Oracle Infrastructure Architect Associate All One PDF
Oracle Infrastructure Architect Associate All One PDF
Oracle Infrastructure Architect Associate All One PDF
1. Cover
2. Title Page
3. Copyright Page
4. Dedication
5. About the Author
6. Contents at a Glance
7. Contents
8. Acknowledgments
9. Introduction
10. Exam 1Z0-1072
11. Chapter 1 Oracle Cloud Infrastructure Concepts
1. Introduction to OCI
5. Chapter Review
1. Questions
2. Answers
1. Resources
2. Tenancy and Compartments
3. Users
4. Groups
5. Policies
6. Dynamic Groups
1. Resource Locations
2. Exercise 2-1: Subscribe to Another Region
3. Exercise 2-2: Create a Compartment and a VCN
4. Resource Identifiers
5. Managing Tags and Tag Namespaces
6. Advanced Policies
1. Create Compartments
2. Exercise 2-3: Create Compartments for
Organization
3. Create Groups, Users, Policies
4. Exercise 2-4: Create Groups, Users, and Policies
1. Questions
2. Answers
1. CIDR
2. Exercise 3-1: Expand CIDR Notation
3. Virtual Cloud Networks
4. Subnets
5. Gateways
3. DNS in OCI
1. VCN Design
2. Edge Security
6. Chapter Review
1. Questions
2. Answers
1. Compute Shapes
2. Compute Images
2. Instance Management
3. Chapter Review
1. Questions
2. Answers
1. Block Storage
2. Object Storage
1. FSS Concepts
2. Create, Configure, and Mount a File Storage
Service
3. Exercise 5-12: Create a File System, Mount Target,
and Mount with NFS Clients
4. FSS Snapshots
4. Chapter Review
1. Questions
2. Answers
3. Autonomous Databases
4. Database Migration
1. Connectivity
2. Data Transfer Service
3. Approaches to Migration
4. SQL*Loader
5. Export and Import
6. Data Guard
7. RMAN
8. Data Pump
9. Multitenant Migration Approaches
10. SQL Developer
5. Chapter Review
1. Questions
2. Answers
1. OCI CLI
3. Chapter Review
1. Questions
2. Answers
1. IAM
2. Networking
3. Compute Instances
3. Chapter Review
1. Questions
2. Answers
1. System Requirements
2. Y our Total Seminars Training Hub Account
1. Privacy Notice
20. Glossary
21. Index
Guide
1. Cover
2. Title Page
3. Oracle Cloud Infrastructure Architect Associate All-in-One Exam
Guide (Exam 1Z0-1072)
Page List
1. i
2. ii
3. iii
4. iv
5. v
6. vi
7. vii
8. viii
9. ix
10. x
11. xi
12. xii
13. xiii
14. xiv
15. xv
16. xvi
17. xvii
18. xviii
19. xix
20. xx
21. xxi
22. xxii
23. 1
24. 2
25. 3
26. 4
27. 5
28. 6
29. 7
30. 8
31. 9
32. 10
33. 11
34. 12
35. 13
36. 14
37. 15
38. 16
39. 17
40. 18
41. 19
42. 20
43. 21
44. 22
45. 23
46. 24
47. 25
48. 26
49. 27
50. 28
51. 29
52. 30
53. 31
54. 32
55. 33
56. 34
57. 35
58. 36
59. 37
60. 38
61. 39
62. 40
63. 41
64. 42
65. 43
66. 44
67. 45
68. 46
69. 47
70. 48
71. 49
72. 50
73. 51
74. 52
75. 53
76. 54
77. 55
78. 56
79. 57
80. 58
81. 59
82. 60
83. 61
84. 62
85. 63
86. 64
87. 65
88. 66
89. 67
90. 68
91. 69
92. 70
93. 71
94. 72
95. 73
96. 74
97. 75
98. 76
99. 77
100. 78
101. 79
102. 80
103. 81
104. 82
105. 83
106. 84
107. 85
108. 86
109. 87
110. 88
111. 89
112. 90
113. 91
114. 92
115. 93
116. 94
117. 95
118. 96
119. 97
120. 98
121. 99
122. 100
123. 101
124. 102
125. 103
126. 104
127. 105
128. 106
129. 107
130. 108
131. 109
132. 110
133. 111
134. 112
135. 113
136. 114
137. 115
138. 116
139. 117
140. 118
141. 119
142. 120
143. 121
144. 122
145. 123
146. 124
147. 125
148. 126
149. 127
150. 128
151. 129
152. 130
153. 131
154. 132
155. 133
156. 134
157. 135
158. 136
159. 137
160. 138
161. 139
162. 140
163. 141
164. 142
165. 143
166. 144
167. 145
168. 146
169. 147
170. 148
171. 149
172. 150
173. 151
174. 152
175. 153
176. 154
177. 155
178. 156
179. 157
180. 158
181. 159
182. 160
183. 161
184. 162
185. 163
186. 164
187. 165
188. 166
189. 167
190. 168
191. 169
192. 170
193. 171
194. 172
195. 173
196. 174
197. 175
198. 176
199. 177
200. 178
201. 179
202. 180
203. 181
204. 182
205. 183
206. 184
207. 185
208. 186
209. 187
210. 188
211. 189
212. 190
213. 191
214. 192
215. 193
216. 194
217. 195
218. 196
219. 197
220. 198
221. 199
222. 200
223. 201
224. 202
225. 203
226. 204
227. 205
228. 206
229. 207
230. 208
231. 209
232. 210
233. 211
234. 212
235. 213
236. 214
237. 215
238. 216
239. 217
240. 218
241. 219
242. 220
243. 221
244. 222
245. 223
246. 224
247. 225
248. 226
249. 227
250. 228
251. 229
252. 230
253. 231
254. 232
255. 233
256. 234
257. 235
258. 236
259. 237
260. 238
261. 239
262. 240
263. 241
264. 242
265. 243
266. 244
267. 245
268. 246
269. 247
270. 248
271. 249
272. 250
273. 251
274. 252
275. 253
276. 254
277. 255
278. 256
279. 257
280. 258
281. 259
282. 260
283. 261
284. 262
285. 263
286. 264
287. 265
288. 266
289. 267
290. 268
291. 269
292. 270
293. 271
294. 272
295. 273
296. 274
297. 275
298. 276
299. 277
300. 278
301. 279
302. 280
303. 281
304. 282
305. 283
306. 284
307. 285
308. 286
309. 287
310. 288
311. 289
312. 290
313. 291
314. 292
315. 293
316. 294
317. 295
318. 296
319. 297
320. 298
321. 299
322. 300
323. 301
324. 302
325. 303
326. 304
327. 305
328. 306
329. 307
330. 308
331. 309
332. 310
333. 311
334. 312
335. 313
336. 314
337. 315
338. 316
339. 317
340. 318
341. 319
342. 320
343. 321
344. 322
345. 323
346. 324
347. 325
348. 326
349. 327
350. 328
351. 329
352. 330
353. 331
354. 332
355. 333
356. 334
357. 335
358. 336
359. 337
360. 338
361. 339
362. 340
363. 341
364. 342
365. 343
366. 344
367. 345
368. 346
369. 347
370. 348
371. 349
372. 350
373. 351
374. 352
375. 353
376. 354
377. 355
378. 356
379. 357
380. 358
381. 359
382. 360
383. 361
384. 362
385. 363
386. 364
387. 365
388. 366
389. 367
390. 368
391. 369
392. 370
393. 371
394. 372
395. 373
396. 374
397. 375
398. 376
399. 377
400. 378
401. 379
402. 380
403. 381
404. 382
405. 383
406. 384
407. 385
408. 386
409. 387
410. 388
411. 389
412. 390
413. 391
414. 392
415. 393
Copyright © 2020 by McGraw-Hill Education
(Publisher). All rights reserved. Except as permitted
under the United States Copyright Act of 1976, no part of
this publication may be reproduced or distributed in any
form or by any means, or stored in a database or
retrieval system, without the prior written permission of
the publisher, with the exception that the program
listings may be entered, stored, and executed in a
computer system, but they may not be reproduced for
publication.
ISBN: 978-1-26-045260-0
MHID: 1-26-045260-3
TERMS OF USE
Acknowledgments
Introduction
Exam 1Z0-1072
Chapter 1 Oracle Cloud Infrastructure Concepts
Introduction to OCI
Exercise 1-1: Create a New OCI
Account
Cloud Computing Models
OCI Features and Components
Regions and Availability Domains
Exercise 1-2: Explore Your
Availability Domain and Region
Off-Box Network Virtualization
OCI Concepts and Terms
Identity and Access Management
Networking
Compute
Storage
Database Cloud Service
Chapter Review
Questions
Answers
Chapter 2 OCI Identity and Access Management
Explain IAM Concepts
Resources
Tenancy and Compartments
Users
Groups
Policies
Dynamic Groups
Describe Resource Locations and
Identifiers
Resource Locations
Exercise 2-1: Subscribe to Another
Region
Exercise 2-2: Create a Compartment
and a VCN
Resource Identifiers
Managing Tags and Tag Namespaces
Advanced Policies
Create IAM Resources
Create Compartments
Exercise 2-3: Create Compartments
for Organization
Create Groups, Users, Policies
Exercise 2-4: Create Groups, Users,
and Policies
Federate OCI with Various Identity
Providers
Set Up Dynamic Groups
Chapter Review
Questions
Answers
Chapter 3 OCI Networking
Networking Concepts and Terminology
CIDR
Exercise 3-1: Expand CIDR Notation
Virtual Cloud Networks
Subnets
Gateways
Use Virtual Cloud Networks
Exercise 3-2: Create VCNs and
Subnets
Exercise 3-3: Deploy a NAT Gateway
Exercise 3-4: Deploy a Service
Gateway
Exercise 3-5: Set Up Local VCN
Peering
Exercise 3-6: Set Up Remote VCN
Peering
DNS in OCI
DNS Concepts and Features
Creating and Managing DNS Records
Exercise 3-7: Set Up a DNS Zone and
Resource Records
Load Balancers in OCI
Load Balancer Terminology and
Concepts
Exercise 3-8: Set Up a Load Balancer
Design and Secure OCI Networks
VCN Design
Edge Security
Chapter Review
Questions
Answers
Chapter 4 Compute Instances
Compute Service Components
Compute Shapes
Compute Images
Instance Management
Create Compute Instances
Exercise 4-1: Create an SSH Key Pair
Exercise 4-2: Create a Compute
Instance to Use as a Web Server
Exercise 4-3: Create and Use a
Custom Image
Exercise 4-4: Create a Load Balancer
to Route Traffic to Web Servers
Exercise 4-5: Create and Connect to a
Windows Compute Instance
Manage Compute Instances
Instance Configurations, Pools, and
Autoscaling
Instance Console Connections
Chapter Review
Questions
Answers
Chapter 5 Storage
Block Storage
Create Block Volumes
Exercise 5-1: Create a Block Volume
Attaching Block Volumes
Exercise 5-2: Attach a Block Volume
to a Linux Instance
Connecting Block Volumes
Exercise 5-3: Connect a Block
Volume to Your Linux Volume
Using iSCSI and CHAP
Exercise 5-4: Format a Block
Volume, Create a File System, and
Mount the Volume
Exercise 5-5: Present a Block Volume
to a Windows Instance
Block Volume Backup Options
Exercise 5-6: Create a Full Backup of
a Block Volume
Exercise 5-7: Create and Back Up a
Volume Group
Delete and Recover Block Volumes
Exercise 5-8: Restore a Block
Volume Backup to a New Block
Volume
Exercise 5-9: Recover a Block
Volume Backup in a Different
Region
Object Storage
Buckets and Objects
Exercise 5-10: Upload, Restore, and
Download Using an Archive Tier
Bucket
Exercise 5-11: Upload, Restore, and
Download Using a Standard Tier
Bucket
Pre-Authenticated Requests
File Storage Service
FSS Concepts
Create, Configure, and Mount a File
Storage Service
Exercise 5-12: Create a File System,
Mount Target, and Mount with NFS
Clients
FSS Snapshots
Chapter Review
Questions
Answers
Chapter 6 Databases
Database Cloud Service
DBCS on Bare Metal
DBCS on Exadata (Exadata Cloud
Service)
DBCS on VM
Network Requirements for DBCS
Exercise 6-1: Configure a Public
Subnet with Internet Gateway for
Your DB System
Exercise 6-2: Create a DB System on
a VM
Exercise 6-3: Connect to the
Database System with SSH,
SQL*Plus, and asmcmd
Exercise 6-4: Connect to the
Database System with SQL
Developer
dbcli
DBCS Backups
Exercise 6-5: Make a Disk-Based
Database Backup Using dbcli
Exercise 6-6: Back Up Your TDE
Wallet to Object Storage Using dbcli
Exercise 6-7: Back Up Your Database
to Object Storage Using RMAN
Exercise 6-8: Create a Standalone
Managed Backup Using the Console
Exercise 6-9: Enable Automatic
Incremental Backups Using the
Console
DBCS Patching
Advanced Database Features
Database Licensing
Data Encryption
High Availability
Autonomous Databases
Create an Autonomous Database
Exercise 6-10: Create an ATP
Database Using the Console
Connecting to an Autonomous
Database
Exercise 6-11: Connect to an ATP
Database Using the SQL Developer
Back Up and Recover an Autonomous
Database
Operating an Autonomous Database
Database Migration
Connectivity
Data Transfer Service
Approaches to Migration
SQL*Loader
Export and Import
Data Guard
RMAN
Data Pump
Multitenant Migration Approaches
SQL Developer
Chapter Review
Questions
Answers
Chapter 7 Automation Tools
OCI CLI
Install and Configure OCI CLI
Exercise 7-1: Install the OCI CLI
Using the Quickstart Installation
Script
Exercise 7-2: Configure OCI CLI
Use OCI CLI
Exercise 7-3: Use the OCI CLI to List
Supported Oracle Databases
Terraform
Install and Configure Terraform and
the Provider for OCI
Exercise 7-4: Install and Configure
Terraform and the Provider for OCI
on Linux
Use Terraform
Exercise 7-5: Use Terraform to
Create and Remove an OCI VCN
Chapter Review
Questions
Answers
Chapter 8 OCI Best Practice Architectures
Design Highly Available Disaster Recovery
(HADR) OCI Solutions
Regions and Availability Domains
VCNs, Load Balancers, and Compute
Instances
VPN and FastConnect
Storage and Compute Instances
Performance-Based HADR
Database HADR
Leverage OCI Security Features to Protect
Your Cloud Infrastructure
IAM
Networking
Compute Instances
Chapter Review
Questions
Answers
Appendix About the Online Content
System Requirements
Your Total Seminars Training Hub Account
Privacy Notice
Single User License Terms and Conditions
TotalTester Online
Technical Support
Glossary
Index
ACKNOWLEDGMENTS
This book was written during the Cloud Wars, the most
aggressive and competitive software development period
I have witnessed in the technology industry. The wars
are not over. Cloud vendors vie for market share with
new features being released on an ongoing basis as they
attempt to gain an advantage over the competition.
Completing this book to a standard I am satisfied
with during this time of massive change would not have
been possible without the love, support, encouragement,
and friendship of my wife, Dr. Ameetha Garbharran. I
am also fortunate to receive positive energy and loads of
support from my parents, Harriesagar and Sabita Devi
Ramklass.
I am grateful, too, for the meticulous attention to
detail of the technical editor, Simon Pane, who kept me
focused on the quality of this endeavor. I appreciate the
support from my friend and colleague Christine Kivi and
the team at Eclipsys Solutions led by Michael
Richardson.
Finally, thank you to the team at McGraw-Hill,
specifically Lisa McClain, Claire Yee, Emily Walters, and
Radhika Jolly, who kept me on track with my deadlines
and showed patience and understanding while I realized
that the more things changed in the Cloud space, the
more they stayed the same.
INTRODUCTION
INTRODUCTION TO OCI
OCI has been engineered to be simple yet powerful.
Modern computer systems, whether hosted on your
desktop or in a data center, consist of four primary
elements:
EXAM TIP The three prim ary cloud-com puting m odels are
Infrastructure, Platform , and Software as a Serv ice, better known as
IaaS, PaaS, and SaaS. Com pute, Storage, and Network resources fall
under IaaS. Jav a and Database Cloud Serv ices are exam ples of PaaS
while ERP, SCM, and Analy tics Cloud applications are exam ples of
SaaS.
EXAM TIP The noisy neighbor phenom enon occurs when VMs
sharing a phy sical serv er are im pacted by one or m ore VM workloads
ov erwhelm ing the hy perv isor. This situation is av oided in OCI
through off-box network v irtualization.
Networking
OCI networking is elegantly simple yet powerful and
has direct parallels to networking in an on-premises
data center.
Load Balancers
A Load Balancer (LB) is a network device you may
provision that receives incoming traffic on an IP address
and routes the traffic to one or more underlying
instances. The OCI LB service is a regional service that
distributes traffic to instances either within the same
availability domain or across multiple availability
domains.
The protocol and ports being serviced by an LB are
specified in an entity called the Listener. When creating
an LB, you specify the VCN in which incoming traffic is
accepted as well as whether it will be a private or public
LB. You also choose the shape of the LB, which limits
the speed at which network traffic is routed. LBs are
commonly used to support high availability and scaling
out of web servers.
LBs distribute traffic to backend servers based on a
set of policies known as a backend set. Routing
algorithms, including Weighted Round-Robin, IP Hash,
and Least Connections, are specified when creating the
backend set. Path Route Sets specify a set of rules to
route requests to different backend sets but this is
optional and is only used if this level of sophistication is
necessary. Finally, backend sets reference one or more
hostnames, which are the target compute instances,
which may be running a web server.
EXAM TIP OCI load balancers support three protocols: TCP, HTTP,
and WebSockets.
Compute
When you provision a compute instance, you can
choose a virtual machine (VM) or a bare-metal (BM)
server. Bare-metal servers provide your instance with
exclusive use of the hardware. Not sharing hardware
with other instances comes at a cost and bare-metal
instances are more expensive that similarly sized virtual
machines. BM servers are only available with a much
higher CPU and memory footprint than entry-level VMs.
When you provision a new compute instance, you
specify a name; the AD it resides in; a boot volume,
which may be an Oracle-provided image such as Oracle
Linux 7.5; and the shape type, which is either BM or
VM. Depending on the operating system image and the
shape type chosen, you can select compatible shapes.
For example, you could provision a VM with the shape
labeled VM.DenseIO2.16 (16 OCPUs, 240GB RAM,
12.8TB NVMe SSD) or a bare-metal instance with the
BM.Standard1.36 (36 OCPUs, 256GB RAM) shape. The
shape names contain several useful identifiers. Standard
means that only block storage is available while
DenseIO refers to local NVMe drivers being present. The
last digits in the shape name refer to the number of
OCPUs, or Oracle Compute Units. An OCPU provides
CPU capacity equivalent to one physical core of an Intel
Xeon processor with hyperthreading enabled. Each
OCPU corresponds to two hardware execution threads,
known as vCPUs.
You are also required to provide a secure shell (SSH)
public key. SSH keys are created in pairs. The matching
private key, which must be stored safely, will allow you
to connect to the instance using the SSH protocol once it
is provisioned.
Storage
Once your compute instance is provisioned, it will have
a boot volume and usually no other storage. Four
storage types are available on OCI:
• Block volumes
• Object storage
• Archive storage
• File storage
CHAPTER REVIEW
OCI combines enormous power and a deceptively
simple user interface to offer an enterprise-grade IaaS
platform. Virtualization, consolidation, and removal of
data center management responsibilities are key
benefits to creating virtual cloud networks and
provisioning cloud architecture as an extension, and
ultimately a replacement, for your on-premises
workloads.
Periodic hardware refreshes to ensure supportability
on current equipment is now the responsibility of the
cloud vendor. Another compelling reason to consider
running your Oracle database workloads on OCI is the
potential cost savings on processor-based licenses. The
flexibility of scaling and bursting CPU cores on some
OCI-based database cloud services supports CPU sizing
for what you need most of the time and not for the
worst-case scenario.
High availability and disaster recovery options are
provided for by arrangements of fault-tolerant data
centers known as availability domains clustered
together to form a region. Regions are geographically
dispersed, some on different continents, and may be
linked together to accommodate Maximum Availability
Architectures.
Off-box networking is a key differentiator of OCI
from most other cloud vendors and promotes
predictable performance and uniquely enables OCI to
support both VMs and bare-metal compute instances,
RAC databases, and Engineered Systems.
An Identity and Access Management framework
isolates environments using compartments and uses
simple language policy statements to enforce the IAM
framework on users and groups.
A full suite of virtualized network entities may be
provisioned, including the virtual cloud network,
internet and dynamic routing gateways, load balancers,
route tables, and security lists.
Compute instances may be provisioned as virtual or
bare-metal machines based on a selection of available
compute shapes comprising various combinations of
OCPUs and memory, operating systems, and even some
PaaS options such as DBaaS. Block volume storage may
be added to your compute instances and systems may be
backed up to network file storage, object storage, or
archive storage for longer retention.
OCI offers a continually expanding suite of
enterprise-grade IaaS features and many (including this
author) believe it is one of the most exciting innovations
from Oracle.
Questions
1. Which cloud computing model offers the most
control of your environment?
A. PaaS
B. SaaS
C. IaaS
D. DBaaS
2. What infrastructure resource cannot be
provisioned in OCI?
A. NVMe storage
B. Networks
C. CPU and RAM
D. KVM switches
3. Which of the following statements is false?
A. VM instances may be created based on
available compute shapes.
B. Block storage volumes can be added only to
bare-metal machines.
C. VM instances may share resources on
physical servers with other tenants.
D. Block storage volumes can be added to both
virtual and bare-metal machines.
4. What is the OCI term for a fault-tolerant data
center?
A. Availability zone
B. Region
C. Virtual cloud network
D. Availability domain
5. Which of the following statements is true?
A. An availability domain is a collection of
regions.
B. A region is a collection of availability
domains.
C. An availability zone is a collection of regions.
D. Two or more regions in a metro area are
grouped into an AD.
6. Network performance is typically measured by
which two metrics? (Choose two.)
A. Bandwidth and latency
B. Round Trip Time and latency
C. Throughput and bandwidth
D. Isolation and disaster recovery
7. Which of the following statements is false?
A. Instances in one region can connect to
instances in another region.
B. Availability domains in a region share power
and cooling.
C. Each AD is self-contained and highly fault
tolerant.
D. Failure of one AD is very unlikely to impact
the availability of other ADs in the region.
8. Choose four storage types available on OCI.
A. Block volumes, object storage, archive
storage, SSD
B. Block volumes, file storage, archive storage,
SSD
C. Block volumes, object storage, archive
storage, file storage
D. Block volumes, buckets, file storage, SSD
9. A Load Balancing Router routes traffic to backend
servers based on which backend set routing
algorithms?
A. IP Hash, Weighted Round-Robin
B. IP Hash, Weighted Round-Robin, Least
Connections
C. Weighted Round-Robin, Least Connections
D. IP Hash, Weighted Round-Robin, Least
Connections, Shortest Path
10. What is the unique, Oracle-assigned identifier for
Oracle Cloud Infrastructure resources known as?
A. OCID
B. Tenant ID
C. ACID
D. Cloud account name
Answers
1. C. IaaS provides you access to a collection of
servers, storage, and network infrastructure onto
which you deploy your platform and software. You
have complete control of your environment.
2. D. KVM switches are not available or relevant in
OCI. OCI allows NVMe storage, networks, CPU,
and RAM to be provisioned.
3. B. Block storage volumes can be added to both
virtual and bare-metal machines.
4. D. An AD is a fault-tolerant data center.
5. B. A region is a collection of availability domains.
6. A. Bandwidth and latency are key metrics used to
measure network performance.
7. B. Availability domains in a region do not share
power and cooling.
8. C. Block volumes, object storage, archive storage,
and file storage are four storage options available
on OCI.
9. B. IP Hash, Weighted Round-Robin, and Least
Connections are valid backend set routing
algorithms that a Load Balancing Router can use
to route traffic to backend servers.
10. A. Each Oracle Cloud Infrastructure resource has
a unique, Oracle-assigned identifier called an
Oracle Cloud ID (OCID).
CHAPTER
2
OCI Identity and Access
Management
In this chapter, you learn how to
• Explain IAM concepts
• Describe resource locations and identifiers
• Create IAM resources
• Federate OCI with various identity providers
• Set up dynamic groups
Resources
Typical on-premises IT infrastructure resources include
servers, SANs, and network infrastructure. OCI
infrastructure resources have a parallel definition and
refer to artifacts, including compute instances, block
storage volumes, object storage buckets, file system
storage, virtual cloud networks (VCNs), load balancers,
and Dynamic Routing Gateways. The previous list is not
exhaustive and is constantly expanding as new
computing resources and technologies are activated on
OCI.
Your OCI resources may also fall victim to
infrastructure sprawl unless a well-planned, standards-
based architecture and nomenclature for resource
management is established at an early stage in your OCI
adoption. If such a system is already in place with your
on-premises resources and is working well, it will
provide a great baseline onto which the new concepts
can be bolted.
Bear in mind that cloud infrastructure adoption
should be transparent to your end-users. At the end of
the day, your HR executive probably cares more that the
people management applications are available,
performant, and meeting SLAs, and less about the
underlying infrastructure.
Some organizations have data residency regulations
that restrict the geographical location of data. These
requirements may be accommodated if there are
geographically local OCI regions. For example, the
initial OCI regions came online in the United States.
Many public sector organizations in Canada have a
regulatory restriction on data leaving Canadian soil.
Oracle has provisioned a Canadian region with an
availability domain in Toronto, which has opened the
door for widespread OCI adoption in that region.
Another design consideration to bear in mind relates to
data sovereignty. Some organizations have regulatory
limitations on the location of the staff who work on
their data. For example, a large Canadian insurance
corporation has a legal obligation to its policy holders
guaranteeing that their data is never worked on by non–
Canadian-based staff. This poses a challenge to
infrastructure management which is met by a simple,
guaranteed mechanism to logically segregate OCI
resources discussed in the next section.
OCI resources are categorized by resource-types. An
individual resource-type is the most granular and
includes vcn, subnet, instance, and volume
resources. Individual resource-types are grouped into
family resource-types such as virtual-network-
family, instance-family, and volume-family.
Resource-types may also be referenced as an
aggregation of all resources at both compartment and
tenancy levels as all-resources. These resource-
types are important for defining resource management
policies.
Users
An OCI user is an individual or system that requires
access to OCI resources. There are three types of users:
• Local users
• Federated users
• Provisioned (or synchronized) users
User Credentials
Users connect to OCI using several types of credentials.
Your username and password are authenticated when
you sign in to the OCI console. When you access a Linux
compute instance, you need an SSH key (see Chapter 4)
to make a connection to the operating system. Figure 2-
4 shows a federated user named neo with a list of user
resources on the bottom left, including API keys, Auth
tokens, SMTP credentials, customer secret keys, and the
number of groups to which the user belongs. Usernames
may also be simple names or based on email addresses.
Figure 2-4 OCI user management
Groups
OCI users are organized into groups. A user may belong
to many groups. When your OCI account is created, a
default Administrators group is created. The
Administrators group initially has a single member—the
user that was created when the tenancy was
provisioned. As an administrator, you may create
additional administrator users and add them to this
group or create other groups for duty separation. The
administrator users have complete control over all
resources in the tenancy so access to this group should
be tightly regulated. It is good practice to set up groups
for teams of users who perform similar work.
For example, you may have a team of network
administrators in your organization that is placed in a
NetworkAdmins group. For applications or systems that
have data sovereignty requirements, you could create a
group of users who reside in a specific locale—for
example, Canadian Network Admins. This group could
be given permission to manage the network resources in
the Canadian HR compartment to meet the data
sovereignty requirement. Groups cannot be nested.
Figure 2-5 shows the default Administrators group
along with two custom groups: Managed_Services and
NetworkAdmins.
Figure 2-5 OCI groups
Policies
Policies are the glue that determines how groups of
users interact with OCI resources that are grouped into
compartments. You may want the HR application
administrators to manage all resources in a
compartment dedicated to the HR department:
EXAM TIP Policies are inherited by their child com partm ents. If a
policy is created in the root com partm ent, it applies to all
com partm ents. A policy created in a child com partm ent with no
subcom partm ents applies only to the relev ant resources within that
child com partm ent.
NOTE The perm issions granted by v arious policy v erbs are entirely
dependent on the OCI resource-ty pe. Generally , the inspect v erb lets
y ou list av ailable resources, the read v erb lets y ou uncov er user-
specified m etadata about that resource, the use v erb lets y ou use and
change the actual resource as long as that change is not effectiv ely
dropping and recreating it. Finally , the m anage v erb lets y ou create
and delete the resource-ty pe. Som e resource-ty pes hav e lim ited APIs
so, for exam ple, the inspect, use, and read lev els of authorization for
policies prov ide identical perm issions. The im portant take-away is
that each resource-ty pe m ust be understood carefully while assigning
perm issions because each lev el exposes unique resource-specific APIs
and y ou need to hav e a clear understanding of exactly what
perm issions are being granted.
Dynamic Groups
A powerful feature closely related to the notion of self-
driving, self-tuning, automated systems involves
granting groups of compute instances permission to
access OCI service APIs. If you require aggregations of
compute instances to interface with OCI resources, you
create a dynamic group and add compute instances as
members. Instances in dynamic groups act as IAM users
to provision compute, networking, and storage
resources based on IAM policies.
EXAM TIP While the OCI com m and-line interface tool is not an
explicit topic in the exam , sev eral questions do refer to this tool. It is
im portant to understand the fundam ental operation of the OCI CLI.
Knowledge of the SDKs and HDFS is not m easured in the exam .
Resource Locations
When a cloud tenancy is created, a default data region is
chosen. As of this writing, you can choose APAC, EMEA,
or North America as your default data region. You
should choose the region based closest to your primary
cloud users or primary on-premises data center
locations. The tenancy is then created in one of the
regions. When you log in to OCI, the top-right corner
indicates your primary or home region. Choose Manage
Regions from the region drop-down list and you see
more details about your tenancy. Figure 2-9 shows a
tenancy created with a North American default data
region and allocated us-ashburn-1 as its Home Region. A
home region is important for IAM resources.
EXAM TIP IAM changes do not occur im m ediately across all regions.
A user im pacted by a policy change in the hom e region will experience
a propagation delay before the changes are effected in all regions.
EXAM TIP The region subscriptions occur at the tenancy lev el. All
IAM resources including policies are av ailable in all regions to which
y our tenancy has subscribed.
Regional and Availability Domain–Level Resources
Non-IAM resources exist at a region level or at an
availability domain level. Remember that a region
consists of one or more ADs. An AD is a fault-tolerant
data center. If you think about it, when you launch a
compute instance, there is either a bare metal or virtual
machine running in a data center. The compute instance
is therefore an availability domain–specific resource. It
exists in a single physical location. A virtual cloud
network, however, spans all the ADs in a region and is
therefore a regional resource. The following are some
examples of region-specific resources:
• buckets
• images
• Internet Gateways (IG)
• Customer Premises Equipment (CPE)
• Dynamic Routing Gateways (DRGs)
• NAT Gateways
• route tables
• Local Peering Gateways (LPGs)
• repositories
• security lists
• volume backups
• volumes
• database systems
• instances
• ephemeral public IPs
Resource Identifiers
Tenancies, Regions, ADs, Compartments, Groups,
Users, Policies, and every other OCI resource is assigned
a unique identifier known as an Oracle Cloud Identifier
or OCID (sometimes pronounced “o-sid”). OCIDs are
required to use the API for OCI. OCIDs are unique
across all tenancies.
The OCID is based on this format:
Free-Form Tags
Free-form tags are limited and offer a pretty basic form
of tagging. You can apply as many tags as you want to a
resource, but there is a 5-kilobyte JSON limitation on all
applied tags and their values per resource.
Figure 2-11 shows a free-form tag with a key called
BusinessUnit (no spaces are permitted) and a value of
Finance being added to a resource. This particular free-
form tag was added to a parent compartment, its child
compartment, and an object storage bucket used by the
Finance business unit.
Defined Tags
Defined or schema tagging is the recommended
enterprise-grade mechanism for organizing, reporting,
filtering, managing, and performing bulk actions on
your OCI resources.
Defined tags rely on a tenant-wide unique namespace
that consists of tag keys and tag values. The tag
namespace serves as a container for use with IAM
policies.
Consider your existing on-premises infrastructure
tracking system. Chances are high that you have a
system that factors in departments or lines of business
or cost-centers for your infrastructure. You may also
want to organize resources by project or team. There is a
facility for enabling tags as cost-tracking tags that
appear on your invoice, which is very useful for
implementing a chargeback system. As of this writing
there is a limit of ten tags that may be identified as cost-
tracking tags, so factor this into your tag naming
strategy.
To set up a defined tag schema, you must first create
a tag namespace. In the console, navigate to Governance
| Tag Namespaces, and choose Create Namespace
Definition, as in Figure 2-13 where the Finance
namespace is created in the Lab compartment.
Figure 2-13 Creating a defined tag namespace
Once you define your tag keys, you can apply these to
any resource by navigating to the resource, choosing the
tag menu, and choosing the namespace and tag key from
a list of values. You are then required to provide just a
tag value. This prevents accidental sprawl of many
similar but misspelled tags, which is a pet peeve for
many administrators. Tags generally refer to defined
tags in the documentation. Most resources are taggable,
and the list is expanding with the intention of making
all OCI resources taggable. You can apply tags with the
console, CLI, or SDKs, but usually it is good practice to
do so when creating resources. Applying tags does
require authorization, and an IAM policy must be
created to permit non-administrator users to apply tags.
A group can be explicitly given permissions to inspect or
view the tag key definitions as follows:
CAUTION Only printable ASCII letters are allowed as tag nam espace
and tag key definition nam es. Tag v alues can, howev er, be any
Unicode characters.
Advanced Policies
Armed with an understanding of OCIDs and resource-
types, the full power of IAM policies can be expressed.
This section discusses aggregate, or family, resource-
types, policy location options, and how to use conditions
in policies.
Family Resource-Types
Individual resources may be grouped into collections or
families of related resources for ease of management. In
Exercise 2-2, a VCN, route table, default security list,
Internet gateway, and three subnets were created. All of
these individual resource-types belong to the aggregate
resource-type called virtual-network-family. Policy
syntax can be applied to both individual and aggregate
resource-types. Some examples of aggregate resource-
types include:
• all-resources
• cluster-family
• database-family
• dns
• file-family
• instance-family
• object-family
• virtual-network-family
• volume-family
Policy Locations
Figure 2-17 also extends the location component of the
policy syntax to include compartment OCID in addition
to compartment name and tenancy. An example of this
was shown in Figure 2-10, where the Lab compartment
is referenced in a policy statement using its OCID.
Policy Conditions
You may specify conditions on policy statements to have
finer-grained control over your resources. Policy
conditions use one or more predefined variables that
you reference in the “where clause” of the policy
statement. The following policy statement permits
members of the US-DBAs group to manage all database
resources in the US_ONLY compartment, as long as the
group member makes a request from either the Ashburn
or Phoenix regions.
Refer to the conditions “where clause” in Figure 2-17.
The policy syntax allows conditions to test the equality
or inequality of a variable or whether any of a set of
conditions is true or whether all conditions in a set of
conditions are true.
Table 2-5 summarizes the variables allowed in policy
conditions.
EXAM TIP The topic of adv anced policy statem ents using conditions
is out of scope of the exam . It is a powerful feature essential to fine-
grained policy adm inistration and is included for com pleteness. A solid
understanding of fam ily resource-ty pes as well as policy location
options is, howev er, required for the exam .
Create Compartments
After careful business analysis, you conclude that all the
departments should have a dedicated compartment to
host resources specific to their needs. Shared resources
will be located in the parent compartment at the
organization-level compartment.
• Compartment OCID
• Compute instance OCID
• Tag namespace and tag key
• Tag namespace, tag key, and tag value
CAUTION Any user who can connect to the instance (using SSH)
autom atically inherits the priv ileges granted to a com pute instance
that is authorized to act on serv ice resources, so ensure that y ou
carefully control access and that these users should be authorized with
the perm issions granted to the instance.
• Compute
• Block volume
• Load balancing
• Object storage
• File storage
Questions
1. Which IAM resources are global and span
regions?
A. Compartments
B. Policies
C. Compute instances
D. DBAAS
2. Which policy verbs authorize groups to interact
with resources with the highest level of
permission?
A. inspect
B. read
C. administer
D. use
3. Which policy verbs authorize groups to interact
with resources in order from lowest to highest
level of permission?
A. inspect, read, manage, use
B. inspect, read, use, manage
C. inspect, read, administer, use
D. inspect, read, use, administer
4. Which is a capability of OCI users but not
federated users?
A. Can add API keys
B. Can generate Auth tokens
C. Can use a local password for console access
D. Can generate customer secret keys
5. Which of the following statements is true?
A. Region subscriptions occur at the AD level.
B. Region subscriptions occur at the
compartment level.
C. Region subscriptions occur at the group level.
D. Region subscriptions occur at the tenancy
level.
6. Instances are added to dynamic groups based on
what rules?
A. Policy statements
B. Matching rules
C. Compartment OCID and Auth token
D. Inheritance
7. Matching rules that determine the inclusion or
exclusion of instances in dynamic groups are
based on one of more of the following?
