2 Migrate Using DMS

Migrate data from an on-premises database to an Oracle Autonomous Transaction Processing-Shared (ATP-S) database using Database Migration (DMS) service.

The topics covered in this section describe the preparation steps, the migration tasks, and the postmigration tasks.

Prepare to Migrate

Before you begin with the migration of data an on-premises database to an Oracle Autonomous Transaction Processing-Shared (ATP-S) database, you must understand the high-level migration workflow, and meet the prerequisites and perform the premigration tasks that are described in this section.

Roadmap for Migrating Data to an Oracle Autonomous Transaction Processing-Shared (ATP-S) Database

This roadmap provides the migration workflow for migrating data from an on-premises database to an Oracle Autonomous Transaction Processing-Shared (ATP-S) database.

Table 2-1 provides the high-level steps required for migrating data to an ATP-S database, for all Oracle Fusion Middleware products that are certified with ATP-S database.

Table 2-1 Migration Roadmap

Product Name Migration Workflow

All Oracle Fusion Middleware products except Oracle Identity and Access Management Suite of products

Note: Before creating a backup of the schema version registry, perform the premigration tasks for Oracle Forms and Oracle GoldenGate Veridata. See Premigration Task for Oracle Forms and Premigration Task for Oracle GoldenGate Veridata.

Oracle Identity and Access Management Suite of products

-

Oracle Access Manager

Oracle Identity Manager

Oracle Internet Directory

Prerequisites

The prerequisites to migrate data from an on-premises database to an Oracle Autonomous Transaction Processing-Shared (ATP-S) database is described in the following sections.

Note:

Before you perform the prerequisite tasks, apply the latest bundle patches for the products, and the prerequisite patches needed for the bundle patches, if any.
Database Requirements

Your source and target database environment must meet these requirements to use Oracle Cloud Infrastructure Database Migration.

Table 2-2 Database requirements

Components Supported versions
Source Database

Oracle Database 19c

Supported Target Database Versions

Oracle Autonomous Database with Shared Exadata Infrastructure

Source Platforms

Linux-x86-64

Creating Resources

To create the resources that Oracle Cloud Infrastructure Database Migration operations depends on, see Creating Resources in Using Oracle Cloud Infrastructure Database Migration Service.

Setting Oracle GoldenGate for Online Migrations

Online migrations with Oracle Cloud Infrastructure Database Migration have a few additional prerequisite tasks because you must install Oracle GoldenGate Microservices, create GoldenGate users on the source database, and unlock the GoldenGate user on the target database.

Installing Oracle GoldenGate Microservices
  1. Deploy the "Oracle GoldenGate for Oracle - Database Migrations" image from Oracle Cloud Marketplace as follows.
    1. Log in to Oracle Cloud Marketplace.
    2. Search for the "Oracle GoldenGate for Oracle - Database Migrations" Marketplace listing.
    3. From the Marketplace search results, select the "Oracle GoldenGate for Oracle - Database Migrations" listing.
    4. Deploy the image using the instructions at Deploying Oracle GoldenGate Microservices on Oracle Cloud Marketplace in Using Oracle GoldenGate on Oracle Cloud Marketplace.

      Note:

      For Autonomous Database Shared Infrastructure, specify the Autonomous Database target during the deployment.
  2. Modify the wallet containing certificates for TLS authentication:
    1. Copy the wallet to GoldenGate instance.
      scp -i privatekey.ssh wallet_ATPS.zip opc@oggmachine:/u02/deployments/Target/etc
    2. Log in to the GoldenGate instance and unzip the wallet to the specified location.
      /u02/deployments/Target/etc/adb
    3. Modify the wallet location in sqlnet.ora file.
      /u02/deployments/Target/etc/adb

      Note:

      There is one more sqlnet.ora file in /u02/deployments/Target/etc/. Ensure to delete this file and update with sqlnet.ora present in /u02/deployments/Target/etc/adb.
    4. Delete existing tnsnames.ora file located in /u02/deployments/Target/etc directory.
    5. Copy tnsnames.ora file from /u02/deployments/Target/etc/adb to /u02/deployments/Target/etc directory.
      -bash-4.2$ cat sqlnet.ora
      WALLET_LOCATION = (SOURCE = (METHOD = file) (METHOD_DATA = (DIRECTORY="/u02/deployments/Target/etc/adb")))
      SSL_SERVER_DN_MATCH=yes
  3. Verify that the GoldenGate hub subnet allows ingress for port 443. See the security ingress rules in the example in Oracle Autonomous Database on Dedicated Exadata Infrastructure.
Creating GoldenGate Users on the Source Database

You must create Goldengate users on the source database as a SYS user with SYSDBA privileges.

