Skip to content

Commit 8ddec2d

Browse files
authored
WMS ID: 11673 Oracle Database@Azure Observability and Management using Database Management and Ops Insights (#323)
* Multicloud ODAA DBM and Ops Insights * Multicloud ODAA DBM and OPSI * Multicloud ODAA DBM and OPSI * Multicloud ODAA DBM and OPSI * Multicloud ODAA DBM and OPSI * Multicloud ODAA DBM and OPSI * Multicloud ODAA DBM and OPSI * Multicloud ODAA DBM and OPSI * Multicloud ODAA DBM and OPSI * Multicloud ODAA DBM and OPSI * Multicloud ODAA DBM and OPSI * Multicloud ODAA DBM and OPSI * Multicloud ODAA DBM and OPSI * Multicloud ODAA DBM and OPSI * Multicloud ODAA DBM and OPSI * Multicloud ODAA DBM and OPSI * Multicloud ODAA DBM and OPSI * Multicloud ODAA DBM and OPSI * Multicloud ODAA DBM and OPSI
1 parent c94098e commit 8ddec2d

File tree

108 files changed

+1288
-0
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

108 files changed

+1288
-0
lines changed
Lines changed: 128 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,128 @@
1+
# Setting up Database Management for Oracle Database@Azure Autonomous Databases
2+
3+
## Introduction
4+
5+
In this lab, you will go through the steps to set up Database Management for **Oracle Database@Azure Autonomous Database**.
6+
7+
**Database Management Service** now also supports **Oracle Database@Azure Autonomous Database**. You can use Database Management to monitor a single Autonomous Database or a fleet of Autonomous Databases and obtain meaningful insights from the metrics pushed to the Oracle Cloud Infrastructure Monitoring service.
8+
9+
Estimated Time: 60 minutes
10+
11+
### Objectives
12+
13+
Set up Database Management to monitor and manage **Oracle Database@Azure Autonomous Database**.
14+
15+
## Prerequisites
16+
17+
Assign proper IAM permissions
18+
19+
- From **Navigation Menu**, click **Identity & Security**, click **Policies**
20+
- Click the existing policy MulticloudLink_ODBAA_20240227_DBM_Policy
21+
- Add the following **Policy Statement** to the policy
22+
23+
```
24+
<copy>
25+
Allow service dpd to read secret-family in compartment MulticloudLink_ODBAA_20240105042431
26+
Allow service dpd to manage objects in compartment MulticloudLink_ODBAA_20240105042431
27+
Allow group odaa_dbmgmt-group to manage dbmgmt-family in tenancy
28+
Allow group odaa_dbmgmt-group to manage autonomous-database-family in tenancy
29+
Allow group odaa_dbmgmt-group to read database-family in tenancy
30+
Allow group odaa_dbmgmt-group to manage vnics in tenancy
31+
Allow group odaa_dbmgmt-group to use subnets in tenancy
32+
Allow group odaa_dbmgmt-group to use network-security-groups in tenancy
33+
Allow group odaa_dbmgmt-group to use security-lists in tenancy
34+
Allow group odaa_dbmgmt-group to manage secret-family in compartment MulticloudLink_ODBAA_20240105042431
35+
Allow group odaa_dbmgmt-group to read metrics in compartment MulticloudLink_ODBAA_20240105042431
36+
Allow group odaa_dbmgmt-group to manage alarms in compartment MulticloudLink_ODBAA_20240105042431
37+
Allow group odaa_dbmgmt-group to manage ons-topics in compartment MulticloudLink_ODBAA_20240105042431
38+
Allow group odaa_dbmgmt-group to manage management-dashboard-family in compartment MulticloudLink_ODBAA_20240105042431
39+
</copy>
40+
```
41+
42+
- Click **Save changes**
43+
44+
## Task 1: Grant a database user the privileges to monitor and management Autonomous Database and save the database user password in a secret
45+
46+
- Use **ADBSNMP** for **basic monitoring preferred credential**
47+
- Use **ADMIN** user for **advanced diagnostic and administration preferred credential**
48+
- Grant proper privileges for **DBM Diagnostic & Management features**
49+
- In the left pane, click **Secrets**.
50+
- Click **Create Secret**.
51+
- On the **Create Secret** page
52+
- Create in Compartment: Select Compartment Name
53+
- **Name**: <dbname\>_secret
54+
- **Description**: Monitoring user password
55+
- **Encryption Key**: Select OnM_key
56+
- Select **Manual secret generation**
57+
- **Secret Contents**: Enter the ADBSNMP or ADMIN user password
58+
- Click **Create Secret**.
59+
60+
![Multicloud ADB secret](./images/odaa-odaa-adb-secret.png "Multicloud ADB secret")
61+
62+
## Task 2: Configure network access between Database Management and the Autonomous Database
63+
64+
