Connect to the Oracle Exadata Database Service on
Cloud@Customer Service
Learn how to connect to an Oracle Exadata Database Service on
Cloud@Customer system using SSH, and how to connect to an Exadata Cloud@Customer database using Oracle Net Services (SQL*Net).
Connecting to a Virtual Machine with SSH You can connect to the virtual machines in an Oracle Exadata Database Service on Cloud@Customer system by using a Secure Shell (SSH) connection.
You can connect to the virtual machines in an Oracle Exadata Database Service on
Cloud@Customer system by using a Secure Shell (SSH) connection.
Most Unix-style systems (including Linux, Oracle Solaris, and macOS) include
an SSH client. For Microsoft Windows systems, you can download a free SSH client called
PuTTY from the following site: "http://www.putty.org".
Connecting from a Unix-Style System To access a virtual machine on an Oracle Oracle Exadata Database Service on Cloud@Customer system from a Unix-style system using SSH, use this procedure.
Prerequisites for Connecting to an Oracle Exadata Database Service on
Cloud@Customer System
🔗
To access a virtual machine in an Oracle Exadata Database Service on
Cloud@Customer system using SSH, be prepared to provide the host name or IP address of the virtual machine.
An SSH private key file that corresponds to a public key that is registered in the system.
When you create a VM cluster on your Oracle Exadata Database Service on
Cloud@Customer system, you must specify the public key portion of one or more SSH key pairs. You can also register extra keys separately after you create the VM cluster.
Note
The public keys are stored in the authorized_keys file at ~/.ssh/authorized_keys. Separate authorized_keys files are located under the home directories of the operating system users. By default, only the opc user account has an authorized_keys entry and is able to log in remotely. Do not remove or alter the automatically generated entry in authorized_keys for the opc user.
The host name or IP address for the virtual machine that you
want to access.
See, Using the
Console to Check the Status of a VM Cluster Virtual
Machine.
Connecting to a Virtual Machine from a
Microsoft Windows System Using PuTTY 🔗
Learn to access a virtual machine from a Microsoft Windows system using
PuTTY.
Before you begin
Before you use the PuTTY program to connect to a virtual machine, you need the
following:
The IP address of the virtual machine
The SSH private key file that matches the public key associated with the
deployment. This private key file must be in the PuTTY
.ppk format. If the private key file was originally
created on the Linux platform, you can use the PuTTYgen program to
convert it to the .ppk format.
To connect to a virtual machine using the PuTTY program on Windows:
Download and install PuTTY.
To download PuTTY, go to http://www.putty.org/ and click the
You can download PuTTY here link.
Run the PuTTY program (putty.exe).
The PuTTY Configuration window is displayed, showing the
Session panel.
In the Host Name (or IP address) field, enter the host name or IP
address of the virtual machine that you want to access.
Confirm that the Connection type option is set to
SSH.
In the Category tree, expand
Connection if necessary and then click
Data.
The Data panel is displayed.
In the Auto-login username field, enter the operating
system user you want to connect as:
Connect as the user opc to perform operations that
require root or oracle access to the
virtual machine, such as backing up or patching; this user can use the
sudo command to gain root or
oracle access to the VM.
Confirm that the When username is not specified option
is set to Prompt.
In the Category tree, expand SSH
and then click Auth.
The Auth panel is displayed.
Click the Browse button next to the Private key file for
authentication field.
Then, in the Select private key file window, navigate to
and open the private key file that matches the public key that is associated
with the deployment.
In the Category tree, click
Session.
The Session panel is displayed.
In the Saved Sessions field, enter a name for the
connection configuration. Then, click Save.
Click Open to open the connection.
The PuTTY Configuration window closes and the PuTTY terminal window
displays.
If this is the first time you are connecting to the VM, the PuTTY Security
Alert window is displayed, prompting you to confirm the public key. Click
Yes to continue connecting.
To access a virtual machine on an Oracle Oracle Exadata Database Service on
Cloud@Customer system from a Unix-style system using SSH, use this procedure.
Enter the following SSH command to access the virtual machine:
ssh –i private-keyuser@node
In the preceding syntax:
private-key is the full path and name of the
file that contains the SSH private key that corresponds to a public key
that is registered in the system.
user is the operating system user that you
want to use to connect:
To perform operations as the Oracle Database
software owner, connect as as opc and
su oracle. The oracle user
does not have root user access to the virtual
machine.
To perform operations that require
root access to the virtual machine, such as
patching, connect as opc. The
opc user can use the sudo
-s command to gain root access to
the virtual machine.
node is the
host name or IP address for the virtual machine that you want to
access.
Identify the database instances for the database that you want to access. For
example:
/u01/app/12.2.0.1/grid/bin/srvctl status database -d s12c
Instance s12c1 is running on node node01
Instance s12c2 is running on node node02
Configure the environment settings for the database that you want to access.
