Known Issues
This article provides information about known issues in the Base Database service.
These known issues are identified in the Base Database Service:
- Existing pluggable databases in new database
- PDB in existing Data Guard configuration
- Billing issue when changing license type
- Backing up to Object Storage using dbcli fails due to certificate change
- Backing up to Object Storage using RMAN fails due to certificate change
- Breaking changes in Database service SDKs
- Unable to use Managed Backups in your DB system
- Managed Automatic Backups fail on the VM.Standard1.1 shape due to a process crash
- Oracle Data Pump operations return "ORA-00439: feature not enabled"
- Unable to connect to the EM Express console from your 1-node DB system
- OCI Console information not synced for Data Guard enabled databases when using dbaascli
- Grid Infrastructure does not start after offlining and onlining a disk
- DB system storage scaling failure
- DB system shape scaling failure
Existing pluggable databases in new database
Details
Existing pluggable databases (PDB) do not appear in a newly created database, and it may take up to a few hours before they appear in the OCI Console. This includes the default PDB for a new database and existing PDBs for cloned or restored databases. In case of an in-place restore to an older version, the PDB list is updated similarly and may have some delay.
Workaround
None.
PDB in existing Data Guard configuration
Details
Creating and cloning a PDB in the primary database is not allowed via the OCI Console or the API.
Workaround
You can use SQL*Plus to create or clone PDBs in the primary database, and they will be synced later in the OCI Console.
Billing issue when changing license type
Details
When you change the license type of your database or DB system from BYOL to license included, or the other way around, you are billed for both types of licenses for the first hour. After that, you are billed according to your updated license type.
Workaround
We're working on a resolution.
Backing up to Object Storage using dbcli fails due to certificate change
Details
Unmanaged backups to Object Storage using the database CLI (dbcli) fail with the following errors:
-> Oracle Error Codes found:
-> ORA-19554: error allocating device, device type: SBT_TAPE, device name:
-> ORA-19511: non RMAN, but media manager or vendor specific failure, error text:
-> KBHS-00712: ORA-29024 received from local HTTP service
-> ORA-27023: skgfqsbi: media manager protocol error
In response to policies implemented by two common web browsers regarding Symantec certificates, Oracle recently changed the certificate authority used for Oracle Cloud Infrastructure. The resulting change in SSL certificates can cause backups to Object Storage to fail if the Oracle Database Cloud Backup Module still points to the old certificate.
Workaround
Check the log files for the errors listed and, if found, update the backup module.
-
Review the RMAN backup log files for the errors listed above:
-
Run the following command to determine the ID of the failed backup job.
dbcli list-jobs
In this example output, the failed backup job ID is "f59d8470-6c37-49e4-a372-4788c984ea59".
root@<node name> ~]# dbcli list-jobs ID Description Created Status ---------------------------------------- ------------------------------------------------------------------------------- ----------------------------------- ---------- cbe852de-c0f3-4807-85e8-7523647ec78c Authentication key update for DCS_ADMIN March 30, 2018 4:10:21 AM UTC Success db83fdc4-5245-4307-88a7-178f8a0efa48 Provisioning service creation March 30, 2018 4:12:01 AM UTC Success c1511a7a-3c2e-4e42-9520-f156b1b4cf0e SSH keys update March 30, 2018 4:48:24 AM UTC Success 22adf146-9779-4a2c-8682-7fd04d7520b2 SSH key delete March 30, 2018 4:50:02 AM UTC Success 6f2be750-9823-4ed5-b5ff-8e49f136dd22 create object store:bV0wqIaoLA4xLT4dGjOu March 30, 2018 5:33:38 AM UTC Success 0716f464-1a10-40df-a303-cadee0302b1b create backup config:bV0wqIaoLA4xLT4dGjOu_BC March 30, 2018 5:33:49 AM UTC Success e08b21c3-cd09-4e3a-944c-d1da96cb21d8 update database : hfdb1 March 30, 2018 5:34:04 AM UTC Success 1c3d7c58-79c3-4039-8f48-787057ce7c6e Create Longterm Backup with TAG-DBTLongterm<identity number> for Db:<dbname> March 30, 2018 5:37:11 AM UTC Success f59d8470-6c37-49e4-a372-4788c984ea59 Create Longterm Backup with TAG-DBTLongterm<identity number> for Db:<dbname> March 30, 2018 5:43:45 AM UTC Failure
-
Use the ID of the failed job to obtain the location of the log file to review.