**Note**: if mutual TLS (mTLS) authentication is required, you must download the wallet and save it in a Vault service secret. This secret is required when enabling Diagnostics & Management for the Autonomous Database.
65+
66+
- **Create a Database Management private endpoint in the Autonomous Database VCN**. If the Autonomous Database is in a private subnet in the VCN, it's recommended that the Database Management private endpoint also resides in the same subnet. If there's an existing Database Management private endpoint in the same VCN, you can reuse it even if it's not in the same subnet.
67+
68+
![Multicloud ADB Private Endpoint](./images/odaa-odaa-adb-privateendpoint.png "Multicloud ADB Private Endpoint")
69+
70+
- **Add ingress and egress security rules** (TCP protocol, port 1521 or 1522) to NSG in the VCN to enable communication between the Database Management private endpoint and the Autonomous Database. If an NSG is not available, create one and add ingress and egress security rules on TCP protocol with a port used for JDBC for the subnet IP CIDR.
71+
72+
![Multicloud ADB Security List](./images/odaa-odaa-adb-securitylist.png "Multicloud ADB Security List")
73+
74+
- Note that if the Autonomous Database and the Database Management private endpoint are not in the same subnet, you must:
75+
- Replace the JDBC port constraint with All on the non-database end.
76+
- Replace the subnet IP CIDR with the VCN IP CIDR.
77+
78+
## Task 3: Save the wallet in a Vault service secret for mTLS connections
79+
80+
- **Download the wallet from the Autonomous Database details page**. For Autonomous Databases Serverless, it's recommended that you download the Regional wallet.
81+
82+
![Download Multicloud Autonomous Database wallet](./images/odaa-download-adb-wallet.png "Download Multicloud Autonomous Database wallet")
83+
84+
- Once you download the wallet, you must **extract the wallet_<databasename\>.zip file and save the SSO wallet, cwallet.sso file in a Vault service secret**. This secret can then be uploaded when enabling Diagnostics & Management for the Autonomous Database. Note that if you've not created a secret with the cwallet.sso file, you can also do so when enabling Diagnostics & Management.
85+
86+
![Store Multicloud Cloud Database wallet in the vault secret](./images/odaa-store-sso-wallet-in-vault.png "Store Multicloud Cloud Database wallet in the vault secret")
87+
88+
89+
## Task 4: Enable Database Management for Oracle Database@Azure Autonomous Database
90+
91+
- Open the **Navigation Menu**
92+
- Click **Observability & Management**.
93+
- Under **Database Management**, click **Administration**.
94+
- **On the left pane**, select a **compartment** in the Compartment drop-down list and Autonomous in the Deployment type drop-down list.
95+
- On the Managed databases page, click **Enable Database Management**.
96+
97+
In the Enable Database Management panel, provide the information:
98+
99+
- **Database type**: Select Autonomous.
100+
- **Workload type**: Select the Autonomous Database workload type.
101+
- **Deployment type**: Select the deployment type: Autonomous Serverless
102+
- **Autonomous Database**: Select the Autonomous Database.
103+
- **Service name**: The predefined connection profiles for the Autonomous Database are automatically displayed in the dbname\_<service name\> (TLS or Mutual TLS) format.
104+
- **Protocol**: The TCP or TCPS protocol used to connect to the Autonomous Database
105+
- **Port**: 1521(TCP) or 1522(TCPS)
106+
- **Database wallet secret**: Select the secret that contains the wallet from the drop-down list. This field is only displayed if mTLS is appended to the service name. If an existing secret that contains the wallet is not available, then select Create new secret... in the drop-down list and save the cwallet.sso file in a secret.
107+
108+
![Enable Database Management for ADB](./images/odaa-enable-adb1.png "Enable Database Management for ADB")
109+
110+
- Provide the credentials for the database connection
111+
- **Database username**: Enter admin
112+
- **User password secret**: Select the secret from the drop down menu
113+
- Click **Add policy** to create the policy for Database Management service to read the secret.
114+
- **Select connection mode**: select Private Endpoint from the drop-down menu
115+
- **Management options**: select Full management
