Oracle Zero Downtime Migration – Physical Offline Migration to ExaDB-D on Oracle Database@Google Cloud

Purpose

Oracle customers are rapidly increasing their workload migration into the Oracle Cloud, Engineered Systems, and Oracle Database@Google Cloud. However, migrating workloads has been a source of challenges for many years. Migrating database workloads from one system to another or into the Cloud is easier said than done. 

Based on years of experience migrating Oracle workloads, Oracle has developed Zero Downtime Migration (ZDM). ZDM is Oracle’s premier solution for a simplified and automated migration experience, providing zero to negligible downtime for the production system depending on the migration scenario. ZDM allows you to migrate your on-premises Oracle Databases directly and seamlessly to and between Oracle Database@Azure, Oracle Database@ Google Cloud, Oracle Database@AWS, and any Oracle-owned infrastructure, including Exadata Database Machine On-Premises, Exadata Cloud at Customer, and Oracle Cloud Infrastructure. Oracle ZDM supports a wide range of Oracle Database versions and, as the name implies, ensures minimal to no production database impact during the migration.

ZDM follows Oracle Maximum Availability Architecture (MAA) principles and incorporates products such as GoldenGate and Data Guard to ensure High Availability and an online migration workflow that leverages technologies such as the Recovery Manager, Data Pump, and Database Links.

This technical brief is a step-by-step guide for migrating your on-premises Oracle Databases to Oracle Exadata Database Service on Dedicated Infrastructure (ExaDB-D) on Oracle Database@Google Cloud, with ZDM’s Physical Offline workflow.

Oracle ZDM will run on a separate node and connect to Source and Target to perform the migration. This guide will cover all requirements for installing the Oracle ZDM Service Host, the Source Database, the Target Database recipient of the migration process, and the networking used. The migration process will be dissected and done in a step-by-step fashion. This guide will answer the most frequently asked questions regarding the product and the overall migration process.

For more information on Oracle Zero Downtime Migration, please visit ZDM’s product website and Oracle Database@Google Cloud product website.

Zero Downtime Migration

Oracle Zero Downtime Migration (ZDM) is the Oracle Maximum Availability Architecture (MAA)-recommended solution to migrate Oracle Databases to the Oracle Cloud. ZDM's inherent design keeps in mind the migration process as straightforward as possible to ensure the most negligible impact on production workloads. The Source Database to be migrated can be on-premises, deployed on Oracle Cloud Infrastructure, or a 3rd Party Cloud. The Target Database deployment can be on Oracle Database@Azure, Oracle Database@Google Cloud, Oracle Database@AWS, Database Cloud Service on Oracle Cloud Infrastructure (OCI) Virtual Machine, Exadata Cloud Service, Exadata Cloud at Customer, and Autonomous Database. ZDM automates the entire migration process, reducing the chance of human errors. ZDM leverages Oracle Database-integrated high availability (HA) technologies such as Oracle Data Guard and GoldenGate and follows all MAA best practices that ensure no significant downtime of production environments. Oracle ZDM supports both Physical and Logical Migration workflows. This technical brief covers a step-by-step guide for the Physical Offline Migration Workflow.

A standard Physical Offline migration will take the following steps:

  1. Download and Configure ZDM.
  2. ZDM Starts Database Migration.
  3. ZDM Starts the Backup of the Database.
  4. ZDM Transfers Backups to the Selected Backup Location.
  5. ZDM Restores Database at Target using Transferred Backups.
  6. ZDM Switches Over.
  7. ZDM Performs Post Migration Validations.
  8. ZDM Finalizes the Migration.

Supported Configurations

Oracle ZDM supports Oracle Database versions 11.2.0.4, 12.1.0.2, 12.2.0.1, 18c, 19c, 21c, and 23ai. ZDM’s physical migration workflow requires the Source and Target Databases to be in the same database release.

Oracle ZDM supports Source Oracle Databases hosted on Linux, Solaris, and AIX operating systems. Oracle ZDM supports single-instance databases, Oracle RAC One Node databases, or Oracle RAC databases as sources. Oracle ZDM supports Oracle Database Enterprise & Standard Edition as Source and Target Databases.  ZDM’s physical migration workflow supports only Source Databases hosted on Linux platforms.