For example:
. oraenv
ORACLE_SID = [oracle] ? s12c
The Oracle base has been set to /u02/app/oracle
export ORACLE_SID=s12c1
You can use the svrctl command to display more detailed
information about the database. For example:
srvctl config database -d s12c
Database unique name: s12c
Database name:
Oracle home: /u02/app/oracle/product/12.2.0/dbhome_2
Oracle user: oracle
Spfile: +DATAC4/s12c/spfiles12c.ora
Password file: +DATAC4/s12c/PASSWORD/passwd
Domain: example.com
Start options: open
Stop options: immediate
Database role: PRIMARY
Management policy: AUTOMATIC
Server pools:
Disk Groups: DATAC4
Mount point paths:
Services:
Type: RAC
Start concurrency:
Stop concurrency:
OSDBA group: dba
OSOPER group: racoper
Database instances: s12c1,s12c2
Configured nodes: node01,node02
CSS critical: no
CPU count: 0
Memory target: 0
Maximum memory: 0
Default network number for database services:
Database is administrator managed
You can access the database by using SQL*Plus. For example:
sqlplus / as sysdba
SQL*Plus: Release 12.2.0.1.0 Production ...
Copyright (c) 1982, 2016, Oracle. All rights reserved.
Connected to:
Oracle Database 12c EE Extreme Perf Release 12.2.0.1.0 - 64bit Production
Connecting to a Database Using SCAN To create an Oracle Net Services connection by using the SCAN listeners, you can choose between two approaches.
Connecting to a Database Using a Node Listener To connect to an Oracle Database instance on Oracle Exadata Database Service on Cloud@Customer with a connect descriptor that bypasses the SCAN listeners, use this procedure to route your connection directly to a node listener.
Using Oracle Net Services to
Connect to a Database 🔗
Oracle Database Oracle Exadata Database Service on
Cloud@Customer supports remote database access by using Oracle Net Services.
Because Oracle Exadata Database Service on
Cloud@Customer uses Oracle Grid Infrastructure, you can make Oracle Net Services connections by using Single Client Access Name (SCAN) connections. SCAN is a feature that provides a consistent mechanism for clients to access the Oracle Database instances running in a cluster.
By default, the SCAN is associated with three virtual IP addresses (VIPs).
Each SCAN VIP is also associated with a SCAN listener that provides a connection
endpoint for Oracle Database connections using Oracle Net Services. To maximize
availability, Oracle Grid Infrastructure distributes the SCAN VIPs and SCAN listeners
across the available cluster nodes. In addition, if there is a node shutdown or failure,
then the SCAN VIPs and SCAN listeners are automatically migrated to a surviving node. By
using SCAN connections, you enhance the ability of Oracle Database clients to have a
reliable set of connection endpoints that can service all of the databases running in
the cluster.
The SCAN listeners are in addition to the Oracle Net Listeners that run on
every node in the cluster, which are also known as the node listeners. When an Oracle
Net Services connection comes through a SCAN connection, the SCAN listener routes the
connection to one of the node listeners, and plays no further part in the connection. A
combination of factors, including listener availability, database instance placement,
and workload distribution, determines which node listener receives each connection.
Note
This documentation provides basic requirements for connecting to your Oracle Exadata Database Service on
Cloud@Customer databases by using Oracle Net Services.
Prerequisites for Connecting to a
Database with Oracle Net Services 🔗
Review the prerequisites to connect to an Oracle Database instance on Oracle Oracle Exadata Database Service on
Cloud@Customer using Oracle Net Services.
To connect to an Oracle Database on Oracle Exadata Database Service on
Cloud@Customer with Oracle Net Services, you need the following:
The IP addresses for your SCAN VIPs, or the hostname or IP address for a virtual machine that hosts the database that you want to access.
The database identifier: Either the database system identifier (SID), or a service name.
Connecting to a Database Using a Connect
Descriptor that References All of the SCAN VIPs 🔗
You can set up a connect descriptor for Oracle Exadata Database Service on
Cloud@Customer
System using multiple SCAN listeners.
This approach requires you to supply all of the single client access name
(SCAN) virtual IP (VIP) addresses, and enables Oracle Net Services to connect to an
available SCAN listener.
Use the following template to define a Net Services alias, which is typically
used to provide a convenient name for the connect descriptor:
Connecting to a Database Use a Connect
Descriptor that References a Custom SCAN Name 🔗
You can set up a connect descriptor for Oracle Exadata Database Service on
Cloud@Customer
System using a custom SCAN name.
Using this approach, you define a custom single client access name
(SCAN) name in your domain name server (DNS), which resolves to the three SCAN
virtual IP addresses (VIPs).
Use the following template to define a Net Services alias that references the
custom SCAN name:
To connect to an Oracle Database instance on Oracle Exadata Database Service on
Cloud@Customer with a connect descriptor that bypasses the SCAN listeners, use this procedure to route your connection directly to a node listener.
By using this method, you give up the high-availability and
load-balancing provided by SCAN. However, this method may be
desirable if you want to direct connections to a specific node or
network interface. For example, you might want to ensure that
connections from a program that performs bulk data loading use the
backup network.
Using this approach, you direct your connection using the hostname or IP
address of the node.
Example 5-1 Defining a Net Service Alias That Directly References the
Node
alias-name
is the name you use to identify the alias.
timeout
specifies a timeout period (in seconds), which enables you to
terminate a connection attempt without having to wait for a TCP
timeout. The (CONNECT_TIMEOUT=timeout) parameter is
optional.
node is the
hostname or IP address for the virtual machine that you want to
use.
sid-or-service-entry identifies the
database SID or service name using one of the following formats:
SID=sid-name. For example,
SID=S12C1.
SERVICE_NAME=service-name. For example,
SERVICE_NAME=PDB1.example.oraclecloudatcust.com.
Alternatively, you can use the easy connect method to
specify a connect descriptor with the following
format: