Posts

Showing posts from 2024

ORA-05031 error in Oracle Autonomous Database

  The ORA-05031 error in Oracle Autonomous Database indicates that the SGA (System Global Area) usage for a Pluggable Database (PDB) has exceeded its limit. This issue can arise due to resource constraints or misconfiguration and can significantly impact the performance of your database, especially during resource-intensive operations like Oracle Data Pump. Here are some steps to address and prevent this issue: mmediate Actions Check Resource Usage: Use the following query to monitor the SGA usage: SELECT NAME, VALUE / 1024 / 1024 AS VALUE_MB FROM V$SYSSTAT WHERE NAME IN ( 'session pga memory' , 'session pga memory max' , 'session uga memory' , 'session uga memory max' ); Verify if the SGA_TARGET or MEMORY_TARGET settings are close to the configured limits. Terminate Long-Running Sessions: Identify and terminate any runaway sessions or jobs that are consuming excessive resources: SELECT SID, SERIAL#, PROGRAM, STATUS, SQL_ID FROM V$SESSION W...

Upgrade Pluggable Database to Oracle Database 23ai

  Here’s a simplified way to upgrade your Oracle Database in OCI to Oracle Database 23c AI using a refreshable clone PDB and AutoUpgrade. Benefits of This Approach: Reduced Downtime: It minimizes downtime compared to an in-place upgrade. New Base Database System: You’ll get a new system with an updated OS and Oracle Grid Infrastructure version. You can use this approach for a Base Database Service, Exadata Database Service, Exadata Cloud@Customer, or any Oracle Database option. My Environment PDB to Upgrade: SALES Source: Version: 19.23.0 Name: DBS19 Target: Version: 23.4.0 Name: DBS23 Steps to Upgrade: 1. Prepare AutoUpgrade Download the latest version of AutoUpgrade from My Oracle Support. Copy it to both source and target systems, optionally placing it in $ORACLE_HOME/rdbms/admin . Create an AutoUpgrade config file ( sales.cfg ), and save it on both servers: global.autoupg_log_dir=/u01/app/oracle/cfgtoollogs/autoupgrade global.keystore=/u01/app/oracle/cfgtoollogs/keystore...

Key points on Read-Only Instance and Read-Only Database

 In Oracle, both Read-Only Instance and Read-Only Database provide mechanisms to limit data modifications, but they are used in different contexts and for different purposes. Here's a comparison: 1. Read-Only Instance Definition : A read-only instance is a configuration in Oracle Real Application Clusters (RAC) where one or more instances of a multi-instance database are set up to operate in read-only mode. This is typically done in environments with high concurrency for both read and write operations. Key Features : Allows real-time query scaling by dedicating specific instances to read-only operations. Write operations are not allowed on the designated read-only instance, but other instances in the cluster can still handle write operations. Useful in RAC configurations for load balancing , where read workloads can be distributed across multiple read-only instances. Instance-specific: The database remains fully functional (read-write) when accessed through other instances. Us...

Steps to create database link between Oracle database and SQL Server

 Creating a database link between SQL Server and Oracle allows seamless data exchange between the two systems. Here’s a step-by-step guide: Step 1: Install the Required Drivers Install Oracle Database Gateway for SQL Server (ODG4MS). This acts as a bridge between Oracle and SQL Server. Ensure the Oracle Client is installed on the Oracle database server or the server acting as the gateway. Step 2: Configure the Oracle Database Gateway Locate Configuration Files: Navigate to the $ORACLE_HOME/network/admin directory on the Oracle Gateway server. Edit tnsnames.ora: Add an entry for the database link pointing to the SQL Server database: dg4msql =   (DESCRIPTION =     (ADDRESS = (PROTOCOL = TCP)(HOST = <SQL_SERVER_HOSTNAME>)(PORT = 1521))     (CONNECT_DATA = (SID = dg4msql))     (HS=OK)  -- Required for heterogeneous services   )   Edit listener.ora: Update the Oracle listener configuration to recognize the gateway: SID_LIST_LISTENE...

OCI Wallets Features

 Oracle Database 23c, also known as Oracle Database 23c Free—Developer Release, marks significant advancements in database capabilities, particularly in areas of security, identity, and integration with AI technologies. Below is an overview of how Oracle Identity and Access Management (IAM) and Oracle Wallets are enhanced in this release, and their implications for AI-driven applications. 1. Oracle Identity and Access Management (IAM) IAM within Oracle Cloud Infrastructure (OCI) in the context of Oracle Database 23c continues to focus on robust identity controls, enabling streamlined access management while adhering to high security standards. Some key features include: Unified Identity Management : Oracle 23c ensures seamless integration with OCI’s IAM, allowing for a single point of management for user identities and database access. This helps in reducing complexity while maintaining strict access protocols. Granular Role Management : The database version extends support for mor...