Architecture

An architectural overview of the ZDM server, the source database on-premises, the target database on Oracle Exadata Database Service on Dedicated Infrastructure (ExaDB-D) on Oracle Database@Google Cloud, and all networks and components required are described in the diagram below:

This is a high level architectural overview showcasing the customer data center where the source database and servers of ZDM reside

Figure 1. This is a High-Level Architectural overview showcasing the customer data center where the source database and ZDM’s server reside. It also shows all connectivity to the target Oracle Exadata Database Service on Dedicated Infrastructure (ExaDB-D) on Oracle Database@Google Cloud.

Zero Downtime Migration Service Host

Zero Downtime Migration Service Host Requirements

Oracle Zero Downtime Migration installation must take place on a separate host, which must fulfill the following requirements:

  • Linux host running on Oracle 7, 8, or RHEL 8 (only these OS platforms/versions are supported).
  • 100 GB of free storage space. This space is required for all the logs that ZDM will generate.
  • A zdm group and a zdmuser as part of this group.
  • The following packages must be installed:
    • glibc-devel
    • expect
    • unzip
    • libaio
    • oraclelinux-developer-release-el7
  • All hostnames and IP addresses to be used must be present as entries in /etc/hosts

For more information on the ZDM Service Host requirements and setting up ZDM on RHEL platforms, please refer to Oracle ZDM’s product documentation, specifically “Setting Up Zero Downtime Migration Software” section.

For this step-by-step guide, the ZDM Service Host runs on-premises on an Oracle Linux Server 8.9. The host private IP is masked for this guide, but as an example we will use the fictional zz.dd.mm.hh and the hostname is zdmhost.

Network and Connectivity

Google Cloud Region
A Google Cloud region is a geographical area that contains data centers and infrastructure for hosting resources. It is made up of zones that are isolated from each other within the region.

Google Cloud Project
A Google Cloud Project is required to use Google Workspace APIs and build Google Workspace add-ons or apps. A Cloud project forms the basis for creating, enabling, and using all Google Cloud services, including managing APIs, enabling billing, adding and removing collaborators, and managing permissions.

Google Virtual Private Cloud
Google Cloud Virtual Private Cloud (VPC) provides networking functionality to Compute Engine virtual machine (VM) instances, Google Kubernetes Engine (GKE) containers, database services, and serverless workloads. VPC provides global, scalable, and flexible networking for your cloud-based service.

Google Cloud Interconnect 
Cloud Interconnect extends your on-premises network to the Google network through a highly available, low-latency connection. You can use Dedicated Interconnect to connect directly to Google or Partner Interconnect to connect to Google through a supported service provider.

Oracle Exadata Database Service
Oracle Exadata Database Service enables you to leverage the power of Exadata in the cloud. Oracle Exadata Database Service delivers proven Oracle Database capabilities on purpose-built, optimized Oracle Exadata infrastructure in the public cloud and on Cloud@Customer. Built-in cloud automation, elastic resource scaling, security, and fast performance for all Oracle Database workloads helps you simplify management and reduce costs.

 

Source Database

The source database runs on-premises on an Oracle Linux Server 7.7 for this step-by-step guide. The host private IP is masked for this guide, but as an example, we will use the fictional aa.bb.sr.db address, and the hostname is onphost.

The source Oracle database is a single-instance Enterprise Edition database version 19.22 with multitenant architecture. The database name is oradb, and its unique name is oradb_onp.

Target Database

Oracle Database@Google Cloud offers the following products:

  • Oracle Exadata Database Service on Dedicated Infrastructure (ExaDB-D)
    • You can provision flexible Exadata systems that allow you to add database compute servers and storage servers to your system anytime after provisioning.

  • Oracle Autonomous Database Serverless (ADB-S)
    • Autonomous Database provides an easy-to-use, fully autonomous database that scales elastically, delivers fast query performance, and requires no database administration.

Oracle Database@Google Cloud integrates Oracle Exadata Database Service, Oracle Real Application Clusters (Oracle RAC), and Oracle Data Guard technologies into the Google Cloud platform. The Oracle Database service runs on Oracle Cloud Infrastructure (OCI) and is co-located in Google’s data centers. The service offers features and price parity with OCI.

