A Autonomous JSON Database for Experienced Oracle Database Users

This appendix provides information on using Autonomous JSON Database for experienced Oracle Database users with Autonomous Database on shared Exadata infrastructure.

For equivalent information about using Oracle Database features and options with Autonomous Database on dedicated Exadata infrastructure, see Oracle Database Features in Dedicated Autonomous Database Deployments.

Autonomous Database – Oracle Database Features

Autonomous JSON Database includes features that:

  • Automate index management tasks, such as creating, rebuilding, and dropping indexes based on changes in the application workload.

    See Manage Automatic Indexing on Autonomous Database in Using Oracle Autonomous Database on Shared Exadata Infrastructure for more information.

    Note:

    There are restrictions for Automatic Indexing when you use JSON data with Autonomous JSON Database. See SODA Notes for more information.
  • Gather real-time statistics automatically while a conventional DML workload is running. Because statistics can go stale between stats gathering jobs, online statistics gathering for conventional DML helps the optimizer generate more optimal plans. Online statistics aim to reduce the possibility of the optimizer being misled by stale statistics.

    See Real-Time Statistics for more information.

  • Gather statistics automatically on a more frequent basis. High-Frequency Automatic Optimizer Statistics Collection complements the standard statistics collection job. By default, the collection occurs every 15 minutes, meaning that statistics have less time in which to be stale. High-Frequency Automatic Optimizer Statistics Collection is enabled by default.

    See Configuring High-Frequency Automatic Optimizer Statistics Collection for more information.

  • Quarantine execution plans for SQL statements, for example, statements that are terminated by the Resource Manager for consuming excessive system resources in an Oracle Database. Automatic SQL Quarantine based on Resource Manager consumption limit violations is disabled by default but any manually quarantined SQL statement will be honored.

    See Quarantine for Execution Plans for SQL Statements Consuming Excessive System Resources for more information.

  • Automatically assess the opportunity for SQL plan changes to improve the performance for known statements.

    See Managing the SPM Evolve Advisor Task for more information.

  • Apache ORC format is supported in Autonomous Database for loading and querying data in object store.

    See Create Credentials and Load Data Pump Dump Files into an Existing Table and Query External Data with ORC, Parquet, or Avro Source Files in Using Oracle Autonomous Database on Shared Exadata Infrastructure for more information.

  • Complex types are supported in Autonomous Database for ORC, Avro, and Parquet structured files.

    See DBMS_CLOUD Package ORC, Parquet and Avro Complex Types in Using Oracle Autonomous Database on Shared Exadata Infrastructure for more information.

Initialization Parameters

Autonomous Database configures database initialization parameters automatically when you provision a database. You do not need to set any initialization parameters to start using your service. But, you can modify some parameters if you need to.

List of Initialization Parameters that can be Modified

APPROX_FOR_AGGREGATION
APPROX_FOR_COUNT_DISTINCT
APPROX_FOR_PERCENTILE
AWR_PDB_AUTOFLUSH_ENABLED
CONTAINER_DATA
CURRENT_SCHEMA (Allowed only with ALTER SESSION)
CURSOR_SHARING
DDL_LOCK_TIMEOUT
FIXED_DATE
LDAP_DIRECTORY_ACCESS
MAX_IDLE_TIME
MAX_STRING_SIZE (See Data Types for details)
NLS_CALENDAR
NLS_COMP
NLS_CURRENCY
NLS_DATE_FORMAT
NLS_DATE_LANGUAGE
NLS_DUAL_CURRENCY
NLS_ISO_CURRENCY
NLS_LANGUAGE
NLS_LENGTH_SEMANTICS
NLS_NCHAR_CONV_EXCP
NLS_NUMERIC_CHARACTERS
NLS_SORT
NLS_TERRITORY
NLS_TIME_FORMAT
NLS_TIME_TZ_FORMAT
NLS_TIMESTAMP_FORMAT
NLS_TIMESTAMP_TZ_FORMAT
OPTIMIZER_CAPTURE_SQL_PLAN_BASELINES  (Allowed only with ALTER SESSION)
OPTIMIZER_IGNORE_HINTS
OPTIMIZER_IGNORE_PARALLEL_HINTS
OPTIMIZER_MODE
PLSCOPE_SETTINGS
PLSQL_CCFLAGS
PLSQL_DEBUG
PLSQL_OPTIMIZE_LEVEL
PLSQL_WARNINGS
QUERY_REWRITE_INTEGRITY
RESULT_CACHE_MODE
SESSION_EXIT_ON_PACKAGE_STATE_ERROR
SQL_TRACE (Allowed only with ALTER SESSION) See Perform SQL Tracing on Autonomous Database for details.
STATISTICS_LEVEL (Allowed only with ALTER SESSION)
SYSDATE_AT_DBTIMEZONE (Allowed only with ALTER SESSION)
TIME_ZONE (Allowed only with ALTER SESSION)

For more information on initialization parameters see Oracle Database Reference. For more information on TIME_ZONE, see Oracle Database SQL Language Reference.

For more information on OPTIMIZER_IGNORE_HINTS and OPTIMIZER_IGNORE_PARALLEL_HINTS, see Manage Optimizer Statistics on Autonomous Database.

SQL Commands

Autonomous Database allows most of the SQL commands available in Oracle Database. To ensure the security and the performance of Autonomous Database, some SQL commands are restricted.

This section provides a list of SQL command limitations that are required to protect security and for the performance integrity of Autonomous Databases. Most of the standard SQL and PL/SQL syntax and constructs available with Oracle Database work in Autonomous Databases.

Note:

If you try to use a restricted SQL command the system reports:

ORA-01031: insufficient privileges

This error indicates that you are not allowed to run the SQL command in Autonomous JSON Database.

The following SQL statements are not available in Autonomous Database:

  • ADMINISTER KEY MANAGEMENT: By default Autonomous Database uses Oracle-managed encryption keys. Using Oracle-managed keys, Autonomous Database creates and manages the encryption keys that protect your data and Oracle handles rotation of the TDE master key.

    If you want customer-managed keys, a master encryption key in the Oracle Cloud Infrastructure Vault is used to generate the TDE master key on Autonomous Database. See Managing Encryption Keys on Autonomous Database for more information.

  • CREATE TABLESPACE, ALTER TABLESPACE, and DROP TABLESPACE: Autonomous Database automatically configures default data and temporary tablespaces for the database. Adding, removing, or modifying tablespaces is not allowed. Autonomous Database creates one tablespace or multiple tablespaces automatically depending on the storage size.

  • CREATE DATABASE LINK

    Use DBMS_CLOUD_ADMIN.CREATE_DATABASE_LINK to create database links in Autonomous JSON Database. See Create Database Links from Autonomous Database to Other Databases for more information.

  • CREATE LIBRARY

SQL Statements with Restrictions in Autonomous Database

The following DDL statements are available in Autonomous Database with some restrictions:

SQL Command Restrictions

ALTER PLUGGABLE DATABASE and ALTER DATABASE

Only the following clauses are allowed:

DATAFILE AUTOEXTEND ON

DATAFILE AUTOEXTEND OFF

DATAFILE RESIZE

DEFAULT EDITION

SET TIME_ZONE

SET CMU_WALLET

ALTER PROFILE

Using ALTER PROFILE, there are restrictions for a user defined PASSWORD_VERIFY_FUNCTION. See Managing Password Complexity on Autonomous Database for more information.

Using ALTER PROFILE, the optional CONTAINER clause is ignored if specified.

See Create Users on Autonomous Database for information on the password parameter values defined in the default profile.

ALTER SESSION

Only the following clauses are allowed:

ADVISE COMMIT, ADVISE ROLLBACK, ADVISE NOTHING

CLOSE DATABASE LINK

ENABLE COMMIT IN PROCEDUREDISABLE COMMIT IN PROCEDURE

ENABLE PARALLEL <QUERY|DDL|DML>, DISABLE PARALLEL <QUERY|DDL|DML>, FORCE PARALLEL <QUERY|DDL|DML>

ENABLE RESUMABLE, DISABLE RESUMABLE

SET CONSTRAINTS

SET CURRENT_SCHEMA

SET DEFAULT_COLLATION

SET EDITION

SET ISOLATION_LEVEL

SET OPTIMIZER_CAPTURE_SQL_PLAN_BASELINES

SET ROW ARCHIVAL VISIBILITY

SET STATISTICS_LEVEL

SET TIME_ZONE

ALTER SYSTEM

ALTER SYSTEM is not allowed except ALTER SYSTEM SET and ALTER SYSTEM KILL SESSION

SET can only be used to set parameters listed in Initialization Parameters.

ALTER USER

The following clause is ignored: DEFAULT TABLESPACE

The IDENTIFIED with the EXTERNALLY clause is not supported.

The IDENTIFIED BY VALUES clause is not allowed.

ALTER TABLE

For restrictions, see ALTER TABLE Restrictions.

CREATE PROFILE

PASSWORD_VERIFY_FUNCTION

Using ALTER PROFILE, the optional CONTAINER clause is ignored if specified.

See Create Users on Autonomous Database for information on the password parameter values defined in the default profile.

CREATE TABLE

For restrictions, see CREATE TABLE Restrictions.

CREATE USER

The following clause is ignored:

  • DEFAULT TABLESPACE

IDENTIFIED with the EXTERNALLY clause is not supported.

The IDENTIFIED BY VALUES clause is not allowed.

CREATE TABLE Restrictions

XMLType tables using XML schema-based storage are not allowed. See Oracle XML DB for more information.

The clauses not in this list are allowed.

Clause Comment

cluster

Ignored

ilm_clause

Ignored

inmemory_table_clause

Ignored

LOB_storage_clause

The LOB_compression_clause is recognized. Other LOB_storage_clause parameters are ignored.

See LOB_compression_clause for more information.

logging_clause

Ignored

organization external

Ignored

organization index

Creates a regular table with a primary key. Using the organization index clause does not create an index-organized table. You should test and verify the performance of the generated table for your application.

physical_properties

Ignored

Note:

For more information on CREATE TABLE, see Database SQL Language Reference.

ALTER TABLE Restrictions

The clauses not in this list are allowed.

Clause Comment

allocate_extent_clause

Ignored

alter_iot_clauses

Ignored

deallocate_unused_clause

Ignored

ilm_clause

Ignored

inmemory_table_clause

Ignored

logging_clause

Ignored

modify_LOB_storage_clause

Ignored

physical_attributes_clause

Ignored

shrink_clause

Ignored

Note:

For more information on ALTER TABLE, see Database SQL Language Reference.

Data Types

Autonomous Database allows most of the data types available in Oracle Database. To ensure the security and the performance of Autonomous Database, some data types are restricted.

The following data types are not supported or have limited support in Autonomous Database:

  • Large Object (LOB) data types: only SecureFiles LOB storage is supported. BasicFiles LOBs are automatically converted to SecureFiles LOBs.

  • Media types are not supported (Oracle Multimedia is desupported)

Checking and Setting MAX_STRING_SIZE

By default Autonomous JSON Database uses extended data types and the value of MAX_STRING_SIZE is set to the value EXTENDED. With this setting you can specify a maximum size of 32767 bytes for the VARCHAR2, NVARCHAR2, and RAW data types. The default, EXTENDED, is the recommended setting and allows Autonomous Database to take full advantage of database capabilities.

Use DBMS_MAX_STRING_SIZE subprograms to check usage of extended data types and to change the database to revert to the older style STANDARD, supporting a maximum size of 4000 bytes for VARCHAR2, NVARCHAR2, and RAW data types.

Note:

Using DBMS_MAX_STRING_SIZE.MODIFY_MAX_STRING_SIZE is a one-way change that cannot be reverted. After a database is switched back to the STANDARD style of supporting a maximum length of 4000 bytes for the VARCHAR2, NVARCHAR2, and RAW data types, you cannot re-enable EXTENDED data types.

The ADMIN user is granted EXECUTE privilege WITH GRANT OPTION clause on DBMS_MAX_STRING_SIZE. Oracle recommends that you do not GRANT EXECUTE on this package to other users.

  1. Check whether your environment can be reverted to the old style, STANDARD behavior:

    SELECT * FROM TABLE(DBMS_MAX_STRING_SIZE.CHECK_MAX_STRING_SIZE('STANDARD'));

    See CHECK_MAX_STRING_SIZE Function in Using Oracle Autonomous Database on Shared Exadata Infrastructure for more information.

  2. Check and correct all reported violations from Step 1, if applicable.

  3. After fixing any reported violations found in Step 1, if you want to revert to a maximum length of 4000 bytes for VARCHAR2, NVARCHAR2, and RAW data types, use DBMS_MAX_STRING_SIZE.MODIFY_MAX_STRING_SIZE as follows:

    EXEC DBMS_MAX_STRING_SIZE.MODIFY_MAX_STRING_SIZE('STANDARD');

    See MODIFY_MAX_STRING_SIZE Procedure in Using Oracle Autonomous Database on Shared Exadata Infrastructure for more information.

See Extended Data Types for details on extended data types.

For a list of Oracle data types see Oracle Database SQL Language Reference.

PL/SQL Packages

Notes for Oracle Database PL/SQL packages in Autonomous Database.

Unavailable PL/SQL Packages

  • DBMS_DEBUG

  • DBMS_DEBUG_JDWP

  • DBMS_DEBUG_JDWP_CUSTOM

  • UTL_INADDR

PL/SQL Packages Notes

  • DBMS_LDAP

    • Specifying an IP address in the host name is not allowed.

    • The only allowed port is 636.

    • The SSLWRL and SSLWALLETPASSWD arguments to the OPEN_SSL procedure are ignored. The default value for the SSLWRL property is set to the wallet that is used by UTL_HTTP and DBMS_CLOUD for making outbound web requests on Autonomous Database.

    • DBMS_LDAP usage is audited by default. You cannot disable auditing for DBMS_LDAP.

    • The LDAP servers must be accessible from Autonomous Database through the public internet and the port 636 of the LDAP servers must be open to Autonomous Database in Oracle Cloud Infrastructure, so that Autonomous Database can have secured LDAP access over TLS/SSL to the LDAP servers through the internet.

    • SSL/TLS is enforced for all communication happening between LDAP server and Autonomous Database.

  • UTL_HTTP

    • Connections through IP addresses are not allowed.

    • Only HTTPS connections are allowed (HTTP and HTTP_PROXY are disallowed).

    • All web services must be secured. The only allowed port is 443.

      Your instance is preconfigured with an Oracle Wallet that contains more than 90 of the most commonly trusted root and intermediate SSL certificates. This Oracle Wallet is centrally managed and therefore you cannot consume 3rd party web services that are protected using self-signed SSL certificates.

    • The SET_PROXY and SET_AUTHENTICATION_FROM_WALLET procedures are disallowed.

    • The WALLET_PATH and WALLET_PASSWORD arguments for the CREATE_REQUEST_CONTEXT, REQUEST, and REQUEST_PIECES procedures are ignored.

    • Oracle Wallet configuration cannot be altered. All arguments for SET_WALLET procedure are ignored.

    • UTL_HTTP usage is audited by default. You cannot disable auditing for UTL_HTTP.

  • UTL_SMTP

    • The only supported email provider is Oracle Cloud Infrastructure Email Delivery service. See Overview of the Email Delivery Service for more information.

    • Mail with an IP address in the host name is not allowed.

    • The only allowed ports are 25 and 587.

    • UTL_SMTP usage is audited by default. You cannot disable auditing for UTL_SMTP.

  • UTL_TCP

    • The IP address is not allowed in the host name.

    • The only allowed ports are: 443 (HTTP) 25 and 587 (SMTP).

    • For port 443, only HTTPS URLs are allowed.

    • The WALLET_PATH and WALLET_PASSWORD arguments for the OPEN_CONNECTION procedure are ignored. The default value for the WALLET_PATH and WALLET_PASSWORD property are set to the wallet that is used by UTL_HTTP and DBMS_CLOUD for making outbound web requests on Autonomous Database.

    • UTL_TCP usage is audited by default. You cannot disable auditing for UTL_TCP.

    • SSL/TLS is enforced for all communication happening over TCP/IP connections.

  • DBMS_NETWORK_ACL_ADMIN

    • Granting ACL privileges on IP addresses is not allowed.

    • The http_proxy and use_passwords ACL privileges are not allowed.

  • UTL_HTTP Errors

    The following table shows error messages and possible causes for these error messages when using UTL_HTTP:

    Error Message Potential Cause

    ORA-12545: Connect failed because target host or object does not exist

    Target host or object does not exist or it is private.

    ORA-24247: network access denied by access control list (ACL)

    Access control list (ACL) for the specified host could not be found.

    ORA-29024: Certificate validation failure

    Certificate of the host does not exist or is not among the supported certificates.

See UTL_HTTP, DBMS_LDAP, UTL_SMTP, UTL_TCP, and DBMS_NETWORK_ACL_ADMIN in PL/SQL Packages and Types Reference for more information.