dbcli describe-job -i <failed_job_ID>
Relevant output from the
describe-job
command should look like this:Message: DCS-10001:Internal error encountered: Failed to run Rman statement. Refer log in Node <node_name>: /opt/oracle/dcs/log/<node_name>/rman/bkup/<db_unique_name>/rman_backup/<date>/rman_backup_<date>.log.
-
-
Update the Oracle Database Cloud Backup Module:
-
Determine the Swift object store ID and user the database is using for backups.
-
Run the
dbcli list-databases
command to determine the ID of the database. -
Use the database ID to determine the backup configuration ID (
backupConfigId
).dbcli list-databases dbcli describe-database -i <database_ID> -j
-
Using the backup configuration ID you noted from the previous step, determine the object store ID (
objectStoreId
).dbcli list-backupconfigs dbcli describe-backupconfig –i <backupconfig_ID> -j
-
Using the object store ID you noted from the previous step, determine the object store user (
userName
).dbcli list-objectstoreswifts dbcli describe-objectstoreswift –i <objectstore_ID> -j
-
-
Using the object store credentials you obtained from step 1, update the backup module.
dbcli update-objectstoreswift –i <objectstore_ID> -p –u <user_name>
-
Backing up to Object Storage using RMAN fails due to certificate change
Details
Unmanaged backups to Object Storage using the RMAN fail with the following errors:
-> Oracle Error Codes found:
-> ORA-19554: error allocating device, device type: SBT_TAPE, device name:
-> ORA-19511: non RMAN, but media manager or vendor specific failure, error text:
-> KBHS-00712: ORA-29024 received from local HTTP service
-> ORA-27023: skgfqsbi: media manager protocol error
In response to policies implemented by two common web browsers regarding Symantec certificates, Oracle recently changed the certificate authority used for Oracle Cloud Infrastructure. The resulting change in SSL certificates can cause backups to Object Storage to fail if the Oracle Database Cloud Backup Module still points to the old certificate.
Workaround
Check the RMAN log files for the error messages listed. If found, log on to the host as the oracle user, and use your Swift credentials to reinstall the backup module.
Note:
Swift passwords are now called "Auth tokens." For more information, see Managing User Credentials.java -jar <opc_install.jar_path> -opcId '<swift_user_ID>' -opcPass '<auth_token>' -container <objectstore_container> -walletDir <wallet_directory> -configfile <config_file> -host https://swiftobjectstorage.<region_name>.oraclecloud.com/v1/<object_storage_namespace> -import-all-trustcerts
For a multi-node DB system, perform the workaround on all nodes in the cluster.
For more information about Oracle Database Cloud Backup Module, see Using Oracle Database Backup Cloud Service.
Breaking changes in Database service SDKs
Details
The SDKs released on October 18, 2018 introduce code-breaking changes to the database size and the database edition attributes in the database backup APIs.
Workaround
Refer to the language-specific documentation for more details about the breaking changes, and update your existing code as applicable.
Unable to use Managed Backups in your DB system
Details
Backup and restore operations might not work in your DB system when you use the OCI Console or the API.
Workaround
Install the Oracle Database Cloud Backup Module, and then contact Oracle Support Services for further instructions.
Perform the following steps to install the Oracle Database Cloud Backup Module:
-
SSH to the DB system, and log in as
opc
.ssh -i <SSH_key> opc@<DB_system_IP address> login as: opc
Alternatively, you can use
opc@<DB_system_hostname>
to log in. - Download the Oracle Database Cloud Backup Module from Oracle Database Cloud Backup Module.
- Extract the contents of
opc_installer.zip
to a target directory, for example,/home/opc
. - In your tenancy, create a temporary user, and grant them privileges to access the tenancy's Object Storage.
- For this temporary user, create an auth token and note down the password. For
more information about creating auth token, see Managing User Credentials.
Note:
Swift passwords are now called "Auth tokens. -
Verify that credentials work by running the following curl command:
curl -v -X HEAD -u <user_id>:'<auth_token>' https://swiftobjectstorage.<region_name>.oraclecloud.com/v1/<object_storage_namespace>
To determine the correct region, see Object Storage FAQ.
The command should return either the
HTTP 200
or theHTTP 204 No Content
success status response code. Any other status code indicates a problem connecting to Object Storage. -
Run the following command:
java -jar opc_install.jar -opcid <user_id> -opcPass '<auth_token>' -libDir <target_dir> -walletDir <target_dir> -host https://swiftobjectstorage.<region_name>.oraclecloud.com/v1/<object_storage_namespace> -configFile config.txt
Note that
<target_dir>
is the directory to which you extractedopc_installer.zip
in step 3.This command might take a few minutes to complete because it downloads
libopc.so
and other files. Once the command completes, you should see several files (includinglibopc.so
) in your target directory. -
Change directory to your target directory, and copy the
lipopc.so
andopc_install.jar
files into the/opt/oracle/oak/pkgrepos/oss/odbcs
directory.cp libopc.so /opt/oracle/oak/pkgrepos/oss/odbcs
cp opc_install.jar /opt/oracle/oak/pkgrepos/oss/odbcs
(You might have to use
sudo
with the copy commands to run them asroot
.) -
Run the following command to check whether the directory indicated exists:
ls /opt/oracle/dcs/commonstore/pkgrepos/oss/odbcs
If this directory exists, perform the following steps:
- Back up the files in the
/opt/oracle/dcs/commonstore/pkgrepos/oss/odbcs
directory. -
Run these two commands to replace the existing
libopc.so
andopc_install.jar
files in that directory:cp libopc.so /opt/oracle/dcs/commonstore/pkgrepos/oss/odbcs cp opc_install.jar /opt/oracle/dcs/commonstore/pkgrepos/oss/odbcs
- Back up the files in the
-
Verify the version of
opc_install.jar
.java -jar /opt/oracle/oak/pkgrepos/oss/odbcs/opc_install.jar |grep -i build
If
/opt/oracle/dcs/commonstore/pkgrepos/oss/odbcs
exists, also run the following command:java -jar /opt/oracle/dcs/commonstore/pkgrepos/oss/odbcs/opc_install.jar |grep -i build
Both commands should return the following output:
Oracle Database Cloud Backup Module Install Tool, build MAIN_2017-08-16.
- (Optional) Delete the temporary user and the target directory you used to install the backup module.
After you complete the procedure, contact Oracle Support or your tenant administrator for further instructions. You must provide the OCID of the DB system for which you would like to enable backups.
Managed Automatic Backups fail on the VM.Standard1.1 shape due to a process crash
Details
Memory limitations of host machines running the VM.Standard1.1 shape can cause failures for automatic database backup jobs managed by Oracle Cloud Infrastructure (jobs managed by using either the OCI Console or the API). You can change the system's memory parameters to resolve this issue.
Workaround
Change the systems' memory parameters as follows:
-
Switch to the oracle user in the operating system.
[opc@hostname ~]$ sudo su - oracle
-
Set the environment variable to login to the database instance. For example:
oracle@hostname ~]$ . oraenv ORACLE_SID = [oracle] ? orcl
-
Start SQL*Plus.