What's New with Oracle Cloud Guard in OCI?

 Oracle Cloud Guard is a game-changer for securing your cloud environment. Here are the top 10 features to know: Automated Threat Detection : Cloud Guard continuously scans for potential security risks across your OCI resources, providing automated detection and alerting. Built-in Remediation : With preconfigured policies, Cloud Guard offers automated remediation actions to address security threats instantly. Comprehensive Visibility : Gain end-to-end visibility into your OCI environment with dashboards and reports, helping you monitor and track risks in real-time. Customizable Policies : Cloud Guard allows you to tailor security policies based on your organization’s unique compliance needs. Risk Scoring : Each resource is assigned a risk score, enabling you to prioritize the most critical threats for immediate action. Incident Response Automation : Automate responses to incidents using predefined rules, reducing manual intervention and response time. Integrations with Oracle Secur...

Identifying and Verifying a Domain in Oracle Cloud Infrastructure (OCI): Requirements and Implementation Steps

  Identifying and Verifying a Domain in Oracle Cloud Infrastructure (OCI): Requirements and Implementation Steps In Oracle Cloud Infrastructure (OCI), identifying and verifying a domain is essential for using various services such as DNS management, custom domain setup for applications, email services, and security features like SSL certificates. Verifying domain ownership ensures that you have legitimate control over the domain and helps with secure communication between your domain and OCI services. Below is a comprehensive guide covering the requirements and detailed implementation steps. Why You Need to Identify and Verify a Domain in OCI Custom Application Setup : You may need to map a custom domain (e.g., yourdomain.com ) to an OCI service like an Oracle Load Balancer, Web Application Firewall (WAF), or Object Storage static website hosting. Email Services : If you plan to use Oracle Cloud Email Delivery, domain ownership verification is required to send emails using a custom...

How to setup Dynamic Routing Gateway (DRG) in Oracle Cloud Infrastructure (OCI)

 To create a Dynamic Routing Gateway (DRG) in Oracle Cloud Infrastructure (OCI), follow these steps: 1. Access the OCI Console: Log in to your OCI account. Navigate to the Networking section from the main menu. 2. Create a DRG: Go to DRG: In the Networking section, click on Dynamic Routing Gateways . Create New DRG: Click Create Dynamic Routing Gateway . Enter a name for the DRG (e.g., "DRG for VCN1"). Optionally, provide a description for easier identification. Select the compartment where you want to create the DRG. Click Create DRG . 3. Attach DRG to a Virtual Cloud Network (VCN): After the DRG is created, attach it to a VCN. In the VCN section, choose the VCN to which you want to attach the DRG. Under the Resources tab, click Dynamic Routing Gateways . Select Attach DRG and choose the DRG you just created. Click Attach . 4. Configure Route Tables: Go to the Route Tables in the VCN. Add a route rule for the DRG. This ensures traffic is routed through the DRG for ex...

Oracle 23c AI RMAN New Features....

 Oracle 23c AI (also known as Oracle Database 23c: The Long-Term Release ) introduces several cutting-edge features, enhancements, and optimizations to RMAN (Recovery Manager), ensuring even more robust backup and recovery capabilities. RMAN remains an essential tool for Oracle DBAs, and with 23c, it becomes even more powerful, particularly with AI-assisted capabilities. Below are 10 new features in RMAN in Oracle 23c : 1. AI-Assisted Backup and Recovery Optimization Feature Overview : Oracle 23c introduces AI-driven algorithms that analyze system workload patterns, storage usage, and historical backup performance to optimize backup windows, schedules, and methods. The AI assistant learns from past recovery operations to suggest optimal backup strategies. Benefit : More efficient backups with minimal impact on production, and faster, more predictable recovery times based on learned behavior. 2. Automatic Block Repair with AI Feature Overview : This feature enhances RMAN’s block med...

To configure Google Cloud Platform (GCP) Interconnect and Oracle Cloud Infrastructure (OCI) FastConnect

    To configure Google Cloud Platform (GCP) Interconnect and Oracle Cloud Infrastructure (OCI) FastConnect , you need to establish a reliable, high-bandwidth connection between GCP and OCI for private communication. This connection can be achieved via Partner Interconnect for GCP and FastConnect for OCI. Below is a detailed step-by-step guide to set up GCP Interconnect with OCI FastConnect: 1. Understanding the Terminology a. Google Cloud Interconnect Google Cloud Interconnect offers two types of connections: Dedicated Interconnect : Physical connections between your on-premise infrastructure and GCP. Partner Interconnect : A private connection provided by GCP’s network partners to connect your on-prem infrastructure or other clouds to GCP. For GCP-to-OCI, Partner Interconnect is typically used since both clouds are involved. b. OCI FastConnect Oracle FastConnect provides a dedicated, private connectio...

How to Integrate Oracle Digital Assistance in Oracle VBCS

  Integrating Oracle Digital Assistant (ODA) with Oracle Visual Builder Cloud Service (VBCS) involves embedding the chatbot into a VBCS application. Here's a step-by-step guide: 1.  Create Oracle Digital Assistant (ODA) If you don’t have an Oracle Digital Assistant, create one using the ODA console. Train your chatbot with intents, entities, and skills. 2.  Enable Channel in Oracle Digital Assistant In ODA, go to  Settings  >  Channels . Create a new Web channel, where you will get the  Channel ID ,  URL , and  Secret Key . Make sure you configure it with the proper chatbot that you want to embed in your VBCS application. 3.  Embed ODA in VBCS Open your VBCS Application : In Oracle VBCS, go to the application where you want to integrate ODA. In the  Page Designer , open the page where you wish to include the chatbot. Add ODA as a Component : Add a new HTML component (or use a static HTML resource). In the HTML component, embed th...

How to encrypt plugged PDB inside a encrypted CDB

 Encrypting a plugged Pluggable Database (PDB) inside an encrypted Container Database (CDB) in Oracle involves using Transparent Data Encryption (TDE). The PDB you are plugging into an encrypted CDB will inherit the encryption settings of the CDB if done correctly. Below is a step-by-step guide on how to do this. Pre-requisites: Oracle Advanced Security : You need Oracle Advanced Security option (or the Oracle Database Vault option) to use Transparent Data Encryption (TDE). TDE Wallet Setup : Your CDB must already be encrypted, which means that TDE and the encryption wallet are configured at the CDB level. Steps to Encrypt a Plugged PDB Inside an Encrypted CDB: 1. Ensure the CDB is Encrypted : First, confirm that the CDB into which you are plugging the PDB is already encrypted and using TDE. Check Wallet Status : Connect to the CDB and run the following SQL query to check the TDE wallet status: SQL> SELECT * FROM v$encryption_wallet;   The wallet should show the status OPEN...

To reset the Multi-Factor Authentication (MFA) for your admin account in Oracle Cloud Infrastructure (OCI), follow these steps.

1. Access Oracle Cloud Console: Log in to the  OCI Console  with your admin credentials. 2. Navigate to Identity & Security: From the main OCI dashboard, go to the  “Identity & Security”  section. Under  Identity , select  “Users” . 3. Find Your Admin User: Search for your admin user account in the  Users  list. 4. Reset MFA: Once you’ve located the admin account, click on the  username  to open the user details. On the user’s details page, scroll down to the  “Multi-Factor Authentication”  section. There will be an option to  “Reset MFA”  or  “Remove Device” . Click  “Reset MFA”  to remove any previously configured MFA devices. 5. Reconfigure MFA: After resetting, you will need to reconfigure MFA when you log in again. OCI will prompt you to set up a new MFA device. 6. Follow the Instructions for Re-Enrollment: You will be asked to scan a new QR code using an authenticator app (like Google Auth...

Boost Your Cloud Security with Oracle Cloud Infrastructure (OCI) Identity Domains 🌐

In today’s digital landscape, security and identity management are top priorities for any cloud strategy. Oracle Cloud Infrastructure (OCI) Identity Domains bring cutting-edge features to help organizations manage users, access, and resources securely and efficiently. ✨ Key Features of OCI Identity Domains: Comprehensive Identity Management : OCI Identity Domains provide robust tools for managing user identities, authentication, and authorization across your OCI resources, ensuring secure and controlled access. Federated Authentication : Seamlessly integrate with external identity providers such as Azure AD, Okta, or others using industry standards like SAML and OAuth2, allowing for single sign-on (SSO) across platforms. Granular Access Control : With flexible access policies and fine-grained roles, you can enforce the principle of least privilege, giving users only the permissions they need to get their jobs done. Multi-Factor Authentication (MFA) : Strengthen security with built-in M...

mount an external NFS (Network File System) to Oracle Database as a Service (DBaaS)

  it is possible to mount an external NFS (Network File System) mount point to Oracle Database as a Service (DBaaS) to write data into it. However, there are specific steps and considerations to ensure that the NFS mount is correctly configured and integrated with DBaaS, including security, network configuration, and appropriate user permissions. Here’s an outline of the steps required to achieve this: 1.  Prepare the NFS Server Ensure the NFS server is configured and accessible from the DBaaS instance. The NFS server should export the directory with appropriate permissions. Example NFS export configuration on the server ( /etc/exports  file): /nfs_shared_dir 192.168.x.x(rw,sync,no_root_squash) Restart the NFS Services. sudo exportfs -ra 2.  Ensure Network Connectivity Ensure that the DBaaS instance can reach the NFS server. You may need to set up appropriate network security rules (e.g., in Oracle Cloud Infrastructure's (OCI) Virtual Cloud Network (VCN) security lis...