SODA Notes

When you use SODA with Autonomous Database the following restrictions apply:

  • Automatic indexing is not supported for SQL and PL/SQL code that uses the SQL/JSON function json_exists. See SQL/JSON Condition JSON_EXISTS for more information.

  • Automatic indexing is not supported for SODA query-by-example (QBE).

Restrictions for Database Features

Autonomous Database is built to support multiple workloads. In some cases, features which are present in Oracle Database Enterprise Edition are not available in Autonomous Database. Additionally, database features designed for administration are not available.

Oracle XML DB

Describes Autonomous Database support for Oracle XML DB features. To ensure the security and the performance of your Autonomous Database, some Oracle XML DB features are restricted.

The following is supported, in addition to the features listed:

  • Full support for XMLQuery, XMLTable, and other SQL/XML standard functions

  • Indexing schema including functional indexes using SQL/XML expressions, Structured XMLIndex and XQuery Full Text Index

Note:

If you migrate tables containing XMLType columns to Autonomous JSON Database using Oracle Data Pump, you need to convert to Non-Schema Binary XML prior to using Oracle Data Pump Export (expdp).
Area XML DB Feature Supported in Autonomous Database More Information
Repository XML DB Protocol No Repository Access Using Protocols
Repository XML DB Resources No Oracle XML DB Repository Resources
Repository XML DB ACLs No Repository Access Control
Storage XML Schema Registration No XML Schema Registration with Oracle XML DB
Storage CLOB No Deprecated
Storage Object Relational No XML Schema and Object-Relational XMLType
Storage Binary XML Yes (Non schema-based only) XMLType Storage Models
Index Structured XML Index Yes XMLIndex Structured Component
Index XQuery Full Text Index Yes Indexing XML Data for Full-Text Queries
Index Unstructured XMLIndex No XMLIndex Unstructured Component
Packages XML DOM package Yes PL/SQL DOM API for XMLType (DBMS_XMLDOM)
Packages XML Parser Package Yes PL/SQL Parser API for XMLType (DBMS_XMLPARSER)
Packages XSL Processor (DBMS_XSLPROCESSOR) Yes PL/SQL XSLT Processor for XMLType (DBMS_XSLPROCESSOR)

For details on Oracle XML DB, see Oracle XML DB Developer's Guide.

Oracle Text

Describes Autonomous Database support for Oracle Text features. To ensure the security and the performance of your JSON database, some Oracle Text features are restricted.

Oracle Text Feature Supported in Autonomous Database More Information
All logging, and APIs which perform logging such as ctx_report.query_log_summary Not Supported QUERY_LOG_SUMMARY
File and URL datastore Not Supported Datastore Type
CREATE INDEX with BIG_IO option Supported when you disable PARALLEL DMLFoot 1 Improved Response Time Using the BIG_IO Option of CONTEXT Index
OPTIMIZE_INDEX in rebuild mode Supported when you disable PARALLEL DML Foot 1 OPTIMIZE_INDEX

Footnote 1 This is supported if you grant the privilege to create a trigger to the user (GRANT CREATE TRIGGER). You must also disable parallel DML at the session level (ALTER SESSION DISABLE PARALLEL DML).

For details on Oracle Text, see Oracle Text Application Developer's Guide.

Restrictions for Oracle Graph

To ensure the security and the performance of your Autonomous JSON Database, some Oracle Graph features are restricted.

See Oracle Graph Limitations with Autonomous Database for a list of Oracle Graph features that are restricted.

Restrictions for Oracle Spatial

To ensure the security and the performance of your Autonomous JSON Database, some Oracle Spatial features are restricted.

See Oracle Spatial Limitations with Autonomous Database for a list of Oracle Spatial features that are restricted.

Restrictions for Oracle APEX

Autonomous JSON Database supports Oracle APEX. To ensure the security and the performance of Autonomous JSON Database, some Oracle APEX features are restricted.

Oracle Flashback

Oracle Flashback Technology is a group of Oracle Database features that let you view past states of database objects or to return database objects to a previous state without using point-in-time media recovery.

To restore and recover your database to a point in time, see Restore and Recover your Autonomous JSON Database Database.