[oracle@hostname ~]$ sqlplus / as sysdba
-
Change the initial memory parameters as follows:
SQL> ALTER SYSTEM SET SGA_TARGET = 1228M scope=spfile; SQL> ALTER SYSTEM SET PGA_AGGREGATE_TARGET = 1228M; SQL> ALTER SYSTEM SET PGA_AGGREGATE_LIMIT = 2457M; SQL> exit
-
Restart the database instance.
[oracle@hostname ~]$ srvctl stop database -d db_unique_name -o immediate [oracle@hostname ~]$ srvctl start database -d db_unique_name -o open
Oracle Data Pump operations return "ORA-00439: feature not enabled"
Details
On High Performance and Extreme Performance DB systems, Data Pump utility operations that use compression and/or parallelism might fail and return the error ORA-00439: feature not enabled. This issue affects database versions 12.1.0.2.161018 and 12.1.0.2.170117.
Workaround
Apply patch 25579568 or 25891266 to Oracle Database homes for database versions 12.1.0.2.161018 or 12.1.0.2.170117, respectively. Alternatively, use the OCI Console to apply the April 2017 patch to the DB system and database home.
Note:
To determine the version of a database in a database home, run either$ORACLE_HOME/OPatch/opatch lspatches
as the
oracle user or dbcli list-dbhomes
as the root
user.
Unable to connect to the EM Express console from your 1-node DB system
Details
You might get a "Secure Connection Failed" error message when you try to connect to the EM Express console from your 1-node DB system because the correct permissions were not applied automatically.
Workaround
Add read permissions for the asmadmin
group on the wallet directory of the DB system, and then retry the connection.
Perform the following steps to add read permissions.
-
SSH to the DB system host, log in as
opc
, andsudo
to thegrid
user.[opc@dbsysHost ~]$ sudo su - grid [grid@dbsysHost ~]$ . oraenv ORACLE_SID = [+ASM1] ? The Oracle base has been set to /u01/app/grid
-
Get the location of the
wallet
directory. It is the value of themy_wallet_directory
in the following command output.[grid@dbsysHost ~]$ lsnrctl status | grep xdb_wallet (DESCRIPTION=(ADDRESS=(PROTOCOL=tcps)(HOST=dbsysHost.sub04061528182.dbsysapril6.oraclevcn.com)(PORT=5500))(Security=(my_wallet_directory=/u01/app/oracle/admin/dbsys12_phx3wm/xdb_wallet))(Presentation=HTTP)(Session=RAW))
-
Return to the
opc
user, switch to theoracle
user, and change to thewallet
directory.[opc@dbsysHost ~]$ sudo su - oracle [oracle@dbsysHost ~]$ cd /u01/app/oracle/admin/dbsys12_phx3wm/xdb_wallet
-
List the directory contents and note the permissions.
[oracle@dbsysHost xdb_wallet]$ ls -ltr total 8 -rw------- 1 oracle asmadmin 3881 Apr 6 16:32 ewallet.p12 -rw------- 1 oracle asmadmin 3926 Apr 6 16:32 cwallet.sso
-
Change the permissions.
[oracle@dbsysHost xdb_wallet]$ chmod 640 /u01/app/oracle/admin/dbsys12_phx3wm/xdb_wallet/*
-
Verify that read permissions were added.
[oracle@dbsysHost xdb_wallet]$ ls -ltr total 8 -rw-r----- 1 oracle asmadmin 3881 Apr 6 16:32 ewallet.p12 -rw-r----- 1 oracle asmadmin 3926 Apr 6 16:32 cwallet.sso
OCI Console information not synced for Data Guard enabled databases when using dbaascli
Details
The OCI Console synchronizes and displays information
about databases that are created and managed by using the dbaasapi
and dbaascli
utilities. However, databases with Data Guard
configured do not display correct information in the OCI Console under the following
conditions:
- If Data Guard was enabled by using the OCI Console, and then a change is made to
the primary or standby database by using
dbaascli
(such as moving the database to a different home), the result is not reflected in the OCI Console. - If Data Guard was configured manually, the OCI Console does not show a Data Guard association between the two databases.
