Oracle Cloud Infrastructure Architect by IP Specialist
Oracle Cloud Infrastructure Architect by IP Specialist
Document Control
Feedback:
If you have any comments regarding the quality of this book, or otherwise
alter it to better suit your needs, you can contact us through email at
info@ipspecialist.net
Please make sure to include the book’s title and ISBN in your message.
About IPSpecialist
IPSPECIALIST LTD. IS COMMITTED TO EXCELLENCE AND
DEDICATED TO YOUR SUCCESS.
Course Features:
v Self-Paced Learning
Learn at your own pace and in your own time
v Covers Complete Exam Blueprint
Prep-up for the exam with confidence
v Case Study Based Learning
Relate the content with real-life scenarios
v Subscriptions that Suits You
Get more and pay less with IPS subscriptions
v Career Advisory Services
Let the industry experts plan your career journey
v Virtual Labs to test your skills
With IPS vRacks, you can evaluate your exam preparations
v Practice Questions
Practice questions to measure your preparation standards
v On Request Digital Certification
On request digital certification from IPSpecialist LTD.
Abubakar Saeed
Abubakar Saeed has more than twenty-five years of experience managing,
consulting, designing, and implementing large-scale technology projects,
extensive experience heading ISP operations, solutions integration, heading
Product Development, Pre-sales, and Solution Design. Emphasizing adhering
to Project timelines and delivering as per customer expectations, he always
leads the project in the right direction with his innovative ideas and excellent
management skills.
Mehwish Jawed
Mehwish Jawed is working as a Senior Research Analyst. She holds a
Master's and Bachelors of Engineering degree in Telecommunication
Engineering from NED University of Engineering and Technology. She also
worked under the supervision of HEC Approved supervisor. She has more
than three published papers, including both conference and journal papers.
She has a great knowledge of TWDM Passive Optical Network (PON). She
also worked as a Project Engineer, Robotic Trainer in a private institute and
has research skills in the field of communication networks. She has both
technical knowledge and industry-sounding information, which she utilizes
effectively when needed. She also has expertise in cloud platforms, such as
AWS, GCP, Oracle, and Microsoft Azure.
Ayesha Shaikh
Ayesha Sheikh is a professional technical content writer. She holds a
Bachelor’s Degree in Computer Engineering from Sir Syed University of
Engineering & Technology. She has hands-on experience on SDN (Software
Defined Network), Java, .NET development, machine learning, PHP,
Artificial Intelligence, Python, and other programming and development
platforms, and Database Management Systems like SQL, Oracle, and so on.
She is an excellent research analyst and is capable of performing all her tasks
in a fast and efficient way.
Free Resources:
For Free Resources: Please visit our website and register to access your
desired Resources Or contact us at: helpdesk@ipspecialist.net
Career Report: This report is a step-by-step guide for a novice who wants to
develop his/her career in the field of computer networks. It answers the
following queries:
Our Products
Study Guides
IPSpecialist Study Guides are the ideal guides to developing the hands-on
skills necessary to pass the exam. Our Study Guides cover the official exam
blueprint and explain the technology with real-life case study-based labs. The
content covered in each Study Guide consists of individually focused
technology topics presented in an easy-to-follow, goal-oriented, step-by-step
approach. Every scenario features detailed breakdowns and thorough
verifications to help you completely understand the task and associated
technology.
We extensively used mind maps in our Study Guides to visually explain the
technology. Our Study Guides have become a widely used tool to learn and
remember information effectively.
vRacks
Our highly scalable and innovative virtualized lab platforms let you practice
the IPSpecialist Study Guide at your own time and your own place as per
your convenience.
Exam Cram
Our Exam Crams notes are a concise bundling of condensed notes of the
complete exam blueprint. It is an ideal and handy document to help you
remember the most important technology concepts related to the certification
exam.
Practice Questions
IP Specialists' Practice Questions are dedicatedly designed from a
certification exam perspective. The collection of these questions from our
Study Guides is prepared keeping the exam blueprint in mind, covering not
only important but necessary topics as well. It is an ideal document to
practice and revise your certification.
Content at a glance
Table of Contents
Chapter 07: Oracle Autonomous Database
Introduction
OCI Database Services
Advantages
VM DB Systems
Bare Metal DB System
Oracle RAC
Exadata DB System
MySQL Database Service DB System
Autonomous Database
Autonomous Database on Shared Exadata Infrastructure
Autonomous Database on Dedicated Exadata Infrastructure
Autonomous Database Administration
Automated Administration
Provision of an Autonomous Database
OCI Policies for Autonomous Dedicated
Service Lifecycle
Lab 7-01: Create an Autonomous Database
Introduction
Problem
Solution
Start and Stop Autonomous Database
Connecting to Autonomous Database
Autonomous Database Credentials
Wallet Management and Expiration
Predefined Services
Fully Elastic
Fully Managed
Connectivity Options
Events and Alarms
Events
Notification Service
Alarms
ADB Backups and Recovery
Securing Autonomous Database
Monitoring Autonomous Database
Performance Hub
Scaling
Auto Scaling
Move ADB to Another Compartment
Prerequisites
ADB Cloning
Full Clone
Metadata Clone
Oracle Data pump export from Oracle Database
Refreshable Clone
Managing Users
Create Users
Oracle Data Guard
Oracle Data Guard Configuration
Securing the Database System
MySQL Database System
MySQL Database Service
Ease of Use
Security
Fully Managed
In-Memory, Query Processing Engine
HeatWave Architecture
NoSQL on OCI
Configurable ACID
Extreme Availability Through Fault Containment Zones
MR Tables with Cross-Region Service
Security
Easy Online Elastic Expansion and Contraction
HTTP Access
Lab 7-02: Create an Autonomous Data Warehouse
Introduction
Problem
Solution
Mind Map
Practice Questions
Chapter 08: Design for Hybrid Cloud Architecture
Introduction
Software-Defined Data Center
OCVS Overview
VMware Software
Oracle Cloud Infrastructure
OCVS Product Overview
vSphere: The Hypervisor
vSAN: Software-Defined Storage
NXS-T: Software-Defined Networking and Security
HCX: Hybrid Cloud Extension
Use Cases, Key Benefits, and Values
Use Cases
Key Benefits
Core Aspect and Values
SDDC Deployment
SDDC Provisioning Flow
SDDC VLANs
Deploying a Highly Available SDDC
Design Hybrid Cloud
Connecting Between On-premises and OCVS
HCX Components
HCX Layer 2 Extension – Configuration
Mobility Optimized Networking (MON)
Migration with HCX
Use Cases for Hybrid Clouds
OCVS Network Topology
NSX-T Architecture Component
NSX-T Routing and Bridging
N-VDS – The Logical Switch
OCVS Network Architecture
Access to Microsoft Azure
Partnership Benefits
Common Use Cases
OCI-Azure Interconnect Setup
Lab 8-01: Access to Microsoft Azure
Introduction
Problem
Solution
Introduction to IPv6 with Oracle
Overview
Use Cases
Benefits
IPv4 and IPv6
IPv6 Addressing Model
IPv6 Plan in Cloud
Mind Map
Practice Questions
Chapter 09: Migrate On-Premises Workloads to OCI
Introduction
Planning Data Migration to OCI
Applications
Database
Regulatory Compliance
Storage
Networking
Business Critically
Deployment Environment Type
Disaster Recovery
Offline and Online Migration
Offline Transport – Data Transfer Service
Data Transfer Appliance
Data Transfer Disk
Data Transfer Appliance Specifications
How is Data Secure in Transit?
CLI for Appliance Transfer
How Data Transfer Works
Transporting VMs, Data, and Files to Oracle Cloud
Online Transport – Storage Gateway
Overview
Storage Gateway Service
Database Migration – Methods and Best Practices
Database Migrations
Core Use Cases
Differentiated Use Cases
Migration Types
OCI Database Migration – Use Cases
Oracle Solutions to Migrate Database to Oracle Cloud
Tools for All Steps of the Migration Process
Migration Steps – Direct Online Migration
Migration Steps – Indirect Offline Migration
Start Migration – Export Initial Load
Pricing
Migrating to Autonomous Database
Migration Options and Considerations
Migration to Autonomous Database
Migration Methods
Loading and Import Options to ADB
ADB APIs for Object Store Access
Autonomous Database Packages
Using Oracle Object Store Staging
ADB Statistics and Hints for Data Being Loaded
ADW: Managing DML Performance and Compression
Database Migration Service
Database Migration Terminology
Migrating Using Data Pump
Export an Existing Oracle Database to Import into ADB
Import Data Using Oracle Data Pump
Access Log Files for Data Pump Import
Zero Downtime Migration
Introduction
Architecture
Database Support and Supported Configuration
Benefits
ZDM - Enhancement
Migration from AWS RDS to Oracle ADB
Migration from Solaris & AIX based Source Database
Direct Data Transfer Support for Physical Migration
Existing RMAN Backup usage as Migration Source
ZMD - Methodologies
Mind Map
Practice Questions
Chapter 10: Design for Security and Compliance
Introduction
IAM – Federation
General Concept
User Group Mapping
Users Type
Understanding Sign-in Options
Oracle Identity Cloud Service IDCS
IAM Service
When to Use OCI IAM and IDCS
Lab 10-01: Federation
Introduction
Problem
Solution
Web Application Firewall
Introduction
What is meant by WAF?
WAF Concepts
Benefits
Features
Use Cases
Challenges and Whitelisting Capabilities
WAF Architecture
WAF Point of Presence (PoPs)
Shared Responsibility Model for WAF
Lab 10-02: Working with WAF Policy
Introduction
Problem
Solution
Mind Map
Practice Questions
Chapter 11: Real-World Architecture
Introduction
OCI Architecture Overview
OCI Architecture
Introduction
Component of OCI Architecture
OCI best Practices
Hub-Spoke Architecture
Introduction
Architecture
HPC Architecture
Introduction
Architecture
Components
Considerations
Mind Map
Practice Questions
Answers
Chapter 07: Oracle Autonomous Database
Chapter 08: Design for Hybrid Cloud Architecture
Chapter 09: Migrate On-Premises Workloads to OCI
Chapter 10: Design for Security and Compliance
Chapter 11: Real-World Architecture
Acronyms
References
About Our Products
About Oracle Certifications
The Oracle Certification Program certifies applicants on Oracle product and
technology skills and knowledge.
Depending on the degree of certification, credentials are awarded based on a
combination of completing tests, training, and performance-based
assignments. Oracle certifications are measurable indicators of experience
and skill that, according to Oracle, can help a candidate stand out among
employers.
This exam measures your ability to accomplish the following technical tasks:
Plan and design solutions in Oracle Cloud Infrastructure (OCI)
Implement and operate solutions in OCI
Design, implement and operate databases in OCI
Design for hybrid cloud architecture
Migrate on-premises workloads to OCI
Design for Security and Compliance
Recommended Knowledge
Plan and design solutions to meet business and technical requirements
Create architecture patterns including N-tier applications,
microservices, and serverless architectures
Design scalable and elastic solutions for high availability and disaster
recovery
Implement solutions to meet business and technical requirements
Operate and troubleshoot solutions on OCI
Conduct Monitoring, observability and alerting in OCI
Manage infrastructure using OCI CLI, APIs and SDKs
Evaluate and implement databases
Operate and troubleshoot databases
Design and implement hybrid network architectures to meet high
availability, bandwidth and latency requirements
Evaluate multi-cloud solution architectures
Design strategy for migrating on-premises workloads to OCI
Implement and troubleshoot database migrations
Design, implement and operate solutions for security and governance
Design, implement and operate solutions to meet compliance
requirements
To be eligible for this certification, you must have already completed the
Associate level. An Oracle Cloud Infrastructure 2021 Certified Architect
Professional (1z0-997-21) has demonstrated the skills and knowledge needed
to plan, design, deploy, and maintain systems on OCI.
All the required information is included in this course:
Domain
Domain 1 Plan and design solutions in Oracle Cloud Infrastructure
(OCI)
Introduction
In this chapter, you will learn about the benefits, features, and capabilities
provided by Oracle Database.
Oracle database offerings include in-memory, NoSQL, and MySQL
databases. It also includes cost-optimized and high-performance versions of
Oracle Database, the world's premier convergent, multi-model database
management system. Customers may simplify relational database
environments and minimize management tasks using Oracle Autonomous
Database, which is accessible on-premises via Oracle Cloud@Customer or in
the Oracle Cloud Infrastructure.
Local Storage
Backups are stored in the Fast Recovery Area of the DB System locally
Durability: Low
Availability: Medium
Back-up and Recovery Rate: High
Advantages: Optimized backup and fast point-in-time recovery
Disadvantages: Backup is unavailable when DB System becomes
available
DB System DR
Database DR can be implemented using Oracle Active Data Guard and
Oracle GoldenGate.
Active Data Guard is a simple and cost-effective solution for Oracle
Database data security and availability. While replication is running, it
maintains an exact physical clone of the production copy at a remote
and open read-only site.
Oracle GoldenGate is a multi-master replication, hub and spoke
deployment, and data transformation product. GoldenGate offers
customers a variety of choices for dealing with a wide range of
replication needs, including heterogeneous hardware platforms.
EXAM TIP: Both ATP and ADW share the Autonomous Database
platform. The difference is how the service is optimized within the
database.
Autonomous Data Warehouse Autonomous Transaction
Processing
Data is stored in columnar format Data is stored in row format
For query optimization for analytics, In a transaction processing system,
data summaries are used. ADW you can automatically detect any
automatically parallelizes the query missing indexes to help process the
execution to access a large volume data most efficiently.
of data in a short amount of time.
Provides the ability to achieve The data is added using more
optimum execution plan by traditional insert statements or
gathering the statistics as part of all update statements.
the bulk load activities
Table 7-02: ADW vs. ATP
Benefits
Dedicated infrastructure provides complete isolation from other
tenants.
It provides an opportunity to customize the operational policies, such as
the software update schedule, availability, and density, so that you can
match your business requirements.
Autonomous Dedicated Workloads Isolation
Once the dedicated Exadata infrastructure is provisioned, the administrator
can then partition the system into multiple levels:
Databases
Container Databases (CDB)
VM Cluster
Secure isolation zone within the public cloud
Separated hardware (Exadata infrastructure)
One can have the desired number of cluster or container databases. Each
container database can have multiple update strategies, backup retention
availability, and density. By default, only one container database is
necessary, and all user-created databases will be provisioned within that
container. They will inherit the update strategy backup retention of the
container. The network path is through a VCN, and the subnet is defined by
the Exadata infrastructure hosing the database. By default, this subnet is
defined as private, and there is no public internet access to those databases.
This only ensures that your company can access the Exadata infrastructure
and database.
Autonomous Management Model
With Oracle Autonomous Database Dedicated management model,
customers are only responsible for their data, schemas, and encryption keys.
Oracle automatically manages the database hypervisor, operating system, and
hardware. This allows customers to focus on what is important to them and
allows Oracle to own any issue, whether that is patching the database or
hardware.