Oracle Flashback Feature Supported in Autonomous Database

DBMS_FLASHBACK

Yes except the procedure:

DBMS_FLASHBACK.TRANSACTION_BACKOUT

Flashback Data Archive

No

Flashback Drop

Yes

Flashback Query

Yes

Flashback Table

Yes

Flashback Transaction

No

Flashback Transaction Query

Yes

Flashback Version Query

Yes

See About Oracle Flashback Technology for information on using Flashback features.

Restrictions for Fast Application Notification (FAN)

Subscribing to Fast Application Notification (FAN) events is not supported with Autonomous Database and is not needed. The functionality provided by FAN is provided out of the box with Autonomous Database. You do not need to enable your application for FAN or subscribe to FAN events.

You can use Application Continuity to mask outages from your applications. See Using Application Continuity on Autonomous Database for more information.

Recommended Client Settings for Common Drivers

  • ODP.Net: The Oracle Data Provider for .NET (ODP.Net) unmanaged provider supports Application Continuity out of the box. When connecting an ODP.Net application to your Autonomous Database, do not explicitly set HA events, application continuity, or onsConfig; accept the default settings.

  • JDBC (thin) driver: When using the Universal Connection Pool (UCP), disable Fast Connection Failover. For example:

    PoolDataSource.setFastConnectionFailoverEnabled(false)
  • Oracle Call Interface (OCI): Do not configure ONS servers in oraaccess.xml:

    <ons>
       <servers> 
       <!—Do not enter any values --> 
       </servers> 
    </ons>

    Also, do not configure the <fan> section:

    <fan>  
    <!-- only possible values are "trace" or "error" -->  
        <subscription_failure_action>
       </subscription_failure_action>  
    </fan>

Oracle Database Real Application Security

Oracle Database Real Application Security is a database authorization model that: supports declarative security policies, enables end-to-end security for multitier applications, provides an integrated solution to secure database and application resources, and advances the security architecture of Oracle Database to meet existing and emerging demands of applications developed for the Internet.

See Introducing Oracle Database Real Application Security more information.

Real Application Security works the same on Autonomous Database as on an on-premises Oracle Database except you need to perform the following ADMIN tasks before using Real Application Security on Autonomous Database:

  • To create Real Application Security users/roles, you need the PROVISION system privilege. As the ADMIN user run the following command to grant this privilege to a database user:

    SQL> EXEC XS_ADMIN_CLOUD_UTIL.GRANT_SYSTEM_PRIVILEGE('PROVISION','DB_USER');

    In this example, DB_USER is a database user.

    Running this command on Autonomous Database replaces the following on-premise database command (note the _CLOUD_ is not in the following package name):

    SQL> EXEC SYS.XS_ADMIN_UTIL.GRANT_SYSTEM_PRIVILEGE('PROVISION', 'DB_USER', XS_ADMIN_UTIL.PTYPE_XS);

    See General Procedures for Creating Application User Accounts for more information.

  • To create Real Application Security data controls, you need the ADMIN_ANY_SEC_POLICY privilege. As the ADMIN user run the following command to grant this privilege:

    EXEC XS_ADMIN_CLOUD_UTIL.GRANT_SYSTEM_PRIVILEGE('ADMIN_ANY_SEC_POLICY','DB_USER');

    In this example, DB_USER is a database user.

    Running this command on Autonomous Database replaces the following on-premise database command (note the _CLOUD_ is not in the following package name):

    SQL> EXEC SYS.XS_ADMIN_UTIL.GRANT_SYSTEM_PRIVILEGE('ADMIN_ANY_SEC_POLICY','DB_USER');

    See Creating Roles and Application Users for more information.

Database Features Unavailable in Autonomous Database

Lists the Oracle Database features that are not available in Autonomous Database. Additionally, database features designed for administration are not available.

List of Unavailable Oracle Features

  • Oracle Real Application Testing (Database Replay)

  • Oracle Real Application Security Administration Console (RASADM)

  • Oracle OLAP: Not available in Autonomous Database. See Deprecation of Oracle OLAP for more information.

  • Oracle R capabilities of Oracle Advanced Analytics

  • Oracle Industry Data Models

  • Oracle Database Lifecycle Management Pack

  • Oracle Data Masking and Subsetting Pack

  • Oracle Cloud Management Pack for Oracle Database

  • Oracle Multimedia: Not available in Autonomous Database and deprecated in Oracle Database 18c.

  • Oracle LogMiner

  • Oracle Sharding

  • Java in DB

  • Oracle Workspace Manager