Workaround
We are aware of the issue and working on a resolution. In the meantime, Oracle recommends that you manage your Data Guard enabled databases by using either only the OCI Console or only command line utilities.
Grid Infrastructure does not start after offlining and onlining a disk
Details
This is a clusterware issue that occurs only when the Oracle Grid Infrastructure (GI) version is 12.2.0.1 without any bundle patch. The problem is caused by corruption of a voting disk after you offline then online the disk.
Workaround
Determine the version of the GI, and whether the voting disk is corrupted. Repair the disk, if applicable, and then apply the latest GI bundle.
Perform the following steps:
-
Verify the GI version is 12.2.0.1 without any bundle patch applied:
[root@rmstest-udaau1 ~]# su - grid [grid@rmstest-udaau1 ~]$ . oraenv ORACLE_SID = [+ASM1] ? +ASM1 The Oracle base has been set to /u01/app/grid [grid@rmstest-udaau1 ~]$ $ORACLE_HOME/OPatch/opatch lsinventory Oracle Interim Patch Installer version 12.2.0.1.6 Copyright (c) 2018, Oracle Corporation. All rights reserved. Oracle Home : /u01/app/12.2.0.1/grid Central Inventory : /u01/app/oraInventory from : /u01/app/12.2.0.1/grid/oraInst.loc OPatch version : 12.2.0.1.6 OUI version : 12.2.0.1.4 Log file location : /u01/app/12.2.0.1/grid/cfgtoollogs/opatch/opatch2018-01-15_22-11-10PM_1.log Lsinventory Output file location : /u01/app/12.2.0.1/grid/cfgtoollogs/opatch/lsinv/lsinventory2018-01-15_22-11-10PM.txt -------------------------------------------------------------------------------- Local Machine Information:: Hostname: rmstest-udaau1.exaagclient.sretest.oraclevcn.com ARU platform id: 226 ARU platform description:: Linux x86-64 Installed Top-level Products (1): Oracle Grid Infrastructure 12c 12.2.0.1.0 There are 1 products installed in this Oracle Home. There are no Interim patches installed in this Oracle Home. -------------------------------------------------------------------------------- OPatch succeeded.
-
Check the
/u01/app/grid/diag/crs/<hostname>/crs/trace/ocssd.trc
file for evidence that the GI failed to start due to voting disk corruption:ocssd.trc 2017-01-17 23:45:11.955 : CSSD:3807860480: clssnmvDiskCheck:: configured Sites = 1, Incative sites = 1, Mininum Sites required = 1 2017-01-17 23:45:11.955 : CSSD:3807860480: (:CSSNM00018:)clssnmvDiskCheck: Aborting, 2 of 5 configured voting disks available, need 3 ...... . 2017-01-17 23:45:11.956 : CSSD:3807860480: clssnmCheckForNetworkFailure: skipping 31 defined 0 2017-01-17 23:45:11.956 : CSSD:3807860480: clssnmRemoveNodeInTerm: node 4, slcc05db08 terminated. Removing from its own member and connected bitmaps 2017-01-17 23:45:11.956 : CSSD:3807860480: ################################### 2017-01-17 23:45:11.956 : CSSD:3807860480: clssscExit: CSSD aborting from thread clssnmvDiskPingMonitorThread 2017-01-17 23:45:11.956 : CSSD:3807860480: ################################### 2017-01-17 23:45:11.956 : CSSD:3807860480: (:CSSSC00012:)clssscExit: A fatal error occurred and the CSS daemon is terminating abnormally ------------ 2017-01-19 19:00:32.689 : CSSD:3469420288: clssnmFindVF: Duplicate voting disk found in the queue of previously configured disks queued(o/192.168.10.18/PCW_CD_02_slcc05cel10|[66223efc-29254fbb-bf901601-21009 cbd]), found(o/192.168.10.18/PCW_CD_02_slcc05cel10|[66223efc-29254fbb-bf901601-21009c bd]), is not corrupted 2017-01-19 19:01:06.467 : CSSD:3452057344: clssnmvVoteDiskValidation: Voting disk(o/192.168.10.19/PCW_CD_02_slcc05cel11) is corrupted
-
You can also use SQL*Plus to confirm that the voting disks are corrupted:
-
Log in as the grid user, and set the environment to ASM.