A. Compartment OCID, Instance OCID, tags
B. Instance shape, system load
C. Tenancy OCID, Region OCID, AD OCID
D. Policy syntax
8. Where is a federated user in your tenancy
authenticated?
A. OCI IAM service
B. IDCS
C. The identity provider where it was created
D. Active Directory Federation Services
9. Which resource is not an availability domain–
level resource?
A. Compute instance
B. Subnet
C. Block volume
D. Object storage
10. What is the name given to the location where the
master copy of OCI IAM resources are located?
A. Home region
B. Primary IAM site
C. Identity provider
D. Tenancy
Answers
1. A, B. Compartments, users, groups, and policies
are global resources and span regions. When you
create these IAM entities, they exist in all regions
to which your tenancy or cloud account has
subscribed.
2. D. The verbs to authorize groups to interact with
resources in order of lowest to highest levels of
permission are inspect, read, use, and manage.
3. B. The verbs in order of lowest to highest levels of
permission are inspect, read, use, and manage.
There is no administer verb in the policy syntax.
4. C. Federated users have to use credentials from
their identity provider to sign in.
5. D. The region subscriptions occur at the tenancy
level. All IAM resources, including policies, are
available in all regions to which your tenancy has
subscribed.
6. B. Matching rules determine the inclusion or
exclusion of instances in dynamic groups.
7. A. Matching rules that determine the inclusion or
exclusion of instances in dynamic groups are
based on one or more of the following:
compartment OCID, compute instance OCID, tag
namespace and tag key, and tag namespace, tag
key, and tag value.
8. C. Federated users are authenticated in the IdP
where they were created.
9. D. Object storage buckets are an interesting
regional resource. An instance in AD: US-
ASHBURN-AD-1 may access a bucket in the
region: us-ashburn-1. This bucket is equally
accessible by another instance in AD: US-
ASHBURN-AD-2. Given the correct region-specific
object storage URL and permissions, this bucket is
accessible from any location.
10. A. IAM resources are available in all regions you
have subscribed to but their master definitions
always reside in the home region.
CHAPTER
3
OCI Networking
In this chapter, you will learn how to
• Describe OCI networking concepts
• Use virtual cloud networks
• Explain DNS concepts
• Create load balancers
• Design and secure OCI networks
CIDR
The dominant version of network addressing is Internet
Protocol version 4 (IPv4). There is a growing prevalence
of IPv6 addressing, but the de facto standard remains
IPv4 addressing. In the early days of the Internet (1981–
93), the 32-bit IPv4 address space was divided into
address classes based on the leading four address bits
and became known as classful addressing. The class A
address space accommodated 128 networks with over 16
million addresses per network while the class B address
space accommodated 16,384 networks with 65,536
addresses per network; finally, the class C address space
accommodated over 2 million networks with 256
addresses per network. Class A network blocks are too
large and class C network blocks are too small for most
organizations so many class B network blocks were
allocated although they were still too large in most
cases. Classful addressing was wasteful and accelerated
the consumption of available IP addresses. To buy time
before the IP exhaustion problem manifests, a new
scheme known as Classless Inter-Domain Routing
(CIDR) was introduced in 1993.
EXAM TIP Your knowledge of CIDR blocks will be tested extensiv ely
in the exam so ensure y ou hav e a good understanding of how to deriv e
a netm ask from a CIDR block. Also note that the sm aller the network
prefix, the m ore bits are av ailable for the host address space, which
im plies a larger IP address range.
Route Tables
Route tables contain rules that determine how network
traffic coming in or leaving subnets in your VCN is
routed via OCI gateways or specially configured
compute instances. The default route table created when
you create a VCN has no routing rules. You can add
rules to the empty default route table or add your own
new route tables.
Security Lists
Security lists contain firewall rules for all the compute
instances using the subnet. Ingress and egress rules
specify whether certain types of traffic are permitted
into and out of the VCN respectively. The traffic type is
based on the protocol and port and a rule can be either
stateful or stateless. Stateful rules allow connection
tracking and are the default, but stateless is
recommended if you have high traffic volumes. Stateful
rules with connection tracking allow response traffic to
leave your network without the need to explicitly define
an egress rule to match an ingress rule. Stateless rules,
however, do not permit response traffic to leave your
network unless an egress rule is defined. One of the
ingress rules in the default security list allows traffic
from anywhere to instances using the subnet on TCP
port 22. This supports incoming SSH traffic and is
useful for connecting to Linux compute instances.
DHCP Options
DHCP services provide configuration information to
compute instance at boot time. You can influence only a
subset of the DHCP service offerings by setting DHCP
Options. These operate at a subnet level but in the
absence of multiple subnet-level DHCP Options, the
default set applies to all compute instances created in
the VCN.
Subnets
A subnet is a portion of your network or VCN that
comprises a contiguous CIDR block that is a subset of
the VCN CIDR block. When a VCN plus related
resources is created through the console in a region with
three ADs, three subnets are also automatically created,
one per AD with the default non-overlapping CIDR
blocks of 10.0.0.0/24, 10.0.1.0/24, and 10.0.2.0/24.
These blocks specify a range of 256 addresses per
subnet. This leaves over 64,000 addresses from the VCN
CIDR block that may be allocated to new subnets in
your VCN. The CIDR blocks allocated to subnets must
not overlap with one another. Regional subnets are also
available and span all ADs in a region.
Figure 3-2 shows a new subnet that will be created in
the Lab VCN in the Lab compartment, in the US-
ASHBURN-AD-1 AD with the CIDR block 10.0.5.0/28.
This is acceptable because this is a subset of the CIDR
block 10.0.0.0/16 assigned to the VCN. If the CIDR
block format is invalid, some validation checking is
performed and you are informed if there are problems.
If the CIDR validation check passes, you see the IP
range listed below the CIDR block you entered, similar
to this: Specified IP addresses: 10.0.5.0–10.0.5.15 (16 IP
addresses).
Figure 3-2 Creating a subnet
vNICs
The OCI networking service manages the association
between virtual NICs (vNICs) and physical NICs on
servers in OCI data centers. A vNIC resides in a subnet
and is allocated to a compute instance, thus allowing the
instance to connect to the subnet’s VCN. Upon launch of
a compute instance, a private, unremovable vNIC is
assigned to the instance and allocated a private IP
address (discussed next). Secondary vNICs can be
assigned to and removed from an existing instance at
any time. A secondary vNIC may reside in any subnet in
the VCN as long as it is in the same AD as the primary
vNIC. Each vNIC has an OCID, resides in a subnet, and
includes the following:
Private IP Addresses
An OCI private IP address object has an OCID and
consists of a private IPv4 address and an optional DNS
hostname. Each compute instance is provided a primary
private IP object upon launch via the DHCP service. The
private IP address cannot be removed from the instance
and is terminated when the instance is terminated. As
discussed in the earlier section on vNICs, you may
choose to add secondary vNICs to your instance, each of
which has a primary private IP object to which you can
optionally assign a public IP object as long as that vNIC
belongs to a public subnet.
A secondary private IP may be optionally added after
an instance has launched and must come from the CIDR
block of the subnet of the respective private vNIC. A
secondary private IP may be moved from its vNIC on
one compute instance to a vNIC on another instance as
long as both vNICs belong to the same subnet. Any
public IP assigned to the secondary private IP moves
with it.
Public IP Addresses
A public IP address is an IPv4 address that is accessible
or routable from anywhere on the Internet. Direct
communication from the Internet to an instance is
enabled by assigning a public IP address to a vNIC in a
public subnet. An OCI public IP is defined as an object
that consists of a public IPv4 address assigned by OCI
Networking service, an OCID, and several properties
depending on the type. There are two types of public IP
addresses:
Gateways
OCI uses the terminology of virtual routers and
gateways interchangeably and has created several novel
virtual networking components.
Internet Gateway
An Internet gateway is attached to any new VCN. It
allows instances with public IP addresses to be reached
over the Internet and for these instances to connect to
the Internet. There is very limited configuration of this
virtual router and your control is limited to the create,
delete, get, list, and update commands. Here is an
example of the OCI CLI get command on the Internet
gateway. Internet access at a VCN level may be disabled
by updating the is-enabled property of the Internet
gateway to false.
NAT Gateway
A network address translation (NAT) gateway allows
instances with no public IP addresses to access the
Internet while protecting the instance from incoming
traffic from the Internet. When an instance makes a
request for a network resource outside the VCN, the
NAT gateway makes the request on behalf of the
instance to the Internet and forwards the response back
to the instance.
Service Gateway
A service gateway allows OCI instances to access OCI
services (which are not part of your VCN) using a
private network path on OCI network fabric without
needing to traverse the Internet. A service gateway gets
an OCID and is a regional resource providing access to
OCI services to the VCN where it resides without using
an Internet or NAT gateway.
NOTE Serv ice gateway s initially allowed access to the object storage
serv ice discussed in detail in Chapter 5. Priv ate access for PaaS was
added next and, as OCI ev olv es, new serv ices will be accessible v ia
serv ice gateway s. If an instance with a public IP belongs to a VCN with
an Internet gateway , and OCI serv ices are accessed, the request is
routed through the OCI fabric by the Internet gateway and not ov er
the public Internet. The object storage serv ice in each region is labeled
using the region prefix. For exam ple, the us-ashburn-1 and uk-london-
1 regions are nam ed OCI IAD Object Storage and OCI LHR Object
Storage, respectiv ely .
DNS IN OCI
A hostname is a name provided to a computer or host
either explicitly or through the DHCP service discussed
earlier. The Domain Name System (DNS) is a directory
that maps hostnames to IP addresses. The OCI DNS
service is a regional service. This section describes DNS
concepts and features in OCI as well as several advanced
DNS topics, including zone management and creating
and managing DNS records.
NOTE You can use different DHCP options per subnet and not the
default set used by all subnets in the VCN. If y ou choose different DHCP
options, such as different search dom ains at a subnet lev el, y ou lose the
flexibility of instances in the VCN com m unicating with hostnam es.
Instead, they hav e to use FQDNs to com m unicate.
NOTE OCI norm alizes all RDATA into a consistent and standardized
form at as per RFC 1 03 4 , so be aware that the RDATA display ed in the
DNS zone records m ay differ slightly from the RDATA y ou subm itted.
A com m on norm alization is to append a trailing dot (the DNS root
zone) to the giv en nam e of a dom ain if one does not already exist. For
exam ple, cloud.oracle.com is norm alized to cloud.oracle.com. by
appending a dot.
NOTE New OCI regions are being initially prov isioned with a single
AD. In these regions, y ou are only required to specify a single public
subnet in y our VCN when creating a public load balancer.
Listener
At least one listener is created for each load balancer,
and as of this writing, up to 16 listeners may be created.
Each listener in a load balancer defines a set of
properties that include a unique combination of
protocol (HTTP or TCP) and port number. Web traffic
(HTTP) is also known as application layer or layer 7
(from the OSI model) traffic while TCP traffic is known
as transport layer or layer 4 traffic. Figure 3-14 shows
the listener properties that may be defined. At a
minimum, a listener requires a protocol and a port.
Backend Set
A load balancer is a network device that ultimately
routes traffic to one or more reachable backend
compute instances (called backend servers) that reside
in any subnet in the VCN. A backend set is a logical
grouping of backend servers and a traffic distribution
policy. Figure 3-15 shows a backend set with two
compute instances (webserver1 and webserver2) and
their compartments, IP addresses, local listening ports
(which may be different from the load balancer listener
port), and a weight. It is good practice to spread backend
set instances across multiple ADs to support high
availability.
Figure 3-15 Backend set information
VCN Design
A VCN is allocated an unmodifiable contiguous IPv4
CIDR range from /16 to /30, so when designing VCNs,
ensure that the range is sufficiently large. Many
customers use VCNs with a /16 netmask and subnets
with /24 netmasks, primarily selecting smaller VCNs
and subnet ranges to avoid overlapping with existing
networks. This is also the default VCN and subnet sizing
provided when you create a VCN plus related resources
through the console. A VCN spans all ADs in a region
and may contain subnets in any AD in the region.
Regional subnets allow for a subnet to span all ADs in a
region and may simplify your design. You may, however,
want to use AD-specific subnets to isolate networks by
AD in a multi-AD region.
Edge Security
When designing security for your VCN, many OCI
networking components are available out of the box to
support good practice, starting with private and public
subnets. It is usually permissible to expose a public load
balancer to the Internet for HTTP traffic to your public
website or web applications. These points of entry need
to be secured and protected. Sensitive databases should
be located in private subnets. NAT gateways may be
used for instances in private networks to gain one-way
access to Internet resources and still be protected. Use
the route table infrastructure to ensure that Dynamic
Routing Gateways only route allowed traffic between
your VCN and your on-premises network or other cloud
networks.
Each subnet can have one route table comprising
rules that route traffic to one or more targets. It is good
practice for hosts that have similar routing
requirements to use the same route tables across
multiple ADs. It is also recommended that private
subnets have individual route tables to control traffic
flow. Traffic between all compute instances within a
VCN is routable but the VCN route table limits routing
of traffic into and out of the VCN.
Each subnet may have multiple security lists (up to a
hard limit of 5, as of this writing), each of which
supports multiple stateful and stateless ingress and
egress rules. You must ensure that security lists behave
like firewalls, managing traffic into and out of the VCN
(known as North–South traffic) as well as managing
internal VCN traffic between multiple subnets (known
as East–West traffic).
Oracle also recommends the use of OCI IAM policies
to allow only authorized groups of users to manage VCN
resources. As with all security policies, it is usually best
to provide the minimum set of privileges to groups.
CHAPTER REVIEW
Understanding OCI networking is a fundamental skill
for architecting and securing your OCI environment.
This chapter explored the relationship between many
generic networking concepts. Many on-premises
physical network components are virtualized in OCI but
are essentially functionally equivalent. This chapter
assumed no prior networking experience, explaining
CIDR blocks before introducing virtual cloud networks.
The speed at which you can provision a VCN and create
subnets, route tables, and security lists is astonishing in
OCI. A detailed discussion of subnets, both public and
private, ensued by defining how public and private IP
objects are assigned to vNICs from your subnets.
Internet gateways extend your VCN by providing
Internet access to public subnets while NAT gateways
provide a mechanism for instances in private subnets to
access the Internet. Service gateways extend the reach of
instances in your VCN to other OCI services, notably
object storage, without needing to route traffic through
the DRG. Local peering gateways link up VCNs in the
same region, while remote peering across regions is
facilitated by running a remote peering connection
through your DRG.
We turned our focus to the DNS edge services as well
as how to create and manage DNS records and zones.
The chapter explored private and public load balancers
and explained the underlying listeners, backend sets,
path route rules, and rule sets. The chapter closed with a
discussion of best practices when designing VCNs and
sizing subnets as well as considerations for edge
security. With your VCN and subnets in place, you are
ready to start creating compute instances, the subject of
Chapter 4.
Questions
1. Choose the CIDR range with the largest IP
address block?
A. 192.168.1.1/30
B. 192.168.1.1/255
C. 10.1.0.0/16
D. 255.255.255.0
2. Which statement regarding the scope of a VCN is
true?
A. A VCN is a regional construct.
B. A VCN is a global construct.
C. A VCN is an AD-level construct.
D. All of the above.
3. Which of the following network components
facilitates access to the Internet?
A. Local peering gateway
B. Service gateway
C. Internet gateway
D. Remote peering connection
4. Which set of prerequisites must be met before an
instance can be accessed from the Internet?
Choose one or more options.
A. The instance must be in a public subnet.
B. The instance must be in a private subnet.
C. The route table must be configured
appropriately.
D. The security list must be configured
appropriately.
E. The VCN must contain a functional Internet
gateway.
F. The VCN must contain a functional NAT
gateway.
5. Which of the following statements is true?
A. BGP is supported with IPSec VPN but not
FastConnect when connecting external
networks to your VCN.
B. BGP is supported with FastConnect but not
IPSec VPN when connecting external
networks to your VCN.
C. BGP is supported with FastConnect but not
IPSec VPN when connecting subnets within
your VCN.
D. BGP is supported with IPSec VPN but not
FastConnect when connecting subnets within
your VCN.
6. How many IP addresses does a private load
balancer require?
A. One
B. Two
C. Three
D. Four
7. A VCN is defined with the CIDR 192.168.0.0/30.
How many IP addresses from this CIDR block are
reserved by OCI?
A. 1
B. 2
C. 3
D. 4
8. A VCN is defined with the CIDR 192.168.0.0/30.
How many IP addresses from this CIDR block are
available for host addresses?
A. 1
B. 30
C. 192
D. 168
9. Which protocols are supported by OCI load
balancers?
A. HTTP/1.0, HTTP/1.1, HTTP/2.0
B. HTTP/1.0, HTTP/1.1, HTTP/2.0, TCP
C. WebSocket, HTTP/1.0, HTTP/1.1, HTTP/2.0,
TCP
D. WebSocks, TCP, HTTPS
E. WebSocks, SSL, TCP, HTTP
10. Which are three load balancer traffic distribution
policies?
A. Weighted Round Robin, IP Hash, Coin Toss
B. Weighted Round Robin, IP Hash, Random
C. Round Robin, Coin Toss, Most Connections
D. Weighted Round Robin, IP Hash, Least
Connections
Answers
1. C. The lower the netmask in the CIDR notation,
the larger the addressable IP range.
2. A. A VCN spans all ADs in a region and is
therefore a regional construct.
3. C. An Internet gateway is required to facilitate
Internet access in a VCN.
4. A, C, D, E. Several prerequisites must be met
before an instance can connect to the Internet.
The subnet it is created in must be a public
subnet, with appropriately configured route tables
and security lists, located in a VCN with an
Internet gateway.
5. B. BGP is supported with FastConnect but not
IPSec VPN when connecting external networks to
your VCN.
6. C. A private load balancer requires three IP
addresses from the associated subnet for the
primary and standby load balancers as well as the
floating private IP.
7. C. OCI networking service reserves the first IP
known as the network address, the last IP known
as the broadcast address, as well as the first host
address in the CIDR range known as the subnet
default gateway address.
8. A. This CIDR block specifies four IPs:
192.168.0.0–192.168.0.3. After OCI networking
services takes the three it requires, only one
remains for host addressing.
9. C. OCI load balancers support many protocols,
including TCP, HTTP/1.0, HTTP/1.1, HTTP/2.0,
and WebSocket.
10. D. The three traffic distribution policies available
for load balancers are Weighted Round Robin, IP
Hash, and Least Connections.
CHAPTER
4
Compute Instances
In this chapter, you will learn how to
• Describe compute service components
• Create and manage compute instances
• Explain advanced compute concepts
Compute Shapes
A compute shape is a predefined bundle of computing
resources, primarily differentiated by Oracle Compute
Units (OCPUs), memory, network interfaces, network
bandwidth, and support for block and NVMe local
storage. An OCPU is equivalent to a hyperthreaded core.
