Troubleshooting and Known Issues for Exadata Services
Use the information in this section to resolve common errors and provisioning issues in your Oracle Database@Azure environments.
Troubleshooting Topics
- Terminations and Microsoft Azure Locks for Exadata Services
- Private DNS Fully-Qualified Domain Name (FQDN) Can't Contain More Than Four (4) Labels for an Oracle Exadata VM Cluster
- Not Authorized Error When Private DNS With No Tags is Used for Exadata Services
- IP Address Requirement Differences for Exadata Services
- Maximum Transmission Unit (MTU) Differences for Exadata Services
- Private DNS Zone Limitation for Exadata Services
- Automatic Network Ingress Configuration for Exadata Services
Known Issues
- Oracle Exadata VM Cluster Provisioning Fails with Authorization Error
- Cannot Delete Exadata Infrastructure
- "Scaling In Progress" Status Doesn't Display for Pluggable Database (PDB)
- Oracle Exadata VM Cluster Provisioning Fails Because Number of Available IPs Reported by OCI and Azure Doesn't Match
- Metrics Reporting Losses in Microsoft Azure
Terminations and Microsoft Azure Locks for Exadata Services
Oracle advises removal of all Microsoft Azure locks on Oracle Database@Azure resources before terminating an Exadata Services resource.
For example, if you created a Microsoft Azure private endpoint, remove that resource first. If you have a policy that prevents the deletion of locked resources, the Oracle Database@Azure workflow will fail because Oracle Database@Azure cannot delete the lock.
Private DNS Fully-Qualified Domain Name (FQDN) Can't Contain More Than Four (4) Labels for an Oracle Exadata VM Cluster
When creating an Oracle Exadata VM Cluster, if you select a private DNS zone whose FQDN has more than 4 labels (delimited by a period '.'), you get the following error:
Error returned by CreateCloudVmCluster operation in Database service. (400, InvalidParameter, false) domain name cannot contain more than 4 labels
The workaround is to rename the private DNS that caused the error, or select a different private DNS whose FQDN has four (4) or less labels.Not Authorized Error When Private DNS With No Tags is Used for Exadata Services
When creating an Oracle Exadata VM Cluster, if you select a private DNS zone created without any tags, the default OCI tag oracle-tags
is automatically generated for the VM cluster. If the tag namespace isn't authorized in the OCI tenancy, this might cause an error.
404 NotAuthorizedOrNotFound
The workaround is to add the following policies to the OCI tenancy:Allow any user to use tag-namespaces in tenancy where request.principal.type = ‘multicloudlink’
Allow any user to manage tag-defaults in tenancy where request.principal.type = ‘multicloudlink’
IP Address Requirement Differences for Exadata Services
There are IP address requirement differences between Oracle Database@Azure and Oracle Cloud Infrastructure (OCI).
- Oracle Database@Azure only supports Exadata X9M. All other shapes are unsupported.
- Oracle Database@Azure reserves 13 IP addresses for the client subnet versus 3 for OCI requirements.
Maximum Transmission Unit (MTU) Differences for Exadata Services
Maximum transmission unit (MTU) is the largest frame size (in bytes) that can be sent. It is a configurable setting.
- Azure default MTU size = 1500 bytes
- OCI default MTU size = 9000 bytes
Due to the differences in default MTU sizes, Path MTU Discovery (PMTUD) is required to determine the proper MTU between Azure resources and OCI services. For PMTUD to work, customers must allow Internet Control Message Protocol (ICMP) Type 3 code 4 on the entire network stack. Turning off ICMP completely can result in connectivity issues.
Private DNS Zone Limitation for Exadata Services
When provisioning Exadata Services, a private DNS zone can only select zones with four labels or less.
For example, a.b.c.d
is allowed, while a.b.c.d.e
is not allowed.
Automatic Network Ingress Configuration for Exadata Services
You can connect a Microsoft Azure VM to an Oracle Exadata VM Cluster if both are in the same virtual network (VNet). The functionality is automatic and requires no additional changes to network security group (NSG) rules. If you need to connect an Microsoft Azure VM from a different VNet than the one where the Oracle Exadata VM Cluster was created, an additional step to configure NSG traffic rules to allow the other VNet's traffic to flow properly.
As an example, if you have two (2) VNets (A and B) with VNet A serving the Microsoft Azure VM and VNet B serving the Oracle Exadata VM Cluster, you need to add VNet A's CIDR address to the NSG route table in OCI.
