Troubleshooting Oracle Database@Azure

Find troubleshooting tips for Oracle Database@Azure onboarding and cloud platform issues.

Note

For Troubleshooting information specific to Oracle Exadata Database and Oracle Autonomous Database resources in Oracle Database@Azure deployments, see the following pages:

Purchasing Offers

Private offer isn't available in Azure Marketplace: collection rule isn't enabled

Details: A private offer created for your organization by Oracle Sales is not displaying in Azure Marketplace.

Error: The private products collection rule is not enabled in Azure Private Marketplace by the administrator of the Marketplace collection that is configured for the Azure subscription being used for Oracle Database@Azure. For more information, see Collections overview in the Azure documentation.

Workaround: For instructions on enabling the private products collection rule, see Collection rules in the Azure documentation.

An image of the Mananage marketplace page showing the Rules configuration dialog.
Private offer isn't available in Azure Marketplace: 3rd party services not allowed for purchase

Details: A private offer created for your organization by Oracle Sales cannot be purchased in Azure Marketplace.

Error: Azure Marketplace purchases are disabled by the administrator of a subscription being used for Oracle Database@Azure. Either all purchases are denied, or only Free/BYOL SKUs are allowed.

Workaround: Have the subscription administrator enable the purchase of 3rd party services in Azure Marketplace. The Azure Marketplace authorization for the subscription must be "On", and can't be "Free/BYOL SKUs Only" or "Off". See Purchase control through EA billing administration under an Enterprise Agreement (EA) in the Azure documentation for more information.

Microsoft Azure Locks

Terminations and Microsoft Azure locks

We recommend the removal of all Microsoft Azure locks to Oracle Database@Azure resources before terminating the resources. For example, if you're using a locked Microsoft Azure private endpoint with Oracle Database@Azure, confirm that the endpoint can be deleted, then remove the lock before deleting the Oracle Database@Azure resources. If you have a policy to prevent the deletion of locked resources, the Oracle Database@Azure work flow to delete system resources fails because Oracle Database@Azure can't delete a locked resource.

Networking

IP address requirement differences between Oracle Database@Azure and Exadata in OCI

IP address requirements are different between Oracle Database@Azure and Exadata Database Service on Dedicated Infrastructure in Oracle Cloud Infrastructure (OCI). In the Requirements for IP Address Space documentation for Exadata in OCI, the following differences with the requirements of Oracle Database@Azure must be considered:

  • Oracle Database@Azure only supports Exadata X9M. All other shapes are unsupported.

  • Oracle Database@Azure reserves 13 IP addresses for the client subnet.

Automatic network ingress configuration

You can connect a Microsoft Azure VM to an Oracle Exadata VM cluster if both are in the same virtual network (VNet). This functionality is automatic, and requires no extra changes to network security group (NSG) rules. If you need to connect an Azure VM from a different VNet than the one used by the Exadata VM cluster, you must also configure NSG traffic rules to let the other VNet's traffic to flow to the Exadata VM cluster. For example, if you have 2 VNets ("A" and "B"), with VNet A serving the Microsoft Azure VM, and VNet B serving the Oracle Exadata VM cluster, you need to add VNet A's CIDR address to the NSG route table in OCI.

Table 1.1 Default Client NSG Rules
Direction Source or destination Protocol Details Description

Direction: Egress

Stateless: No

Destination Type: CIDR

Destination: 0.0.0.0/0

All protocols

Allow: All traffic for all ports

Default NSG egress rule

Direction: Ingress

Stateless: No

Source Type: CIDR

Source: Microsoft Azure VNet CIDR

TCP

Source Port Range: All

Destination Port Range: All

Allow: TCP traffic for all ports

Ingress for all TCP from Microsoft Azure VNet

Direction: Ingress

Stateless: No

Source Type: CIDR

Source: Microsoft Azure VNet CIDR

ICMP

Type: All

Code: All

Allow: ICMP traffic for all

Ingress for all ICMP from Microsoft Azure VNet
Table 1.2 Default Backup NSG Rules
Direction Source or Destination Protocol Details Description