Therefore, each OCPU corresponds to two hardware
execution threads, known as vCPUs. Table 4-1 lists a
subset of available compute shapes across both VM and
BM instance types. New compute shapes are added as
new hardware is added to availability domains.
Table 4-1 VM and BM Compute Shapes
CAUTION Not all shapes are av ailable in all regions. For exam ple,
the first-generation shapes are only av ailable to certain tenancies in
the Phoenix, Ashburn, and Frankfurt regions. When y ou create a
com pute instance, there m ay already be serv ice lim its im posed on
y our account. These m ay be elev ated but require a serv ice request to
be opened by an adm inistrator through the OCI console.
NOTE The underly ing phy sical serv er that hosts m ultiple VMs or a
single BM instance is an Oracle bare-m etal serv er like an X7 -2 x86
m achine y ou could purchase for y our on-prem ises data center. VMs
share the phy sical infrastructure, whereas BM instances hav e
dedicated access to the CPU cores, m em ory , and network interfaces
(NICs) on the phy sical hosts. A wide range of com pute shapes is
currently av ailable, and the v ariety will continue to increase as
dem and grows. It is im portant to know y our options to understand the
costs and benefits of each shape. Unsurprisingly , bare-m etal shapes
cost m ore than their VM counterparts, and larger m achines cost m ore
than sm aller m achines. This will inform prudent decision-m aking
that balances scalability and perform ance requirem ents with
financial constraints.
Compute Images
When creating compute instances, a key decision is to
determine the operating system image. You may choose
from the following:
Platform Images
OCI offers several pre-built Linux and Windows images
complete with the appropriate drivers to rapidly
provision your instance. Available OCI preconfigured
images include these operating systems in various
shape-related editions. Table 4-2 shows several images
for several Windows Server images.
Table 4-2 Several Preconfigured Windows Images and
Supported Shape Type
Using the CLI, you may also list the current set of
images:
Oracle Images
Oracle has published images with preinstalled
applications known as Oracle images. Figure 4-2 shows
how applications, including the Oracle E-Business Suite
Demo environment, Oracle Enterprise Manager, or
PeopleSoft Cloud Manager, can be deployed by simply
selecting an image from a list of prebuilt applications.
CAUTION Not all Oracle im ages are av ailable in all regions. The
repository of canned im ages is expanding and im ages are released to
different regions at different tim es.
Partner Images
OCI provides a cloud marketplace where third-party
vendors proffer their application software to OCI users.
Partner images are pre-built images that include an
operating system and application deployment from a
third-party provider. These images have been vetted by
Oracle and are considered trusted images. Upon
choosing a partner image on which to base your
compute instance, you are required to accept legal terms
and conditions from both Oracle and the third-party
vendor that governs your use of the image.
Custom Images
OCI provides an interface for you to create your own
images from existing compute instances and save these
as custom images to be used as the basis for future
compute instance deployments. Custom images may be
based on OCI platform, oracle, or partner images that
have been customized in some way, or they may be
imported from an external image that meets several
requirements.
Some organizations create a master image,
sometimes known as a gold image, that is rolled out to a
specific user community. You can create a custom
image, ensuring that all security, network, and antivirus
settings are in place with appropriate patches. These
could be desktop images preloaded with office
productivity applications or pretty much any software.
Another situation that lends itself to custom images
is related to autoscaling, discussed later in this chapter.
Imagine a website hosted on a single compute instance
running an HTTP server. You can create a custom image
from this compute instance and use it as the basis for
automatically provisioning additional preconfigured web
server compute instances when your website is
overloaded.
Figure 4-3 shows the OCI console interface used for
importing pre-existing external images as custom
images.
Figure 4-3 Import custom images for compute
instances.
Boot Volumes
When you create a compute instance, you may
configure the boot volume for the instance. This is a
special block volume that stores the operating system
and boot loader required to launch the compute
instance. Figure 4-5 shows several optional boot volume
configuration options.
The boot volume size may be increased to provide
headroom for future growth of the boot volume. The
default boot volume size depends on the image chosen.
Linux images usually require a significantly smaller
boot volume than Windows images. Access to boot
volumes is provided to compute instances through the
OCI Block Volume service. Storage blocks traverse a
network fabric between the underlying storage and the
compute instance. You may choose to encrypt the data
in-transit. Boot volumes may also be encrypted at rest
using predefined keys you have configured using the
Key Management vault.
NOTE Choosing a custom boot v olum e size increases the size of the
block v olum e presented to the OS but not the size of the file sy stem s
built upon it. You need to m anually extend the v olum e to take
adv antage of the larger size.
EXAM TIP A boot v olum e used as the im age source for a com pute
instance m ust be av ailable in the sam e AD chosen to host the com pute
instance.
Image OCID
Custom and platform images are storage resources with
OCIDs. You can create a compute instance by
referencing an available image by its OCID. This image
is then used to clone a new boot volume for your
compute instance. Figure 4-7 shows an older-platform
image (Oracle Linux 6.8) that is no longer available
through the platform images list, being referenced using
its OCID.
INSTANCE MANAGEMENT
It is about time we get into the thick of things and
create some compute instances. Prerequisites include
having a VCN in place and deciding on an architecture.
If you have worked through exercises in the earlier
chapters, you should have several VCNs in place in your
OCI tenancy and should be good to go. This section
consists of several exercises geared to producing a
solution based on the architecture in Figure 4-8. The
second part in this section discusses management of
these compute instances.
Figure 4-8 Two compute instances serving as web
servers as part of a backend set
NOTE While the console is great for deploy ing relativ ely sm all
solutions, it does not scale well to large solutions. Treating
infrastructure as a serv ice and deploy ing hundreds or thousands of
com pute instances, network, storage, and security infrastructure is
only practical by lev eraging autom ation tools such as Terraform , OCI
CLI scripts, or the APIs through the SDKs. Autom ation tools are
discussed in Chapter 7 .
Create Compute Instances
This section consists of five exercises that entail
Instance Metadata
Instance metadata on Oracle-provided images is
retrieved by querying a special IP address while
connected to an instance as follows. This provides
instance metadata similar to the OCI console output.
Instance Power Management
Compute instance management tasks may be performed
using the following OCI CLI command:
• START Power on
• STOP Power off
• RESET Power off and power on
• SOFTRESET Graceful shutdown and power on
• SOFTSTOP Graceful shutdown
Multiple vNICs
Secondary vNIC management is also supported through
the OCI CLI. Current vNICs may be listed with the
list-vnics command:
An additional vNIC may be added with the attach-
vnic command:
EXAM TIP Instances in an instance pool are prov isioned in the sam e
region but can be in m ultiple av ailability dom ains.
Questions
1. List the compute instance types available for
provisioning on OCI.
A. Virtual machines
B. Paravirtualized machines
C. Bare-metal machines
D. OVM, KVM, and Hyper-V
2. Which of the following compute images may be
used to create a compute instance?
A. Oracle and Platform images
B. Boot volumes and Partner images
C. Paravirtualized machines
D. OVA format images
3. A boot volume has been detached from an
instance in AD1. Which of the following
statements are true?
A. A compute instance can be created in AD2
using the boot volume in AD1.
B. A compute instance cannot be created in AD2
using the boot volume in AD1.
C. The boot volume can be backed up in A1 and
restored in AD2 and used to create a compute
instance in AD2.
D. The boot volume cannot be moved.
4. A compute instance is not starting up. You
suspect a problem with the boot volume. Which of
the following options may be used to troubleshoot
this further?
A. There is nothing further to do. The compute
instance must be cloned and recreated.
B. A console connection may be created to see if
there is more information available on the
console.
C. The compute instance must just be reimaged
from the same source image.
D. The boot volume may be detached and
attached to another working instance as a
regular volume to access log files and examine
configuration.
5. Which of the following statements is true?
A. Instances in an instance pool may be
provisioned across multiple VCNs.
B. Instances in an instance pool may be
provisioned across multiple regions.
C. Instances in an instance pool are provisioned
in the same AD.
D. Instances in an instance pool are provisioned
in the same region.
6. Instance metadata on Oracle-provided Linux
images are retrieved by querying which special IP
address while connected to an instance?
A. http://169.254.169.254/opc/v1/instance/
B. http://127.0.0.1/opc/v1/instance/
C. http://255.255.255.0/opc/v1/instance/
D. There is no such thing. Use the OCI console
or CLI to get instance metadata.
7. Autoscaling requires which of the following
resources in order to work? Choose all dependent
resources.
A. Multiple vNICs
B. Instance pool
C. Instance configuration
D. Autoscaling policy
8. Which of the following statements is true?
A. When autoscaling is enabled, OCI provisions
as many compute instances as required, with
no limit when scale-out thresholds are
exceeded.
B. When autoscaling is enabled, OCI provisions
as many compute instances as required,
limited by the autoscaling policy.
C. When autoscaling is enabled, OCI provisions
an equal number of compute instances as
there currently are in the instance pool to
ensure even load balancing.
D. When autoscaling is enabled, OCI provisions
zero compute instances. The cloud
administrator must authorize the provisioning
of new instances.
9. Which instance management ACTION commands
are supported by the OCI CLI command: oci
compute instance action --instance-id
ocid1.instance.oc1.XX --action ACTION?
A. TERMINATE
B. CREATE
C. STOP
D. SOFTRESET
E. HARDSTOP
10. Which hypervisors are supported by OCI on bare-
metal instances?
A. Kernel-based VM (KVM)
B. Oracle VM (OVM)
C. Oracle Virtual Box
D. Oracle Solaris containers
E. Hyper-V
Answers
1. A, C. VM and BM are the only available compute
types.
2. A, B. Oracle, Platform, and Partner images and
Boot volumes may be used to create a compute
instance.
3. B, C. A boot volume used as the image source for
a compute instance must be available in the same
AD chosen to host the compute instance. A boot
volume may be backed up and restored in a
different AD.
4. B, D. Using a console connection to see if more
information is available on the instance console is
usually helpful as is detaching the boot volume
from the problematic instance and attaching it to a
working instance as a regular volume to access log
files and examine configuration.
5. D. Instances in an instance pool are provisioned
in the same region.
6. A. Instance metadata on Oracle-provided Linux
images are retrieved by querying
http://169.254.169.254/opc/v1/instance/.
7. B, C, D. Autoscaling requires an instance pool,
instance configuration, and an autoscaling policy.
8. B. When autoscaling is enabled, OCI provisions
as many compute instances as required, limited by
the autoscaling policy.
9. C, D. ACTION commands relate to power
management for the instance and include: START,
STOP, RESET, SOFTRESET, and SOFTSTOP.
10. A, B, E. OCI provides support for installing
several hypervisors on bare-metal instances,
including KVM, OVM, and Hyper-V.
CHAPTER
5
Storage
In this chapter, you will learn how to
• Create and manage block storage volumes
• Use object storage
• Explain file storage service
BLOCK STORAGE
Block volumes are provided to your compute instances
by the OCI block volume service. This service manages
and carves out block storage volumes as per your
requirement. Block volumes may be created, attached,
connected, or detached from compute instances. In fact,
a block volume may be detached from one compute
instance and attached to another instance in the same
AD, thereby moving the volume. They may be grouped
with other block volumes to form a logical entity known
as a volume group. Volume groups may be backed up
together to form a consistent point-in-time, crash-
consistent backup that is also useful for cloning.
A boot volume is a special type of block volume
because it contains a boot image. OCI differentiates
between boot volumes and block volumes. When you
create a compute instance, you may either create a new
boot volume, which hosts the operating system boot
image, or use an existing available unused boot volume.
Boot volumes are discussed in Chapter 4. Additional
block volumes may be created and attached to your
instances to expand available storage. Block volumes
may be used for database storage or for hosting general
purpose file systems.
EXAM TIP There are two ty pes of block storage v olum es. A boot
v olum e is used as the im age source for a com pute instance while a
block v olum e allows dy nam ic expansion of storage capacity of an
instance.
CAUTION iSCSI attachm ents are the only option when connecting
block v olum es to bare-m etal instances, Windows and Linux VM
instances based on Oracle-prov ided im ages published before February
2 01 8 and Decem ber 2 01 7 respectiv ely .
NOTE You alway s pay for OCI block storage, whether it is attached
to a running or stopped instance. To av oid unnecessary costs, block
v olum es that are no longer required should be deleted.
OBJECT STORAGE
Object storage is a relatively new resilient storage type
that has become a standard for general purpose file
storage in the cloud. The object storage system is
Internet accessible, and you control the permissions and
whether a bucket is publicly accessible or not. OCI
object storage integrates with OCI’s Identity and Access
Management (IAM) to control permissions on object
storage.
Object storage is not suitable for high-speed
computing storage requirements (such as those
required to run databases) but provides flexible and
scalable options for unstructured data storage and
sharing as well as being great for big data and content
repositories, backups and archives, log data, and other
large datasets. Object storage is also not bound to an
instance or an AD but is a region-level construct that
resides in a compartment. Figure 5-5 situates OCI object
storage within a tenancy. Instances in your tenancy may
read and write to object storage through a service
gateway. Instances on-premises connect either through
the VCN (if this connection is set up) or through the
Internet to object storage if sufficient permissions have
been granted. Both OCI and on-premises instances
connect to non–OCI S3–compatible object storage
through the Internet.
Figure 5-5 Object storage location within a tenancy
$ oci os ns get
For some older tenancies, the namespace string may
be a lowercase version of the tenancy name, but this is
now a system-generated string.
EXAM TIP Bucket nam es m ust be unique within a nam espace. The
sam e bucket nam e m ay be used in a separate tenancy , unlike sev eral
other m ainstream cloud object storage v endors. Bucket nam es are case
sensitiv e, m ay not be longer than 2 56 characters, and m ay only
contain letters, num bers, hy phens, underscores, and periods.
NOTE The object storage serv ice uses the 1 3 4 .7 0.0.0/1 7 CIDR block
IP range for all regions.
Pre-Authenticated Requests
OCI provides several options to share objects or
buckets. You can designate a bucket’s visibility as public,
which allows anyone to access your bucket without
requiring authentication. You should use this option
cautiously and carefully evaluate whether you need to
make a bucket publicly visible. A safer option is to set up
a pre-authenticated request (PAR) that exposes a bucket
or an object for a limited time.
A pre-authenticated request may be created for a
bucket or an object as follows:
FSS Concepts
FSS provides network-based file systems in a region.
These file systems are physically located on storage
servers in an AD and are replicated to other ADs or fault
domains providing high durability. Figure 5-9 expresses
the relationship between three FSS concepts and
instances in your region.
Figure 5-9 Relationships between mount targets, file
systems, exports, and instances
12. Mount the file system NFS1. You can copy the
command from the console if desired. There is
no acknowledgment message. If this hangs, it
usually indicates a problem with the security
list.
NOTE For optim al perform ance, it is adv isable to place the m ount
targets in the sam e AD as the instances using the m ount point.
FSS Snapshots
FSS offers a convenient snapshot facility that takes a
point-in-time backup of an FSS file system. Snapshots
are read-only and are located in a hidden directory
named .snapshot in the root directory of the FSS file
system. Snapshots are incremental and are
consequently very space efficient, backing up only files
that have changed since the last snapshot. By default,
you can take up to 10,000 snapshots per file system.
You can create snapshots through the console, API, or
CLI. In this section, the CLI is used. Use the following
CLI command to identify the file systems in an AD and
compartment. Assuming you completed the previous
exercise, you should see your file system listed here.
CHAPTER REVIEW
This chapter discussed five OCI storage services, each
suitable for different use cases.
Local NVMe SSD storage is temporary and has no
durability. You have to ensure redundancy and protect
against disk failures by creating RAID sets with
adequate mirroring or set up other high-availability
mechanisms. These are, however, the fastest storage
available to bare-metal and VM instances as they are
directly attached. Local NVMe SSD storage is suitable
for high-performance workloads, including transactional
databases.
Block storage provides boot volumes and block
volumes and is most akin to classical on-premises SAN
storage. Block volumes are durable, with multiple data
block copies being made across multiple ADs or fault
domains. Block volumes scale to petabytes of capacity
and are well suited for databases and general-purpose
storage offering good IO performance.
Object storage is exposed through buckets at either
an archive tier or a standard tier. Archive tier buckets
are often just referred to as archive storage while
standard tier buckets are frequently referred to as object
storage. Archive storage is suitable for long-term data
retention and is highly durable and affordable. However,
restoring data from archive storage can be a lengthy
process requiring a restore operation before the data
may be downloaded.
Standard tier buckets are the default object storage
option and are suitable for most types of data, including
backups, logfiles, photos, videos, and even big data and
content repositories. Object storage scales to petabytes
of capacity and is an attractive option for offloading
legacy data sets from more expensive storage.
A significant portion of this chapter is dedicated to
hands-on practical exercises enabling you to create and
manage block storage, object storage, and file storage
services.
The chapter closed with a discussion of the file
storage service, an NFSv3-compatible shared network
storage offering. FSS is durable and scales to exabytes of
capacity and is critical for systems and applications that
require a shared file system. FSS snapshots offer a
convenient and simple option for incrementally backing
up and restoring your FSS file systems.
With your network, compute instances, and storage
options in place, you are ready to explore Oracle
database options available in OCI, which is the subject
of Chapter 6.
Questions
1. List the storage types available for provisioning on
OCI VMs.
A. Block storage
B. NVMe SSD
C. Object storage
D. Flash storage
2. Which of the following are types of block storage?
A. NVMe SSD
B. Boot volumes
C. Block volumes
D. Object storage
3. When an instance starts up, what are the possible
access options for attaching the boot volume?
A. Read-only
B. Read/write
C. Copy-on-write (COW)
D. Write-only
4. What are the different storage tiers available for
buckets in object storage?
A. Gold
B. Archive
C. Silver
D. Standard
E. Bronze
5. Which of the following statements are true?
A. OCI bucket names must be unique within a
namespace.
B. OCI bucket names must be unique across all
tenancies.
C. OCI bucket names are not case-sensitive.
D. OCI bucket names are case-sensitive.
6. When provisioning or configuring a block volume,
you may specify which categories of backup
policies?
A. Gold
B. Archive
C. Silver
D. Standard
E. Bronze
7. Which of the following statements is true?
A. An object storage bucket can only exist in one
compartment.
B. An object storage bucket can exist in multiple
compartments.
C. An object storage bucket is an AD-level
resource.
D. An object storage bucket is a regional-level
resource.
8. Which of the following statements are true?
A. Object storage has a flat structure.
B. Object storage has a hierarchical structure.
C. Multipart uploads can only be done for
standard tier buckets.
D. Multipart uploads are possible for all types of
object storage.
9. File storage service snapshots are useful for
making file system backups. What type of backup
is taken with an FSS snapshot?
A. FULL
B. ROLLING
C. INCREMENTAL
D. CLONE
E. NFSv3
10. An important production system with a boot
volume and two block volumes must be moved
from the Ashburn (IAD) region to the Toronto
(YYZ) region. Choose which options are feasible?
