Syed Jaffar

Subscribe to Syed Jaffar feed
Whatever topic has been discussed on this blog is my own finding and views, not necessary match with others. I strongly recommend you to do a test before you implement the piece of advice given at my blog.The Human Fly
Updated: 3 hours 11 min ago

DB Links and ADB - Dos and Don'ts

Sat, 2020-04-04 16:00
DB Link simplifies data sharing across oracle databases. And DB link is created using the CREATE DATABASE LINK SQL command, a very simple and straight forward method. DB link creation has a different procedure on an Autonomous database in contract to typical Oracle databases. In this post, we will highlight the rules, limitations and the use of new DBMS_CLOUD_ADMIN package. Let's get into the action.

Rules and Limitations

Note some of below rules and limitations of creating DB link from ADB:

  • The target databases (non-ADB) should be configured to use TCP/IP with SSL (TCPS) authentication
  • The allowed DB port range is 1521-1525 to ensure the security. You can define the port while creating the DB link
  • ADB DB link support databases that are only accessible through a public IP or public hostname
  • One directory restricted to one wallet file. Create multiple directories to keep multiple wallet files of multiple databases
  • Supported target database versions are,,, 18c and 19c.
Creating DB link from Autonomous Database

Now let's walk through DB link creation procedure from an Autonomous database. As mentioned, you should use DBMS_CLOUD_ADMIN.CREATE_ DATABASE_LINK procedure on ADB. Below steps describe the required procedure:
  • Copy your target database wallet file (cwallet.sso) which contains target database certification to an object store
  • Using DBMS_CLOUD.CREATE_CREDENTIAL procedure, create access credentials to the object store where the target wallet file is stored.
  • Upload the target database wallet file from Object store to database directory using the DBMS_CLOUD.GET_OBJECT procedure. Refer example below:
credential_name => 'DEFF_CRED_CRDB',
object_uri => '
directory_name => 'DATA_PUMP_DIR');
-- DATA_PUMP_DIR is the predefined/default directory. It can be another DB directory.
  • Create credentials on ADB, refer below example:

credential_name => 'DBL_CRDB',
username => 'SCOTT', -- username must be specified in CAPITAL
password => '

Details are stored in the database in encrypted format.
You can use the query below to list the stored credentials:

SELECT credential_name, username, comments FROM all_credentials;
  • You can use below command to drop credentials from the database:

    • Now we are ready to create database link from Autonomous database. Use the example below to create:
    db_link_name => 'ADB_TO_CRDB',
    hostname => '',
    port => '1525',
    service_name => 'example_medium.',
    ssl_server_cert_dn => 'CN=,OU=Oracle BMCS FRANKFURT,O=Oracle Corporation,L=Redwood City,ST=California,C=US',
    credential_name => 'DBL_CRDB',
    directory_name => 'DATA_PUMP_DIR');

    If you are not an admin privileged user, get the permission to run DBMS_CLOUD_ADMIN.CREATE_DATABASE_LINK procedure.

    Now, you can use the DB link from ADB to the target database.

    To drop DB link from ADB, you can use the example below:

    db_link_name => 'ADB_TO_CRDB' );


    Creating DB link to ADB

    We have learned so far how to create a DB link from ADB to target database. This section will zip through DB link creation to ADB.
    As I have mentioned my previous blog entry that ADB only accepts secured client connections. To which, you will have to download client connect credentials. You can refer my previous blog post for the procedure.

    Before creating database link, ensure the following is met:
    • Download the client connect credentials
    • Unzip the downloaded file to a secure location your computer
    • Using below example, create a db LINK ADB:
    BMCS US,O=Oracle Corporation,L=Redwood City,ST=California,C=US")))'

    At this point in time the DB link is ready.

    In nutshell, this blog post explained the do's and don'ts of creating DB link from/to ADB.

    Connecting to an Autonomous Database using JDBC Thin client

    Sat, 2020-04-04 08:09
    I have discussed in my earlier posts about establishing SQL * Plus and using the SQLcl tool details. Today's blog post will take you through JDBC Thin client configuration details to be able to successfully connect with an autonomous database service. Will primarily focus on mandatory JDK, JDBC versions and client connect credentials requirement details. Let's get started.