Direction: Egress

Stateless: No

Destination Type: Service

Destination: OCI IAD object storage

TCP

Source Port Range: All

Destination Port Range: 443

Allow: TCP traffic for port 443 HTTPS

Allows access to Object Storage

Direction: Ingress

Stateless: No

Source Type: CIDR

Source: 0.0.0.0/0

ICMP

Type: 3

Code: 4

Allow: ICMP traffic for 3, 4 Destination Unreachable: Fragmentation needed and "Don't Fragment" was set

Allows Path MTU Discovery fragmentation messages

Prerequisites for the Azure East US 2 Region

If you onboarded with Oracle Database@Azure before April 15, 2025 and you want to use the Azure East US 2 region, you need to create policies in your OCI tenancy that allow you to create Oracle Database@Azure resources and use metrics in Azure East US 2. Use the instructions in this section to create policies for resources creation and metrics.

To enable resource creation in Azure East US 2

Create the policy described in this section to enable resource creation in Azure East US 2. If you try to create resources to East US 2 without the required permissions, the Azure Portal displays the "Your deployment failed" message:

An image of the Azure console displaying a deployment failure message for an Oracle Database@Azure VM cluster

Create the required policy as follows:

  1. Open the navigation menu  and select Identity & Security. Under Identity, select Policies.
  2. Select Create Policy.
  3. Name: Enter Additional_Multicloud_Policy
  4. Description: Optional. Enter a description. For example, "Policy to enable Oracle Database@Azure resource creation in the Azure East US 2 region."
  5. In the Policy Builder, use the Show manual editor toggle switch to enable the manual policy editor field, then paste the following policy into the manual editor:

    define tenancy networking-dataplane2 as ocid1.tenancy.oc1..aaaaaaaailqy63b6fbqoa6jyd324iyb5xoafpji2j6evpqqx5or74vwknv5a
       endorse any-user to {DRG_ATTACHMENT_READ, DRG_ATTACH, DRG_DETACH, VCN_ATTACH, DRG_ROUTE_TABLE_ATTACH, ROUTE_TABLE_ATTACH, ROUTE_TABLE_DETACH} in tenancy networking-dataplane2 where all { request.principal.type = 'multicloudlink' }
  6. Select Create to create the policy. The new policy is listed in the Policies list view page.
Tip

If you onboarded with Oracle Database@Azure on or after April 15, 2025no action is required.
To enable observability (metrics) in Azure East US 2

Create the required policy for observability (metrics) as follows:

  1. Open the navigation menu  and select Identity & Security. Under Identity, select Policies.
  2. Select Create Policy.
  3. Name: Enter Additional_Observabilioty_Multicloud_Policy
  4. Description: Optional. Enter a description. For example, "Policy to enable Oracle Database@Azure metrics for Azure East US 2 region."
  5. In the Policy Builder, use the Show manual editor toggle switch to enable the manual policy editor field, then paste the following policy into the manual editor:

    define tenancy obs_tenancy_2 as ocid1.tenancy.oc1..aaaaaaaalfamrkmvchwc3mndr4c4htwtntx2ampbas3z42c6sxyqviit4gta
    define tenancy obs_cp_tenancy_2 as ocid1.tenancy.oc1..aaaaaaaa7bzfp55yuik3t2sesnqgsyohpbfr4ocl4vlq7foyhmaa34xktyja
    endorse any-user to use stream-push in tenancy obs_tenancy_2 where all { request.principal.type='multicloudlink' }
    endorse any-user to read streams in tenancy obs_tenancy_2 where all { request.principal.type='multicloudlink' }
    admit any-user of tenancy obs_tenancy_2 to use metrics in compartment id ocid1.compartment.oc1..aaaaaaaalro4yg4evjyyrtxrjedakvtg6tcqizdg4xulwbcxctwtpc3nvjdq where all {request.principal.type='serviceconnector'}
    admit any-user of tenancy obs_cp_tenancy_2 to { DATABASE_INSPECT, PLUGGABLE_DATABASE_INSPECT } in compartment id ocid1.compartment.oc1..aaaaaaaalro4yg4evjyyrtxrjedakvtg6tcqizdg4xulwbcxctwtpc3nvjdq where all { request.principal.type = 'workload', request.principal.namespace = 'obs-cp', request.principal.service_account = 'obs-cp-service-account’}
    
  6. Select Create to create the policy. The new policy is listed in the Policies list view page.
Tip

If you onboarded with Oracle Database@Azure on or after April 15, 2025, no action is required.