[root@rmstest-udaau1 ~]# su - grid [grid@rmstest-udaau1 ~]$ . oraenv ORACLE_SID = [+ASM1] ? +ASM1 The Oracle base has been set to /u01/app/grid
-
Log in to SQL*Plus as
SYSASM
.$ORACLE_HOME/bin/sqlplus / as sysasm
-
Run the following two queries:
SQL> select name, voting_file from v$asm_disk where VOTING_FILE='Y' and group_number !=0; SQL> select CC.name, count(*) from x$kfdat AA JOIN (select disk_number, name from v$asm_disk where VOTING_FILE='Y' and group_number !=0) CC ON CC.disk_number = AA.NUMBER_KFDAT where AA.FNUM_KFDAT= 1048572 group by CC.name;
If the system is healthy, the results should look like the following example.
Query 1 Results NAME VOTING_FILE ------------------------------ --------------- DBFSC3_CD_02_SLCLCX0788 Y DBFSC3_CD_09_SLCLCX0787 Y DBFSC3_CD_04_SLCLCX0786 Y Query 2 Results NAME COUNT(*) ------------------------------ --------------- DBFSC3_CD_02_SLCLCX0788 8 DBFSC3_CD_09_SLCLCX0787 8 DBFSC3_CD_04_SLCLCX0786 8
In a healthy system, every voting disk returned in the first query should also be returned in the second query and the counts for all the disks should be non-zero. Otherwise, one or more of your voting disks are corrupted.
-
-
If a voting disks is corrupted, offline the grid disk that contains the voting disk. The cells will automatically move the bad voting disk to the other grid disk and online that voting disk.
-
The following command offlines a grid disk named DATAC01_CD_05_SCAQAE08CELADM13.
SQL> alter diskgroup DATAC01 offline disk DATAC01_CD_05_SCAQAE08CELADM13; Diskgroup altered.
-
Wait 30 seconds and then rerun the two queries in step 3c to verify that the voting disk migrated to the new grid disk and that it is healthy.
-
Verify the grid disk you offlined is now online:
SQL> select name, mode_status, voting_file from v$asm_disk where name='DATAC01_CD_05_SCAQAE08CELADM13';
The mode_status should be ONLINE, and the voting_file should NOT be Y.
Repeat steps 4a through 4c for each remaining grid disk that contains a corrupt voting disk.
Note:
If the CRS does not start because of the voting disk corruption, start it using Exclusive mode before you execute the command in step 4.
crsctl start crs -excl
-
-
If you are using Oracle GI version 12.2.0.1 without any bundle patch, you must upgrade the GI version to the latest GI bundle, whether or not a voting disk was corrupted.
DB system storage scaling failure
Details
Attempting to scale from a value less than 10,240 GB to a value higher than 10,240 GB in a single operation can lead to a failure of the scaling operation.
Workaround
If you are scaling either regular data storage or recovery area (RECO) storage from a value less than 10,240 GB (10 TB) to a value exceeding 10,240 GB, perform the scaling in two operations. First, scale the system to 10,240 GB. After this first scaling operation is complete and the system is in the "available" state, perform a second scaling operation, specifying your target storage value above 10,240 GB.
DB system shape scaling failure
Details
When scaling a DB system to use a larger system shape, the
scaling operation fails if a DB_Cache_nX
parameter is not set to 0
(zero).
Workaround
When scaling a DB system, ensure that all
DB_Cache_nX
parameters (for example,
DB_nK_CACHE_SIZE
) are set to 0 (zero).