    To begin with, any Java application that uses JDBC Thin driver requires an Oracle wallet or JavaKeyStore(JKS). Luckily, these files are readily available on OCI console for download. Refer my earlier blog post to learn about downloading client connect credentials files and JavakeyStore files.

    Prerequisites for JDBC Thin Driver

    Below is the list of perquisites for JDBC Thin client connection:

    • Download Connect Credentials as explained in the previous post
    • Validate JDK version for security, if you are on less than JDK8u162
    • Check JDBC driver version
    • JDBC driver 18.3 or higher simplifies security credentials wallet connection configuration.
    • Specify the wallet directory in the JDBC connect string.
    • Include the wallet directory location in the JDBC url if no TNS_ADMIN environmental variable is set.
    Connection string url

    Part of client connect credentials downloads, you will have tnsnames.ora files which contains tns service names and connection strings. Below is an example of high level connect string entry:

    dbname_high= (description=
    US,O=Oracle Corporation,L=Redwood City,ST=California,C=US")))
    JDBC 18.3 Thin Driver connection string example, for Linux platform:


    Using JavaKeyStore (JKS)

    Below example shows the JDBC Thin driver connectivity using JKS to an ADB:

    Subsequently, add the JKS related connection properties to file. To use SSL connectivity over Oracle Wallet, below properties should be set to files:

    # Properties for using Java KeyStore (JKS)${TNS_ADMIN}/truststore.jks${TNS_ADMIN}/keystore.jks

    Once the properties are set, compile and run using the below example:

    java –classpath ./lib/ojdbc8.jar:./lib/ucp.jar UCPSample
    To go through your firewall with HTTP proxy requirement to connect to an internet, use JDBC Thin client 18.1 or higher. So, add the following to your tnsnames.ora file to go through HTTP proxy:

    ADWC1_high =
    (security=(ssl_server_cert_dn=",OU=Oracle BMCS US,O=Oracle Corporation,L=Redwood City,ST=California,C=US")

    In nutshell, we have walk through over JDBC thin driver client connection to an ADB requirements and prerequisites.

    Autonomous Database (ADB) connectivity with Oracle SQLcl

    Fri, 2020-04-03 16:00
    This blog post takes you through Oracle SQL Developer command line interface connectivity to an autonomous database (ADB). SQLcl is a free command line interface for Oracle database. It will allow interactive or batch execution of SQL and PL/SQL commands with in-line editing, statement completion, and command recall for a feature-rich experience capabilities. Download the tool from the below url:

    With SQLcl 4.2 or higher you can also connect  to ADB database, either using Oracle Call Interface or JDBC thin connection. Whatever connection mode, OCI or JDBC, it has to be setup before you can use the SQLcl.

    Use the below example to connect to a ADB using SQLcl oci connection:

    sql -oci

    SQLcl: Release 18.4 Production on Wed Apr 03 15:28:40 2019

    Copyright (c) 1982, 2019, Oracle. All rights reserved.

    Username? (''?) sales_dwh@adwc1_low
    Password? (**********?) **************
    Last Successful login time: Wed Apr 03 2019 15:29:19 -07:00

    Connected to:
    Oracle Database 18c Enterprise Edition Release - Production

    Use the below example to use SQLcl with JDBC thin connection:

    • Start with sql /nolog 
    • Configure the session to use existing wallet connection: 
    • SQL> set cloudconfig /home/adwc/
      Wallet Password: **********
    • Connect to ADB database , as shown below:
    • SQL> connect admin@adwc1_medium

    In my next post, will discuss JDBC connectivity details.

    SQL * Plus connectivity to Autonomous Database (ADB) procedure

    Fri, 2020-04-03 13:10
    Keeping myself occupied learning all about Autonomous Database (ADB) concepts. Thanks to Oracle for the free offer to course and a certification chance. So planned to write a few important topics along the way while learning. This post will focus on autonomous database (ADB) connectivity options, downloading connection credentials and procedure to connect a ADB database using the SQL * Plus tool.

