Oracle Exadata Oracle Exadata Cloudcustomer Configuration and Administration Guide
Oracle Exadata Oracle Exadata Cloudcustomer Configuration and Administration Guide
F40579-04
May 2021
Oracle Exadata Exadata Cloud@Customer Configuration and Administration Guide,
F40579-04
Contributors: Mark Bauer, Rhonda Day, Douglas Williams, Michael Fitch, Peter Fusek, Neil Hebert,
Terence Buencamino, Raj Ojha, Behkam Aminzadeh, Ashutosh Chetal, Robert Greene, Kris Bhanushali,
Alexander Prince Mathew, Bob Thome, Tushar Pandit, Manish Shah, Vira Goorah, Somnath Lahiri, Pablo
Sainz Albanez, Saravanan Sabapathy, Charan Chaudary Lekkalapudi, Lakshmi Sneha Kandukuri, Nayana
Vishwa, Namratha Mandya Subramanya, Kishore Sridhar, Boming Zhang, Vedika Joshi, Abhilash Gudasi,
Santosh Uttam Bobade, Ankit Mahale, Nithin Kovoor, Ranganath Srirangapatna Ramachandra, Manini
Chattopadhyay, Sheila Ray
This software and related documentation are provided under a license agreement containing restrictions on
use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your
license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license,
transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse
engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is
prohibited.
The information contained herein is subject to change without notice and is not warranted to be error-free. If
you find any errors, please report them to us in writing.
If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on
behalf of the U.S. Government, then the following notice is applicable:
U.S. GOVERNMENT END USERS: Oracle programs (including any operating system, integrated software,
any programs embedded, installed or activated on delivered hardware, and modifications of such programs)
and Oracle computer documentation or other Oracle data delivered to or accessed by U.S. Government
end users are "commercial computer software" or "commercial computer software documentation" pursuant
to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such,
the use, reproduction, duplication, release, display, disclosure, modification, preparation of derivative works,
and/or adaptation of i) Oracle programs (including any operating system, integrated software, any programs
embedded, installed or activated on delivered hardware, and modifications of such programs), ii) Oracle
computer documentation and/or iii) other Oracle data, is subject to the rights and limitations specified in the
license contained in the applicable contract. The terms governing the U.S. Government’s use of Oracle cloud
services are defined by the applicable contract for such services. No other rights are granted to the U.S.
Government.
This software or hardware is developed for general use in a variety of information management applications.
It is not developed or intended for use in any inherently dangerous applications, including applications that
may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you
shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its
safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this
software or hardware in dangerous applications.
Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of
their respective owners.
Intel and Intel Inside are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are
used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Epyc,
and the AMD logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered
trademark of The Open Group.
This software or hardware and documentation may provide access to or information about content, products,
and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly
disclaim all warranties of any kind with respect to third-party content, products, and services unless otherwise
set forth in an applicable agreement between you and Oracle. Oracle Corporation and its affiliates will not
be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content,
products, or services, except as set forth in an applicable agreement between you and Oracle.
Contents
What’s New in Oracle Exadata Cloud@Customer Gen2
What’s New in Oracle Exadata Cloud@Customer xviii
What’s New in ADB-D on Oracle Exadata Cloud@Customer xxi
iii
Network Cabling for Exadata Cloud@Customer 2-14
Exadata Cloud@Customer Gen2 Oracle Cloud Infrastructure FastConnect 2-14
Plan Your Configuration Settings on Storage 2-16
About Storage Configuration for Oracle Exadata Cloud@Customer 2-16
Allocation of Storage Space Options on Oracle Exadata Storage Servers 2-17
Allocation Proportions for DATA, RECO and SPARSE Disk Groups 2-17
Checklists for Exadata Cloud@Customer Deployments 2-18
System Components Checklist for Exadata Cloud@Customer 2-19
Data Center Room Checklist for Exadata Cloud@Customer 2-19
Data Center Environment Checklist for Oracle Exadata Cloud@Customer 2-19
Access Route Checklist for Oracle Exadata Cloud@Customer 2-20
Facility Power Checklist for Oracle Exadata Cloud@Customer 2-20
Safety Checklist for Oracle Exadata Cloud@Customer 2-21
Logistics Checklist for Exadata Cloud@Customer 2-21
Network Configuration Checklist for Oracle Exadata Cloud@Customer 2-22
Reracking Checklist for Oracle Exadata Cloud@Customer 2-23
iv
Step 1: Pre-Installation 3-17
Step 2: Onsite Installation 3-18
Step 3: Post-Installation 3-18
Using the API to Manage Exadata Cloud@Customer Infrastructure 3-18
v
Using the Console to Terminate a Backup Destination 5-7
Using the API to Manage Exadata Cloud@Customer Backup Destinations 5-7
vi
Using the Console to Manage Databases on Oracle Exadata Cloud@Customer 9-4
Using the Console to Create a Database 9-4
Using the Console to Move a Database to Another Database Home 9-7
Using the Console to Terminate a Database 9-8
Using the API to Manage Oracle Database Components 9-8
Changing the Database Passwords 9-10
vii
Customizing Which System Files Are Backed Up 11-11
Customizing Which Database Configuration Files Are Backed Up 11-12
Creating an On-Demand Backup by Using the bkup_api Utility 11-13
Recovering a Database Using Oracle Recovery Manager (RMAN) 11-15
viii
Using the Console for Patching an Exadata Cloud@Customer System 14-3
Using the Console to Perform a Patch Operation on a VM Cluster 14-3
Using the Console to Perform a Patch Operation on a Database Home 14-4
Using the Console to View Patch History 14-5
Using the Console to View the Patch History of a VM Cluster 14-5
Using the Console to View the Patch History of a Database Home 14-6
Using the Console to Move a Database to Another Home 14-6
Using the API to Patch an Exadata Cloud@Customer System 14-7
ix
17 Exadata Cloud@Customer Gen1 to Out-of-Place Cloud Upgrade to
Exadata Cloud@Customer Gen2 Infrastructure
Overview of Exadata Cloud@Customer Gen1 to Out-of-Place Cloud Upgrade to
Exadata Cloud@Customer Gen2 Infrastructure 17-1
Scope for Exadata Cloud@Customer Gen1 to Gen2 Out-of-Place Cloud Upgrade 17-2
Hardware and Software Required for Out-of-Place Cloud Upgrade to New Exadata
Cloud@Customer X8M Gen2 Infrastructure 17-3
Using Oracle Zero Downtime Migration (ZDM) to Migrate Oracle Databases 17-4
During Out-of-Place Cloud Upgrade to New Exadata Cloud@Customer X8M Gen2
Infrastructure 17-9
Post Out-of-Place Cloud Upgrade to New Exadata Cloud@Customer X8M Gen2
Infrastructure 17-10
Best Practices for Out-of-Place Cloud Upgrade to New Exadata Cloud@Customer
X8M Gen2 Infrastructure 17-10
Out-of-Place Cloud Upgrade to New Exadata Cloud@Customer X8M Gen2
Infrastructure Known Issues 17-12
x
dbaascli patch tools apply 18-17
dbaascli patch tools list 18-17
dbaascli pdb checkdb 18-18
dbaascli pdb checknode 18-18
dbaascli pdb checkpdb 18-19
dbaascli pdb close 18-19
dbaascli pdb connect_info 18-20
dbaascli pdb connect_string 18-20
dbaascli pdb create 18-21
dbaascli pdb delete 18-21
dbaascli pdb info 18-22
dbaascli pdb local_clone 18-22
dbaascli pdb open 18-23
dbaascli pdb remote_clone 18-23
dbaascli pdb rename 18-24
dbaascli pdb resize 18-24
dbaascli tde rotate masterkey 18-25
dbaascli tde status 18-25
xi
autonomous-vmclusters 20-11
autonomous-container-databases 20-12
autonomous-databases 20-13
data-guard-association 20-13
key-stores 20-14
autonomousContainerDatabaseDataguardAssociations 20-15
AutonomousDatabaseDataguardAssociation 20-16
Permissions Required for Each API Operation 20-17
xii
Collecting Oracle Diagnostics 22-9
Database is Down While Performing Downgrade to Release 11.2 or 12.1 22-10
After Database Upgrade, the Standby Database Remains in Mounted State in
Oracle Data Guard Configurations 22-10
Primary Database Fails to Downgrade to 18c in Oracle Data Guard Configurations 22-11
Deleting a Database Does Not Delete the Associated Oracle Home 22-12
xiii
Step 4: Create a Policy Statement for Database Service to Use Secret from OCI
Vault Service 25-6
Step 5: Create Key Store 25-6
Managing Your Key Store 25-7
View Key Store Details 25-7
Edit Key Store Details 25-8
Move a Key Store to Another Compartment 25-8
Delete a Key Store 25-8
View Key Store Associated Autonomous Container Database Details 25-9
Using the API to Manage Key Store 25-9
xiv
Restore from a Backup 27-10
Restore to a Point in Time 27-10
Clone an Autonomous Database 27-11
Terminate an Autonomous Database 27-13
Using the API to Manage Autonomous Databases 27-13
Monitor Performance with Autonomous Database Metrics 27-14
View Top Six Metrics for an Autonomous Database 27-14
View Aggregated Metrics for Autonomous Databases in a Compartment 27-15
Autonomous Database Metrics and Dimensions 27-16
xv
Configure Automatic Maintenance Schedule for a Data Guard Enabled
Autonomous Container Database 30-12
View the Next Scheduled Maintenance Run of a Data Guard Enabled
Autonomous Container Database 30-13
View the Maintenance History of a Data Guard Enabled Autonomous Container
Database 30-13
Immediately Patch a Data Guard Enabled Autonomous Container Database 30-14
Reschedule or Skip scheduled Maintenance for Data Guard Enabled
Autonomous Container Database 30-14
xvi
Customer Responsibilities 32-10
Enabling Additional Security Capabilities 32-10
Index
xvii
What’s New in Oracle Exadata Cloud@Customer Gen2
xviii
What’s New in Oracle Exadata Cloud@Customer Gen2
xix
What’s New in Oracle Exadata Cloud@Customer Gen2
xx
What’s New in Oracle Exadata Cloud@Customer Gen2
xxi
What’s New in Oracle Exadata Cloud@Customer Gen2
Infrastructure Patching
• Services: Database
• Release Date: May 04, 2021
ADB-Dedicated maintenance involves patching Exadata Infrastructure(EI)
Autonomous VM Cluster, and Autonomous Container Database (ACD).
Related Topics
• Patching ADB on Exadata Cloud@Customer Infrastructure
xxii
What’s New in Oracle Exadata Cloud@Customer Gen2
xxiii
What’s New in Oracle Exadata Cloud@Customer Gen2
xxiv
1
Introduction to Oracle Exadata
Cloud@Customer
Learn how you can leverage the combined capabilities of Oracle Exadata and Oracle
Cloud Infrastructure with Oracle Exadata Cloud@Customer
• About Oracle Exadata Cloud@Customer
With Oracle Exadata Cloud@Customer, you can maintain absolute control over
your data while leveraging the combined capabilities of Oracle Exadata and Oracle
Cloud Infrastructure managed by Oracle.
• Exadata Cloud Management Interfaces
Exadata Cloud@Customer provides a variety of management interfaces to fit your
use case and automation needs.
• Per-Second Billing for OCPU Usage
• System Configuration Options for Oracle Exadata Cloud@Customer
To meet the needs of your enterprise, you can select from one of the three Oracle
Exadata X8M-2, X8-2, or X7-2 System Models.
• Oracle Exadata X8M-2 System Model Specifications
Review the technical specifications of available Exadata System Shapes.
• Oracle Exadata X8-2 System Model Specifications
Review the technical specifications of available Exadata System Shapes.
• Oracle Exadata X7-2 System Model Specifications
Review the technical specifications of available Exadata System Shapes.
• Moving to Oracle Cloud Using Zero Downtime Migration
1-1
Chapter 1
Exadata Cloud Management Interfaces
1-2
Chapter 1
Exadata Cloud Management Interfaces
Note:
For more information and best practices on how these interfaces align for
various Exadata Cloud database management use cases, refer to My Oracle
Support note: Exadata Cloud API/CLI Alignment Matrix (Doc ID 2768569.1).
Related Topics
• https://support.oracle.com/epmos/faces/DocContentDisplay?id=2768569.1
1-3
Chapter 1
Exadata Cloud Management Interfaces
1-4
Chapter 1
Per-Second Billing for OCPU Usage
1-5
Chapter 1
Oracle Exadata X8M-2 System Model Specifications
• Quarter Rack: Contains two compute nodes and three Oracle Exadata Storage
Servers.
• Half Rack: Contains four compute nodes and six Oracle Exadata Storage
Servers.
• Full Rack: Contains eight compute nodes and 12 Oracle Exadata Storage
Servers.
Each Exadata System Shape is equipped with a fixed amount of memory, storage, and
network resources. All Shapes are based on Oracle Exadata X8M-2, X8-2, or X7-2
System Models.
** TB=1024^4
1-6
Chapter 1
Oracle Exadata X7-2 System Model Specifications
1-7
Chapter 1
Moving to Oracle Cloud Using Zero Downtime Migration
Oracle now offers the Zero Downtime Migration service, a quick and easy way to move
on-premises databases to Oracle Cloud Infrastructure.
Zero Downtime Migration leverages Oracle Active Data Guard to create a standby
instance of your database in an Oracle Cloud Infrastructure system. You switch over
only when you are ready, and your source database remains available as a standby.
Use the Zero Downtime Migration service to migrate databases individually or at
the fleet level. See Move to Oracle Cloud Using Zero Downtime Migration for more
information.
Related Topics
• Move to Oracle Cloud Using Zero Downtime Migration
1-8
2
Preparing for Exadata Cloud@Customer
Review the site and network requirements, and the checklists to prepare and deploy
Exadata Cloud@Customer in a customer data center.
• Site Requirements for Oracle Exadata Cloud@Customer
Review the requirements for provisioning Oracle Exadata Cloud@Customer at
your site.
• Network Requirements for Oracle Exadata Cloud@Customer
Review the network requirements for provisioning Oracle Exadata
Cloud@Customer at your site.
• IP Addresses and Subnets for Exadata Cloud@Customer
You must allocate a range of IP addresses to the administration network, and
another range of IP addresses to the InfiniBand network.
• Uplinks for Exadata Cloud@Customer
Ensure that your Exadata Cloud@Customer system meets control plane server
and compute node uplink requirements.
• Network Cabling for Exadata Cloud@Customer
You can choose to use the supplied network equipment, or you can build your own
SFP network.
• Exadata Cloud@Customer Gen2 Oracle Cloud Infrastructure FastConnect
Oracle Cloud Infrastructure FastConnect enables a private high bandwidth
connection between your on-premises data center and Oracle Cloud Infrastructure
Region.
• Plan Your Configuration Settings on Storage
The proportions that you select for your DATA, RECO, and SPARSE disk groups
profoundly affect your storage space. Review the best options for your enterprise
needs.
• Checklists for Exadata Cloud@Customer Deployments
To determine your readiness for an Exadata Cloud@Customer deployment, review
the deployment checklists.
2-1
Chapter 2
Site Requirements for Oracle Exadata Cloud@Customer
2-2
Chapter 2
Site Requirements for Oracle Exadata Cloud@Customer
If your loading dock meets the height and ramp requirements for a standard freight
carrier truck, then you can use a pallet jack to unload the rack. If the loading dock does
not meet the requirements, then you must provide a standard forklift, or other means
to unload the rack. You can also request that the rack is shipped in a truck with a lift
gate.
Use a conditioned space to remove the packaging material to reduce particles before
entering the data center. Allow enough space for unpacking it from its shipping
cartons.
Use the information in the following table to ensure that there is a clear pathway
for moving the Exadata Cloud@Customer rack. Also, the entire access route to the
installation site should be free of raised-pattern flooring that can cause vibration.
2-3
Chapter 2
Site Requirements for Oracle Exadata Cloud@Customer
The following list outlines the available PDUs for Exadata Cloud@Customer,
depending on your region. Follow each of the links to access detailed specifications for
each PDU type:
• Americas, Japan, and Taiwan
– Low-Voltage 15 kVA Single-Phase
– Low-Voltage 15 kVA Three-Phase
– Low-Voltage 22 kVA Single-Phase
– Low-Voltage 24 kVA Three-Phase
• Europe, the Middle East and Africa (EMEA), and Asia Pacific (APAC), except for
Japan and Taiwan
– High-Voltage 15 kVA Three-Phase
– High-Voltage 22 kVA Single-Phase
– High-Voltage 24 kVA Three-Phase
2-4
Chapter 2
Site Requirements for Oracle Exadata Cloud@Customer
Note:
Electrical work and installations must comply with applicable local, state, or
national electrical codes.
PDU power cords are 4 meters (13.12 feet) long, and 1–1.5 meters (3.3–4.9
feet) of the cord is routed within the rack cabinet. The installation site AC
power receptacle must be within 2 meters (6.6 feet) of the rack.
Note:
Electrical work and installations must comply with applicable local, state, or
national electrical codes.
2-5
Chapter 2
Site Requirements for Oracle Exadata Cloud@Customer
Note:
Studies have shown that temperature increases of 10 degrees Celsius (15
degrees Fahrenheit) above 20 degrees Celsius (70 degrees Fahrenheit)
reduce long-term electronics reliability by 50 percent.
2-6
Chapter 2
Network Requirements for Oracle Exadata Cloud@Customer
• The optimal range provides the greatest operating time buffer in case the air
conditioning system fails for some time.
• The optimal range avoids failures or temporary malfunctions caused by
interference from static discharges that can occur when relative humidity is too
low. Electrostatic discharge (ESD) is easily generated, and hard to dissipate in
areas of low relative humidity, such as below 35 percent. ESD becomes critical
when humidity drops below 30 percent
2-7
Chapter 2
Network Requirements for Oracle Exadata Cloud@Customer
The following list outlines the minimum network requirements to install an Exadata
Cloud@Customer system:
• Exadata Cloud@Customer Service Network: These network will be set up to
Oracle specifications and should not be modified by customer without Oracle
agreement.
– Control Plane Network
This virtual private network (VPN) connects the two control plane servers
that are located in the Exadata Cloud@Customer rack to Oracle Cloud
Infrastructure. The VPN facilitates secure customer-initiated operations
using the Oracle Cloud Infrastructure Console and APIs. It also facilitates
secure monitoring and administration of the Oracle-managed infrastructure
components in Exadata Cloud@Customer.
* Control Plane Connectivity Considerations
In order for the control plane to function, the control plane server must
be able to connect to certain Oracle Cloud Infrastructure (OCI) addresses.
You must enable TCP port 443 outbound access to 5 endpoints in a
specific OCI region as follows:
https://
wss.exacc.oci_regi
on.oci.oraclecloud
.com
Secure Tunnel Service for 443 outbound Use these URL formats,
remote Oracle operator replacing oci_region
access with your region:
https://
mgmthe1.exacc.oci_
region.oci.oraclec
loud.com
https://
mgmthe2.exacc.oci_
region.oci.oraclec
loud.com
2-8
Chapter 2
Network Requirements for Oracle Exadata Cloud@Customer
https://
wsshe.adbd-
exacc.region.oci.o
raclecloud.com
Note that the Control Plane Server must be able to establish TCP Port
443 outbound access only. While outbound connections on Port 443 must
be allowed, TCP Port 443 inbound access is not required, and it may
be desirable from a security standpoint to block inbound connections.
(Functionally, bi-directional traffic is still possible over the connection once
the secure outbound connection is established.)
The Control Plane Server requires customer DNS and NTP services to be
functional. Minimum bandwidth requirements for the control plane server
internet connection to OCI are 50/10 mbs download/upload.
Some customers have security policies requiring the use of proxies for
all internet connections to IT infrastructure. Customer HTTP proxy, for
example, passive/corporate proxy supported for the Control Plane Server
connection to OCI. Customer HTTPS, challenge proxy, and traffic inspection
are not supported.
– Administration Network
This network connects Exadata Cloud@Customer servers and switches
to the two control plane servers that are located in the Exadata
Cloud@Customer rack. It facilitates customer-initiated operations using the
Oracle Cloud Infrastructure Console and APIs. It also facilitates monitoring
and administration of the Oracle-managed infrastructure components in
Exadata Cloud@Customer.
This network is fully contained within the Exadata Cloud@Customer rack,
and does not connect to your corporate network. However, the Exadata
infrastructure is indirectly connected to your corporate network through
the control plane servers. This connection is required to provide Domain
Name System (DNS) and Network Time Protocol (NTP) services to the
Exadata infrastructure. Therefore, the IP addresses that are allocated to the
administration network must not exist elsewhere in your corporate network.
Each Oracle Database server and Exadata Storage Server has two
network interfaces connected to the administration network. One provides
management access to the server through one of the embedded Ethernet
2-9
Chapter 2
Network Requirements for Oracle Exadata Cloud@Customer
Note:
When you enable Data Guard, replication of data happens only over
the client network.
– Backup Network
This network is similar to the client access network, as it connects the Exadata
Cloud@Customer Oracle Database servers to your existing network. It can
be used for access to the database servers for various purposes, including
backups and bulk data transfers.
Like the client network, the backup network uses a pair of network interfaces
on each database server, which are connected to the customer network.
If the customer's on-premises storage (NFS or ZDLRA) is to be used
exclusively as a backup destination for databases, then no external
connectivity is required for the backup network.
Exadata Cloud@Customer also offers an Oracle-managed cloud object
storage backup destination. If Oracle's Object Storage Service is to be
leveraged as a backup destination for database backups, then ensure that
the backup network can reach the Object Storage Service through external
2-10
Chapter 2
Network Requirements for Oracle Exadata Cloud@Customer
connection. You must enable TCP port 443 outbound access for the backup
network as follows:
https://
swiftobjectstorage.r
egion.oraclecloud.co
m
Related Topics
• Object Storage Service API
• Monitoring API
• Identity and Access Management Service API
2-11
Chapter 2
IP Addresses and Subnets for Exadata Cloud@Customer
/23
/16
/22
/19
2-12
Chapter 2
Uplinks for Exadata Cloud@Customer
/28 /27
/27 /26
Backup network Maximum CIDR block prefix Maximum CIDR block prefix
length: length:
/29 /28
/28 /27
2-13
Chapter 2
Network Cabling for Exadata Cloud@Customer
same physical server. For example, you cannot use fiber for the client network and
copper for the backup network.
On Base System configurations, the options are more limited because of the physical
network interfaces that are available on each compute node. On Base Systems, you
can choose to use copper or fiber network connections only for the client network,
while the backup network uses a fiber connection.
You can also use shared network interfaces on the Base System for the client
network and the backup network, which reduces the uplink requirement to two uplinks
for each compute node. Using shared network interfaces also enables you to use
copper network connections to support both the client and backup networks on Base
System configurations. However, in general, Oracle recommends that you do not use
shared network interfaces, because sharing networks compromises the bandwidth and
availability of both networks. Shared network interfaces are not supported for Quarter,
Half, and Full Rack configurations.
2-14
Chapter 2
Exadata Cloud@Customer Gen2 Oracle Cloud Infrastructure FastConnect
ExaC@C Service
Endpoints
Customer CPE
SW/Router Object
Storage
FastConnect
Your Oracle
CPS Edge Edge OCI Telemetry
Egress Monitoring
Identity
Service
Note:
You can set up and configure Oracle Cloud Infrastructure FastConnect either
before or after deploying Exadata Cloud@Customer.
2-15
Chapter 2
Plan Your Configuration Settings on Storage
2-16
Chapter 2
Plan Your Configuration Settings on Storage
2-17
Chapter 2
Checklists for Exadata Cloud@Customer Deployments
2-18
Chapter 2
Checklists for Exadata Cloud@Customer Deployments
2-19
Chapter 2
Checklists for Exadata Cloud@Customer Deployments
– Are the perforated floor tiles each rated at 400 CFM or greater?
– Can additional perforated floor tiles be obtained if required for additional
cooling?
• Does the data center air conditioning provide sufficient front-to-back airflow?
• Is airflow adequate to prevent hot spots?
• Can the data center continuously satisfy the environmental requirements?
2-20
Chapter 2
Checklists for Exadata Cloud@Customer Deployments
• Are enough power outlets provided within 2 meters for each rack?
• Do the power outlets have appropriate socket receptacles for the planned Power
Distribution Units (PDUs)?
• Will optional ground cables be attached to the rack?
• Are the electrical circuits suitable in terms of voltage and current-carrying
capacities?
• Does the power frequency meet the equipment specifications?
• Are power outlets available for the new equipment at the designated location?
• Will system power be delivered from two separate grids?
• Is there a UPS to power the equipment?
• Are the minimum required power sources available to support the power load (kW
or kVA) for the new hardware?
2-21
Chapter 2
Checklists for Exadata Cloud@Customer Deployments
2-22
Chapter 2
Checklists for Exadata Cloud@Customer Deployments
Note:
Answer yes, no, not applicable, or add your comments. Or, let the site survey team to
fill in the requested information.
• Have you purchased the Oracle Reracking Service?
• Is there a cart capable of carrying the weight of the servers to move the
components and associated cabling from the supplied rack to the rack that you
supply?
• Is the target rack empty?
• Attach pictures of the target rack (inside and outside).
• Does the target rack meet the following requirements?
– Height: 42 RU
– Width: 600 mm (23.62 inches)
– Depth: 1112 mm (43.78 inches) without front and rear doors
If the rack is less than 42 RU tall, then the rack must be at least 30 RU tall, and
you must provide compatible PDUs to install in the target rack.
• Is the distance between the front and rear mounting planes between the minimum
of 610 mm and the maximum 915 mm (24–36 inches)?
• Is the clearance depth in the front of the front mounting plane (distance to the front
cabinet door) at least 25.4 mm (1 inch)?
• Does the target rack meet the following minimum load capacity?
– 19 kg (41.89 lb) per RU
– 785 kg (1730.63 lb) total
• Is the rack a four-post rack (mounting at both front and rear)?
2-23
Chapter 2
Checklists for Exadata Cloud@Customer Deployments
Note:
Two-post racks are not compatible.
• Does the target rack's horizontal opening and unit vertical pitch conform to
ANSI/EIA 310-D-1992 or IEC 60297 standards?
• Does the target rack have RETMA rail support?
Note:
Oracle Exadata rack requires 19 inches (483 mm) for RETMA rail
spacing width. The minimum rack width of 600 mm (23.63 inches) is
recommended to accommodate the PDU and cable harnesses on the
side. If the rack is less than 600 mm wide, then it must have additional
depth to accommodate mounting behind the server cable management
arms.
2-24
3
Provisioning Exadata Cloud@Customer
Systems
Learn how to provision an Exadata Cloud@Customer system.
3-1
Chapter 3
Required IAM Policy for Provisioning Servers
Caution:
3-2
Chapter 3
Prerequisites for Provisioning Oracle Exadata Cloud@Customer Servers
3-3
Chapter 3
Using the Console to Provision Oracle Exadata Cloud@Customer
3-4
Chapter 3
Using the Console to Provision Oracle Exadata Cloud@Customer
– Base System: includes two compute nodes and three Oracle Exadata
Storage Servers. A Base System is an entry-level configuration.
Compared to other configurations, a Base System contains Oracle
Exadata Storage Servers with significantly less storage capacity, and
compute nodes with significantly less memory and processing power.
– Quarter Rack: includes two compute nodes and three Oracle Exadata
Storage Servers.
– Half Rack: includes four compute nodes and six Oracle Exadata Storage
Servers.
– Full Rack: includes eight compute nodes and 12 Oracle Exadata Storage
Servers.
• Configure the cloud control plane network
Each Oracle Exadata Cloud@Customer system contains two control plane
servers, which enable connectivity to Oracle Cloud Infrastructure. The control
plane servers are connected to the control plane network, which is a subnet on
your corporate network. The following settings define the network parameters:
– Control Plane Server 1 IP Address: Provide the IP address for the first
control plane server. This IP address is for the network interface that
connects the first control plane server to your corporate network using the
control plane network.
– Control Plane Server 2 IP Address: Provide the IP address for the
second control plane server. This IP is address for the network interface
that connects the second control plane server to your corporate network
using the control plane network.
– Netmask: Specify the IP netmask for the control plane network.
– Gateway: Specify the IP address of the control plane network gateway.
– HTTP Proxy: (Optional) You can choose to use this field to specify your
corporate HTTP proxy. The expected format is as follows, where server
is the server name, domain is the domain name, and port is the assigned
port:
http://server.domain:port
For example:
http://proxy.example.com:80
For enhanced security, when possible, Oracle recommends that you use
an HTTP proxy.
• Configure the Oracle Exadata system networks
Each Oracle Exadata Cloud@Customer system contains two system
networks, which are not connected to your corporate network. The following
settings define IP address allocations for these networks:
– Administration Network CIDR Block: Specifies the IP address range
for the administration network using CIDR notation. The administration
network provides connectivity that enables Oracle to administer the
Exadata system components, such as the Exadata compute servers,
3-5
Chapter 3
Using the Console to Provision Oracle Exadata Cloud@Customer
storage servers, network switches, and power distribution units. You can
accept the suggested default, or specify a custom value.
The maximum CIDR block prefix length is /23, which defines the smallest
block of IP addresses that are required for the network. To allow for
possible future expansion within Exadata Cloud@Customer, a smaller
CIDR block prefix length is recommended, which reserves more IP
addresses for the network. The minimum CIDR block prefix length is /16.
Ensure that the IP address range does not conflict with other hosts your
corporate network, and does not overlap with the InfiniBand network CIDR
block.
• InfiniBand Network CIDR Block: Specifies the IP address range for the
Exadata InfiniBand network using CIDR notation. The Exadata InfiniBand
network provides the high-speed low-latency interconnect used by Exadata
software for internal communications between various system components.
You can accept the suggested default, or specify a custom value.
The maximum CIDR block prefix length is /22, which defines the smallest
block of IP addresses that are required for the network. To allow for possible
future expansion within Exadata Cloud@Customer, a smaller CIDR block
prefix length is recommended, which reserves more IP addresses for the
network. The minimum CIDR block prefix length is /19.
Ensure that the IP address range does not conflict with other hosts your
corporate network, and does not overlap with the administration network CIDR
block.
• Configure DNS and NTP services
Each Exadata Cloud@Customer system requires access to Domain Names
System (DNS) and Network Time Protocol (NTP) services. The following
settings specify the servers that provide these services to the Exadata
infrastructure:
– DNS Servers: Provide the IP address of a DNS server that is accessible
using the control plane network. You may specify up to three DNS servers.
– NTP Servers: Provide the IP address of an NTP server that is accessible
using the control plane network. You may specify up to three NTP servers.
– Time Zone: The default time zone for the Exadata Infrastructure is UTC,
but you can specify a different time zone. The time zone options are those
supported in both the Java.util.TimeZone class and the Oracle Linux
operating system.
Note:
If you want to set a time zone other than UTC or the browser-
detected time zone, then select the Select another time
zone option, select a Region or country, and then select the
corresponding Time zone.
If you do not see the region or country you want, then select
Miscellaneous, and then select an appropriate Time zone.
3-6
Chapter 3
Using the Console to Provision Oracle Exadata Cloud@Customer
3-7
Chapter 3
Using the Console to Provision Oracle Exadata Cloud@Customer
http://server.domain:port
For example:
http://proxy.example.com:80
3-8
Chapter 3
Using the Console to Provision Oracle Exadata Cloud@Customer
For enhanced security, when possible, Oracle recommends that you use
an HTTP proxy.
b. Configure the Exadata system networks
Each Oracle Exadata Cloud@Customer system contains two system
networks, which are not connected to your corporate network. The following
settings define IP address allocations for these networks:
• Administration Network CIDR Block: Specifies the IP address range
for the administration network using CIDR notation. The administration
network provides connectivity that enables Oracle to administer the
Exadata system components, such as the Exadata compute servers,
storage servers, network switches, and power distribution units.
The maximum CIDR block prefix length is /23, which defines the smallest
block of IP addresses that are required for the network. To allow for
possible future expansion within Oracle Exadata Cloud@Customer, a
smaller CIDR block prefix length is recommended, which reserves more IP
addresses for the network. The minimum CIDR block prefix length is /16.
Ensure that the IP address range does not conflict with other hosts your
corporate network, and does not overlap with the InfiniBand network CIDR
block.
• InfiniBand Network CIDR Block: Specifies the IP address range for
the Exadata InfiniBand network using CIDR notation. The Exadata
InfiniBand network provides the high-speed low-latency interconnect used
by Exadata software for internal communications between various system
components.
The maximum CIDR block prefix length is /22, which defines the smallest
block of IP addresses that are required for the network. To allow for
possible future expansion within Oracle Exadata Cloud@Customer, a
smaller CIDR block prefix length is recommended, which reserves more IP
addresses for the network. The minimum CIDR block prefix length is /19.
Ensure that the IP address range does not conflict with other hosts your
corporate network, and does not overlap with the administration network
CIDR block.
c. Configure DNS and NTP services
Each Oracle Exadata Cloud@Customer system requires access to Domain
Names System (DNS) and Network Time Protocol (NTP) services. The
following settings specify the servers that provide these services to the
Exadata infrastructure:
• DNS Servers: Provide the IP address of a DNS server that is accessible
using the control plane network. You can specify up to three DNS servers.
• NTP Servers: Provide the IP address of an NTP server that is accessible
using the control plane network. You may specify up to three NTP servers.
• Time zone: The default time zone for the Exadata Infrastructure is UTC,
but you can specify a different time zone. The time zone options are those
supported in both the Java.util.TimeZone class and the Oracle Linux
operating system.
3-9
Chapter 3
Using the Console to Provision Oracle Exadata Cloud@Customer
Note:
If you want to set a time zone other than UTC or the browser-
detected time zone, then select the Select another time
zone option, select a Region or country, and then select the
corresponding Time zone.
If you do not see the region or country you want, then select
Miscellaneous, and then select an appropriate Time zone.
3-10
Chapter 3
Using the Console to Provision Oracle Exadata Cloud@Customer
3-11
Chapter 3
Using the Console to Provision Oracle Exadata Cloud@Customer
3-12
Chapter 3
Using the Console to Provision Oracle Exadata Cloud@Customer
After Oracle has flagged the Oracle Exadata infrastructure, delete the Exadata
infrastructure by using the following process:
1. Open the navigation menu. Under Oracle Databases, click Exadata
Cloud@Customer.
2. Select Region and Compartment, and provide the region and compartment that
contains the Oracle Exadata infrastructure that you want to delete.
3. Click Exadata Infrastructure.
4. Click the name of the Oracle Exadata infrastructure that you want to delete.
The Infrastructure Details page displays information about the selected Oracle
Exadata infrastructure.
5. Click Delete.
6. In the resulting dialog, enter the Oracle Exadata infrastructure name and click
Delete Exadata Infrastructure to confirm the action.
3-13
Chapter 3
Using the Console to Provision Oracle Exadata Cloud@Customer
3-14
Chapter 3
Using the Console to Provision Oracle Exadata Cloud@Customer
3-15
Chapter 3
Oracle Exadata Cloud@Customer Deployment Assistant
2. Select Region and Compartment, and provide the region and compartment
that contains the Oracle Exadata infrastructure for which you want to remove a
secondary contact.
3. Click Exadata Infrastructure.
4. Click the name of the Oracle Exadata infrastructure for which you want to remove
a secondary contact.
The Infrastructure Details page displays information about the selected Oracle
Exadata infrastructure.
5. Click Manage Contacts.
6. In the Manage Exadata Infrastructure Contacts window, click the actions button,
and then select Remove.
7. In the Remove Infrastructure Contact dialog, click Remove.
3-16
Chapter 3
Oracle Exadata Cloud@Customer Deployment Assistant
• Define the settings for the rack, such as network configuration and backup
method.
• Download the Oracle Exadata Cloud@Customer infrastructure configuration file.
During deployment, if you find any discrepancies at any stage, then click Close and
complete later to exit Oracle Exadata Cloud@Customer Deployment Assistant. You
will lose all of your settings and you will have to start afresh the next time.
Step 1: Pre-Installation
Create Exadata Cloud@Customer infrastructure, VM cluster network, and download
the infrastructure configuration file before your engineered system arrives at your
premises.
1. Create Oracle Exadata Cloud@Customer infrastructure.
For more information and instructions, see Using the Console to Create
Infrastructure.
2. Create VM cluster network.
3-17
Chapter 3
Using the API to Manage Exadata Cloud@Customer Infrastructure
For more information and instructions, see Using the Console to Create a VM
Cluster Network.
3. Download the Oracle Exadata Cloud@Customer configuration file.
For more information and instructions, see Using the Console to Download a File
Containing Configuration Data.
Step 3: Post-Installation
Create a VM cluster, install Oracle Database, and validate your installation before
performing any administrative tasks.
1. Create VM cluster.
For more information and instructions, see Using the Console to Create a VM
Cluster.
2. Create Oracle Database.
For more information and instructions, see Using the Console to Create a
Database.
3-18
Chapter 3
Using the API to Manage Exadata Cloud@Customer Infrastructure
For information about using the API and signing requests, see "REST APIs" and
"Security Credentials". For information about SDKs, see "Software Development Kits
and Command Line Interface".
Use these API operations to manage Exadata Cloud@Customer infrastructure:
• ActivateExadataInfrastructure
• CreateExadataInfrastructure
• DeleteExadataInfrastructure
• DownloadExadataInfrastructureConfigFile
• GenerateRecommendedVmClusterNetwork
• GetExadataInfrastructure
• ListExadataInfrastructure
• UpdateExadataInfrastructure
Related Topics
• REST APIs
• Security Credentials
• Software Development Kits and Command Line Interface
• ActivateExadataInfrastructure
• CreateExadataInfrastructure
• DeleteExadataInfrastructure
• DownloadExadataInfrastructureConfigFile
• GenerateRecommendedVmClusterNetwork
• GetExadataInfrastructure
• ListExadataInfrastructure
• UpdateExadataInfrastructure
3-19
4
Managing VM Clusters on Exadata
Cloud@Customer
Learn to manage virtual machine (VM) clusters on Exadata Cloud@Customer.
• About Managing VM Clusters on Exadata Cloud@Customer
The VM cluster provides a link between your Exadata Cloud@Customer
infrastructure and Oracle Database.
• Required IAM Policy for Managing VM Clusters
Review the identity access management (IAM) policy for managing virtual machine
(VM) clusters on Oracle Exadata Cloud@Customer Systems.
• Prerequisites for VM Clusters on Exadata Cloud@Customer
To connect to the VM cluster compute node, you use an SSH public key.
• Using the Console for VM Clusters on Exadata Cloud@Customer
Learn how to use the console to create, edit, download a configuration
file, validate, and terminate your infrastructure network, and manage your
infrastructure for Oracle Exadata Cloud@Customer.
• Using the API to Manage Exadata Cloud@Customer VM Clusters
Review the list of API calls to manage your Exadata Cloud@Customer VM cluster
networks and VM clusters.
• Introduction to Scale Up or Scale Down Operations
With the Multiple VMs per Exadata system (MultiVM) feature release, you can
scale up or scale down your VM cluster resources.
4-1
Chapter 4
Required IAM Policy for Managing VM Clusters
Note:
Avoid entering confidential information when assigning descriptions, tags,
or friendly names to your cloud resources through the Oracle Cloud
Infrastructure Console, API, or CLI.
4-2
Chapter 4
Using the Console for VM Clusters on Exadata Cloud@Customer
The public key is in OpenSSH format, from the key pair that you plan to use for
connecting to the VM cluster compute nodes through SSH. The following shows an
example of a public key, which is abbreviated for readability.
ssh-rsa AAAAB3NzaC1yc2EAAAABJQAA....lo/gKMLVM2xzc1xJr/
Hc26biw3TXWGEakrK1OQ== rsa-key-20160304
Related Topics
• Managing Key Pairs on Linux Instances
4-3
Chapter 4
Using the Console for VM Clusters on Exadata Cloud@Customer
Note:
The values "0" and "4095" are reserved and cannot be entered.
• CIDR Block: Using CIDR notation, provide the IP address range for the
client network.
The following table specifies the maximum and recommended CIDR block
prefix lengths for each Exadata system shape. The maximum CIDR block
prefix length defines the smallest block of IP addresses that are required
for the network. To allow for possible future expansion within Exadata
Cloud@Customer, a smaller CIDR block prefix length is recommended,
which reserves more IP addresses for the network.
4-4
Chapter 4
Using the Console for VM Clusters on Exadata Cloud@Customer
Note:
The values "0" and "4095" are reserved, and cannot be entered.
• CIDR Block: Using CIDR notation, provide the IP address range for the
backup network.
The following table specifies the maximum and recommended CIDR block
prefix lengths for each Exadata system shape. The maximum CIDR block
prefix length defines the smallest block of IP addresses that are required
for the network. To allow for possible future expansion within Exadata
Cloud@Customer, a smaller CIDR block prefix length is recommended,
which reserves more IP addresses for the network.
4-5
Chapter 4
Using the Console for VM Clusters on Exadata Cloud@Customer
4-6
Chapter 4
Using the Console for VM Clusters on Exadata Cloud@Customer
The VM Cluster Network Details page displays information about the selected VM
cluster network.
6. Click Edit VM Cluster Network.
7. Use the Edit dialog to edit the VM cluster network attributes:
a. Client Network
The client network is the primary channel for application connectivity to
Exadata Cloud@Customer resources. You can edit the following client
network settings:
• VLAN ID: Provide a virtual LAN identifier (VLAN ID) for the client network
between 1 and 4094, inclusive. To specify no VLAN tagging, enter "1".
(This is equivalent to a "NULL" VLAN ID tag value.)
Note:
The values "0" and "4095" are reserved and cannot be entered.
Note:
The values "0" and "4095" are reserved and cannot be entered.
4-7
Chapter 4
Using the Console for VM Clusters on Exadata Cloud@Customer
4-8
Chapter 4
Using the Console for VM Clusters on Exadata Cloud@Customer
The VM Cluster Network Details page displays information about the selected VM
cluster network.
6. Click Validate VM Cluster Network.
Validation performs a series of automated checks on the VM cluster network. The
Validate VM Cluster Network button is only available if the VM cluster network
requires validation.
7. In the resulting dialog, click Validate to confirm the action.
After successful validation, the state of the VM cluster network changes to
Validated and the VM cluster network is ready to use. If validation fails for
any reason, examine the error message and resolve the issue before repeating
validation.
4-9
Chapter 4
Using the Console for VM Clusters on Exadata Cloud@Customer
3. Click VM Clusters.
4. Click Create VM Cluster.
5. Provide the requested information in the Create VM Cluster page:
a. Choose a compartment: From the list of available compartments, choose the
compartment that you want to contain the VM cluster.
b. Provide the display name: The display name is a user-friendly name that
you can use to identify the VM cluster. The name doesn't need to be unique
because an Oracle Cloud Identifier (OCID) uniquely identifies the VM cluster.
c. Select Exadata Cloud@Customer Infrastructure: From the list, choose the
Exadata infrastructure to host the VM cluster. You are not able to create a VM
cluster without available and active Exadata infrastructure.
d. Select a VM Cluster Network: From the list, choose a VM cluster network
definition to use for the VM cluster. You must have an available and validated
VM cluster network before you can create a VM cluster.
e. Choose the Oracle Grid Infrastructure version:From the list, choose the of
Oracle Grid Infrastructure release that you want to install on the VM cluster.
The Oracle Grid Infrastructure release determines the Oracle Database
releases that can be supported on the VM cluster. You cannot run an Oracle
Database release that is later than the Oracle Grid Infrastructure software
release.
f. Specify the OCPU count per VM: Specify the OCPU count for each
individual VM. The minimum value is 2 OCPUs per VM (for a live VM
condition), unless you are specifying zero OCPUs (for a shut down VM
condition).
If you specify a value of zero, then the VM cluster compute nodes are all
shut down at the end of the cluster creation process. In this case, you can
later start the compute nodes by scaling the OCPU resources. See Using the
Console to Scale the Resources on a VM Cluster.
The value for OCPU count for the whole VM Cluster will be calculated
automatically based upon the per VM OCPU count you have specified and
the number of physical Database Servers configured for the system. There is
one VM created on each physical Database Server available.
OCPU: An Oracle Compute Unit (OCPU) provides CPU capacity equivalent of
one physical core of an Intel Xeon processor with hyper threading enabled.
Each OCPU corresponds to two hardware execution threads, known as
vCPUs.
See, Oracle Platform as a Service and Infrastructure as a Service – Public
Cloud Service DescriptionsMetered & Non-Metered.
g. Requested OCPU count for the VM Cluster: Displays the total number of
CPU cores allocated to the VM cluster based on the value you specified in the
Specify the OCPU count per VM field.
h. Specify the memory per VM (GB): Specify the memory for each individual
VM. The value must be a multiple of 1 GB and is limited by the available
memory on the Exadata infrastructure.
i. Requested memory for the VM Cluster (GB): Displays the total amount of
memory allocated to the VM cluster based on the value you specified in the
Specify the memory per VM (GB) field.
4-10
Chapter 4
Using the Console for VM Clusters on Exadata Cloud@Customer
j. Specify the local file system size per VM (GB): Specify the size for each
individual VM. The value must be a multiple of 1 GB and is limited by the
available size of the file system on the X8-2 and X7-2 infrastructures.
Note that the minimum size of local system storage must be 60 GB. Each
time when you create a new VM cluster, the space remaining out of the total
available space is utilized for the new VM cluster.
For more information and instructions to specify the size for each individual
VM, see Introduction to Scale Up or Scale Down Operations.
k. Reserved local storage per VM (GB): Displays the size reserved internally
for root file systems, Oracle Grid Infrastructure Homes, and diagnostic logs.
l. Configure the Exadata Storage: The following settings define how the
Exadata storage is configured for use with the VM cluster. These settings
cannot be changed after creating the VM cluster. See also Storage
Configuration.
• Specify Usable Exadata Storage: Specify the size for each individual
VM. The minimum recommended size is 2 TB.
• Allocate Storage for Exadata Snapshots: Check this option to create
a sparse disk group, which is required to support Exadata snapshot
functionality. Exadata snapshots enable space-efficient clones of Oracle
databases that can be created and destroyed very quickly and easily.
• Allocate Storage for Local Backups: Check this option to configure
the Exadata storage to enable local database backups. If you select this
option, more space is allocated to the RECO disk group to accommodate
the backups. If you do not select this option, you cannot use local Exadata
storage as a backup destination for any databases in the VM cluster.
m. Add SSH Key: Specify the public key portion of an SSH key pair that you
want to use to access the VM cluster compute nodes. You can upload a file
containing the key, or paste the SSH key string.
To provide multiple keys, upload multiple key files or paste each key into
a separate field. For pasted keys, ensure that each key is on a single,
continuous line. The length of the combined keys cannot exceed 10,000
characters.
n. Choose a license type:
• Bring Your Own License (BYOL): Select this option if your organization
already owns Oracle Database software licenses that you want to use on
the VM cluster.
• License Included: Select this option to subscribe to Oracle Database
software licenses as part of Exadata Cloud@Customer.
o. Show Advanced Options:
• Time zone: The default time zone for the Exadata Infrastructure is UTC,
but you can specify a different time zone. The time zone options are those
supported in both the Java.util.TimeZone class and the Oracle Linux
operating system.
4-11
Chapter 4
Using the Console for VM Clusters on Exadata Cloud@Customer
Note:
If you want to set a time zone other than UTC or the browser-
detected time zone, then select the Select another time
zone option, select a Region or country, and then select the
corresponding Time zone.
If you do not see the region or country you want, then select
Miscellaneous, and then select an appropriate Time zone.
• Tags: Optionally, you can apply tags. If you have permissions to create
a resource, you also have permissions to apply free-form tags to that
resource. To apply a defined tag, you must have permissions to use the
tag namespace. For more information about tagging, see Resource Tags.
If you are not sure if you should apply tags, skip this option (you can apply
tags later) or ask your administrator.
6. Click Create VM Cluster.
The VM Cluster Details page is now displayed. While the creation process is
running, the state of the VM cluster is Pending. When the VM cluster creation
process completes, the state of the VM cluster changes to Available.
Related Topics
• Plan Your Configuration Settings on Storage
• Using the Console to Scale the Resources on a VM Cluster
Starting in Exadata Cloud@Customer Gen2, you can scale up or down multiple
resources at the same time. You can also scale up or down resources one at a
time.
• Resource Tags
• Oracle PaaS/IaaS Cloud Service Description documents
• Oracle Platform as a Service and Infrastructure as a Service – Public Cloud
Service DescriptionsMetered & Non-Metered
4-12
Chapter 4
Using the Console for VM Clusters on Exadata Cloud@Customer
• Paste SSH keys: Select this option to paste the SSH key string.
To provide multiple keys, click Another SSH Key. For pasted keys, ensure
that each key is on a single, continuous line. The length of the combined keys
cannot exceed 10,000 characters.
7. Click Save Changes.
Related Topics
• Managing Key Pairs on Linux Instances
4-13
Chapter 4
Using the Console for VM Clusters on Exadata Cloud@Customer
If you set the OCPU Count to zero, then the VM cluster compute nodes are
all shut down. If you change from a zero setting, then the VM cluster compute
nodes are all started. Otherwise, modifying the number of enabled CPU cores
is an online operation, and compute nodes are not rebooted because of this
operation. See also System Configuration.
Note:
If you have explicitly set the CPU_COUNT database initialization
parameter, that setting is not affected by modifying the number of
CPU cores that are allocated to the VM cluster. Therefore, if you
have enabled the Oracle Database instance caging feature, the
database instance does not use extra CPU cores until you alter
the CPU_COUNT setting. If CPU_COUNT is set to 0 (the default setting),
then Oracle Database continuously monitors the number of CPUs
reported by the operating system and uses the current count.
• Memory:
Specify the memory for each individual VM. The value must be a multiple of 1
GB and is limited by the available memory on the Exadata infrastructure.
When you scale up or down the memory, the associated compute nodes are
rebooted in a rolling manner one compute node at a time to minimize the
impact on the VM cluster.
• Local file system size:
Specify the size for each individual VM. The value must be a multiple of 1
GB and is limited by the available size of the file system on the Exadata
infrastructure.
When you scale up or down the local file system size, the associated compute
nodes are rebooted in a rolling manner one compute node at a time to
minimize the impact on the VM cluster.
Reserved local storage per VM (GB): Displays the size reserved internally
for root file systems, Oracle Grid Infrastructure Homes, and diagnostic logs.
• Usable Exadata storage size:
Specify the total amount of Exadata storage that is allocated to the VM cluster.
This storage is allocated evenly from all of the Exadata Storage Servers. The
minimum recommended size is 2 TB.
You may reduce the Exadata storage allocation for a VM cluster. However, you
must ensure that the new amount covers the existing contents, and you should
also allow for anticipated data growth.
Note:
When you downsize, the new size must be at least 15% more than
the currently used size.
4-14
Chapter 4
Using the Console for VM Clusters on Exadata Cloud@Customer
Related Topics
• System Configuration Options for Oracle Exadata Cloud@Customer
4-15
Chapter 4
Using the Console for VM Clusters on Exadata Cloud@Customer
The color of the icon and the associated text it indicates its status.
• Available: Green icon. The node is operational.
• Starting: Yellow icon. The node is starting because of a start or reboot action
in the Console or API.
• Stopping: Yellow icon. The node is stopping because of a stop or reboot
action in the Console or API.
• Stopped: Yellow icon. The node is stopped.
• Failed: Red icon. An error condition prevents the continued operation of the
compute node.
4-16
Chapter 4
Using the API to Manage Exadata Cloud@Customer VM Clusters
3. Click VM Clusters.
4. Click the name of the VM cluster that you want to move.
The VM Cluster Details page displays information about the selected VM cluster.
5. Click Move Resource.
6. In the resulting dialog, choose the new compartment for the VM cluster, and click
Move Resource.
4-17
Chapter 4
Introduction to Scale Up or Scale Down Operations
• ValidateVmClusterNetwork
VM clusters:
• CreateVmCluster
• DeleteVmCluster
• GetVmCluster
• ListVmCluster
• UpdateVmCluster
4-18
Chapter 4
Introduction to Scale Up or Scale Down Operations
You can scale up or scale down the memory, local disk size (/u02), ASM Storage,
and CPUs. Scaling up or down of these resources requires thorough auditing of
existing usage and capacity management by the customer DB administrator. Review
the existing usage to avoid failures during or after a scale down operation. While
scaling up, consider how much of these resources are left for the next VM cluster you
are planning to create. Exadata Cloud@Customer Cloud tooling calculates the current
usage of memory, local disk, and ASM storage in the VM cluster, adds headroom to
it, and arrives at a "minimum" value below which you cannot scale down, and expects
that you specify the value below this minimum value.
Note:
For memory and /u02 scale up or scale down operations, if the difference
between the current value and the new value is less than 2%, then no
change will be made to that VM. This is because memory change involves
rebooting the VM, and /u02 change involves bringing down the Oracle Grid
Infrastructure stack and un-mounting /u02. Productions customers will not
resize for such a small increase or decrease, and hence such requests are a
no-op.
cat input.json
{
"object": "db",
"action": "get",
"operation": "precheck_memory_resize",
"params": {
"dbname": "grid",
"new_mem_size" : "30 gb",
"infofile": "/tmp/result.json"
},
"outputfile": "/tmp/info.out",
"FLAGS": ""
}
dbaasapi -i input.json
cat /tmp/result.json
{
"is_new_mem_sz_allowed" : 0,
"min_req_mem" : 167
}
4-19
Chapter 4
Introduction to Scale Up or Scale Down Operations
The result indicates that 30 GB is not sufficient and the minimum required memory
is 167 GB, and that is the maximum you can reshape down to. On a safer side, you
must choose a value greater than 167 GB, as there could be fluctuations of that order
between this calculation and the next reshape attempt.
/u01/app/19.0.0.0/grid/bin/asmcmd lsdg
ASMCMD>
State Type Rebal Sector Logical_Sector Block AU Total_MB
Free_MB Req_mir_free_MB Usable_file_MB Offline_disks
Voting_files Name
MOUNTED HIGH N 512 512 4096 4194304
12591936 10426224 1399104 3009040
0 Y DATAC5/
MOUNTED HIGH N 512 512 4096 4194304
3135456 3036336 348384 895984
0 N RECOC5/
ASMCMD>
• With SPARSE:
/u01/app/19.0.0.0/grid/bin/asmcmd lsdg
ASMCMD>
State Type Rebal Sector Logical_Sector Block AU
Total_MB Free_MB Req_mir_free_MB Usable_file_MB
Offline_disks Voting_files Name
MOUNTED HIGH N 512 512 4096 4194304
12591936 10426224 1399104 3009040
0 Y DATAC5/
MOUNTED HIGH N 512 512 4096 4194304
3135456 3036336 348384 895984
4-20
Chapter 4
Introduction to Scale Up or Scale Down Operations
0 N RECOC5/
MOUNTED HIGH N 512 512 4096 4194304
31354560 31354500 3483840 8959840
0 N SPRC5/
ASMCMD>
Note:
The listed values of all attributes for SPARSE diskgroup
(SPRC5) present the virtual size. In Exadata DB Systems
and Exadata Cloud@Customer, we use the ratio of 1:10 for
physicalSize:virtualSize. Hence, for all purposes of our calculation
we must use 1/10th of the values displayed above in case of SPARSE
for those attributes.
Estimating How Much Local Storage You Can Provision to Your VMs
4-21
Chapter 4
Introduction to Scale Up or Scale Down Operations
For an X8-2, to get the max space available for the nth VM, take the number in the
table above and subtract anything previously allocated for /u02 to the other VMs. So if
you allocated 60 GB to VM1, 70 GB to VM2, 80 GB to VM3, 60 GB to VM4 (total 270
GB) in an X8-2, the maximum available for VM 5 would be 352 - 270 = 82 GB.
In ExaCC Gen 2, we require a minimum of 60 GB per /u02, so with that minimum size
there is a maximum of 5 VMs in X8-2 and 6 VMs in X7-2.
X8M-2 Systems
The maximum number of VMs for an X8M-2 will be 8, regardless of whether there is
local disk space or other resources available.
For an X8M-2 system, the fixed consumption per VM is 160 GB.
Total space available to all VMs on an ExaCC X8M databases node is 2500 GB.
Although there is 2500 GB per database node, with a single VM, you can allocate a
maximum of 900 GB local storage. Similarly, for the second VM, there is 1800 GB local
storage available given the max limit of 900 GB per VM. With the third VM, the amount
of space available is 2500 - (160Gb * 3) = 2020 GB. And so on for 4 and more VMs.
4-22
Chapter 4
Introduction to Scale Up or Scale Down Operations
4-23
5
Managing Backup Destinations for Exadata
Cloud@Customer
Learn to manage backup destinations for Exadata Cloud@Customer on Oracle Zero
Data Loss Recovery Appliance or Network File System (NFS).
• About Managing Backup Destinations for Exadata Cloud@Customer
For backups, you can either use the Exadata Cloud@Customer backup facility, or
you can configure a backup location on a location you manage.
• Required IAM Policy for Backup Destinations
Review the identity access management (IAM) policy for backup destinations for
Oracle Exadata Cloud@Customer Systems.
• Prerequisites for Backup Destinations for Exadata Cloud@Customer
To configure backup destinations on a Zero Data Loss Recovery Appliance
location, or an NFS backup location, review the prerequisites.
• Using the Console for Backup Destinations for Exadata Cloud@Customer
Learn how to use the console to create, edit, move, and terminate a backup
destination for your infrastructure for Oracle Exadata Cloud@Customer.
• Using the API to Manage Exadata Cloud@Customer Backup Destinations
Review the list of API calls to manage your Exadata Cloud@Customer backup
destinations.
5-1
Chapter 5
Required IAM Policy for Backup Destinations
Note:
Avoid entering confidential information when assigning descriptions, tags,
or friendly names to your cloud resources through the Oracle Cloud
Infrastructure Console, API, or CLI.
Related Topics
• Zero Data Loss Recovery Appliance
• Managing Oracle Databases on Oracle Exadata Cloud@Customer
• Managing Database Backup and Recovery on Oracle Exadata Cloud@Customer
5-2
Chapter 5
Prerequisites for Backup Destinations for Exadata Cloud@Customer
5-3
Chapter 5
Using the Console for Backup Destinations for Exadata Cloud@Customer
Note:
You can also set OCI Object Store as a backup destination.
However, you cannot set it from this screen. You can configure OCI
Object Store as a backup destination when creating a database. For
more information, see Backup Destination Type in Using the Console
to Create a Database.
5-4
Chapter 5
Using the Console for Backup Destinations for Exadata Cloud@Customer
5-5
Chapter 5
Using the Console for Backup Destinations for Exadata Cloud@Customer
4. Click the name of the backup destination that you want to edit.
The Backup Destination Details page displays information about the selected
backup destination.
5. Click Edit.
6. Use the Edit Backup Destination dialog to edit the backup destination attributes:
Note:
You cannot edit a Backup Destination if there is already a database
attached to it.
• If you are editing a Zero Data Loss Recovery Appliance backup destination:
– Provide the Recovery Appliance connection string: Specify the Oracle
Net Services connection string that connects to the Recovery Appliance.
This information is typically provided by the Recovery Appliance
administrator.
– Provide the Virtual Private Catalog (VPC) Users: Provide a VPC user
name for connecting to the Recovery Appliance. You can specify multiple
VPC user names in case you want to use the Recovery Appliance as
a backup destination for multiple databases. This information is typically
provided by the Recovery Appliance administrator.
• If you are editing an NFS backup destination:
– Self-mount for non-autonomous databases:
Provide the local NFS mount point path: Specify the local directory path
on each VM cluster node where the NFS server location is mounted. The
local directory path and the NFS server location must each be the same
across all of the VM cluster nodes.
– Auto-mount for Autonomous Databases:
Use this destination for Autonomous Databases:
* NFS server: Specify the IP address of the NFS server. Optionally, you
can specify up to four IP addresses.
* NFS export share: Specify the directory path where the exported file
system is mounted.
7. Click Save Changes.
5-6
Chapter 5
Using the API to Manage Exadata Cloud@Customer Backup Destinations
When you move a backup destination, the compartment change does not affect other
associated resources. These other resources, such as the associated databases,
remain in their current compartment.
1. Open the navigation menu. Under Oracle Databases, click Exadata
Cloud@Customer.
2. Choose the Region and Compartment that contains the backup destination that
you want to move.
3. Click Backup Destinations.
4. Click the name of the backup destination that you want to move.
The Backup Destination Details page displays information about the selected
backup destination.
5. Click Move Resource.
6. In the resulting dialog, choose the new compartment for the backup destination
and click Move Resource.
5-7
Chapter 5
Using the API to Manage Exadata Cloud@Customer Backup Destinations
• CreateBackupDestination
• DeleteBackupDestination
• GetBackupDestination
• ListBackupDestination
• UpdateBackupDestination
• ChangeBackupDestinationCompartment
5-8
6
Oracle Database Software Images
Learn about Database Software Image resource type and how you can use it to create
Oracle Databases and Oracle Database Homes and to patch databases.
Database Software Images enable you to create a customized Oracle Database
software configuration that includes your chosen updates (PSU, RU or RUR), and
optionally, a list of one-off (or interim) patches or an Oracle Home inventory file. This
reduces the time required to provision and configure your databases, and makes it
easy for your organization to create an approved "gold image" for developers and
database administrators.
• Creation and Storage of Database Software Images
Database software images are resources within your tenancy that you create prior
to provisioning or patching an Exadata Cloud@Customer instance, a Database
Home, or a database.
• Using a Database Software Image with an Exadata Cloud@Customer System
Create, save, and reuse an Oracle Database Software Image.
• Using the Console to Create a Database Software Image
To create an Oracle Database Software Image with the console, use this
procedure.
• Using the OPatch lsinventory Command to Verify the Patches Applied to an Oracle
Home
OPatch utility enables you to apply the interim patches to Oracle Database
software. You can find opatch utility in the $ORACLE_HOME/Opatch directory.
• Using the Console to Delete a Database Software Image
• Using the Console to View the Patch Information of a Database Software Image
To view the Oracle Database version, update information (PSU/BP/RU level), and
included one-off (interim) patches of a database software image, use the following
instructions:
• Using the Console to Move Database Software Image to a Different Compartment
Follow these steps to move a Database Software Image to a different
compartment of your choice:
• Using the API for Managing Oracle Database Software Images
Review the list of API calls to manage Oracle Database Software Image.
Related Topics
• Using the Console to Create Oracle Database Home on Exadata
Cloud@Customer
To create an Oracle Database home in an existing VM cluster with the Console, be
prepared to provide values for the fields required.
• Using the Console to Perform a Patch Operation on a Database Home
Learn to apply patches on a Database Home.
6-1
Chapter 6
Creation and Storage of Database Software Images
6-2
Chapter 6
Using the Console to Create a Database Software Image
create a Database Home for the new standby. If the Database Software Image used
by the primary database is no longer available, then enable Data Guard operation
will not proceed. For more information, see Using Oracle Data Guard with Exadata
Cloud@Customer.
Note:
The Database Software Images are created and managed by the customer
and they are available for use until explicitly deleted.
Related Topics
• Using the Console to Create Oracle Database Home on Exadata
Cloud@Customer
To create an Oracle Database home in an existing VM cluster with the Console, be
prepared to provide values for the fields required.
• Patching an Exadata Cloud@Customer System
Learn how to perform patching operations on Exadata database compute nodes
and Database Homes by using the Console, API, or the CLI.
• Using Oracle Data Guard with Exadata Cloud@Customer
Learn to configure and manage Data Guard associations in your VM cluster.
6-3
Chapter 6
Using the OPatch lsinventory Command to Verify the Patches Applied to an Oracle Home
Related Topics
• Release Update Introduction and FAQ (Doc ID 2285040.1)
• Using the OPatch lsinventory Command to Verify the Patches Applied to an Oracle
Home
OPatch utility enables you to apply the interim patches to Oracle Database
software. You can find opatch utility in the $ORACLE_HOME/Opatch directory.
• Resource Tags
1. Run the opatch lsinventory command to get the list of interim patches applied.
$ORACLE_HOME/OPatch/opatch lsinventory
Oracle Interim Patch Installer version 12.2.0.1.21
Copyright (c) 2021, Oracle Corporation. All rights reserved.
Lsinventory Output
file location : /u02/app/oracle/product/19.0.0.0/dbhome_2/
cfgtoollogs/opatch/lsinv/lsinventory2021-01-21_09-22-45AM.txt
2. Use the lsinventory output file to extract the additional One Off Patches applied
to a specific Oracle Home.
6-4
Chapter 6
Using the Console to View the Patch Information of a Database Software Image
6-5
Chapter 6
Using the API for Managing Oracle Database Software Images
6-6
7
Creating Oracle Database Homes on an
Exadata Cloud@Customer System
Learn to create Oracle Database Homes on Exadata Cloud@Customer.
• About Creating Oracle Database Homes on an Exadata Cloud@Customer System
You can add Oracle Database homes (referred to as Database Homes in
Oracle Cloud Infrastructure) to an existing VM cluster by using the Oracle Cloud
Infrastructure Console, the API, or the CLI.
• Required IAM Policy for Creating Oracle Database Homes
Review the identity access management (IAM) policy for creating Oracle Database
homes on Oracle Exadata Cloud@Customer Systems.
• Using the Console to Create Oracle Database Home on Exadata
Cloud@Customer
To create an Oracle Database home in an existing VM cluster with the Console, be
prepared to provide values for the fields required.
• Using the API to Create Oracle Database Home on Exadata Cloud@Customer
To create an Oracle Database home, review the list of API calls.
Note:
Avoid entering confidential information when assigning descriptions, tags,
or friendly names to your cloud resources through the Oracle Cloud
Infrastructure Console, API, or CLI.
You can also add and remove Database homes, and perform other management tasks
on a Database home by using the dbaascli utility.
Related Topics
• Using the dbaascli Utility on Exadata Cloud@Customer
Learn to use the dbaascli utility on Exadata Cloud@Customer.
7-1
Chapter 7
Required IAM Policy for Creating Oracle Database Homes
7-2
Chapter 7
Using the Console to Create Oracle Database Home on Exadata Cloud@Customer
3. In the list of VM clusters, click the VM cluster on which you want to create the
Database Home.
4. Under Resources, click Database Homes.
5. Click Create Database Home.
6. In the Create Database Home dialog, enter the following:
• Database Home display name: The display name for the Database Home.
• Database image: Determines what Oracle Database version is used for the
database. You can mix database versions on the Exadata VM Cluster., but not
editions. By default, the latest Oracle-published database software image is
selected.
Click Change Database Image to use an older Oracle-published image or
a custom Database Software Image that you have created in advance, then
select an Image Type.
Oracle Provided Database Software Images: These images contain
generally available versions of Oracle Database software.
Custom Database Software Images: These images are created by your
organization and contain customized configurations of software updates and
patches. Use the Select a compartment and Select a Database version
selectors to limit the list of custom Database Software Images to a specific
compartment or Oracle Database software major release version.
After choosing a software image, click Select to return to the Create Database
Home dialog.
Note:
Oracle recommends using a custom Database Software Image not
older than N-3 from the latest.
A Database Software Image will not be available for Database Home creation
if:
– The Database Software Images was created using EXADATA_SHAPE/
VM_BM_SHAPE. Such images will not be available for Database Home
provisioning for Exadata Cloud@Customer.
– The Database Software Image is not in Available state, that is, Deleted
or is being Updated.
• Show Advanced Options
You have the option to configure advanced options.
– Tags: (Optional) You can choose to apply tags. If you have permissions to
create a resource, then you also have permissions to apply free-form tags
to that resource. To apply a defined tag, you must have permissions to use
the tag namespace. For more information about tagging, see "Resource
Tags". If you are not sure if you should apply tags, then skip this option
(you can apply tags later) or ask your administrator.
Note that after Home install, patch to the latest if the latest patch is available.
7. Click Create.
7-3
Chapter 7
Using the API to Create Oracle Database Home on Exadata Cloud@Customer
When the Database Home creation is complete, the status changes from
Provisioning to Available.
Related Topics
• Resource Tags
7-4
8
Managing Oracle Database Homes on
Exadata Cloud@Customer Systems
Learn to manage Oracle Database homes on Exadata Cloud@Customer.
• About Managing Oracle Database Homes on Exadata Cloud@Customer Systems
You can delete or view information about Oracle Database Homes (referred to
as Database Homes in Oracle Cloud Infrastructure) by using the Oracle Cloud
Infrastructure Console, the API, or the CLI.
• Required IAM Policy for Managing Oracle Database Homes
Review the identity access management (IAM) policy for managing Oracle
Database homes on Oracle Exadata Cloud@Customer Systems.
• Using the Console for Oracle Database Home on Exadata Cloud@Customer
Learn how to use the Console to manage Oracle Database homes.
• Differences Between Managing Resources with dbaascli and the Database API
Learn how Oracle Cloud@Customer automatically synchronizes dbaascli utility
parameters and Database Service API properties of Oracle Database instance
and Oracle Database Home.
• Using the API to Manage Oracle Database Home on Exadata Cloud@Customer
Review the list of API calls to manage Oracle Database home.
Note:
Avoid entering confidential information when assigning descriptions, tags,
or friendly names to your cloud resources through the Oracle Cloud
Infrastructure Console, API, or CLI.
Related Topics
• Using the dbaascli Utility on Exadata Cloud@Customer
Learn to use the dbaascli utility on Exadata Cloud@Customer.
8-1
Chapter 8
Required IAM Policy for Managing Oracle Database Homes
8-2
Chapter 8
Using the Console for Oracle Database Home on Exadata Cloud@Customer
8-3
Chapter 8
Differences Between Managing Resources with dbaascli and the Database API
If you terminate a Database Home using the dbaascli or dbaasapi, the status of the
Database Home is displayed as Terminated in the Database Service REST API based
tools. If you terminate a database, the status of the database is displayed as Failed.
8-4
Chapter 8
Using the API to Manage Oracle Database Home on Exadata Cloud@Customer
8-5
9
Managing Oracle Databases on Oracle
Exadata Cloud@Customer
Learn about the prerequisites, supported versions, creating and configuring Oracle
Database for use in Oracle Exadata Cloud@Customer, and other database-related
administrative tasks.
9-1
Chapter 9
Oracle Database Releases Supported by Oracle Exadata Cloud@Customer
9-2
Chapter 9
Required IAM Policy for Managing Oracle Databases on Oracle Exadata Cloud@Customer
• Each database is configured with Oracle Real Application Clusters (Oracle RAC)
database instances running on every node in the virtual machine (VM) cluster.
• Each database uses a separate set of Oracle binaries in a separate Oracle home
location.
• Each database is configured with default instance parameter settings. While the
defaults are reasonable for many cases, you should review the instance parameter
settings to ensure that they meet your specific application needs.
In particular, review the Oracle Database system global area (SGA) and program
global area (PGA) instance parameter settings, especially if your VM cluster
supports multiple databases. Also, ensure that the sum of all Oracle Database
memory allocations never exceeds the available physical memory on each
compute node.
• Each database using Oracle Database 12c Release 1 or a later release is
configured as a container database (CDB). One pluggable database (PDB) is
created inside the CDB. By default:
– The first PDB is configured with a local PDB administration user account,
named PDBADMIN.
– The PDBADMIN user account is initially configured with the same administration
password as the CDB SYS and SYSTEM users.
– The PDBADMIN user account is initially configured with basic privileges
assigned through two roles; CONNECT and PDB_DBA. However, for most practical
administrative purposes you must assign extra privileges to the PDBADMIN user
account, or to the PDB_DBA role.
You can use native Oracle Database facilities to create extra PDBs, and to
manage all of your PDBs. The dbaascli utility also provides a range of convenient
PDB management functions.
Note:
Avoid entering confidential information when assigning descriptions, tags,
or friendly names to your cloud resources through the Oracle Cloud
Infrastructure Console, API, or CLI.
9-3
Chapter 9
Using the Console to Manage Databases on Oracle Exadata Cloud@Customer
9-4
Chapter 9
Using the Console to Manage Databases on Oracle Exadata Cloud@Customer
9-5
Chapter 9
Using the Console to Manage Databases on Oracle Exadata Cloud@Customer
9-6
Chapter 9
Using the Console to Manage Databases on Oracle Exadata Cloud@Customer
Note:
If you select a backup destination, then you cannot change a
backup location after the database is created. However, if you
select None now, then you can select a backup destination after
the database is created.
9-7
Chapter 9
Using the API to Manage Oracle Database Components
9-8
Chapter 9
Using the API to Manage Oracle Database Components
For information about using the API and signing requests, see "REST APIs" and
"Security Credentials". For information about SDKs, see "Software Development Kits
and Command Line Interface".
Use the following API operations to manage various database components.
Database homes:
• CreateDbHome
• DeleteDbHome
• GetDbHome
• ListDbHomes
Databases:
• CreateDatabase
• GetDatabase
• ListDatabases
• UpdateDatabase
• UpdateDatabaseDetails
Nodes:
• GetDbNode
• List DbNodes
Use UpdateDatabase to move a database to a different Database Home, thereby
updating the database to the same version as the target Database Home.
For the complete list of APIs, see "Database Service API".
Related Topics
• REST APIs
• Security Credentials
• Software Development Kits and Command Line Interface
• CreateDbHome
• DeleteDbHome
• GetDbHome
• ListDbHomes
• CreateDatabase
• GetDatabase
• ListDatabases
• UpdateDatabase
• UpdateDatabaseDetails
• GetDbNode
• List DbNodes
• Database Service API
9-9
Chapter 9
Changing the Database Passwords
Note:
if you are enabling Data Guard for a database, then the SYS password and
the TDE wallet password of the primary and standby databases must all be
the same.
Note:
Using the dbaascli to change the SYS password will ensure the backup/
restore automation can parallelize channels across all nodes in the cluster.
9-10
10
Using Oracle Data Guard with Exadata
Cloud@Customer
Learn to configure and manage Data Guard associations in your VM cluster.
• About Using Oracle Data Guard with Exadata Cloud@Customer
This topic explains how to use the Console or the API to manage Data Guard
associations in your VM cluster.
• Required IAM Policy for Managing Oracle Data Guard Associations on Oracle
Exadata Cloud@Customer
Review the identity access management (IAM) policy for managing Oracle Data
Guard associations on Oracle Exadata Cloud@Customer Systems.
• Prerequisites for Using Oracle Data Guard with Exadata Cloud@Customer
Review the list of prerequisites for using Data Guard with Exadata
Cloud@Customer.
• Working with Data Guard
Oracle Data Guard ensures high availability, data protection, and disaster recovery
for enterprise data.
• Using the Console to Manage Oracle Data Guard Associations
Learn how to enable a Data Guard association between databases, change the
role of a database in a Data Guard association using either a switchover or a
failover operation, and reinstate a failed database.
• Using the API to Manage Data Guard Associations on an Exadata
Cloud@Customer System
Learn how to use the API to manage Data Guard associations on an Exadata
Cloud@Customer system.
10-1
Chapter 10
Required IAM Policy for Managing Oracle Data Guard Associations on Oracle Exadata Cloud@Customer
10-2
Chapter 10
Prerequisites for Using Oracle Data Guard with Exadata Cloud@Customer
Compute Nodes
A VM cluster Data Guard implementation requires two Exadata database compute
nodes, one containing the primary database and one containing the standby database.
When you enable Data Guard for an Exadata database compute node database, the
Exadata database compute node with the database to be used as the standby must
already exist before you enable Data Guard.
Password
For Data Guard operations to work, the SYS password and the TDE wallet password of
the primary and standby databases must all be the same.
If you change any one of these passwords, you must update the rest of the passwords
to match.
If you make any change to the TDE wallet (such as adding a master key for a new
PDB or changing the wallet password), you must copy the wallet from the primary
to the standby so that Data Guard can continue to operate. For Oracle Database
versions earlier than 12.2, if you change the SYS password on one of the peers, you
need to manually sync the password file between the DB systems.
10-3
Chapter 10
Using the Console to Manage Oracle Data Guard Associations
• Failover
A failover transitions the standby database into the primary role after the existing
primary database fails or becomes unreachable.
• Reinstate
Reinstates a database into the standby role in a Data Guard association.
Switchover
A switchover reverses the primary and standby database roles.
Each database continues to participate in the Data Guard association in its new role.
A switchover ensures no data loss. You can use a switchover before you perform
planned maintenance on the primary database. Performing planned maintenance on
a Exadata database compute node with a Data Guard association is typically done by
switching the primary to the standby role, performing maintenance on the standby, and
then switching it back to the primary role.
Failover
A failover transitions the standby database into the primary role after the existing
primary database fails or becomes unreachable.
A failover might result in some data loss when you use Maximum Performance
protection mode.
Reinstate
Reinstates a database into the standby role in a Data Guard association.
You can use the reinstate command to return a failed database into service after
correcting the cause of failure.
Note:
You can't terminate a primary database that has a Data Guard association
with a peer (standby) database. Delete the standby database first.
Alternatively, you can switch over the primary database to the standby role,
and then terminate it.
You can't terminate a VM cluster that includes Data Guard enabled
databases. You must first remove the Data Guard association by terminating
the standby database.
10-4
Chapter 10
Using the Console to Manage Oracle Data Guard Associations
When you enable Data Guard, a separate Data Guard association is created for the
primary and the standby database.
• Using the Console to Enable Data Guard on an Exadata Cloud@Customer
System
Learn to enable Data Guard association between databases.
• Using the Console To Perform a Database Switchover
You initiate a switchover operation by using the Data Guard association of the
primary database.
• Using the Console To Perform a Database Failover
You initiate a failover operation by using the Data Guard association of the standby
database.
• Using the Console To Reinstate a Database
After you fail over a primary database to its standby, the standby assumes the
primary role and the old primary is identified as a disabled standby.
• Using the Console To Terminate a Data Guard Association on an Exadata
Cloud@Customer System
On a VM cluster, you remove a Data Guard association by terminating the standby
database.
Note:
When you enable Data Guard, replication of data happens only over the
client network.
10-5
Chapter 10
Using the Console to Manage Oracle Data Guard Associations
10-6
Chapter 10
Using the Console to Manage Oracle Data Guard Associations
Set your ORACLE_UNQNAME environment variable to the value of the Database Unique
Name, and then run these commands:
10-7
Chapter 10
Using the API to Manage Data Guard Associations on an Exadata Cloud@Customer System
10-8
Chapter 10
Using the API to Manage Data Guard Associations on an Exadata Cloud@Customer System
10-9
11
Managing Database Backup and Recovery
on Oracle Exadata Cloud@Customer
Learn how to work with the backup and recovery facilities provided by Oracle Exadata
Cloud@Customer.
11-1
Chapter 11
About Managing Backup Destinations for Oracle Exadata Cloud@Customer
• Restore a database.
You can perform these operations by using either the Console, or the API.
Automatic database backups are configured as follows:
• Automatic backups are scheduled daily. The automatic backup process can run at
any time within the daily backup window, which is between midnight and 6:00 AM
in the time zone of the virtual machine (VM) cluster that hosts the database.
• Automatic backups use a combination of full (RMAN level 0) and incremental
(RMAN level 1) database backups:
– For backups to a Zero Data Loss Recovery Appliance, after an initial full
backup is performed, Zero Data Loss Recovery Appliance creates and
validates virtual full backups from each daily incremental backup.
– For backups to NFS, or OSS, the default interval between level 0 backups is
seven days. The default level 0 day is Sunday.
– For backups to Local Exadata Storage:
The retention period option for Local Exadata Storage is 7 or 14 days.
Regardless of the retention window selected for backups to Local Exadata
Storage, incremental level 1 backups are always performed after the initial
level 0 image copy is taken. Also, the incremental level 1 backups are merged
into the level 0 image copy backup when they become older than the retention
period.
For example: A 14 day for Local retention window includes one "merged" level
0 , 14 incremental level 1's plus archivelogs for the 14 days.
• The retention period defines the period for which automatic backups are
maintained:
– For backups to Zero Data Loss Recovery Appliance, the retention policy that is
implemented in the appliance controls the retention period.
– For backups to local Exadata storage, you can choose a retention period of 7
days, or 14 days. The default retention period is 7 days.
– For backups to Oracle Cloud Infrastructure Object Storage, or to an NFS
backup destination, you can choose one of the following preset retention
periods: 7 days, 14 days, 30 days, 45 days, or 60 days. The default retention
period is 30 days.
• By default, Oracle Database runs in ARCHIVELOG mode, and archived redo log files
are backed up every 30 minutes. .
• Regardless of the backup destination, backups of user data are encrypted by
default.
While a backup is in progress, Oracle recommends that you avoid performing actions
that could interfere with availability, such as restarting compute nodes, or applying
patches. If an automatic backup operation fails, then the backup is deferred until the
next day’s backup window.
When required, you can restore Oracle Database to:
• The latest available restore point.
• A specific point in time by providing a time stamp.
• An Oracle Database System Change Number (SCN).
11-2
Chapter 11
Required IAM Policy for Backup and Recovery
Note:
The backup and recovery facilities described in this topic cater only for
database backup and recovery, which includes Oracle Database data files,
log files, control files, and the server parameter (SP) file. You are responsible
for backing up other files on your compute nodes. In particular, Oracle
strongly recommends that you back up the Transparent Data Encryption
(TDE) keystore (wallet). Without the TDE keystore, the Oracle Database
backups are effectively useless, because you cannot read the data contained
in the backup.
Note:
If TAG based recovery fails with error ORA-01152, then use Recovery
Manager (RMAN) directly to complete the recovery.
If the server parameter file (SPFILE) recovery fails for local configuration
using dbaascli, then use Recovery Manager (RMAN) directly to complete
the recovery.
11-3
Chapter 11
Using the Console to Manage Backup and Recovery
Related Topics
• Getting Started with Policies
• Common Policies
Note:
Only the managed backups are synced to the Console. If you configure
backups directly in the backend, then they are not synced to the Console.
This is an expected behavior and Oracle has no plans to change this
behavior.
11-4
Chapter 11
Using the Console to Manage Backup and Recovery
11-5
Chapter 11
Using the Console to Manage Backup and Recovery
Note:
If you select a backup destination (other than None), then
you cannot change it later.
11-6
Chapter 11
Using the API to Manage Database Backup and Recovery
– You can set the option to Enable automatic backups. Select this option
to enable automatic database backups. Deselect this option to suspend
automatic database backups.
9. Click Save Changes.
Related Topics
• Managing Backup Destinations for Exadata Cloud@Customer
Note:
Backup fails after a point in time restore to a timestamp or SCN on NFS
storage. Wait for 10 minutes or so before proceeding with the backup.
11-7
Chapter 11
Customizing the Automatic Backup Configuration
For information about using the API and signing requests, see "REST APIs" and
"Security Credentials". For information about SDKs, see "Software Development Kits
and Command Line Interface".
Use these API operations to manage database backup and recovery:
• GetBackup
• ListBackups
• RestoreDatabase
• UpdateDatabase - To enable and disable automatic backups.
For the complete list of APIs, see "Database Service API".
Related Topics
• REST APIs
• Security Credentials
• Software Development Kits and Command Line Interface
• GetBackup
• ListBackups
• RestoreDatabase
• UpdateDatabase
• Database Service API
11-8
Chapter 11
Customizing the Automatic Backup Configuration
# sudo -s
#
3. Use the bkup_api get config command to generate a file containing the current
backup settings for the database deployment:
Where:
filename is an optional parameter used to specify a name for the file that is
generated
dbname is the database name for the database that you want to act on
4. Edit the parameter values in the generated file to change any settings you want to
customize in the backup configuration.
The following parameters can be modified to customize the backup configuration:
Parameter Description
bkup_cron_entry Enables the automatic backup configuration.
Valid values are yes and no.
bkup_cfg_files Enables backup of system and database
configuration files. Valid values are yes and
no.
bkup_daily_time Start time of the automatic daily backup
expressed in 24-hour time as hh:mm.
bkup_archlog_frequency Interval in minutes between automatic
backups of archived database log files. Valid
values are 15, 20, 30, 60, and 120. Default
value is 60.
bkup_disk Enables backups to local Exadata storage.
Valid values are yes and no.
bkup_disk_recovery_window Retention period for backups on local
Exadata storage, expressed as a number
of days up to 14. Only applicable when
bkup_disk is set to yes. Default value is
7.
bkup_oss Enables backups to cloud storage. Valid
values are yes and no.
bkup_oss_recovery_window Retention period for backups to cloud
storage, expressed as a number of days up
to 90. Only applicable when bkup_oss is set
to yes. Default value is 30.
11-9
Chapter 11
Customizing the Automatic Backup Configuration
Parameter Description
bkup_oss_url Location of the storage container that is
used for backup to cloud storage. Only
applicable when bkup_oss is set to yes.
bkup_oss_user User name of the Oracle Cloud user
having write privileges on the cloud storage
container specified in bkup_oss_url. Only
applicable when bkup_oss is set to yes.
bkup_oss_passwd Password of the Oracle Cloud user having
write privileges on the cloud storage
container specified in bkup_oss_url. Only
applicable when bkup_oss is set to yes.
bkup_oss_l0_day Day of the week when a level 0 backup is
taken and stored on cloud storage. Valid
values are mon, tue, wed, thu, fri, sat,
sun. Only applicable when bkup_oss is set
to yes. Default value is sun.
bkup_zdlra Enables backups to a Recovery Appliance.
Valid values are yes and no.
bkup_zdlra_url Location of the Recovery Appliance that
is being used for backups. Only applicable
when bkup_zdlra is set to yes.
bkup_zdlra_user The virtual private catalog (VPC) user name
for the Recovery Appliance specified in
bkup_zdlra_url. Only applicable when
bkup_zdlra is set to yes.
bkup_zdlra_passwd Password of the Recovery Appliance
user specified in bkup_zdlra_url. Only
applicable when bkup_zdlra is set to yes.
bkup_rman_compression Level of compression applied to automatic
backups. Valid values are basic, low,
medium, and high. Default value is low.
bkup_set_section_size Enables the use of the RMAN multisection
backup feature. Valid values are yes and no.
bkup_section_size RMAN section size that is used
for automatic backups. Default value
is 64G. Only applicable when
bkup_set_section_size is set to yes.
bkup_channels_node Number of RMAN channels that are used
for automatic backups. Valid values are
between 1 and 32. Default value is 4.
bkup_use_rcat Enables the use of an existing RMAN
recovery catalog. Valid values are yes and
no.
bkup_rcat_user Recovery catalog user name. Only
applicable when bkup_use_rcat is set to
yes.
11-10
Chapter 11
Customizing the Automatic Backup Configuration
Parameter Description
bkup_rcat_passwd Password for recovery catalog user specified
in bkup_rcat_user. Only applicable when
bkup_use_rcat is set to yes.
bkup_rcat_conn Connection string for the RMAN
recovery catalog. Only applicable when
bkup_use_rcat is set to yes.
5. Use the bkup_api set config command to update the backup settings using the
file containing your updated backup settings:
Where:
filename is used to specify the name of the file that contains the updated backup
settings
dbname is the database name for the database that you are acting on
6. You can use the bkup_api configure_status command to check the status of the
configuration update:
# /var/opt/oracle/bkup_api/bkup_api configure_status
# exit
#
Note that any changes you make by using the bkup_api command are not
reflected in the Oracle Database Exadata Cloud at Customer console.
Related Topics
• Connecting to a Compute Node with SSH
You can connect to the compute nodes in an Exadata Cloud@Customer system
by using a Secure Shell (SSH) connection.
11-11
Chapter 11
Customizing the Automatic Backup Configuration
## OS Configuration Files
#
# Doc Spec
oscfg.spec
#
# Directories
/etc/rc.d
/home/oracle/bkup
#
# Single files
/home/oracle/.bashrc
/etc/crontab
/etc/sysctl.conf
/etc/passwd
/etc/group
/etc/oraInst.loc
/etc/oratab
/etc/fstab
Related Topics
• Connecting to a Compute Node with SSH
You can connect to the compute nodes in an Exadata Cloud@Customer system
by using a Secure Shell (SSH) connection.
11-12
Chapter 11
Creating an On-Demand Backup by Using the bkup_api Utility
#
# Directories
/u02/app/oracle/product/dbversion/dbhome_n/admin/dbname/xdb_wallet
/u02/app/oracle/admin/dbname/xdb_wallet
/u02/app/oracle/admin/dbname/db_wallet
# Note: tde_wallet must be backed up in a different location than
DATA bkup.
/u02/app/oracle/admin/dbname/tde_wallet
/u02/app/oracle/admin/dbname/cat_wallet
#/u01/app/oraInventory
#
# Single files
/var/opt/oracle/dbaas_acfs/dbname/opc/opcdbname.ora
/u02/app/oracle/product/dbversion/dbhome_n/dbs/opcdbname.ora
/u02/app/oracle/product/dbversion/dbhome_n/dbs/orapwinstancename
/u02/app/oracle/product/dbversion/dbhome_n/network/admin/
listener.ora
/u02/app/oracle/product/dbversion/dbhome_n/network/admin/sqlnet.ora
/u02/app/oracle/product/dbversion/dbhome_n/network/admin/
tnsnames.ora
/u02/app/oracle/product/dbversion/dbhome_n/rdbms/lib/env_rdbms.mk
/u02/app/oracle/product/dbversion/dbhome_n/rdbms/lib/ins_rdbms.mk
#
# Creg
/var/opt/oracle/creg/instancename.ini
#
Related Topics
• Connecting to a Compute Node with SSH
You can connect to the compute nodes in an Exadata Cloud@Customer system
by using a Secure Shell (SSH) connection.
# sudo -s
#
11-13
Chapter 11
Creating an On-Demand Backup by Using the bkup_api Utility
• To create a backup that follows the current retention policy, use the following
bkup_api command:
where dbname is the database name for the database that you want to back
up.
• To create an on-demand backup of a specific PDB, use the following bkup_api
command:
• To create a long-term backup of the complete database that persists until you
delete it, use the following bkup_api command:
You can use this option to manually perform an RMAN level 0 (full) backup
if the scheduled weekly level 0 backup fails or following a major structural
change in the database, such as adding a new data file or tablespace. This
option is only valid for backup configurations that use cloud storage only.
• To create an on-demand backup that includes an image copy of the database
data files, use the following bkup_api command:
You can use this option to manually perform a full image backup to cloud
storage if the scheduled weekly full backup fails or following a major structural
change in the database, such as adding a new data file or tablespace. This
option is only valid for backup configurations that use cloud storage and local
Exadata storage.
11-14
Chapter 11
Recovering a Database Using Oracle Recovery Manager (RMAN)
4. After you start an on-demand backup, the backup process runs in the background.
To check the progress of the backup process, run the following bkup_api
command on the same compute node where the backup is running:
5. Exit the root-user command shell and disconnect from the compute node:
# exit
# exit
Related Topics
• Connecting to a Compute Node with SSH
You can connect to the compute nodes in an Exadata Cloud@Customer system
by using a Secure Shell (SSH) connection.
11-15
12
Connecting to an Exadata
Cloud@Customer System
Learn how to connect to an Exadata Cloud@Customer system using SSH, and how
to connect to an Exadata Cloud@Customer database using Oracle Net Services
(SQL*Net).
• Connecting to a Compute Node with SSH
You can connect to the compute nodes in an Exadata Cloud@Customer system
by using a Secure Shell (SSH) connection.
• Connecting to a Database with Oracle Net Services
You can connect to the compute nodes in an Exadata Cloud@Customer system
using Oracle Net Services.
12-1
Chapter 12
Connecting to a Compute Node with SSH
also register extra keys separately after you create the VM cluster. The public
keys are stored in the authorized_keys file at ~/.ssh/authorized_keys. Separate
authorized_keys files are located under the home directories of the oracle and
opc operating system users.
• The host name or IP address for the compute node that you want to access.
See, Using the Console to Check the Status of a VM Cluster Compute Node.
Related Topics
• Using the Console to Check the Status of a VM Cluster Compute Node
• Managing VM Clusters on Exadata Cloud@Customer
Learn to manage virtual machine (VM) clusters on Exadata Cloud@Customer.
• Connect as opc to perform operations that require root access to the compute
node, such as patching. This user can use the sudo -s command to gain root
user access to the compute node.
6. Confirm that the When username is not specified option is set to Prompt.
7. In the Category tree, expand SSH and then click Auth.
The Auth panel is displayed.
8. Click the Browse button next to the Private key file for authentication field.
Then, navigate to and open the private key file that corresponds to a public key
that is registered in the system.
9. In the Category tree, click Session.
The Session panel is displayed.
10. In the Saved Sessions field, enter a name for the connection configuration. Then,
click Save.
11. Click Open to open the connection.
The PuTTY Configuration window closes and the PuTTY terminal window
displays.
12-2
Chapter 12
Connecting to a Compute Node with SSH
ssh –i private-keyuser@node
4. Identify the database instances for the database that you want to access. For
example:
12-3
Chapter 12
Connecting to a Compute Node with SSH
5. Configure the environment settings for the database that you want to access. For
example:
. oraenv
ORACLE_SID = [oracle] ? s12c
The Oracle base has been set to /u02/app/oracle
export ORACLE_SID=s12c1
6. You can use the svrctl command to display more detailed information about the
database. For example:
sqlplus / as sysdba
Connected to:
Oracle Database 12c EE Extreme Perf Release 12.2.0.1.0 - 64bit
Production
12-4
Chapter 12
Connecting to a Database with Oracle Net Services
Note:
This documnentation provides basic requirements for connecting to your
Exadata Cloud@Customer databases by using Oracle Net Services.
12-5
Chapter 12
Connecting to a Database with Oracle Net Services
• Use the following template to define a Net Services alias, which is typically used to
provide a convenient name for the connect descriptor:
alias-name = (DESCRIPTION=
(ADDRESS_LIST=
(ADDRESS=(PROTOCOL=tcp)(HOST=SCAN-VIP-1)(PORT=1521))
(ADDRESS=(PROTOCOL=tcp)(HOST=SCAN-VIP-2)(PORT=1521))
(ADDRESS=(PROTOCOL=tcp)(HOST=SCAN-VIP-3)(PORT=1521)))
(CONNECT_DATA=(sid-or-service-entry)))
Where:
alias-name is the name you use to identify the alias.
SCAN-VIP-[1–3] are the IP addresses for the SCAN VIPs.
12-6
Chapter 12
Connecting to a Database with Oracle Net Services
Note:
By default, Oracle Net Services randomly selects one of the addresses
in the address list to balance the load between the SCAN listeners.
• Use the following template to define a Net Services alias that references the
custom SCAN name:
alias-name = (DESCRIPTION=
(ADDRESS_LIST=(ADDRESS=(PROTOCOL=tcp)(HOST=scan-name)(PORT=1521)))
(CONNECT_DATA=(sid-or-service-entry)))
Where:
alias-name is the name you use to identify the alias.
scan-name is the custom SCAN name.
sid-or-service-entry identifies the database SID or service name using one of
the following formats:
• SID=sid-name. For example: SID=S12C1.
• SERVICE_NAME=service-name. For example:
SERVICE_NAME=PDB1.example.yourcloud.com.
Alternatively, you can use the easy connect method to specify a connect descriptor
with the following format:
scan-name:1521/sid-or-service-entry
For example:
exa1scan.example.com:1521/S12C1
12-7
Chapter 12
Connecting to a Database with Oracle Net Services
Or
exa1scan.example.com:1521/PDB1.example.yourcloud.com
alias-name = (DESCRIPTION=
(CONNECT_TIMEOUT=timeout)
(ADDRESS_LIST=(ADDRESS=(PROTOCOL=tcp)(HOST=node)(PORT=1521)))
(CONNECT_DATA=(sid-or-service-entry)))
Where:
alias-name is the name you use to identify the alias.
node is the hostname or IP address for the compute node that you want to use.
sid-or-service-entry identifies the database SID or service name using one of the
following formats:
• SID=sid-name. For example, SID=S12C1.
• SERVICE_NAME=service-name. For example,
SERVICE_NAME=PDB1.example.oraclecloudatcust.com.
Alternatively, you can use the easy connect method to specify a connect descriptor
with the following format:
node:1521/sid-or-service-entry
For example:
exa1node01.example.com:1521/S12C1
Or
exa1node01.example.com:1521/PDB1.example.oraclecloudatcust.com
12-8
13
Maintaining an Exadata Cloud@Customer
System
Learn how to perform patching operations on Exadata Cloud@Customer
infrastructure.
• User-Managed Maintenance Updates
• Oracle Managed Exadata Cloud@Customer Infrastructure Maintenance Updates
13-1
Chapter 13
Oracle Managed Exadata Cloud@Customer Infrastructure Maintenance Updates
13-2
Chapter 13
Oracle Managed Exadata Cloud@Customer Infrastructure Maintenance Updates
• Maintenance window will start with performing prechecks on all the ExaC@C
infrastructure components. This will take approximately 2 hours to complete.
• Each Dom0 takes 90 minutes on an average
• Each storage cell takes 60 minutes on an average
• InfiniBand or RoCE switches take 60 minutes on an average
• Control Plane Server takes 240 minutes on an average
The approximate computed time for infrastructure patching operations is as follows:
• Base and Quarter Rack (2 Dom0/3 Storage Cells): Approximately 13 hours
• Half Rack (4 Dom0/6 Storage Cells): Approximately 19 hours
• Full Rack (8 Dom0/12 Storage Cells): Approximately 31 hours
13-3
Chapter 13
Oracle Managed Exadata Cloud@Customer Infrastructure Maintenance Updates
View or Edit the Time of the Next Scheduled Maintenance for Exadata
Cloud@Customer Infrastructure
Learn how to view and edit the time of the next scheduled maintenance.
1. Open the navigation menu. Under Oracle Databases, click Exadata
Cloud@Customer.
2. Choose your Compartment.
3. Click Exadata Infrastructure.
4. In the list of Exadata Infrastructures, find the infrastructure you want to set the
maintenance window for and click its highlighted name.
13-4
Chapter 13
Oracle Managed Exadata Cloud@Customer Infrastructure Maintenance Updates
5. On the infrastructure details page, under Maintenance, click the view link in the
Next Maintenance field.
6. On the Maintenance page, scheduled maintenance events are listed.
7. Optional. To change the time of the next scheduled maintenance, click the Edit
link in the Scheduled Start Time field.
8. In the Edit Infrastructure Maintenance Scheduled Start Time page, enter a
date and time in the Scheduled Start time field.
The following restrictions apply:
• Infrastructure maintenance cannot be rescheduled to occur more than six
months after the announcement of the maintenance update's availability. If
a new patch is announced prior to your rescheduled maintenance run, the
newer patch will be applied on your specified date. You can reschedule your
maintenance to take place earlier than it is currently scheduled. You cannot
reschedule start time less than two hours from the current time.
• Oracle reserves certain dates each quarter for internal maintenance
operations, and you cannot schedule your maintenance on these dates.
13-5
Chapter 13
Oracle Managed Exadata Cloud@Customer Infrastructure Maintenance Updates
2 hours to complete. While the system is performing the checks, the infrastructure
resource's lifecycle state remains "Available," and there is no lifecycle state
message.
For example, if you specify that patching should begin at 8:00 a.m., then Oracle
begins patching operations at 8:00, but the infrastructure resource's lifecycle state
does not change from "Available" to "Maintenance in Progress" until approximately
8:30 a.m.
• When Exadata compute node patching starts, the infrastructure resource's
lifecycle state is "Maintenance in Progress", and the associated lifecycle state
message is "The underlying infrastructure of this system (dbnodes) is being
updated."
• When cell storage patching starts, the infrastructure resource's lifecycle state is
"Maintenance in Progress", and the associated lifecycle state message is "The
underlying infrastructure of this system (cell storage) is being updated and this will
not impact Database availability."
• After cell patching is complete, the networking switches are patched one at a time,
in a rolling fashion.
• When patching is complete, the infrastructure resource's lifecycle state is
"Available", and the Console and API-based tools do not provide a lifecycle state
message.
13-6
Chapter 13
Oracle Managed Exadata Cloud@Customer Infrastructure Maintenance Updates
You can promote any secondary contacts as the primary anytime you want. When you
promote a secondary contact to primary, the current primary contact will be demoted
automatically to secondary.
For more information, see: Using the Console to Create Infrastructure and Managing
Infrastructure Maintenance Contacts.
Related Topics
• Using the Console to Create Infrastructure
To create your Oracle Exadata Cloud@Customer infrastructure, be prepared to
provide values for the fields required for configuring the infrastructure.
• Managing Infrastructure Maintenance Contacts
Learn to manage your Exadata infrastructure maintenance contacts.
13-7
14
Patching an Exadata Cloud@Customer
System
Learn how to perform patching operations on Exadata database compute nodes and
Database Homes by using the Console, API, or the CLI.
For information and instructions on patching the system by using the dbaascli utility,
see "Patching and Updating an Exadata Cloud@Customer System Manually".
For more information and examples for applying database quarterly patches on
Exadata Cloud@Customer refer to My Oracle Support note: How to Apply Database
Quarterly Patch on Exadata Cloud Service and Exadata Cloud at Customer Gen 2
(Doc ID 2701789.1).
For more guidance on achieving continuous service during patching operations, see
the Application Checklist for Continuous Service for MAA Solutions white paper.
• Required IAM Policy for Patching an Exadata Cloud@Customer System
Review the identity access management (IAM) policy for Patching an Exadata
Cloud@Customer System
• About Patching VM Clusters and Database Homes
• Prerequisites for Patching an Exadata Cloud@Customer System
Check and apply the latest Cloud patches that are dowloaded and made available
by Oracle on the CPS host.
• Using the Console for Patching an Exadata Cloud@Customer System
Learn how to use the console to view the history of patch operations on VM cluster
and Database Homes, apply patches, and monitor the status of patch operations.
• Using the API to Patch an Exadata Cloud@Customer System
Use various API features to help manage patching an Oracle Exadata
Cloud@Customer system.
Related Topics
• Patching and Updating an Exadata Cloud@Customer System Manually
• https://support.oracle.com/epmos/faces/DocContentDisplay?id=2701789.1
• Application Checklist for Continuous Service for MAA Solutions
14-1
Chapter 14
About Patching VM Clusters and Database Homes
14-2
Chapter 14
Prerequisites for Patching an Exadata Cloud@Customer System
Related Topics
• Managing Database Backup and Recovery on Oracle Exadata Cloud@Customer
Learn how to work with the backup and recovery facilities provided by Oracle
Exadata Cloud@Customer.
• Using the Console to Move a Database to Another Home
You can update the version of a VM cluster database by moving it to a Database
Home that is running the version of Oracle Database you are interested in.
14-3
Chapter 14
Using the Console for Patching an Exadata Cloud@Customer System
14-4
Chapter 14
Using the Console for Patching an Exadata Cloud@Customer System
The patch list displays the status of the operation. While the precheck is running,
the patch's status shows Checking. While a patch is being applied, the patch's status
shows Applying, the status of the Database Home and the databases in it display as
Updating, and lifecycle operations on the VM cluster and its resources are temporarily
unavailable. Patches are applied to the Database Home in a rolling fashion, node by
node, and each database in the home is stopped and then restarted. This may result
in temporary service disruption. If patching completes successfully, the patch's status
changes to Applied and the Database Home's status changes to Available. You can
view more details about an individual patch operation by clicking Patch History.
14-5
Chapter 14
Using the Console for Patching an Exadata Cloud@Customer System
14-6
Chapter 14
Using the API to Patch an Exadata Cloud@Customer System
5. In the list of Database Homes, click the Database Home you are interested in.
A list of databases is displayed.
6. In the list of databases, click the database you are interested in.
7. Click Move Database.
8. Select the target Database Home.
9. Click Move Database.
The database will be stopped in the current home and then restarted in the
destination home.
10. Confirm the move operation.
The database will be stopped in the current home and then restarted in the destination
home. While the database is being moved, the Database Home and Database
statuses display as Updating. The Database Home location, shown under Database
Version, displays as Moving Database. When the operation completes, Database
Home is updated with the current home. If the operation is unsuccessful, then the
status of the database displays as Failed, and the Database Home field provides
information about the reason for the failure.
14-7
Chapter 14
Using the API to Patch an Exadata Cloud@Customer System
For the complete list of APIs for the Database service, see "Database Service API".
Related Topics
• REST APIs
• Security Credentials
• Software Development Kits and Command Line Interface
• UpdateVmCluster
• CreateDbHome
• UpdateDbHome
• DeleteDbHome
• CreateDatabase
• UpdateDatabase
• DeleteDatabase
• Database Service API
14-8
15
Patching and Updating an Exadata
Cloud@Customer System Manually
This topic describes the responsibilities and procedures for patching and updating
various components in Exadata Cloud@Customer.
Note:
For more guidance on achieving continuous service during patching
operations, see the Application Checklist for Continuous Service for MAA
Solutions white paper.
15-1
Chapter 15
Administering Software Images
are not maintained. Using an old software image means that you need to apply
patches to newly installed binaries to bring them up to date, which is unnecessarily
laborious and possibly prone to error.
Software image administration uses the dbaascli utility, which is part of the
cloud-specific tooling included in Exadata Cloud@Customer. To use the latest
enhancements, you should update to the latest version of the cloud tools. See Cloud
Tooling Update.
Note:
If you create a new database deployment in an existing Oracle Home
directory location, and if the default software image version is higher or
lower than the Oracle Home version, a check is made to know if the images
required for creating the database exist on Guest VM. If the image does not
exist, an internal command is issued by the cloud automation software to
download and use the required image from control plane server to Guest VM
to create the database.
When you create a new Oracle Home, it will be created with the RU that
is set as the default image for that Database version. If you want to create
a new Oracle Home with the RU that is higher or lower than the default
image, you first need to change the default image to match with the RU that
you want to create a new Oracle Home with by using Activating a Software
image.
15-2
Chapter 15
Administering Software Images
sudo -s
The command displays a list of software images that are downloaded to your
Exadata Cloud@Customer environment, including version and bundle patch
information.
4. Exit the root-user command shell:
exit
Related Topics
• Connecting to a Compute Node Through Secure Shell (SSH)
sudo -s
The command displays a list of available software images, including version and
bundle patch information that you can use to download the software image.
15-3
Chapter 15
Administering Software Images
For more information about viewing available Oracle Database software images,
see dbaascli cswlib list in chapter Using the dbaascli Utility on Exadata
Cloud@Customer.
4. Exit the root-user command shell:
exit
Related Topics
• Connecting to a Compute Node Through Secure Shell (SSH)
• dbaascli cswlib list
To view information about Oracle Database software images that are available
to download to your Exadata Cloud@Customer environment, use the command
dbaascli cswlib list.
sudo -s
exit
15-4
Chapter 15
Administering Software Images
Related Topics
• Connecting to a Compute Node Through Secure Shell (SSH)
sudo -s
exit
Related Topics
• Connecting to a Compute Node Through Secure Shell (SSH)
15-5
Chapter 15
Administering Software Images
WARNING:
If you delete an image that is not available on the Control Plane Server, you
may not be able to get it back. To check if the image you are planning to see
is available on the Control Plane Servers, use the dbaascli cswlib list
command. If the version you are purging is available on the Control Plane
Server, then you can use the dbaascli cswlib download command at a
later point in time to get the deleted image back.
sudo -s
exit
15-6
Chapter 15
Managing Oracle Database and Oracle Grid Infrastructure Patches
Related Topics
• Connecting to a Compute Node Through Secure Shell (SSH)
• Activating a Software Image
You can use the following procedure to activate a specific software image, making
it the default software image for the corresponding software release in your
Exadata Cloud@Customer environment.
The dbaascli utility provides a simple means for applying routine patches, which
Oracle periodically loads on to the Cloud Control Plane servers.
The dbaascli utility is part of the cloud-specific tooling bundle that is included with
Exadata Cloud@Customer. Therefore, before performing the following procedures,
ensure that you have the latest version of the cloud-specific tooling on all of the
compute nodes in the VM cluster by following the instructions in Cloud Tooling
Updates.
Related Topics
• Cloud Tooling Updates
You are responsible for updating the cloud-specific tooling included on the Exadata
Cloud@Customer Guest VMs.
15-7
Chapter 15
Managing Oracle Database and Oracle Grid Infrastructure Patches
sudo -s
In the preceding command, --oh specifies a compute node and Oracle home
directory for which you want to list the available patches. In this context, an Oracle
home directory can be an Oracle Database home directory or the Oracle Grid
Infrastructure home directory.
For example:
Note:
The list of available patches is determined by interrogating the database
to establish the patches that have already been applied. When a patch
is applied, the corresponding database entry is made as part of the
SQL patching operation, which is run at the end of the patch workflow.
Therefore, the list of available patches can include partially applied
patches along with patches that are currently being applied.
Related Topics
• Connecting to a Compute Node Through Secure Shell (SSH)
15-8
Chapter 15
Managing Oracle Database and Oracle Grid Infrastructure Patches
sudo -s
Related Topics
• Connecting to a Compute Node Through Secure Shell (SSH)
15-9
Chapter 15
Managing Oracle Database and Oracle Grid Infrastructure Patches
Apply a Patch
To apply patches for Oracle Exadata Cloud@Customer., use the dbaascli command.
Tip:
The default SSH configuration will close the terminal session after a few
minutes of inactivity, but some of the dbaascli patching commands (in
particular the patch db apply command) may take longer than the SSH
timeout. As a result, the terminal session where the patch db apply
command is running may be killed before the patching operation is complete
on all nodes.
To avoid this situation, use a utility like nohup or screen to avoid killing the
patching operation if the terminal connection is lost for any reason.
For example:
This example invokes the dbaascli command through the nohup wrapper
in the background, and redirects standard output and standard error to the
file apply_23456789.out. The command will keep running even if the
terminal gets killed. In that case, reconnect to the system and continue
monitoring apply_23456789.out for completion.
• Can be used to patch some or all of your compute nodes using one command.
• Coordinates multi-node patching in a rolling manner.
• Can run patch-related SQL after patching all the compute nodes in the cluster.
1. Connect to a compute node as the opc user.
For detailed instructions, see Connecting to a Compute Node Through Secure
Shell (SSH).
2. Start a root user command shell:
sudo -s
15-10
Chapter 15
Managing Oracle Database and Oracle Grid Infrastructure Patches
Related Topics
• Connecting to a Compute Node Through Secure Shell (SSH)
15-11
Chapter 15
Managing Oracle Database and Oracle Grid Infrastructure Patches
export ORACLE_HOME=/u02/app/oracle/product/12.1.0.2/dbhome_1
$ORACLE_HOME/OPatch/opatch lspatches
sudo -s
su - grid
$ORACLE_HOME/OPatch/opatch lspatches
Related Topics
• Connecting to a Compute Node Through Secure Shell (SSH)
15-12
Chapter 15
Managing Oracle Database and Oracle Grid Infrastructure Patches
• Can run rollback-related SQL after rolling back the patch on all the compute nodes
in the cluster.
1. Connect to a compute node as the opc user.
For detailed instructions, see Connecting to a Compute Node Through Secure
Shell (SSH).
2. Start a root user command shell:
sudo -s
15-13
Chapter 15
Manually Patching Oracle Database and Oracle Grid Infrastructure Software
Note:
– Only run rollback-related SQL after all of the compute nodes are
rolled back. If you are rolling back a node, and further nodes
remain to be rolled back, then do not specify this argument.
– You can only specify this argument as part of a rollback
operation on a compute node. If you have rolled back all of your
nodes, and you did not specify this argument, then you must
run the SQL commands associated with the rollback operation
manually. Refer to the patch documentation for full details.
For example:
Related Topics
• Connecting to a Compute Node Through Secure Shell (SSH)
15-14
Chapter 15
Updating the Guest VM Operating System
Related Topics
• https://support.oracle.com/epmos/faces/DocumentDisplay?
cmd=show&type=NOT&id=1929745.1
• https://support.oracle.com/epmos/faces/DocumentDisplay?
cmd=show&type=NOT&id=412160.1
15-15
Chapter 15
Updating the Guest VM Operating System
Note:
Customers who do not have My Oracle Support patch download privilege
may obtain the Exadata patchmgr update utility and recent Exadata
System Software releases using the Exadata Cloud@Customer Gen 2 utility
exadata_updates.sh. For more information, see My Oracle Support Doc
2730739.1.
The patchmgr utility manages the entire update of one or more compute nodes
remotely, including the pre-restart, restart, and post-restart steps of an Oracle Exadata
Cloud@Customer system.
You can run the utility either from one of your Oracle Exadata Cloud@Customer
compute nodes, or from another server running Oracle Linux. The server on which you
run the utility is known as the driving system. You cannot use the driving system to
update itself. Therefore, if the driving system is one of the compute nodes in a VM
cluster that you are updating, then you must run the patchmgr utility more than once.
The following scenarios describe typical ways of performing the updates:
• Non-Exadata Driving System
The simplest way to run the update the system is to use a separate Oracle Linux
server to update all compute nodes in one operation.
• Exadata Compute Node Driving System
You can use one compute node to drive the updates for the rest of the compute
nodes in the VM cluster. Then, you can use one of the updated nodes to drive the
update on the original driving system. For example, consider updating a half rack
system with four compute nodes; node1, node2, node3, and node4. You could first
use node1 to drive the updates of node2, node3, and node4. Then, you could use
node2 to drive the update of node1.
The driving system requires root user SSH access to each compute node being
updated.
The following procedure is based on an example that assumes the following:
• The system has two compute nodes, node1 and node2.
• The target Exadata software version is 18.1.4.0.0.180125.3.
• Each node is used as the driving system to update the other node.
1. Gather the environment details.
a. Using SSH, connect to node1 as root and run the following command to
determine the current Exadata software version:
15-16
Chapter 15
Updating the Guest VM Operating System
b. Switch to the grid user, and identify all nodes in the cluster.
su - grid
olsnodes
node1
node2
ls /root/.ssh/id_rsa*
ls: cannot access /root/.ssh/id_rsa*: No such file or directory
ssh-keygen -t rsa
Generating public/private rsa key pair.
Enter file in which to save the key (/root/.ssh/id_rsa):
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /root/.ssh/id_rsa.
Your public key has been saved in /root/.ssh/id_rsa.pub.
The key fingerprint is:
93:47:b0:83:75:f2:3e:e6:23:b3:0a:06:ed:00:20:a5
[email protected]
The key's randomart image is:
+--[ RSA 2048]----+
|o.. + . |
|o. o * |
|E . o o |
| . . = |
| o . S = |
| + = . |
| + o o |
| . . + . |
| ... |
+-----------------+
b. Distribute the public key to the target nodes, and verify this step. In the
example, the only target node is node2.
ls -al /tmp/id_rsa.node1.pub
-rw-r--r-- 1 opc opc 442 Feb 28 03:33 /tmp/id_rsa.node1.pub
date
Wed Feb 28 03:33:45 UTC 2018
15-17
Chapter 15
Updating the Guest VM Operating System
c. On the target node (node2 in the example), add the root public key of node1 to
the root authorized_keys file.
cd /root/patch/18.1.4.0.0.180125.3
unzip dbserver.patch.zip
Archive: p21634633_181400_Linux-x86-64.zip creating:
dbserver_patch_5.180228.2/
creating: dbserver_patch_5.180228.2/ibdiagtools/
inflating: dbserver_patch_5.180228.2/ibdiagtools/cable_check.pl
inflating: dbserver_patch_5.180228.2/ibdiagtools/setup-ssh
inflating: dbserver_patch_5.180228.2/ibdiagtools/VERSION_FILE
extracting: dbserver_patch_5.180228.2/ibdiagtools/xmonib.sh
inflating: dbserver_patch_5.180228.2/ibdiagtools/monitord
inflating: dbserver_patch_5.180228.2/ibdiagtools/checkbadlinks.pl
creating: dbserver_patch_5.180228.2/ibdiagtools/topologies/
inflating: dbserver_patch_5.180228.2/ibdiagtools/topologies/
VerifyTopologyUtility.pm
inflating: dbserver_patch_5.180228.2/ibdiagtools/topologies/
verifylib.pm
inflating: dbserver_patch_5.180228.2/ibdiagtools/topologies/
Node.pm
inflating: dbserver_patch_5.180228.2/ibdiagtools/topologies/
Rack.pm
inflating: dbserver_patch_5.180228.2/ibdiagtools/topologies/
Group.pm
inflating: dbserver_patch_5.180228.2/ibdiagtools/topologies/
Switch.pm
inflating: dbserver_patch_5.180228.2/ibdiagtools/topology-zfs
inflating: dbserver_patch_5.180228.2/ibdiagtools/dcli
creating: dbserver_patch_5.180228.2/ibdiagtools/netcheck/
inflating: dbserver_patch_5.180228.2/ibdiagtools/netcheck/
remoteScriptGenerator.pm
inflating: dbserver_patch_5.180228.2/ibdiagtools/netcheck/
CommonUtils.pm
inflating: dbserver_patch_5.180228.2/ibdiagtools/netcheck/
SolarisAdapter.pm
inflating: dbserver_patch_5.180228.2/ibdiagtools/netcheck/
LinuxAdapter.pm
inflating: dbserver_patch_5.180228.2/ibdiagtools/netcheck/
15-18
Chapter 15
Updating the Guest VM Operating System
remoteLauncher.pm
inflating: dbserver_patch_5.180228.2/ibdiagtools/netcheck/
remoteConfig.pm
inflating: dbserver_patch_5.180228.2/ibdiagtools/netcheck/
spawnProc.pm
inflating: dbserver_patch_5.180228.2/ibdiagtools/netcheck/
runDiagnostics.pm
inflating: dbserver_patch_5.180228.2/ibdiagtools/netcheck/
OSAdapter.pm
inflating: dbserver_patch_5.180228.2/ibdiagtools/
SampleOutputs.txt
inflating: dbserver_patch_5.180228.2/ibdiagtools/infinicheck
inflating: dbserver_patch_5.180228.2/ibdiagtools/ibping_test
inflating: dbserver_patch_5.180228.2/ibdiagtools/tar_ibdiagtools
inflating: dbserver_patch_5.180228.2/ibdiagtools/verify-topology
inflating: dbserver_patch_5.180228.2/installfw_exadata_ssh
creating: dbserver_patch_5.180228.2/linux.db.rpms/
inflating: dbserver_patch_5.180228.2/md5sum_files.lst
inflating: dbserver_patch_5.180228.2/patchmgr
inflating: dbserver_patch_5.180228.2/xcp
inflating: dbserver_patch_5.180228.2/ExadataSendNotification.pm
inflating: dbserver_patch_5.180228.2/ExadataImageNotification.pl
inflating: dbserver_patch_5.180228.2/kernelupgrade_oldbios.sh
inflating: dbserver_patch_5.180228.2/cellboot_usb_pci_path
inflating: dbserver_patch_5.180228.2/exadata.img.env
inflating: dbserver_patch_5.180228.2/README.txt
inflating: dbserver_patch_5.180228.2/exadataLogger.pm
inflating: dbserver_patch_5.180228.2/patch_bug_26678971
inflating: dbserver_patch_5.180228.2/dcli
inflating: dbserver_patch_5.180228.2/patchReport.py
extracting: dbserver_patch_5.180228.2/dbnodeupdate.zip
creating: dbserver_patch_5.180228.2/plugins/
inflating: dbserver_patch_5.180228.2/plugins/010-
check_17854520.sh
inflating: dbserver_patch_5.180228.2/plugins/020-
check_22468216.sh
inflating: dbserver_patch_5.180228.2/plugins/040-
check_22896791.sh
inflating: dbserver_patch_5.180228.2/plugins/000-check_dummy_bash
inflating: dbserver_patch_5.180228.2/plugins/050-
check_22651315.sh
inflating: dbserver_patch_5.180228.2/plugins/005-
check_22909764.sh
inflating: dbserver_patch_5.180228.2/plugins/000-check_dummy_perl
inflating: dbserver_patch_5.180228.2/plugins/030-
check_24625612.sh
inflating: dbserver_patch_5.180228.2/patchmgr_functions
inflating: dbserver_patch_5.180228.2/exadata.img.hw
inflating: dbserver_patch_5.180228.2/libxcp.so.1
inflating: dbserver_patch_5.180228.2/imageLogger
inflating: dbserver_patch_5.180228.2/ExaXMLNode.pm
inflating: dbserver_patch_5.180228.2/fwverify
f. In the directory that contains the patchmgr utility, create the dbs_group file,
which contains the list of compute nodes to update. Include the nodes listed
15-19
Chapter 15
Updating the Guest VM Operating System
after running the olsnodes command in step 1, except for the driving system.
In this example, dbs_group only contains node2.
cd /root/patch/18.1.4.0.0.180125.3/dbserver_patch_5.180228
cat dbs_group
node2
Note:
Run the precheck operation with the -nomodify_at_prereq option to
prevent any changes to the system that could impact the backup you
take in the next step. Otherwise, the backup might not be able to roll the
system back to its original state, should it be necessary.
********************************************************************
****************************************
NOTE patchmgr release: 5.180228 (always check MOS 1553103.1 for
the latest release of dbserver.patch.zip)
NOTE
WARNING Do not interrupt the patchmgr session.
WARNING Do not resize the screen. It may disturb the screen layout.
WARNING Do not reboot database nodes during update or rollback.
WARNING Do not open logfiles in write mode and do not try to alter
them.
********************************************************************
****************************************
2018-02-28 21:22:45 +0000 :Working: DO: Initiate precheck on
1 node(s)
2018-02-28 21:24:57 +0000 :Working: DO: Check free space and
verify SSH equivalence for the root user to node2
2018-02-28 21:26:15 +0000 :SUCCESS: DONE: Check free space
and verify SSH equivalence for the root user to node2
2018-02-28 21:26:47 +0000 :Working: DO: dbnodeupdate.sh
running a precheck on node(s).
2018-02-28 21:28:23 +0000 :SUCCESS: DONE: Initiate precheck
on node(s).
15-20
Chapter 15
Updating the Guest VM Operating System
Note:
Ensure that you take the backup at this point, before any modifications
are made to the system.
********************************************************************
****************************************
NOTE patchmgr release: 5.180228 (always check MOS 1553103.1 for
the latest release of dbserver.patch.zip)
NOTE
WARNING Do not interrupt the patchmgr session.
WARNING Do not resize the screen. It may disturb the screen layout.
WARNING Do not reboot database nodes during update or rollback.
WARNING Do not open logfiles in write mode and do not try to alter
them.
********************************************************************
****************************************
2018-02-28 21:29:00 +0000 :Working: DO: Initiate backup on 1
node(s).
2018-02-28 21:29:00 +0000 :Working: DO: Initiate backup on
node(s)
2018-02-28 21:29:01 +0000 :Working: DO: Check free space and
verify SSH equivalence for the root user to node2
2018-02-28 21:30:18 +0000 :SUCCESS: DONE: Check free space
and verify SSH equivalence for the root user to node2
2018-02-28 21:30:51 +0000 :Working: DO: dbnodeupdate.sh
running a backup on node(s).
2018-02-28 21:35:50 +0000 :SUCCESS: DONE: Initiate backup on
node(s).
2018-02-28 21:35:50 +0000 :SUCCESS: DONE: Initiate backup on
1 node(s).
5. Remove all custom RPMs from the target compute nodes. Custom RPMs are
reported in precheck results. They include RPMs that were manually installed after
the system was provisioned.
• If you are updating the system from version 12.1.2.3.4.170111, and the
precheck results include krb5-workstation-1.10.3-57.el6.x86_64, then
remove it. This item is considered a custom RPM for this version.
15-21
Chapter 15
Updating the Guest VM Operating System
********************************************************************
****************************************
NOTE patchmgr release: 5.180228 (always check MOS 1553103.1 for
the latest release of dbserver.patch.zip)
NOTE
NOTE Database nodes will reboot during the update process.
NOTE
WARNING Do not interrupt the patchmgr session.
WARNING Do not resize the screen. It may disturb the screen layout.
WARNING Do not reboot database nodes during update or rollback.
WARNING Do not open logfiles in write mode and do not try to alter
them.
********************************************************************
*************************************
2018-02-28 21:36:26 +0000 :Working: DO: Initiate prepare
steps on node(s).
2018-02-28 21:36:26 +0000 :Working: DO: Check free space and
verify SSH equivalence for the root user to node2
2018-02-28 21:37:44 +0000 :SUCCESS: DONE: Check free space
and verify SSH equivalence for the root user to node2
2018-02-28 21:38:43 +0000 :SUCCESS: DONE: Initiate prepare
steps on node(s).
2018-02-28 21:38:43 +0000 :Working: DO: Initiate update on 1
node(s).
2018-02-28 21:38:43 +0000 :Working: DO: Initiate update on
node(s)
2018-02-28 21:38:49 +0000 :Working: DO: Get information
about any required OS upgrades from node(s).
2018-02-28 21:38:59 +0000 :SUCCESS: DONE: Get information
about any required OS upgrades from node(s).
2018-02-28 21:38:59 +0000 :Working: DO: dbnodeupdate.sh
running an update step on all nodes.
2018-02-28 21:48:41 +0000 :INFO : node2 is ready to reboot.
2018-02-28 21:48:41 +0000 :SUCCESS: DONE: dbnodeupdate.sh
running an update step on all nodes.
2018-02-28 21:48:41 +0000 :Working: DO: Initiate reboot on
node(s)
15-22
Chapter 15
Updating the Guest VM Operating System
7. After the update operation completes, verify the version of the Exadata software
on the compute node that was updated.
imageinfo -ver
18.1.4.0.0.180125.3
8. Repeat steps 2 through 7 of this procedure using the updated compute node as
the driving system to update the remaining compute node. In this example update,
you would now use node2 to update node1.
9. As root On each compute node, run the uptrack-install command to install the
available ksplice updates.
uptrack-install --all -y
uptrack-install --all -y
Related Topics
• https://support.oracle.com/epmos/faces/DocumentDisplay?
cmd=show&type=NOT&id=2730739.1
• https://support.oracle.com/epmos/faces/DocumentDisplay?
cmd=show&type=NOT&id=1553103.1
• https://support.oracle.com/epmos/faces/DocumentDisplay?
cmd=show&type=NOT&id=21634633
15-23
Chapter 15
Cloud Tooling Updates
because additional software packages add new dependencies that can interrupt an
Oracle Exadata update. For this reason, Oracle recommends that you minimize
customization.
If you install additional packages, then Oracle recommends that you have scripts to
automate the removal and reinstallation of those packages. After an Oracle Exadata
update, if you install additional packages, then verify that the additional packages are
still compatible, and that you still need these packages.
For more information, refer to Oracle Exadata Database Machine Maintenance Guide.
Related Topics
• Installing, Updating and Managing Non-Oracle Software
Note:
You can update the cloud-specific tooling by downloading and applying a
software package containing the updated tools.
sudo -s
3. Run the following command to display information about the installed cloud
tooling, and to list the available updates:
15-24
Chapter 15
Cloud Tooling Updates
• The version of the cloud tooling that is installed on the compute node.
• The list of available updates.
• Notification of the cloud tooling version that is installed on the other compute
nodes in the VM cluster.
Related Topics
• Connecting to a Compute Node Through Secure Shell (SSH)
sudo -s
15-25
16
Managing Exadata Resources with Oracle
Enterprise Manager Cloud Control
To manage and monitor Exadata Cloud and Exadata Cloud@Customer resources, use
Oracle Enterprise Manager Cloud Control.
For complete documentation and Oracle By Example tutorials, see the following
documentation resources: Oracle Enterprise Manager Cloud Control for Oracle
Exadata Cloud and Setting Up Oracle Enterprise Manager 13.4 on Oracle Cloud
Infrastructure.
• Overview of Oracle Enterprise Manager Cloud Control
Oracle Enterprise Manager Cloud Control provides a complete lifecycle
management solution for Oracle Cloud Infrastructure's Exadata Cloud and
Exadata Cloud@Customer services.
• Features of Enterprise Manager Cloud Control
Familiarize yourself with the features of Enterprise Manager Cloud Control to
manage and monitor Exadata Cloud and Exadata Cloud@Customer resources.
Related Topics
• Oracle Enterprise Manager Cloud Control for Oracle Exadata Cloud
• Setting Up Oracle Enterprise Manager 13.4 on Oracle Cloud Infrastructure
16-1
Chapter 16
Features of Enterprise Manager Cloud Control
Visualization
Enterprise Manager Cloud Control allows you to visualize the database and related
targets associated with each Exadata Cloud and Exadata Cloud@Customer system.
16-2
17
Exadata Cloud@Customer Gen1 to Out-
of-Place Cloud Upgrade to Exadata
Cloud@Customer Gen2 Infrastructure
17-1
Chapter 17
Scope for Exadata Cloud@Customer Gen1 to Gen2 Out-of-Place Cloud Upgrade
17-2
Chapter 17
Hardware and Software Required for Out-of-Place Cloud Upgrade to New Exadata Cloud@Customer X8M Gen2 Infrastructure
Cloud@Customer gen2 for the Guest VM operating system and Oracle Grid
Infrastructure.
Note that the following are not in scope for the out-of-place cloud upgrade to new gen2
hardware:
• Exadata Cloud@Customer Gen1 deployment using Exadata Cloud@Customer
Gen1 features not yet available on Gen2 are not expected to use the upgrade
procedures until the relevant feature or equivalent is available on Gen2.
• Only Exadata Cloud@Customer upgrade is in scope as part of the procedure
here. Upgrade or migration of OCC itself is not in the scope.
• You can reverse the upgrade until both the primary and secondary hardware is
at your site. Loss of data is possible depending on the application usage and
cutover time. Once the Exadata Cloud@Customer Gen1 hardware is shipped back
to Oracle, you cannot reverse the upgrade and you cannot revert to Exadata
Cloud@Customer Gen1 as well.
17-3
Chapter 17
Using Oracle Zero Downtime Migration (ZDM) to Migrate Oracle Databases
– The upgrade will require minimum versions of the software stack so prior to
the upgrade, install the appropriate version of Oracle Grid Infrastructure on the
target Exadata Cloud@Customer Gen2 infrastructure.