116+
- Click **Enable Database Management**
117+
118+
![Enable Database Management for ADB](./images/odaa-enable-adb2.png "Enable Database Management for ADB")
119+
120+
- After you enable Database Management, you can click the **Work Requests** on the left pane under Resources to monitor the progress of the work request.
121+
- After Database Management is successfully enabled, the **Enable** option next to Database Management on the Autonomous Database Details page is replaced with Enabled. A **Disable** option is also displayed, which you can click to disable Database Management.
122+
- Click the **Autonomous Database** for which we just enabled Database Management to view Managed Database Details.
123+
124+
## Acknowledgements
125+
126+
- **Author** - Royce Fu, Master Principal Cloud Architect, North America Cloud InfrastructureEngineering
127+
- **Contributors** - Royce Fu, Derik Harlow, Murtaza Husain, Sriram Vrinda
128+
- **Last Updated By/Date** - Royce Fu, January 2025
Loading
Loading
Loading
Loading
Loading
Lines changed: 195 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,195 @@
1+
# Enable Database Management for Oracle Database@Azure Cloud Databases
2+
3+
## Introduction
4+
5+
In this lab, you will go through the steps to set up Database Management for Oracle Database@Azure Databases.
6+
7+
Multicloud adoption allows businesses to harness the strengths of different cloud platforms while mitigating risks. However, monitoring and managing databases in a multicloud environment introduces unique challenges, requiring specialized approaches and solutions. You can use Diagnostics & Management features to monitor and manage Oracle Databases running on the following cloud platforms:
8+
9+
![Database Management Architecture](./images/odaa-dbm-architecture.png "Database Management Architecture")
10+
11+
Estimated Time: 60 minutes
12+
13+
### Objectives
14+
15+
Set up Database Management to monitor and manage Oracle Database@Azure Cloud Databases.
16+
17+
Here are some of the important tasks you can perform using Diagnostics & Management features:
18+
- Monitor the key performance and configuration metrics of your fleet of Oracle Databases. You can also compare and analyze database metrics over a selected period of time.
19+
- Use Performance Hub for a single-pane-of-glass view of database performance, which enables you to quickly diagnose performance issues.
20+
- Use AWR Explorer to visualize historical performance data from AWR snapshots in easy-to-interpret charts.
21+
- Use the other available Diagnostics & Management features to monitor, manage, and administer a single Oracle Database.
22+
- Use dashboards to visualize, explore and analyze database performance metrics.
23+
24+
## Prerequisites
25+
26+
Understand the Oracle Database@Azure compartment structure:
27+
Oracle Database@Azure Exadata Infrastructure is created in the auto-generated compartment with the name matches the Azure Subscription ID.
28+
![Oracle Database@Azure Compartment](./images/odaa-compartment1.png "Oracle Database@Azure Compartment")
29+
![Oracle Database@Azure Compartment](./images/odaa-compartment2.png "Oracle Database@Azure Compartment")
30+
31+
### Add Required IAM Policies
32+
33+
- From the **Oracle Cloud console navigation menu** located in the upper left, click **Identity & Security**. Under **Identity**, click **Policies**.
34+
- Click **Create Policy**. In the **Create Policy** dialog :
35+
- **Name**: Enter MulticloudLink\_ODBAA\_20240227\_DBM\_Policy
36+
- **Description**: Enter Multicloud ODBAA Database Management Service Policy
37+
- **Compartment**: Select root.
38+
- Enable **Show manual editor**.
39+
- Enter the following in **Policy Builder**:
40+
- **Policy statements**
41+
42+
```
43+
<copy>
44+
Allow service dpd to read secret-family in compartment MulticloudLink_ODBAA_20240105042431
45+
Allow service dpd to manage objects in compartment MulticloudLink_ODBAA_20240105042431
46+
Allow group odaa_dbmgmt-group to manage dbmgmt-family in tenancy
47+
Allow group odaa_dbmgmt-group to read database-family in tenancy
48+
Allow group odaa_dbmgmt-group to manage vnics in tenancy
49+
Allow group odaa_dbmgmt-group to use subnets in tenancy
50+
Allow group odaa_dbmgmt-group to use network-security-groups in tenancy
51+
Allow group odaa_dbmgmt-group to use security-lists in tenancy