Oracle Database@Google Cloud service offers the same low latency as other Google-native services and meets mission-critical workloads and cloud-native development needs. Users manage the service on the Google Cloud console and with Google Cloud automation tools. The service is deployed in Google Virtual Private Cloud (VPC). The service requires that users have a Google Cloud Project and an OCI tenancy.

For this step-by-step guide, the target platform is Oracle Exadata Database Service on Dedicated Infrastructure (ExaDB-D) on Oracle Database@Google Cloud. The infrastructure contains a 2-node VM cluster. The VM cluster host private IPs are masked for this guide, but as an example, we will use the fictional ta.db.og.1 and ta.db.og.2, and the host names are exadbgoogle1 and exadbgoogle2.

ZDM requires configuring a placeholder database target environment before beginning the migration process.

The target Oracle database is a 2-node Oracle RAC version 19.24 with multitenant architecture created using Oracle Cloud Console. The database name is oradb (the same as the source database), and the database's unique name is oradb_exa (different from the source database’s unique name).

Source and Target Database Pre-Requisites

Oracle ZDM uses the provisioned placeholder database target as a template and recreates the target from the backup of the source database during migration. The following prerequisites must be met before starting the migration process:

  • The target database must be provisioned using Oracle Cloud Tooling without enabling automatic backups.
  • The source and target databases must have the same name (DB_NAME).
  • The SYS user account password must be the same on the source and target databases.
  • The COMPATIBLE database initialization parameter must be the same on the source and target databases.
  • The source and target databases must have the same major release version (e.g., 19c). However, the target
database could have a higher patch level (e.g., source at 19.22 and target at 19.24). If the target database is
at a higher patch level than the source database, ZDM automatically runs datapatch as part of the migration.
  • ZDM requires the SSH key on the ZDM Service Host to be in RSA format (In Oracle Linux 8, the default is
OpenSSH).

Additional Configuration

SSH Key

Check the key format:

[zdmuser@zdmhost ~]$ head -n1 id_rsa

Create an SSH Key in RSA format (if not already created):

[zdmuser@zdmhost ~]$ ssh-keygen -m PEM -t rsa

Change an existing SSH key into RSA format (if already created and need to reformat):

[zdmuser@zdmhost ~]$ ssh-keygen -p -m PEM -f id_rsa
NFS File Share via Google Cloud Managed NFS File Server

The ZDM Physical Offline migration workflow uses RMAN backup and restore to migrate data from the source to the target database. The backup files are stored on an NFS file share provided by the Google Cloud-managed NFS File Server. 

The IP address of the NFS server is masked for this guide, but as an example, we will use the fictional aa.an.fs.pe address. The NFS path is aa.an.fs.pe:/zdm_share

The NFS share must be mounted on both the source and target database hosts.

To mount the NFS Share on the source and target database hosts:

As root:

mkdir -p /mnt/nfs3zdm

mount -o rw aa.an.fs.pe:/zdm_share /mnt/nfs3zdm

Make sure the Oracle user has access to the NFS mount

chown oracle:oinstall /mnt/nfs3zdm

As the Oracle user:

touch /mnt/nfs3zdm/test.txt

On the source and target PDBs:

SQL> create directory DATA_PUMP_DIR_NFS as '/mnt/nfs3zdm';
TDE Wallet

If your source database is not TDE enabled, follow these steps to create an auto-login wallet. Please visit the Database Reference guide for more information regarding the WALLET_ROOT parameter.

mkdir $ORACLE_BASE/admin/$ORACLE_SID/wallet

mkdir $ORACLE_BASE/admin/$ORACLE_SID/wallet/tde


alter session set container=cdb$root;

alter system set wallet_root='$ORACLE_BASE/admin/$ORACLE_SID/wallet' scope=spfile;

shutdown immediate;

startup;



alter system set tde_configuration='KEYSTORE_CONFIGURATION=FILE' scope=both;

administer key management create keystore identified by <your_TDE_password>;

administer key management set keystore open identified by <your_TDE_password> container=ALL;

administer key management set key identified by <your_TDE_password> with backup container=ALL;

administer key management create auto_login keystore from keystore '$ORACLE_BASE/admin/$ORACLE_SID/wallet/tde' identified by <your_TDE_password>;

administer key management set keystore close identified by <your_TDE_password> container=ALL;

select * from v$encryption_wallet; --will open the auto-login wallet



set lines 300

set pages 100

col name for a20

col wrl_type for a10

col status for a15

col wallet_order for a15

col key_id for a60

col keystore_type for a20

col origin for a20

col encryptionalg for a15

col encryptedts for a15

col inst_id for 999

col value for a60



select p.con_id, p.name, p.open_mode, ew.wrl_type, ew.wallet_type, ew.status, ew.wallet_order

from v$pdbs p join v$encryption_wallet ew on (ew.con_id = p.con_id)

order by p.con_id;



    CON_ID NAME                 OPEN_MODE  WRL_TYPE   WALLET_TYPE          STATUS          WALLET_ORDER

---------- -------------------- ---------- ---------- -------------------- --------------- ---------------

         2 PDB$SEED             READ ONLY  FILE       AUTOLOGIN            OPEN            SINGLE

         4 OPDB4                READ WRITE FILE       AUTOLOGIN            OPEN            SINGLE



select con_id, key_id, keystore_type, origin from v$encryption_keys;



    CON_ID KEY_ID                                                       KEYSTORE_TYPE        ORIGIN

---------- ------------------------------------------------------------ -------------------- --------------------

         4 AXLpMpzxoU/dvxXhn/okVMkAAAAAAAAAAAAAAAAAAAAAAAAAAAAA         SOFTWARE KEYSTORE    LOCAL

         1 ASYIe3UpY08bvxPooYkRBX0AAAAAAAAAAAAAAAAAAAAAAAAAAAAA         SOFTWARE KEYSTORE    LOCAL

Database Migration Step by Step with ZDM

Step 1: Prepare the Source Database Host On-Premises

Copy the SSH public key of the zdmuser from the ZDM host to the .ssh/authorized_keys file on the source database host for the user you want to use for login, in this case, onpuser:

On ZDM host as zdmuser

[zdmuser@zdmhost ~]$ cat .ssh/id_rsa.pub

On the source database host as user onpuser

[onpuser@onphost ~]$ vi .ssh/authorized_keys

Insert the public key and save the changes.

Add the target database hostname, IP address, and SCAN name to the /etc/hosts file. As root user:

[root@onphost ~]# vi /etc/hosts
#add the following entries
ta.db.og.1 exadbgoogle1.oraclevcn.com exadbgoogle1
ta.db.og.2 exadbgoogle2.oraclevcn.com exadbgoogle2
ta.db.og.3 demo-scan-sample.oraclevcn.com target-scan

Step 2: Prepare the Source Database On-Premises

Prepare the source database. As SYS user:


-- Enable ARCHIVELOG mode for the database:
SQL> select log_mode from v$database;

LOG_MODE
------------
ARCHIVELOG
  


-- For Oracle Database 12c Release 2 and later, it is mandatory to configure TDE before migration begins
SQL> select wrl_type, status from v$encryption_wallet;

WRL_TYPE             STATUS
-------------------- ------------------------------
FILE                 OPEN


-- Set RMAN CONFIGURE CONTROLFILE AUTOBACKUP to ON
RMAN> CONFIGURE CONTROLFILE AUTOBACKUP ON;

Step 3: Prepare the target database host on ExaDB-D on Oracle Database@Google Cloud

Copy the SSH public key of the zdmuser from the ZDM host to the .ssh/authorized_keys file on the target database host for the user you want to use for login; in this case, OPC:

On ZDM host as zdmuser

[zdmuser@zdmhost ~]$ cat .ssh/id_rsa.pub

On the target database hosts as user opc (on all VMs of the VM cluster):

[opc@exadbgoogle1 ~]$ vi .ssh/authorized_keys

Insert the public key and save the changes

[opc@exadbgoogle2 ~]$ vi .ssh/authorized_keys

Insert the public key and save the changes
Add the source database hostname and IP information into the /etc/hosts file. As root user (on all VMs of the VM cluster)