– Oracle Database versions supported on Exadata Cloud@Customer Gen1 will
continue to be supported. On the target Gen2 infrastructure, install appropriate
versions of the Oracle Database software and the one-off patches that exist in
the source database.
– Complete all requirements for ZDM servers in terms of installation,
configuration, network access, and SSH access.
• Security
– Exadata Cloud@Customer Gen2 does not use Oracle Advanced Support
Gateway Security (OASG) so cannot request OASG logs.
• Ensure that automatic backup is not configured on the Gen2 target prior to
migration.
Related Topics
• Preparing for Exadata Cloud@Customer
• Prepare a Host for Zero Downtime Migration Software Installation
• Best Practices for Out-of-Place Cloud Upgrade to New Exadata Cloud@Customer
X8M Gen2 Infrastructure
For the purpose of the upgrade, the recommended tool to use is Oracle Zero
Downtime Migration (ZDM).
Online Migration: In Online migration, ZDM uses RMAN to complete a full backup/
restore of the database to the target, and then automatically sets up a Data Guard
configuration between the source and target databases. The customer can pause
the migration in a "live" manner, that is, pause the ZDM operation while the source
as Primary and target as Standby are in continuous sync. At the desired time, the
customer can resume the migration to allow a switchover between the source and
the target so that the target database becomes the Primary and the source database
becomes a Standby. Online migration requires that there be direct or indirect (through
bastion) sqlnet connectivity between the source and target databases.
17-4
Chapter 17
Using Oracle Zero Downtime Migration (ZDM) to Migrate Oracle Databases
-rsp /home/giusr/zdm_offline_18c.rsp \
17-5
Chapter 17
Using Oracle Zero Downtime Migration (ZDM) to Migrate Oracle Databases
TGT_DB_UNIQUE_NAME=z19tgt1_uniq
MIGRATION_METHOD=BACKUP_RESTORE_NFS
PLATFORM_TYPE=EXACC
SRC_HTTP_PROXY_URL=
SRC_HTTP_PROXY_PORT=
SRC_CONFIG_LOCATION=
SRC_BASTION_HOST_IP=
SRC_BASTION_PORT=
SRC_BASTION_USER=
SRC_BASTION_IDENTITY_FILE=
SRC_TIMEZONE=
SRC_OSS_PROXY_HOST=
SRC_OSS_PROXY_PORT=
SRC_SSH_RETRY_TIMEOUT=
TGT_HTTP_PROXY_URL=
TGT_HTTP_PROXY_PORT=
TGT_CONFIG_LOCATION=
TGT_BASTION_HOST_IP=
TGT_BASTION_PORT=
TGT_BASTION_USER=
TGT_BASTION_IDENTITY_FILE=
TGT_HOST_IP=
TGT_SSH_TUNNEL_PORT=
TGT_SSH_RETRY_TIMEOUT=
TGT_OSS_PROXY_HOST=
TGT_OSS_PROXY_PORT=
TGT_DATADG=+DATAC2
TGT_REDODG=+RECOC2
TGT_RECODG=+RECOC2
TGT_DATAACFS=
TGT_REDOACFS=
TGT_RECOACFS=
BACKUP_PATH=/zdmnfs/
HOST=
OPC_CONTAINER=
SRC_ZDLRA_WALLET_LOC=
TGT_ZDLRA_WALLET_LOC=
ZDLRA_CRED_ALIAS=
SKIP_FALLBACK=TRUE
TGT_RETAIN_DB_UNIQUE_NAME=
TGT_SKIP_DATAPATCH=FALSE
MAX_DATAPATCH_DURATION_MINS=
DATAPATCH_WITH_ONE_INSTANCE_RUNNING=
SHUTDOWN_SRC=
SKIP_SRC_SERVICE_RETENTION=
SRC_RMAN_CHANNELS=6
TGT_RMAN_CHANNELS=16
ZDM_LOG_OSS_PAR_URL=
ZDM_BACKUP_FULL_SRC_MONITORING_INTERVAL=10
ZDM_BACKUP_INCREMENTAL_SRC_MONITORING_INTERVAL=10
ZDM_BACKUP_DIFFERENTIAL_SRC_MONITORING_INTERVAL=10
ZDM_CLONE_TGT_MONITORING_INTERVAL=10
ZDM_OSS_RESTORE_TGT_MONITORING_INTERVAL=10
17-6
Chapter 17
Using Oracle Zero Downtime Migration (ZDM) to Migrate Oracle Databases
ZDM_OSS_RECOVER_TGT_MONITORING_INTERVAL=10
ZDM_BACKUP_RETENTION_WINDOW=
ZDM_OPC_RETRY_WAIT_TIME=
ZDM_OPC_RETRY_COUNT=
ZDM_SRC_TNS_ADMIN=
ZDM_CURL_LOCATION=
ZDM_USE_EXISTING_UNDO_SIZE=
ZDM_SKIP_DG_CONFIG_CLEANUP=
ZDM_RMAN_COMPRESSION_ALGORITHM=LOW
Note:
To control and manage the migration steps, we strongly recommend
pausing the migration job. To add the pause, include the parameter -
pauseafter in your ZDM migration command zdmcli migrate database
-pauseafter ZDM_CONFIGURE_DG_SRC. For more information, see https://
support.oracle.com/epmos/faces/DocContentDisplay?id=2562063.1.
-rsp /home/giusr/zdm_online_18c.rsp \
17-7
Chapter 17
Using Oracle Zero Downtime Migration (ZDM) to Migrate Oracle Databases
TGT_DB_UNIQUE_NAME=z19tgt1_uniq
MIGRATION_METHOD=DG_STORAGEPATH
PLATFORM_TYPE=EXACC
SRC_HTTP_PROXY_URL=
SRC_HTTP_PROXY_PORT=
SRC_CONFIG_LOCATION=
SRC_BASTION_HOST_IP=
SRC_BASTION_PORT=
SRC_BASTION_USER=
SRC_BASTION_IDENTITY_FILE=
SRC_TIMEZONE=
SRC_OSS_PROXY_HOST=
SRC_OSS_PROXY_PORT=
SRC_SSH_RETRY_TIMEOUT=
TGT_HTTP_PROXY_URL=
TGT_HTTP_PROXY_PORT=
TGT_CONFIG_LOCATION=
TGT_BASTION_HOST_IP=
TGT_BASTION_PORT=
TGT_BASTION_USER=
TGT_BASTION_IDENTITY_FILE=
TGT_HOST_IP=
TGT_SSH_TUNNEL_PORT=
TGT_SSH_RETRY_TIMEOUT=
TGT_OSS_PROXY_HOST=
TGT_OSS_PROXY_PORT=
TGT_DATADG=+DATAC2
TGT_REDODG=+RECOC2
TGT_RECODG=+RECOC2
TGT_DATAACFS=
TGT_REDOACFS=
17-8
Chapter 17
During Out-of-Place Cloud Upgrade to New Exadata Cloud@Customer X8M Gen2 Infrastructure
TGT_RECOACFS=
BACKUP_PATH=/zdmnfs/
HOST=
OPC_CONTAINER=
SRC_ZDLRA_WALLET_LOC=
TGT_ZDLRA_WALLET_LOC=
ZDLRA_CRED_ALIAS=
SKIP_FALLBACK=TRUE
TGT_RETAIN_DB_UNIQUE_NAME=
TGT_SKIP_DATAPATCH=FALSE
MAX_DATAPATCH_DURATION_MINS=
DATAPATCH_WITH_ONE_INSTANCE_RUNNING=
SHUTDOWN_SRC=
SKIP_SRC_SERVICE_RETENTION=
SRC_RMAN_CHANNELS=6
TGT_RMAN_CHANNELS=16
ZDM_LOG_OSS_PAR_URL=
ZDM_BACKUP_FULL_SRC_MONITORING_INTERVAL=10
ZDM_BACKUP_INCREMENTAL_SRC_MONITORING_INTERVAL=10
ZDM_BACKUP_DIFFERENTIAL_SRC_MONITORING_INTERVAL=10
ZDM_CLONE_TGT_MONITORING_INTERVAL=10
ZDM_OSS_RESTORE_TGT_MONITORING_INTERVAL=10
ZDM_OSS_RECOVER_TGT_MONITORING_INTERVAL=10
ZDM_BACKUP_RETENTION_WINDOW=
ZDM_OPC_RETRY_WAIT_TIME=
ZDM_OPC_RETRY_COUNT=
ZDM_SRC_TNS_ADMIN=
ZDM_CURL_LOCATION=
ZDM_USE_EXISTING_UNDO_SIZE=
ZDM_SKIP_DG_CONFIG_CLEANUP=
ZDM_RMAN_COMPRESSION_ALGORITHM=LOW
Related Topics
• https://support.oracle.com/epmos/faces/DocContentDisplay?id=2562063.1
• Introduction to Zero Downtime Migration
• Setting Up Zero Downtime Migration Software
• Preparing for Database Migration
• Migrating Your Database with Zero Downtime Migration
17-9
Chapter 17
Post Out-of-Place Cloud Upgrade to New Exadata Cloud@Customer X8M Gen2 Infrastructure
Note:
The software stack will be upgraded to the latest versions at that point in time
when you perform Out-of-Place Cloud Upgrade to New Gen2 Hardware.
Patching: The infrastructure patching process and notification are different in Gen2.
For more information, see Maintaining an Exadata Cloud@Customer System.
Note:
Post-migration to Exadata Cloud@Customer Gen2, Oracle recommends
using supported backup methods for Exadata Cloud@Customer Gen2. It's
your responsibility to manually manage any backups to the Gen1 Oracle
Cloud At Customer (OCC) Object Storage Service (OSS), and Oracle does
not offer it through the OCI Console, API, or CLI.
Related Topics
• Maintaining an Exadata Cloud@Customer System
17-10
Chapter 17
Best Practices for Out-of-Place Cloud Upgrade to New Exadata Cloud@Customer X8M Gen2 Infrastructure
– Offline using an NFS storage or Zero Data Loss Recovery Appliance (ZDLRA)
– Or, online using Data Guard with an NFS storage or ZDLRA
Note:
It is not recommended to use either Gen1 Oracle Cloud At Customer
OSS or OCI Object Storage for this migration.
17-11
Chapter 17
Out-of-Place Cloud Upgrade to New Exadata Cloud@Customer X8M Gen2 Infrastructure Known Issues
17-12
18
Using the dbaascli Utility on Exadata
Cloud@Customer
Learn to use the dbaascli utility on Exadata Cloud@Customer.
18-1
Chapter 18
18-2
Chapter 18
About Using the dbaascli Utility on Exadata Cloud@Customer
18-3
Chapter 18
dbaascli cpuscale get_status
You must use DBaaS console or command-line interface to scale resources. The
capabilities of the dbaascli utility are in addition to, and separate from, the Oracle
Cloud Infrastructure Console, API, or command-line interface (CLI).
To use the utility, you must be connected to an Exadata Cloud@Customer compute
node. See "Connecting to a Compute Node with SSH".
Many dbaascli commands can be run as the oracle user. However, some commands
require root administrator privileges.
Prerequisites
Run the command as the root user.
Syntax
Displays various command execution states as it progresses from scheduled,
running, and finally to success or failure.
Prerequisites
Run the command as the root user.
18-4
Chapter 18
dbaascli cswlib download
Syntax
Exadata Cloud@Customer is considered to be in a "Disconnected" mode when there
is a loss of connectivity with the DBaaS control plane running on Oracle Cloud
Infrastructure (OCI).
In the command, coreCount specifies the number of CPUs that you want to scale up or
down per VM in a cluster. Optionally, you can include a message for your reference.
Prerequisites
Run the command as the root user.
Syntax
In the command:
• software_version specifies an Oracle Database software version. For example,
11204, 12102, 12201, 18000, 19000.
• software_bp identifies a bundle patch release. For example, APR2018, JAN2019,
OCT2019, and so on.
• --bp_update optionally indicates whether the downloaded software image
becomes the current default software image. Default is no.
• --cdb optionally specifies whether the downloaded software image supports the
Oracle multitenant architecture. Default is yes. If you specify --cdb no, then
a separate software image is downloaded that contains binaries to support non-
container databases (non-CDB).
• download_location optionally specifies the location of the software image library.
The location is specified as a uniform resource identifier (URI) to a cloud storage
container that contains available software images.
Normally, the --oss_uri option is not required because the location of the
software image library is automatically derived from configuration information
in the Exadata Cloud@Customer environment. However, if you experience any
difficulties with the automatic location, you can lodge a service request (SR) with
Oracle Support and they may instruct you to use this option to specify an alternate
location.
18-5
Chapter 18
dbaascli cswlib list
Related Topics
• Connecting to a Compute Node with SSH
Prerequisites
Run the command as the root user.
Syntax
The command displays a list of available software images, including version and
bundle patch information that you can use to download the software image.
The --oss_uri option can be used to specify the location of the software image
library. Normally, the --oss_uri option is not required because the location of the
software image library is automatically derived from configuration information in the
Exadata Cloud@Customer environment. However, if you experience any difficulties
with the automatic location, you can lodge a service request (SR) with Oracle Support
and they may instruct you to use this option to specify an alternate location. The
download_location is specified as a uniform resource identifier (URI) to a cloud
storage container that contains available software images.
Related Topics
• Connecting to a Compute Node with SSH
Prerequisites
Run the command as the oracle user.
To use the utility, you must be connected to an Exadata Cloud@Customer compute
node.
See "Connecting to a Compute Node with SSH".
Syntax
In the command, dbname specifies the name of the database that you want to act on.
18-6
Chapter 18
dbaascli database changepassword
Options
The dbname option of database bounce specifies the name of the database that you
want to shut down and restart. The dbname option is prefixed with two minus signs (--).
Usage Notes
The command performs a database shutdown in immediate mode. The database is
then restarted and opened. In Oracle Database 12c or later, all of the PDBs are also
opened.
Example 18-1 Shut Down and Restart the Database
In the following command, you shut down and restart the database sales1
Related Topics
• Connecting to a Compute Node with SSH
Prerequisites
Run the command as the root user.
Syntax
In the command, dbname specifies the name of the database that you want to act on.
Options
The dbname option of database changepassword specifies the name of the database
that you want to shut down and restart. The dbname option is prefixed with two minus
signs (--).
Usage Notes
Enter the database user name and new password when prompted.
18-7
Chapter 18
dbaascli database move
Prerequisites
• Before performing a move operation, ensure that all of the database instances
associated with the database are up and running.
• Run the command as the root user.
Syntax
In the command:
• dbname specifies the name of the database that you want to move.
• oraclehome specifies the path to an existing Oracle Home directory location, which
you want the specified database to use.
Prerequisites
Run the command as the Oracle user.
Syntax
In the command, dbname specifies the name of the database that you want to start.
Usage Notes
The command starts and opens the database. In Oracle Database 12c or later, all of
the PDBs are also opened.
Prerequisites
Run the command as the Oracle user.
18-8
Chapter 18
dbaascli database stop
Syntax
In the command, dbname specifies the name of the database for which you want to
check the status.
Usage Notes
Output from the command includes the open mode of the database, the software
release and edition of the database, and release version of other software
components.
Prerequisites
Run the command as the Oracle user.
Syntax
In the command, dbname specifies the name of the database that you want to stop.
Usage Notes
The command performs a database shutdown in immediate mode. No new
connections or new transactions are permitted. Active transactions are rolled back,
and all connected users are disconnected.
Prerequisites
For all options, run the command as the root user.
Note:
Modifying the db_unique_name for databases with Data Guard associations,
primary or standby, is not supported.
18-9
Chapter 18
dbaascli dbhome info
In the command, dbname specifies the name of the database that you want to update
and dbname_uniquename specifies the user configurable portion of the new globally
unique database name.
The command modifies the DB_UNIQUE_NAME database parameter and related
configuration entries that reference it, including entries in the Oracle Cluster Registry
(OCR) and database server parameter file (SPFILE). File locations that reference the
globally unique database name are also updated, including the location of the data
files and keystore.
The value for the --db_unique_name option must begin with the dbname value, followed
by an underscore character. If you do not use this convention, then the command fails
with an error .
To ensure that the update can proceed before you perform the update operation, you
can use the option --precheck to run a series of prerequisite checks. No changes are
made when using the --precheck option.
Before performing the update operation, you can use the --precheck option to run a
series of prerequisite checks to ensure that the update can proceed. No changes are
made when you use the --precheck option.
Prerequisites
Run the command as root user.
Syntax
When prompted:
18-10
Chapter 18
dbaascli dbhome purge
• Press Enter to view information about all of the Oracle homes that are registered
in the VM cluster.
• To view information about a particular Oracle home, specify an Oracle home
name.
Prerequisite
Run the command as the root user.
Syntax
Options
When prompted, enter:
• 1 to specify the Oracle home name for the location being purged.
• 2 to specify the Oracle home directory path for the location being purged.
When next prompted, enter the Oracle home name or directory path for the location
being purged. If your entries are valid, and the Oracle home is not associated with
a database, then the Oracle binaries are removed from the Oracle home directory
location. The associated metadata is also removed from the system.
Prerequisites
Run the command as the root user.
Syntax
Usage Notes
The command displays a list of software images that are downloaded to your Exadata
Cloud@Customer environment, including version and bundle patch information.
18-11
Chapter 18
dbaascli listener bounce
Prerequisites
Run the dbaascli listener bounce command as the oracle user.
Syntax
In the preceeding command dbname specifies the name of the database that you want
to stop and restart.
Prerequisites
Run the dbaascli listener start command as the oracle user:
Syntax
In the preceeding command dbname specifies the name of the database that you want
to move.
Prerequisites
Run the command as the oracle user.
Syntax
In the command, dbname specifies the name of the database whose listener you want
to stop.
18-12
Chapter 18
dbaascli listener stop
Prerequisites
Run the command as the oracle user.
Syntax
In the command, dbname specifies the name of the database whose listener you want
to stop.
Prerequisites
Run the command as the root user.
Syntax
You can use this command to apply an Oracle Database or Oracle Grid Infrastructure
patch.
To apply a patch to a specific instance, use the following command:
To apply a patch by specifying only database names, use the following command:
18-13
Chapter 18
dbaascli patch db apply
To learn more about the patch db apply command options, use the following
command:
Usage Notes
• Patch-related SQL should only be run after all of the compute nodes are patched.
Take care not to specify this argument if you are patching a node and further
nodes remain to be patched.
• This argument can only be specified along with a patching operation on a compute
node. If you have patched all of your nodes and you did not specify this argument,
you need to manually execute the SQL commands associated with the patch,
which typically involves running the catbundle.sql script for Oracle Database
11g or the datapatch utility for Oracle Database 12c, or later. Refer to the patch
documentation for full details.
18-14
Chapter 18
dbaascli patch db list
Prerequisites
Run the command as the root user.
Syntax
Usage Notes
The list of available patches is determined by interrogating the database to
establish the patches that have already been applied. When a patch is applied, the
corresponding database entry is made as part of the SQL patching operation, which
is run at the end of the patch workflow. Therefore, the list of available patches may
include partially applied patches along with patches that are currently being applied.
Prerequisites
You must run the command as the root user.
Syntax
To check patch prerequisites on a specific instance, use the following command:
dbaascli patch db prereq --patchid patchid --instance1
hostname:oracle_home [--dbnames dbname[,dbname2 ...]]
To check patch prerequisites by specifying only database names, use the following
command:
dbaascli patch db prereq --patchid patchid --dbnames dbname[,dbname2 ...]
[-alldbs]
In the preceding commands:
• patchid identifies the patch identifier for which you want prerequisites to be
checked before installing the patch.
• --instance1 specifies a compute node and Oracle home directory on which you
want the prerequisite checks to be performed. In this context, an Oracle home
18-15
Chapter 18
dbaascli patch db switchback
directory can be an Oracle Database home directory, or it can be the Oracle Grid
Infrastructure home directory.
• --dbnames specifies the database names for the databases on which you want
prerequisite checks to be performed.
• -alldbs specifies that you want to check all of the databases that share the same
Oracle home (the same Oracle Database binaries) as the specified databases.
Prerequisites
You must run the command as the root user.
Syntax
To roll back a patch on specific instances, use the following command syntax:
To roll back a patch by specifying only database names, use the following command:
dbaascli patch db switchback --patchid patchid --dbnames
dbname[,dbname2 ...] [--run_datasql 1] [-alldbs]
In the preceding commands:
• patchid identifies the patch to be rolled back.
• --instance1 specifies a compute node and Oracle Home directory that is subject
to the rollback operation. In this context, an Oracle home directory can be an
Oracle Database home directory or the Oracle Grid Infrastructure home directory.
If you use this argument to specify a shared Oracle home directory, and you do not
specify the --dbnames argument, then all of the databases that share the specified
Oracle home are rolled back.
• --dbnames specifies the database names for the databases that are the target of
the rollback operation.
• -alldbs specifies that you want to roll back all of the databases that share the
same Oracle Database binaries (Oracle home) as the databases specified in the
--dbnames argument.
• --run_datasql 1 instructs the command to run rollback-related SQL commands.
Usage Notes
• You can only run rollback-related SQL after all of the compute nodes are rolled
back. Take care not to specify this argument if you are rolling back a node, and
further nodes remain to be rolled back.
• You can only specify this argument with a rollback operation on a compute node.
Therefore, if you have rolled back all of your nodes, and you did not specify this
18-16
Chapter 18
dbaascli patch tools apply
argument, then you must manually run the SQL commands associated with the
rollback operation. Refer to the patch documentation for full details.
Prerequisite
Run the command as the root user.
Syntax
• To update to the latest available cloud tooling, use the command:
Usage Notes
The cloud tooling update is applied to all nodes in the VM cluster.
Prerequisites
Run the command as the root user.
Syntax
Usage Notes
The command output displays:.
• The version of the cloud tooling that is installed on the compute node.
• The list of available updates.
• Notification of the cloud tooling version that is installed on the other compute
nodes in the VM cluster.
18-17
Chapter 18
dbaascli pdb checkdb
Prerequisites
Run the command as the oracle user.
Syntax
Options
In the command, dbname specifies the name of the CDB for which you want to display
information.
Usage Notes
The information returned by this command includes the number of instances, and the
CPU count that is associated with the CDB.
Prerequisites
Run the command as the oracle user.
Syntax
Options
In the command:
• nodenum specifies the node number for a compute node in the Exadata
Cloud@Customer environment. You can display a list of compute nodes and
corresponding node numbers by using the olsnodes command.
• dbname specifies the name of the container database that hosts the PDB.
Usage Notes
The command displays statuses for all PDBs that are associated with the specified
compute node and CDB, including the open mode for each PDB.
18-18
Chapter 18
dbaascli pdb checkpdb
Prerequisites
Run the command as the oracle user.
Syntax
Options
In the command:
• pdbname specifies the name of the PDB that you want to check.
• dbname specifies the name of the container database that hosts the PDB.
Usage Notes
The command displays the status for the specified PDB, including the open mode and
restricted status.
Prerequisite
Run the command as the oracle user.
Syntax
Options
In the command:
• pdbname specifies the name of the PDB that you want to close.
• dbname specifies the name of the container database that hosts the PDB.
Usage Notes
Upon successful completion of running this command, the PDB is closed on all of the
container database instances.
18-19
Chapter 18
dbaascli pdb connect_info
Prerequisite
Run the command as the oracle user.
Syntax
Options
In the command:
• pdbname specifies the name of the PDB for which you want to retrieve connection
information
• dbname specifies the name of the container database that hosts the PDB
Usage Notes
The command outputs a zip file that contains tnsnames.ora, sqlnet.ora, and ojdbcs
properties for the PDB.
Prerequisite
Run the command as the oracle user.
Syntax
Options
In the command:
• pdbname specifies the name of the PDB for which you want to display connect
string information
• dbname specifies the name of the container database that hosts the PDB
18-20
Chapter 18
dbaascli pdb create
Prerequisite
Run the command as the oracle user.
Syntax
Options
In the command:
• pdbname specifies the name of the new PDB that you want to create.
• dbname specifies the name of the container database that hosts the new PDB.
• maxsize optionally specifies the maximum total size of data files and temporary
files for tablespaces belonging to the PDB. Setting this option is effectively
the same as setting the MAXSIZE PDB storage clause in the CREATE PLUGGABLE
DATABASE SQL command. You can impose a limit by specifying an integer followed
by a size unit (K, M, G, or T), or you can specify UNLIMITED to explicitly enforce no
limit.
• maxcpu optionally specifies the maximum number of CPUs that are available to
the PDB. Setting this option is effectively the same as setting the CPU_COUNT
parameter in the PDB.
Usage Notes
During the PDB creation process, you are prompted to specify the administration
password for the new PDB.
Prerequisite
Run the command as the oracle user.
Syntax
Options
In the command:
• pdbname specifies the name of the PDB that you want to delete
18-21
Chapter 18
dbaascli pdb info
• dbname specifies the name of the container database that hosts the PDB
Prerequisite
Run the command as the oracle user.
Syntax
Options
In the command:
• pdbname optionally specifies the name of the PDB for which you want to display
information. If this you do not specify this option, then the command displays
information about all of the PDBs in the specified container database.
• dbname specifies the name of the container database that hosts the PDB.
Usage Notes
The command displays information such as the CPU count and storage usage that
is associated with a PDB. You can add the optional --detailed argument to display
extra information, including the list of compute nodes where a PDB is open in read/
write mode.
Prerequisite
Run the command as the oracle user.
Syntax
Options
In the command:
• sourcepdbname specifies the name of the PDB that you want to clone
• targetpdbname specifies the name of the new PDB that you want to create
• dbname specifies the name of the container database that hosts the PDBs
18-22
Chapter 18
dbaascli pdb open
Usage Notes
The newly cloned PDB inherits administration passwords from the source PDB.
Prerequisite
Run the command as the oracle user.
Syntax
Options
In the command:
• pdbname specifies the name of the PDB that you want to open
• dbname specifies the name of the container database that hosts the PDB.
Usage Notes
Upon successful completion, the PDB is opened on all of the container database
instances.
Prerequisite
Run the command as the oracle user.
Syntax
Options
In the command:
• pdbname specifies the name of the source PDB that you want to clone.
• sourcedbname specifies the name (DB_UNIQUE_NAME) of the CDB that hosts the
source PDB.
• sourcedbscan specifies the Single Client Access Name (SCAN) that is used to
connect to the source database.
• dbname specifies the name (DB_NAME) of the CDB that hosts the newly cloned PDB.
18-23
Chapter 18
dbaascli pdb rename
Usage Notes
When promoted, you must supply the SYS user password for the source PDB.
The newly cloned PDB inherits administration passwords from the source PDB. The
cloned PDB is named using the following format: dbname_sourcepdbname
This command is supported only for databases that are not in a Data Guard
configuration and use Oracle Database version 12.2.0.1, or later.
Prerequisite
Run the command as the oracle user.
Syntax
Options
In the command:
• oldname specifies the old name of the PDB that you want to rename
• newname specifies the new name of the PDB that you want to rename
• dbname specifies the name of the container database that hosts the PDB
Prerequisite
Run the command as the oracle user.
Syntax
Options
In the command:
• pdbname specifies the name of the new PDB that you want to modify
• dbname specifies the name of the container database that hosts the PDB
18-24
Chapter 18
dbaascli tde rotate masterkey
• maxsize optionally specifies the maximum total size of data files and temporary
files for tablespaces belonging to the PDB. Setting this option is effectively the
same as setting the MAXSIZE PDB storage clause in the CREATE PLUGGABLE
DATABASE SQL command. You can impose a limit by specifying an integer followed
by a size unit (K, M, G, or T), or you can specify UNLIMITED to explicitly enforce no
limit
• maxcpu optionally specifies the maximum number of CPUs that are available to
the PDB. Setting this option is effectively the same as setting the CPU_COUNT
parameter in the PDB.
Usage Notes
When you run the command, you must specify at least one of optional attributes,
--maxsize or --maxcpu. You can specify both optional attributes in one command.
Prerequisite
Run the command as the oracle user.
Syntax
Options
--dbname dbname specifies the name of the database that you want to act on.
Usage Notes
Enter the keystore password when prompted. The keystore password is initially set to
the administration password that you specified when you created the database.
Prerequisite
Run the command as the oracle user.
Syntax
Options
In the command, dbname specifies the name of the database that you want to check.
18-25
Chapter 18
dbaascli tde status
Usage Notes
Output from the command includes the type of keystore, and the status of the
keystore.
18-26
19
Monitoring and Managing Exadata Storage
Servers with ExaCLI
Learn to use the ExaCLI command-line utility to perform monitoring and management
functions on Exadata storage servers in the Exadata Cloud Service.
• About the ExaCLI Command
The ExaCLI command provides a subset of the commands found in the on-
premises Exadata command line utility.
• Exadata Storage Server Username and Password
You need a username and password to connect to the Exadata Storage Server.
• ExaCLI Command
Use ExaCLI (exacli) to configure cell, database node configuration, and objects
in the remote node environment, and to monitor your Exadata Cloud@Customer
services and objects.
• Connecting to a Storage Server with ExaCLI
To use ExaCLI on storage servers, you will need to know your target storage
server's IP address.
19-1
Chapter 19
ExaCLI Command
ExaCLI Command
Use ExaCLI (exacli) to configure cell, database node configuration, and objects in
the remote node environment, and to monitor your Exadata Cloud@Customer services
and objects.
Purpose
ExaCLI (exacli) enables you configure your Exadata Cloud@Customer system,
and to obtain real-time information about your Exadata Cloud Service. To obtain
information about the services and options on your system, run ExaCLI using the
monitoring command parameter that you require.
To obtain a list of the system monitoring parameters you can use with ExaCLI, run the
LIST parameter.
Syntax
exacli -c [username@]remotehost[:port]
[-l username]
[--xml]
[--cookie-jar filename]
[-e {command | 'command; command' | @batchfile}]
Options
Option Description
-c [username@]remotehost or --connect Specifies the remote node to which you want
[username@]remotehost[:port] to connect. ExaCLI prompts for the user name
if not specified.
-l username or --login-name username Specifies the user name to log into the
remote node. The preconfigured user is
cloud_user_clustername.
--xml Displays the output in XML format.
--cookie-jar [filename] Specifies the filename of the cookie jar to use.
If you do not specify a filename, then the
cookie is stored in a default cookie jar located
at HOME/.exacli/cookiejar, where HOME is
the home directory of the operating system
user running the exacli command.
The presence of a valid cookie allows
the ExaCLI user to run commands without
requiring the user to log in during subsequent
ExaCLI sessions.
19-2
Chapter 19
ExaCLI Command
Option Description
-e command or -e 'command[; command]' Specifies either the ExaCLI commands to run,
or -e @batchFile or a batch file. After running the commands,
ExaCLI quits.
If you are specifying multiple commands to
run, then enclose the commands in single
quotes to prevent the shell from interpreting
the semicolon.
To start an interactive ExaCLI session, omit
this command.
--cert-proxy proxy[:port] Specifies the proxy server that you want to
use when downloading certificates. If port is
omitted, then port 80 is used by default.
-n or --no-prompt Suppresses prompting for user input.
Command Parameters
To obtain information about objects and services on your system, use these ExaCLI
command parameters.
19-3
Chapter 19
ExaCLI Command
select object_name,
data_object_id from user_objects
where object_name = 'BIG_CENSUS';
OBJECT_NAME
DATA_OBJECT_ID
----------------------------------
------
BIG_CENSUS 29152
19-4
Chapter 19
ExaCLI Command
19-5
Chapter 19
ExaCLI Command
Usage Notes
• Notes for the --cookie-jar option:
19-6
Chapter 19
ExaCLI Command
– The user name and password are sent to the remote node for authentication.
On successful authentication, the remote node issues a cookie (the login
credentials) that is stored in the specified filename on the database node. If
filename is not specified, the cookie is stored in a default cookie jar located at
HOME/.exacli/cookiejar, where HOME is the home directory of the operating
system user running the ExaCLI command. For the opc user, the home is /
home/opc.
– The operating system user running the ExaCLI command is the owner of the
cookie jar file.
– A cookie jar can contain multiple cookies from multiple users on multiple
nodes in parallel sessions.
– Cookies are invalidated after 24 hours.
– If the cookie is not found or is no longer valid, ExaCLI prompts for the
password. The new cookie is stored in the cookie jar identified by filename, or
the default cookie jar if filename is not specified.
– Even without the --cookie-jar option, ExaCLI still checks for cookies from
the default cookie jar. However, if the cookie does not exist or is no longer
valid, the new cookie will not be stored in the default cookie jar if the --
cookie-jar option is not specified.
• Notes for the -e option:
– ExaCLI exits after running the commands.
– If specifying multiple commands to run, be sure to enclose the commands in
single quotes to prevent the shell from interpreting the semi-colon.
– The batch file is a text file that contains one or more ExaCLI commands to run.