52+
Allow group odaa_dbmgmt-group to manage secret-family in compartment MulticloudLink_ODBAA_20240105042431
53+
Allow group odaa_dbmgmt-group to read buckets in compartment MulticloudLink_ODBAA_20240105042431
54+
Allow group odaa_dbmgmt-group to read metrics in compartment MulticloudLink_ODBAA_20240105042431
55+
Allow group odaa_dbmgmt-group to manage alarms in compartment MulticloudLink_ODBAA_20240105042431
56+
Allow group odaa_dbmgmt-group to manage ons-topics in compartment MulticloudLink_ODBAA_20240105042431
57+
Allow group odaa_dbmgmt-group to manage management-dashboard-family in compartment MulticloudLink_ODBAA_20240105042431
58+
</copy>
59+
```
60+
61+
## Task 1: Create Database Monitor User
62+
63+
Set database monitoring user credentials in the **Oracle Database@Azure**. You must grant a database user, for example, **DBSNMP**, the privileges required to monitor and manage the Oracle Database@Azure Databases.
64+
65+
Connect to DBCS database as **SYSDBA** and execute the following :
66+
67+
```
68+
<copy>
69+
GRANT CREATE PROCEDURE TO dbsnmp;
70+
GRANT SELECT ANY DICTIONARY, SELECT_CATALOG_ROLE TO dbsnmp;
71+
GRANT ALTER SYSTEM TO dbsnmp;
72+
GRANT ADVISOR TO dbsnmp;
73+
GRANT EXECUTE ON DBMS_WORKLOAD_REPOSITORY TO dbsnmp;
74+
alter user dbsnmp account unlock;
75+
alter user dbsnmp identified by "<password>";
76+
</copy>
77+
```
78+
79+
The database user password checks in Database Management require the password to be Federal Information Processing Standards (FIPS) compliant:
80+
81+
- Password length must be between 14 to 127 characters.
82+
- Password must have at least one lowercase, one uppercase, one digit, and one special character.
83+
84+
## Task 2: Create OCI Vault and Secret to Store Database Monitoring User Credentials
85+
86+
- From the Oracle Cloud Console **Navigation Menu** located in the upper left, click Identity & Security and click Vault.
87+
- On the **OCI Vaults** page, click **Create Vault**.
88+
- Create in **Compartment**: Select the name of compartment.
89+
- **Name**: Enter OnM_vault.
90+
- Click **Create Vault**.
91+
92+
![Multicloud Vault](./images/odaa-vault1.png "Multicloud Vault")
93+
94+
- Click the vault **OnM_vault**
95+
- On the Vault Details page, click **Create Key**.
96+
- On the **Create Key** page, select all the defaults
97+
- Enter **Name** : **OnM_key**.
98+
99+
![Multicloud Vault Key](./images/odaa-vaultkey1.png "Multicloud Vault Key")
100+
101+
* On the **Vault Details** page, confirm the State of key is Enabled.
102+
* In the left pane, click **Secrets**.
103+
104+
Click Create **Secret**. On the **Create Secret** page, enter the following :
105+
106+
* **Compartment**: Select Compartment Name
107+
* **Name**: <dbname\>_secret
108+
* **Description**: Monitoring user password
109+
* **Encryption Key**: Select OnM_key
110+
* **Select Manual secret generation**
111+
* **Secret Contents**: Enter the DBSNMP user password
112+
* Click **Create Secret**.
113+
114+
Confirm the Status of <dbname\>_secret is Active.
115+
116+
![Multicloud Vault Secret](./images/odaa-vaultsecret1.png "Multicloud Vault Secret")
117+
118+
119+
## Task 3: Create a Database Management Private Endpoint
120+
121+
- **Database Management Private Endpoint** is required to enable communication between Database Management and your Oracle Database@Azure in a Virtual Cloud Network (VCN).
122+
- Private endpoints are needed to connect to Oracle Database@Azure running in a private VCN.
123+
- **Database Management Private Endpoint** is its network point of presence in the Oracle Database@Azure’s VCN.
124+
- The private endpoint need not be on the same subnet as the Oracle Database@Azure, although, it must be on a subnet that can communicate with the Oracle Database@Azure.
125+
- Private End point must be on a subnet in the customer VCN that can communicate with the Oracle Cloud Database
126+
127+
Refer Create a Database Management Private Endpoint for best practices.
128+
129+
- Go to **Navigation menu**, click **Observability & Management**. Under **Database Management**, click **Administration**.
130+
- On the left pane on the **Administration** page, click **Private Endpoint** and select the compartment in which you want to create the private endpoint.
131+
- On the **Private Endpoints** page, click **Create Private Endpoint**.
132+