[root@exadbgoogle1 ~]# vi /etc/hosts
#add the following entries
aa.bb.sr.db onphost
[root@exadbgoogle2 ~]# vi /etc/hosts
#add the following entries
aa.bb.sr.db onphost

Step 4: Prepare the ZDM Service Host On-Premises

Add the source and target hostnames and IP addresses into the /etc/hosts file. As root user:

[root@zdmhost ~]# vi /etc/hosts
#add the following entries
ta.db.oa.1 exadbgoogle1
ta.db.oa.2 exadbgoogle2
aa.bb.sr.db onphost

Test the SSH connectivity to the source and target database hosts:

[zdmuser@zdmhost ~]$ ssh -i /home/zdmuser/.ssh/id_rsa onpuser@onphost

[zdmuser@zdmhost ~]$ ssh -i /home/zdmuser/.ssh/id_rsa opc@exadbgoogle1

[zdmuser@zdmhost ~]$ ssh -i /home/zdmuser/.ssh/id_rsa opc@exadbgoogle2

Verify that TTY is disabled for the SSH-privileged user. If TTY is disabled, the following command returns the date from the remote host without any errors:

[zdmuser@zdmhost ~]$ ssh -oStrictHostKeyChecking=no -i /home/zdmuser/.ssh/id_rsa onpuser@onphost "/usr/bin/sudo /bin/sh -c date"

[zdmuser@zdmhost ~]$ ssh -oStrictHostKeyChecking=no -i /home/zdmuser/.ssh/id_rsa opc@exadbgoogle1 "/usr/bin/sudo /bin/sh -c date"

[zdmuser@zdmhost ~]$ ssh -oStrictHostKeyChecking=no -i /home/zdmuser/.ssh/id_rsa opc@exadbgoogle2 "/usr/bin/sudo /bin/sh -c date"

These commands should execute without any prompting and return the date from the remote host. 

Step 5: Create the Physical Offline Migration Response File on the ZDM host

You’ll find a template on the ZDM host at $ZDMHOME/rhp/zdm/template/zdm_template.rsp, briefly describing the parameters and their possible values. Here, we will create a new response file with the minimal parameters required. As zdmuser:

[zdmuser@zdmhost ~]$ vi /home/zdmuser/physical_offline/physical_offline.rsp
#add the following parameters and save the changes
MIGRATION_METHOD=OFFLINE_PHYSICAL
DATA_TRANSFER_MEDIUM=NFS
BACKUP_PATH=/mnt/nfs3zdm/
TGT_DB_UNIQUE_NAME=oradb_exa
PLATFORM_TYPE=EXACS

Step 6: Evaluate the Configuration

Execute the following command on the ZDM host as zdmuser to evaluate the migration. ZDM will check the source and target database configurations. The actual migration will not be started. On the ZDM host as zdmuser:

[zdmuser@zdmhost ~]$ $ZDMHOME/bin/zdmcli migrate database \

-rsp /home/zdmuser/physical_offline/physical_offline.rsp \

-sourcesid oradb \

-sourcenode onphost \

-srcauth zdmauth \

-srcarg1 user:onpuser \

-srcarg2 identity_file:/home/zdmuser/.ssh/id_rsa \

-srcarg3 sudo_location:/usr/bin/sudo \

-targetnode exadbgoogle1 \

-tgtauth zdmauth \

-tgtarg1 user:opc \

-tgtarg2 identity_file:/home/zdmuser/.ssh/id_rsa \

-tgtarg3 sudo_location:/usr/bin/sudo \

-targethome /u02/app/oracle/product/19.0.0.0/dbhome_1 \

-tdekeystorepasswd \

-eval

Enter source database oradb SYS password:

Enter source database oradb TDE keystore password:

If the source database uses ASM for storage management, use -sourcedb <db_unique_name> instead of -sourcesid <SID> in the zdmcli command.