  1. Connect to the PDB database as SYS as SYSDBA user and then create a GoldenGate administration user ggadmin in the PDB source database.
    CREATE USER ggadmin IDENTIFIED BY <ggadmin_password> DEFAULT TABLESPACE users TEMPORARY TABLESPACE temp;
    ALTER USER ggadmin QUOTA 100M ON USERS;
    GRANT UNLIMITED TABLESPACE TO ggadmin;
    GRANT CONNECT, RESOURCE TO ggadmin;
    GRANT SELECT ANY DICTIONARY TO ggadmin;
    GRANT CREATE VIEW TO ggadmin;
    GRANT DBA to ggadmin;
    GRANT EXECUTE ON dbms_lock TO ggadmin;
    EXEC dbms_goldengate_auth.GRANT_ADMIN_PRIVILEGE('ggadmin');
  2. Connect to the CDB database as SYS as SYSDBA user and create a different user in the CDB root as c##ggadmin.
    CREATE USER c##ggadmin IDENTIFIED BY <c##ggadmin_password> DEFAULT TABLESPACE users TEMPORARY TABLESPACE temp;
    ALTER USER c##ggadmin QUOTA 100M ON USERS;
    GRANT UNLIMITED TABLESPACE TO c##ggadmin;
    GRANT CONNECT, RESOURCE TO c##ggadmin container=all;
    GRANT SELECT ANY DICTIONARY TO c##ggadmin container=all;
    GRANT CREATE VIEW TO c##ggadmin container=all;
    GRANT EXECUTE ON dbms_lock TO c##ggadmin container=all;
    GRANT DBA to c##ggadmin container=all;
    EXEC dbms_goldengate_auth.GRANT_ADMIN_PRIVILEGE('c##ggadmin',container=>'all');
Creating or Unlocking the GoldenGate User on the Target Database

Run these commands on the GoldenGate marketplace target instance to unlock the ggadmin user on the target database.

  1. Connect to the target database as admin.
    export TNS_ADMIN=/u02/deployments/Target/etc/adb
    export ORACLE_HOME=/u01/app/client/oracle19
    $ORACLE_HOME/bin/sqlplus admin/<admin_password>@<ATP_databasename>

    An example of the ATP_databasename would be targetatp_tp.

  2. Unlock ggadmin.
    SQL> ALTER USER ggadmin IDENTIFIED BY <ggadmin_password> ACCOUNT UNLOCK;
  3. Verify that ggadmin is unlocked.
    export TNS_ADMIN=/u02/deployments/Target/etc/adb
    export ORACLE_HOME=/u01/app/client/oracle19
    $ORACLE_HOME/bin/sqlplus ggadmin/<ggadmin_password>@<ATP_databasename>
Preparing the Database for Migration

Giving Permissions to Database Migration Users

Add the users in charge of database migrations to the specified group and provide required permissions.

Ensure to grant the following policies to non-admin user in tenancy before you start data migration:
Allow group dmsGroup to manage odms-connection in compartment dmsCompartment
Allow group dmsGroup to manage odms-migration in compartment dmsCompartment
Allow group dmsGroup to manage odms-agent in compartment dmsCompartment
Allow group dmsGroup to manage odms-job in compartment dmsCompartment
Allow group dmsGroup to manage users in tenancy where all {target.user.id=‘ocid1.user.oc1..aaaaaaaaqutjpgdabhqd4p4jfoyrbu6n6ihjoqisucfqdljikengtlnlvnyq’, request.operation=/*AuthToken*/}
Allow group dmsGroup to inspect users in tenancy where all {target.user.id=‘ocid1.user.oc1..aaaaaaaaqutjpgdabhqd4p4jfoyrbu6n6ihjoqisucfqdljikengtlnlvnyq’}
Allow group dmsGroup to manage tag-namespaces in compartment dmsCompartment
Allow group dmsGroup to manage virtual-network-family in compartment Networks
Allow group dmsGroup to manage buckets in compartment dmsCompartment
Allow group dmsGroup to manage objects in compartment dmsCompartment
Allow group dmsGroup to manage autonomous-database-family in compartment dmsCompartment
Allow group dmsGroup to manage database-family in compartment dmsCompartment
Allow group dmsGroup to manage instance-family in compartment dmsCompartment
Allow group dmsGroup to manage volume-family in compartment dmsCompartment
Allow group dmsGroup to manage goldengate-family in compartment dmsCompartment
Allow service goldengate to manage vaults in tenancy
Allow service goldengate to manage keys in tenancy
Allow service goldengate to manage secret-family in tenancy
Allow service goldengate to manage objects in compartment dmsCompartment
Allow group dmsGroup to manage all-resources in compartment dmsCompartment
Allow group dmsGroup to inspect teanancies in tenancy
For more information about providing permissions to database migration users, see Giving Permissions to Database Migration Users in Using Oracle Cloud Infrastructure Database Migration Service.
Configuring SUDO Access