Table 1-2 Default Client NSG Rules
Direction | Source or Destination | Protocol | Details | Description |
---|---|---|---|---|
Direction: Egress Stateless: No |
Destination Type: CIDR Destination: 0.0.0.0/0 |
All Protocols | Allow: All traffic for all ports | Default NSG egress rule |
Direction: Ingress Stateless: No |
Source Type: CIDR Source: Microsoft Azure VNet CIDR |
TCP |
Source Port Range: All Destination Port Range: All Allow: TCP traffic for ports: All |
Ingress all TCP from Microsoft Azure VNet. |
Direction: Ingress Stateless: No |
Source Type: CIDR Source: Microsoft AzureVNet CIDR |
ICMP |
Type: All Code: All Allow: ICMP traffic for: All |
Ingress all ICMP from Microsoft Azure VNet. |
Table 1-3 Default Backup NSG Rules
Direction | Source or Destination | Protocol | Details | Description |
---|---|---|---|---|
Direction: Egress Stateless: No |
Destination Type: Service Destination: OCI IAD object storage |
TCP |
Source Port Range: All Destination Port Range: 443 Allow: TCP traffic for ports: 443 HTTPS |
Allows access to object storage. |
Direction: Ingress Stateless: No |
Source Type: CIDR Source: 0.0.0.0/0 |
ICMP |
Type: 3 Code: 4 Allow: ICMP traffic for: 3, 4 Destination Unreachable: Fragmentation Needed and Don't Fragment was Set |
Allows Path MTU Discovery fragmentation messages. |
Oracle Exadata VM Cluster Provisioning Fails with Authorization Error
Provisioning an Oracle Exadata VM Cluster fails with an authorization error as follows:
Authorization Failed
The client <client_name> with object id <object_id> does not have authorization to perform action 'Oracle.Database/location/operationStatuses/read' over scope <scope_details> or scope is invalid. If access was recently granted, please refresh your credentials.
The failure occurs because the user performing the action doesn't have Azure permissions for the Microsoft.BareMetal/BareMetalConnections
resource.
- Ensure that no Azure policy assigned to the user or the subscription is preventing the user from performing the action. If the user has specific permissions assigned to them directly, add the following resources to the authorized list.
Microsoft.BareMetal/BareMetalConnections
Microsoft.Network/privateDnsZones
- Delete the failed Exadata VM Cluster from the Azure UI.
- Wait 30 minutes to ensure that the Exadata VM Cluster is fully terminated in both Azure and OCI. This wait period ensures that all dependent resources are also deleted.
- Provision your new Exadata VM Cluster.
Cannot Delete Exadata Infrastructure
Azure has a targeted timeout of up to one (1) hour for the deletion of an Exadata VM Cluster. It may happen that this time is not enough for all the dependent resources in Exadata Infrastructure to be totally deleted, in particular network resources.
Cannot delete Exadata infrastructure. All associated VM clusters must be deleted before you delete the Exadata infrastructure. (Code: 400)
The workaround is to wait until all the Exadata VM Clusters associated with the Exadata Infrastructure have been successfully terminated in OCI.
"Scaling In Progress" Status Doesn't Display for Pluggable Database (PDB)
Pluggable databases (PDBs) don't display a "Scaling in progress" status while a scaling operation is in progress.
Instead, the PDB status goes from "Accepted" to "Updating". No workaround available.
Oracle Exadata VM Cluster Provisioning Fails Because Number of Available IPs Reported by OCI and Azure Doesn't Match
Azure reports the wrong number of available IPs in the subnet, causing Oracle Exadata VM Cluster provisioning to fail. This causes the following error:
Error returned by CreateCloudVmCluster operation in Database service.(400, InvalidParameter, false) Cidr block of the subnet must have at least 11 ip addresses available.
Verify the correct number of available IP addresses in the subnet using the OCI console. For more information, see Listing Private IP Addresses. The workaround is to reconfigure the subnet according to the prerequisites.
Metrics Reporting Losses in Microsoft Azure
If any exporter sends a metric that is older than 20 minutes, the agents drops it and customers lose that data.
- Certificates expired. Exporter cannot establish connection with agent and a backlog of metrics builds. After rotating to new certificates, the metrics are stale and because they are more than 20 minutes old, the agent drops the metrics and customers will see these metrics.
- Backlog: When the exporter, for any reason, develops a backlog that results in the exporter taking longer than usual to process the metrics, metric will be lost if they are received by the agent more than 20 minutes old.