    Autonomous Database (ADB) can be connected through SQL * Net, JDBC thick/thin or ODBC. All connections to the database must use SSL for encryption and under any circumstances, unsecured connection are not allowed. 

    To start with, every ADB database connection must be made over a public internet and application should use a secure connection (SSL).  Before using any connectivity method, database connect credentials must be downloaded from the OCI page for the respective database (instance) or region. Below procedure summarizes how to download connect credentials and use SQL * Plus to connect to a ADB.

    Downloading connection credentials

    As discussed earlier, ADB only accepts secure connections to the database. Therefore, Oracle client credential (wallet) files which contains your connection credentials should be downloaded first. The wallet can be downloaded either from ADB service console, or from the DB Connection button on instance page or through API calls. Use the following method to download the connection credentials from OCI console:

    • Navigate to ADB details page  and click on DB Connection button
    • Based on the connectivity requirement, choose either Instance or Regional wallet type and click on the Download button 
    • The credentials file is protected with a password. So, you will have to input a password before downloading the file. The password must be 8 characters long, with at least 1 letter and either 1 numeric character or 1 special character
    • Once the password is entered and confirmed, download button will be activated to download the connectivity zip file
    • Default name for the file is, and the zip files contains following files:
      • tnsnames.ora & sqlnet.ora
      • cwallet.sso & ewallet.p12
      • keystore.jks & tuststore.jks
      • & 
    Predefined DB Service Names

    The tns entries comes with the following predefined values:
    • high A high priority app connection for reporting and batch operations which runs in parallel, subject to queuing.
    • medium A typical connection service for reporting and batch operations with limited (4) parallel degree.
    • low A low priority connection service for reporting and batch operations with no parallelism options.
    • tp (for ATP only), typical application connection service for transaction processing operations with no parallelism.
    • tpurgent (ATP only) the highest priority application connection for time critical transaction processing operations. Can specify manual parallelism. 
    SQL * Plus connection to ADB

    Unlike other Oracle cloud options, ADB doesn't provide connectivity to the compute node. So, you have to install Oracle client software or higher version on your system. Once the client software is installed, download connection credentials using the procedure described above.

    Unzip/uncompress the zip file downloaded into a secure folder on your computer.

    Edit the sqlnet.ora file and replace ?/network/admin text with name of the folder containing the credentials, as shown in the below example on a unix/linux client:

    WALLET_LOCATION = (SOURCE = (METHOD = file) (METHOD_DATA = (DIRECTORY="/home/adw_credentials")))

     It is highly recommended to set TNS_ADMIN environmental variable and set the location of the credentials files.

    Update the sqlnet.ora and tnsnames.ora files as per below example if you have a firewall connection and requires HTTP proxy to connect internet (this scenario only support clients with or higher version):

    • sqlnet.ora should have this entry: SQLNET.USE_HTTPS_PROXY=on
    • And the tnsnames.ora entry should contains the following:
    ADWC1_high =
                (security=(ssl_server_cert_dn=",OU=Oracle BMCS US,O=Oracle Corporation,L=Redwood City,ST=California,C=US")
    Once you have the client software and connect credentials ready, now you can use the sql * plus tool to connect to a ADB. Refer below syntax:

    sqlplus sales_dwh@adwc1_low  

    SQL*Plus: Release - Production on Wed Apr 3 15:09:53 2019

    Copyright (c) 1982, 2018, Oracle. All rights reserved.

    Enter password:
    Last Successful login time: Wed Apr 03 2019 14:50:39 -07:00

    Connected to:
    Oracle Database 18c Enterprise Edition Release - Production

     You can also see the last successful login time.


    Free Oracle Learning and Certifications for OCI and Autonomous database - Limited period

    Tue, 2020-03-31 05:57
    Hello All,

    Oracle announced a limited period free access to Oracle Learning and Certifications on OCI and Autonomous Database technologies. 
    Its absolutely free of cost for everyone. Indeed it is a very good chance everyone to learn something new to update Oracle knowledge and get certified. Use the below Oracle link for enrolling to courses and certification:

    All the very best and happy learning.