A. Copy block storage to FSS file systems and
mount on a new instance in Toronto.
B. Copy a snapshot to the Toronto region and
mount on a new YYZ instance.
B. Use pre-authenticated requests to move the
data without complex authentication.
C. Create a volume group backup of the boot and
block volumes, copy each of these volume
backups to the YYZ region, and mount on a
new YYZ instance.
Answers
1. A, B, C. Block storage, NVMe SSD, and object
storage, as well as file storage services, may be
provisioned on OCI.
2. B, C. Boot and block volumes are types of block
storage.
3. B. Boot volumes are always attached with
read/write access.
4. B, D. Object storage buckets are available at the
standard and archive tiers.
5. A, D. OCI bucket names must be unique within a
namespace and are case-sensitive.
6. A, C, E. Bronze, Silver, and Gold level backup
policies may be configured for a block volume.
7. A, D. An object storage bucket can exist in only
one compartment and is a regional-level resource.
8. A, D. Object storage has a flat structure, and
multipart uploads are possible for all types of
object storage.
9. C. A snapshot makes an incremental backup of an
FSS file system.
10. D. The instance may be relocated by creating a
consistent volume group backup of the boot and
block volumes. These volume backups may be
copied to the YYZ region and mounted on a new
YYZ instance.
CHAPTER
6
Databases
In this chapter, you will learn how to
• Create and manage databases
• Use advanced database features
• Use the autonomous database services
• Migrate databases to the Cloud
DBCS on VM
DBCS systems on VMs offer very flexible options with
many underlying compute shapes and the ability to
scale the storage allocated to your VM dynamically. Both
single-instance and two-node RAC databases are
supported on a 1-node and 2-node VM DB system
respectively. OCI is the first PaaS platform to support
Oracle RAC databases on VM and Exadata systems.
The database software edition chosen when creating a
DBCS system on a VM cannot be changed, just like with
bare metal DB systems. However, DBCS on a VM is
restricted to a single database Oracle Home that can
host only one database, unlike a bare metal DB system
that allows multiple database Oracle Homes. The
multitenant database option, available with the
Enterprise Edition High Performance and Extreme
Performance (EE-HP and EE-EP) editions, supports a
single container database (CDB), which may host
multiple pluggable databases (PDBs), thus allowing
multiple databases (PDBs) to run using DBCS on VM.
dbcli
DBCS nodes on VM and bare metal are preinstalled with
the database CLI or dbcli. This is an OCI-specific utility
not available with on-premises installations. The dbcli
must be run as the root user and is located in the
/opt/oracle/dcs/bin directory. The dbcli operates on all
Oracle software homes, and reports, lists, configures,
and executes many operations, including the following:
DBCS Backups
DBCS backups may be unmanaged or managed.
Unmanaged backups are standalone backups taken
independently using either RMAN or dbcli. DBCS
provides several managed options for backing up
databases. Exadata DB backups are taken in a different
manner to VM and bare metal DB systems and are
discussed later. DBCS backups are encrypted using the
key used for Transparent Data Encryption (TDE) in the
database. It is important to back up the TDE wallet
separately because the backup cannot be restored unless
you have the correct TDE key. Although DBCS restore
and recovery are not discussed explicitly, these are
converse operations and once your backups are
configured, the restore and recovery approach must be
consistent with the backup approach. For example, if
you use dbcli to create a backup, it is best to use dbcli to
restore and recover the database or TDE wallet.
DBCS Patching
Relevant patches for your DBCS system are
automatically discovered and listed in the OCI console.
If a new patch is released, previous patches are still
available through the console. You are not forced to
apply the latest available patch, but you cannot
downgrade to a previous patch. You may pre-check a
patch before applying to identify any potential
downstream issues.
The two categories of patching are DB system and
Databases patches. These correspond to Grid
Infrastructure and Database patches. Both must be
patched independently. Both have a pre-check option.
The sequence of patch application is important because
there may be dependencies between them. For example,
a specific database patch may only be successfully
applied if a dependent DB system patch has already
been applied.
Navigate to Bare Metal, VM, and Exadata | DB
Systems | DB System Details | Database | Patches to
view a list of database patches applicable to your
database version. Hovering over the ellipses menu
adjacent to a listed patch reveals the patch Pre-check
and Apply options. Figure 6-8 shows a DB system patch
that has been successfully prechecked and applied.
During a suitable maintenance window, a backup is
typically taken before applying a patch.
Database Licensing
Oracle database software license costs are non-trivial. In
general, the database software license is often
significantly more expensive than the infrastructure
required to host a database system. There are currently
two metrics used for licensing database software: named
user plus (NUP) and processor-based. A named user is
essentially an individual or device that connects to the
database. There are many legacy licensing metrics,
which are not discussed here.
DBCS Licensing
DBCS systems on OCI comprise network, storage, and
compute infrastructure as well as Oracle database
software. Oracle offers two models for licensing a
database system on DBCS and also offers Pay As You Go
and Monthly Flex pricing options.
Data Encryption
Security is baked into the OCI platform and DBCS is no
exception. Transparent data encryption (TDE) on
premises is an additionally licensed component of the
Advanced Security Option available for Oracle DB
Enterprise Edition. All DBCS database software editions,
including Standard Edition, are available with TDE.
TDE offers encryption at several layers of the
database stack. Within the database, user tablespaces as
well as temporary and UNDO tablespaces, tables, and
columns may be encrypted. All data stored in encrypted
tablespaces is automatically encrypted. Backups and
Data Pump exports may be encrypted before being
transmitted over networks. Standby databases built with
Data Guard work seamlessly with encrypted datafiles.
Basically, TDE works transparently with other
complementary database options and features.
When you use TDE, there is a low performance
impact, as additional CPU cycles are required to encrypt
and decrypt data. Hardware-based encryption and
decryption acceleration is available on Exadata and
many new CPUs, including Intel Xeon CPUs widely used
in the OCI infrastructure, reducing the performance
impact.
TDE relies on master encryption keys that are stored
by default in an Oracle PKCS12 file-based keystore
known as an Oracle wallet. You may optionally store
your TDE master encryption keys in Oracle OCI or Key
Vault or an external key management system (KMS).
When a DBCS system is created, a database
administrator password is required. This password
initially serves as the password for the TDE wallet,
which, of course, should be changed periodically. All
user tablespaces are encrypted by default using TDE.
The TDE master encryption keys should be rotated
periodically. You may use the dbcli update-tdekey
command to rotate keys for your databases.
CAUTION The sam e TDE encry ption key used to encry pt an RMAN
backup or Data Pum p export m ust be used for decry ption. Before
rotating key s, ensure that y ou back up y our TDE wallet and that y ou
understand the im plications for prev iously encry pted backups and
exports. Resist the tem ptation to keep the TDE wallet backup with
y our database backup so y ou hav e it on-hand if y ou need to restore in
an em ergency , as this defeats the point of using TDE. Keep the lock
separate from the key . Ensure that y ou back up the TDE wallet and
tag the backup appropriately .
High Availability
While Oracle databases are renowned for their
reliability, performance, and scalability, they do,
however, run on physical infrastructure that may
occasionally fail. Infrastructure failure scenarios may be
grouped into three broad categories: node failure, rack
failure, and data center failure.
A node failure occurs when infrastructure internal to
a server or compute node malfunctions, leading to a
node being rebooted or shut down in an unplanned
manner. Examples of root causes of node failures
include faulty boot devices, bad memory modules, and
power supply interruption. Rack failure occurs when an
outage affects all servers in a specific rack or cage. This
is uncommon but may occur when there is loss of power
to a particular rack or overheating in the cage prompts
an emergency unplanned shutdown of all servers in the
rack. A data center comprises many server racks, and
when there is a data center outage, it is usually
associated with a catastrophic disaster like a flood or
earthquake that has damaged or severed power or
network access to an entire data center.
Fortunately, OCI has been architected with high
availability (HA) as one of its core design objectives, and
many mitigating strategies have been implemented to
support HA during a failure event. All OCI servers have
many redundant components that tolerate failure of a
power supply, network interface, and disk drives. OCI
VMs may be created in separated infrastructure known
as fault domains within a data center or availability
domain to tolerate rack failure. There are also many
regions with multiple ADs and strong high-speed
networks between ADs and regions. These mitigating
strategies lend themselves to two powerful software-
based HA solutions, RAC and Data Guard.
RAC
To understand RAC, first a quick refresher for non-
Oracle DBAs about the Oracle Server. An Oracle Server
is composed of a database instance and a set of database
files. A database instance is a collection of memory
structures and operating system background processes.
When an Oracle Server is shut down, the database files
are closed and the instance is stopped. The database
files persist. They occupy disk space, and they contain
the tables and rows of data that will be accessed the next
time the database files are opened. When the instance
stops, its memory structures are deallocated and all its
background processes are stopped. The compute power
(CPU and memory resources mainly) used by the
instance are released and may be used by other
programs. When the instance starts on a node, memory
structures are created, background processes are started,
and the instance attempts to mount the database files
and open the database.
A Real Application Cluster (RAC) allows multiple
instances, each running on its own compute nodes, to
simultaneously mount and open the same set of
database files that are stored on shared storage. RAC
depends on Oracle Grid Infrastructure (GI) software to
coordinate the communication between the RAC nodes
and the shared storage.
OCI makes RAC available on DBCS through a two-
node VM cluster and on Exadata. RAC databases can
tolerate the complete loss of one compute node in the
cluster with no interruption to the database availability.
RAC also supports HA during patching and node
maintenance exercises. When setting up RAC on a two-
node VM, ensure that each RAC node resides in a
separate fault domain.
When GI is configured, a set of listeners, known as
scan listeners, are configured to provide highly available
database client network traffic management services.
Scan listeners route incoming connections to available
local listeners based on algorithms that consider the
load profile of specific instances to ensure even load
distribution. In the event of a RAC node failure, the scan
listeners direct traffic to the operational node.
RAC on OCI is available only with EE-EP edition. To
create a RAC system on DBCS using the console,
navigate to Bare Metal, VM, and Exadata, and choose
Launch DB System. Figure 6-9 shows the familiar DB
System Information dialog screen.
Figure 6-9 Create a two-node RAC database on VM.
Data Guard
While RAC mitigates against node failure and ensures
HA, Data Guard mitigates against node, shared storage,
and even AD failure in multi-AD regions. Data Guard is
a mature replication technology available with all Oracle
Enterprise Edition versions. All Data Guard
configurations consist of a primary database and at least
one standby database. Each system is a fully operational
Oracle server with nodes, instances, and independent
sets of database files. The primary and standby systems
are almost exclusively on separate infrastructure to
provide business continuity in case there is a failure of
the primary system. Two modes of Data Guard
replication may be configured:
AUTONOMOUS DATABASES
Oracle autonomous database (ADB) systems offer a
hosted and managed option with an underlying Exadata
service and the ability to dynamically scale up and scale
down both the CPUs and storage allocated to your VM.
This single feature unlocks a great number of
possibilities, chief among them the game-changing idea
of sizing your environment for average workload,
scaling up during peak periods, and scaling back down
once the workload normalizes. ADB is a pluggable
database and is available on a shared or dedicated
Exadata infrastructure.
Relying on decades of internal automation, ADB uses
advanced machine learning algorithms to balance
performance and availability with cost, automating
many tasks including indexing, tuning, upgrading,
patching, and backing up the database. HA is achieved
through the use of a RAC database (when scaling to
more than 16 OCPUs), triple-mirrored disk groups,
redundant compute and network infrastructure, and
nightly backups.
The following are two autonomous database variants:
DATABASE MIGRATION
Migrating your on-premises databases to the Cloud is a
daunting prospect for many organizations. As cloud
platforms mature and the concerns related to data
security on cloud infrastructure morph into an
understanding and appreciation for the implicit
implementation of security best practices by the major
cloud vendors, more organizations are embracing the
shift to hosting their databases in the Cloud. The
benefits are numerous, ranging from agile, scalable
compute shapes to push automation for backups,
patching, building RAC systems, and setting up Data
Guard on DBCS to name a few.
Database migration fundamentally involves
transporting data from a source system to a target
system. Online data transport requires network
connectivity between the source and target systems. In
some cases, offline data transport between source and
target systems may be preferable. In the sections that
follow, I outline online and offline data transport
options before discussing various migration approaches.
Connectivity
Source databases being migrated to DBCS are often
Oracle databases that reside on-premises. Oracle
databases hosted by other cloud providers, such as RDS
on AWS, and non-Oracle databases may be migrated to
DBCS. If you wish to transfer the source database over
the network, it is typical to extend your corporate
network to include your VCN. There are three network-
based options available for migrating your database to
DBCS.
Approaches to Migration
The conversation now turns to determining which
migration method is best suited for moving your source
databases to target databases hosted on Oracle Cloud.
While you may provision OCI infrastructure to install
and host a database using traditional on-premises
methods, you do not benefit from the tooling and
automation offered for databases on DBCS. The
converse of this is that you are not restricted by the
limitations of DBCS. This section focuses on migrating
to DBCS, ExaCS, ATP, and ADW. The following are the
primary factors that inform the migration approach:
SQL*Loader
SQL*Loader is an Oracle utility used to load data in
external formatted files into a database. Data from the
source system is extracted into flat files. A SQL*Loader
control file is configured to specify the source flat files
and mappings between flat file data and pre-existing
schema tables and columns. SQL*Loader, also known as
a bulk loader, uses rules and mappings specified in the
control file to read flat files and write the data into
database objects. Rows not conforming with the rules
are placed in either discard files or bad files (errors were
encountered while trying to load these rows).
SQL*Loader prerequisites include the following:
Data Guard
Data Guard in DBCS is discussed earlier in this chapter.
This discussion describes a scenario using Data Guard
physical standby databases to migrate an on-premises
database to DBCS. Remember that the primary and
standby databases must be on the same version of the
database software with the same platform endianness.
RMAN
RMAN offers many options for migration, including the
following:
Data Pump
The Data Pump utilities are a modernized replacement
of the venerable Export (exp) and Import utilities (imp)
and was introduced in version 10g. Data Pump utilities
Export (expdp) and Import (impdp) are very powerful,
supporting exports and imports of entire databases,
schemas, and objects, in addition to providing the
backbone driver for external tables, supporting network
mode data transfer as well as supporting transportable
tablespaces and transportable databases. Dump files are
platform-independent, support encryption and
compression, and may contain data, metadata, or both
content types. The utilities are architected to be
resilient, supporting interruption and continuation of
tasks, very large data volumes, and sophisticated logging
features. Both imports and exports may be done in
parallel to speed up migration times.
Data Pump offers several migration options,
including the following:
• Full export and import Source databases may
be easily exported and imported into target
databases. Dump files are platform-independent
so an 11.2.0.3 database on AIX could be exported
with Data Pump and imported into a target
database on Linux using version 18c.
• Schema and object export and
import Schemas and even specific objects may
be exported and potentially be remapped into
different schemas during import.
• Network mode export and import This is a
particularly powerful mechanism that uses
database links to export data from one database
and import into another without creating dump
files.
• Transportable tablespaces Entire tablespaces
are exported in one go. The mechanics involve
setting the source tablespaces to read-only mode,
exporting some metadata with Data Pump,
securely copying the datafiles to the compatible
(little endian) target database, setting the source
tablespaces back to read-write mode, and
importing the metadata dump file into the target
database. This approach is much faster than
exporting all your source objects in from
tablespaces and then importing them because you
are physically copying the underlying datafiles to
a new database.
• Full Transportable This technique works very
much like transportable tablespaces but instead of
transporting a subset of the tablespaces, all user
tablespaces are exported from the source
database, datafiles are securely copied, and the
tablespaces are imported into the target. Full
Transportable was designed with 12c target
databases, including PDBs, in mind and is a fast,
powerful method for migrating endian-compatible
databases.
SQL Developer
SQL Developer is in a state of constant evolution with
many recent features geared toward Oracle Cloud
adoption. This is evident from the ease of connecting to
Oracle ATP, ADW, DBCS, and other third-party
databases both in the Cloud and on-premises. Having a
single tool with simultaneous connectivity to multiple
databases is very handy for data migration. SQL
Developer has a multitude of features and wizards
geared toward migration including tools that enable you
to create Data Pump exports and even automate script
generation by capturing changes from several non-
Oracle databases to reduce the migration effort. SQL
Developer also has specific cloud migration wizards that
include the following:
CHAPTER REVIEW
This chapter discussed various formats for using Oracle
databases on OCI. Creating and managing databases
using DBCS exposed you to the automation Oracle has
developed to simplify administration on VM, bare metal,
and Exadata cloud services. Typically time-consuming
tasks such as setting up RAC and Data Guard or
configuring backups are available as API commands or a
few clicks in the console.
Oracle database processor-based and NUP metrics
were introduced along with the license cost implications
when using DBCS compared to other platforms. An in-
depth discussion of the RAC and Data Guard high
availability features was also provided.
Autonomous databases are a game-changing offering.
ADBs were explored indicating that ATP and ADW are
just differently configured ADBs. While there are some
limitations and restrictions with ADBs, there are very
compelling reasons for adopting ADB, especially the
CPU core and storage scaling as well as the AI-driven
automations.
Migrating databases to the Cloud is a complex topic
and a significant chunk of this chapter is dedicated to
this topic. Connectivity options as well as the data
transfer service were discussed before a general
discussion of approaches to migration was undertaken.
Source database properties are a key determinant of the
migration strategy. Source and target software versions,
platform endianness, and database service-level
objectives further inform the approach taken when
planning a migration.
The chapter concluded with a discussion of several
cloud migration approaches, including legacy utilities
such as SQL*Loader and the original Oracle Export and
Import tools that were discussed to showcase available
options for moving off legacy Oracle databases. Modern
approaches to database migration using Data Guard,
RMAN, Data Pump, unplugging and plugging PDBs and
non-CDBs as well as using remote PDB cloning
techniques were also discussed. An exploration of
several SQL Developer tools rounded off the migration
conversation. Oracle is constantly innovating to drive
Cloud adoption, so stay updated with the latest
automated migration solutions.
With your network, compute instances, storage
options, and databases in place, you are ready to
automate the deployment of the infrastructure
components available in OCI, which is the subject of
Chapter 7.
Questions
1. List the Oracle Cloud database solutions that
support CPU core and storage scaling.
A. DBCS–VM
B. ExaCS
C. ADB
D. DBCS–Bare metal
2. List the Oracle Cloud database solutions that
support storage scaling.
A. DBCS–VM
B. ExaCS
C. ADB
D. DBCS–Bare metal
3. List the Oracle Cloud database solutions that
include Transparent Data Encryption (TDE).
A. DBCS–VM
B. ExaCS
C. ADB
D. DBCS–Bare metal
4. When configuring a DB using Exadata Cloud
Service, you may elect to configure a SPARSE disk
group. Choose any statements that are true about
configuring a SPARSE disk group.