Check the job status. On the ZDM host as zdmuser:

[zdmuser@zdmhost ~]$ $ZDMHOME/bin/zdmcli query job -jobid 1

zdmhost.zdm: Audit ID: 211

Job ID: 1

User: zdmuser

Client: zdmhost

Job Type: "EVAL"

Scheduled job command: "zdmcli migrate database -rsp /home/zdmuser/physical_offline_exa/physical_offline_exa.rsp -sourcesid oradb -sourcenode onphost -srcauth zdmauth -srcarg1 user:sinan_petrus_toma_oracle_com -srcarg2 identity_file:/home/zdmuser/.ssh/id_rsa -srcarg3 sudo_location:/usr/bin/sudo -targetnode targethost -tgtauth zdmauth -tgtarg1 user:opc -tgtarg2 identity_file:/home/zdmuser/.ssh/id_rsa -tgtarg3 sudo_location:/usr/bin/sudo -targethome /u02/app/oracle/product/19.0.0.0/dbhome_1 -tdekeystorepasswd -eval"

Scheduled job execution start time: 2024-10-21T15:40:57Z. Equivalent local time: 2024-10-21 15:40:57

Current status: SUCCEEDED

Result file path: "/home/zdmuser/zdm/zdmbase/chkbase/scheduled/job-1-2024-10-21-15:41:06.log"

Metrics file path: "/home/zdmuser/zdm/zdmbase/chkbase/scheduled/job-1-2024-10-21-15:41:06.json"

Job execution start time: 2024-10-21 15:41:06

Job execution end time: 2024-10-21 15:43:46

Job execution elapsed time: 2 minutes 40 seconds

ZDM_GET_SRC_INFO ........... PRECHECK_PASSED

ZDM_GET_TGT_INFO ........... PRECHECK_PASSED

ZDM_PRECHECKS_SRC .......... PRECHECK_PASSED

ZDM_PRECHECKS_TGT .......... PRECHECK_PASSED

ZDM_SETUP_SRC .............. PRECHECK_PASSED

ZDM_SETUP_TGT .............. PRECHECK_PASSED

ZDM_PREUSERACTIONS ......... PRECHECK_PASSED

ZDM_PREUSERACTIONS_TGT ..... PRECHECK_PASSED

ZDM_VALIDATE_SRC ........... PRECHECK_PASSED

ZDM_VALIDATE_TGT ........... PRECHECK_PASSED

ZDM_POSTUSERACTIONS ........ PRECHECK_PASSED

ZDM_POSTUSERACTIONS_TGT .... PRECHECK_PASSED

ZDM_CLEANUP_SRC ............ PRECHECK_PASSED
ZDM_CLEANUP_TGT ............ PRECHECK_PASSED

Detailed information about the migration process can be found by monitoring the log file:

[zdmuser@zdmhost ~]$ tail -f "/home/zdmuser/zdm/zdmbase/chkbase/scheduled/job-1-2024-10-21-15:41:06.log

Step 7: Initiate the Migration

To initiate the actual migration, execute the same command for evaluation, but this time without the -eval parameter.

On the ZDM host as zdmuser:

[zdmuser@zdmhost ~]$ $ZDMHOME/bin/zdmcli migrate database 
-rsp /home/zdmuser/physical_offline/physical_offline.rsp 
-sourcesid oradb 
-sourcenode onphost 
-srcauth zdmauth 
-srcarg1 user:onpuser 
-srcarg2 identity_file:/home/zdmuser/.ssh/id_rsa 
-srcarg3 sudo_location:/usr/bin/sudo 
-targetnode exadbgoogle1 
-tgtauth zdmauth 
-tgtarg1 user:opc 
-tgtarg2 identity_file:/home/zdmuser/.ssh/id_rsa 
-tgtarg3 sudo_location:/usr/bin/sudo 
-targethome /u02/app/oracle/product/19.0.0.0/dbhome_1 
-tdekeystorepasswd 


Enter source database oradb SYS password:

Enter source database oradb TDE keystore password:

Check the job status. On the ZDM host as zdmuser:

[zdmuser@zdmhost ~]$ $ZDMHOME/bin/zdmcli query job -jobid 2

zdmhost.zdm: Audit ID: 224

Job ID: 2

User: zdmuser

Client: zdmhost

Job Type: "MIGRATE"

