOS, you cannot boot an
Oracle Linux system from iSCSI storage.
Data
Applications
Instance
Virtual
Disk
A storage volume is a virtual disk that provides persistent block storage for Compute instances.
You can use storage volumes to store data and applications.
Block Volume Service, a part of Oracle Cloud Infrastructure, allows you to:
Create block storage volumes and attach them to your Compute instances. When you create
a storage volume, you can specify the capacity that you need.
Attach one or more storage volumes to an instance either while creating the instance or later,
while the instance is running.
Scale up or scale down the block storage capacity for the instance by attaching or detaching
storage volumes even while the instance is running. Also, remember that, when a storage
volume is detached from an instance or when the instance is deleted, data stored on the
storage volume is not lost.
You use the iSCSI protocol to attach a volume to an instance. Once the volume is attached, you log
on to the instance and use the iscsiadm command-line tool to configure the iSCSI connection. After
you configure the volume, you can mount it and use it like a normal hard drive.
To take a backup:
In the console, click Storage.
Click Backups.
Click the block volume for which you want to create a backup.
Click Create Backup.
Enter a name for the backup, and then click Create Backup.
The backup will be completed once its icon no longer lists it as CREATING in the volume list.
To restore a new volume from a backup:
In the Console, click Storage, and then click Backups.
- A list of the block volumes in the compartment you're viewing is displayed. If you dont
see the one you're looking for, make sure youre viewing the correct compartment.
Select the block volume backup you want to restore.
Click Create Block Volume.
Enter a name for the block volume and choose the Availability Domain in which you want to
restore it.
Click Create.
The volume will be ready to attach once its icon no longer lists it as PROVISIONING in the volume
list.
Mount on any
Mount Point
When an instance no longer requires a block volume, you can disconnect and then
detach it from the instance without any loss of data.
When you attach the same volume to another instance or to the same instance, DO
NOT FORMAT the disk volume. Otherwise, you will lose all the data on the volume.
When the volume itself is no longer needed, you can delete the block volume.
You cannot undo a delete operation. Any data on a volume will be permanently deleted
once the volume is deleted.
Object storage is where data is handled as an object, also known as unstructured data.
Object Storage use cases:
Big Data: Object Storage Service enables you to not only store large data sets, but
also operate seamlessly on them. You can generate business insights by using
the HDFS connector to interface with analytics engines such as Apache Spark and
MapReduce.
Archive and Storage: Backup or archive data is typically written once and read
many times. The durability and low cost characteristics of Object Storage
Service make it suitable to store data for long durations.
Content Repository: Object Storage Service supports any content type, images,
logs, and video. You can store this data for a long time and the storage scales in tune
with your need.
Object storage is where data is handled as an object, also known as unstructured data. The
main differences between object storage and traditional storage (also known as block
storage), are listed as follows:
- Stored data contains customized metadata.
- Data is indexed, allowing for much faster search results.
- Data can be located by using pointers instead of finding its location based on tracks
and sectors on the hard disk (that is, the standard file system that we have used for
many years).
This type of storage is used as an essential part of cloud services, in data centers, and it is
normally integrated with virtual machines.
Because object storage allows for additional attributes as part of the bundle, applications,
programs and storage devices are able to better manipulate data.
Nearly any file type can be stored in the form of object storage. Some popular files include
media files (images, videos, music, and photos), documents, PDFs, backups, archives, and
so on.
Multiple users can access the data.
With Object Storage Service, you can safely and securely store or retrieve data directly from the
Internet or from within the cloud platform. Object Storage Service is agnostic to data content type. It
enables a variety of use cases and works equally well with them. The Object Storage Service is a
regional service. It is not tied to any specific compute instance. You can access data from anywhere
within or outside the context of the Oracle Cloud Infrastructure, as long as you have Internet
connectivity and can access the Object Storage Service API endpoint.
(HDFS Connector: https://docs.us-phoenix-1.oraclecloud.com/Content/Object/Tasks/hadoopsupport.htm)
Object
Bucket
Namespace
Compartment
A bucket is associated with a single compartment. The compartment has policies that indicate what
actions a user can perform on a bucket and all the objects in the bucket.
An object is a file or unstructured data such as: multimedia files, data backups, static web content, or
logs that you upload to a bucket within a compartment within a namespace. Objects are processed
as a single entity. You can't edit or append data to an object, but you can replace the entire object.
Note: In this course, while you can create a bucket and upload data as objects, we will not use
object storage resources in the hands-on labs and practices.
Object Storage Service supports multipart uploads for more efficient and resilient
uploads, especially for large objects.
You can use the retry feature to upload only the failed upload.
You can use multipart upload RESTAPI calls or the Java Software Development Kit
(SDK) to manage multipart uploads, but not the Console.
With multipart uploads, individual parts of an object can be uploaded in parallel to reduce the amount
of time you spend uploading. Multipart uploads can also minimize the impact of network failures by
letting you retry a failed part upload instead of requiring you to retry an entire object upload. Oracle
recommends that you perform a multipart upload to upload objects larger than 100 MB. The
maximum size for an uploaded object is 10 TB. Object parts must be no larger than 50 GB. For very
large uploads, a multipart upload also offers you the flexibility of pausing and resuming at your own
pace.
A multipart upload consists of the following steps:
Initiating an upload
Uploading object parts
Committing the upload
In the initiating step, you should create the parts to upload. The Object Storage Service provides API
operations for the remaining steps. The service also provides API operations for listing in-progress
multipart uploads, listing the object parts in an in-progress multipart upload, and aborting in-progress
multipart uploads.
Creating Object Parts
With multipart upload, you split the object you want to upload into individual parts. Individual parts
can be as large as 50 GB or as small as 10 MB. (The Object Storage Service waives the minimum
part size restriction for the last uploaded part.) Decide what part number you want to use for each
part. Part numbers can range from 1 to 10,000. You do not need to assign contiguous numbers, but
the Object Storage Service will construct the object by ordering part numbers in ascending order.
SUBNET01
USER U01
VCN01
COMPARTMENT
TENANCY
Provides automated traffic distribution from one entry point to multiple servers in VCN
Improves resource utilization, facilitates scaling, and helps ensure high availability
Regional Load Balancer for your VCN; redundant across two ADs (No single point of
failure)
Supported Protocols TCP, HTTP/1.0, HTTP/1.1, HTTP/2, WebSocket
SSL Offloading SSL Termination, End to End SSL, SSL Tunneling
Key differentiators
Private or Public Load Balancer and Public or Private IP address
Provisioned Bandwidth 100 Mbps, 400 Mbps, 8 Gbps
Single LB for TCP and HTTP protocols
You want a single entry point to your application cluster. Load Balancing Service, a part of Oracle
Cloud Infrastructure, offers you an IP-based load balancer that is highly available across availability
domains within a region. The Load Balancing Service is primarily a regional service and offers a
public IPv4 address within your VCN.
The service provides a load balancer with a public IP address, provisioned bandwidth, and high
availability. Load Balancing Service provisions the public IP address across two subnets within your
VCN to ensure accessibility even during an Availability Domain outage. You can configure
multiple listeners for the IP address to load balance transport Layer 4 and Layer 7 (TCP and HTTP)
traffic.
Public IP address
Backend Set logical entity defined by a list of
backend servers, a load balancing policy, and a
Listener health check policy
Health Checks a test to confirm the availability
Load Balancer Load Balancer
(Failover) of backend servers; supports TCP & HTTP
SUBNET 1 SUBNET 2 health checks
Listener an entity that checks for incoming
traffic on the load balancer's IP address
Load Balancing Policy tells the load balancer
Backend Set
how to distribute incoming traffic to the backend
Backend Servers Backend Servers servers (round-robin, IP hash, least connection)
SUBNET 3 SUBNET 4
A template that determines the load balancer's total pre-provisioned maximum capacity
(bandwidth) for ingress plus egress traffic. Available shapes are:
ECDHE is Elliptic Curve Diffie-hellman key Exchange, an encrypted key exchange standard.
To create and test a public load balancer, complete the following steps:
Create a public load balancer
Create a backend set with health check
Add backend servers to your backend set
Create a listener
Update the public load balancer subnet security list to allow Internet traffic to the listener
Verify your public load balancer
Update rules to protect your backend servers
Database Service
September 2017
The Oracle Cloud Infrastructure - Database Service lets you quickly launch an Oracle Database
System (DB System) and create one or more databases on it. You have full access to the features
and operations available with Oracle Database, but Oracle owns and manages the infrastructure.
The Database Service supports several types of DB Systems, ranging in size, price, and
performance.
Customers control and manage software that directly affects their application
Database, OS, Clusterware
Oracle manages underlying infrastructure
Facilities, servers, storage, storage software, networking, firmware, hypervisor, etc.
