Cloud

This topic explains the required steps to connect to Exadata VM Cluster, Exadata Database, and Autonomous AI Database.

  • Obtain Exadata Infrastructure Networking Details
    1. From the Azure Portal, select Oracle Database@Azure, and then select Oracle Exadata Database Service on Dedicated Infrastructure.
    2. Select the Oracle Exadata VM Clusters tab, and then select your Exadata VM Cluster by selecting the VM Cluster Name link.
    3. From the Overview page, select the Go to OCI link.
    4. From the OCI console, select Exadata VM Clusters and then select Virtual machines tab.
    5. Take a note of the Private IP address listed in the Private IP address (IPv4) column from the list of Virtual Machines.

    Connect to the Exadata VM Cluster (using SSH)

    This topic explains the required steps to create an Azure Virtual Machine instance within the same Virtual Network as Exadata VM Cluster, get SSH key pair and configure connectivity to Exadata VM Cluster through the Virtual Machine.
    1. Create an Azure Virtual Machine Instance
      1. Create an Azure Virtual Machine instance in a virtual network with port 22 connectivity to the delegated subnet where your Exadata VM Cluster resides.
      2. Assign a Dynamic IP (Public IP) address to your Azure Virtual Machine instance.
      3. Download and securely store the SSH private key (.pem) file generated during the Azure Virtual Machine instance creation process.
    2. Connect to Azure Virtual Machine
      1. Based on your operating system, complete the following substeps:
        1. Mac OS:
          1. Run the following command from your terminal to change your directory to the location where your PEM key is stored:
            cd /path/to/your/pem/file
          2. Run the following command from your terminal to modify the permissions of your .pem file to restrict access:
            chmod 400 DemoClient.pem
            Note

            Replace the DemoClient.pem with your file name before running the command.
          3. Run the following command to use the Public IP to connect to Azure Virtual Machine instance.
            ssh -i DemoClient.pem azurevm-user@<Azure-Public-IP>
            Note

            Replace <Azure-Public-IP> with the Public IP of your Azure Virtual Machine instance before running the command.
          4. Once you log into your Azure Virtual Machine instance, run the following command on the Azure Virtual Machine.
        2. Windows:
          1. Run the following command from your PowerShell or Command Prompt to change your directory to the location where your .pem file is stored:
            cd "C:\path\to\your\pem\file"
          2. Check the permissions. This step is optional.
            Note

            Windows doesn’t use the chmod command. Hoewever, you can ensure that only your user account has access to the PEM file. Right-click the file, select Properties, and then navigate to the Security tab to adjust the permissions.
          3. Run the following SSH command.
             ssh -i DemoClient.pem azurevm-user@<Azure-Public-IP>
            Note

            • Replace the DemoClient.pem with your file name before running the command.
            • Replace <Azure-Public-IP> with the Public IP of your Azure Virtual Machine instance before running the command.
          4. Once you log into your Azure Virtual Machine instance, run the following command on the Azure Virtual Machine.
    3. Connect from Azure Virtual Machine to Exadata VM Cluster Using SSH
      1. Copy your Exadata VM Cluster's private key into the Azure Virtual Machine instance.
      2. Change your directory to the location where your private key file is copied.
      3. Run the following command from your terminal to change the permissions of your private key to give only the owner read access and restrict access for all other users and groups.
        chmod 400 DemoExadataVm1.pem
        Note

        Replace the DemoExadataVm1.pem with your file name before running the command.
      4. Run the following command to connect to your VM using the Private IP address of your cluster.
        ssh -i ~/DemoExadataVm1.pem <exadata_user>@<Exadata-VM-Private-IP>
        Note

        • Replace <exadata_user> with your user information that you have for your Exadata before running the command.
        • Replace <Exadata-Private-IP> with your Private IP address of Exadata VM Cluster before running the command.
  • Add a New Rule to the Security Group
    1. From the Azure Portal, select the Virtual machines service.
    2. From the Virtual machines list, select the VM Name link.
    3. From the left menu, expand the Networking section and then select Network settings.
    4. Scroll down to the Rules section, and then expand the Outbound port rules section to review the Outbound rules.
    5. If a default rule allowing Virtual Network to Virtual Network connectivity on any port and any protocol is already configured, no further action is needed.
      1. Otherwise, click Create port rule and select Outbound port rule.
      2. On the Add outbound rules page, complete the following steps:
        1. From the Destination dropdown list, select IP Address, and enter your CIDR range in Destination IP addresses/CIDR ranges.
        2. From the Service list, select Custom.
        3. For Destination port ranges, enter 1521.
        4. For Protocol, select TCP.
        5. Enter a Priority number to ensure the rule is applied before any deny rules.
        6. Enter a Name to identify the rule.
        7. The Description field is optional. You can enter a description to help identify the rule.
        8. Review your information and select Add to save the rule.This screenshot shows how to add port rule.
    6. Review your information, and then select the Save Rules button.

    To learn how to add Outbound rule for Azure Virtual Network security group, see Configure security group rules.