- In the **Create Private Endpoint** dialog:
133+
- **Name**: Enter DBM_PE.
134+
- **Description**: Enter Database Management Private Endpoint.
135+
- **Choose Compartment**: Select the compartment in which you want the private endpoint to reside.
136+
- **Use this private endpoint for RAC databases**: Select this check box if you want to create a Database Management private endpoint for Oracle Database@Azures RAC databases.
137+
- **Virtual Cloud Network**: Select the VCN in which the Oracle Database@Azure can be accessed.
138+
- **Subnet**: Select a subnet within the selected VCN.
139+
- **Network Security Group**: Optionally, select an NSG
140+
- Click **Create Private Endpoint**.
141+
142+
## Task 4: (Optional) Add Security Rules to enable communications
143+
144+
- Add ingress and egress security rules to Security Lists or Network Security Groups (NSGs)
145+
- You must have the required permissions to add the ingress and egress rules to Security Lists or Network Security Groups (NSGs)
146+
- For databases running on RAC and Exadata Cloud Service, use SCAN IP for communicating with Database Management service
147+
148+
![Multicloud Security List Egress Configuration](./images/odaa-securitylistEgressConfig.png "Multicloud Security List Egress Configuration")
149+
150+
- Add stateful security rules to a Security List to enable communication between a Database Management private endpoint and Oracle Database@Azure in the same subnet in the VCN.
151+
- Ingress rule for the Oracle Database@Azure's VCN: The Oracle Database@Azure's VCN (on port 1521) can receive incoming traffic from the Database Management private IP address from any port.
152+
153+
![Multicloud Security List Ingress](./images/odaa-securitylistIngress.png "Multicloud Security List Ingress")
154+
155+
- Egress rule for the Database Management private endpoint: The Database Management private IP address (from any port) can send requests to the Oracle Database@Azure's VCN on port 1521.
156+
157+
![Multicloud Security List Egress](./images/odaa-securitylistEgress.png "Multicloud Security List Egress")
158+
159+
## Task 5: Enable Database Management Service for Oracle Database@Azure Databases
160+
161+
- Navigate to the **Oracle Database@Azure Exadata VM Cluster Details** page
162+
- Click the related Database to enable the **Database Management Service**
163+
- On the **Database details** page, find **Associated services** section and click **Enable for Database Management**.
164+
165+
![Multicloud Cloud Database](./images/odaa-cloud-db.png "Multicloud Cloud Database")
166+
167+
After the Enable Database Management page is redirected and fully loaded, verify the following database information on the page.
168+
- VM cluster
169+
- Database home
170+
- Database name
171+
- Service name
172+
- Protocol
173+
- Port
174+
175+
![Enable Multicloud Cloud Database](./images/odaa-enable-cloud-db1.png "Enable Multicloud Cloud Database")
176+
177+
Provide the credentials for the database connection
178+
- **Database username**: Enter dbsnmp
179+
- **User password secret**: Select the secret from the drop down menu
180+
- Click **Add policy** to create the policy for Database Management service to read the secret.
181+
- Select **Connection Mode**: select Private Endpoint from the drop-down menu
182+
- Select **Management options**: select Full management
183+
- Click **Enable Database Management**
184+
185+
![Enable Multicloud Cloud Database](./images/odaa-enable-cloud-db2.png "Enable Multicloud Cloud Database")
186+
187+
## Conclusion
188+
189+
In this lab, you learned the steps to enable **OCI Database Management Service** for **Oracle Database@Azure** to monitor the key performance and configuration metrics of the fleet of **Oracle Database@Azure** cloud databases. In addition, all the database performance and management tools such as **Performance Hub** and **AWR Explorer** are at your finger tips to support DBAs for their day to day database operations.
190+
191+
## Acknowledgements
192+
193+
- **Author** - Royce Fu, Master Principal Cloud Architect, North America Cloud Infrastructure Engineering
194+
- **Contributors** - Royce Fu, Derik Harlow, Murtaza Husain, Sriram Vrinda
195+
- **Last Updated By/Date** - Royce Fu, January 2025
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading
Loading

0 commit comments

Comments
 (0)