    RAC DB upgrade from to ASM prerequisites fail with DUBA

    Sun, 2020-03-15 05:27

    A 3 node Oracle extended RAC has been successfully upgrade from to just last week. As part of the upgrade planning, we started off with GRID home upgrade process from to, followed by DB upgrade from to and finally DB upgrade to This was done over the 3 weeks. As there was no direct in-place database upgrade option for a database v11.2.0.1 to, we had to take the alternative route.

    In previous two blog posts, I have shared the details about the challenges faced and resolved. So, here is another challenge encountered during the database upgrade. Encountered the below pre-requisites failure during the pre-requisites validation by DBUA:

    Below is the details of the error:

    • ASM Upgrade Feasible Check: The database is using ASM as storage. Before you upgrade database, you need to upgrade ASM using Automatic Storage Management Configuration Assistant (ASMCA) from grid infrastructure home. ASM should be running from grid infrastructure home. Upgrade Storage Check :  Disk space usage summary Location +DATA_DG does not exist.

    It was wired to see the message despite the fact that the GRID was successfully upgraded, including ASM. After a quick search we have come across of two MOS references , mentioned below, and the solution was just straight forward.

    To expedite the post DB upgrade requirements, we did prepare complete environment for EB database.

    The solution was to rename the sqlnet.ora file from the 12c network/admin directory. One we did this and resumed DBUA, it went through.

    MOS References:

    Upgrade database to, DBUA fails: COULD NOT FIND ANY DISKGROUPS [2039864.1]
    Database Upgrade From To Pre-checks Failing while using DBUA [2317976.1]

    Oracle GI upgrade from to on Exadata

    Sat, 2020-03-07 03:50
    Yet another successful Exadata  Grid Infrastructure upgrade to 12.2. Of course the v12.2.0.1 is bit older, but as per customer's request, we had to proceed. As usual there are some takeaway points from this assignment too.  I am going to share some of the challenges encountered and fixed during the course of this upgrade.

    First thing is first. The 12.2 and above installation and upgrade is really cool with the golden image concept introduction. Even great to know that we can also apply the patch before running the or root upgrade. I really felt super cool about this.

    As part of 2 node Cluster upgrade from 12.1, an 12.2 software gold image is extracted to the 12.2 location and started with applyPSU (JAN2020 patch). During OUI validation, failing with the following error:

    [INS-42505] The installer has detected that the Oracle Grid Infrastructure home software at ($GRID_HOME) is not complete.

    The installation was looking older version of jar files, hence, it couldn't find, the warning message appeared. It took very less time to figure out the issue. As JAN20 PSU was applied before the OUI startup, it wasn't reflected, hence, ignored the message and resumed with the setup.

    After the successful execution on node 1 and node 2, we found that the session (Xwindow) become inactive and OUI couldn't continue.

    With >=12.2, you can easily resume the OUI from the point it failed. All you need to do is the following:

    Find out the latest response file used during the failed upgrade in the following location (depending on your 12.2 grid home) shown as example:


    And resume the setup from the first node, as show in below: -executeConfigTools -responseFile <responsefile.rsp>

    And the setup resumed and managed to complete the upgrade successfully.

    Oracle upgrade with restore point scenario fails

    Sat, 2020-03-07 02:44
    I was recently involved in a 3 instance Oracle RAC v11.2.0.1 database upgrade assignment. My favorite method of database upgrade is manual method. This time I had to opt DBUA tool as per customer demand. A guaranteed restore point was created just before initiating an upgrade process.

    When DBUA tool launched and initiated an upgrade process, there were lot of surprises thrown by the tool, like, unable to put the database in flashback database mode etc. It was a scary moment for everyone present around as the tool complained many other issues as proceed along. Finally, the upgrade process was aborted and the DBUA did mention to restore the database from a previous successful backup. It was a heart stop moment.

