Configure

The following DNS use cases enable secure, automated, and scalable resolution across the Oracle Database@Google Cloud environment, and ensure reduced manual overhead while supporting complex enterprise topologies:
  1. DNS resolution from OCI to Google Cloud
  2. DNS zone peering to resolve from a different Google Cloud VPCs
  3. DNS CNAME record to resolve from Google Cloud to OCI

Identify and configure the use case most relevant to your organization.

Use a Private DNS from OCI to Google Cloud

You can configure the OCI private DNS service to resolve queries of the services running in Google Cloud or on-premises using Google Cloud. If Oracle Database requires DNS resolution from OCI to Google Cloud resource's FDQN, such as for database links, shared file systems, agents, and APIs, then configure forwarding of DNS queries from the database to Google Cloud's DNS.

The following diagram shows DNS queries being resolved both from OCI to Google Cloud and from Google Cloud to OCI:



google-dns-forward-oci-dns-oracle.zip

This architecture enables private, policy-controlled connectivity from a Google Cloud application to Oracle database services, with DNS resolution handled using private listener and forwarder endpoints that integrate with OCI DNS and the service control plane.

  1. DNS private endpoint forwarder

    To forward the request from the database service to a Google Cloud DNS listener endpoint, do the following:

    1. Create an OCI DNS forwarder endpoint.
    2. Associate an NSG with the DNS forwarder endpoint.
    3. Create the ingress and egress stateless rules.
  2. Resolver rules

    Create domain rules in a private resolver DNS that forwards all requests to the Google Cloud DNS listener endpoint's IP address.

For more information, see the OCI DNS Resolver Endpoints and Rules documentation linked in Explore More.

Use DNS Zone Peering to Resolve from Google Cloud VPCs

Using multiple VPCs or projects can make DNS requirements complex. To seamlessly resolve the database resource from multiple VPCs, configure DNS peering to allow clients in multiple VPCs or projects to resolve hostnames directly from a Google Cloud DNS. Configure Cloud DNS peering to access Oracle Database@Google Cloud resources across VPCs.

The Cloud DNS forwarding zone is configured when an Oracle Database@Google Cloud is deployed. To resolve Oracle Database from multiple VPCs, create a private DNS zone with DNS peering to query the same resolver for a forwarding zone in a different VPC.

Follow these steps to configure a private Cloud DNS peering zone:

  1. In the Google Cloud console, go to the Create a DNS zone page.
  2. In Zone type, select Private.
  3. Enter a Zone name such as my-new-zone.
  4. Enter a DNS name suffix for the private zone. All records in the zone share this suffix, for example: example.private. Optionally add a description.
  5. Under Options, select DNS peering.
  6. Select the networks where the private zone must be visible.
  7. In Peer project, select a peer project.
  8. In Peer network, select a peer network.
  9. Click Create.

This creates an additional DNS peering zone in the peered VPC that allows it to forward queries to the OCI VCN resolver.

For more information, review the Google Cloud DNS peering documentation linked in Explore More.

Use a CNAME Record to Resolve DNS from Google Cloud to OCI

To use a canonical name, for example for database migrations you can use CNAME to point to the default domain name. This option is limited to Oracle Exadata Database Service, Oracle Exadata Database Service on Exascale Infrastructure, and Oracle Base Database Service in Oracle Database@Google Cloud.

The DNS forwarder is created for Oracle Database resource names. You can create a CNAME record in your Google Cloud DNS private zone pointing to the database's FQDN resources.

For example, to create a www subdomain name such as mydomain.com in a Google Cloud DNS, create a record set type CNAME to the canonical name of the database (*.oraclevcn.com).

  1. In the Google Cloud console, go to the Cloud DNS page.
  2. Click the zone where you want to add a record set.
  3. Click Add standard.
  4. In DNS Name, enter www.
  5. For Resource Record Type, select CNAME.
  6. For Canonical name, enter the domain name, followed by a period. For example, example.com.
  7. Click Create.

These different DNS use cases enable secure, automated, and scalable resolution across the Oracle Database@Google Cloud environments, and ensure minimal manual overhead while supporting complex enterprise topologies.

For more information, review the Google Cloud DNS create CNAME record documentation in Explore More.