Figure 7-06: Autonomous Management Model
Dedicated – DBAs
Database Administrator (DBA) create, monitor, and manage Autonomous
Database. Both ADB and DBA need to have an Oracle Cloud account or be
Oracle Cloud users. Those accounts need to have the necessary permissions
in order to create and access:
Autonomous Database
Autonomous Backups
Autonomous Container Database
While creating an Autonomous database, administrators will define and gain
access to an admin user account inside the database. Through this account,
they will get the necessary permissions to be able to create and control
database users.
Dedicated – Developers and Users
Database users and developers who write applications using or accessing an
autonomous database do not need Oracle Cloud accounts. They will be given
the network connectivity and authorization information they need to access
those databases by the database administrators.
Service Lifecycle
You can manage the lifecycle of an Autonomous dedicated service through
the Cloud UI, Command-Line Interface, REST APIs, or through one of the
several language SDKs. The lifecycle operations that you can manage
include:
Capacity planning and setup
Provisioning and partitioning of Exadata Infrastructure
The provisioning and management of databases
The scaling of CPU storage and other resources
The scheduling of updates for the infrastructure
The VMs and the databases
Monitoring through event notifications
Figure 7-15: Service Lifecycle
23. Choose the Allow secure access from everywhere access type.
24. Choose license type.
25. Click on Create Autonomous Database to deploy the database with
these settings.
Note: The provisioning process is very simple to follow and creates a
simple, self-contained, self-secure, self-managing, and scalable
Autonomous database.
Step 03: Connect to Autonomous Database Using SQL Developer
26. Click on the Service Console option from the overview page.
27. From the left-hand side given menu, click on Administration.
28. Click on Download Client Credential (Wallet).
29. Define your Password and confirm it.
30. Click on Download.
31. The wallet will download. Save the downloaded file to a specified
location.
32. After that, open SQL developer and click on a new connection.
33. Specify connection name.
34. Write the same username and password that you used for the
creation.
35. Select Cloud Wallet as Connection Type.
36. Click on Browse to locate the file.
37. Select the file from the downloaded section and click on Open.
38. Select Service name and click on Test.
39. After testing, save the connection.
40. Click on Connect.
41. For confirmation, write username and password and click on OK.
42. In SQL Developer, run the following query with the recently created
connection:
select /* low */ c_city,c_region,count(*)
from ssb.customer c_low
group by c_city,c_region
order by count(*);
43. Note the response from the output.
44. Now, create another connection.
45. Enter the same detail with a different name.
46. Test the connection and save it.
49. After creation of a new connection, run the following query in SQL
Developer:
select /* high */ c_city,c_region,count(*)
from ssb.customer c_high
group by c_city,c_region
order by count(*);
EXAM TIP: Oracle provides you the ability to start and stop your
database with a few clicks very effectively. You can also invoke REST
services to perform automated operations like start and stop ADB.
Types of Wallet
For Autonomous Database shared provides either:
Instance wallet
Regional wallet
Instance Wallet – The instance wallet contains only the credentials and keys
for the individual Autonomous Database being provisioned.
Regional Wallet – The regional wallet contains the credentials and keys for
all the Autonomous Databases in a specified region. A regional wallet should
only be used for used by database administrators.
In the case of an Autonomous Database dedicated, the wallet file only
contains the credentials and keys for a single Autonomous Database. There is
no regional file.
Predefined Services
The database has an additional two different service names. You should make
sure that the users connecting to the resources or database have a specific
amount of resources. To assist that, a predefined service for connection to the
Autonomous Database.
Predefined Database Service Names
TPURGENT - It is the highest priority application connection service
designed for time-critical transaction processing operations. This connection
service does support manual parallelism.
TP – It is an application connection for transaction processing operations.
This particular connection service does not run with parallelism.
High database service – It provides the highest level of resources for each
SQL, resulting in high performance. However, because of that, it supports a
fewer number of concurrent SQL statements. Any SQL statements in the
service can use all the SQL or, in this case, the CPU and the I/O resources.
Therefore, in this scenario, the number of concurrent SQL statements that can
run in the service is three. The number is independent of the number of CPUs
in the database.
Medium database service – This provides a lower level of resources than
the high for each SQL statement, potentially resulting in a lower level of
performance than high. However, it supports more concurrent SQL
statements. The number of concurrent SQL statements that can run into the
service depends on a factor. The factor is the number of CPUs in the database
and the scales with the number of CPUs.
Low database service – It provides the least level of resources for each SQL
statement. However, it supports the most concurrent SQL statements. The
number of concurrent SQL statements that can run into service is twice the
CPU in the database.
Benefits of Predefined Services
Predefined services minimize application impact. With 16 OCPUs, you
would get the following number of concurrent queries before queuing would
kick in:
3 concurrent queries à High
20 concurrent queries à Medium
32 concurrent queries à Low
Maintenance proactively drains services during maintenance. TP services
have a five minutes drain, and batch has a one-hour drain. Applications
connect to a predefined database service to control relative priority, SQL
parallelism maximum concurrency executing users.
For example, most all TP applications connect to the TP service, and most
batch to the low service.
Fully Elastic
The Autonomous Database is a fully elastic service, with complete elastic
service for both manual scaling and autoscaling.
When you first start working with the autonomous database, you need to find
the number of CPUs and the number of storage. If you used to share, Oracle
provides one CPU and one TB of storage. At any time, you can scale up or
down the CPU and storage capacity.
Now, when you make any resource changes for your Autonomous database,
the database resources will automatically shrink or grow without any
downtime or service interruption.
This capability is very helpful, especially when you need to keep your
business running and have the database scale to your workload needs.
Due to the scalability feature, you are not constrained by fixed building
blocks or predefined shapes. You can scale on-demand because there are
times you may need to have it to be immediately reflected.
Fully Managed
The Oracle automatically provides end-to-end management of the
Autonomous Database. Provisioning a new database, growing and shrinking
the resources, compute and storage, and applying patches ensure that you are
secured and have the latest and greatest version.
You want to manage the number of resources you allow your users to have
when processing transactions on the database. You can do this from the
database administration, where you can set your resource management rules
and then define what is required to connect.
Figure 7-19: Set Resources
Connectivity Options
You can connect the Oracle Autonomous Database through SQL*Net, JBDC
(thick), OBDC (which leverages Oracle Call Interface), or JBDC (thin)
process.
JBDC thin connections use 12.1 and 12.2 thin drivers and Java key store,
defined in the JKS connection property.
JDBC and ODBC use Oracle Client Interface calls and tools like SQL*Net,
and Data Pump uses it to communicate with the database. All connections use
SSL for encryption, and no unsecured connections are allowed to the
Autonomous Database. This is why clients require a security credentials
wallet to connect.
From the console, navigate to Identity à select the Users Panel à select
Add Public Key
There are two connectivity options to establish a connection to the
Autonomous Database. One option is through the public internet directly, and
the other is using Oracle’s FastConnect service with public peering. The
second option provides private connections from on-premises networks.
Oracle Cloud offers the Oracle Cloud Infrastructure (OCI) Service Gateway,
which offers private access to Oracle services deployed in the Oracle service
network. This allows for additional levels of privacy and obfuscation for
customers who require complete network isolation and private security.
Public Internet
To review the options of establish the connectivity to an Autonomous
Database, the example is given as shown in Figure 7-21. In the given
example, a connection is established through the public internet between a
customer’s on-premises network and the Oracle Datacenter through a public
internet connection using SSL encryption. To access the Autonomous
Database from behind the firewall, the firewall must permit the use of the
port specified in the database connection when connecting to the servers in
the connection. The default port number for Autonomous Data Warehouse is
1522.
Figure 7-21: Connectivity via Public Internet
Scaling
The Autonomous Database allows you to scale up and down both OCPUs
and storage and allows you to do this independently of the other. Therefore,
you can scale up your OCPUs without touching your storage and scale it back
down, which you can do the same with storage.
In addition to that, you can also set up auto-scaling. The database will
automatically do scaling when it detects the need and scale up to 3 times the
base level number of CPUs that you have allocated or provisioned for the
Autonomous Database.
Auto Scaling
The Autonomous Database continuously and autonomously monitors the
overall system performance. It is able to adapt to meet the requirements of
your business workloads. Suppose the workload requires additional CPU
resources to perhaps meet a business goal. In that case, the Autonomous
Database is able to dynamically adapt and increase the number of CPUs to
meet that requirement.
The Autonomous Database is able to scale the number of CPUs that are
available to you up to three times your pre-defined baseline. When you create
an Autonomous Database instance, auto-scaling is enabled by default.
Although, you can manually or explicitly disable it, either when provisioning
or later through the Oracle Cloud Infrastructure console or ADB service
console.
The database can consume up to three times more CPU and IO resources with
auto-scaling enabled than the number of OCPUs currently displayed in the
Scale-Up/Down box. When auto-scaling is enabled, the database will utilize
additional CPU and IO resources if your workload necessitates them without
requiring any direct action.
Billing Scenario # 2
When the Autonomous Database is active with 4 OCPUs and auto-scaling is
enabled, the workload will not do anything too heavy-duty. Over the span of
an hour, the database has actually gone ahead and consumed additional
OCPUs to meet the business requirements. That additional capacity will
resolve the requirements. In this case, after 30 minutes, the active number of
OCPUs will become 8. The number of OCPUs will decrease when it no
longer meets the required workloads.
Note: Scaling up to three times the number of OCPUs does not exactly
equal three times; it could be based on the required workloads.
In this case, the average OCPU consumption over the period of an hour was
only 6 OCPUs.
ADB Cloning
With all the powerful features of the Autonomous database, the database
provides cloning where you can choose to clone either a full database or the
database metadata. This clone can be taken from a live-running autonomous
database or a backup.
In a full clone, you will create a new database with the source data and
the metadata
The metadata clone will create a new database with the source database
metadata but without the data. Therefore, this is perfect for getting a
template or a frame of it
There is another option available called “refreshable clone.” This option is a
read-only clone that stays connected to the actual source.
EXAM TIP: A full clone feature contains the data and metadata, whereas
a refresh feature is the one where you do have the data but is read-only.
However, it will keep current with the changes that are on the original, the
master database.
Full Clone
When creating a full clone, the minimum storage you can specify is the
source database actual used space rounded to the next TB.
You can clone the autonomous database only when it is only in the same
tenancy and the same region as the source database. The optimizer’s statistics
are copied from the source to the clone database during the provisioning of
either full or a metadata clone. This way, you still have all the optimizer’s
statistics in the table of the clone. This will be perfect when you are trying to
load data into the table if behaving the same way as the table statistics that
already exist.
Metadata Clone
Metadata clone creates a new database with all of the source database's
schema metadata but no data.
Note: The Autonomous Database can be configured to use private
endpoints by cloning from an existing Autonomous Database with the
public endpoint.
Oracle Data pump export from Oracle Database
The Oracle database pump can now perform exports from your Autonomous
database, create the dump files, and have that dump file written directly into
the Object Cloud Storage.
The Oracle database pump supports the export into the object storage,
allowing you to migrate data from services you manage in the Oracle
Autonomous database.
Refreshable Clone
The considerable point for the refreshable clone is that the task of keeping
that refreshable clone in sync with the source database is handled by the
administrator. The administrator will be responsible for performing that sync
operation. Performing an operation requires few clicks, and it is an automated
process from the database console.
It is also very important to consider that the refreshable clone can trail the
source database or Autonomous source database for up to 7 days. After that
time, the refreshable clone, if it has not been refreshed or kept in sync with
the source database, will become a standalone read-only copy of that original
source database.
Managing Users
When you provision an Autonomous Database for the first time, the admin
user is already pre-created for you, and you would have provided that
password when you created the database. After that, you can create additional
users either as end-users who have access to the database or your application
to use the database.
Creating and managing the users is a very easy task with the Autonomous
Database. Oracle simplifies the task by creating a Data Warehouse Role
(DWROLE) for developers and data warehouse users. The role is very easy
to use; it simplifies a password, and that password adheres to Oracle’s
password complexity rules (available for 365 days). DWROLE includes the
basic privileges that are required for a developer, a data warehouse user,
analyst, etc., to use the database with the issue.
Create Users
The provisioning of users is very straightforward; there is no need to specify
the default tablespace, temporary tablespaces, etc. The creation process
requires creating a username, identified by a password, and then specifying
the privilege of the DWROLE to be assigned to that user.
This all can be done by regular client utility. However, if you do not have a
client utility to connect to the database, then this can be done using the
database action console or the SQL Developer web screen. The example
script required to create s user is shown below:
SQL> create user ocitest identified by P#ssw0rd12##;
User OCITEST created.
SQL> Grant dwrole to ocitest;
Grant succeeded.
Once you have got the database in provision state, you may need to change
the admin user's password, which could be done through regular client tools.
However, the alternative option is also available through the console.
Key Capabilities
Disaster recovery - Oracle Data Guard automates the management of one or
more synchronized copies of a live database, ensuring that no data is lost in
the event of a primary database outage.
In-memory database replication - In-memory redo replication assures that
duplicated data blocks are isolated from underlying corruption such as disc
corruption and provides automatic complete validation.
Protection flexibility - Data Guard offers three alternative protection options
for data replication, allowing you to strike a balance between data loss
prevention and performance.
Real-time query and DML offload - Real-time query and data manipulation
language leverages the standby database for queries, reports, and occasional
updates without affecting the primary database.
Note: Oracle realizes that the data is the organization’s most valuable asset.
The use of advanced security features can also help you meet the industry,
customer, and company’s regulatory compliance requirements. For
example, the General Data Protection Regulation (GDPR) that addresses the
transfer of personal data, the Payment Card Industry (PCI) mandates credit
card companies to help ensure credit card transaction security, and a federal
law called the Health Insurance Probability and Accountability (HIPAA)
that requires the creation of standards to protect sensitive patient health
information data from being disclosed without the patient’s consent or
knowledge.
Fully Managed
MySQL database service is a fully managed database service.
User Responsibility
The user responsibility in MySQL database service includes logical schema
modeling (your design, object, column, data, structure, te query design, and
optimization). The user could access the data in terms of query defining the
data access and retention policies, like the backup retention policy that
defines backup, where it should reside, and for how long it should be
archived.
Oracle Responsibility
The MySQL team is responsible for providing automation for the OS
installation, the database, and the operating system patching, including the
security patches performing the backup and recovery. It can also monitor and
define the logs of all of the information running in the environment, the
security with advanced options available with MySQL Enterprise Edition,
and protect the datacenter that is hosting the cloud service.
An example is shown in Figure 7-28: a user has a tenancy and manages the
policies to access the service and create the cloud resources, such as the
compute instance. You can find the group of users who share a common
access with specific privileges to the software instance. The MySQL team has
internal tenancies access that is not visible to the users. This is where the
actual database resides. Users can access the MySQL database service with
the web console Command Line Interface (CLI) or SDK to interact with the
internal control plane. This addresses the MySQL instance and lifecycles,
such as provisioning a new MySQL service instance or protecting the
database by backing it up. MySQL database instances are grouped in the
database system; therefore, an endpoint will show your tenancy when you
create a database system. When you use MySQL protocol to connect, you
will connect to the endpoint.
Figure 7-28: ADB – Fully Managed Service
NoSQL on OCI
This section will define how the database transactions are processed in
NoSQL database service for consistency and durability, how to achieve high
availability and implement the fault containment zones, how to use multi-
region tables to collaborate with others and similar data across regions,
security features, and how to allocate the storage in NoSQL environment.
Configurable ACID
The database transaction in NoSQL is often described in terms of ACID
properties. ACID stands for Automic, Consistency, Isolation, and Durability.
ACID principles ensure database transactions are processed reliably.
Atomicity
Either all or none of the tasks in a transaction are completed. There is no such
thing as a partial transaction. For example, if a transaction begins updating
100 rows but fails after 20 updates, the database will roll back the
modifications to these 20 rows.
Consistency
This refers to maintaining the data integrity constraints. In a consistent
transaction, you will not violate the database role’s integrity constraints
placed on the data.
Isolation
Isolation is considered serializable, meaning that each transaction is in a
distinct order without any transaction occurring in tandem. Any reads and
writes performed on the database will not be impacted by the other reads or
writes of separate transactions that are occurring on the same database.
Therefore, no transaction will affect others.
Durability
It ensures that changes made to the database are successfully committed and
will survive permanently, even in the case of system failure. Therefore, the
written data should never be lost.
When you consider the principles of ACID, you will determine how you
would configure the NoSQL database.
Extreme Availability Through Fault Containment Zones
A way to achieve high availability or extreme availability is by implementing
or addressing the fault containment zones. A zone is a physical location that
supports high-capacity network connectivity between the storage nodes. Each
zone has the same level of physical separation from other zones, such as its
power, communication, connection, etc. When configuring your store, it is
strongly recommended that you configure your store across multiple zones.
Having multiple zones provides that fault isolation increases data availability
if a single zone encounters a failure.
MR Tables with Cross-Region Service
Oracle NoSQL Database provides a multi-region architecture that enables
you to create tables in multiple key-value store clusters and maintain
consistent data across these clusters.
Suppose you wish to collaborate with similar data across regions. In that
case, you will need to create tables that can span across multiple regions and
keep them updated with the inputs of all the participating regions. In that
case, you need a multi-region table (MR tables), which is present across
region services. It is a global logical table that is stored and maintained in
different regions. It is a read and write anywhere table that lives in multiple
regions. All multiple region tables defined in those regions are synchronized
using a NoSQL stream. Each region must be running a cross-region service
that can pull the data from the subscribe table in the remote regions.
Security
There are many features available to protect your data.
AES 256
This feature will protect your data at rest as well in motion. The data at rest is
stored in the cloud environment.
Data in motion is protected when the data is being transmitted or processed
on the network.
Roles, privilege, and groups
Oracle provides resources or accesses to your table and namespace in NoSQL
through roles and privileges.
Configurable password rules
You can configure your password rules containing a specific number of
characters, uppercase, lowercase, minimum length, and maximum length.
Pluggable Authentication
You can take help and advantage of pluggable authentication, including
Active Directory or Kerberos.
Auditing
The ability to know what is happening can be done through auditing. The
auditing feature will provide you with many tools and resources to easily
view the NoSQL environment's activities.
Easy Online Elastic Expansion and Contraction
As your business grows, more storage is required. Oracle provides you with
an easy way to expand, extend, and scale your storage. You can plan and
deploy more zones and then create a pool of your storage. After that, you will
add capacity to the new topology.
For example, you can clone the topology or redistribute the topology and then
deploy the new topology.
Figure 7-30: Expansion and Contraction
HTTP Access
To provide the extra layer of security to ensure who can have access and who
cannot, Oracle provides you with a way to have a single open port. An
example is shown in Figure 7-31. The HTTPS port for the proxy machine
will be used by the proxy to accept secure connections from HTTPS requests.
A single port is left open by the firewall rules to allow connections between
the proxy and the driver. As shown in the figure, multiple types of drivers are
available, including JAVA, Python, or node driver.
26. Under the Administration section of the current user, click on Edit to
Enable REST.
27. Click on SQL to open the worksheet and create a table with rows and
columns.
28. Execute the SQL statements and verify the result from Logs.
Mind Map
Figure 7-32: Mind Map
Practice Questions
1. Which of the following database options is used in HeatWave?
A. Autonomous Data Warehouse
B. Oracle RAC
C. NoSQL Database
D. MySQL Database System
2. Which of the following services eliminates the step of manual
administrative tasks?
A. Autonomous Data Warehouse
B. VM DB System
C. Oracle RAC
D. Oracle Database
3. Which of the following is used to describe the database transaction in the
MySQL database?
A. Automatic, Control, Independent, Dedicated
B. Alternative, Constant, Irreversible, Dual
C. Automatic, Consistent, Isolation, Durability
D. None of the Above
4. Which of the following service is fully managed and provide a pre-
configured database environment?
A. Oracle RAC
B. Autonomous Database
C. VM DB System
D. Bare Metal DB system
5. The Oracle Database allows to reduce operation cost up to _________.
A. 90%
B. 80%
C. 84%
D. 76%
6. Which of the following provisions can be used to ensure high availability
when using NoSQL in OCI?
A. Nearest Region
B. Fault containment zone
C. Availability Domain
D. None of the above
7. Which of the following database service is used to store enterprise data?
A. Bare Metal DB
B. VM DB
C. NoSQL
D. MySQL
8. How many deployment options are there for Autonomous databases?
A. Four
B. Five
C. Three
D. Two
9. Which of the following feature of the Oracle database makes compliance
easier and faster?
A. Security
B. Cost
C. Flexibility
D. Scalability
10. Which of the following provides a way of separate transaction
processes on the same database?
A. Consistency
B. Durability
C. Automation
D. Isolation
11. Which of the following database can be utilized for business
objectives other than disaster recovery?
A. Primary Database
B. Logical Standby Database
C. Physical Standby Database
D. All of the Above
12. Which of the following allows the database customers to use their
existing license in OCI?
A. BYOL
B. BYOSL
C. PL
D. None of the above
13. The databases created by Autonomous database allow you to handle
____________.
A. Backup
B. Patching
C. Upgrade
D. Tuning
E. All of the Above
14. Which of the following database services provides customers with
optimized capabilities for enterprise-level databases and their associated
workloads?
A. VM DB System
B. Exadata DB System
C. Oracle RAC
D. Bare Metal DB System
15. Which of the following is necessary to use the dedicated fleet
administrator policy?
A. Physical Database
B. Azure User
C. OCI User
D. Events and Alarms Setup
Chapter 08: Design for Hybrid Cloud Architecture
Introduction
This chapter focuses on designing hybrid cloud architecture using the Oracle
Cloud VMware Solution (OCVS). OCVS is an integrated solution developed
from a partnership between Oracle and VMware. It enables you to run a
VMware software-defined data center natively hosted under Oracle Cloud
Infrastructure (OCI). Oracle and VMware have partnered to develop that
solution and provide technical support at different TL levels.
There is also a wide range of capabilities, such as native integration to Oracle
cloud services, including other use cases like databases and applications
deployed on the top of the VMware SDDC to achieve some of its benefits.
Software-Defined Data Center
Primarily, three building blocks form a physical data center.
Compute – includes server
Network – used for switching, routing security, etc.
Storage – used for storing data
In most cases, the compute servers will be running a hypervisor. This means
that you can run several virtual machines overriding the limitations of a
physical server.
SDDC is a concept that extends this virtualization to all of the resources in a
data center, whether it could be a storage array or network. Everything is
fully software-defined and makes it an abstraction layer of resources, forming
a platform of multiple virtual datacenters delivered as a service.
To better control the resource allocation and consumption, you can share
SDDC between the application workloads. There is no longer a one-to-end
dependency on a physical resource. Therefore, this grouping allows you to
over-subscribe, which means you can maximize a resource several times.
SDDC capitalizes on agility, elasticity, and scalability. One of the top
advantages of being software-defined is automation. For example, it could be
automating some of the key functions like creating a compute resource or
operational management, including monitoring the usage of a resource or
taking appropriate action with adding or deleting resources, all in an
automated way.
SDDC provides a high degree of flexibility because the workloads operate
independently; you can deliver an SDDC on a flexible mix of private and
hybrid clouds like OCVS.
Since there is no interdependency, this provides the environment to be
portable and provides capabilities to seamlessly integrate new applications,
which makes SDDC a modernized platform.
VM Cloud Foundation (VCF) is an industry-leading product from VMware
which incorporates compute, storage, and networks while delivering a highly-
reliable, scalable SDDC platform.
OCVS Overview
Oracle Cloud VMware Solution comprises some of the core components of
VMware Cloud Foundation, vSphere, NSX, and vSAN. With this integration,
you can achieve many features, like optimizing east-west traffic, load
balancing your workloads, or storage services like rate protection,
deduplication, compression, etc.
VMware Software
All the software products together provide a proven certified
architecture. The product stack includes vSphere Enterprise Plus. The
versions are interoperable between products, and you can choose to
deploy the latest 7.0 update 2 or 6.5, or 6.7 updates in three versions
NST Enterprise Plus version 3.1.2 and vSAN are also a part of the
deployment process. vSAN is not a separate appliance, and therefore
vSAN version is tied to the version of vSphere deployed
HXC is a key product that brings the service into an actual hybrid cloud
model. There are two license solutions for HCX, the Advanced and
Enterprise
HXC Advanced is a free edition included while enabling the service
HXC Enterprise is an upgrade
Oracle Cloud Infrastructure
The Bare Metal used are Dense IO 2.52 servers; high-performance compute
configurations. You need to choose a minimum of three nodes for production
purposes. This cluster would give you 156 OCPUs, approximately 2 TB of
memory, and 153 TB of NVME SSD drives for vSAN data stores. You
always have the option to add more nodes to the clusters.
vSphere Cluster
A vSphere cluster is a group of ESXi nodes that partitions and aggregates the
compute resources in a distributed manner.
For example, the distributed virtual switch is logically created using all the
network adapters and uplinks from the ESXi host to maintain a consistent
network configuration.
The VMs deployed in a cluster share CPU, memory, data store, and network
resources. However, at the same time, vSphere has some intelligent resource
management techniques to reclaim the resources and provide the in-demand
VMs.
There are two primary features of the vSphere cluster.
High Availability (HA) – vSphere provides high availability for virtual
machines within the cluster. If a host within the cluster fails, the VM
residing on that host is restarted on another host in the same cluster.
Distributed Resource Scheduler (DRS) – vSphere DRS is a
distributed resource scheduling mechanism that spreads the virtual
machine workloads across vSphere hosts and monitors the available
resources.
You can set VMs to live to migrate manually or automatically to other hosts
with less resource consumption based on the automation level.
vMotion - vMotion is the live migration of a running virtual machine from
one physical server to another without downtime. The virtual machine retains
its network identity and connections.
Storage vMotion – With storage vMotion, you can migrate a virtual machine
and disk files from one datastore to another while the virtual machine is
running.
In Oracle Cloud VMware Solutions, the minimum number of hosts required
is 3, and the maximum is 64 for all your production purposes.
Using the vSphere 7.0 update, two or newer versions introduce a new feature
called the vSphere Cluster Service (vCLS). The vCLS feature is enabled by
default and runs on all vSphere clusters. vCLS ensures that if the vCenter
becomes unavailable, the cluster service like DRS and HA remains available
to maintain the resources and health of the workloads running in those
clusters.
vCLS uses agent virtual machines to maintain the cluster service holds. The
vCLS VMs are created when you provision in the SDDC stack.
There are three vCLS VMs deployed that are required to run on each vSphere
cluster. vSphere DRS in a DRS-enabled cluster will depend on the
availability of at least one vCLS VM. Unlike your application VMs, you
should treat vCLS VMs like your system VMs. You must not perform any
operations on these VMs unless it is explicitly listed as a supported operation.
vSAN: Software-Defined Storage
vSAN is the hyper-converged storage part of the solution. The term hyper-
converged means having high-performance NVMe or “all-flash” based drives
attached directly to the bare metal compute, which becomes the primary
storage for your VMs.
With having a software-defined storage approach, Oracle can pool these
direct-attached devices across the vSphere cluster to create a
distributed/shared datastore for the VMs.
VMs are objects together, and vSAN is the object store for those objects and
their components.
Disk Groups
vSAN uses a construct called disk groups and manages the devices into two
different tiers: the capacity and the cache.
Capacity tier – The capacity tier is used as the persistent storage for the
VMs and used for reading cache purposes.
Cache tier – The cache tier in Figure 8-02 has “all-flash” drives and is
dedicated to writing buffering.
The write buffer is all about absorbing the highest rate of write operations
directly to the cache tier. However, a little data stream is written to the
capacity tier.
EXAM TIP: The two-tier (capacity and cache) design gives great
performance to the VMs while ensuring that the device can have data
written in the most efficient way possible.
vSAN Fault Domain
vSAN implements a concept of fault domain. It is different from the OCI
fault domain. A vSAN fault domain is about grouping multiple hosts into a
logical boundary domain. It makes sure that at least two replica copies of the
storage objects are distributed across the domains.
Storage Policies
vSAN storage policies are used to determine the high availability of
individual VMs. You can configure different policies to determine the
number of host and device failures that a VM can tolerate. Failures to
Tolerate (FTT) equal to 1 means that you can accommodate one node failure
within the cluster, where the VMs can sustain and still be functional.
FTM stands for Failure Tolerance Method and is used as RAID-1, which
always maintains an object’s replication.
vSAN Witness Node
A witness node is a dedicated host used for monitoring the availability of an
object. When you have at least two replicas of an object, and during a real
failure, it can host the data object of that application to be active on both
vSAN fault domains. It can be disastrous to any application. Therefore, a
vSAN witness node is configured to avoid the split-brain condition.
A witness node is not meant for deploying VM and storing only the metadata,
which means exclusively deciding for weak components and determining the
actual failure.
NXS-T: Software-Defined Networking and Security
NXS-T is the software-defined networking and security product part of
OCVS. It has the following features.
Heterogeneous
NXS-T is heterogeneous, which means NXS-T can be deployed not only for
vSphere but also for multi-cloud environments. It can extend functionality to
multiple Hypervisor, bare metal servers, containers, and cloud-native
application frameworks.
Security
Some of the standard security services include a firewall to an edge
appliance, load balancing of your workload VMs, distributed and logical
routing and switching, NAT for external inbound and outbound access, and
VPN tunnels for connecting between environments.
Automation
There are different REST APIs with JSON support for scripting operational
tasks. It is also compatible with Terraform and OpenStack Heat orchestration
for provisioning purposes.
With all these capabilities and a software-defined approach, NXS-T is very
familiar with OCI’s Virtual Cloud Network (VCN).
Components of NXS-T
NXS-T works by implementing three integrated planes.
Management
Control
Data
You can implement these three planes as processes, modules, and agents
residing on three different types of nodes.
Manage
Controller
Transport node
NXS Manager – This node hosts the API services. It also provides a
graphical user interface and REST APIs for creating, configuring, and
monitoring the NXS-T datacenter component.
NXS Controller – This node hosts the central control plane cluster service.
NXS Transport – The transport nodes are responsible for performing
stateless forwarding of packets based on the tables populated by the control
plane.
Transport Zone
A transport zone is a container that defines the potential reach of transport
nodes. These nodes are classified into the host and edge nodes.
Host Transport Node – The host transport nodes are ESXi hosts
participating within the zone.
Edge Transport Node – These nodes run the control plane daemons with
forwarding engines and implement the NSX-T data.
Gateways
There are primarily two gateways that you configure for your virtual machine
communication.
Tier 0 – There tier 0 gateway processes the traffic between the logical and
physical network, also known as North/South traffic.
Tier 1 – The tier 1 gateway is for the East/West traffic. The traffic between
VM to VM within the same cloud infrastructure.
To enable access between VMs and the outside world, you can configure an
internal and external Border Gateway Protocol (BGP) connection between a
tier-0 gateway and a router in the physical infrastructure.
EXAM TIP: When configuring BGP, you must configure a local and
remote Autonomous System (AS) number for your tier-0 gateway.
The Open Shortest Path First (OSPF) is an integer gateway protocol that you
can configure the tier-0 gateway and operates within a single autonomous
system.
Segments
Segments are defined as Virtual Layer two Domains. There are two types of
segments in NXS-T.
VLAN-backed Segments – VLAN-backed segment is a layer 2 broadcast
domain implemented as a traditional VLAN in the physical infrastructure.
The traffic between the two VMs on two different hosts but attached to the
same VLAN-backed segment is carried over a VLAN between the two hosts.
Overlay-backed Segments – In this segment, the traffic between two VMs
on two different hosts but attached to the same overlay segment has their
layer two traffic carried by a tunnel between the host.
Geneve encapsulation
Geneve is a network encapsulation protocol. It works by creating a layer 2
logical network encapsulated in UDP packets. It provides the overlay
capability by creating an isolated multitenant broadcast domain across the
data center fabrics.
HCX: Hybrid Cloud Extension
Hybrid Cloud Extension is an application mobility platform that can simplify
the migration of application workloads with rebalancing and help you
achieve business continuity between an on-premises and Oracle Cloud
VMware Solution.
HCX Advanced
HCX advanced edition can be enabled as a part of OCVS deployment, and it
has a wide range of features.
Network extension with hybrid connect is the top feature of HCX. It
allows layer two networks such as VLAN in your data center to extend
to the OCVS environment
Cross cloud connectivity, you can do site pairing and create a secure
channel between the environments
WAN optimization is used to optimize your network traffic with
deduplication, compression, and line conditioning
If you run a legacy vSphere version, you can use HCX to migrate your
workloads to a newer vSphere version
Cloud-to-cloud migration. There are different migration types: online,
live, offline, etc.
HCX also supports disaster recovery feature
HCX Enterprise
HCX Enterprise is an upgrade option with additional features. Some of the
features are:
Migration from the non-vSphere-based environment to vSphere
Large-scale bulked migration is supported through this edition
You can extend the disaster recovery feature with VMware Site
Recovery Manager (SRM) product, which will help you orchestrate the
DR workflows
Traffic engineering allows you to optimize the resiliency of your
network oaths and use them more efficiently
Mobility groups are about structuring your migration waves based on
your applications' functionalities networks and without service
disruption
Mobility Optimized Network (MON) ensures the traffic between
environments uses optimal paths while the flow remains symmetric
SDDC Deployment
Oracle created a VMware-certified Software-Defined Datacentre (SDDC)
implementation for usage within Oracle Cloud Infrastructure in collaboration
with VMware. Oracle Cloud Infrastructure hosts a highly available VMware
SDDC in this SDDC installation, dubbed the Oracle Cloud VMware
Solution. It also enables you to migrate all of your on-premises VMware
SDDC workloads to Oracle Cloud VMware Solution smoothly.
SDDC Provisioning Flow
You need to know a few prerequisites before you start the SDDC
provisioning.
Compartment
Virtual Cloud Network
The first step is to provide an SDDC name to your software-defined data and
choose which compartment you want to provide the SDDC. You have the
option to enable or disable HCX. HCX advanced can be selected as a part of
the provisioning with no additional cost. If HCX enterprise can be selected,
there will be an additional cost. After that, you choose the VMware software
version (7.0 update two or go to 6.7 or 6.5 versions).
Then, you choose the pricing interval. A pricing interval is the collection of
your usage. You can choose hourly, monthly, or yearly based on your
consumption. You need to confirm the pricing interval you selected from the
previous step. The next step is to select the number of ESXi hosts required in
your SDDC.
To access your ESXi host, you need to upload the SSH public keys. Your
SDDC environment is deployed in an availability domain. The next step is to
select the VCN you want to provision and which network you want to create
all the subnets for your management and workloads. In the next step, you
have an option to create new VLANs or use existing VLANs for your
management and other functions. After that, enter a CIDR block for your
VLANs. It is an IP address space for your VLAN functions. Then, enter a
CIDR block for your workloads. The final step is to review and submit. It
will take approximately an hour and a half or two hours to complete the
SDDC provisioning.
SDDC VLANs
A VLAN is an object within the VCN. VMware uses these VLANs to
segregate traffic for different purposes. There are some functions used for
SDDC VLANs.
NSX Edge Uplink 1 and 2
The NSX Edge Uplink VLAN is used for north-south communication
between the SDDCs. It is also used for communication to native Oracle cloud
services and the internet.
NSX Edge VTEP
The NSX Edge VTEP VLAN sends GENEVE encapsulated traffic between
the NSX-T Edges and the ESXi host.
NSX VTEP
The NSX VTEP VLAN is used for the NSX-T overlay network; GENEVE
encapsulated traffic that will flow east-west between the ESXi host.
vSAN
The vSAN VLAN is dedicated to vSAN traffic.
vSphere
The vSphere VLAN is where all your management VMs, like vCenter, NXS-
T manager, HCX manager, and all the NSX-T Edges live.
HCX
The HCX VLAN is used for its CX traffic.
Replication Net
Replication net for the replication traffic initiated from the HCX.
Each VLAN is assigned with a VLAN ID, and these VLANs are local to the
VCN. If you configure the same VLAN ID on a different VCN, it is still
considered a different VLAN domain.
These VLAN partitions your VCN into layer two broadcast domains.
Each VLAN has a routing table and network security group associated with
it.
VMware SDDC uses this VLAN to segregate traffic.
Note: If you are using an existing VLAN, update your routing table and
network security groups to allow traffic to flow between the components.
Deploying a Highly Available SDDC
Follow the following steps to deploying a highly available SDDC.
Compute
The first step is to determine the total number of compute nodes you
require. The compute represents the CPU and memory. You can
determine the total number of ESXi nodes required in your architecture
based on your on-premises
OCVS provides a 3 to 64-node ESXi cluster. The high availability of
these compute nodes is provided through OCI Fault Domain
architecture
When you provision these ESXi nodes, these are placed in different
fault domains and provide the first level of high availability to your
compute nodes
vSphere cluster HA is also enabled to protect VMs running within the
cluster
Virtual Cloud Network
A VCN represents a traditional network with all firewalls and
gateways, and that is your underlay network for your SDDC
NSX-T is an overlay network with a few components installed. NSX
manager and controller is an appliance that you deploy
NSX Edges are deployed from the NSX manager for routing and
switching purposes
You can factor in a vSphere Cluster HA function for the NSX
component’s high availability
NSX networking depends on VCN. VCN provides a highly scalable
architecture, and it provides a greater extension for your SDDC to
scale-out
The SDDC bare metal server is backed by two into 25 Gbps network
connections and supports up to 52 virtual NICs, which means 26 per
physical NIC and gives the high network bandwidth for your virtual
machines
Storage
VMware vSAN provides an inbuilt enterprise-class performance
datastore, reliability, and availability
It uses an all-flash solution attached directly to the NVMe-backed bare
metal instance
vSAN implements storage fault domains. They ensure multiple replica
copies of storage objects are distributed across the domains
You can also use vSAN storage policies to determine the high
availability of individual VMs
EXAM TIP: The service mesh of the HCX manager is considered the
tunnel receivers.
HCX Connector
The connector is always the source for site pairing. It is paired with the HCX
manager, which means it cannot pair with another connector.
The HCX connector is licensed based on OCVS SDDC deployment. In this
case, the connector service mesh is the tunnel initiator.
These two integrated components build the service mesh with features like
migrations with VMotion, disaster recovery, bulk migration, assisted
migration, traffic engineering, etc.
HCX Layer 2 Extension – Configuration
Prerequisites
There are some prerequisites to make HCX work.
A distributed virtual switch can configure an on-premises environment
You can establish a dedicated private network using Oracle cloud
FastConnect
The required routing configuration and security rules for VCN and on-
premises should be configured to allow communication
Preparation
The first step is to download and deploy the HCX Connector appliance on-
premises as part of preparation. The connector is to be downloaded from the
HCX Manager Interface and then deployed on-premises, then activating the
product using the key provided by the HCX manager.
Site Pairing
Once the product is activated, the next step is to configure the site pairing by
entering the IP address and other authentication details. The site pairing
establishes the connection for management, authentication, and orchestration
for HCX services across both environments.
Compute Profile
A compute profile needs to be created, a container of the compute, storage,
and network settings that are used to deploy the HCX appliances.
Network Profile
A network profile is part of the computed profile. It is an abstraction of
network properties like distributed port group or NXS logical switch or any
of the other layer three properties of that network.
Service Mesh
After that, the service mesh is created, which is the HCX service
configuration used by both on-premises and OCVS.
Configure L2 Extension
The last step is to select the on-premises VLAN to extend, including the other
property like a gateway, destination’s first hop, router, etc.
With L2 configuration, your VLANs are now extended from on-premises to
OCVS. After the VM migration of VMs, the network settings of those VMs
need to be changed to that extended VLAN protocol.
Mobility Optimized Networking (MON)
Mobility Optimized Networking (MON) is an HXC Enterprise feature.
This feature allows you to route the traffic of a migrated virtual
machine within OCVS without Trombone
A network trombone occurs when all the workloads on an extended
network at the destination are routed through the on-premises router
gateway
MON ensures that the traffic remains symmetric and uses an optimal
path to reach its destination
With MON, an NSX-T tier-1 gateway is connected to perform the local
routing task. You can configure all this optimized routing in an
automated way
MON allows policy-based routing. The policy route defined the traffic
which needed to be routed through the source gateway compared to the
traffic routed through the cloud gateway
You can evaluate the MON policy when the destination network for
traffic flow is not within the SDDC NSX-T tier-1 router. It is evaluated
so that if the destination IP is matched and configured to allow in the
policy, the packet is forwarded to the on-premises gateway using the
HCX Network Extension appliance. If the destination IP is not matched
or configured to deny in the policy, the packet is forwarded to the
SDDC tier-0 gateway to be routed.
Migration with HCX
There are different ways to migrate virtual machines to Oracle Cloud
VMware Solution using HCX.
HCX Advanced Edition
HCX Advanced Edition gives a few migration types.
Cold Migration – A cold migration is done with VMs powered off, and data
transfer is done using the Network File Copy (NFC) protocol. The cold
migration means there is a downtime for the VM.
HCX vMotion – vMotion transfer captures the virtual machine’s active
memory, execution state, IP address, and MAC address and transfers to the
destination. It is also referred to as the live migration feature of VMware;
therefore, there is no downtime for the VM.
HCX Bulk – It uses Host Based Replication (HBR) method. It is done by
replicating several live virtual machines to the target site. The replication
process makes initial full sync of the VM in the target site. Then, the delta
and changes block are replicated. Once the delta replication is complete, a
switchover is triggered, with minimal downtime for the running VM.
Therefore, it is called the warm migration type.
HCX Enterprise provides additional migration features such as OS Assisted
Replication. This is done through an agent deployed on the guest operating
system of the VM. It has minimal downtime. Therefore, it is a warm
migration type.
Replication-assisted vMotion is designed for massive migrations, and it is an
enhanced version of the HCX bulk migration. It works with a combination of
HBR and vMotion working together. In this migration type, the difference is
that the last switchover is done through vMotion, and there is no impact on
the running VM. Therefore, it is considered a live migration.
Use Cases for Hybrid Clouds
In a variety of cases, a hybrid cloud is the best option. The following use
examples demonstrate how you can use hybrid cloud computing effectively.
Disaster Recovery
You can fine-tune private and public disaster recovery with hybrid cloud
solutions to match an organization's specific needs. It results in a more
straightforward approach that conserves local storage space and bandwidth
while streamlining the backup process—assuring an efficient and speedy
recovery of locally stored private data. It ensures continuity while
maximizing the efficiency that only a hybrid architecture can provide.
Workload Migration
A hybrid cloud solution can be a temporary setup that allows for permanent
cloud migration, and a business cloud migration could take months in some
circumstances. Using a hybrid cloud to transition allows for a staged shift
with simple and safe rollback while maintaining the flexibility that minimizes
or eliminates downtime.
Development lifetime
During the development lifecycle, resource requirements change. The testing
phase will require certain resources that will not be required during beta or
even launch. These resources can scale according to the needs of each phase
in a hybrid cloud environment. It provides flexibility throughout the life cycle
without requiring hardware or configuration changes.
Legacy Applications
While you can transfer many tools, applications, and resources to the cloud,
some still require on-premises resources. Hybrid cloud computing supports
these scenarios, which has the benefit of allowing an organization to
transition to the cloud at its speed.
Use Oracle Cloud Infrastructure FastConnect or IPSec VPN for secure access
from your data center to Oracle Cloud. Use ExpressRoute or VPN for private
traffic from your data center to Microsoft Azure.
Set up a link between a FastConnect circuit in Oracle Cloud and an
ExpressRoute circuit in Microsoft Azure for cross-cloud networking between
Oracle Cloud and Microsoft Azure.
The following figure depicts further specifics of Oracle Cloud and Microsoft
Azure cross-cloud networking with a sample workload. In this example, the
workload in Microsoft Azure is a custom application with a public-facing
load balancer. The bespoke application takes advantage of an Oracle Cloud
private database.
Figure 8-09: OCI-Azure Interconnect Architecture
EXAM TIP: You will always get public-facing IP addresses when you
get IPv6 on a virtual cloud network.
Having a dual-stack IPv4/IPv6 will enable you to continue offering IPv4
services even if the resource in your virtual cloud network is leveraging IPv6.
Example
The example of Oracle cloud IPv6 support is shown in Figure 8-11. This type
of configuration is made for East-West, meaning no communication through
the internet. A VCN consists of IPv4 CIDR and a /56 IPv6 prefix. The IPv6
support is also provided on the subnet level (only two subnets). However, it is
optional to provide IPv6 support on the subnet level. Then, you place your
resources on your subnets. The load balancer has an IPv6, but the subnets do
not in subnet C. The load balancer will balance both virtual machines in
subnet C. Whenever you try to reach the resource, the load balancer will
reach it through IPv6. However, the load balancer will be communicating
with those subnets through IPv4. The virtual machine in subnet A will
communicate with the load balancer through IPv6. With this configuration,
you can implement another virtual network using the local peering gateway
and communicate with the resources on the other virtual network through
IPv4 or IPv6. The given example is through IPv6 because that is your
destination on the routing table.