    Luckily no damage was done to the database and restore was not required. Wasn't very sure about guaranteed restore point on v11.2.0.1, so, it was dropped and relaunched the DBUA tool again. And this time the upgrade went through without any surprises and successfully upgraded the database to

    Exadata X8M - World's Fastest Database Machine

    Sun, 2019-11-10 08:11
    Exadata X8M has launched during OOW 2019, and termed as world's fastest Database Machine. Let's walkthrough about new additions that has made X8M as world's fastest Database Machine.

    An Exadata X8M is the industry's first DB machine integrated with Intel Optane DC persistent memory (read more about this) and 100 gigabit RDMA over converged ethernet. This will be dramatically improves the performance for all sort of workloads, such as OLTP, analytics, IoT, high frequency trading etc by eliminating the storage access bottlenecks. Persistent memory with RoCE networking can reduces IO latency significantly and boosts the performance by 2.5X.

    It uses RDMA directly from the DB to access persistent memory in smart storage servers, eliminating the entire OS, IO and network software stacks. Which will deliver the higher throughput with lower latency. Also, frees CPU resources on storage server to execute more smart scan queries for analytic workloads.

    Its in-memory performance with all advantages of shared storage benefits the Analytics and OLTP  workloads. Direct database access to shared persistent memory accelerates is the real game changer for application that demands large amounts of data.

    For more details, read the link below:

      Intermittent cellsrv crashes with ORA-07445 after upgrading to

      Tue, 2019-07-16 04:05
      Exadata X6-2 full and half racks were patched recently with Aug/2018 quarterly patch set. An ORA-07445 started to observe and the cellsrv intermittently crashing with ORA-07445 error. 

      Following error is noticed in the cellsrv alert.log:

      ORA-07445: exception encountered: core dump [0000000000000000+0] [11] [0x000000000] [] [] [] 

      The above is registered as a bug whenever cell storage is patched with or Therefore, if you are planning to patch your cell storage software with one of the above versions, ensure you also apply patch 28181789 to avoid cellsrv intermittently crashing with ORA-07445 error. Otherwise, you need to upgrade the storage software with 18.1.5.


      Customer may experience intermittent cellsrv crashes with ORA-07445: [0000000000000000+0] [11] [0x000000000] after upgrading storage cell software version to or


      Upgrade the Storage cell software to or


      Bug 28181789 - ORA-07445: [0000000000000000+0] AFTER UPGRADING CELL TO


      Patch 28181789 is available for and Storage software releases. Follow the README to instructions to apply the patch.
      apply 18.1.5 and later which includes the fix of 28181789

      xadata: Intermittent cellsrv crashes with ORA-07445: [0000000000000000+0] [11] [0x000000000] after upgrading to or (Doc ID 2421083.1)

      Oracle Exadata X8 key capabilities summary

      Thu, 2019-06-27 03:26
      Below is the summary of some of the key benefits of Exadata X8 database machine, software and hardware:

      Extreme (unmatched) performance
      According to Oracle, the new X8 database machine is capable of delivering unto 60% faster throughput performance in contrast to the earlier Exadata database machines. Having said that, you can pull a 50GB database under one second.

      Cost effective extended storage 
      Petabytes of cost effective storage with option software license. This can significantly reduce the storage cost.

      High Memory
      Can accommodate upto 28.5 of system memory. Good for heavy workload systems, such as , in-memory databases.

      Increased storage capacity
      In contrast to earlier models, X8 comes with 40% increase in disk capacity. Each X8 EF system comes with 50TB raw flash capacity. While, the X8 HC with XT storage option, it comes 160TB of raw capacity.

      High-performance connectivity
      X8 also comes with significant improvement in connectivity. It supports upto 400Gb of client connectivity over multiple 25 GB Ethernet links.

      OLTP Read/Write performance
      A full X8 rack, typically can do 6.5 million random reads and 5.7 random writes per second for a 8k DB.

      Automated features
      In addition to the above hardware improvements, it also X8 incorporates autonomous database capability. With ML and AI capabilities, the databases are auto tuned and auto maintained.