• Notes for the -n (--no-prompt) option:
– If ExaCLI needs additional information from the user, for example, if ExaCLI
needs to prompt the user for a password (possibly because there were no
valid cookies in the cookie-jar) or to prompt the user to confirm the remote
node’s identity, then ExaCLI prints an error message and exits.
Examples
Example 19-1 Starting an Interactive ExaCLI Session on a Storage Server
This example shows the user on an Exadata compute node issuing the command to
log in to ExaCLI start an interactive ExaCLI session on a storage server:
See "Finding the IP addresses of storage cells using the cellip.ora file" for information
about how to determine your storage server IP address.
After you are logged in, run additional commands as follows:
19-7
Chapter 19
Connecting to a Storage Server with ExaCLI
Related Topics
• Finding the IP addresses of storage cells using the cellip.ora file
The following example illustrates how to do so on the UNIX command line for a quarter
rack system. (Note that a quarter rack has three storage cells, and each cell has two
connections, so a total of six IP addresses are shown.)
cat /etc/oracle/cell/
network-config/cellip.oracle
cell="192.168.136.5;cell="192.168.136.6"
cell="192.168.136.7;cell="192.168.136.8"
cell="192.168.136.9;cell="192.168.136.10"
If you are connecting to a storage cell for the first time using ExaCLI, you may be
prompted to accept an SSL certificate. The ExaCLI output in this case will look like the
following:
Accept the self-signed Oracle certificate by pressing "y" to continue using ExaCLI.
19-8
20
Policy Details for Exadata
Cloud@Customer
Learn to write policies to control access to Exadata Cloud@Customer resources.
Note:
For more information on Policies, see "How Policies Work".
For a sample policy, see "Let database admins manage Exadata
Cloud@Customer instances".
• About Resource-Types
Learn about resource-types you can use in your policies.
• Resource-Types for Exadata Cloud@Customer
Review the list of resource-types specific to Exadata Cloud@Customer.
• Supported Variables
Use variables when adding conditions to a policy.
• Details for Verb + Resource-Type Combinations
Review the list of permissions and API operations covered by each verb.
• Permissions Required for Each API Operation
Review the list of API operations for Exadata Cloud@Customer resources in a
logical order, grouped by resource type.
Related Topics
• How Policies Work
• Let database admins manage Exadata Cloud@Customer instances
About Resource-Types
Learn about resource-types you can use in your policies.
An aggregate resource-type covers the list of individual resource-types that directly
follow. For example, writing one policy to allow a group to have access to the
database-family is equivalent to writing eight separate policies for the group
that would grant access to the exadata-infrastructures, vmcluster-networks,
vmclusters, backups-destinations, db-nodes, and the rest of the individual resource-
types. For more information, see Resource-Types.
20-1
Chapter 20
Resource-Types for Exadata Cloud@Customer
Aggregate Resource-Type
database-family
Individual Resource-Types
exadata-infrastructures
vmcluster-networks
vmclusters
backups-destinations
db-nodes
db-homes
databases
backups
Supported Variables
Use variables when adding conditions to a policy.
Exadata Cloud@Customer supports only the general variables. For more information,
see "General Variables for All Requests".
Related Topics
• General Variables for All Requests
20-2
Chapter 20
Details for Verb + Resource-Type Combinations
• exadata-infrastructures
Review the list of permissions and API operations for exadata-infrastructures
resource-type.
• vmcluster-networks
Review the list of permissions and API operations for vmcluster-networks
resource-type.
• vmclusters
Review the list of permissions and API operations for vmclusters resource-type.
• backup-destinations
Review the list of permissions and API operations for backup-destinations
resource-type.
• db-nodes
Review the list of permissions and API operations for db-nodes resource-type.
• db-homes
Review the list of permissions and API operations for db-homes resource-type.
• databases
Review the list of permissions and API operations for databases resource-type.
• backups
Review the list of permissions and API operations for backups resource-type.
• autonomous-vmclusters
Review the list of permissions and API operations for autonomous-vmclusters
resource-type.
• autonomous-container-databases
Review the list of permissions and API operations for autonomous-container-
databases resource-type.
• autonomous-databases
Review the list of permissions and API operations for autonomous-container-
databases resource-type.
• data-guard-association
Review the list of permissions and API operations for data-guard-association
resource-type.
• key-stores
Review the list of permissions and API operations for key-store resource-type.
• autonomousContainerDatabaseDataguardAssociations
Review the list of permissions and API operations for
autonomousContainerDatabaseDataguardAssociations resource-type.
• AutonomousDatabaseDataguardAssociation
Review the list of permissions and API operations for
AutonomousDatabaseDataguardAssociation resource-type.
Related Topics
• Permissions
• Verbs
• Resource-Types
20-3
Chapter 20
Details for Verb + Resource-Type Combinations
exadata-infrastructures
Review the list of permissions and API operations for exadata-infrastructures
resource-type.
Granting permissions on exadata-infrastructure resources grants permissions on
associated vmcluster-network resources.
20-4
Chapter 20
Details for Verb + Resource-Type Combinations
vmcluster-networks
Review the list of permissions and API operations for vmcluster-networks resource-
type.
vmcluster-network resources inherit permissions from the exadata-infrastructure
resources with which they are associated. You cannot grant permissions to
vmcluster-network resources explicitly.
20-5
Chapter 20
Details for Verb + Resource-Type Combinations
vmclusters
Review the list of permissions and API operations for vmclusters resource-type.
20-6
Chapter 20
Details for Verb + Resource-Type Combinations
backup-destinations
Review the list of permissions and API operations for backup-destinations resource-
type.
20-7
Chapter 20
Details for Verb + Resource-Type Combinations
db-nodes
Review the list of permissions and API operations for db-nodes resource-type.
20-8
Chapter 20
Details for Verb + Resource-Type Combinations
db-homes
Review the list of permissions and API operations for db-homes resource-type.
databases
Review the list of permissions and API operations for databases resource-type.
20-9
Chapter 20
Details for Verb + Resource-Type Combinations
backups
Review the list of permissions and API operations for backups resource-type.
20-10
Chapter 20
Details for Verb + Resource-Type Combinations
autonomous-vmclusters
Review the list of permissions and API operations for autonomous-vmclusters
resource-type.
20-11
Chapter 20
Details for Verb + Resource-Type Combinations
autonomous-container-databases
Review the list of permissions and API operations for autonomous-container-
databases resource-type.
20-12
Chapter 20
Details for Verb + Resource-Type Combinations
autonomous-databases
Review the list of permissions and API operations for autonomous-container-
databases resource-type.
data-guard-association
Review the list of permissions and API operations for data-guard-association
resource-type.
20-13
Chapter 20
Details for Verb + Resource-Type Combinations
key-stores
Review the list of permissions and API operations for key-store resource-type.
20-14
Chapter 20
Details for Verb + Resource-Type Combinations
autonomousContainerDatabaseDataguardAssociations
Review the list of permissions and API operations for
autonomousContainerDatabaseDataguardAssociations resource-type.
20-15
Chapter 20
Details for Verb + Resource-Type Combinations
AutonomousDatabaseDataguardAssociation
Review the list of permissions and API operations for
AutonomousDatabaseDataguardAssociation resource-type.
20-16
Chapter 20
Permissions Required for Each API Operation
20-17
Chapter 20
Permissions Required for Each API Operation
20-18
Chapter 20
Permissions Required for Each API Operation
20-19
Chapter 20
Permissions Required for Each API Operation
20-20
Chapter 20
Permissions Required for Each API Operation
20-21
Chapter 20
Permissions Required for Each API Operation
20-22
21
Oracle Exadata Cloud@Customer Events
The Oracle Database resources emit events, which are structured messages that
indicate changes in resources.
• Exadata Infrastructure Event Types
Review the list of event types that Exadata Infrastructure instances emit.
• VM Cluster Network Event Types
Review the list of event types that VM cluster networks emit.
• VM Cluster Event Types
Review the list of event types that VM clusters emit.
• Backup Destination Event Types
Review the list of event types that backup destinations emit.
• Database Node Event Types (Cloud@Customer)
Review the list of event types that database nodes emit.
• Database Home Event Types (Cloud@Customer)
Review the list of event types that Database Homes emit.
• Database Event Types (Cloud@Customer)
Review the list of event types that databases emit.
• Database and Grid Infrastructure Patching Event Types
Review the list of event types that Database and Grid Infrastructure Patching emit.
• Autonomous VM Cluster Event Types
Review the list of event types that Autonomous VM clusters emit.
• Autonomous Container Database Event Types
Review the list of event types that Autonomous Container Database emit.
• Autonomous Database Event Types
Review the list of event types that Autonomous Database emit.
• Data Guard Event Types
Review the list of event types that Data Guard associations emit.
• Autonomous Database Autonomous Data Guard Event Types
Review the list of event types that Autnomous Data Guard associations emit.
• Key Store Event Types
Review the list of event types that Key Store emits.
• Exadata Cloud@Customer Infrastructure Patching Event Types
Review the list of event types that Exadata Cloud@Customer Infrastructure
patching emits.
21-1
Chapter 21
Exadata Infrastructure Event Types
{
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.createexadatainfrastructure.begin",
"source": "databaseservice",
"eventTypeVersion": "version",
"eventTime": "2019-08-29T21:16:04Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_exadata_infra",
"resourceId": "ExadataInfra-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
21-2
Chapter 21
Exadata Infrastructure Event Types
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeUpdated": "2019-08-29T12:30:00.000Z",
"lifecycleDetails": "detail message",
"shape": "ExadataCC.Base3.48",
"timeZone": "US/Pacific",
"displayName": "testDisplayName"
}
}
}
{
"eventType" :
"com.oraclecloud.databaseservice.exadatainfrastructureconnectstatus",
"cloudEventsVersion" : "0.1",
"eventTypeVersion" : "2.0",
"source" : "DatabaseService",
"eventTime" : "2020-06-02T06:07:40.141Z",
"contentType" : "application/json",
"data" : {
"compartmentId" :
"ocid1.compartment.oc1..aaaaaaaayrygl4guhplo5rtiumx3eh4mk7grrkrqspzaltmv
bxecnbvhkrga",
"compartmentName" : "DBaaSInteg20160918ExaccTest",
"resourceName" : "MVM_HR",
"resourceId" : "ocid1.exadatainfrastructure.oc1.ap-
hyderabad-1.abuhsljrp2vzzenmqmctqciwro6euhhsmlrewiiemiktov5xyfsu5hiufjsq
",
"availabilityDomain" : "",
"additionalDetails" : {
"timeCreated" : "2020-05-28T00:23:18Z",
"timeUpdated" : "2020-06-02T06:07:40Z",
"lifecycleState" : "DISCONNECTED",
"lifecycleDetails" : "Exadata Infrastructure is not reachable.
Please lodge a Service Request (SR) with Oracle Support and provide
Infrastructure-id: ocid1.exadatainfrastructure.oc1.ap-
hyderabad-1.abuhsljrp2vzzenmqmctqciwro6euhhsmlrewiiemiktov5xyfsu5hiufjsq
.",
"shape" : "ExadataCC.Half3.200",
"timeZone" : "UTC"
},
"definedTags" : {
"Oracle-Tags" : {
"CreatedBy" : "[email protected]",
"CreatedOn" : "2020-05-28T00:23:18.291Z"
}
}
},
"eventID" : "cde92d45-a06b-4b69-a125-6005dd8c2f0c",
"extensions" : {
21-3
Chapter 21
VM Cluster Network Event Types
"compartmentId" :
"ocid1.compartment.oc1..aaaaaaaayrygl4guhplo5rtiumx3eh4mk7grrkrqspzaltmv
bxecnbvhkrga"
}
}
{
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.createvmclusternetwork.begin",
"source": "databaseservice",
"eventTypeVersion": "version",
"eventTime": "2019-08-29T21:16:04Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
21-4
Chapter 21
VM Cluster Event Types
"compartmentName": "example_name",
"resourceName": "my_vmcluster_network",
"resourceId": "VmClusterNetwork-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeUpdated": "2019-08-29T12:30:00.000Z",
"lifecycleDetails": "detail message",
"exadataInfrastructureId": "ExadataInfra-unique_ID",
"displayName": "testDisplayName"
}
}
}
{
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.createvmclusternetwork.begin",
"source": "databaseservice",
"eventTypeVersion": "version",
21-5
Chapter 21
VM Cluster Event Types
"eventTime": "2019-08-29T21:16:04Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_vmcluster_network",
"resourceId": "VmClusterNetwork-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeUpdated": "2019-08-29T12:30:00.000Z",
"lifecycleDetails": "detail message",
"exadataInfrastructureId": "ExadataInfra-unique_ID",
"displayName": "testDisplayName"
}
}
}
{
"cloudEventsVersion": "0.1",
"eventId": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType": "com.oraclecloud.databaseservice.createvmcluster.begin",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-06-27T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_database",
"resourceId": "Vmcluster-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-09-03T12:00:00.000Z",
"timeUpdated": "2019-09-03T12:30:00.000Z",
"displayName": "testDisplayName",
"lifecycleDetails": "detail message",
"exadataInfrastructureId": "ExatraInfra-unique_ID",
21-6
Chapter 21
Backup Destination Event Types
"vmClusterNetworkId": "VmCluster-unique_ID",
"cpuCoreCount": 2,
"dataStorageSizeInTBs": 4,
"dbVersion": "19.0.0.0",
"licenseType": "BRING_YOUR_OWN_LICENSE",
"giVersion": "19.0.0.0",
"dbNodeIds": "[ocid1.dbnode.1, ocid1.dbnode.2,...]",
"timeZone": "US/Pacific"
}
}
}
{
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.createbackupdestination",
"source": "databaseservice",
"eventTypeVersion": "version",
"eventTime": "2019-08-29T21:16:04Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_backupdestination",
"resourceId": "BackupDestination-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {}
21-7
Chapter 21
Database Node Event Types (Cloud@Customer)
}
}
{
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType": "com.oraclecloud.databaseservice.dbnodeaction.begin",
"source": "databaseservice",
"eventTypeVersion": "version",
"eventTime": "2019-06-27T21:16:04Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_dbnode",
"resourceId": "DbNode-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-08-26T12:00:00.000Z",
"timeUpdated": "2019-08-26T12:30:00.000Z",
"dbSystemId": "ocid1.dbsystem.oc1.phx.unique_ID",
"lifecycleDetails": "detail message",
"vmClusterId": "VmCluster-unique_ID",
"dbHostId": "dbHost-unique_ID",
"nodeNumber": 2,
"powerAction": "HardReset",
"hostName": "testHostName"
}
21-8
Chapter 21
Database Home Event Types (Cloud@Customer)
}
}
{
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType": "com.oraclecloud.databaseservice.createdbhome.begin",
"source": "databaseservice",
"eventTypeVersion": "version",
"eventTime": "2019-08-29T21:16:04Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_dbhome",
"resourceId": "DbHome-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeUpdated": "2019-08-29T12:30:00.000Z",
21-9
Chapter 21
Database Event Types (Cloud@Customer)
{
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType": "com.oraclecloud.databaseservice.restoredatabase.begin",
"source": "databaseservice",
"eventTypeVersion": "version",
"eventTime": "2019-06-27T21:16:04Z",
"contentType": "application/json",
"extensions": {
21-10
Chapter 21
Database and Grid Infrastructure Patching Event Types
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_database",
"resourceId": "Database-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-08-26T12:00:00.000Z",
"timeUpdated": "2019-08-26T12:30:00.000Z",
"dbSystemId": "dbSystem-unique_ID",
"displayName": "testDisplayName",
"lifecycleDetails": "detail message",
"vmClusterId": "VmCluster-unique_ID",
"backupType": "FULL",
"dbHomeId": "dbHome-unique_ID",
"dbVersion": "19.0.0.0",
"databaseEdition": "ENTERPRISE_EDITION_EXTREME",
"autoBackupsEnabled": "true",
"recoveryWindow": 30,
"backupDestinationId": "backupDestination-unique_ID",
"backupDestinationType": "OBJECT_STORAGE",
"backupDestinationName": "my_backup_destination_name",
"exadataInfrastructureId": "ExadataInfrastructure-unique_ID",
"dbUniqueName": "akv_tgh_unqna"
}
}
}
21-11
Chapter 21
Database and Grid Infrastructure Patching Event Types
{
"cloudEventsVersion": "0.1",
"eventId": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType": "com.oraclecloud.databaseservice.patchvmcluster.begin",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-06-27T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_database",
"resourceId": "Vmcluster-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-09-03T12:00:00.000Z",
"timeUpdated": "2019-09-03T12:30:00.000Z",
"displayName": "testDisplayName",
"lifecycleDetails": "detail message",
"exadataInfrastructureId": "ExatraInfra-unique_ID",
"vmClusterNetworkId": "VmCluster-unique_ID",
"cpuCoreCount": 2,
"dataStorageSizeInTBs": 4,
"dbVersion": "19.0.0.0",
"licenseType": "BRING_YOUR_OWN_LICENSE",
"giVersion": "19.0.0.0",
"dbNodeIds": "[ocid1.dbnode.1, ocid1.dbnode.2,...]",
"timeZone": "US/Pacific"
}
}
}
21-12
Chapter 21
Database and Grid Infrastructure Patching Event Types
{
"cloudEventsVersion": "0.1",
"eventId": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType": "com.oraclecloud.databaseservice.patchdbhome.begin",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-08-29T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_dbhome",
"resourceId": "DbHome-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeUpdated": "2019-08-29T12:30:00.000Z",
"lifecycleDetails": "detail message",
"dbSystemId": "DbSystem-unique_ID",
"dbVersion": "19.0.0.0",
"recordVersion": 4,
"displayName": "testDisplayName"
}
}
}
{
"cloudEventsVersion": "0.1",
"eventId": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType": "com.oraclecloud.databaseservice.movedatabase.begin",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-06-27T21:16:04.000Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_database",
"resourceId": "Database-unique_ID",
"availabilityDomain": "all",
21-13
Chapter 21
Autonomous VM Cluster Event Types
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-08-26T12:00:00.000Z",
"timeUpdated": "2019-08-26T12:30:00.000Z",
"dbSystemId": "ocid1.dbsystem.oc1.phx.unique_ID",
"displayName": "testDisplayName",
"lifecycleDetails": "detail message",
"vmClusterId": "VmCluster-unique_ID",
"dbSystemId": "dbSystem-unique_ID",
"backupType": "FULL",
"dbHomeId": "dbHome-unique_ID",
"dbVersion": "19.0.0.0",
"databaseEdition": "ENTERPRISE_EDITION_EXTREME",
"autoBackupsEnabled": "true",
"recoveryWindow": 30,
"backupDestinationId": "backupDestination-unique_ID",
"backupDestinationType": "OBJECT_STORAGE",
"backupDestinationName": "my_backup_destination_name",
"exadataInfrastructureId": "ExadataInfrastructure-unique-ID",
"dbUniqueName": "akv_tgh_unqna"
}
}
}
21-14
Chapter 21
Autonomous VM Cluster Event Types
{
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.changeautonomousvmclustercompartment",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-06-27T21:16:04Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_database",
"resourceId": "AutonomousVmCluster-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-09-03T12:00:00.000Z",
"timeUpdated": "2019-09-03T12:30:00.000Z",
"displayName": "testDisplayName",
"lifecycleDetails": "detail message",
"exadataInfrastructureId": "ExatraInfra-unique_ID",
"vmClusterNetworkId": "VmClusterNetwork-unique_ID",
"cpuCoreCount": "2",
"availableCpus": "1",
"dataStorageSizeInTBs": "4",
"availableDataStorageSizeInTBs": "1",
"licenseType": "BRING_YOUR_OWN_LICENSE",
"timeZone": "US/Pacific"
}
}
}
{
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.createautonomousvmcluster.begin",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-06-27T21:16:04Z",
"contentType": "application/json",
"extensions": {
21-15
Chapter 21
Autonomous VM Cluster Event Types
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_database",
"resourceId": "AutonomousVmCluster-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-09-03T12:00:00.000Z",
"timeUpdated": "2019-09-03T12:30:00.000Z",
"displayName": "testDisplayName",
"lifecycleDetails": "detail message",
"exadataInfrastructureId": "ExatraInfra-unique_ID",
"vmClusterNetworkId": "VmClusterNetwork-unique_ID",
"cpuCoreCount": "2",
"availableCpus": "1",
"dataStorageSizeInTBs": "4",
"availableDataStorageSizeInTBs": "1",
"licenseType": "BRING_YOUR_OWN_LICENSE",
"timeZone": "US/Pacific"
}
}
}
{
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.deleteautonomousvmcluster.begin",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-06-27T21:16:04Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_database",
"resourceId": "AutonomousVmCluster-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
21-16
Chapter 21
Autonomous VM Cluster Event Types
"timeCreated": "2019-09-03T12:00:00.000Z",
"timeUpdated": "2019-09-03T12:30:00.000Z",
"displayName": "testDisplayName",
"lifecycleDetails": "detail message",
"exadataInfrastructureId": "ExatraInfra-unique_ID",
"vmClusterNetworkId": "VmClusterNetwork-unique_ID",
"cpuCoreCount": "2",
"availableCpus": "1",
"dataStorageSizeInTBs": "4",
"availableDataStorageSizeInTBs": "1",
"licenseType": "BRING_YOUR_OWN_LICENSE",
"timeZone": "US/Pacific"
}
}
}
{
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType":
"com.oraclecloud.databaseservice.updateautonomousvmcluster.begin",
"source": "databaseservice",
"eventTypeVersion": "1.0",
"eventTime": "2019-06-27T21:16:04Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_database",
"resourceId": "AutonomousVmCluster-unique_ID",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.id..oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-09-03T12:00:00.000Z",
"timeUpdated": "2019-09-03T12:30:00.000Z",
"displayName": "testDisplayName",
"lifecycleDetails": "detail message",
"exadataInfrastructureId": "ExatraInfra-unique_ID",
"vmClusterNetworkId": "VmClusterNetwork-unique_ID",
"cpuCoreCount": "2",
"availableCpus": "1",
"dataStorageSizeInTBs": "4",
"availableDataStorageSizeInTBs": "1",
"licenseType": "BRING_YOUR_OWN_LICENSE",
"timeZone": "US/Pacific"
}
21-17
Chapter 21
Autonomous Container Database Event Types
}
}
21-18
Chapter 21
Autonomous Database Event Types
{lifecycleState=AVAILABLE,
autonomousVmClusterId=ocid1.autonomousvmcluster.oc1.sea.abzwkljrevsjcfus
kw7mgi6ulzfg2epjjxhbnhwj63q7q3kzvuwg3djqnd2a,
displayName=CDB2-NFS,
dbName=wqxtzzfn,
dbUniqueName=wqxtzzfn_sea1td,
freeTags={},
autonomousContainerDatabaseId=ocid1.autonomouscontainerdatabase.oc1.sea.
abzwkljrxkuruqe3qzgw432adr5ug7ridmwi4ifvjlsahcdqdhbhzbf543xa,
compartmentId=ocid1.compartment.region1..aaaaaaaass5x4witduxzgrs7qmzqk3m
5kmoguve7urwploqef6763w3o42ta,
timeUpdated=2020-06-15 21:52:24.085,
tenantId=ocid1.tenancy.region1..aaaaaaaagyw5okosjg54csr3u5qgaxvtjufz5553
7h44mjy2umiqur4z5w3a,
timeCreated=2020-06-15 19:08:03.797,
id=ocid1.autonomouscontainerdatabase.oc1.sea.abzwkljrxkuruqe3qzgw432adr5
ug7ridmwi4ifvjlsahcdqdhbhzbf543xa,
definedTags={}}
21-19
Chapter 21
Data Guard Event Types
21-20
Chapter 21
Data Guard Event Types
{
"eventId": "022a63a4-ff77-11e9-a0af-f45c89b1cb17",
"eventTime": "2019-11-05T02:50:21.000Z",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_id"
},
"eventType":
"com.oraclecloud.databaseservice.createdataguardassociation.begin",
"eventTypeVersion": "2.0",
"cloudEventsVersion": "0.1",
"source": "databaseservice",
"contentType": "application/json",
"definedTags": {},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_id",
"compartmentName": "example_name",
"resourceName": "my_container_database",
"resourceId": "ocid1.dataguard.oc1.phx.unique_id",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.dataguard.oc1.phx.unique_id",
"timeCreated": "2019-06-27T21:15:59.000Z",
"timeUpdated": "2019-06-27T21:16:04.389Z",
"lifecycleState": "ACTIVE",
"lifecycleMessage": "",
"dbSystemId": "ocid1.vmcluster.oc1.phx.unique_id",
"DatabaseId": "ocid1.database.oc1.phx.unique_id",
"DbHomeId": "ocid1.dbhome.oc1.phx.unique_id",
"DGConfigId": "022a67c8-ff77-11e9-af6e-f45c89b1cb17",
"DGConfigState": "SUCCESS",
"LastSyncedTime": "2019-06-27T21:16:04.389Z",
"ApplyLag": "2 hours",
"SyncState": "SYNCED",
"dcsDgUpdateTimestamp": "2019-06-27T21:16:04.389Z",
21-21
Chapter 21
Data Guard Event Types
"lastUpdatedIdentifier": "022a6912-ff77-11e9-9e77-f45c89b1cb17",
"displayName": "Data Guard Association - Create Begin",
"licenseType": "BRING_YOUR_OWN_LICENSE",
"workloadType": "Transaction Processing"
}
}
}
{
"eventId": "022aa7cc-ff77-11e9-90cd-f45c89b1cb17",
"eventTime": "2019-11-05T02:50:21.000Z",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_id"
},
"eventType":
"com.oraclecloud.databaseservice.createdataguardassociation.end",
"eventTypeVersion": "2.0",
"cloudEventsVersion": "0.1",
"source": "databaseservice",
"contentType": "application/json",
"definedTags": {},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_id",
"compartmentName": "example_name",
"resourceName": "my_container_database",
"resourceId": "ocid1.dataguard.oc1.phx.unique_id",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.dataguard.oc1.phx.unique_id",
"timeCreated": "2019-06-27T21:15:59.000Z",
"timeUpdated": "2019-06-27T21:16:04.389Z",
"lifecycleState": "ACTIVE",
"lifecycleMessage": "",
"dbSystemId": "ocid1.vmcluster.oc1.phx.unique_id",
"DatabaseId": "ocid1.database.oc1.phx.unique_id",
"DbHomeId": "ocid1.dbhome.oc1.phx.unique_id",
"DGConfigId": "022aab34-ff77-11e9-b89c-f45c89b1cb17",
"DGConfigState": "SUCCESS",
"LastSyncedTime": "2019-06-27T21:16:04.389Z",
"ApplyLag": "2 hours",
"SyncState": "SYNCED",
"dcsDgUpdateTimestamp": "2019-06-27T21:16:04.389Z",
"lastUpdatedIdentifier": "022aac10-ff77-11e9-8041-f45c89b1cb17",
"displayName": "Data Guard Association - Create End",
"licenseType": "BRING_YOUR_OWN_LICENSE",
"workloadType": "Transaction Processing"
}
}
}
21-22
Chapter 21
Autonomous Database Autonomous Data Guard Event Types
{
"cloudEventsVersion": "0.1",
"eventID": "<unique_ID>",
"eventType":
"com.oraclecloud.DatabaseService.CreateAutonomousDataGuardAssociation.be
gin",
"source": "databaseservice",
"eventTypeVersion": "2.0",
"eventTime": "2019-06-27T21:16:04Z",
"contentType": "application/json",
"data": {
"eventGroupingId": "<unique_ID>",
21-23
Chapter 21
Autonomous Database Autonomous Data Guard Event Types
"eventName"="CreateAutonomousDataGuardAssociation"
"compartmentId": "ocid1.compartment.oc1..<unique_ID>",
"compartmentName": "example_name",
"resourceVersion":null,
"resourceName": "my_container_database",
"resourceId": "<unique_ID>",
"availabilityDomain": "all",
"tagSlug": "<slug_ID>",
"definedTags": {},
"additionalDetails": {
"lifecycleState": "PROVISIONING",
"DGConfigId"="91f298da-b890-42ce-935b-9b841e908756",
"ApplyLag"=null,
"LastRoleChangeTime"=null,
"TransportLag"=null,
"autonomousContainerDatabaseId"="ocid1.autonomouscontainerdatabase.oc1.s
ea.<unique_ID>",
"DGConfigState"=null,
"lifeCycleMessage"=null,
"lastUpdatedIdentifier"=null,
"SyncState"=null,
"autonomousExadataInfrastructureId"="ocid1.autonomousvmcluster.oc1.sea.<
unique_ID>",
"timeUpdated"="2020-10-18 23:02:34.864",
"timeCreated"="2020-10-18 23:02:34.864",
"dbHomeId"="ocid1.autonomouspodhome.oc1.sea.<unique_ID>",
"LastSyncedTime"=null,
"dcsDgUpdateTimestamp"=null,
}
}
}
{
"cloudEventsVersion": "0.1",
"eventID": "<unique_ID>",
"eventType":
"com.oraclecloud.DatabaseService.CreateAutonomousDataGuardAssociation.be
gin",
"source": "databaseservice",
"eventTypeVersion": "2.0",
"eventTime": "2019-06-27T21:16:04Z",
"contentType": "application/json",
"data": {
"eventGroupingId": "<unique_ID>",
"eventName"="SwitchoverAutonomousDataguardAssociation"
"compartmentId": "ocid1.compartment.oc1..<unique_ID>",
"compartmentName": "example_name",
"resourceVersion":null,
"resourceName": "my_container_database",
"resourceId": "ocid1.autonomousdgassociation.oc1.sea.<unique_ID>",
21-24
Chapter 21
Autonomous Database Autonomous Data Guard Event Types
"availabilityDomain": "all",
"tagSlug": "<slug_ID>",
"definedTags": {},
"stateChange": {
"previous"=null,
"current: {
"lifecycleState"="ROLE_CHANGE_IN_PROGRESS
}
}
"additionalDetails": {
"lifecycleState": "ROLE_CHANGE_IN_PROGRESS",
"DGConfigId"="<unique_ID>",
"ApplyLag"="0 seconds computed 2 seconds ago",
"LastRoleChangeTime"=null,
"TransportLag"="0 seconds computed 2 seconds ago",
"autonomousContainerDatabaseId"="ocid1.autonomouscontainerdatabase.oc1.s
ea.<unique_ID>",
"DGConfigState"="SUCCESS",
"lifeCycleMessage"=null,
"lastUpdatedIdentifier"=null,
"SyncState"="SYNCED",
"autonomousExadataInfrastructureId"="ocid1.autonomousvmcluster.oc1.sea.<
unique_ID>",
"timeUpdated"="2020-10-18 23:02:34.864",
"timeCreated"="2020-10-18 23:02:34.864",
"dbHomeId"="ocid1.autonomouspodhome.oc1.sea.<unique_ID>",
"LastSyncedTime"=null,
"dcsDgUpdateTimestamp"=null,
}
}
}
{
"cloudEventsVersion": "0.1",
"eventID": "<unique_ID>",
"eventType":
"com.oraclecloud.DatabaseService.CreateAutonomousDataGuardAssociation.be
gin",
"source": "databaseservice",
"eventTypeVersion": "2.0",
"eventTime": "2019-06-27T21:16:04Z",
"contentType": "application/json",
"data": {
"eventGroupingId": "<unique_ID>",
"eventName"="FailoverAutonomousDataguardAssociation"
"compartmentId": "ocid1.compartment.oc1..<unique_ID>",
"compartmentName": "example_name",
"resourceVersion":null,
"resourceName": "my_container_database",
"resourceId": "ocid1.autonomousdgassociation.oc1.sea.<unique_ID>",
21-25
Chapter 21
Autonomous Database Autonomous Data Guard Event Types
"availabilityDomain": "all",
"tagSlug": "<slug_ID>",
"definedTags": {},
"stateChange": {
"previous"=null,
"current: {
"lifecycleState"="ROLE_CHANGE_IN_PROGRESS
}
}
"additionalDetails": {
"lifecycleState": "ROLE_CHANGE_IN_PROGRESS",
"DGConfigId"="<unique_ID>",
"ApplyLag"="0 seconds computed 2 seconds ago",
"LastRoleChangeTime"=null,
"TransportLag"="0 seconds computed 2 seconds ago",
"autonomousContainerDatabaseId"="ocid1.autonomouscontainerdatabase.oc1.s
ea.<unique_ID>",
"DGConfigState"="SUCCESS",
"lifeCycleMessage"=null,
"lastUpdatedIdentifier"=null,
"SyncState"="SYNCED",
"autonomousExadataInfrastructureId"="ocid1.autonomousvmcluster.oc1.sea.<
unique_ID>",
"timeUpdated"="2020-10-18 23:02:34.864",
"timeCreated"="2020-10-18 23:02:34.864",
"dbHomeId"="ocid1.autonomouspodhome.oc1.sea.<unique_ID>",
"LastSyncedTime"=null,
"dcsDgUpdateTimestamp"=null,
}
}
}
{
"cloudEventsVersion": "0.1",
"eventID": "<unique_ID>",
"eventType":
"com.oraclecloud.DatabaseService.CreateAutonomousDataGuardAssociation.be
gin",
"source": "databaseservice",
"eventTypeVersion": "2.0",
"eventTime": "2019-06-27T21:16:04Z",
"contentType": "application/json",
"data": {
"eventGroupingId": "<unique_ID>",
"eventName"="ReinstateAutonomousDataGuardAssociation"
"compartmentId": "ocid1.compartment.oc1..<unique_ID>",
"compartmentName": "example_name",
"resourceVersion":null,
"resourceName": "my_container_database",
"resourceId": "ocid1.autonomousdgassociation.oc1.sea.<unique_ID>",
21-26
Chapter 21
Key Store Event Types
"availabilityDomain": "all",
"tagSlug": "<slug_ID>",
"definedTags": {},
"stateChange": {
"previous"=null,
"current: {
"lifecycleState"="ROLE_CHANGE_IN_PROGRESS
}
}
"additionalDetails": {
"lifecycleState": "ROLE_CHANGE_IN_PROGRESS",
"DGConfigId"="<unique_ID>",
"ApplyLag"="0 seconds computed 2 seconds ago",
"LastRoleChangeTime"=null,
"TransportLag"="0 seconds computed 2 seconds ago",
"autonomousContainerDatabaseId"="ocid1.autonomouscontainerdatabase.oc1.s
ea.<unique_ID>",
"DGConfigState"="SUCCESS",
"lifeCycleMessage"=null,
"lastUpdatedIdentifier"=null,
"SyncState"="SYNCED",
"autonomousExadataInfrastructureId"="ocid1.autonomousvmcluster.oc1.sea.<
unique_ID>",
"timeUpdated"="2020-10-18 23:02:34.864",
"timeCreated"="2020-10-18 23:02:34.864",
"dbHomeId"="ocid1.autonomouspodhome.oc1.sea.<unique_ID>",
"LastSyncedTime"=null,
"dcsDgUpdateTimestamp"=null,