In the north-south configuration, you can enable IPv6 on your resources and
communicate to the open internet from the internet gateway to any IPv6
supporting service out there in the world outside of Oracle Cloud
Infrastructure.
Mind Map
Figure 8-12: Mind Map
Practice Questions
1. How many building blocks of a physical data center are there?
A. Three
B. Four
C. Two
D. Five
2. Which of the following is not required to allocate IPv6 address by
Oracle?
A. VPN
B. FastConnect
C. NAT
D. Virtual Network
3. Which of the following is based on the core components of VMware
Cloud Foundation?
A. HCX
B. OCVS
C. SDDC
D. None of the above
4. Which of the following is a unique identifier for the IPv6 addressing
model interfaces?
A. CIDR
B. IP Address
C. NAT
D. Scope
5. Which of the following distributed software systems with features
enabled by Hypervisor ESXi?
A. HCX
B. vSphere
C. vSAN
D. NXS-T
6. Which of the following is a component of NSX host API services?
A. Controller
B. Transport
C. Manger
D. None of the above
7. What is the main reason Oracle implements access to other Cloud Service
Providers?
A. Latency
B. Multi-region
C. Cost
D. Connectivity
E. All of the Above
8. How many integrated planes exist in NXS-T architecture?
A. Two
B. Three
C. Four
D. Six
9. Which of the following NXS-T integrated planes has a central and local
part?
A. Data
B. Management
C. Control
D. None of the above
10. Which of the following instantiated on edge for connection?
A. NSX-T Bridge
B. N-VDS
C. HCX
D. SDDC
11. How many components of HCX are there?
A. Four
B. Two
C. Three
D. Five
12. Which of the following is implemented by OCI in collaboration with
VMware?
A. VLANs
B. NSX-T
C. HCX
D. SDDC
13. Which of the following prerequisites are used to start SDDC
provisioning?
A. Database
B. Compartment
C. Policy
D. OKE
E. Virtual Cloud Network
14. Which of the following is an HCX enterprise feature?
A. MON
B. SDDC
C. DR
D. HA
15. Which of the following is a storage part of the solution?
A. vSphere
B. NSX
C. vSAN
D. SDDC
16. Which of the following is a dedicated host used for monitoring the
availability of an object?
A. Disk Group
B. Fault Domain
C. Storage Policies
D. Witness Nodes
17. Which of the following is a mobility platform?
A. vSphere
B. HCX
C. vSAN
D. SDDC
18. Which of the following migration types is called live migration?
A. Cold Migration
B. Development Lifetime
C. Hot Migration
D. Bulk
E. vMotion
Chapter 09: Migrate On-Premises Workloads to OCI
Introduction
This chapter focuses on the migration process of on-premises workloads to
the Oracle Cloud Infrastructure (OCI).
Moving Oracle applications to OCI, such as E-Business Suite, JD Edwards,
PeopleSoft, Siebel, and Hyperion reduces TCO, enhances agility, and boosts
productivity. Oracle Cloud's migration, provisioning, and administration tools
and Cloud Lift services enable speedy deployment while preserving
important customizations and integrations. Our cloud infrastructure and
databases improve the performance and security of your applications. The
best part is that you can put your money back into innovation.
Use Cases
The Storage Gateway has two main use cases:
Hybrid Cloud: On-premises applications actively use cloud storage
content
In a hybrid scenario, on-premises are in constant sync with the cloud.
Use cloud storage and archive as a low-cost, high-durability data tier
Create a permanent data archive in the cloud
Extend on-premises datacenter to the cloud with limitless backend
storage
Enhance disaster recovery and business continuity using remote cloud
resource
One-time data migration or periodic transfer
The Storage Gateway is a low-cost option to keep data synchronized. It can
supplement solutions that cannot write directly to OCI. It can also be part of
your disaster recovery strategy. In the migration scenario:
It can move data to the cloud for app migration or adjacent analysis
It can copy data to the cloud as it is written
It moves existing bulk data at one time
Exam tip: In the migration scenario, Storage Gateway acts as a tool that
makes it easier to transfer data dynamically and continuously.
Migration steps:
1. Configure all prerequisites:
Set up VPN or FastConnect for access to source DB
Provision Target DB
Provision OGG VM
Configure the source and target DBs for replication
2. Create Migration in DMS.
3. Evaluate Migration.
4. Start Migration.
Export source DB to target DB using a Data pump over a DB link
Create and start OGG replication from source DB to target DB, starting
with all changes after the initial load
5. Complete Migration.
Migration steps:
1. Configure all prerequisites:
Provision Target DB
Create OSS Stream
Object Store Bucket
2. Download and install DMS Agent on site.
3. Configure connectivity for Agent to DMS Service and OSS Stream.
4. Create Migration in DMS.
5. Evaluate Migration.
6. Start Migration.
Export source DB to target DB using Data pump
Import to target DB using Data pump
Step 1: Open Database Migration in the OCI console.
In the OCI console, the Migration service exists in the main console menu,
under the Database Migration section. There are two main objects which are
Migrations and Registered Databases.
Registered Databases contain the connection information, who your source
and database are. You need to create a registered database for the source and
target database. If your source database is CDB architecture, you must be
registered for both CDB and PDB.
Migration is the definition of how to migrate one database to another.
Therefore, you would use migration and refer to your registered databases for
the source and target information.
Figure 9-07: Data Migration in OCI Console
The next step will be to export the database dump, and it will load into the
object store. After that, it will take the dumps and import them into the target
database. Once it has done that, it will continue replicating in the “Monitor
Replication Lag” phase. The monitor replication lag will monitor that the lag
goes under a certain threshold, which can be defined as part of the migration.
And, if it has passed the threshold, it determines that the lag of your
transaction has been worked down to the extent that you are ready to do the
cutover. Because if you are migrating a large database with quite a bit of
transaction volume, it will first take some time to do the steps (export and
import). During all this time, you are building a backlog of these transactions.
This backlog will take some time to work down. At that point, the Monitor
Replication Lag will still be running, and once it is completed, you have
usually set a way that will continue replication. When you are ready to
finish this replication to the cutover, you will continue from there.
Figure 9-12: Replicate Transactions until the user resumes
Once you continue from there, you are going to another phase called
switchover. At that point, the user deactivates the source applications. The
user waits for the switchover to complete, and the switchover phase will
apply any leftover transactions. After it is completed, a user can activate the
target application.
Figure 9-13: Switchover
After going through all the steps, you will see the succeeded migration.
Pricing
Freely available
DMS is free for all the common use cases and what is included in the pricing
is the service itself. All the service's environment and the infrastructure that
the service runs on. There is a GoldenGate marketplace license specific for
migration, and it is free for the first six months.
Cost required
When you are in a free trial of 6 months, you are not charged for the licensing
fee for the GoldenGate. However, you will be charged for all resources that
run in your tenancy, and there are dependencies. The compute that
GoldenGate marketplace runs on, the object store bucket, and if you are using
an agent, the streaming service also all the networking; if you are setting up
FastConnect or VPN, it is not free. You have to pay for all that resources
separately, including the source and target databases.
Exceptions
The pricing is free; however, to prevent abuse, you must set limits. After that,
if the limit has been passed, the billing will kick in. to deal with this type of
situation, you can design approaches so that you can smoothly handle all the
use cases without having to get into billing.
For example, there is 183 days or six months limit for using a migration.
Therefore, if you create a migration, you can use it for up to six months after
the creation date. If you are running it after six months, you will get billed,
and this is just running. The migration object itself is not billed. Therefore,
having a migration object that sits in your tenancy and is not running will not
create any cost if you are running it.
If the user needs to go beyond six months, they can always clone the
migration object into a different migration object and then run this new
object, and once you clone it, the clock starts from zero again. There is
another exception: if a migration is running with no data transfer for 60 days,
that is also the reason for starting billing.
Mind Map
Introduction
This chapter focuses on the design parameters necessary for security and
compliance in the Oracle cloud. The topics include:
IAM – Federation
Sign-in Options
Web Application Firewall
IAM – Federation
Federated users select which identity provider they want to use for sign-in
and are then redirected to that identity provider's sign-in experience for
authentication. After inputting their login and password, the Identity Provider
(IdP) authenticates and redirects them back to the Oracle Cloud Infrastructure
Console.
General Concept
The identity provider provides identifying credentials and authentication for
users. OCI can be protected with any IdP that supports the Security Assertion
Markup Language, also referred to as SAML 2.0 protocol. The service
(application or website) calls upon the IdP to authenticate users. There will
always be a trust between the identity provider and service provider that
provides the relationship that an administrator configures between an IdP and
a service provider. OCI console or API is used to set up this type of
relationship. Once you build the relationship, a particular IdP is federated to
OCI.
To make this a functioning process, let us consider that you have a user who
wants to log into OCI. There is a kind of federated trust OCI has set up with
an identity provider such as Oracle IDCS, Okta, Microsoft Azure Active
Directory, or Active Directory Federation Service. When the user tries to log
in to the OCI console, OCI will redirect to the IdP for authentication because
of federation trust. Therefore, the request would go to the IdP, the specific
IdP for authentication, so that users can be authenticated, and IdP would
return the authentication assertion, the security assertion. The user would log
into OCI using the IdP authentication assertion and that security assertion. By
doing so, the federation trust process will function successfully.
EXAM TIP: Federated users cannot have other OCI credentials, like API
keys, authentication tokens, or passwords.
Local User
A local user is a non-federated user. Someone who signs in to use the OCI
console with a login and password created in OCI is the OCI admin.
Provisioned/Synchronized User
OCI supports System for Cross-domain Identity Management (SCIM), open
standard management that enables user provisioning systematically across
identity systems (IdP).
For Oracle IDCS and Okta using SCIM, federated users can be provisioned
into OCI. Also, this allows you to assign credentials (unique OCID) to the
users in OCI.
Note: When you delete a federated user in IdP, delete the synchronized user
in OCI.
10. From the left side given menu, click on Enterprise Applications
under Manage.
11. Check the available Enterprise applications and click on + New
application.
12. Search and click on Oracle Cloud Infrastructure Console.
13. Check the details and click on Create.
14. Check the properties.
15. Then, start configuration from the Getting Started section.
16. Click on point 2, Set up single sign on.
17. Inside the single sign-on option, click on SAML.
18. For basic SAML configuration, upload the metadata file recently
taken from the OCI Console.
19. Browse the metadata file and click on Add.
20. Check the SAML configuration details.
21. Scroll down the page and write a URL for Sign on URL.
22. Click on Save.
23. After that, check the configurations.
24. Scroll down and click on the Edit option for Attributes and Claims.
25. Click on the existing Claim name.
26. Select Persistent for Name identifier format.
27. Leave the remaining options as default and click on Save.
28. After that, click on +Add a group claims.
29. Select the Security Groups option.
30. Set Group ID as Source attribute.
31. Enable Customize under Advanced options.
32. Write group name and namespace.
33. Leave the remaining options as default.
34. Click on Save.
35. Verify the recently created claim.
36. Inside the SAML Signing Certificate section, download the
Federation Metadata XML.
37. Save the downloaded file in any desired folder.
Step 3: Add User/Group to this Application
38. On your application page, select Users and groups from the left
side given menu.
39. Click on +Add user/group.
40. Select your user/group from the list and click on Select.
41. Check the selected user and click on Assign.
42. Click on your recently added user.
43. Check the details of the added user.
63. All options are available in the same manner as was available from
your profile IdP.
Web Application Firewall
Introduction
The Oracle Cloud Infrastructure Web Application Firewall (WAF) is a global
security solution protecting applications from dangerous and undesirable
internet traffic. It is cloud-based and PCI compliant. WAF may secure any
internet-facing endpoint by enforcing the same set of rules across all of a
customer's apps.
You can develop and maintain rules for internet threats, including Cross-Site
Scripting (XSS), SQL Injection, and other OWASP-defined vulnerabilities
using WAF. Unwanted bots can be mitigated, while desired bots can be
admitted tactically. Access rules can be set up to restrict access based on
location or the request's signature.
The Oracle Cloud Infrastructure WAF is a regional and edge enforcement
service connected to an enforcement point like a load balancer or a web
application domain name. WAF guards against malicious and undesired
internet traffic for apps. WAF may secure any internet-facing endpoint by
enforcing the same set of rules across all of a customer's apps.
What is meant by WAF?
The Oracle Cloud Infrastructure Web Application Firewall (WAF) is a
global security solution protecting applications from dangerous and
undesirable internet traffic. It is cloud-based and PCI compliant
WAF stands for Web Application Firewall, a device, server-side
plugin, or filter that applies a set of rules to HTTP/S traffic
WAF can detect and guard against attack streams hitting a web
application by intercepting HTTP/S traffic and passing it through a
series of filters and rules
Common assaults (Cross-site Scripting (XSS), SQL Injection) are
covered by the rules and the ability to filter specific source IPs or
malicious bots
Typical WAF responses include allowing the request to proceed, audit
logging the request, or blocking the request by returning an error page
The OCI Web Application Firewall is a global security service that is
cloud-based and PCI-compliant
WAF Concepts
The necessary concepts associated with the WAF include:
WAF Policy
The whole configuration of your WAF service, including origin management,
protection rule settings, and bot detection features, is referred to as WAF
policies.
Origin
It is the origin host server for your web application. To set up protection rules
or other elements in your WAF policy, you must first establish an origin.
Protection Rules
When network requests fulfill the given criteria of a protection rule, they can
be configured to allow, block, or log them. The WAF will track traffic to
your web application over time and provide recommendations for
implementing new rules.
Bot Management
The WAF service has numerous features that allow you to detect bot traffic
and either ban or allow it to access your web apps. JavaScript Challenge,
CAPTCHA Challenge, and GoodBot Whitelists are some of the bot control
tools.
Access Control
Request and response controls are included in access control.
Actions
Actions are items that represent one or more of the following:
Allow: An action that skips all remaining rules in the current module if a
matching rule is found.
Check: An action that does not halt the current module's rule execution.
Instead, it creates a log message that records the outcome of rule execution.
Return HTTP response: This action returns a specific HTTP response.
Condition
As a condition, each rule accepts a JMESPath expression. WAF rules are
triggered by HTTP requests or HTTP responses (depending on the type of
rule).
Firewall
A logical relationship between a WAF policy and an enforcement point, such
as a load balancer, is the Firewall resource.
Network Address List
WAF policies use network address lists to store specific public IP addresses,
CIDR IP ranges, and private IP addresses.
Limiting the Rate of Change
Rate restriction provides inspection of HTTP connection attributes as well as
the limitation of the number of requests for a specific key.
Request Control
Inspection of HTTP request characteristics and return of a defined HTTP
response are both possible with request control.
Rules for Requesting Protection
Request protection rules provide for the detection of harmful material in
HTTP requests and the delivery of a predefined HTTP response.
Benefits
The Oracle Cloud Infrastructure WAF protects your web application or API
from fraudulent requests. It also gives you a better understanding of where
your traffic is coming from, and Layer 7 DDoS attacks are prevented,
assuring increased uptime. It also filters the traffic at layer 7.
To identify and restrict harmful and/or suspicious bot activity from scraping
your website for competitive data, the bot management system employs
detection techniques such as IP rate limiting, CAPTCHA, device
fingerprinting, and human interaction challenges. Simultaneously, the WAF
can allow legitimate bot traffic from Google, Facebook, and other sources to
access your web apps as intended.
Features
Integrated Threat Intelligence
Adopt a layered defensive (edge and in-region) security strategy with a web
application firewall that gathers threat intelligence from various sources,
including WebRoot BrightCloud® and over 250 predefined OWASP
applications compliance-specific rules.
Extensive Policy Control
Access controls based on the geolocation data, whitelisted and blacklisted IP
addresses, HTTP URLs, and HTTP headers protect applications deployed in
Oracle Cloud Infrastructure, on-premises, and in multi-cloud settings.
Flexible Enforcement
Gain the ability to implement WAF protection on internal and external load
balancers closest to OCI applications and at the OCI edge closest to end-
users. Flexible Enforcement protects application infrastructure and workloads
in any environment: OCI, on-premises, multicloud, and everywhere in
between.
Use Cases
OCI WAF is a global security solution protecting applications from
dangerous and unwanted internet traffic. It is cloud-based and PCI compliant.
• Defend any internet-connected endpoint from cyberattacks and
criminals
• Prevent SQL injection and cross-site scripting (XSS)
• Bot management — block malicious bots in real-time
• Protection against Layer 7 Distributed-Denial-of-Service (DDoS)
attacks using threat intelligence gathered from many sources, including
Webroot BrightCloud
OCI WAF Rulesets
To protect against the most prevalent web vulnerabilities, OCI WAF employs
the OWASP ModSecurity Core Rule Set. The open-source community
manages and maintains these guidelines.
OCI WAF is pre-configured to protect against the top ten Internet risks, as
determined by the OWASP Top 10. These include:
• A1 – Injections (SQL, LDAP, OS, etc.)
• A2 – Broken Authentication and Session Management
• A3 – Cross-site Scripting (XSS)
• A4 – Insecure Direct Object References
• A6 – Sensitive Data Exposure
• A7 – Missing Function-Level Access Control
Note: Each type of vulnerability ruleset is shown within the OCI console,
with granular controls for each specific rule.
Challenges and Whitelisting Capabilities
JavaScript Challenge
It gives you a quick and easy approach to stopping a substantial percentage of
bot attacks. Every client, attacker, and real user's browser receives a piece of
JavaScript after receiving an HTTP request. It tells the browser to take a
specific action. Bots, often not equipped with JavaScript, will fail or be
blocked, while legitimate browsers will pass the challenges without the user's
knowledge.
CAPTCHA Challenge
CAPTCHA protection can be used to restrict access to a URL that humans
should only visit. You can also personalize the CAPTCHA challenge remarks
for each URL.
Whitelisting
You can manage which IP addresses show on the IP whitelist by using
Whitelisting.
WAF Architecture
The architecture of the WAF in OCI is shown in Figure 10-03. You have
your application deployed inside your tenancy on the side of a VCN. The
architecture must contain a load balancer and the deployed applications.
When you have applications deployed in the architecture, you should use
WAF to protect the access and implement all the rules and capabilities to
safeguard against attacks or any threats that potentially bring your
applications down. When you deploy WAF, the WAF becomes a regional-
based service. After the configuration of WAF, you should configure the load
balancer to which the load balancer you want to point to.
After that, you should push the configuration towards the WAF edge nodes.
These nodes are the places spread around the globe where you have control
and deploy the WAF policies. After then, everyone will try to access your
application through the internet. This type of restriction will be done using
the WAF edge node to verify all the connections and traffic sent over
applications. Oracle will ensure that all policies are applied and then execute
the access to the web.
Figure 10-03: WAF Architecture
Practice Questions
1. In the Shared Security model, you are responsible for __________.
A. Workloads
B. Configuration of Resources
C. Software
D. Hardware
E. Datacenter Facilities
2. Which of the following service manages user access, authentication, and
policies?
A. Bastion
B. Networking
C. Vault
D. IAM
3. How many user types are available?
A. Two
B. Four
C. Three
D. None
4. Which of the following security service protects applications from
dangerous and undesirable internet traffic?
A. WAF
B. Security Advisor
C. Cloud Guard
D. Bastion
5. Which of the following security service restricts and limits access to
target resources without public endpoints?
A. WAF
B. Bastion
C. Vault
D. None of the Above
6. Which of the following component of WAF define the whole
configuration of your WAF service?
A. Origin
B. Condition
C. Policy
D. Protection Rules
7. Which of the following allows you to choose your own sign-in option?
A. IAM
B. IDCS
C. WAF
D. Federation
8. Which of the following service uses DNS data-driven algorithm to select
the optimum global point of presence?
A. WAF
B. IAM
C. Security Zone
D. None of the Above
9. Which of the following can be used to restrict access to a URL?
A. JavaScript
B. CAPTCHA
C. Whitelisting
D. None of the Above
10. Which of the following uses JavaScript challenge as its control tool?
A. Protection Rule
B. Policy
C. Origin
D. Bot Management
11. How many OCI sign-in options are available?
A. Only one
B. Three
C. Two
D. More than five
12. Which of the following user types grants access to OCI based on their
membership mapped to the OCI groups?
A. Federated User
B. Local User
C. Synchronized User
D. All of the Above
13. Which of the following services is responsible for managing the
access of the cloud resources?
A. Server
B. Interface
C. Channel
D. IAM
14. WAF is used to develop and maintain rules for internet threats,
including Cross-Site Scripting (XSS), SQL Injection, and other OWASP-
defined vulnerabilities.
A. False
B. True
15. How many action items are provided by WAF?
A. Only one
B. Maximum two
C. At least three
D. None
Chapter 11: Real-World Architecture
Introduction
This chapter focuses on the real-world architectures provided by Oracle. It
includes:
General Architecture
Hub-Spoke Architecture
HPC Architecture
Security Architecture
There are some building blocks on the top of the OCI global footprint. At the
bottom side, there exist core primitives, including compute, storage, and
networking.
The compute services are core Virtual Machine (VM), bare metals servers,
containers, a managed Kubernetes service, and VMware services. These
services are primarily for performing calculations, executing logic, and
running applications.
Cloud storage includes disks attached to virtual machines, file storage, object
storage, archive storage, and data migration service.
OCI offers a complete range of storage services for you to store, access,
govern, and analyze structured and unstructured data.
The networking feature lets you set up software-defined private networks in
the Oracle cloud. OCI provides the broadest and deepest networking services
with the highest capability, most security features, and highest performance.
There are multiple database services available, both Oracle and open-source.
Oracle is only the cloud that runs Autonomous Databases with multiple
capabilities, including OLTP, OLAP, and JSON. You can run databases and
virtual machines, bare-metal servers, or Exadata in the cloud. You can also
run open-source databases, such as MySQL and NoSQL, in the Oracle Cloud
Infrastructure.
With Data and AI Services, there is a managed Apache Spark service called
Dataflow, a managed service for tracking data artifacts across OCI called
Data Catalog, and a managed service for data ingestion and ETL called Data
Integration.
There is also a managed data science platform for machine learning models
and training in Oracle. Also, there is a managed Apache Kafka service for
event streaming use cases.
The Governance and Administration services include security identity,
observability, and management.
Some unique features, like compartments, make it operationally easier to
manage large and complex environments. Security is integrated into every
aspect of OCI, whether automatic detection and remediation, what is typically
referred to as Cloud Security Posture Management, robust network
protection, or encryption by default.
There is an integrated observability and management platform with logging,
logging analytics, and Application Performance Monitoring (APM).
Many developer services are available that have the managed low code
service called APEX, several other developer services, and a managed
Terraform service called Resource Manager.
For analytics, a managed analytics service called Analytics Cloud integrates
with various third-party solutions.
The application services have managed server-less offerings call functions, an
API gateway, and an Event service to help you create microservices and
event-driven architectures.
You have a comprehensive connected SaaS suite across your business,
finance, Human Resources (HR), supply chain, manufacturing, advertising,
sales, customer service, and marketing, all running an OCI.
Figure 11-02: Services in Global Region
OCI Architecture
Introduction
Oracle Cloud Architecture (OCI) is a secure public cloud infrastructure
designed for enterprise-critical applications. Oracle changed the virtualization
stack to decrease the risk of hypervisor-based attacks and to enhance tenant
isolation. Consequently, the next-generation public cloud infrastructure
design outperforms first-generation cloud infrastructure designs in terms of
security. This architecture has been applied in every data center and area.
OCI is a full-fledged IaaS platform. It offers the services required to develop
and execute applications in a highly secure, hosted environment with
excellent performance and availability. Customers can run the Compute and
Database services on either bare metal instances (customer-dedicated
physical servers) or Virtual Machines (VM) instances) isolated computing
environments on top of bare metal hardware). Because bare metal and VM
instances use the same server hardware, firmware, underlying software, and
networking infrastructure, the OCI safeguards are built into those levels.
Core Concept of OCI Architecture
OCI supports the following cloud concepts:
High Availability – Cloud resources are available at all times and have no
single point of failure.
Disaster Recovery – Allows for speedy recovery or service continuance in
the event of any type of downtime.
Fault Tolerance – Keeps downtime to a minimum.
Scalability – Allows resources to be scaled up or down (vertical scaling), in
and out (horizontal scaling).
Elasticity – It is the ability to scale resources such as virtual machines and
storage rapidly.
Capital Expenditure (CAPEX) on fixed assets such as physical infrastructure
is referred to as pricing. Operational Expenditure (OPEX) is money spent on
utilities and power.
Component of OCI Architecture
The five primary components of the OCI Architecture are as follows:
OCI Regions
OCI region is a localized geographic area comprising one or more
Availability Domain (AD).
Depending on where you are from, you may have access to a local region or a
region close to you. Check out the image below to see a list of the regions
that are now available:
OCI has decided to start additional regions in new geographies with a single
AD (to increase our global reach quickly).
The availability domain is isolated from each other, fault-tolerant, and very
unlikely to fail simultaneously. Because the availability domain does not
share physical infrastructure such as power or coding or the internal network,
a failure that impacts one availability domain is unlikely to impact the
availability.
As shown in Figure 11-05(b), there are three availability domains. One AD
has an outage that is not available. However, the other two ADs are still up
and running.
You can leverage FD for your services. In any region, resources in that most
one FD are actively changed at any point in time. It means that availability
problems caused by change procedures are isolated at the fault domain level.
Therefore, you can specify which fault domain you want to use. Moreover,
you can control the placement of your computer database instances to the
fault domain at instance launch time.
EXAM TIP: You should have a region based on three key criteria.
1. Location
2. Data Residency and Compliance
3. Service Availability
Avoid Single Point of Failure
Consider an example in which you have a region and availability domain.
One AD has three FDs, as shown in Figure 11-08. When you create an
application, you create a software-defined virtual network. The architecture
consists of an application tier database tier. Both application and database
tiers are replicated across FDs. It gives you an extra layer of redundancy.
When something happens to an FD, your application is still up and running.
Similarly, you could replicate the same design in another AD. You could
have two copies of your application running and two copies of your database
running. Also, you could use various technologies like Oracle Data Guard to
make sure that your primary and standby –data is kept in sync.
It is how you can design these types of architecture to avoid single points of
failure.
Hub-Spoke Architecture
Introduction
The core component of a hub-and-spoke network, also known as a star
network, is connected to several networks around it. The overall architecture
resembles a wheel, with many spokes connecting a central hub to spots along
the wheel's periphery. Setting up this topology in a standard on-premises data
center can be costly. However, there is no additional expense in the cloud.
Use Cases
For the following popular use cases, you can utilize the hub-and-spoke design
to create unique and powerful networking solutions in the cloud:
Creating a development and production environment that is separate
Isolating the workloads of various clients, such as an ISV's subscribers
Separating environments to meet PCI and HIPAA compliance needs
Using a central network provides shared IT services such as a log
server, DNS, and file sharing
Architecture
An Oracle Cloud Infrastructure region with a hub VCN and two spoke VCNs
in this reference architecture as defined in Figure 11-10. Each spoke VCN is
connected to the hub VCN using a pair of Local Peering Gateways (LPGs).
Every subnet has a routing table with rules for routing traffic to destinations
outside the VCN. Security lists are utilized to regulate network traffic to and
from each subnet. A few sample subnets and virtual machines are shown in
the architecture.
The hub VCN includes an internet gateway for network traffic to and from
the public internet, as well as a Dynamic Routing Gateway (DRG) for private
connectivity with your on-premises network, which you may set up using
Oracle Cloud Infrastructure FastConnect, IPSec VPN, or both.
Figure 11-10: Hub-Spoke Architecture
Components
The following elements make up the architecture:
On-premises network
This network refers to your company's local network. It is one of the
topology's spokes.
Region
An Oracle Cloud Infrastructure region is a defined geographic area that
includes one or more available domains and data centers. Regions are
autonomous from one another, and great distances can divide them (across
countries or even continents).
Virtual Cloud Network
In an Oracle Cloud Infrastructure area, a VCN is a configurable, software-
defined network that you create. VCNs allow you complete control over your
network environment, just like traditional data center networks. A VCN can
have numerous non-overlapping CIDR blocks that can be changed after the
VCN has been created. A VCN can be divided into subnets, each assigned to
a region or an availability domain. Each subnet comprises a continuous range
of addresses that do not overlap with any of the other VCN subnets. You can
change a subnet's size after its creation. A subnet might be open to the public
or closed to the private.
Security List
You can build security rules for each subnet that specify the source,
destination, and kind of traffic allowed in and out.
Route Tables
Virtual Route Tables (VRTs) includes routing traffic from subnets to
destinations outside of a VCN, usually via gateways.
Dynamic Routing Gateway (DRG)
The DRG is a virtual router that connects a VCN to a network outside the
region, such as a VCN in another Oracle Cloud Infrastructure area, an on-
premises network, or a network hosted by another cloud provider.
Bastion Host
The bastion host is a compute instance that acts as a secure and controlled
entry point into the topology from the outside. In most cases, the bastion host
is set up in a Demilitarized Zone (DMZ). It allows you to safeguard sensitive
data by storing it in private networks not accessible from outside the cloud.
You can monitor and audit the topology because it has a single, well-known
entry point. As a result, you can avoid revealing the topology's more sensitive
components without jeopardizing access to them.
Local Peering Gateway (LPG)
Using an LPG, you can peer one VCN with another VCN in the same region.
Peering refers to the use of private IP addresses by VCNs to communicate
without going over the internet or your on-premises network.