      List of technical specifications:

      • Up to 912 CPU cores and 28.5 TB memory per rack for database processing
      • Up to 576 CPU cores per rack dedicated to SQL processing in storage
      • From 2 to 19 database servers per rack
      • From 3 to 18 storage servers per rack
      • Up to 920 TB of flash capacity (raw) per rack
      • Up to 3.0 PB of disk capacity (raw) per rack
      • Hybrid Columnar Compression often delivers 10X-15X compression ratios
      • 40 Gb/second (QDR) InfiniBand Network
      • Complete redundancy for high availability

      Monitoring & Troubleshooting Oracle Cloud at Customer

      Fri, 2019-05-31 08:33
      The prime advantage of cloud at customer is to deliver all cloud benefits at your data center. Oracle cloud at customer provides the same. When Oracle cloud at customer is chosen, it is Oracle who is responsible to install, configure and manage the software and hardware required to run Oracle cloud at customer. However, customers are responsible for monitoring and troubleshooting resources instantiate on Oracle cloud at customer.

      Customers are required to understand the difference between system and user-space monitoring and the tools required. The Oracle cloud at customer subscription consists of the below components:

      • Hardware and Software
      • Control panel software
      • The Oracle Advanced Support Gateway (OASW)
      • The Oracle Cloud Service

      System monitoring vs User Space Monitoring

      Typically, Oracle cloud at customer is monitored at two level:
      1. System
      2. User space
      Oracle monitors the system and the customer monitors the user space.

      The systems or machine resources, such as : hardware, control panel and cloud services on Oracle cloud at Customer are managed by Oracle remotely using Oracle Advanced Gateway. The OAGW is only used and accessible to Oracle authorized personnel.

      The user space components consists the below:

      • Oracle Cloud accounts
      • VMs instances on IaaS or PaaS
      • DB that are provisioned within the PaaS subscription
      • Applications (Oracle or any third-party)
      Oracle manages the following hardware and software components:
      • Ethernet switches
      • Power Supplies
      • Exadata Storage Servers
      • Hypervisor running on the physical servers
      Customers can assign administrators to manage cloud accounts. Customers also are free to use any external monitoring agents to monitor user-space components.

      Why Oracle Cloud @ Customer is a good option?

      Thu, 2019-05-30 03:53
      One of the major concerns moving over cloud is the security for most of the organizations. Though cloud concept is around for quite sometime, still, a majority of customers are concerned about putting their data over cloud. To gain the confidence and at the same to take full advantage of Cloud technologies, various Cloud vendors started offering cloud at customer solutions. In this blog spot, am going to discuss about Oracle cloud at customer solutions, its advantages , subscription model etc.

      Oracle Cloud at Customer delivers full advantages of cloud technologies at your data center. You subscribe hardware and software together when you go for cloud at customer option. Though Oracle does the initial setup, configuration and day-to-day system management, you still have all the advantages of security, network of your data center.

      Typically, the cloud at customer option consist of the following:

      • The hardware required to run Cloud at customer
      • Control panel software
      • The Oracle Advanced Support Gateway
      • Oracle Cloud services
       As a customer, your responsibility involves managing cloud account and subscribed services. At any time, you can check your account balance and your current Oracle Cloud at Customer service usage. It is also possible that you can view your usage by region, by service, or by a specific time period.
      To check your account balance and usage, Oracle recommends that you sign in to your Oracle Cloud Account in an Oracle data region. From there, you can view your overall account usage and Universal Credits balance. 

      In nutshell, cloud at customer brings the cloud solutions to your data center, where you can apply all the rules of your data centre while taking the full advantages of cloud solutions.

      Network design for Oracle Cloud Infrastructure

      Tue, 2019-05-28 15:48
      Assuming, you are planning to migrate your resources from Oracle Cloud Infrastructure Compute classic environment to Oracle Cloud Infrastructure, this blog post explains the details of network design for Cloud Infrastructure environment. It's important to understand and map the network design and details from both environments.

      Cloud Inrastructure Compute Classic network has IP Networks and Shared Network model. On other hand, Cloud Infrastructure has Virtual Cloud Networks (VCNs) , Subnets, Availability Domain network model.