}
}
}
21-27
Chapter 21
Exadata Cloud@Customer Infrastructure Patching Event Types
{
"cloudEventsVersion": "0.1",
"eventID": "60600c06-d6a7-4e85-b56a-1de3e6042f57",
"eventType": "com.oraclecloud.databaseservice.createkeystore",
"source": "databaseservice",
"eventTypeVersion": "version",
"eventTime": "2020-10-27T21:16:04Z",
"contentType": "application/json",
"extensions": {
"compartmentId": "ocid1.compartment.oc1..unique_ID"
},
"data": {
"compartmentId": "ocid1.compartment.oc1..unique_ID",
"compartmentName": "example_name",
"resourceName": "my_keystore",
"resourceId": "KeyStore-unique_ID",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"timeUpdated"="2020-10-27 21:16:34.864",
"timeCreated"="2020-10-27 21:16:34.864",
"keyStoreType": "all",
"connectionIps": "ip1,ip2",
"adminUsername": "username",
}
}
}
21-28
Chapter 21
Exadata Cloud@Customer Infrastructure Patching Event Types
21-29
Chapter 21
Exadata Cloud@Customer Infrastructure Patching Event Types
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "b28fcda6-3d7b-4044-aa8e-7c21cde84b44",
"eventType":
"com.oraclecloud.databaseservice.exaccinfrastructuremaintenancevm.begin"
,
"source": "databaseservice",
"eventTypeVersion": "2.0",
"eventTime": "2019-06-27T21:16:04.000Z",
"contentType": "application/json",
"data": {
"eventGroupingId": "4976b940-2c2d-4380-a669-1d70d071b187",
"eventName": "ExaccInfrastructureMaintenanceVM",
"compartmentId": "ocid1.compartment.oc1.......unique_id",
"compartmentName": "example_compartment",
"resourceName": "my_exacc_infrastructure",
"resourceId": "ocid1.exadatainfrastructure.oc1.....unique_id",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.dbmaintenancerun.oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeScheduled": "2019-08-29T12:30:00.000Z",
21-30
Chapter 21
Exadata Cloud@Customer Infrastructure Patching Event Types
"timeStarted": "2019-08-29T12:30:00.000Z",
"description": "ExaCC Infrastructure Maintenance
Notifications",
"message": "detailed message",
"shape": "ExadataCC.Base3.48",
"displayName": "testDisplayName"
}
}
}
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "b28fcda6-3d7b-4044-aa8e-7c21cde84b44",
"eventType":
"com.oraclecloud.databaseservice.exaccinfrastructuremaintenancevm.end",
"source": "databaseservice",
"eventTypeVersion": "2.0",
"eventTime": "2019-06-27T21:16:04.000Z",
"contentType": "application/json",
"data": {
"eventGroupingId": "4976b940-2c2d-4380-a669-1d70d071b187",
"eventName": "ExaccInfrastructureMaintenanceVM",
"compartmentId": "ocid1.compartment.oc1.......unique_id",
"compartmentName": "example_compartment",
"resourceName": "my_exacc_infrastructure",
"resourceId": "ocid1.exadatainfrastructure.oc1.....unique_id",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.dbmaintenancerun.oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeScheduled": "2019-08-29T12:30:00.000Z",
"timeEnded": "2019-08-29T12:30:00.000Z",
"description": "ExaCC Infrastructure Maintenance
Notifications",
"message": "detailed message",
"shape": "ExadataCC.Base3.48",
"displayName": "testDisplayName"
}
}
}
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "b28fcda6-3d7b-4044-aa8e-7c21cde84b44",
"eventType":
"com.oraclecloud.databaseservice.exaccinfrastructuremaintenancescheduled
21-31
Chapter 21
Exadata Cloud@Customer Infrastructure Patching Event Types
",
"source": "databaseservice",
"eventTypeVersion": "2.0",
"eventTime": "2019-06-27T21:16:04.000Z",
"contentType": "application/json",
"data": {
"eventGroupingId": "4976b940-2c2d-4380-a669-1d70d071b187",
"eventName": "ExaccInfrastructureMaintenanceScheduled",
"compartmentId": "ocid1.compartment.oc1.......unique_id",
"compartmentName": "example_compartment",
"resourceName": "my_exacc_infrastructure",
"resourceId": "ocid1.exadatainfrastructure.oc1.....unique_id",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.dbmaintenancerun.oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeScheduled": "2019-08-29T12:30:00.000Z",
"description": "ExaCC Infrastructure Maintenance
Notifications",
"message": "detailed message",
"shape": "ExadataCC.Base3.48",
"displayName": "testDisplayName"
}
}
}
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "b28fcda6-3d7b-4044-aa8e-7c21cde84b44",
"eventType":
"com.oraclecloud.databaseservice.exaccinfrastructuremaintenancereminder"
,
"source": "databaseservice",
"eventTypeVersion": "2.0",
"eventTime": "2019-06-27T21:16:04.000Z",
"contentType": "application/json",
"data": {
"eventGroupingId": "4976b940-2c2d-4380-a669-1d70d071b187",
"eventName": "ExaccInfrastructureMaintenanceReminder",
"compartmentId": "ocid1.compartment.oc1.......unique_id",
"compartmentName": "example_compartment",
"resourceName": "my_exacc_infrastructure",
"resourceId": "ocid1.exadatainfrastructure.oc1.....unique_id",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.dbmaintenancerun.oc1...unique_ID",
"lifecycleState": "AVAILABLE",
21-32
Chapter 21
Exadata Cloud@Customer Infrastructure Patching Event Types
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeScheduled": "2019-08-29T12:30:00.000Z",
"description": "ExaCC Infrastructure Maintenance
Notifications",
"message": "detailed message",
"shape": "ExadataCC.Base3.48",
"displayName": "testDisplayName"
}
}
}
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "b28fcda6-3d7b-4044-aa8e-7c21cde84b44",
"eventType":
"com.oraclecloud.databaseservice.exaccinfrastructuremaintenance.begin",
"source": "databaseservice",
"eventTypeVersion": "2.0",
"eventTime": "2019-06-27T21:16:04.000Z",
"contentType": "application/json",
"data": {
"eventGroupingId": "4976b940-2c2d-4380-a669-1d70d071b187",
"eventName": "ExaccInfrastructureMaintenance",
"compartmentId": "ocid1.compartment.oc1.......unique_id",
"compartmentName": "example_compartment",
"resourceName": "my_exacc_infrastructure",
"resourceId": "ocid1.exadatainfrastructure.oc1.....unique_id",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.dbmaintenancerun.oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeScheduled": "2019-08-29T12:30:00.000Z",
"timeStarted": "2019-08-29T12:30:00.000Z",
"description": "ExaCC Infrastructure Maintenance
Notifications",
"message": "detailed message",
"shape": "ExadataCC.Base3.48",
"displayName": "testDisplayName"
}
}
}
"exampleEvent": {
"cloudEventsVersion": "0.1",
"eventID": "b28fcda6-3d7b-4044-aa8e-7c21cde84b44",
"eventType":
"com.oraclecloud.databaseservice.exaccinfrastructuremaintenance.end",
21-33
Chapter 21
Exadata Cloud@Customer Infrastructure Patching Event Types
"source": "databaseservice",
"eventTypeVersion": "2.0",
"eventTime": "2019-06-27T21:16:04.000Z",
"contentType": "application/json",
"data": {
"eventGroupingId": "4976b940-2c2d-4380-a669-1d70d071b187",
"eventName": "ExaccInfrastructureMaintenance",
"compartmentId": "ocid1.compartment.oc1.......unique_id",
"compartmentName": "example_compartment",
"resourceName": "my_exacc_infrastructure",
"resourceId": "ocid1.exadatainfrastructure.oc1.....unique_id",
"availabilityDomain": "all",
"freeFormTags": {},
"definedTags": {},
"additionalDetails": {
"id": "ocid1.dbmaintenancerun.oc1...unique_ID",
"lifecycleState": "AVAILABLE",
"timeCreated": "2019-08-29T12:00:00.000Z",
"timeScheduled": "2019-08-29T12:30:00.000Z",
"timeEnded": "2019-08-29T12:30:00.000Z",
"description": "ExaCC Infrastructure Maintenance
Notifications",
"message": "detailed message",
"shape": "ExadataCC.Base3.48",
"displayName": "testDisplayName"
}
}
}
21-34
22
Troubleshooting Exadata
Cloud@Customer Systems
These topics cover some common issues you might run into and how to address them.
• Patching Failures on Exadata Cloud@Customer Systems
You can patch Oracle Database and Oracle Grid Infrastructure using the dbaascli
utility and update the Cloud Tooling on Exadata Cloud@Customer.
• Obtaining Further Assistance
If you were unable to resolve the problem using the information in this topic, follow
the procedures below to collect relevant database and diagnostic information.
After you have collected this information, contact Oracle Support.
• Database is Down While Performing Downgrade to Release 11.2 or 12.1
• After Database Upgrade, the Standby Database Remains in Mounted State in
Oracle Data Guard Configurations
• Primary Database Fails to Downgrade to 18c in Oracle Data Guard Configurations
• Deleting a Database Does Not Delete the Associated Oracle Home
22-1
Chapter 22
Patching Failures on Exadata Cloud@Customer Systems
contain enough information to point you to a solution, you can use the database CLI
and log files to gather more data. Then, refer to the applicable section in this topic for a
solution.
Host Issues
One or more of the following conditions on the database host can cause patching
operations to fail.
Use the df -h command on the host to check the available space. If the file system
has insufficient space, you can remove old log or trace files to free up space.
22-2
Chapter 22
Patching Failures on Exadata Cloud@Customer Systems
ping hostname
• Verify that your DNS configuration is correct so that the relevant nodes addresses
are resolvable within the VM cluster.
• Refer to the relevant Cloud Tooling logs as instructed in the Obtaining Further
Assistance section and contact Oracle Support for further assistance.
If Oracle Grid Infrastructure is down, then restart by running the following commands:
22-3
Chapter 22
Patching Failures on Exadata Cloud@Customer Systems
To verify that the specified patch ID is correct, confirm that the specified patch ID is
listed as an available patch on the Console.
If the specified patch ID is listed and if the prerequisite operation still fails to
recognize the patch ID, then refer to the relevant Cloud Tooling logs as instructed
in the Obtaining Further Assistance section and contact Oracle Support for further
assistance.
Specific Pre-check Validation Failed
Once that the pre-check validation starts, Cloud tooling will perform a series of
validations to determine whether or not the minimum requirements to perform the
requested patching operation are met. If any of this minimum requirements are not
met, then a failure of the following will be observed:
If a failure is detected on a given node during the patch installation process, then do
the following:
22-4
Chapter 22
Patching Failures on Exadata Cloud@Customer Systems
• Address the issue that originated the failure if its evident and then re-try the same
command so that the operation can be resumed from the failure point.
• If after retrying the command the issue persists or if its not possible to identify the
root cause of the failure, then refer to the relevant Cloud Tooling logs as instructed
in the Obtaining Further Assistance section and contact Oracle Support for further
assistance.
The system returns a message including the database instance status. The instance
status must be Open for the patching operation to succeed.
If the database is not running, use the following command to start it:
To verify that the specified patch ID is correct, confirm that the specified patch ID is
listed as an available patch on the Console.
22-5
Chapter 22
Patching Failures on Exadata Cloud@Customer Systems
Alternatively, you can verify the installed patch level into a given home by using the
following command as well:
If the specified patch ID is listed and if the prerequisite operation still fails to
recognize the patch ID, then refer to the relevant Cloud Tooling logs as instructed
in the Obtaining Further Assistance section and contact Oracle Support for further
assistance.
Specific Prereq Validation Failed
Once that the prerequisite validation starts, Cloud tooling will perform a series of
validations to determine whether or not the minimum requirements to perform the
requested patching operation are met. If any of this minimum requirements are not
met, then a failure of the following will be observed:
Depending on the specific failed prereq validation, the corresponding corrections can
be performed on the environment or the Oracle home if required. Once that those
corrections have been performed, then the operation can be re-attempted.
If the failure persist, then refer to the relevant Cloud Tooling logs as instructed
in the Obtaining Further Assistance section and contact Oracle Support for further
assistance.
If its not possible to identify the root cause of the failure and its corresponding solution,
then refer to the relevant Cloud Tooling logs as instructed in the Obtaining Further
Assistance section and contact Oracle Support for further assistance.
22-6
Chapter 22
Patching Failures on Exadata Cloud@Customer Systems
To confirm that indeed there are no applicable patches to be installed for Cloud tooling
you can run the following command:
If the patch level for the Cloud tooling is eligible for patch application and Cloud tooling
is not able to disclose any applicable patch ID, then refer to the relevant Cloud Tooling
logs as instructed in the Obtaining Further Assistance section and contact Oracle
Support for further assistance.
Failed Patch Modifies the Home Name in oraInventory with the Suffix
"_PIP"
Description: The image-based patching process temporarily changes the name of the
Home that is being patched in the oraInventory adding the suffix '_pip' for patching in
progress. For example, changing OraDB19Home1 to OraDB19Home1_pip.
When a patch fails on node 2, the name is not reverted to the original name.
This causes subsequent Home installed on node 2 to use the Home name
OraDB19Home1.
Action: On the failing node run the following command to clear the inventory from the
corresponding _pip entrance:
After performing the local rollback, resume applying the corresponding patching.
22-7
Chapter 22
Obtaining Further Assistance
For example:
To patch standby nodes, use -secondary flag.
Note:
Always patch standby nodes first and then proceed to primary nodes.
DBAASAPI Logs
These logs are applicable for actions that are performed from the Console.
/var/opt/oracle/log/dbaasapi/db/db
• Job HASH.log corresponding to the Backend API request
22-8
Chapter 22
Obtaining Further Assistance
Note:
All the log files are timestamped records so that the issues can be traced
back to some point in the past during the DBSystem operation.
DBAASCLI Logs
/var/opt/oracle/log/dbaascli
• dbaascli.log
/var/opt/oracle/log/exadbcpatchsm:
• exadbcpatchsm.log
/var/opt/oracle/log/exadbcpatch:
• exadbcpatch.log
• exadbcpatch-cmd.log
• exadbcpatch-dmp.log
• exadbcpatch-sql.log
Note:
All the log files are timestamped records so that the issues can be traced
back to some point in the past during the DBSystem operation.
$GRID_BASE/cfgtoollogs
$ORACLE_BASE/cfgtoollogs
/var/opt/oracle/misc/dbaas_diag_tool.pl
For more information about the usage of this utility, see My Oracle Support note
2219712.1.
22-9
Chapter 22
Database is Down While Performing Downgrade to Release 11.2 or 12.1
Related Topics
• https://support.oracle.com/epmos/faces/DocumentDisplay?
cmd=show&type=NOT&id=2219712.1
Action: Apply one-off patching for bug 31561819 prior to attempting the downgrade if
required for Oracle Database releases 11.2 and 12.1.
If the issue persists and impacts a given database, then, per a similar bug 31762303
filed by MAA team, Oracle recommends that you run the following commands after the
failure to complete database downgrade:
SELECT
DEST_ID,THREAD#,sequence#,RESETLOGS_CHANGE#,STANDBY_DEST,ARCHIVED,APPLIE
D,status,to_char(completion_time,'DD-MM-YYYY:hh24:mi') from
v$archived_log;
Ensure that all the logs have been replicated successfully to the standby database
after the upgrade operation.
22-10
Chapter 22
Primary Database Fails to Downgrade to 18c in Oracle Data Guard Configurations
/var/opt/oracle/dbaas_acfs/upgrade_backup/dbname/initdbname.ora
*.dg_broker_start=FALSE
3. Bring down the local instance and open it back in mount mode:
22-11
Chapter 22
Deleting a Database Does Not Delete the Associated Oracle Home
shutdown immediate;
dbaascli dbhome info: Lists all the database home and any associated databases in
the respective homes.
Identify the database home where no databases are running, and then run the
following command to delete Oracle home.
You can get the path of Oracle Home to purge details from the dbaascli dbhome info
command.
Related Topics
• dbaascli dbhome info
Use the dbaascli dbhome info command to view information about Oracle Home
directory locations.
• dbaascli dbhome purge
Use the command dbaascli dbhome purge to delete unused Oracle home
directory locations.
22-12
23
Introduction to Autonomous Database on
Exadata Cloud@Customer
Oracle Autonomous Database on Oracle Exadata Cloud@Customer combines the
benefits of a self-driving, self-securing, and self-repairing database management
system and the security and control offered by having it deployed securely on premise
behind your firewall.
After purchasing Autonomous Database on Oracle Exadata Cloud@Customer
and creating, provisioning and activating its Exadata Infrastructure hardware
and Oracle Cloud resource, several additional resource types become available
in the Exadata Cloud@Customer section of the Oracle Cloud Infrastructure
console: Autonomous Exadata VM Clusters, Autonomous Container Databases and
Autonomous Databases. You use these resources to create and manage your secure,
on-premise deployment of Oracle Autonomous Database.
• Database System Architecture Overview
• User Roles
• Available Exadata Infrastructure Hardware Shapes
• Oracle Exadata Cloud@Customer X8M-2 System Specifications
Review the technical specifications for each system configuration option for ADB-
D on Oracle Exadata Cloud@Customer.
• Access Control Lists (ACLs) for Autonomous Databases on Exadata
Cloud@Customer
Resource Types
Each level of the architecture model corresponds to one of the following resources
types:
• Oracle Exadata Cloud@Customer infrastructure: Hardware rack that includes
compute nodes and storage servers, tied together by a high-speed, low-latency
InfiniBand network and intelligent Exadata software.
Oracle Exadata Cloud@Customer infrastructure is common for both Autonomous
and Non-Autonomous resources.
23-1
Chapter 23
User Roles
For a list of the hardware and Oracle Cloud resource characteristics of Oracle
Exadata Cloud@Customer infrastructure resources that support Autonomous
Databases, see Available Exadata Infrastructure Hardware Shapes.
– Only the Oracle Exadata Cloud@Customer Infrastructures deployed before
Oracle announced support for Autonomous Databases on Oracle Exadata
Cloud@Customer do not support Autonomous resources listed below. Please
contact your Oracle sales representative to understand the infrastructure
upgrades required for supporting Oracle Autonomous Databases.
– You can create only one Autonomous VM cluster in an Exadata Infrastructure.
– Oracle Exadata Cloud@Customer infrastructure cannot simultaneously have
both Autonomous and Exadata VM clusters.
• Autonomous VM clusters on Exadata Cloud@Customer infrastructure: VM
cluster is a set of symmetrical VMs across all Compute nodes. Autonomous
Container and Database run all the VMs across all nodes enabling high
availability. It consumes all the resources of the underlying Exadata Infrastructure.
Before you can create any Autonomous Databases on your Exadata
Cloud@Customer infrastructure, you must create an Autonomous VM cluster
network, and you must associate it with a VM cluster.
• Autonomous Container Database: Provides a container for multiple
Autonomous Databases.
• Autonomous Database: You can create multiple autonomous databases within
the same autonomous container database. You can configure Oracle Autonomous
Database for either transaction processing or data warehouse workloads.
Deployment Order
You must create the dedicated Exadata infrastructure resources in the following order:
1. Exadata Infrastructure. See Preparing for Exadata Cloud@Customer and
Provisioning Exadata Cloud@Customer Systems for more information.
2. Autonomous Exadata VM cluster. See Managing Autonomous Exadata VM
Clusters for more information.
3. Autonomous Container Database. See Managing Autonomous Container
Databases for more information.
4. Autonomous Database. See Managing Autonomous Databases for more
information.
User Roles
Your organization may choose to split the administration of the Oracle Autonomous
Database on Oracle Exadata Cloud@Customer into the following roles:
• Fleet Administrator. Fleet administrators create, monitor and manage
Autonomous Exadata Infrastructure and Autonomous Container Database
resources. They must also setup customer managed Backup Destinations, such
as Recovery Appliance and NFS to be used by Autonomous Databases. A
fleet administrator must have permissions for using the networking resources
required by the Oracle Exadata Cloud@Customer infrastructure, and permissions
to manage the infrastructure and container database resources.
23-2
Chapter 23
Available Exadata Infrastructure Hardware Shapes
Note:
Oracle Autonomous Database does not currently support over-provisioning,
the ability for multiple autonomous databases to share a single CPU
core. Therefore, an Exadata Infrastructure resource can currently support,
across all its autonomous container databases, up to as many autonomous
databases as it has CPU cores.
23-3
Chapter 23
Oracle Exadata Cloud@Customer X8M-2 System Specifications
Tip:
X8M-2 support is available only in the ashburn-1 region.
** TB=1024^4
23-4
Chapter 23
Access Control Lists (ACLs) for Autonomous Databases on Exadata Cloud@Customer
• Oracle Application Express (APEX), RESTful services, and SQL Developer Web
are not subject to ACLs. Choosing to enable an ACL disables these features
automatically.
• Performance Hub is not subject to ACL rules.
• While creating a database, if setting ACL fails, then provisioning the database also
fails.
• Updating ACL is allowed if the database is in Available and
AvailableNeedsAttention states.
• Restoring a database does not overwrite the existing ACLs.
• Cloning a database, full and metadata, will have the same access control settings
as the source database. You can make changes as necessary.
• All CDB operations are allowed during ACL update. However, ADB operations are
not allowed during ACL update.
Related Topics
• Manage Access Control List of an Autonomous Database
23-5
24
Managing Autonomous Exadata VM
Clusters
An Autonomous Exadata VM Cluster is a set of symmetrical VMs across all Compute
nodes. Autonomous Container and Database run all the VMs across all nodes
enabling high availability. It consumes all the resources of the underlying Exadata
Infrastructure.
After you have created the Autonomous Exadata VM Cluster, you can create up to
12 Autonomous Container Database resources on it, depending on the capacity of
your Exadata Infrastructure hardware, as described in Available Exadata Infrastructure
Hardware Shapes.
• Create an Autonomous Exadata VM Cluster
• View a List of Autonomous Exadata VM Clusters
• View Details of an Autonomous Exadata VM Cluster
• Change the License Type on an Autonomous VM Cluster
• Move an Autonomous Exadata VM Cluster to Another Compartment
• Terminate an Autonomous Exadata VM Cluster
• Using the API to Manage Autonomous Exadata VM Clusters
24-1
Chapter 24
View a List of Autonomous Exadata VM Clusters
Note:
If you want to set a time zone other than UTC or the
browser-detected time zone, then select the Select another time
zone option, select a Region or contry, and then select the
corresponding Time zone.
If you do not see the region or country you want, then select
Miscellaneous, and then select an appropriate Time zone.
• Tags: Optionally, you can apply tags. If you have permissions to create a
resource, you also have permissions to apply free-form tags to that resource.
To apply a defined tag, you must have permissions to use the tag namespace.
For more information about tagging, see Resource Tags. If you are not sure if
you should apply tags, skip this option (you can apply tags later) or ask your
administrator. Avoid entering confidential information.
7. Click Create Autonomous Exadata VM Cluster.
24-2
Chapter 24
Change the License Type on an Autonomous VM Cluster
24-3
Chapter 24
Using the API to Manage Autonomous Exadata VM Clusters
4. Confirm that you wish to terminate your Autonomous Exadata VM Cluster in the
confirmation dialog.
5. Click Terminate VM Cluster.
24-4
25
Managing Encryption Keys on External
Devices
There are two options to store and manage database encryption keys for your
autonomous databases on Exadata Cloud@Customer:
1. In the Guest VM on the Exadata Infrastructure.
2. On an external key management device. Oracle Key Vault is the currently
supported device.
• About Oracle Key Vault
Oracle Key Vault is a full-stack, security-hardened software appliance built to
centralize the management of keys and security objects within the enterprise.
• Overview of Key Store
Integrate your on-premises Oracle Key Vault (OKV) with Autonomous Database
on Exadata Cloud@Customer to secure your critical data on-premises.
• Required IAM Policy for Managing OKV on Oracle Exadata Cloud@Customer
Review the identity access management (IAM) policy for managing OKV on Oracle
Exadata Cloud@Customer Systems.
• Tagging Resources
You can apply tags to your resources to help you organize them according to your
business needs.
• Moving Resources to a Different Compartment
You can move vaults from one compartment to another.
• Setting Up Your Exadata Cloud@Customer to Work With Oracle Key Vault
• Managing Your Key Store
Note:
The Oracle Key Vault is a customer-provisioned and managed system and it
is not part of Oracle Cloud Infrastructure managed services.
Related Topics
• Oracle Key Vault
25-1
Chapter 25
Overview of Key Store
25-2
Chapter 25
Tagging Resources
If you're new to policies, then see "Getting Started with Policies" and "Common
Policies". If you want to dig deeper into writing policies for databases, then see "Details
for the Database Service".
Related Topics
• Let database admins manage DB systems
• Getting Started with Policies
• Common Policies
• Details for the Database Service
Tagging Resources
You can apply tags to your resources to help you organize them according to your
business needs.
You can apply tags at the time you create a resource, or you can update the resource
later with the desired tags. For general information about applying tags, see "Resource
Tags".
Related Topics
• Resource Tags
25-3
Chapter 25
Setting Up Your Exadata Cloud@Customer to Work With Oracle Key Vault
• Step 4: Create a Policy Statement for Database Service to Use Secret from OCI
Vault Service
• Step 5: Create Key Store
Step 1: Create a Vault in OCI Vault Service and Add a Secret to the
Vault to Store OKV REST Administrator Password
Your Exadata Cloud@Customer infrastructure communicates with OKV over REST
each time an Autonomous Container Database is provisioned to register the
Autonomous Container Database and request a wallet on OKV. Therefore, Exadata
infrastructure needs access to the REST admin credentials.
These credentials can be stored securely in the Oracle Vault Service in OCI as a
Secret and accessed by your Exadata Cloud@Customer infrastructure only when
needed. These credentials are not accessible by a human operator administering the
Exadata infrastructure.
To store OKV administrator password in OCI Vault service, create a vault by following
the instructions outlined in "Managing Vaults" and create a Secret in that vault by
following the instructions outlined in "Managing Secrets".
Related Topics
• Managing Vaults
• Managing Secrets
Step 2: Create a Dynamic Group and a Policy Statement for Key Store
to Access Secret in OCI Vault
To grant your Key Store resources permission to access Secret in OCI Vault, you
create an IAM dynamic group that identifies these resources and then create an IAM
policy that grants this dynamic group access to the Secret you created in the OCI
Vaults and Secrets.
When defining the dynamic group, you identify your Key Store resources by specifying
the OCID of the compartment containing your Key Store.
1. Copy the OCID of the compartment containing your Key Store resource.
You can find this OCID on the Compartment Details page of the compartment.
2. Create a dynamic group by following the instructions in "To create a dynamic
group" in Oracle Cloud Infrastructure Documentation. When following these
instructions, enter a matching rule of this format:
25-4
Chapter 25
Setting Up Your Exadata Cloud@Customer to Work With Oracle Key Vault
3. After creating the dynamic group, navigate to (or create) an IAM policy in a
compartment higher up in your compartment hierarchy than the compartment
containing your vaults and secrets. Then, add a policy statement of this format:
where <dynamic-group> is the name of the dynamic group you created and
<vaults-and-secrets-compartment> is the name of the compartment in which
you created your vaults and secrets.
Related Topics
• To create a dynamic group
where <dynamic-group> is the name of the dynamic group you created and
<key-store-compartment> is the name of the compartment in which you created
your Key Store.
25-5
Chapter 25
Setting Up Your Exadata Cloud@Customer to Work With Oracle Key Vault
25-6
Chapter 25
Managing Your Key Store
• Tags: Optionally, you can apply tags. If you have permission to create a
resource, you also have permission to apply free-form tags to that resource.
To apply a defined tag, you must have permission to use the tag namespace.
For more information about tagging, see Resource Tags. If you are not sure if
you should apply tags, skip this option (you can apply tags later) or ask your
administrator. Avoid entering confidential information.
6. Click Create Key Store.
For more information, see "Managing Vaults", "Managing Keys", and "Managing
Secrets".
Related Topics
• Managing Vaults
• Managing Keys
• Managing Secrets
25-7
Chapter 25
Managing Your Key Store
5. Click the link in the Administrator Password Secret field to view secret details.
25-8
Chapter 25
Managing Your Key Store
Related Topics
• REST APIs
25-9
Chapter 25
Managing Your Key Store
• Security Credentials
• Software Development Kits and Command Line Interface
25-10
26
Managing Autonomous Container
Databases
Learn how you can create, view, move, change backup policies, manage maintenance
schedules, and perform other Oracle Autonomous Container Database management.
An Autonomous Container Database resource provides a container for your
Autonomous Databases. You can create multiple Autonomous Container Database
resources in a single Autonomous Exadata VM Cluster resource, but you must create
at least one before you can create any Autonomous Databases.
• Create an Autonomous Container Database
• View a List of Autonomous Container Databases
• View Details of an Autonomous Container Database
• Rotate CDB Encryption Key
• Change the Backup Retention Policy of an Autonomous Container Database
• Change the Maintenance Schedule of an Autonomous Container Database
• Restart an Autonomous Container Database
• Move an Autonomous Container Database to Another Compartment
• Terminate an Autonomous Container Database
• Using the API to Manage Autonomous Container Databases
26-1
Chapter 26
Create an Autonomous Container Database
26-2
Chapter 26
View a List of Autonomous Container Databases
Note:
• Tags: Optionally, you can apply tags. If you have permissions to create a
resource, you also have permissions to apply free-form tags to that resource.
To apply a defined tag, you must have permissions to use the tag namespace.
For more information about tagging, see Resource Tags. If you are not sure if
you should apply tags, skip this option (you can apply tags later) or ask your
administrator. Avoid entering confidential information.
9. Click Create Autonomous Container Database.
26-3
Chapter 26
View Details of an Autonomous Container Database
Note:
OKV Wallet Name represents the name of the wallet in which keys for
this CDB are generated on the OKV.
26-4
Chapter 26
Change the Backup Retention Policy of an Autonomous Container Database
Note:
You can rotate both Oracle-managed and customer-managed encryption
keys.
Note:
By default, database backups are retained for 30 days if you have chosen
Object Storage or NFS as a backup destination. You have the option of
retaining backups for 7, 15, 30, or 60 days. If you have chosen Local storage
as a backup destination, then by default, database backups are retained for
a maximum of 7 days. If you have chosen Recovery Appliance as a backup
destination, then you cannot update the backup retention policy.
The current backup retention policy for an Autonomous Container Database
is displayed on the Autonomous Container Database details page.
26-5
Chapter 26
Change the Maintenance Schedule of an Autonomous Container Database
Note:
You cannot restart an autonomous container database if a backup is in
progress on any of its autonomous databases.
26-6
Chapter 26
Move an Autonomous Container Database to Another Compartment
Note:
Note:
You must terminate all Autonomous Databases within a container database
before you can terminate the container database itself.
26-7
Chapter 26
Using the API to Manage Autonomous Container Databases
3. In the list of Autonomous Container Databases, click the display name of the
infrastructure resource you are interested in.
4. Click Terminate.
5. In the confirmation dialog, type the name of the Autonomous Container Database,
and then click Terminate Autonomous Container Database.
26-8
27
Managing Autonomous Databases
An Autonomous Database resource is a user database. When you create an
Autonomous Database, you choose the Autonomous Container Database for it and
you specify "Data Warehouse" or "Transaction Processing" as its workload type to
create an Autonomous Data Warehouse database or an Autonomous Transaction
Processing database.
You can create up to 400 Autonomous Databases in each Autonomous Container
Database, depending on the capacity of your Exadata Infrastructure hardware, as
described in Available Exadata Infrastructure Hardware Shapes.
• Create an Autonomous Database
• Manage Access Control List of an Autonomous Database
• View a List of Autonomous Databases
• View Details of an Autonomous Database
• Rotate ADB Encryption Key
• Set the Password of an Autonomous Database's ADMIN User
• Scale the CPU Core Count or Storage of an Autonomous Database
• Enable or Disable Auto Scaling for an Autonomous Database
• Move an Autonomous Database to Another Compartment
• Stop or Start an Autonomous Database
• Restart an Autonomous Database
• Back Up an Autonomous Database Manually
• Restore an Autonomous Database
• Clone an Autonomous Database
• Terminate an Autonomous Database
• Using the API to Manage Autonomous Databases
• Monitor Performance with Autonomous Database Metrics
27-1
Chapter 27
Create an Autonomous Database
27-2
Chapter 27
Manage Access Control List of an Autonomous Database
Note:
The database-level access control will be enabled without any IP
addresses in the access control list. Enabling an access control list with
an empty list of IP addresses makes the database inaccessible to all
clients
Specify the following types of addresses in your list by using the IP notation type
drop-down selector:
• IP Address allows you to specify one or more individual public IP addresses.
Use commas to separate your addresses in the input field.
• CIDR Block allows you to specify one or more ranges of public IP addresses
using CIDR notation. Use commas to separate your CIDR block entries in the
input field.
Advanced Options
Encryption Key: ADB inherits encryption settings from the parent ACD. If the
parent ACD is configured for customer-managed OKV based encryption, then the
child ADB will also have TDE Master Key generated and managed in the same
OKV wallet used to store ACD master keys. Additionally, any backups taken on
the Autonomous Database will have the OKV based key associated with it.
Tags: Optionally, you can apply tags. If you have permissions to create a resource,
you also have permissions to apply free-form tags to that resource. To apply a
defined tag, you must have permissions to use the tag namespace. For more
information about tagging, see Resource Tags. If you are not sure if you should
apply tags, skip this option (you can apply tags later) or ask your administrator.
Avoid entering confidential information.
5. Click Create Autonomous Database.
Note:
The following naming restrictions apply to Autonomous Transaction
Processing and Autonomous Data Warehouse databases:
• Names associated with databases terminated within the last 60 days
cannot be used when creating a new database.
• A database name cannot be used concurrently for both an
Autonomous Data Warehouse and an Autonomous Transaction
Processing database.
27-3
Chapter 27
View a List of Autonomous Databases
Note:
Autonomous Data Guard enabled Automonous databases:
• You can only view ACLs for standby databases.
• You can reset ACL for both the primary and standby databases from
the primary database details page. You cannot configure ACL from
the standby database details page.
27-4
Chapter 27
View Details of an Autonomous Database
Note:
You can rotate both Oracle-managed and customer-managed encryption
keys.
27-5
Chapter 27
Set the Password of an Autonomous Database's ADMIN User
27-6
Chapter 27
Enable or Disable Auto Scaling for an Autonomous Database
27-7
Chapter 27
Stop or Start an Autonomous Database
Note:
Note:
Stopping your database has the following consequences:
• On-going transactions are rolled back.
• You will not be able to connect to your database using database clients
or tools.
27-8
Chapter 27
Restart an Autonomous Database
Note:
During the backup operation, your autonomous database remains available.
However, lifecycle management operations such as stopping it, scaling it, or
terminating it are disabled.
27-9
Chapter 27
Restore an Autonomous Database
Optionally, you can check the state of your backup in the list of backups on the
database details page. For some states, an information icon is displayed to provide
additional details regarding the state or ongoing operations like deletions. The backup
has one of the following states:
• Creating
• Active
• Deleting
• Deleted
• Failed
Note:
Restoring an autonomous database puts the database in the unavailable
state during the restore operation. You cannot connect to a database in this
state. The only lifecycle management operation supported in the unavailable
state is terminate.
27-10
Chapter 27
Clone an Autonomous Database
27-11
Chapter 27
Clone an Autonomous Database
27-12
Chapter 27
Terminate an Autonomous Database
Tags: Optionally, you can apply tags. If you have permissions to create a resource,
you also have permissions to apply free-form tags to that resource. To apply a
defined tag, you must have permissions to use the tag namespace. For more
information about tagging, see Resource Tags. If you are not sure if you should
apply tags, skip this option (you can apply tags later) or ask your administrator.
Avoid entering confidential information.
6. Click Clone Autonomous Database.
The Console displays the details page for the new clone of your database and the
service begins provisioning the Autonomous Database. Note the following:
• The new clone displays the Provisioning lifecycle state until the provisioning
process completes.
• The source database remains in the Available lifecycle state.
• Backups associated with the source database are not cloned for either the full-
clone or the metadata-clone option.
WARNING:
Terminating an Autonomous Database permanently deletes it. The database
data will be lost when the system is terminated. However, automatic backups
are not deleted if you have chosen Recovery Appliance or NFS as a backup
destination. You can delete automatic backups directly from the Recovery
Appliance or NFS.
27-13
Chapter 27
Monitor Performance with Autonomous Database Metrics
27-14
Chapter 27
Monitor Performance with Autonomous Database Metrics
27-15
Chapter 27
Monitor Performance with Autonomous Database Metrics
27-16
28
Connecting to Autonomous Databases
Applications and tools connect to an autonomous database using Oracle Net Services
(also known as SQL*Net). Oracle Net Services enables a network session from a
client application to an Oracle Database server.
When a network session is established, Oracle Net Services acts as the data courier
for both the client application and the database. It is responsible for establishing and
maintaining the connection between the client application and the database, as well
as exchanging messages between them. It supports a variety of connection types to
autonomous databases, including:
• Oracle Call Interface (OCI), which is used by many applications written in
C language. Examples include Oracle utilities such as Oracle SQL*Plus,
SQL*Loader, and Oracle Data Pump.
• ODBC drivers, which can be used by applications running on Microsoft Windows,
are layered over Oracle Call Interface (OCI).
• JDBC OCI, which can be used by Java language applications, is layered over
Oracle Call Interface (OCI). The Oracle SQLcl command-line interface uses JDBC
OCI.
• JDBC Thin Driver, also for Java applications, is a pure Java driver. Oracle SQL
Developer supports JDBC Thin Driver connections.
Third-party products and custom applications can use any of these connection types.
Oracle Autonomous Database provides several pairs of database services to use
when connecting to autonomous databases. In each pair, one of the pair provides
a secure TCP (TCPS) connection using the TLS protocol, and the other provides a
TCP connection. In all other respects, the two members of a pair are the same. To
ensure security of data in transit, Oracle strongly recommends that you use a secure
connection, even if the database is only available through a private network. If you are
familiar with using an Oracle Database within your own data center, you may not have
previously used these secure connections.
To provide the secure TCPS connection, certification authentication uses an encrypted
key stored in a wallet on both the client (where the application is running) and the
server (where the autonomous database is running). The key on the client must match
the key on the server to make a connection. A wallet contains a collection of files,
including the key and other information needed to connect to your database . All
communications between the client and the server are encrypted.
• Download the Wallet for an Autonomous Database
• Get the APEX and SQL Developer Web URLs for an Autonomous Database
28-1
Chapter 28
Download the Wallet for an Autonomous Database
Note:
This password protects the downloaded Client Credentials wallet. This
wallet is not the same as the Transparent Data Encryption (TDE) wallet
for the database; therefore, use a different password to protect the Client
Credentials wallet.
Note:
Wallet files, along with the Database user ID and password, provide access
to data in your autonomous database. Store wallet files in a secure location.
Share wallet files only with authorized users. If wallet files are transmitted
in a way that might be accessed by unauthorized users (for example, over
public email), transmit the wallet password separately and securely.
28-2
Chapter 28
Get the APEX and SQL Developer Web URLs for an Autonomous Database
28-3
29
Patching ADB on Exadata
Cloud@Customer Infrastructure
• Overview of ADB on Exadata Cloud@Customer Infrastructure Patching
• Specifying When Maintenance Can Occur
• Specifying What Kind of Patches to Apply
29-1
Chapter 29
Specifying What Kind of Patches to Apply
Note:
Oracle recommends that you set a maintenance window for at least Exadata
Infrastructure resources. Doing so will prevent maintenance operations from
occurring at times that would be disruptive to regular database operations.
You can set the maintenance window for an Exadata Infrastructure and Autonomous
Container Database resources when you create them or you can set or change it later.
Once a maintenance activity is scheduled based on the maintenance window you set,
you can manage the actual timing of the activity, even to the point of changing the
patch version, applying the patch immediately, or skipping the activity.
Related Topics
• Using the Console to Create Infrastructure
To create your Oracle Exadata Cloud@Customer infrastructure, be prepared to
provide values for the fields required for configuring the infrastructure.
• Maintaining an Exadata Cloud@Customer System
Learn how to perform patching operations on Exadata Cloud@Customer
infrastructure.
• Create an Autonomous Container Database
• Change the Maintenance Schedule of an Autonomous Container Database
29-2
30
Using Autonomous Data Guard with
Autonomous Database on Exadata
Cloud@Customer
Learn how to enable a Data Guard association between databases, change the role
of a database in a Data Guard association using either a switchover or a failover
operation, and reinstate a failed database.
• Enabling Autonomous Data Guard on an Autonomous Container Database
When you enable Data Guard, a separate Data Guard association is created for
the primary and the standby database.
• Enabling Autonomous Data Guard on an Autonomous Database
Autonomous Databases inherit Data Guard settings from the parent container
database.
• Maintenance Scheduling and Patching Data Guard Enabled Autonomous
Container Database
Follow these steps to change the maintenance schedule of a Data Guard enabled
Autonomous Container Database.
Note:
Replication of data happens only over the client network.
30-1
Chapter 30
Enabling Autonomous Data Guard on an Autonomous Container Database
30-2
Chapter 30
Enabling Autonomous Data Guard on an Autonomous Container Database
Note:
You can set maintenance type only for primary.
Release Update (RU): Autonomous Database installs only the most current
release update.
Release Update Revision (RUR): Autonomous Database installs the release
update plus additional fixes.
For more information, see "management operations.
c. To configure the maintenance schedule, select Specify a schedule.
Choose your preferred month, week, weekday, and start time for autonomous
container database maintenance.
• Under Week of the month, specify which week of the month maintenance
will take place. Weeks start on the 1st, 8th, 15th, and 22nd days of the
month, and have a duration of 7 days. Weeks start and end based on
30-3
Chapter 30
Enabling Autonomous Data Guard on an Autonomous Container Database
30-4
Chapter 30
Enabling Autonomous Data Guard on an Autonomous Container Database
Note:
After successful completion of failover, the standby ACDs role will
change to primary and the primay's role will become disabled-standby.
30-5
Chapter 30
Enabling Autonomous Data Guard on an Autonomous Container Database
30-6
Chapter 30
Enabling Autonomous Data Guard on an Autonomous Container Database
6. In the confirmation dialog, type the name of the Autonomous Container Database,
and then click Terminate Autonomous Container Database.
30-7
Chapter 30
Enabling Autonomous Data Guard on an Autonomous Database
Related Topics
• REST APIs
• Security Credentials
• Software Development Kits and Command Line Interface
30-8
Chapter 30
Enabling Autonomous Data Guard on an Autonomous Database
30-9
Chapter 30
Enabling Autonomous Data Guard on an Autonomous Database
30-10
Chapter 30
Maintenance Scheduling and Patching Data Guard Enabled Autonomous Container Database
Note:
The following naming restrictions apply to Autonomous Transaction
Processing and Autonomous Data Warehouse databases:
• Names associated with databases terminated within the last 60 days
cannot be used when creating a new database.
• A database name cannot be used concurrently for both an
Autonomous Data Warehouse and an Autonomous Transaction
Processing database.
Related Topics
• About Autonomous Database
30-11
Chapter 30
Maintenance Scheduling and Patching Data Guard Enabled Autonomous Container Database
Note:
The standby database will have No preference by default. Standby
Maintenance depends on the primary maintenance schedule.
5. Optionally, you can change the maintenance patch type. To edit this setting, select
either Release Update (RU) or Release Update Revision (RUR).
Release Update (RU): Autonomous Database installs only the most current
release update.
Release Update Revision (RUR): Autonomous Database installs the release
update plus additional fixes.
Note:
Standby will be always patched before primary and the default gap
between standby and primary is 7 days. You have have an option to
change the default gap to anytime between 1 - 7 days.
Note:
Maintenance quarters begin in February, May, August, and
November, with the first maintenance quarter of the year beginning
in February.
30-12
Chapter 30
Maintenance Scheduling and Patching Data Guard Enabled Autonomous Container Database
• Under Week of the month, specify which week of the month maintenance will
take place. Weeks start on the 1st, 8th, 15th, and 22nd days of the month,
and have a duration of 7 days. Weeks start and end based on calendar dates,
not days of the week. Maintenance cannot be scheduled for the fifth week of
months that contain more than 28 days.
• Under Day of the week, specify the day of the week on which the maintenance
will occur.
• Under Start hour, specify the hour during which the maintenance run will
begin.
• Choose the buffer period between primary and standby maintenance
execution. Buffer period is the number of days before which the standby
Autonomous Container Database Maintenance will be scheduled before
primary Autonomous Container Database Maintenance
7. Click Save Changes.
30-13
Chapter 30
Maintenance Scheduling and Patching Data Guard Enabled Autonomous Container Database
Note:
Patching primary immediately will result in standby being patched first, if
standby is not already patched.
Note:
Skipping primary will skip standby also. If standby is patched, then skipping
on primary is not allowed.
30-14
Chapter 30
Maintenance Scheduling and Patching Data Guard Enabled Autonomous Container Database
Note:
You cannot skip scheduled maintenance more than twice, consecutively.
To reschedule maintenance, click Edit and enter a start time for the
update in the Edit Maintenance dialog. Ensure that your specified
container database maintenance window is later in the quarter than your
scheduled Exadata infrastructure maintenance.
30-15
31
Using Performance Hub to Analyze
Database Performance
Use the Performance Hub tool to analyze and tune the performance of a selected
Oracle Exadata Cloud@Customer Autonomous Database.
With this tool, you can view real-time and historical performance data. When you view
historical data in the Performance Hub, you are viewing statistics collected as part of
the hourly snapshots of your database.
Note:
Performance Hub supports only Autonomous Databases.
31-1
Chapter 31
Time Range Selector
The time range field (#1 in the above illustration) shows database activity in chart
form for the specified Time Range period. The time range is the amount of time being
monitored.
Use the Quick Select selector to set the time range. The menu includes five time
choices, Last Hour, Last 8 Hours, Last 24 Hours, Last Week, and Custom. The default
time range is Last Hour. To specify a custom time range, you can also click the Time
Range field. This opens the Custom Time Range dialog, allowing you to specify a
custom range.
The Activity graph displays the average number of active sessions broken down by
CPU, User I/O, and Wait. Maximum threads are shown as a red line above the time
field.
The sliding box (circled at right in the above illustration) on the time range chart is
known as the time slider. The time slider selects a section of the time range (#2 in the
above illustration) shown in the time range field. It shows the time being analyzed. In
the illustration, the arrows inside the time slider point to the vertical 'handle' elements
on the left and right boundaries of the slider box. The time slider works as follows:
• To change the start and end time of the analysis while keeping the same amount
of time between them, left click anywhere inside the box. Then slide the box left
or right along the time range without changing its size. The selected times are
displayed below the time graph.
• To increase or decrease the length of time being analyzed, left click either one of
the handles and drag it left or right to expand or contract the box.
• To refresh the data in Performance Hub according to the time range chosen, click
Refresh (upper right corner of the window).
31-2
Chapter 31
Time Zone Selector
Note:
The time slider provides an extra display feature in the Workload tab. See
the description in the Workload section of this page.
Use the Quick Select menu to set the time duration. The menu includes the
following five time choices: Last Hour, Last 8 Hours, Last 24 Hours, Last
Week, and Custom. The default Time Range is Last Hour. The time slider
selects the time period of the data displayed in Performance Hub. The time
slider has a different default time period based on the selected Time Range.
31-3
Chapter 31
Blocking Sessions Tab
• A red cross icon indicates that the SQL statement did not complete. The icon
displays when an error occurs because the session was terminated.
• A clock icon indicates that the SQL statement is queued.
To terminate a running or queued SQL statement, click Kill Session.
You can also click an SQL ID to go to the corresponding Real-time SQL Monitoring
page. This page provides extra details to help you tune the selected SQL statement.
31-4
Chapter 31
Using the Oracle Cloud Infrastructure Console
31-5
Chapter 31
Using the Oracle Cloud Infrastructure Console
31-6
Chapter 31
Using the Oracle Cloud Infrastructure Console
When you click an ID number, the Real-time SQL Monitoring page is displayed.
4. Click Download Report to download the report data for your selected SQL
statement.
Note:
If you see an error message that says the server failed to get
performance details for the selected session at the selected time, try the
selection again. If the same error message is displayed, try a different
time selection. If that fails, contact Oracle Support.
31-7
Chapter 31
Using the Oracle Cloud Infrastructure Console
Note:
The minimum wait time default setting is three seconds.
Killing a Session
1. Click the check box at the left of the session User Name to select a session.
The Kill Session button is enabled.
2. Click Kill Session.
The Kill Session confirmation dialog box is displayed.
3. Click Kill Session to end the session.
31-8
Chapter 31
Using the Oracle Cloud Infrastructure Console
31-9
32
Security Guide for Exadata
Cloud@Customer Systems
This guide describes security for an Oracle Exadata Cloud@Customer System.
It includes information about the best practices for securing the Oracle Exadata
Cloud@Customer System.
• Security Configurations and Default Enabled Features
• Additional Procedures for Updating Security Posture
Responsibilities
Exadata Cloud@Customer is jointly managed by the customer and Oracle.
The Exadata Cloud@Customer deployment is divided into two major areas of
responsibilities:
• Customer accessible services:
Components that the customer can access as part of their subscription to Exadata
Cloud@Customer:
– Customer accessible virtual machines (VM)
– Customer accessible database services
• Oracle-managed infrastructure:
– Power Distribution Units (PDUs)
– Out-of-band (OOB) management switches » InfiniBand switches
– Exadata Storage Servers
– Physical Exadata database servers
Customers control and monitor access to customer services, including network access
to their VMs (through layer 2 VLANs and firewalls implemented in the customer VM),
authentication to access the VM, and authentication to access databases running
32-1
Chapter 32
Security Configurations and Default Enabled Features
32-2
Chapter 32
Security Configurations and Default Enabled Features
This ensures that both Oracle and customers know what was done on the system
and when that occurred. These facts not only ensure we remain compliant with
reporting needs for external audits, but also can help match up some change with
a change in perceived behavior in the application.
Auditing capabilities are provided at all infrastructure components to ensure all
actions are captured. Customers also have ability to configure auditing for their
database and Guest VM configuration and may choose to integrate those with
other enterprise auditing systems.
• Automating Cloud Operations
By eliminating manual operations required to provision, patch, maintain,
troubleshoot, and configure systems, the opportunity for error is reduced and a
secure configuration is ensured.
The service is designed to be secure and by automating all provisioning,
configuration, and most other operational tasks, it is possible to avoid missed
configurations and ensure all necessary paths into the system are closed tightly.
Related Topics
• Overview of Oracle Exadata Database Machine Security
Security Features
• Hardened Operating System Image
– Minimal package installation:
Only the necessary packages required to run an efficient system are installed.
By installing a smaller set of packages, the attack surface of the operating
system is reduced and the system remains more secure.
– Secure configuration:
Many non-default configuration parameters are set during installation to
enhance the security posture of the system and its content. For example,
SSH is configured to only listen on certain network interfaces, sendmail
is configured to only accept localhost connections, and many other similar
restrictions are implemented during installation.
– Run only necessary services:
Any services that may be installed on the system, but not required for normal
operation are disabled by default. For example, while NFS is a service often
configured by customers for various application purposes, it is disabled by
default as it is not required for normal database operations. Customers may
choose to optionally configure services per their requirements.
• Minimized Attack Surface
As part of the hardened image, attack surface is reduced by disabling services.
• Additional Security Features Enabled (grub passwords, secure boot)
– Leveraging Exadata image capabilities, Exadata Cloud@Customer enjoys the
features integrated into the base image such as grub passwords and secure
boot in addition to many others.
– Through customization, customers may wish to further enhance their security
posture with additional configurations detailed later in this chapter.
• Secure Access Methods
32-3
Chapter 32
Security Configurations and Default Enabled Features
32-4
Chapter 32
Security Configurations and Default Enabled Features
NOLOGIN Users
bin:x:1:1:bin:/bin:/bin/false
daemon:x:2:2:daemon:/sbin:/bin/false
adm:x:3:4:adm:/dev/null:/bin/false
mail:x:8:12:mail:/var/spool/mail:/bin/false
nobody:x:99:99:Nobody:/:/bin/false
systemd-network:x:192:192:systemd Network Management:/:/bin/false
dbus:x:81:81:System message bus:/:/bin/false
rpm:x:37:37::/var/lib/rpm:/bin/false
sshd:x:74:74:Privilege-separated SSH:/var/empty/sshd:/bin/false
rpc:x:32:32:Rpcbind Daemon:/var/lib/rpcbind:/bin/false
nscd:x:28:28:NSCD Daemon:/:/bin/false
saslauth:x:999:76:Saslauthd user:/run/saslauthd:/bin/false
mailnull:x:47:47::/var/spool/mqueue:/bin/false
smmsp:x:51:51::/var/spool/mqueue:/bin/false
chrony:x:998:997::/var/lib/chrony:/bin/false
rpcuser:x:29:29:RPC Service User:/var/lib/nfs:/bin/false
uucp:x:10:14:Uucp user:/var/spool/uucp:/bin/false
nslcd:x:65:55:LDAP Client User:/:/bin/false
tcpdump:x:72:72::/:/bin/false
exawatch:x:1010:510::/:/bin/false
sssd:x:997:508:User for sssd:/:/bin/false
tss:x:59:59:Account used by the trousers package to sandbox the
tcsd daemon:/dev/null:/bin/false
dbmsvc:x:12137:11137::/home/dbmsvc:/bin/false
dbmmonitor:x:2003:2003::/home/dbmmonitor:/bin/rbash
root:x:0:0:root:/root:/bin/bash
oracle:x:1001:1001::/home/oracle:/bin/bash
grid:x:1000:1001::/home/grid:/bin/bash
opc:x:2000:2000::/home/opc:/bin/bash
dbmadmin:x:2002:2002::/home/dbmadmin:/bin/bash
32-5
Chapter 32
Security Configurations and Default Enabled Features
32-6
Chapter 32
Security Configurations and Default Enabled Features
Related Topics
• Security Features of Oracle Exadata Database Machine
32-7
Chapter 32
Security Configurations and Default Enabled Features
32-8
Chapter 32
Security Configurations and Default Enabled Features
#iptables -L -n -v
Chain INPUT (policy ACCEPT 0 packets, 0 bytes)
pkts bytes target prot opt in out source
destination
32-9
Chapter 32
Additional Procedures for Updating Security Posture
Customer Responsibilities
32-10
Chapter 32
Additional Procedures for Updating Security Posture
FORCE KEYSTORE
IDENTIFIED BY software_keystore_password
[USING 'backup_identifier'];
In this specification,
– software_keystore_password is the same password that you used when
creating the software keystore.
– hardware_keystore_credentials is the new software keystore password
which is the same as the password of the hardware keystore.
– WITH BACKUP creates a backup of the software keystore. Optionally, you
can use the USING clause to add a brief description of the backup.
Enclose this description in single quotation marks (' '). This identifier
is appended to the named keystore file, for example, ewallet_time-
stamp_emp_key_backup.p12, with emp_key_backup being the backup
identifier. Follow the file naming conventions that your operating system
uses.
32-11
Chapter 32
Additional Procedures for Updating Security Posture
IDENTIFIED BY software_keystore_password;
In this specification,
– LOCAL enables you to create a local auto-login software keystore.
Otherwise, omit this clause if you want the keystore to be accessible by
other computers.
– keystore_location is the path to the keystore directory location of the
keystore that is configured in the sqlnet.ora file.
– software_keystore_password is the existing password of the configured
software keystore.
2. Configure the Hardware Security Module Keystore Type
You can use the ALTER SYSTEM statement to configure the HSM keystore type.
For the software keystore to open with the hardware keystore, either the software
keystore must have the same password as the hardware keystore, or alternatively,
you can create an auto-login keystore for the software keystore.
a. Log in to the database instance as a user who has been granted the SYSDBA
administrative privilege.
For example:
The next example migrates from a TDE keystore to an Oracle Key Vault
keystore:
SHUTDOWN IMMEDIATE
STARTUP
32-12
Chapter 32
Additional Procedures for Updating Security Posture
To migrate from the software keystore to hardware keystore, you must use the
MIGRATE USING keystore_password clause in the ADMINISTER KEY MANAGEMENT
SET KEY SQL statement to decrypt the existing TDE table keys and the tablespace
encryption keys with the TDE master encryption key in the software keystore and
then reencrypt them with the newly created TDE master encryption key in the
hardware keystore.
After you complete the migration, you do not need to restart the database, nor
do you need to manually re-open the hardware keystore. The migration process
automatically reloads the keystore keys in memory.
• Migrate the hardware keystores by using the following syntax:
In this specification,
– user_name:password is the user ID and password that was created in Step
2 under Step 2: Configure the Hardware Security Module (in Configuring
Transparent Data Encryption). Enclose this setting in double quotation
marks (" ") and separate user_name and password with a colon (:).
– software_keystore_password is the same password that you used when
creating the software keystore or that you have changed to in Step 1:
Convert the Software Keystore to Open with the Hardware Keystore.
– USING enables you to add a brief description of the backup. Enclose
this description in single quotation marks (' '). This identifier is
appended to the named keystore file (for example, ewallet_time-
stamp_emp_key_backup.p12, with emp_key_backup being the backup
identifier). Follow the file naming conventions that your operating system
uses.
Note:
If the database contains columns encrypted with a public key, then
the columns are decrypted and reencrypted with an AES symmetric
key generated by HSM-based Transparent Data Encryption.
Option Description
-s, --status Displays current user password aging.
-u USER, --user=USER A valid interactive user's username.
--defaults Sets all password-aging values to *Exadata
factory defaults for all interactive users.
32-13
Chapter 32
Additional Procedures for Updating Security Posture
Option Description
--secdefaults Sets all password-aging values to **Exadata
secure defaults for all interactive users.
--policy Sets all password-aging values to the aging
policy as defind by the password-policy
command (or /etc/login.defs) for all
interactive users.
-M int, --maxdays=int Maximum number of days a password may be
used. Input limited to from 1 to 99999.
-m int, --mindays=int Minimum number of days allowed between
password changes. Input limited to from 0 to
99999, 0 for anytime.
-W int, --warndays=int Number of days warning given before a
password expires. Input limited to from 0 to
99999.
host_access_control password-policy --PASS_MAX_DAYS integer (60)*
--PASS_MIN_DAYS integer ( 1)*
--PASS_MIN_LEN integer ( 8)*
--PASS_WARN_AGE integer ( 7)*
--defaults
--status
Options Description
-h, --help Shows this help message and exits.
-d DENY, --deny=DENY Number of failed login attempts before an
account will be locked. Input is limited to from
1 to 10. (*Exadata factory default is 5)
-l LOCK_TIME, --lock=LOCK_TIME Number of seconds (integer) an account will
be locked due to a single failed login attempt.
Input is limited to from 0 to 31557600 (one
year) (*Exadata factory default is 600 (10m))
32-14
Chapter 32
Additional Procedures for Updating Security Posture
Options Description
-p list, --passwdqc=list FOR SYSTEMS RUNNING ON LESS THAN
OL7
Comma-separated set of 5 values:
N0,N1,N2,N3,N4 defining the minimum
allowed length for different types of password/
passphrases. Each subsequent number is
required to be no larger than the preceding
one. The keyword "disabled" can be used to
disallow passwords of a given kind regardless
of their length. (Refer to the pam_passwdqc
manpage for an explanation).
Passwords must use three character classes.
Character classes for passwords are digits,
lowercase letters, uppercase letters, and
other characters. Minimum password length
is 12 characters when using three character
classes.
Minimum password length is 8 characters
when using four character classes. ( *Exadata
factory default is 5,5,5,5,5) (**Exadata secure
default is disabled,disabled,16,12,8)
-q PWQUALITY, --pwquality=PWQUALITY FOR SYSTEMS RUNNING ON OL7 AND
GREATER
Integer, ranging from 6 to 40, defining the
minimum allowed password length. defined by
the Exadata secure defaults. All classes will
be required for password changes as well
as other checks enforced for lengths >7. For
lengths <8, class requirements are not used.
(*Exadata factory default is: minlen=8
dcredit=-1 ucredit=-1 lcredit=-1 ocredit=-1
difok=8 maxrepeat=3 maxclassrepeat=4)
(**Exadata secure default is: minlen=15
dcredit=-1 ucredit=-1 lcredit=-1 ocredit=-1
difok=8 maxrepeat=3 maxclassrepeat=4)
(Refer to the pam_pwquality manpage for
details)
-r REMEMBER, --remember=REMEMBER The last n passwords to remember for
password change history. Valid range is an
integer from 0 to 1000.
(*Exadata factory default is 10)
--defaults Sets all pam-auth values to *Exadata factory
defaults.
--secdefaults Sets all pam-auth values to **Exadata secure
defaults.
-s, --status Displays current PAM authentication settings.
32-15
Chapter 32
Additional Procedures for Updating Security Posture
man iptables : To get iptables help. Various websites online have many tutorials as
well.
iptables --list : To get current iptables rules.
Refer to earlier section "Guest VM Network Security" for details on what ports may
be required on Guest VM. To configure the firewall manually, create commands like
the following example. Note that it is possible to lock yourself out of the system by
blocking the ports over which you connect, so it's recommended to consult a test
system and engage an experienced iptables administrator if possible.
1. At the command prompt, enter the appropriate command for each port to be
opened, for example:
32-16
Chapter 32
Additional Procedures for Updating Security Posture
Pay Attention to What Actions May Impact Service-Related Logins for Cloud
Automation
For example, procedures will include ensuring that authorized keys used for cloud
automation actions remain intact.
For more information about Physical Network access controls including guidelines
for Oracle Cloud Automation, see Oracle Gen2 Exadata Cloud@Customer Security
Controls.
Oracle Cloud Automation access to the customer VM is controlled through token
based SSH. Public keys for Oracle Cloud Automation access are stored in the
authorized keys files of the oracle, opc, and root users of the customer VM.
The private keys used by the automation are stored and protected by the Oracle
Cloud Automation software running in the Exadata Cloud@Customer hardware in
the customer’s data center. The customer’s OCI Identity and Access Management
(IAM) controls govern if and how a customer can execute Oracle Cloud Automation
functionality against the customer VM and databases. The customer may further
control access through the management network and Oracle Cloud Automation
keys by blocking network access (firewall rules, disabling network interface), and by
revoking the credentials used by the Oracle Cloud Automation (remove the public keys
from the authorized keys files). Oracle Cloud Automation Access may be temporarily
restored by the customer to permit the subset of functionality required to access
the customer VM and customer databases, such as customer VM operating system
patching. Oracle Cloud Automation does not need network access the customer VM
to perform OCPU scaling, and OCPU scaling functionality will function normally when
customers block Oracle Cloud Automation network access to the customer VM.
32-17
Chapter 32
Additional Procedures for Updating Security Posture
32-18
Index
Index-1