VPN Connect
Site-to-site IPSec VPN connectivity between your on-premises network and
VCNs in Oracle Cloud Infrastructure is provided via VPN Connect. Before
packets are transported from the source to the destination, the IPSec protocol
suite encrypts them and decrypts them when they arrive.
FastConnect
Oracle Infrastructure for the Cloud FastConnect makes setting up a dedicated,
private connection between your data center and Oracle Cloud Infrastructure
a breeze. Compared to internet-based connections, FastConnect offers higher-
bandwidth possibilities and a more stable networking experience.
Considerations
Consider the following criteria while designing a cloud hub-and-spoke
network topology:
Cost
The compute instances and FastConnect are the only components of this
design that cost (port hours and provider charges). The other components are
free of charge.
Security
To safeguard the topology, use proper security techniques.
Scalability
Consider your tenancy's service restrictions for VCNs and subnets. Request
an increase in the limits if different networks are required.
Performance
The amount of VCNs in a region has no bearing on performance. Consider
latency when peering VCNs from different locations. The connection’s
throughput is an additional factor when using spokes linked via VPN Connect
or FastConnect.
Redundancy and Availability
The remaining components, except the instances, have no redundancy
requirements.
HPC Architecture
Introduction
HPC on Oracle Cloud Infrastructure (OCI) provides strong, cost-effective
computing capabilities for solving complicated mathematical and scientific
issues in various industries. OCI's bare metal servers, along with Oracle's
cluster networking, enable ultra-low latency Remote Direct Memory Access
(RDMA) overconvergent Ethernet (RoCE) v2 (two seconds latency over
clusters of tens of thousands of cores).
Architecture
Oracle Cloud Infrastructure's Cluster Networking solution enables HPC
instances to communicate via a high-bandwidth, low-latency network. For
cluster networking, Oracle employs the RDMA over converged ethernet or
RoCEv2 Protocol. Each node in the cluster is a bare-metal computer that is
physically near the others. The latency of RDMA networking between nodes
is less than two microseconds, which is equivalent to on-premises HPC
clusters.
Cluster networks are intended for parallel computing workloads that are
extremely demanding, such as the following:
Simulations of computational fluid dynamics for automotive and
aerospace models
Simulation of a crash
Risk analysis and financial modeling
Simulations in biomedicine
Space exploration trajectory analysis and design
Workloads using artificial intelligence and big data
A bastion or head node is deployed in the reference architecture, as shown in
Figure 11-11, which operates the scheduler, and you can use it as a bastion
server for cluster access.
Depending on your needs, you can establish a visualization node using a
GPU virtual machine (VM) or a bare-metal system. According to our
recommendations, the visualization node should be in the public subnet. For
pre-or post-processing, monitoring, or analyzing the output of simulations,
HPC workloads frequently require visualization tools. Oracle Cloud
Marketplace allows you to deploy an NVIDIA GRID-enabled workstation.
This architecture is implemented via virtual cloud networks, both public and
private (VCNs). Only IPSec VPN, Oracle Cloud Infrastructure FastConnect,
or the public internet are available to the client network to access the head
node and visualization node.
A region with a single availability domain and regional subnets is used in the
architecture. You can use the same design in an area with various availability
domains. Regardless of the available domains, we advocate using regional
subnets for your setup.
You can use Oracle Cloud Marketplace to get these cluster networks or
manually deploy them. In either scenario, we recommend starting with the
baseline reference design and tweaking it to fit your needs.
Components
The following elements make up the architecture:
Region
An Oracle Cloud Infrastructure region is a defined geographic area that
includes one or more available domains and data centers. Regions are
autonomous from one another, and great distances can divide them (across
countries or even continents).
Availability Domains
Within a region, availability domains are freestanding, independent data
centers. Each availability domain's physical resources are segregated from
those in other availability domains, allowing for fault tolerance. Availability
domains do not share the internal availability domain network and
infrastructures such as power and cooling. As a result, a failure in one
availability domain is unlikely to affect the region's other availability
domains.
Fault Domains
Your applications can endure physical server failure, system maintenance,
and power failures within a fault domain when resources are distributed over
many fault domains. A fault domain is a collection of hardware and systems
within an availability domain. Each availability domain is divided into three
fault domains: power and hardware.
VCN and Subnets
In an Oracle Cloud Infrastructure area, a VCN is a configurable, software-
defined network that you create. VCNs allow you complete control over your
network environment, just like traditional data center networks. A VCN can
have numerous non-overlapping CIDR blocks that can be changed after the
VCN has been created. A VCN can be divided into subnets, each assigned to
a region or an availability domain. Each subnet comprises a continuous range
of addresses that do not overlap with any of the other VCN subnets. A
subnet's size can be changed after it has been created. A subnet might be open
to the public or closed to the private.
Bastion Host
The bastion host is a compute instance that acts as a secure and controlled
entry point into the topology from the outside. In most cases, the bastion host
is set up in a demilitarized zone (DMZ). It allows you to safeguard sensitive
data by storing it in private networks not accessible from outside the cloud.
You can monitor and audit the topology because it has a single, well-known
entry point. As a result, you can avoid revealing the topology's more sensitive
components without jeopardizing access to them.
HPC cluster node
These compute nodes, RDMA-enabled clusters, are provisioned and de-
provisioned by the head node (100 Gbps RoCE v2 isolated network). They
process the data in file storage and then return the findings.
Virtualization node
A 2D or 3D application is usually installed on the visualization node to
display and analyze data produced by HPC cluster nodes visually.
Security List
You can build security rules for each subnet that specify the source,
destination, and kind of traffic allowed in and out.
Considerations
Consider these implementation alternatives when building High-Performance
Computing (HPC) on Oracle Cloud Infrastructure.
Performance
Choose the right compute shape with the right bandwidth to get the best
results.
Availability
Based on your deployment requirements and region, consider choosing a
high-availability solution. Using numerous availability domains in an area
and fault domains are two options.
Cost
A bare-metal GPU instance delivers the necessary CPU power for a larger
price. Examine your requirements to determine the best compute shape.
Monitoring and Alerts
Set up CPU and memory use monitoring and notifications for your nodes so
you can scale the shape up or down as needed.
Mind Map
Figure 11-12: Mind Map
Practice Questions
1. Oracle Cloud Architecture (OCI) is a _______ public cloud infrastructure.
A. Open
B. Safe
C. Secure
D. None of the above
2. A region can be made up of one or more ___________.
A. Fault Domain
B. Availability Domains
C. Location
D. All of the above
3. A fault domain is a collection of _____________ and equipment.
A. Hardware
B. Software
C. Both
D. None
4. Which of the following is used for creating a development and production
environment?
A. VCN
B. Hub-Spoke Architecture
C. HPC Architecture
D. None of the Above
5. Fault Domain is a grouping of _____________ and infrastructure within
the AD.
A. Imaginary
B. Real
C. Physical
D. Hardware
6. Which of the following allows developers and IT professionals to do their
deployments?
A. Oracle Architecture Centre
B. Availability Domain
C. VCN
D. Fault Domain
7. A low-latency, high-bandwidth network connects all of the
______________ in an area.
A. FD
B. High Availability domains
C. Availability domains
D. None of above
8. If you want to add High Availability inside the region, you might want to
introduce _________ instance with Oracle Data Guard to another AD.
A. Standby
B. Another
C. Parallel
D. Imaginary
9. Compartments are ___________ collection of related resources.
A. Real
B. Imaginary
C. Physical
D. Logical
10. Which of the following architecture allows traffic to flow from an on-
premises network to the Hub, communicating with a VCN?
A. Hub-spoke
B. Security
C. HPC
D. Hub-hub
11. Each resource can belong to only ___________ compartment.
A. One
B. Two
C. Three
D. Four
12. Resources can be deleted or added to the compartment.
A. Increase or Decrease
B. Deleted or Added
C. Vanish
D. None of the Above
13. Which of the following is used to resolve complex mathematical and
scientific issues?
A. Hub-Spoke Architecture
B. Security
C. HPC Architecture
D. None of the above
14. How many main components of OCI architecture are there?
A. One
B. Five
C. Three
D. Two
15. Which of the following URL is used to navigate to the OCI console?
A. https://cloud.oracle.com
B. https://oracle.cloud.com
C. https://cloud.oracle.net
D. https://cloud.doc.oracle.com
Answers
Chapter 07: Oracle Autonomous Database
1. Answer: D
Explanation: HeatWave is a distributed, scalable, share-nothing in-memory
columnar and query processing engine designed for the fast execution of
analytic queries. It enables you to add a MySQL cluster to your MySQL
database system.
HeatWave parser consists of MySQL database system node and two or more
HeatWave nodes. The MySQL database system node includes a plug-in that
is responsible for cluster management, loading of the data into that
HeatWave cluster, querying schedule, and returning the query results to the
MySQL database system. The HeatWave node stores data in memory and
processes analytics queries. HeatWave nodes consist of an instance of
HeatWave.
2. Answer: A
Explanation Oracle Autonomous Data Warehouse is a cloud data warehouse
service that takes care of all the difficulties of running a data warehouse, dw
cloud, data warehouse center, data security, and data-driven application
development. It automates data warehouse provisioning, configuration,
security, tweaking, scaling, and backup. It comes with tools for self-service
data loading, data transformations, business models, automatic insights, and
built-in converged database capabilities, which make it easier to query
numerous data types and do machine learning research.
3. Answer: C
Explanation: The database transaction in NoSQL is often described in terms
of ACID properties. ACID stands for Automic, Consistency, Isolation, and
Durability. ACID principles ensure database transactions are processed
reliably.
4. Answer: B
Explanation: The Autonomous Database from Oracle Cloud Infrastructure
is a fully managed, preconfigured database environment with four workload
types: Autonomous Transaction Processing, Autonomous Data Warehouse,
Oracle APEX Application Development, and Autonomous JSON Database.
You would not have to manage or configure any hardware, and you will not
have to install any software. You can grow the number of CPU cores or
database storage capacity at any moment after provisioning without affecting
availability or performance.
5. Answer: A
Explanation: Oracle database uses Machine learning-driven automation
which can help you save money up to 90% on monitoring, securing, and
maintaining your Oracle databases. The database is provisioned, scaled and
tuned, protected and patched, and repaired without the need for user
intervention.
6. Answer: B
Explanation: A way to achieve high availability or extreme availability is
by implementing or addressing the fault containment zones. A zone is a
physical location that supports high-capacity network connectivity between
the storage nodes. Each zone has the same level of physical separation from
other zones, such as its power, communication, connection, etc. When
configuring your store, it is strongly recommended that you configure your
store across multiple zones. Having multiple zones provides that fault
isolation increases data availability if a single zone encounters a failure.
7. Answer: D
Explanation: MySQL database service is a very popular open-source
service that is used to store enterprise data. This service is optimized for
OLTP; however, it can perform analytics processing (OLAP).
8. Answer: C
Explanation: There are three options available when deploying the Oracle
cloud datacentre:
Autonomous – Shared: You provision and manage only the Autonomous
database, and Oracle will handle the infrastructure it runs on. It is
supported both for Autonomous Transaction Processing (ATP) database
and Autonomous Data Warehouse (ADW).
Autonomous – Dedicated: You can configure your environment very
similar to the manner that you may currently have in the datacenter. You
have exclusive use of Exadata hardware. As shared, it supports both the
transaction processing and the data warehouse. This feature provides you
flexibility and allows you to have the Oracle database and Autonomous
Database Cloud Service wherever you want and need it.
Cloud@Customer Infrastructure – Oracle provides Cloud@Customer;
you have the Oracle database cloud service running in your datacentre.
You may want that if you require data sovereignty, data regulatory, and
network latency.
9. Answer: A
Explanation: Oracle database security solutions for encryption, key
management, data masking, privileged user access controls, activity
monitoring, and auditing let you assess, detect, and avoid data security
threats. They reduce the risk of a data breach while also making compliance
easier and faster.
10. Answer: D
Explanation: Isolation is considered serializable, meaning that each
transaction is in a distinct order without any transaction occurring in tandem.
Any reads and writes performed on the database will not be impacted by the
other reads or writes of separate transactions occurring on the same database.
Therefore, no transaction will affect others.
11. Answer: C
Explanation: Provides a physically identical replica of the primary database,
including database structures on disk that are block-for-block identical to the
primary database. The database schema is the same, including indexes. Redo
Apply, which recovers the redo data received from the primary database and
applies it to the physical standby database, keeps the physical standby
database synced with the primary database.
On a limited basis, a physical standby database can be utilized for business
objectives other than disaster recovery
12. Answer: A
Explanation: Oracle Database customers can use their existing licenses with
Oracle Cloud Infrastructure using Bring Your Own License (BYOL). It is
worth noting that Oracle Database customers are still responsible for
adhering to the license restrictions that apply to their BYOLs, as specified in
their program order.
13. Answer: E
Explanation: The database is created by Autonomous Database, which also
handles the following maintenance tasks:
Backing up the database
Patching the database
Upgrading the database
Tuning the database
14. Answer: B
Explanation: Oracle's Exadata is a database machine that provides
customers with optimized capabilities for enterprise-level databases and their
associated workloads. Exadata is a Sun Microsystems-developed composite
database server machine that employs Oracle database software and Sun
Microsystems-developed hardware server equipment.
15. Answer: C
Explanation: Fleet administrators allocate budget by department and are
responsible for the creation, monitoring, and management of the
Autonomous Exadata infrastructure, the Autonomous Exadata VM clusters,
and the Autonomous container databases. The fleet administrators must have
an Oracle account or user to perform these duties. The user has permission to
manage these resources and be permitted to use network resources that need
to be specified when you create these other resources.
Chapter 08: Design for Hybrid Cloud Architecture
1. Answer: A
Explanation: Primarily, three building blocks form a physical data center.
Compute – includes server
Network – used for switching, routing security, etc.
Storage – used for storing data
2. Answer: C
Explanation: You can publish IPv6 addresses allocated by Oracle on the
internet for public connection or utilize them only for private connectivity
within and between your Virtual Cloud Networks (VCNs) or on-premises
networks with IPv6 support in OCI (No NAT required). Create and deploy
apps that can communicate through VPN or FastConnect from IPv6
endpoints to IPv6-enabled compute instances and resources linked to on-
premises networks. Your IPv6 customers can also connect to a virtual IP
address for web load balancing and be routed to IPv4 web application
instances. Customers can now make their applications available to IPv6
end-users over the internet.
3. Answer: B
Explanation: Oracle Cloud VMware Solution is based on some of the core
components of VMware Cloud Foundation, vSphere, NSX, and vSAN.
With this integration, you can achieve a wide range of features, like
optimizing east-west traffic, load balancing your workloads, or storage
services like rate protection, deduplication, compression, etc.
4. Answer: D
Explanation: IPv6 addressing model has specific scope in which the device
is defined. A scope is a topological area within the IPv6 address. It can be
used as a unique identifier for the interface or set of interfaces. The scopes
can be:
Global
Site-local
Link-local
5. Answer: B
Explanation: vSphere is a distributed software system with features
enabled by Hypervisor ESXi and a management server, vCenter, working
together.
vSphere enables virtual machines from the hardware by presenting a
complex x86 platform to the virtual machine guest operating system.