      Before migration, you must map the network resources between the environments. Source -> Target:
      Shared network -> VCN, IP Network -> IP Network, VPN -> IPSec VPN and Fast Connect classic -> FastConnect.

      Consider creating below listed network elements in Oracle Cloud Infrastructure:

      • VCN and Subnet CIDR Prefixes
      • DNS Names 
      Use the below procedure to configure cloud network for Cloud Infrastructure environment:

      1. Create one or more VCNs.
      2. Create an Internet gateway and/or NAT gateway. An Internet gateway is a virtual router that allows resources in a public subnet direct access the public Internet. A NAT gateway allows resources that don't have a public IP addresses to access the Internet, without exposing those resources to incoming traffic from the Internet.
      3. Configure a service gateway, if required. A service gateway provides a path for private network traffic between your VCN and a public Oracle service such as Oracle Cloud Infrastructure Object Storage.
      4. Create one or more subnets in each VCN.
      5. Configure local peering gateways between VCNs, if required.
      6. Configure security lists, security rules, and route tables for each subnet.

      Migrating Oracle Cloud Infrastructure Classic Workloads to Oracle Cloud Infrastructure - Migration Tools

      Tue, 2019-05-28 03:22
      If you are planning to migrate your resources from Oracle Cloud Infrastructure Classic to Oracle Cloud Infrastructure, Oracle provides variety of tools to achieve this. In this blog post will discuss some of thetools which can be used to migrate Oracle Cloud Infrastructure Classic Workload resources to Oracle Cloud Infrastructure. 

      The tools below can be used to identify resources from Oracle cloud infrastructure Classic environments and to migrate to Oracle Cloud Infrastructure tenancy. Using these tools, one can setup required network, and migrate VMs and block storage volumes over the targeted systems.

      Tools for migrating infrastructure resources : Compute, VMs and Block Storage

      • Oracle Cloud Infrastructure Classic Discovery and Translation Tool: as the name explains, it is a discovery tool, which assist discovering the resources of different resources in your Cloud Infrastructure Classic environments, such as : compute Classic, Object Storage classic, load balancing classic account. Additionally, it is capable of reporting the items in the specified environment, list of VMs in the source environment and also networking information of the source system.
      • Oracle Cloud Infrastructure Classic VM and Block Storage Tool: This tool automates the process of migrating VMs and Block Storage over to the target environment. 
      • Oracle Cloud Infrastructure Classic Block Volume Backup and Restore Tool: This tool used to migrate your remote snapshot of storage volumes as well as scheduled backups. 

      Tools for migrating databases

      To migrate databases to Oracle cloud infrastructure, you can use Oracle Cloud Infrastructure Class Database Migration tool. This tool uses Oracle RMAN to create backup and restore the database over the targeted system.

      Alternatively, Oracle Data Guard solution also can be used to migrate single or RAC databases to Oracle Cloud Infrastructure.

      Tools for migrating Object Storage

      • rclone command is used to migrate your object storage data f you don't use the Oracle Cloud Infrastructure Storage Software Appliance.
      • If Oracle Cloud Infrastructure Storage Software Appliance is used to store your object data, then you can migrate your data to your Oracle Cloud Infrastructure Object Storage account by using the Oracle Cloud Infrastructure Storage Gateway.

      How to change Remote Trail Location at Source– Golden Gate 12c

      Sun, 2019-05-26 02:29

      There is a requirement to modify the remote trail location because of typo in the mount point. To change the remote trail location of the Golden Gate, first verify the extract trail information using the command below. 

      GGSCI (hie-p-ggate) 48> INFO EXTTRAIL

             Extract Trail: /golgengate/ggs_home/dirdat/test/ru
              Seqno Length: 6
         Flip Seqno Length: yes
                   Extract: DPMP1
                     Seqno: 0
                       RBA: 0
                 File Size: 500M

             Extract Trail: D:\app\oracle\product\ogg_1\lt
              Seqno Length: 6
         Flip Seqno Length: yes
                   Extract: EXT1
                     Seqno: 0
                       RBA: 0
                 File Size: 100M
      GGSCI (hie-p-ggate) 49>

      First delete the current configuration of remote trail. 