Customers have administrator privileges for compute VMs and databases so they can configure and
run the system as they like
Customers initiate automated database update script when it is convenient for them
Can be run rolling across nodes to avoid database down time
The Exadata DB Systems enable you to leverage the power of Exadata within Oracle
Cloud Infrastructure.
Exadata DB Systems are configured with Enterprise Edition - Extreme Performance.
Exadata DB Systems support the following software releases:
Oracle Database 11g Release 2
Oracle Database 12c Release 1
Oracle Database 12c Release 2
An Exadata DB System consists of a quarter rack, half rack, or full rack of compute nodes and
storage servers, connected by a high-speed, low-latency InfiniBand network and intelligent Exadata
software. You can configure automatic backups, optimize for different workloads, and scale up the
system to meet increased demands.
The following table outlines the system resources based on your choice of configuration:
Exadata DB Systems are offered in quarter rack, half rack or full rack configurations, and each
configuration consists of compute nodes and storage servers. The compute nodes are each
configured with a Virtual Machine (VM). You have root privilege for the compute node VMs, so you
can load and run additional software on them. However, you do not have administrative access to
the Exadata infrastructure components, such as the physical compute node hardware, network
switches, power distribution units (PDUs), integrated lights-out management (ILOM) interfaces, or
the Exadata Storage Servers, which are all administered by Oracle.
You have full administrative privileges for your databases, and you can connect to your databases
by using Oracle Net Services from outside the Oracle Bare Metal Cloud Services. You are
responsible for database administration tasks such as creating tablespaces and managing database
users. You can also customize the default automated maintenance set up, and you control the
recovery process in the event of a database failure.
Data is stored redundantly across multiple storage servers across multiple Availability Domains.
Data integrity is actively monitored using checksums and corrupt data is detected and auto repaired.
Any loss of data redundancy is actively managed by recreating a copy of the data from the
redundant copy.
What you need
VCN with Internet Gateway
Object Storage Services bucket (additional purchase)
Swift password
User with tenancy-level access to object storage
Special notes
Backup traffic is contained in VCN (no Internet traffic)
Backup to Object Storage doc: https://docs.us-phoenix-
1.oraclecloud.com/Content/Database/Tasks/backingupOS.htm
Scaling within: You can scale up the number of enabled CPU cores in the system if an Exadata
DB System requires more compute node processing power. For a non-metered Exadata DB System,
you can temporarily modify the compute node processing power (bursting) or add compute node
processing power on a more permanent basis. For a metered Exadata DB System, you can simply
modify the number of enabled CPU cores.
Scaling across: Exadata DB System configurations enables you to move to a different system
configuration. This is useful when a database deployment requires:
Processing power that is beyond the capacity of the current system configuration
Storage capacity that is beyond the capacity of the current system configuration
A performance boost that can be delivered by increasing the number of available compute
nodes
A performance boost that can be delivered by increasing the number of available Exadata
Storage Servers
Scaling from a quarter rack to a half rack, or from a half rack to a full rack, requires that the data
associated with your database deployment is backed up and restored on a different Exadata DB
System, which requires planning and coordination between you and Oracle.
Bare Metal Database Systems rely on Bare Metal servers running Oracle Linux.
There are two types of Bare Metal Database Systems:
One-node database systems:
Single Bare Metal server
Locally attached NVMe storage
Recommended for test and development
Two-node RAC database systems:
Two Bare Metal servers in RAC configuration
Direct attached shared storage
Supports high performance, recommended for production
The following table outlines the storage used based on the shape and options of Bare Metal
Database System:
The shape you choose for a DB System determines its total raw storage, but other options, like 2- or
3-way mirroring and the space allocated for data files, affect the amount of usable storage on the
system.
To launch a database system, open the Console, click Database, choose your Compartment, and
then click Launch DB System. In the Launch DB System dialog enter or select the appropriate
values and click Launch. While the task of launching a database is quite simple, you should plan
your database implementations with your database architect.
The VCN resolver allows you to add a single host name in your TNS entry file on the app servers.
For example, a typical SCAN IP TNS entry would consist of 3 IP address in the file, say 10.0.0.1,
10.0.0.2 and 10.0.0.3. With the VCN Resolver, you can put a single hostname, say
myexacs.bmcloud.com and that entry would round robin to the SCAN IPs automatically.
172.16.1.0
Start by choosing
either a new database
or to create a database
from a backup.
machine BMCSDB