6. Answer: C
Explanation: NXS Manager – This node hosts the API services. It also
provides a graphical user interface and REST APIs for creating,
configuring, and monitoring the NXS-T datacenter component.
7. Answer: A and D
Explanation: Oracle and Microsoft have teamed up to deliver Oracle Cloud
and Microsoft Azure with low-latency, private connectivity. This
relationship provides you with a cross-cloud experience that is highly
optimized, safe, and unified.
8. Answer: B
Explanation: In OCVS, the NSX-T overlay manages the traffic flow
between the VM and between the VMs, the other resources, and the
solution.
NSX-T works by implementing three separate integrated planes.
Management
Control
Data
9. Answer: C
Explanation: Control Plane – The control plane computes the runtime
state of the system based on the configuration provided by the management
plane. It is also responsible for disseminating topology information reported
by the data plane elements and pushing the stateless configuration to the
forwarding engine.
NSX-T splits the control plane into two different parts.
Central Control Plane (CCP) – The CCP nodes are implemented as a
cluster of virtual machines, and this form factor provides both
redundancy and scalability of resources. The CCP is logically separated
from all data plane traffic, which means any failure in the control plane
does not affect the existing data plane operation
Local Control Plane (LCP) – The LCP runs on the transport nodes. It is
adjacent to the data plane controlled and connected to the CCP. The
transport nodes are the host that runs the local control plane daemons and
the forwarding engines implemented by the NSX data plane. The LCP is
responsible for programming the forwarding entries and viable rules of
the data plane. NSX Manager and NSX Controller are bundled together
in a virtual machine called the NSX manager appliance
10. Answer: A
Explanation: Tier 0 gateway can support the communication between the
VLAN-backed workload and the back overlay VLAN; however, there could
be scenarios where layer two connectivity is required between the VMs and
the physical devices. For such functionality, NSX-T introduces the NSX-T
Bridge, a service that can be instantiated on edge to connect an NSX-T
logical segment with a traditional VLAN and layer2.
11. Answer: B
Explanation: There are primarily two components of HCX that you start.
HCX Manager
HCX Connector
The HCX manager and HCX connector together build the service mesh. A
service mesh is built using a set of appliances deployed, which creates an
effective service configuration to be used by the source and destination.
HCX interconnect is a mandatory appliance. At the same time, HCX WAN
optimization, Network Extension, and all other appliance are optional.
12. Answer: D
Explanation: Oracle created a VMware-certified Software-Defined Data
Center (SDDC) implementation for usage within Oracle Cloud
Infrastructure in collaboration with VMware. Oracle Cloud Infrastructure
hosts a highly available VMware SDDC in this SDDC installation, dubbed
the Oracle Cloud VMware Solution. It also enables you to migrate all of
your on-premises VMware SDDC workloads to Oracle Cloud VMware
Solution smoothly.
13. Answer: B and E
Explanation: You need to know a few prerequisites before starting the
SDDC provisioning.
Compartment
Virtual Cloud Network
14. Answer: A
Explanation: Mobility Optimized Networking (MON) is an HXC
Enterprise feature.
This feature allows you to route the traffic of a migrated virtual machine
within OCVS without Trombone
A network trombone occurs when all the workloads on an extended
network at the destination are routed through the on-premises router
gateway
MON ensures that the traffic remains symmetric and uses an optimal path
to reach its destination
15. Answer: C
Explanation: vSAN is the hyper-converged storage part of the solution.
The term hyper-converged means having a high-performance NVMe or
“all-flash” based drives attached directly to the bare metal compute and
becomes the primary storage for your VMs.
With having a software-defined storage approach, Oracle can pool these
direct-attached devices across the vSphere cluster to create a
distributed/shared datastore for the VMs.
16. Answer: D
Explanation: A witness node is a dedicated host used to monitor an object's
availability. When you have at least two replicas of an object, and during a
real failure, it can host the data object of that application to be active on
both vSAN fault domains. This can be disastrous to any application.
Therefore, to avoid split-brain conditions, a vSAN witness node is
configured.
17. Answer: B
Explanation: Hybrid Cloud Extension is an application mobility platform
that can simplify the migration of application workloads with rebalancing
and help you achieve business continuity between an on-premises and
Oracle Cloud VMware Solution.
18. Answer: E
Explanation: vMotion transfer captures the virtual machine’s active
memory, its execution state, its IP address and MAC address, and its
transfer to the destination. It is also referred to as the live migration feature
of VMware, and therefore, there is no downtime for the VM.
Chapter 09: Migrate On-Premises Workloads to OCI
1. Answer: C
Explanation: Each data transfer appliance enables organizations to migrate
up to 150 terabytes of data. The appliance should be configured and
connected to the on-premises network. After creating a transfer job, the
appliance can be requested via the Oracle Cloud Infrastructure Management
console.
2. Answer: A
Explanation: Data Transfer Disk is an offline data transfer solution. This
service allows the customer to use their own SATA or USB drive and send
up to 10 drives and 100 terabytes of data per transfer package to the Oracle
data transfer site. Then, site operators upload the files into the organization’s
designated object storage bucket. Users are free to move the uploaded data
into other Oracle Cloud Infrastructure (OCI) services as needed.
3. Answer: B
Explanation: ZDM adheres to Oracle's Maximum Availability Architecture
(MAA) principles and includes tools like GoldenGate and Data Guard to
assure High Availability, as well as an online migration strategy that makes
use of technologies like Recovery Manager, Data Pump, and Database Links.
4. Answer: A
Explanation: Zero Downtime Migration service provides two ways to
migrate data from source to target.
Physical online migration
Logical online migration
5. Answer: C
Explanation: Once a secure connection has been established, the
organizations can use OCI Storage Gateway to securely create copies of on-
premises files and place them into the Oracle Cloud Object Storage without
modifying the applications.
6. Answer: D
Explanation: Migration methods provide optimum performance in the
Oracle with the least cost. Oracle supports both offline and online
migrations. The core use cases are to get various on-premises and third-party
cloud databases into the cloud.
Additionally, Oracle is based on Zero Downtime Migration and uses
GoldenGate and Data Pump as the core technologies underneath. When
selecting a migration method for moving your database to the cloud, take the
following into consideration:
Database Version
Database Size
High Availability (HA)
7. Answer: B
Explanation: Oracle provides six different data sources from the source to
the target database.
Offline Migration
Online Migration
Physical Migration
Logical Migration
Direct Migration
Indirect Migration
8. Answer: A
Explanation: In online migration, you do a one-time snapshot, and at the
same time, you will also start replications. Anything that changes to your
source databases will be continuously replicated with the target. Therefore,
your application can stay online, and at that moment, you are doing the
cutover when you have downtime.
9. Answer: D
Explanation: Zero Downtime Migration automates the whole migration
process, significantly minimizing the risk of human error. ZDM uses Oracle
Database-integrated High Availability (HA) technologies.
10. Answer: C
Explanation: Oracle GoldenGate is a piece of software that allows you to
replicate, filter, and alter data between databases.
11. Answer: B
Explanation: DMS is free for all the common use cases and what is
included in the pricing is the service itself. All the service's environment and
the infrastructure that the service runs on. There is a GoldenGate
marketplace license specific for migration, and it is free for the first six
months.
12. Answer: A
Explanation: Database Migration is a managed cloud service that runs
independently of your tenancy and resources. The service communicates
with your resources using Private Endpoints (PEs) and runs as a multitenant
service under a Database Migration service tenancy. Database Migration is
in charge of managing PEs.
13. Answer: D
Explanation: The validation Job verifies that the prerequisites and
connection for the source and target databases, Oracle GoldenGate instances,
and Oracle Data Pump are correct. When you assess the migration, a
validation job is produced.
14. Answer: B
Explanation: Once you continue from there, you will go to another phase
called switchover. At that point, the user deactivates the source applications.
The user waits for the switchover to complete, and the switchover phase will
apply any leftover transactions. After it is completed, a user can activate the
target application.
15. Answer: A
Explanation: Agent contains the information needed to link Oracle Cloud
Infrastructure to a source database that is not directly accessible on OCI,
such as a database in a different region or tenancy, an on-premises database,
or a cloud database that was manually deployed.
Chapter 10: Design for Security and Compliance
1. Answer: A and B
Explanation: Oracle is responsible for the security of the underlying cloud
infrastructure (such as datacenter facilities, hardware, and software systems),
while you are responsible for securing your workloads and configuring your
services (such as compute, network, storage, and database) securely in a
shared, multi-tenant compute environment.
2. Answer: D
Explanation: In Oracle, Identity and Access Management (IAM) service
can:
Manage user access and policies
Manage Multi-Factor Authentication (MFA)
Single sign-on to identity providers
3. Answer: C
Explanation: There are three user types available. These are:
Federated User
Local User
Provisioned/Synchronized User
4. Answer: A
Explanation: The Oracle Cloud Infrastructure Web Application Firewall
(WAF) is a global security solution protecting applications from dangerous
and undesirable internet traffic. It is cloud-based and PCI compliant. WAF
may secure any internet-facing endpoint by enforcing the same set of rules
across all of a customer's apps.
5. Answer: B
Explanation: Bastions allows authorized users to connect to target resources
using Secure Shell (SSH) sessions from defined IP addresses. Users can
communicate with the target resource using any software or protocol that
SSH supports once connected. To connect to a Windows host, for example,
you can use the Remote Desktop Protocol (RDP), or to connect to a
database, you can utilize Oracle Net Services.
6. Answer: C
Explanation: The whole configuration of your WAF service, including
origin management, protection rule settings, and bot detection features, is
referred to as WAF policies.
7. Answer: D
Explanation: Federated users select which identity provider they want to
use for sign-in and are then redirected to that identity provider's sign-in
experience for authentication. After inputting their login and password, the
Identity Provider (IdP) authenticates them and redirects them back to the
Oracle Cloud Infrastructure Console.
8. Answer: A
Explanation: In real-time, Oracle Cloud Infrastructure WAF uses a
sophisticated DNS data-driven algorithm to select the optimum global
POINT OF PRESENCE (POP) to serve a specific user. As a result, users are
routed to avoid global network difficulties and potential latency while
receiving the finest uptime and service levels available.
9. Answer: B
Explanation: CAPTCHA protection can be used to restrict access to a URL
that humans should only visit. You can also personalize the CAPTCHA
challenge remarks for each URL.
10. Answer: D
Explanation: The WAF service has numerous features that allow you to
detect bot traffic and either ban or allow it to access your web apps.
JavaScript Challenge, CAPTCHA Challenge, and GoodBot whitelists are
some of the bot control tools.
11. Answer: C
Explanation: The Oracle sign-up process creates your users in two different
identity systems.
Oracle Identity Cloud Service (IDCS)
Oracle Cloud Infrastructure’s own native identity system called Identity
and Access Management (IAM) service
12. Answer: A
Explanation: A federated user is someone who signs in to use the OCI
console through a federated IdP. These users are created and managed by an
admin in the IdP and use SSO sign-in to the console.
The federated users are granted access to OCI based on their membership in
groups mapped to the OCI groups.
13. Answer: D
Explanation: Identity and Access Management (IAM) for Oracle Cloud
Infrastructure allows you to manage who has access to your cloud resources.
You can manage which users have access to certain resources and what kind
of access they have.
14. Answer: B
Explanation: You can develop and maintain rules for internet threats,
including Cross-Site Scripting (XSS), SQL Injection, and other OWASP-
defined vulnerabilities using WAF. Unwanted bots can be mitigated, while
desired bots can be admitted tactically. Access rules can be set up to restrict
access based on location or the request's signature.
15. Answer: C
Explanation: Actions are items that represent one or more of the following:
Allow: An action that skips all remaining rules in the current module if a
matching rule is found
Check: An action that does not halt the current module's rule execution.
Instead, it creates a log message that records the outcome of rule
execution
Return HTTP response: This action returns a specific HTTP response
Chapter 11: Real-World Architecture
1. Answer: C
Explanation: Oracle's Cloud Architecture (OCI) is a secure public cloud
infrastructure designed for mission-critical workloads.
2. Answer: C
Explanation: A region's Availability Domain (AD) comprises one or more
data centers. Three availability domains make up a region.
3. Answer: A
Explanation: A fault domain is a collection of hardware and systems within
an availability domain.
4. Answer: B
Explanation: The core component of a hub-and-spoke network, also known
as a star network, is connected to several networks around it. The overall
architecture resembles a wheel, with many spokes connecting a central hub
to spots along the wheel's periphery. This type of architecture can be used for
creating a development and production environment that is separate. Setting
up this topology in a standard on-premises data center can be costly.
However, there is no additional expense in the cloud.
5. Answer: D
Explanation: A fault domain is a collection of hardware and systems within
an availability domain. There are three fault domains in each availability
domain. Within a single availability domain, fault domains allow you to
distribute your instances such that they are not all on the same physical
hardware.
6. Answer: A
Explanation: The Oracle Architecture Centre is a resource library that
allows developers and IT professionals to optimize and personalize their
cloud, hybrid, and on-premises deployments.
7. Answer: C
Explanation: Availability Domains are fault-tolerant, segregated Oracle
data centers that house cloud resources, including instances, volumes, and
subnets. There are multiple Availability Domains in a region.
8. Answer: A
Explanation: If you add High Availability inside the region, you might want
to introduce a standby instance with Oracle Data Guard to another
availability domain.
9. Answer: D
Explanation: Compartments enable you to structure your resources to
delegate cost restrictions and administrative access. These logical containers
hold your resources, are not bound to a certain data center, and span multiple
datacenters. A compartment holds all of the resources.
10. Answer: A
Explanation: Security lists are utilized to regulate network traffic to and
from each subnet. Every subnet has a routing table with rules for routing
traffic to destinations outside the VCN.
The hub VCN includes an internet gateway for network traffic to and from
the public internet and a dynamic routing gateway (DRG) for private
connectivity with your on-premises network, which you may set up using
Oracle Cloud Infrastructure FastConnect, IPSec VPN, or both.
11. Answer: A
Explanation: A resource must belong to only one compartment.
12. Answer: B
Explanation: It is possible to add and delete the resource in the
compartment.
13. Answer: C
Explanation: HPC on Oracle Cloud Infrastructure (OCI) provides strong,
cost-effective computing capabilities for solving complicated mathematical
and scientific issues in various industries. OCI's bare metal servers, along
with Oracle's cluster networking, enable ultra-low latency Remote Direct
Memory Access (RDMA) overconvergent Ethernet (RoCE) v2 (two seconds
latency over clusters of tens of thousands of cores).
14. Answer: B
Explanation: In the architecture of OCI, there are several main components,
which are essential for anyone who is getting started with it.
Regions
Availability Domains
Fault Domains
High Availability Design
Compartments
15. Answer: A
Explanation: To navigate to the Oracle Cloud Infrastructure Console, you
should use https://cloud.oracle.com.
Acronyms