Register an Amazon RDS for Oracle Database
You can use the Amazon RDS for Oracle wizard to register an Amazon RDS for Oracle database as a target database in Oracle Data Safe.
During registration, you can choose to connect your database to Oracle Data Safe using an Oracle Data Safe on-premises connector or an Oracle Data Safe private endpoint. Use a private endpoint if your database has a private IP address and you have an established network peering connection, such as FastConnect or VPN Connect, between your OCI tenancy and your Amazon cloud environment. Otherwise, use an on-premises connector.
Note:
Be sure to complete the preregistration tasks before using the wizard and the post-registration tasks afterward.Preregistration Tasks
The following table lists the preregistration tasks that you need to complete before you run the Amazon RDS for Oracle registration wizard.
| Task Number | Task | Link to Instructions |
|---|---|---|
| 1 | In Oracle Cloud Infrastructure Identity and Access Management (IAM), obtain permissions to register your database. | Permissions to Register an Amazon RDS for Oracle Database with Oracle Data Safe |
| 2 | Create an Oracle Data Safe service account on your target database and grant it Oracle Data Safe roles. Create the service account as the SYS user.
Make sure to run the privilege script with
the-RDSORACLE parameter as it is required if you
are registering an Amazon RDS for Oracle database.
|
Create an Oracle Data Safe Service Account on Your Database and Grant Roles to the Oracle Data Safe Service on a Non-Autonomous AI Database |
| 3 | Add the security certificate for the Amazon RDS specific region. | Add the Security Certificate for the Amazon RDS Specific Region |
| 4 | TLS connection only: If you are using an on-premises connector, configure a connection between the on-premises connector and your target database. If you are using a private endpoint, create a wallet or certificates. If you are establishing a TCP connection, you do not need to perform the steps to create a wallet for TLS connection. | Configure a TLS Connection Between the On-Premises Connector on Your Host Machine and Your Database or Create a Wallet or Certificates for a TLS Connection |
Run the Wizard
The following sections detail the workflow for the Amazon RDS for Oracle registration wizard.
Step 1: Target information
- On the Overview page in Oracle Data Safe, find Amazon RDS for Oracle, and then select Start wizard. The wizard opens on step 1, Target information.
- For Data Safe target display name, enter a target display name that is meaningful to you. Oracle Data Safe uses this name in its reports. All characters are accepted. The maximum number of characters is 255.
- For Compartment, select the compartment where you want to store the target database resource.
- (Optional) For Description, enter a description that is meaningful to you.
- For Database service name, enter the service name of the CDB or PDB. You can use the database name on the Configuration tab of the RDS Amazon console for service name.
- For Database IP address/endpoint, Oracle recommends you enter the database IP address, which can be found under the Connectivity and Security tab of the Amazon RDS console.
- For Database port number, enter the database port number, which can be found under the Connectivity and Security tab of the Amazon RDS console.
- If you did not already grant roles to the database user during the
preregistration tasks, select Download privilege
script and save the
datasafe_privileges.sqlscript to your computer. The script includes instructions on how to use it to grant privileges to the Oracle Data Safe service account on your target database. You should also refer to the preregistration task Grant Roles to the Oracle Data Safe Service on a Non-Autonomous AI Database for additional details. - For Database user name and Database password, enter the name and password of the user you created in the preregistration tasks. If the user name is mixed case, enclose it in double-quotes (" "). Oracle Data Safe uses this account to connect to the target database.
- (Optional) To add a tag to organize and track this resource in your tenancy, select Add tag. Select a namespace, select a key, and enter a key value.
- Select Next.
Step 2: Connectivity option
In this step, choose to use an Oracle Data Safe on-premises connector or an Oracle Data Safe private endpoint to connect Oracle Data Safe to your Amazon RDS for Oracle database. If you have FastConnect or VPN Connect set up between your network and a virtual cloud network (VCN) in Oracle Cloud Infrastructure, you can register your database with Oracle Data Safe by using an Oracle Data Safe private endpoint.
- For Choose a connectivity option, select On-premises connector or Private endpoint.
- For TCP/TLS, select TCP or TLS as the network protocol.
- If you are using a private endpoint and TLS, do the
following:
- Select One way TLS or Mutual TLS.
- If you select One way TLS, upload the TrustStore of your database in PEM, PKCS#12 wallet, or JKS wallet format. You can also enter the wallet password if required. This file is required whether client authentication is enabled or disabled on your target database.
- If you select Mutual TLS, upload the TrustStore of your database in the format of PEM file, PKCS#12 wallet, or JKS wallet and enter the wallet password. This file is required whether client authentication is enabled or disabled on your target database. When client authentication is enabled on your target database, upload the KeyStore of your database in the format of PEM file, PKCS#12 wallet, or JKS wallet. This file is not required when client authentication is disabled.
- If you are using TLS with either a private
endpoint or on-premises connector , do the following in your AWS environment.