    Connect from SQL Developer to Exadata Database
    • Ensure your Windows Virtual Machine instance can reach the Exadata Database Server.
    • Test basic connectivity. Since ping won’t work (as it uses ICMP, not TCP), you can use tools like tnsping, or telnet to port 1521/1522, or test with SQL*Plus.
    1. Launch the SQL Developer application and select the + icon to create a new database connection.
    2. To configure SQL Developer, complete the following substeps:
        1. In the Name field, enter the Name to use for this database connection.
        2. In the Database Type field, select Oracle.
        3. In the Username field, enter the name of the user for whom this database connection is being created. For example, you can enter ADMIN.
        4. In the Password field, enter the password of the user.
        5. In the Role field, select the default role to assign to the user.
        6. Select the Save Password checkbox if your security rules allow.
        7. In the Connection Type field, select the Basic option as your database connection type.
        8. Enter the Hostname information by providing your Exadata Database private IP address.
        9. You can enter 1521 as the Port information or provide your listener port.
        10. Enter a descriptive Service name.
        11. Select the Test button. The Status at the bottom of the connections list should show Success. If the connection is not successful, the wallet may be out of date or the Exadata Database may not be running.
        12. Once the connection is successful, select the Save button.
        This screenshot shows how to configure SQL Developer.
  • Prerequisites:
    • To connect to Autonomous AI Database from SQL Developer, ensure that the Azure Virtual Machine instance has an egress rule allowing outbound traffic on port 1521.
    • Download and install SQL Developer on the Azure Virtual Machine instance.
    There are two ways to connect to your Autonomous AI Database:
    1. Using a Wallet import.
    2. Using manual TNS configuration.
    1. Using a Wallet Import
      1. To download the Wallet, complete the following substeps:
        1. Navigate to the OCI console, select Oracle Database, and then select Autonomous AI Database on Dedicated Infrastructure.
        2. From the left menu, select Autonomous AI Database, and then select your Compartment.
        3. From the list, select the database that you want to connect.
        4. Select the Database connection button, and then select the Download wallet button.
        5. On the Download wallet page, enter a wallet password in the Password field and confirm the password in the Confirm password field.
        6. Select Download to save the client security credentials zip file. By default the file name is: Wallet_ databasename .zip. You can save this file as any file name you want.
      2. To transfer the wallet to , complete the following substeps:
        1. Upload the Wallet_<dbname>.zip file to your Windows instance.
          Note

          You can use RDP file copy, WinSCP, Amazon S3, or any other secure method.
        2. Save the file an accessible directory. For example: C:\ADB_Wallet\
      3. To extract the wallet, complete the following substeps:
        1. Right-click the .zip file, and then select Extract All.
        2. Make sure that the folder contain the following files:
          1. cwallet.sso
          2. ewallet.p12
          3. sqlnet.ora
          4. tnsnames.ora
          5. tnsnames.ora
          6. tnsnames_connection_string.txt
          7. truststore.jks
      4. To review tnsnames.ora, complete the following substeps:
        1. Launch the tnsnames.ora file in Notepad.
        2. Note the service names. For example :
          <dbname>_high = (description= (address=(protocol=tcps)(port=1522)(host=<adb_host>)) (connect_data=(service_name=<dbname>_high.adb.<region>.oraclecloud.com)) (security=(ssl_server_dn_match=yes)))

        These service names (_low, _medium, _high, _tpurgent) correspond to workload profiles.

      5. To configure SQL Developer, complete the following substeps:
          1. In the Name field, enter the Name to use for this database connection.
          2. In the Database Type field, select Oracle.
          3. In the Username field, enter the name of the user for whom this database connection is being created. For example, you can enter ADMIN.
          4. In the Password field, enter the password of the user.
          5. In the Role field, select the default role to assign to the user.
          6. Select the Save Password checkbox if your security rules allow.
          7. In the Connection Type field, select the Cloud Wallet option as your database connection type.
          8. From the Configuration File dropdown list, select your wallet that you previously downloaded.
          9. From the Service dropdown list, select your service that you are using.
          10. Select the Test button to test that the data your provided will allow the specified user to connect to the database.
            Note

            The Status must show the Success message. If the connection is not successful, it may be because the wallet is out of date or your ADB is not currently running.
          11. When it is complete, select the Save button, and then select the Connect button.
          This screenshot shows the steps how to connect to Autonomous Database.
    2. Using Manual TNS Configuration
      Note

      There are prerequisites that must be completed for the manual connection. You need to complete the following:
      • You must obtain the IP address, and database service name to connect. For more information, see Cloud.
      • You must obtain the service name from the tnsnames.ora file. For more information, see Step 4 in the Using a Wallet Import section.
      1. Launch the Oracle SQL Developer application, and then select the green plus (+) button .
      2. To configure your database connection, complete the following substeps:
        1. In the Name field, enter the Name to use for this database connection.
        2. In the Database Type field, select Oracle.
        3. In the Username field, enter the name of the user for whom this database connection is being created. For example, you can enter ADMIN.
        4. In the Password field, enter the password of the user.
        5. In the Role field, select the default role to assign to the user.
        6. Select the Save Password checkbox if your security rules allow.
        7. In the Connection Type field, select the Basic option as your database connection type.
        8. From the Details tab, enter your Hostname, Port and Service name.
        9. Select the Test button to test that the data your provided will allow the specified user to connect to the database.
          Note

          The Status must show the Success message. If the connection is not successful, it may be because the wallet is out of date or your Exadata is not currently running.
        10. When it is complete, select the Save button, and then select the Connect button.
        This screenshot shows the steps of manual TNS configuration.