A. SPARSE disk groups are mandatory.
B. SPARSE disk groups reduce available storage
for database files.
C. SPARSE disk groups enable snapshot standby
databases.
D. SPARSE disk groups may be used for Exadata
snapshot databases.
5. When configuring a DB using Exadata Cloud
Service, you may elect to store backups in the FRA
on disk. Which statement is true regarding usable
storage?
A. Space allocated for backups in the FRA has no
impact on storage available for database files.
B. ExaCS backups are stored in an ACFS volume.
C. Space allocated for backups in the FRA
reduces the space available for the DATA disk
group.
D. ExaCS backups are stored in object storage.
6. Which of the following statements are true?
A. Oracle database licenses are free in OCI.
B. On-premises Oracle database licenses may be
used on OCI.
C. Oracle database licenses are not required on
Oracle Cloud.
D. DBCS and ADB systems may be procured with
a license-included option.
7. Which is not a valid Data Guard configuration
mode?
A. Maximum Performance
B. Maximum Security
C. Maximum Protection
D. Maximum Availability
8. Which of the following statements are true?
A. A two-node RAC database consists of two
copies of the database files.
B. A two-node RAC database consists of one
shared copy of the database files.
C. A two-node RAC Data Guarded database
consists of two copies of the database files.
D. A two-node RAC Data Guarded database
consists of four copies of the database files.
9. Which of the following statements is false?
A. ATP and ADW are types of autonomous
databases.
B. ADBs use DB Resource Manager for defining
differentiated services.
C. TPURGENT and TP are services available only
for ADW.
D. TPURGENT and TP are services available only
for ATP.
10. Which benefits are associated with autonomous
databases?
A. Automatic Migration
B. Automatic Indexing
C. Automatic Tuning
D. Automatic Backups
Answers
1. C. CPU and storage may be scaled up on
autonomous databases.
2. A, C. Storage may be scaled up and down on
autonomous databases but scaled up on DBCS on
VM.
3. A, B, C, D. Transparent Data Encryption (TDE)
is a feature of the Advanced Security option.
However, on OCI, all database editions include
TDE.
4. B, D. While configuring SPARSE disk groups
does reduce the storage available for database
files, they are required for hosting Exadata
snapshot databases.
5. C. Usable storage for database files on Exadata is
impacted by whether you choose to keep backups
on the storage.
6. B, D. The practice of using on-premises Oracle
database licenses in the Cloud is known as “Bring
Your Own License” or BYOL. License-included and
BYOL are the two methods for licensing Oracle
databases in the Cloud.
7. B. Data Guard may be configured in Maximum
Performance, Availability, and Protection modes.
8. B, C. RAC databases share one copy of the
database files. Data Guarded databases have two
sets, one for the primary and another for the
standby.
9. C. TPURGENT and TP are services available only
for ATP.
10. B, C, D. Automatic Indexing, Tuning, and
Backups are benefits associated with autonomous
databases.
CHAPTER
7
Automation Tools
In this chapter, you will learn how to
• Install and use Oracle Cloud Infrastructure CLI
• Install, configure, and use Terraform
OCI CLI
The OCI CLI operates in a similar manner to many
other Oracle command-line interfaces. It is simple and
powerful and lends itself to easy integration into shell
scripts. The CLI is based on Python and makes use of
JSON input and output formats. The Python code is a
wrapper around OCI REST APIs. OCI CLI commands
call these APIs that implement the required
functionality. These are the same APIs called by the
SDKs and the console.
Many examples throughout this book are illustrated
using OCI CLI commands. In this section, you will
install the OCI CLI and use it to interact with several
OCI resources.
• An OCI account
• An OCI user with sufficient permissions
• An SSH key pair
• A compatible version of Python
• FIPS-validated libraries if FIPS compliance is
required
10. You should be all set to test the OCI CLI from
your workstation. Run the oci iam region
list command to report on all OCI regions
available to you.
Use OCI CLI
The previous exercise showed how the OCI CLI output
is returned in JSON format. You may also create JSON
format input files to pass to OCI CLI commands. This is
beyond the scope of this book. The CLI output may
alternatively be displayed in a tabular format by
appending --output table to the command.
9. Initialize Terraform.
10. Confirm that both Terraform and the provider
for OCI have been installed and configured.
Use Terraform
You can describe and manage your infrastructure as
code using Terraform configuration files written in
either human-readable HCL files ending with the .tf
extension or machine-readable JSON format files
ending with the .tf.json file extension. Terraform
configuration files specify provider definitions, like the
oci.tf file used in the previous exercise when initializing
the provider for OCI, as well as for defining OCI
resources, variables, and data sources. Terraform
converts these configurations into a set of API calls
against the OCI API endpoints.
Terraform configuration files reside in a specific
directory on your file system. When Terraform
commands are run, all .tf and .tf.json files in a directory
are loaded. By default, Terraform expects each
configuration file to define a distinct set of objects and
returns an error if multiple files attempt to define the
same object. Overriding this behavior is possible by
using a special override file, but this is rare and not
encouraged as it hurts readability. Refer to the online
Terraform documentation for syntax description. HCL is
a complex command language that is being updated
constantly and is out of scope for this chapter. It is
common to see the following HCL configuration
language elements in these configuration files:
EXAM TIP The Terraform init and apply com m ands appear
sim ilar, but each perform s a v ery different function. Use terraform
init to initialize new or existing configurations and use terraform
apply to execute a Terraform plan.
Once the Terraform configuration files are created,
use the Terraform commands to load and process these.
The following popular Terraform commands are briefly
described:
Questions
1. List the supported interfaces for programmatically
interacting with OCI.
A. Java, Python, Ruby, Go SDKs
B. OCI CLI
C. C++ SDK
D. Terraform with the provider for OCI
2. Which of the following formats are acceptable
input and output when using the OCI CLI?
A. Terraform .tf configuration files
B. HCL commands
C. JSON
D. CamelCase
3. Which command displays the VCNs in a
compartment using the OCI CLI?
A. oci network vcn list --
compartment-id <compartment-id >
B. oci vcn list --compartment-id
<compartment-id >
C. oci network list --compartment-id
<compartment-id >
D. oci compartment list --vcn-id
<vcn-id >
4. Which of the following are acceptable input
formats when using Terraform and the provider
for OCI?
A. Terraform .tf configuration files
B. CLI commands
C. Terraform .tf.json configuration files
D. CamelCase
5. Which of the following statements are true?
A. Terraform may only be used to manage OCI
resources.
B. Terraform is an Oracle technology.
C. Terraform may be used to manage
infrastructure from many providers.
D. Terraform manages infrastructure as code.
6. What are commonly used HCL elements found in
Terraform configuration files?
A. variable
B. resource
C. apply
D. plan
7. Which of the following statements is true?
A. You can only interact with OCI resources
using the CLI and Terraform.
B. You can only interact with OCI resources
using the CLI, Terraform, and SDKs.
C. You can only interact with OCI resources
using the CLI, Terraform, SDKs, and the OCI
console.
D. You can interact with OCI using any tool
through the OCI API endpoints.
8. Which of the following statements are true?
A. Only input variables are supported in
Terraform configuration files.
B. Only output variables are supported in
Terraform configuration files.
C. Both input and output variables are supported
in Terraform configuration files.
D. Common HCL elements found in Terraform
configuration files include variable, resource,
and providers.
9. What are commonly used Terraform commands?
A. init, plan, apply, graph, refresh,
destroy, taint, untaint
B. variable, resource, provider
C. oci <service> <type> <action>
<options>
D. create, delete, get, list, update
10. Which Terraform commands can potentially
change OCI infrastructure resources?
A. apply
B. plan
C. init
D. destroy
Answers
1. A, B, D. Java, Python, Ruby, Go SDKs, the OCI
CLI, and Terraform with the provider for OCI are
supported interfaces for programmatically
interacting with OCI.
2. C. JSON format is acceptable input and output
when using the OCI CLI.
3. A. oci network vcn list --compartment-
id <compartment-id> is the correct command
to display the VCNs in a specified compartment
using the OCI CLI.
4. A, C. Terraform .tf and .tf.json configuration files
are acceptable input formats when using
Terraform and the provider for OCI.
5. C, D. Terraform may be used to manage
infrastructure from many providers as code.
6. A, B. Both variable and resource are commonly
used HCL elements found in Terraform
configuration files.
7. D. You can interact with OCI using any tool
through the OCI API endpoints. You are not
confined to using any specific tools.
8. C, D. Both input and output variables are
supported in Terraform configuration files, and
common HCL elements found in Terraform
configuration files include variable, resource, and
providers.
9. A. Commonly used Terraform commands include
init, plan, apply, graph, refresh, destroy,
taint, untaint.
10. A, D. The apply command runs Terraform
scripts using the variables passed in with the
terraform plan command to build or change
infrastructure, and the destroy command deletes
managed infrastructure resources.
CHAPTER
8
OCI Best Practice
Architectures
In this chapter, you will learn how to
• Design Highly Available Disaster Recovery
(HADR) OCI solutions
• Leverage OCI security features to protect your
cloud infrastructure
NOTE The file storage serv ice also prov ides a snapshot-based backup
m echanism that supports the im m ediate restoration of files
accidentally rem ov ed due to user error, which further supports RPO
and RTO.
Database HADR
Chapter 6 outlines the available database options in
OCI. Oracle Database on OCI is a key driver to the
adoption of OCI for many enterprises. Oracle databases
usually support critical workloads and HADR is a
primary consideration. Database backups are a key
component of any HADR solution and are not discussed
here. This section assumes you have read Chapter 6 or
are familiar with these options for running Oracle
databases on OCI.
Data Guard
While RAC mitigates against node failure and ensures
HA, Data Guard mitigates against node, shared storage,
and even AD failure in multi-AD regions. Data Guard is
a mature replication technology available with all Oracle
Enterprise Edition versions. You may manually
configure Data Guard between two manually configured
databases (RAC or SI) or use the managed Data Guard
DBaaS for OCI. The managed option is straightforward
to set up and uses automation behind the scenes to
ensure the standby is correctly configured. As of this
writing, the managed Data Guard service is limited to
inter-AD replication within a multi-AD region. You may
choose to manually build a Data Guard standby for a
manually configured database that is located in a
different region or even on-premises. Keep in mind that
network latency must be considered and may limit the
replication mode, as discussed later in this section.
All Data Guard configurations consist of a primary
database and at least one standby database. Each system
is a fully operational Oracle server with nodes,
instances, and independent sets of database files. The
primary and standby systems are almost exclusively on
separate infrastructure, in different fault domains, to
provide business continuity in case there is a failure of
the primary system. Two modes of Data Guard
replication may be configured, physical and logical
standby. An important differentiator is that with
physical Data Guard, the entire database is replicated
with no exception. With logical replication such as SQL
Apply or even Oracle GoldenGate, only a subset of the
database is replicated—user-specified schemas and
objects.
Each database in a Data Guard architecture is
designated a role. One database occupies the primary
role while one or more databases occupy the standby
role. Data Guard physical standby replication may be
configured in one of three modes that determines how
the redo stream of changes from the primary database is
shipped and applied on the standby:
GoldenGate
Oracle GoldenGate provides logical replication between
multiple databases using many different topologies.
Each database may reside in separate ADs or even in
separate regions if the network bandwidth is sufficient
for the DB IOPS. These databases are kept in sync by
transactional replication and potentially support
updates from multiple master databases. The following
GoldenGate topologies are supported on OCI:
Autonomous Databases
Oracle Autonomous Database (ADB) systems offer a
hosted and managed option with an underlying Exadata
service and the ability to dynamically scale up and scale
down both the CPUs and storage allocated to your VM.
This supports sizing your environment for average
workload, scaling up during peak periods and scaling
back down once the workload normalizes, thereby
providing database-level performance-based HADR.
Autonomous databases are opened by multiple nodes
(RAC) when more than 16 OCPUs are enabled and are
hosted on highly redundant Exadata infrastructure
managed and monitored by Oracle.
IAM
OCI resources may be organized into compartments to
logically separate applications and systems. IAM
supports a flexible framework for granting the least-
privilege required to secure access and govern OCI
resources. IAM policies allow only authorized groups of
IAM users and dynamic groups of principal instances to
interact with OCI resources and are an effective
mechanism for managing IAM.
Try to ensure that all resources are tagged with
defined tags, enabling cost-tracking tags to implement a
chargeback system. While your organization may not be
ready for a chargeback system today, this approach also
helps reduce unnecessary spend and allocates an owner
to each resource. Each resource owner is the person or
department that pays for a resource. This paradigm may
encourage security-compliant behaviors that will
contribute to the overall security of your tenancy and
reduce the sprawl of resources commonly found in less
well-governed environments.
There are many keys involved when accessing OCI
resources. Consider rotating SSH keys periodically and
allocating individual SSH or API keys to specific
individuals who must have access to OCI resources.
Corporate key stores should also be leveraged to hold
master keys, TDE keys, and other key pairs to reduce
resource access issues and to boost security posture.
Authentication mechanisms granting users access to the
OCI console, API access using API keys, and object
storage access using Auth tokens must be formalized for
IAM user management.
Recent collaboration with other cloud vendors,
notably Azure, supports the federation of IAM systems
across multi-cloud environments. While this is great for
flexible multi-cloud architectures, you now have an
additional level of IAM to carefully consider when
designing your security posture. As discussed in Chapter
3, IAM federation is not limited to IDCS and can include
AD, G Suite, and other SAML 2–compliant directory
services. Federating identity providers from the start of
your cloud journey is well advised.
Networking
When designing security for your VCN, many OCI
networking components are available out of the box to
support good practice, starting with private and public
subnets. It is usually permissible to expose a public load
balancer to the Internet for HTTP traffic to your public
website or web applications. These points of entry need
to be secured and protected. Sensitive databases should
be located in private subnets. NAT gateways may be
used for instances in private networks to gain one-way
access to Internet resources and still be protected. Use
the route table infrastructure to ensure that Dynamic
Routing Gateways only route allowed traffic between
your VCN and your on-premises network or other cloud
networks.
Each subnet can have one route table comprising
rules that route traffic to one or more targets. It is good
practice for hosts that have similar routing
requirements to use the same route tables across
multiple ADs. It is also recommended that private
subnets have individual route tables to control traffic
flow. Traffic between all compute instances within a
VCN is routable, but the VCN route table limits routing
of traffic into and out of the VCN.
Each subnet may have multiple security lists, each of
which supports multiple stateful and stateless ingress
and egress rules. You must ensure that security lists
behave like firewalls, managing traffic into and out of
the VCN (known as North–South traffic) as well as
managing internal VCN traffic between multiple subnets
(known as East–West traffic).
If access to compute resources is required from the
public Internet, it is good practice to create a Bastion
host. A Bastion host, or server, is colloquially known as
a jump-box designed and configured to withstand
attacks.
Compute Instances
Security in OCI is a shared responsibility between you
and Oracle. Using DBaaS and compute instances based
on Oracle-supplied images is a safer bet than using
custom images and manual software and database
installations because the default images are already
security hardened by the OCI security specialists at
Oracle. It is highly recommended to start your
customized compute and database system using a
supplied image. Bare metal instances are available with
no Oracle-managed software. These instances do not
benefit from the security hardening and must be
hardened by your internal security team.
CHAPTER REVIEW
This chapter discussed high availability and disaster
recovery architectural considerations as well as a
consolidated high-level outlook on designing a future
cloud security posture by embracing best practices and
leveraging lessons from your own organizational
security legacy.
There are many permutations of OCI resources that
will address any HADR requirement. In reality, we are
governed by three main considerations: budget, RPO,
and RTO. Understanding that the HADR design exercise
is constrained by these three considerations is likely to
yield an optimal architecture. Not all systems require a
zero downtime, zero data loss, sufficiently engineered
solution. But some do.
Cloud is the future and cloud vendors continue to
innovate and compete for your business. HADR and
security are key areas to design correctly. But it is not
over when you build it. These topics are highly visible,
and it is highly recommended that you attend to the
latest developments and innovations available to evolve
your design to ensure a safe and highly available
infrastructure that is resilient to disaster.
Questions
1. RTO is an important concept related to high
availability and disaster recovery. What sentiment
is associated with RTO?
A. RTO specifies the amount of data loss that is
tolerable for a system without impacting the
business too negatively.
B. RTO specifies the amount of time it takes to
restore service for a system without impacting
the business too negatively.
C. Oracle redo transactions are shipped to the
Data Guard standby database.
D. Real-time Oracle is a logical replication
solution that mirrors an existing system.
2. RPO is an important concept related to high
availability and disaster recovery. What sentiment
is associated with RPO?
A. RPO specifies the amount of data loss that is
tolerable for a system without impacting the
business too negatively.
B. RPO specifies the amount of time it takes to
restore service for a system without impacting
the business too negatively.
C. The Oracle redo process generates redo logs
essential to instance recovery.
D. The Oracle replication process is a solution
that clones an existing system.
3. Which type of IP address may be unassigned and
reassigned between compute instances?
A. Public IP
B. Private IP
C. IPv6 IP
D. Floating IP
4. DenseIO compute shapes include support for
direct attached NVMe disks. What steps, if any, are
required to ensure redundancy for this type of
storage?
A. This storage is mirrored at the SAN level. No
further steps are required.
B. Object storage mirrors must be configured.
C. Direct attached NVMe disks are preconfigured
as highly available storage.
D. Some RAID configuration must be
implemented to support redundancy for
generic file system storage.
5. Which of the following statements is true?
A. All OCI regions have three availability
domains.
B. HADR is not possible in a region with only
one AD.
C. Each AD has three fault domains.
D. All OCI regions have three fault domains.
6. What process coordinates a fast-start-fail-over
event in a Data Guard setup that automates a
primary database failover to its standby?
A. Observer
B. Watcher
C. Listener
D. Active Data Guard
7. Which of the following statements is true?
A. You can only interact with OCI resources
using the CLI and Terraform.
B. You can only interact with OCI resources
using the CLI, Terraform and SDKs.
C. You can only interact with OCI resources
using the CLI, Terraform, SDKs, and the OCI
console.
D. You can interact with OCI using any tool
through the OCI API endpoints.
8. Which of the following statements is true?
(Choose all that apply.)
A. A RAC database is concurrently mounted by
one or more database instances, each running
on a separate compute node.
B. RAC databases can tolerate the loss of a RAC
node.
C. As long as there is at least one RAC node
available, the database remains accessible.
D. Both primary and standby databases in a Data
Guard configuration may be RAC databases.
9. Which of these options may provide zero data loss
solutions for Oracle databases?
A. Oracle RAC
B. Oracle Data Guard in Maximum Performance
mode
C. Oracle Data Guard in Maximum Protection
mode
D. Oracle Data Guard in Maximum Availability
mode
10. List two basic approaches to synchronizing
general purpose file systems for HADR.
A. Private peering
B. Synchronous replication
C. File Storage Service snapshots
D. Asynchronous replication
Answers
1. B. RTO specifies the amount of time it takes to
restore service for a system without impacting the
business too negatively.
2. A. RPO specifies the amount of data loss that is
tolerable for a system without impacting the
business too negatively.
3. D. Floating IP addresses may be unassigned from
one compute instance and reassigned to another.
It is often possible to automate the allocation of a
floating IP address to a standby instance to
minimize downtime.
4. D. DenseIO compute shapes include support for
direct attached NVMe disks. This storage is not
SAN-based. There is no redundancy built in and it
is your responsibility to set up appropriate
redundancy using some sort of RAID
configuration if they are used for generic file
system storage.
5. C. Each AD has three fault domains providing
physical server isolation for VMs created in
separate FDs in the same AD.
6. A. A Data Guard observer is configured to
orchestrate a fast-start-fail-over (FSFO) if issues
with the primary database system are detected.
7. D. You can interact with OCI using any tool
through the OCI API endpoints. You are not
confined to using any specific tools.
8. A, B, C, D. RAC and Data Guard form a potent
pair in providing HADR for Oracle databases.
9. C. Data Guard in Maximum Protection mode
ensures synchronous replication achieving zero
data loss at the cost of potential waits on the
primary database for confirmation that the
captured redo stream has been successfully
shipped and applied on the standby.
10. A, D. Synchronous replication supports zero data
loss but incurs waits while transported IOs are
acknowledged and remote IOs are confirmed.
Asynchronous replication risks data loss in the
event of an outage, but changes to the primary site
are shipped to the standby with no need to wait for
confirmation that the changes have been received
and applied. There is no blocking or waiting with
this approach and it is suitable for synchronizing
data between instances in different regions.
APPENDIX
SYSTEM REQUIREMENTS
The current and previous major versions of the
following desktop browsers are recommended and
supported: Chrome, Microsoft Edge, Firefox, and Safari.
These browsers update frequently, and sometimes an
update may cause compatibility issues with the
TotalTester Online or other content hosted on the
Training Hub. If you run into a problem using one of
these browsers, please try using another until the
problem is resolved.
Privacy Notice
McGraw-Hill Education values your privacy. Please be
sure to read the Privacy Notice available during
registration to see how the information you have
provided will be used. You may view our Corporate
Customer Privacy Policy by visiting the McGraw-Hill
Education Privacy Center. Visit the mheducation.com
site and click Privacy at the bottom of the page.
1. Go to hub.totalsem.com/mheclaim
2. To register and create a new Training Hub
account, enter your e-mail address, name, and
password. No further personal information
(such as credit card number) is required to
create an account.
TOTALTESTER ONLINE
TotalTester Online provides you with a simulation of
the Oracle Cloud Infrastructure Architect Associate
(1Z0-1072) exam. Exams can be taken in Practice Mode
or Exam Mode. Practice Mode provides an assistance
window with hints, references to the book, explanations
of the correct and incorrect answers, and the option to
check your answer as you take the test. Exam Mode
provides a simulation of the actual exam. The number of
questions, the types of questions, and the time allowed
are intended to be an accurate representation of the
exam environment. The option to customize your quiz
allows you to create custom exams from selected
domains or chapters, and you can further customize the
number of questions and time allowed.
To take a test, follow the instructions provided in the
previous section to register and activate your Total
Seminars Training Hub account. When you register you
will be taken to the Total Seminars Training Hub. From
the Training Hub Home page, select Oracle Cloud
Infrastructure Arch Assoc (1Z0-1072)
TotalTester from the Study drop-down menu at the
top of the page, or from the list of Your Topics on the
Home page. You can then select the option to customize
your quiz and begin testing yourself in Practice Mode or
Exam Mode. All exams provide an overall grade and a
grade broken down by domain.
TECHNICAL SUPPORT
For questions regarding the TotalTester or operation of
the Training Hub, visit www.totalsem.com or e-mail
[email protected].
For questions regarding book content, e-mail
[email protected]. For
customers outside the United States, e-mail
[email protected].
GLOSSARY
A
A DNS record type, 122
AAAA DNS record type, 122
access control lists (ACLs), 297
accounts, creating, 4–8
ACFS (ASM File System), 242
ACTION commands in instance power management, 174
Active Data Guard (ADG) option, 293, 355
Active Directory in federated OCI, 64
AD attribute in block volumes, 189
ADB. See autonomous database (ADB) systems
Add SSH Key screen, 158
add-vnic command, 175
administration in autonomous database systems, 302–
303
ADs. See availability domains (ADs)
ADW (Autonomous Data Warehouse) services, 239–240
vs. ATP, 294
resources, 53
ALIAS DNS record type, 122
Amazon Web Services (AWS), 11
AMD processors for compute shapes, 143
API keys
OCI CLI, 327
Terraform, 334
APIs
federated OCI, 64–66
IAM resources, 40
OCIDs for, 47
permissions, 36–38
apply command in HCL, 337–338
archive storage, 21–22
archive tier buckets, 215–217
ASM (Automatic Storage Management), 241–243
ASM File System (ACFS), 242
asynchronous replication, 350
ATP (Autonomous Transaction Processing) services, 239
vs. ADW, 294
description, 293
resources, 53
Attach Dynamic Routing Gateway screen, 113
attaching block volumes, 192–195
authentication
Auth tokens, 32
autonomous database systems, 297
database backups, 275
federated OCI, 64–66
IAM. See Identity and Access Management (IAM)
OCI CLI, 325
automatic backups, 277, 279–281
Automatic Storage Management (ASM), 241–243
automation tools, 321
OCI CLI, 321–333
questions, 340–342
review, 340
Terraform, 333–339
Autonomous Data Warehouse (ADW) services, 239–240
vs. ATP, 294
resources, 53
autonomous database (ADB) systems
backups and recovery, 300–301
connecting, 297–300
creating, 294–297
HADR architecture, 356
operating, 301–303
variants, 293–294
Autonomous Transaction Processing (ATP) services, 239
vs. ADW, 294
description, 293
resources, 53
autoscaling
custom images, 147
instance pools, 178–179
availability
Data Guard, 354
database migration, 308
HADR architecture. See HADR architecture
availability domains (ADs)
compute instances, 142
description, 2–3
HADR architecture, 345–346
overview, 11–15
resources, 43–47
AVAILABLE attribute in block volume lifecycle-state,
190
AWS (Amazon Web Services), 11
B
backend sets, 19, 130–132
backups
autonomous database systems, 300–301
block volumes, 189, 204–213
console, 277–281
copying, 212–213
Database Cloud Services, 267–282
dbcli utility, 267–273
Exadata, 281–282
full, 207
manual, 205–206
policies, 205
RMAN, 273–277
volume groups, 208–210
bandwidth of networks, 13
Bare Metal Cloud Services (BMCS), 240
bare-metal machines and database systems
block volume connections, 192
compute instances, 15, 20, 22, 142–143
Database Cloud Services, 242–246
Exadata, 247–248
hypervisors, 142, 152
IP address space and DNS requirements, 256
network requirements, 250
servers, 3
virtual machines, 250, 257
Berkeley Internet Name Domain (BIND), 116
best practice architectures. See HADR architecture
BGP (Border Gateway Protocol), 90, 349
bi-directional topology in GoldenGate, 356
BIND (Berkeley Internet Name Domain), 116
blkid command, 200
block size in database migration, 307
block storage, 21
attaching, 192–195
backups, 204–213
connecting, 195–198
creating, 189–192
deleting, 210
file systems, 198–199
formatting, 198–200
groups, 207–210
mounting, 199–200
overview, 188–189
presenting, 200–204
recovery, 210–213
Block Volume service
boot volumes, 150
OCI CLI, 330
BMCS (Bare Metal Cloud Services), 240
boot volumes
compute instances, 149–151
description, 189
Border Gateway Protocol (BGP), 90, 349
Bring Your Own Hypervisor (BYOH), 151–152
bring your own license (BYOL), 23, 257–258, 286–287
broadcast addresses in CIDR, 76
broadcast topology in GoldenGate, 355
Bucket Resource-Type for permissions, 36–38
buckets
archive tier, 215–217
backups, 267–268, 270–271, 273–277
credentials, 32
multipart uploads, 219–220
object storage, 21–22, 188, 213–215
permissions, 36–38
pre-authenticated requests, 220–221
standard tier, 217–219
bulk loader in database migration, 310–311
business units in IAM, 31
bv backup command, 330
BYOH (Bring Your Own Hypervisor), 151–152
BYOL (bring your own license), 23, 257–258, 286–287
C
cascading topology in GoldenGate, 356
CDBs (container databases)
Database Cloud Services, 250
database migration, 307
certificate-based authentication, 297
Challenge Handshake Authentication Protocol (CHAP),
193, 195–198
character sets
Database Cloud Services, 261
database migration, 307
child compartments, 35
Choose Instance Type screen, 157
Classless Inter-Domain Routing (CIDR)
OCI CLI, 332
overview, 75–79
VNC design, 18, 136
cloud computing models, 9–11
clusters. See Real Application Clusters (RACs)
CNAME DNS record type, 122
colocation model in FastConnect, 89
command-line interface. See OCI command line
interface (CLI)
compartments
block volumes, 189
creating, 44–47
IAM, 29–31
policies, 35
resources, 57–60
complexity in database migration, 307
compute instances, 20
autoscaling, 178–179
boot volumes, 149–151
compute images, 144–152, 162–167
compute service components, 142–152
compute shapes, 142–144
configurations, 176–179
console connections, 179–182
creating, 152–162
dynamic groups, 67, 69
HADR architecture, 346–348, 350–351, 358
introduction, 141
managing, 174–175
metadata, 174
multiple vNICs, 175
pools, 176–178
power management, 174
questions, 183–185
review, 182
virtual cloud networks, 84
Windows, 170–173
conditions in policies, 54–56
connections
autonomous database systems, 297–300
block volumes, 195–198
compute instances, 179–182
database migration, 304
console
autonomous database systems, 294–297
backups, 277–281
compute instances connections, 179–182
launching, 8
consolidation topology in GoldenGate, 356
container databases (CDBs)
Database Cloud Services, 250
database migration, 307
Copy Block Volume Backup screen, 212
copying backups, 212–213
cores in processor-based licensing, 284–285
costs
database migration, 307
IAM, 31
CPE (Customer Premises Equipment), 20
CPUs
autonomous database systems, 301
description, 2
Create Autonomous Database screen, 295
Create Backup screen, 278
create-backupconfig command, 271–272
Create Block Volume screen, 190–191
Create Compute Instance screen, 157, 164, 170–171
Create Custom Image screen, 163
Create Dynamic Routing Gateway screen, 112
Create File System screen, 226
Create Internet Gateway screen, 254
Create Load Balancer screen, 167–168
Create Local Peering Gateway screen, 107–108
Create Namespace Definition screen, 50–51, 58
Create NAT Gateway screen, 100–101
create-objectstoreswift command, 271
Create Pre-Authenticated Request screen, 220–221
Create Remote Peering Connection screen, 113
create-rmanbackupreport command, 281
Create Route Table screen, 101–102, 105
Create Service Gateway screen, 104, 253
Create Subnet screen, 97–98
Create Virtual Cloud Network screen, 96–97, 252
Create Volume Group screen, 208, 211
credentials for accounts, 32–33
cross-platform transportable tablespaces in abase
migration, 313
CSI (Customer Support Identifier) numbers, 7
custom images
compute instances, 146–149
creating, 162–167
Custom Resolver, 118
Customer Premises Equipment (CPE), 20
Customer secret keys in federated OCI, 65
Customer Support Identifier (CSI) numbers, 7
D
data center failures, 288
DATA disk group
bare metal database systems, 245
database files, 243
description, 241
Exadata, 248–249
Data Guard
database migration, 312
HADR architecture, 343, 353–355
high availability, 290–293
Data Pump, 309–310, 313–314
data residency regulations in GoldenGate, 28
Data Transfer Appliances, 305
data transfer service for base migration, 304–306, 308
Data Transfer Utility (DTU)
database migration, 305
resource locations, 39
Database as a Service (DBaaS)
description, 9–10
HADR architecture, 352
Database Cloud Services (DBCS), 239
backups, 267–282
bare metal database systems, 242–246
Data Guard, 291–292
dbcli utility, 265–267
description, 22–23
encryption, 287
Exadata, 247–249
licensing, 286–287
network requirements, 250–267
overview, 240–242
patching, 282–283
SQL Developer, 264–265
SQL*Plus utility, 262–264
VM, 250, 257–262
Database Connection screen, 299
database HADR, 351–356
database resource managers, 298
databases, 239–240
autonomous database systems, 293–303
bare-metal. See bare-metal machines and database
systems
Database Cloud Services, 283
HADR architecture, 358
high availability, 287–293
licensing, 283–287
migration. See migration of databases
questions, 317–319
review, 316–317
db version list command, 331
DBaaS (Database as a Service)
description, 9–10
HADR architecture, 352
dbcli utility
backups, 267–273, 281
Database Cloud Services, 265–267
encryption, 287
DBCS. See Database Cloud Services (DBCS)
DBMS_CLOUD.CREATE_CREDENTIAL package, 300
DCS-10045 validation error in backups, 272
DDoS (distributed denial of service) attacks
DNS protection for, 121
HADR architecture, 351
defined tags, 50–52
deleting block volumes, 210
DenseIO compute, 350
describe-rmanbackupreport command, 281
destroy command in HCL, 337, 339
DHCP
IP addresses, 84
networks, 74–75
options, 81, 98
subnets, 117
VCNs, 97, 118
Disaster Recovery (DR), 343
autonomous database systems, 300–301
availability domains, 13
block volumes, 210–213
HADR architecture. See HADR architecture
disk-based database backups, 268–270
distributed denial of service (DDoS) attacks
DNS protection for, 121
HADR architecture, 351
DNAME DNS record type, 122
dnsdomain command, 118
Domain Name System (DNS)
concepts and features, 116–120
Database Cloud Services requirements, 256
description, 19
HADR architecture, 347
in OCI, 115–126
records, 121–126
downloading objects, 216–218
DRGs. See Dynamic Routing Gateways (DRGs)
DTU (Data Transfer Utility)
database migration, 305
resource locations, 39
dynamic groups
description, 38–39
setting up, 66–69
Dynamic Routing Gateways (DRGs)
Database Cloud Services, 250–251
description, 20
overview, 88–90
RPCs, 94
E
East–West traffic, 137, 358
edge security in networking, 137
Edit Route Rules screen, 110, 115
Egress Rules screen, 256
egress security list rules, 282
emulated mode for custom images, 147–148
encryption
block volumes, 189
Database Cloud Services, 267, 287
SSH key pairs, 154
wallet backups, 270–271
end-to-end SSL, 129
ephemeral IP addresses, 85
equality operators for dynamic groups, 67
Establish Peering Connection screen, 109
/etc/fstab file, 198–199
/etc/hosts file, 119
/etc/nsswitch.conf file, 119
/etc/resolv.conf file, 119–120
Exadata
backups, 281–282
Database Cloud Services, 247–249
servers, 239–240
Exadata Cloud at Customer (ExaCC), 309
Exadata on DBCS (ExaCS), 247
Exchange Partner for FastConnect, 349
export options and utilities
database migration, 311–312
FSS, 224
F
failover role transitions in Data Guard, 291, 354
family resource-types in policies, 52–54
Fast Application Notification (FAN) Event traffic, 251
Fast Recovery Area (FRA)
backups, 273
Database Cloud Services, 267
Exadata backups, 282
fast-start-fail-over (FSFO) in Data Guard, 293
FastConnect
autonomous database systems, 297
database migration, 304
description, 20
Dynamic Routing Gateways, 89
HADR architecture, 348–349
fault domains, 12
fault-tolerant data centers, 11
FAULTY attribute in block volume lifecycle-state, 190
fdisk command, 197–199
federated OCI, 64–66
file storage service (FSS), 187–188, 222
concepts, 222–224
creating, 225–232
description, 22
snapshots, 232–234
file systems, creating, 198–199
formatting block volumes, 198–200
FQDNs (fully qualified domain names), 116–118, 256
FRA (Fast Recovery Area)
backups, 273
Database Cloud Services, 267
Exadata backups, 282
free-form tags, 49–50
FSFO (fast-start-fail-over) in Data Guard, 293
FSS. See file storage service (FSS)
full backups
block volumes, 205
creating, 207
Exadata, 281–282
managed, 277
RMAN, 309
fully qualified domain names (FQDNs), 116–118, 256
G
gateways, 86
BGP, 90, 349
Database Cloud Services, 251–252
database migration, 304
DRGs, 20, 88–90, 94, 250–251
dynamic routing, 88–90
Internet, 87
local peering, 93–94
NAT, 87–88, 100–103
remote peering connection, 93–95
service, 90–93, 103–106
get command for Internet gateways, 87
global resources, 40–43
gold images, 146
GoldenGate topologies, 355–356
graph command in HCL, 337
Grid Infrastructure (GI)
description, 241
HADR architecture, 352
patches, 283
RAC, 288
groups
block volumes, 207–210
creating, 60–63
dynamic, 38–39, 66–69
IAM, 33–34
Guided Journey screen, 7–8
H
HADR architecture
autonomous database systems, 356
compute instances, 358
Data Guard, 353–355
database, 351–356
designing, 344–356
GoldenGate, 355–356
IAM, 357
networking, 357–358
overview, 343
performance-based, 351
questions, 359–361
RACs, 353
regions and availability domains, 345–346
review, 358
security, 356–358
single-instance databases, 352
storage and compute instances, 350–351
VCNs, load balancers, and compute instances, 346–
348
VPN and FastConnect, 348–349
hard disk drives (HDDs) in database migration, 305
hardware-based encryption, 287
HashiCorp Configuration Language (HCL), 333, 336–
337
Health Checks for backend sets, 131–132
high availability (HA), 343
Data Guard, 290–293
HADR. See HADR architecture
overview, 287–288
RACs, 288–290
HIGH priority in autonomous database systems, 298
host address space in CIDR, 76–78
hostname command, 118
hostnames in load balancers, 129
Hybrid Columnar Compression, 247
Hyper-V hypervisors, 152
hyperthreading in processor-based licensing, 284–285
hypervisors, 151–152
I
IaaS (Infrastructure as a Service), 2, 9–11
IaC (Infrastructure-as-Code)
automation tools, 321