Scheduled job command: "zdmcli migrate database -rsp /home/zdmuser/physical_offline_exa/physical_offline_exa.rsp -sourcesid oradb -sourcenode onphost -srcauth zdmauth -srcarg1 user:sinan_petrus_toma_oracle_com -srcarg2 identity_file:/home/zdmuser/.ssh/id_rsa -srcarg3 sudo_location:/usr/bin/sudo -targetnode targethost -tgtauth zdmauth -tgtarg1 user:opc -tgtarg2 identity_file:/home/zdmuser/.ssh/id_rsa -tgtarg3 sudo_location:/usr/bin/sudo -targethome /u02/app/oracle/product/19.0.0.0/dbhome_1 -tdekeystorepasswd"

Scheduled job execution start time: 2024-10-21T15:47:42Z. Equivalent local time: 2024-10-21 15:47:42

Current status: SUCCEEDED

Result file path: "/home/zdmuser/zdm/zdmbase/chkbase/scheduled/job-2-2024-10-21-15:48:06.log"

Metrics file path: "/home/zdmuser/zdm/zdmbase/chkbase/scheduled/job-2-2024-10-21-15:48:06.json"

Job execution start time: 2024-10-21 15:48:06

Job execution end time: 2024-10-21 16:13:35

Job execution elapsed time: 25 minutes 29 seconds





ZDM_GET_SRC_INFO ............... COMPLETED

ZDM_GET_TGT_INFO ............... COMPLETED

ZDM_PRECHECKS_SRC .............. COMPLETED

ZDM_PRECHECKS_TGT .............. COMPLETED

ZDM_SETUP_SRC .................. COMPLETED

ZDM_SETUP_TGT .................. COMPLETED

ZDM_PREUSERACTIONS ............. COMPLETED

ZDM_PREUSERACTIONS_TGT ......... COMPLETED

ZDM_VALIDATE_SRC ............... COMPLETED

ZDM_VALIDATE_TGT ............... COMPLETED

ZDM_BACKUP_FULL_SRC ............ COMPLETED

ZDM_BACKUP_INCREMENTAL_SRC ..... COMPLETED

ZDM_DISCOVER_SRC ............... COMPLETED

ZDM_COPYFILES .................. COMPLETED

ZDM_PREPARE_TGT ................ COMPLETED

ZDM_SETUP_TDE_TGT .............. COMPLETED

ZDM_OSS_RESTORE_TGT ............ COMPLETED

ZDM_BACKUP_DIFFERENTIAL_SRC .... COMPLETED

ZDM_COPYFILES_DIFFERENTIAL ..... COMPLETED

ZDM_OSS_RECOVER_TGT ............ COMPLETED

ZDM_FINALIZE_TGT ............... COMPLETED

ZDM_POST_DATABASE_OPEN_TGT ..... COMPLETED

ZDM_DATAPATCH_TGT .............. COMPLETED

ZDM_MANIFEST_TO_CLOUD .......... COMPLETED

ZDM_POST_MIGRATE_TGT ........... COMPLETED

ZDM_POSTUSERACTIONS ............ COMPLETED

ZDM_POSTUSERACTIONS_TGT ........ COMPLETED

ZDM_CLEANUP_SRC ................ COMPLETED

ZDM_CLEANUP_TGT ................ COMPLETED

Detailed information about the migration process can be found by monitoring the log file:

[zdmuser@zdmhost ~]$ tail -f /home/zdmuser/zdm/zdmbase/chkbase/scheduled/job-2-2024-10-21-15:48:06.log

Known Issues

All common issues are documented and updated periodically in Oracle Zero Downtime Migration’s documentation, specifically on the product release note, Known Issues section.     

    

Troubleshooting & Other Resources

For Oracle ZDM log review:

  • ZDM Server Logs:
    •  $ZDM_BASE/crsdata/<zdm_service_node>/rhp/rhpserver.log.0

  • Check source node logs
    • <oracle_base>/zdm/zdm_<src_db_name>_<job_id>/zdm/log

  • Check target node logs.
    • <oracle_base>/zdm/zdm_<tgt_db_name>_<job_id>/zdm/log

For all Oracle Support Service Requests related to Zero Downtime Migration, please be sure to follow the instructions in the My Oracle Support document: SRDC – Data Collection for Database Migration Using Zero Downtime Migration (ZDM) (DOC ID 2595205.1).