- Configure an SSL option group to enable an SSL connection. After enabling the SSL connection, the certificate authority will show up. See Oracle Secure Sockets Layer and Creating an option group from Amazon to learn how to enable the SSL option.
- Modify the inbound rules on port 2484 (opened by default) on Amazon RDS to allow for the TLS connection.
- At Do you want to use an existing on-premises connector (or
private endpoint)?, toggle Yes or
No.
- If Yes: Select the compartment where the on-premises connector (or private endpoint) resides, and then select the on-premises connector (or private endpoint). Note that a private endpoint needs to be in a VCN that can access your on-premises database.
- If No: For an on-premises connector, select a compartment to store the on-premises connector, enter name for the on-premises connector, and enter a description. For a private endpoint, enter a display name, select a compartment to store the private endpoint, select a virtual network compartment and virtual cloud network, select a subnet compartment and subnet, and optionally enter a private IP address.
- Select Next.
Step 3: Add peer database
If you're registering an Active Data Guard associated database, then you can add peer databases during this step.
It is also possible to register peer databases after you register the primary database. See Manage Peer Databases Associated with a Registered Active Data Guard Primary Database.
- If you're not registering an Active Data Guard associated database, select Next to skip this step.
- For each peer database that you want to add, provide the following
information as needed:
- Peer display name
- Database service name
- Database IP address
- Database port number
- TCP or TLS
- If you are configuring a TLS connection, select a TLS type (One way TLS or Mutual TLS). For Mutual TLS, upload a truststore wallet, upload a keystore wallet, and enter the wallet password. For One way TLS, upload a truststore wallet and enter the wallet password.
- Select Add row.
- Repeat steps 2 and 3 to add additional peer databases.
- Select Next.
Step 4: Add security rule
This step applies if you are using an Oracle Data Safe private endpoint. To allow communication between an Amazon RDS for Oracle database and an Oracle Data Safe private endpoint, you must create an egress security rule in Oracle Cloud Infrastructure (OCI). You can allow the wizard to create the rule for you, create it manually in OCI (see Security Rule for Amazon RDS for Oracle), or skip this step if you already have a security rule you want to use. The target database remains inactive in Oracle Data Safe until the required security rule is configured.
See Also:
For more information about security lists and network security groups, see Access and Security in the Oracle Cloud Infrastructure documentation.- To bypass security rule configuration, select No.
- To allow the wizard to configure the security rule, select
Yes. Select Security list or
Network security group, and then select the name of the
security list or NSG. You can change the compartment if needed. The wizard displays
the rule that will be added.
Note:
If you add peer databases during registration, the same egress rule is created for the database and each peer database. - Select Next to continue in the wizard.
Step 5: Review and submit
In this step, the wizard displays the configuration you entered in the previous steps.
- Carefully review the information on this page.
- If all of the settings are correct, select the check box I acknowledge that charges in Data Safe will apply for the Amazon RDS for Oracle database, and then select Register.
- If you need to make changes, select Previous to return to any of the earlier steps, or select Close to cancel.
Step 6: Registration progress
After you select Register in the wizard, you can monitor the progress of the target registration. Each task is listed and processed sequentially. If any errors occur, they are displayed. You can select Previous to return to earlier pages and correct them.
Note:
Do not select the Close button in the wizard, sign out of OCI, or close the browser tab until the wizard shows that all of the tasks listed are resolved. If you close prematurely, then the information for all of the tasks that have not yet been completed is lost and the target database is not registered.If there is no further work to do, the registration completes, and the wizard presents the Target database information page. Here you can again review the registration details and complete any post-registration tasks as required.
Post Registration Tasks for an Amazon RDS for Oracle Database
| Task Number | Task | Link to Instructions |
|---|---|---|
| 1 |
(If you are using an Oracle Data Safe on-premises connector) Download the install bundle for the on-premises connector and then install the on-premises connector on a host machine on your network. |
Create an Oracle Data Safe On-Premises Connector |
| 2 | (If you are using a TLS connection and an Oracle Data Safe on-premises connector) Configure a TLS connection between the on-premises connector and your target database. | Configure a TLS Connection Between the On-Premises Connector on Your Host Machine and Your Database |
| 3 |
(Optional) Change which features
are allowed for the Oracle Data Safe service account on your target database by
granting/revoking roles from the account. You need
to be the |
Grant Roles to the Oracle Data Safe Service Account on Your Target Database |
| 4 |
(Optional) Grant users access to Oracle Data Safe features with the target database by configuring policies in Oracle Cloud Infrastructure Identity and Access Management. |
Create IAM Policies for Oracle Data Safe Users |
| 5 |
Make sure to allow ingress traffic to your target database from the Oracle Data Safe private endpoint or Oracle Data Safe on-premises connector. |
(none) |
| 6 |
(If you are using an on-premises
connector) Oracle recommendation: Ensure
that only the on-premises client can connect to
your on-premises Oracle database by specifying in
|
TCP.INVITED_NODES (Oracle AI Database Net Services Reference guide) |