OCI CLI, 332
IAM. See Identity and Access Management (IAM)
iam region list command, 327
IANA (Internet Assigned Numbers Authority), 80, 116
ICANN (Internet Corporation for Assigned Names and
Numbers), 116
IDCS (Identity Cloud Service)
accounts, 6–7
federated OCI, 64
Identity and Access Management (IAM)
concepts, 27–28
dynamic groups, 66–69
federated OCI, 64–66
FSS, 224
groups, 33–34, 38–39
HADR architecture, 351, 357
introduction, 27
overview, 16–18
policies, 34–38, 52–56
questions, 70–72
resource creation, 56–63
resource identifiers, 47–48
resource locations, 39–47
resource overview, 28–29
review, 69
tags, 49–52
tenancy and compartments, 29–31
users, 31–33
Identity Cloud Service (IDCS)
accounts, 6–7
federated OCI, 64
identity providers (IdPs) in federated OCI, 64–66
images, compute, 144–152, 162–167
import utilities in database migration, 311–312
incremental backups
block volumes, 205
console, 277, 279–281
indexing in autonomous database systems, 302
inequality operators for dynamic groups, 67
Infrastructure as a Service (IaaS), 2, 9–11
Infrastructure-as-Code (IaC)
automation tools, 321
OCI CLI, 332
Ingress Rules screen, 255
init command in HCL, 336
inspect verb for permissions, 36–38
installing
OCI CLI, 322–325
Terraform, 334–335
Internet and VCN Resolver, 118
Internet Assigned Numbers Authority (IANA), 80, 116
Internet Corporation for Assigned Names and Numbers
(ICANN), 116
Internet gateways
Database Cloud Services, 251
database migration, 304
overview, 87
Internet service providers (ISPs), 74
IP addresses
CIDR, 76–77
Database Cloud Services, 256
DNS. See Domain Name System (DNS)
gateways, 86–95
load balancers, 347
networks, 74–75
private, 83–84
public, 85–86
virtual cloud networks, 80, 83–86
IP hash policy for load balancers, 132
IPSec VPN
database migration, 304
Dynamic Routing Gateways, 89
iSCSI attachments, 192–198
iSCSI Commands & Information screen, 202
iscsiadm command, 197–198
isolation in availability domains, 13
ISPs (Internet service providers), 74
J
JSON files
free-form tags, 49
OCI CLI, 328, 330, 332–333
Terraform, 333, 336
K
Keep Policy Current option, 38
kernel-based VM (KVM), 152
key management system (KMS), 287
Key Vault for encryption, 287
keys
credentials, 32–33
federated OCI, 65
OCI CLI, 327–328
SSH, 154–156
tags, 50
Terraform, 334
KMS (key management system), 287
KVM (kernel-based VM), 152
L
labels in DNS, 116
large objects in multipart uploads, 219–220
latency in networks, 13
Launch DB System screen
bare metal systems, 244
DB systems on VMs, 257
high availability, 289
least connections policy for load balancers, 132
licensing databases, 283–287
list-backupconfigs command, 272
list-vnics command, 175
Listener Information screen, 133
listeners in load balancers, 19, 129–130
load balancers (LBs)
backend sets, 130–132
HADR architecture, 346–348
instance pools, 177
listeners, 129–130
networking, 19
in OCI, 126–135
private, 127
public, 127–129
routing traffic to web servers, 167–170
setting up, 132–135
terminology and concepts, 126–135
local peering gateways (LPGs), 93–94
local peering setup, 106–111
logical standby in Data Guard, 290–291
LOW priority in autonomous database systems, 298
LPGs (local peering gateways), 93–94
M
MAA (Maximum Availability Architecture) in database
migration, 308, 310, 354
manage verb in policies, 34–38
managed recovery in Data Guard, 290
manual backups, 205–206
master images, 146
matching rules in dynamic groups, 67
Maximum Availability Architecture (MAA) in database
migration, 308, 310, 354
Maximum Availability mode in Data Guard, 291, 354
Maximum Performance mode in Data Guard, 291, 354
Maximum Protection mode in Data Guard, 291
MEDIUM priority in autonomous database systems,
298
metadata in compute instances, 174
metrics
named user plus licensing, 286–287
processor-based licensing, 284–285
migration of databases, 303–304
approaches, 306–310
connectivity, 304
Data Guard, 312
Data Pump, 313–314
data transfer service, 304–306
export and import utilities, 311–312
multitenant approaches, 314–315
RMAN, 313
SQL Developer, 315–316
SQL*Loader, 310–311
monitoring autonomous database systems, 302–303
mount targets in FSS, 225–232
mounting block volumes, 199–200
multipart uploads for large objects, 219–220
multiple vNICs, 175
multitenancy
Database Cloud Services, 250
database migration, 307, 309, 314–315
MX DNS record type, 122
N
NAME component in DNS resource record, 122
named user plus (NUP) licensing, 283, 286–287
names
block volumes, 189
buckets, 214–215
DNS. See Domain Name System (DNS)
shapes, 20, 142
tags, 49–52
usernames, 32
native mode for custom images, 147–148
netmasks in CIDR, 77–78
network address translation (NAT) gateways
Database Cloud Services, 251
deploying, 100–103
overview, 87–88
network file system (NFS), 22, 222
network identifiers in CIDR, 76
Network Information screen, 133
network vcn command, 330, 332
network virtualization, off-box, 15–16
networks and networking, 2
CIDR, 75–79
concepts and terminology, 73–75
Database Cloud Services requirements, 250–267
DNS, 19, 115–126
Dynamic Routing Gateway, 20
edge security, 137
FastConnect, 20
HADR architecture, 357–358
introduction, 73
load balancers, 19, 126–135
performance, 13
questions, 138–140
review, 137–138
virtual cloud networks, 18–19
VNC design, 135–136
NFS (network file system), 22, 222
NFSv3 Unix security, 224
Nimbula Director, 4
node failures in high availability, 288
noisy neighbor situations, 15
non-volatile storage components, 1
North–South traffic, 137, 358
NS DNS record type, 122
nslookup command, 120
NUP (named user plus) licensing, 283, 286–287
NVIDIA processors for compute shapes, 142–143
NVMe disks in HADR architecture, 350
O
OAM (Oracle Access Manager), 64
object storage, 213
buckets, 213–219
Exadata backups, 282
multipart uploads, 219–220
overview, 21–22
pre-authenticated requests, 220–221
pseudo-hierarchies, 218–219
RMAN backups, 275–277
objectstoreswift resources for backups, 271
OCI command line interface (CLI)
buckets, 215
configuring, 325–328
installing, 322–325
overview, 321–322
resource locations, 39
supported database lists, 331–333
working with, 328–330
OCI console for buckets, 215
OCI users for Exadata backups, 282
OCIDs. See Oracle Cloud IDs (OCIDs)
OCPUs (Oracle Compute Processing Units), 3
compute shapes, 142
processor-based licensing, 284–285
OEM (Oracle Enterprise Manager), 241
off-box network virtualization, 15–16
olsnodes command, 282
OLTP-specific services, 298
on-premises networks, 73–74
one-off patches in database migration, 306
ONS (Oracle Notification Services), 251
OPC (Oracle Public Cloud), 4
optimizing autonomous database systems, 302
Oracle Access Manager (OAM), 64
Oracle Call Interface, 297
Oracle Cloud IDs (OCIDs), 35
Dynamic Routing Gateways, 90
FSS, 233
images, 151
policies, 35
remote peering connection, 94
resource identifiers, 47–48
Terraform, 334
Oracle Cloud Infrastructure Classic, 1
Oracle Cloud Infrastructure (OCI) overview, 1
accounts, 4–8
cloud computing models, 9–11
compute instances, 20
Database Cloud Service, 22–23
features and components overview, 11
Identity and Access Management, 16–18
introduction, 1–8
load balancers, 126–135
networking, 18–20
off-box network virtualization, 15–16
questions, 24–26
regions and availability domains, 11–15
review, 24
storage, 20–22
Oracle Compute Processing Units (OCPUs), 3
compute shapes, 142
processor-based licensing, 284–285
Oracle Enterprise Manager (OEM), 241
ORACLE HOME location, 241
Oracle images, 145
Oracle Network Provider for FastConnect, 349
Oracle Notification Services (ONS), 251
Oracle Public Cloud (OPC), 4
Oracle Virtual Machine (OVM)
description, 2
hypervisors, 152
P
PaaS, 9–11
paravirtualized attachments in block volumes, 192
paravirtualized mode for custom images, 147–148
PARs (pre-authenticated requests) for object storage,
220–221
partitions for block volumes, 198–200
partner images, 145
passwords in federated OCI, 65
patching
autonomous database systems, 302
Database Cloud Services, 282–283
database migration, 306
path route rules for load balancers, 129
Path Route Sets for load balancers, 19
PDBs (pluggable databases)
Database Cloud Services, 250
database migration, 307
peer-to-peer topology in GoldenGate, 356
PEM key pairs in Terraform, 334
performance
Data Guard, 354
networks, 13
performance-based HADR, 351
permissions
overview, 35–38
tags, 51
physical standby mode in Data Guard, 290
PITR (point-in-time recovery)
backups, 280
Data Guard, 291, 354
plan command in HCL, 337–338
platform images, 144–145
pluggable databases (PDBs)
Database Cloud Services, 250
database migration, 307
point-in-time recovery (PITR)
backups, 280
Data Guard, 291, 354
policies
backups, 205
conditions, 54–56
creating, 60–63
family resource-types, 52–54
IAM, 34–38
locations, 54–55
Policies Resource-Type for permissions, 37
pools in compute instances, 176–178
power management in compute instances, 174
pre-authenticated requests (PARs) for object storage,
220–221
presenting block volumes, 200–204
private IP addresses, 74, 83–84
private load balancers
compartments, 127
HADR architecture, 347
private peering in FastConnect, 89, 348
private subnets with dynamic routing gateways, 251
processor-based licensing, 283–285
protection
Data Guard, 354
HADR architecture, 356–358
providers in HCL, 336
PROVISIONING attribute in block volume lifecycle-
state, 190
provisioning state in instance pools, 177
pseudo-hierarchies in object storage, 218–219
PTR DNS record type, 122
public IP addresses, 74, 85–86
public load balancers
HADR architecture, 347
overview, 127–129
public peering in FastConnect, 89, 348
public subnets with Internet gateways, 251–257
PuTTY Key Generator, 154–155
Q
QuickStart installation, 323–324
R
racks
Exadata Cloud Service, 247
failures, 288
RACs. See Real Application Clusters (RACs)
RCs (root compartments) in IAM, 30
RDATA component in DNS resource record, 122
RDLENGTH component in DNS resource record, 122
read verb for permissions, 36–38
Real Application Clusters (RACs)
description, 240–242
Exadata, 247
HADR architecture, 353
high availability, 288–290
RECO disk group
bare metal database systems, 245
description, 241
Exadata, 248–249
recovery-related files, 243
records, DNS, 121–126
recovery
autonomous database systems, 300–301
availability domains, 13
block volumes, 210–213
HADR architecture. See HADR architecture
Recovery Manager (RMAN)
backup reports, 281
database migration, 309–310, 313
unmanaged database backups, 273–277
Recovery Point Objective (RPO), 344
Recovery Time Objective (RTO), 344
redundancy
ASM, 242
HADR architecture, 343
refresh command in HCL, 337
regions
HADR architecture, 345–346
overview, 11–15
resources, 43–47
subscribing to, 41–43
volume backups, 212
reliability in database migration, 308
remote cloning in database migration, 309–310
remote peering connection (RPC), 93–95
remote VCN peering, 111–115
replication in HADR architecture, 350
reserved IP addresses, 85
RESET command in instance power management, 174
resolution, DNS, 117–118
resource identifiers, 47–48
resource locations, 39–40
global resources, 40–43
regional and availability domain–level resources, 43–
47
resource records (RRs) in DNS, 116, 122–126
resources
compartments, 57–60
creating, 56–63
family resource-types, 52–54
HCL, 336
IAM, 28–29
regions and availability domains, 43–47
REST APIs for buckets, 215
restoring
block volumes, 210–212
objects, 216–218
RESTORING attribute in block volume lifecycle-state,
190
RMAN (Recovery Manager)
backup reports, 281
database migration, 309–310, 313
unmanaged database backups, 273–277
roles in Data Guard, 291, 354
root compartments (RCs) in IAM, 30
Round Trip Time (RTT) in networks, 13
route tables
creating, 101–103
Database Cloud Services, 251
description, 80
routers, 75
routers in networks, 74–75
routing algorithms for load balancers, 19
routing traffic to web servers, 167–170
RPC (remote peering connection), 93–95
RPO (Recovery Point Objective), 344
RRs (resource records) in DNS, 116, 122–126
RSA key pairs in OCI CLI, 328
RTO (Recovery Time Objective), 344
RTT (Round Trip Time) in networks, 13
rules
load balancers, 130
routers, 75
running state in instance pools, 177
S
SaaS, 9–11
scaling
autonomous database systems storage, 301
custom images, 147
instance pools, 178–179
schemas
autonomous database systems, 302
database migration, 314
tags, 50–52
SCIM (System for Cross-domain Identity Management),
64
SD-WAN (software-defined wide area networking)
solutions, 349
SDKs (Software Development Kits)
buckets, 215
resource locations, 39
secure shell (SSH)
compute instances, 20, 180–182
Database Cloud Services, 263
key pairs, 154–156
Secure Sockets Layer (SSL)
autonomous database systems, 297
listeners, 129
security
autonomous database systems, 302
FSS, 224
HADR architecture, 356–358
networking, 137
security lists
Database Cloud Services, 251
edge security, 137
Exadata backups, 282
FSS, 224
VCNs, 81
service gateways
Database Cloud Services, 251
deploying, 103–106
Exadata backups, 281
overview, 90–93
setup config command, 326
shapes, compute, 142–144
single-instance (SI) databases, 352
single sign-on (SSO), 64–66
size
boot volumes, 149
source databases in database migration, 307
SMTP credentials, 32
snapshots in FSS, 232–234
SOA DNS record type, 122
sockets in processor-based licensing, 284–285
SOFTRESET command in instance power management,
174
SOFTSTOP command in instance power management,
174
software-defined wide area networking (SD-WAN)
solutions, 349
Software Development Kits (SDKs)
buckets, 215
resource locations, 39
source databases in database migration
platforms, 307
size, 307
version, 306
SPARSE disk group
description, 241
Exadata, 248–249
speed in database migration, 308
SQL Apply in Data Guard, 290
SQL Developer
autonomous database system connections, 298–300
Database Cloud Services, 264–265
database migration, 308–309, 315–316
SQL*Loader in database migration, 310–311
SQL*Plus utility, 262–264
ssh-keygen command, 155
SSH (secure shell)
compute instances, 20, 180–182
Database Cloud Services, 263
key pairs, 154–156
SSL (Secure Sockets Layer)
autonomous database systems, 297
listeners, 129
SSO (single sign-on), 64–66
standalone managed backups, 277–278
Standard Edition for databases, 241
standard tier for buckets, 214, 217–219
START command in instance power management, 174
starting state in instance pools, 177
static routes in Exadata backups, 282
STOP command in instance power management, 174
stopped state for instance pools, 178
stopping state for instance pools, 178
storage, 20–21, 187–188
archive, 21–22
block. See block storage
file service, 22
file storage service. See file storage service (FSS)
HADR architecture, 350–351, 358
object. See object storage
questions, 235–237
review, 234
scaling in autonomous database systems, 301
subnets
CIDR, 76
creating, 96–100
DNS, 117
edge security, 137
VCNs, 81–82
subscribing to regions, 41–43
switchover role transitions in Data Guard, 291, 354
synchronous replication, 350
System for Cross-domain Identity Management (SCIM),
64
T
tags
defined, 50–52
dynamic groups, 67
free-form, 49–50
taint command in HCL, 337
TCP/IP (Transmission Control Protocol/ Internet
Protocol), 74–75
TDE (Transparent Data Encryption)
Database Cloud Services, 267, 287
description, 242
wallet backups, 270–271
tenancy
Database Cloud Services, 250
database migration, 307, 309, 314–315
federated OCI, 66
IAM, 29–31
TERMINATED attribute in block volume lifecycle-state,
190
terminated state in instance pools, 178
TERMINATING attribute in block volume lifecycle-
state, 190
terminating state in instance pools, 178
termination of SSL traffic, 129
Terraform tool
installing and configuring, 334–335
overview, 333
VCNs, 337–338
working with, 336–337
threads in processor-based licensing, 284–285
tiers in buckets, 214–217
top-level domains (TLDs), 116
TP service in autonomous database systems, 298
TPURGENT service in autonomous database systems,
298
Transmission Control Protocol/ Internet Protocol
(TCP/IP), 74–75
Transparent Data Encryption (TDE)
Database Cloud Services, 267, 287
description, 242
wallet backups, 270–271
transportable tablespaces in database migration, 313–
314
TTL component in DNS resource record, 122
tuning autonomous database systems, 302
tunneling SSL traffic, 129
TYPE component in DNS resource record, 122
U
unidirectional topology in GoldenGate, 355
unique identifiers (UUIDs) for partitions, 200
unmanaged database backups, 273–275
Unplug/Plug in database migration, 309–310, 314
untaint command in HCL, 337
update-database command, 272
update-tdekey command, 287
uploading
large objects, 219–220
objects, 216–218
use verb for permissions, 37–38
Use Version Date option, 38
users
creating, 60–63
credentials, 32–33
IAM, 31–33
UUIDs (unique identifiers) for partitions, 200
V
variables
HCL, 335–336
policy conditions, 56
VCNs. See virtual cloud networks (VCNs)
vCPUs (virtual CPUs), 284–285
verbs for permissions, 35–38
virtual cloud networks (VCNs), 18–19
creating, 44–47, 96–100
design, 135–137
DHCP options, 81
gateways, 86–95
HADR architecture, 346–348
IAM, 28–29
local peering, 106–111
NAT gateways, 100–103
networks, 74
OCI CLI, 329, 332
overview, 79–80
peering, 80
private IP addresses, 83–84
public IP addresses, 85–86
remote peering, 111–115
route tables, 80
security lists, 81
service gateways, 103–106
subnets, 81–82
Terraform, 337–338
virtual NICs, 83–84
virtual CPUs (vCPUs), 284–285
virtual hostnames for load balancers, 129
virtual machines (VMs)
compute instances, 142–143
Database Cloud Services, 250, 257–262
virtual network interface cards (vNICs)
multiple, 175
networks, 75
overview, 83–84
virtualization, off-box network, 15–16
VMs (virtual machines)
compute instances, 142–143
Database Cloud Services, 250, 257–262
VNC connections for compute instances, 180
vNICs (virtual network interface cards)
multiple, 175
networks, 75
overview, 83–84
volatile storage components, 2
VPNs in HADR architecture, 348–349
W
web servers
compute instances as, 156–162
routing traffic to, 167–170
weighted round robin policy for load balancers, 131
Windows
block volume instances, 200–204
compute instances, 170–173
Z
Zero Data Loss Recovery Appliance (ZDLRA) for
database migration, 308, 310
Zero Downtime Migration (ZDM) for database
migration, 308, 310
zones, DNS, 116, 121, 123–126