      GGSCI (hie-p-ggate) 50> delete rmttrail /golgengate/ggs_home/dirdat/test/ru, extract dpmp1
      Deleting extract trail /golgengate/ggs_home/dirdat/test/ru for extract DPMP1

      After removing, then add the remote trail again with the new location. 

      GGSCI (hie-p-ggate) 51> add rmttrail /goldengate/ggs_home/dirdat/test/ru, extract dpmp1
      RMTTRAIL added.

      After deleting and adding now we can see the extract trail for the target with new location. 

      GGSCI (hie-p-ggate) 52> INFO EXTTRAIL

             Extract Trail: /goldengate/ggs_home/dirdat/test/ru
              Seqno Length: 6
         Flip Seqno Length: yes
                   Extract: DPMP1
                     Seqno: 0
                       RBA: 0
                 File Size: 500M

             Extract Trail: D:\app\oracle\product\ogg_1\lt
              Seqno Length: 6
         Flip Seqno Length: yes
                   Extract: EXT1
                     Seqno: 0
                       RBA: 0
                 File Size: 100M

      GGSCI (hie-p-ggate) 53>

      Oracle Database Upgrade made easy with AutoUpgrade utility

      Tue, 2019-05-21 03:59
      Upgrading Oracle database is undoubtedly a daunting task which requires a careful study, planning and execution to prevent any potential post upgrade shortcomings. Since Oracle determined to release a new Oracle version every year, at some-point-of-time, we all should focus on upgrading databases quite often than we used to perform earlier.

      Thanks to AutoUpgrade tool(utility), available with MOS Doc ID : 2485457.1, automates all upgrade process procedure without much human intervention or inputs. For latest AutoUpgrade utility version, always refer the MOD note and download. Though, with 12.2(DBJAN2019RU), 18.5 and 19.3, the AutoUpgrade utility available by default under the oracle home.

      AutoUpgrade is a command-line tool which can be used to upgrade one or many oracle databases with one command and a single configuration file. This utility automates upgrade process, such as, pre-upgrade tasks, performs automated fix-ups, perform database upgrade and run through post upgrade tasks as well. This saves a huge time and money when upgrading hundreds of databases in any environment.

      I am pretty sure AutoUpgrade make DBA's like easier when it comes to Oracle database upgrade. Have fun and test the capabilities of the tool.

      MOS Doc ID : AutoUpgrade Tool (Doc ID 2485457.1)

      Whats in Exadata X8 Server 19.2 Exadata Database Machine?

      Sun, 2019-04-14 05:01
      This blog post quickly scan through the new features of Exadata Database Machine in 19.2 and also hardware capacity and change in Exadata X8 server.

      • Exadata Database Machine Software 19.2.0, supports Exadata X8-2 and X8-8 hardware
      • Changes in IORM's flashcachesize and Disk I/O limits attributes
      • To control the cost of Exadata storage, X8 introduced a new configuration, Exadata Storage Extended (XT)
      • The XT model comes with 14TB hard drives with HCC compression capacity
      • The XT model doesn't have flash drive
      • The lower cost storage option comes with one CPU, less memory and without the core feature of SQL offloading
      • Exadata X8 server has the below hardware capacity per rack:
        • Limit of 912 CPU core and 28 TB memory
        • 2-19 database servers
        • 3-18 cell storage
        • 920 TB of RAW flash capacity
        • 3 PB of RAW disk capacity


      Oracle 19c Automatic Indexing - How well it's understood?

      Sun, 2019-03-10 13:05
      I wrote an article about Oracle 19c Automatic Indexing. Go to the below link for more details:

      Oracle 19c ASMCA interface

      Mon, 2019-02-25 02:08
      This blog post will walk through some of very cool screen shots of 19c ASMCA interface. I have no exposure with 18c ASMCA, but, the landing page of 19c ASMCA is really cool. Here are the screenshot for you:


      ASM Instance Management

      Disk group Management

      DG attributes

       root setup