You may need to grant certain users authority to perform operations using sudo on the source database servers.

To configure sudo access for source database servers, see Configuring Sudo Access in Using Oracle Cloud Infrastructure Database Migration Service.
Preparing the Source Database for Migration

Ensure to configure your source database before you start migrating data.

  1. Prepare the source database for online logical migration with a minimum of 2.1 GB STREAMS_POOL_SIZE.

    Note:

    Offline logical migrations is not supported.
    1. Configure STREAMS_POOL_SIZE.
    2. Connect to CDB source database as SYS user and execute the following commands:
      SQL> ALTER SYSTEM SET streams_pool_size > 2 GB scope=both;
      ALTER SYSTEM SET global_names=false;
      archive log list;
      commit;
    3. Connect to PDB source database as SYS user and execute the following commands:
      SQL> ALTER DATABASE ADD SUPPLEMENTAL LOG DATA;
      ALTER SYSTEM SET global_names=false;
      archive log list;
      commit;
  2. Enable ARCHIVELOG if it is not already enabled. See step 3b in Preparing the Source Database for Migration in Using Oracle Cloud Infrastructure Database Migration Service.
  3. Enable logging.
    sqlplus > ALTER DATABASE ADD SUPPLEMENTAL LOG DATA; (execute on both cdb and pdb)
    sqlplus > ALTER DATABASE FORCE LOGGING;(execute only on cdb)

    Note:

    To prevent migration failure in upgrade scenarios, ensure to revoke DBA role from a Fusion Middleware user before you start migration in PDB using the command, SQL> revoke DBA from FMW;. If there are any failures due to grants, see DBA Role Privileges Issue.
  4. If you are using Object Storage as a data transfer medium, ensure that an export Directory Object exists and is usable by Data Pump to store generated dump files.
    1. The directory object is a file path on the source database server file system. The name needs to comply with Oracle Database directory object rules.
    2. The export Directory Object must be owned by same OS user who owns the database Oracle home.
  5. Connect to the source database server.
    1. Create a new directory in source database and provide required permissions.
    2. Connect to source database PDB as sys user.

      Note:

      Ensure to verify that ggadmin user you created in Creating GoldenGate Users on the Source Database exist in PDB.
      CREATE OR REPLACE DIRECTORY <DPDIR> as '/u01/app/oracle/product/19.0.0.0/dbhome_1/rdbms/log/<DPDIR>'; (Directory Created)
      Note: Make sure that this folder structure exists.
      GRANT READ,WRITE ON DIRECTORY <DPDIR> to ggadmin; (grant succeeded)
      commit;
      SELECT OWNER,directory_path from dba_directories where directory_name like '%<DPDIR>%'; ( It should display 1 row)
      exit ;

      Note:

      The directory object is a file path on the source database server file system. The name needs to comply with Oracle Database directory object rules. See CREATE DIRECTORY in SQL Language Reference.

  6. In a multitenant environment, if you are migrating a PDB, do the following:
    1. Connect to CDB source database as SYS user.
    2. Enable GoldenGate Replication on the CDB source database.
      sqlplus > ALTER SYSTEM SET ENABLE_GOLDENGATE_REPLICATION=TRUE SCOPE=BOTH;
  7. Apply mandatory RDBMS patches on the source database.
Preparing the Target Database for Migration

Ensure to configure your target database before you start migrating data.

You must use only one of the database service names,databasename_tpurgent ordatabasename_tp, specified in tnsnames.ora. For database service name details, see Database Service Names for Autonomous Transaction Processing and Autonomous JSON Database in Using Oracle Autonomous Database on Shared Exadata Infrastructure.

  1. Connect to target database from GoldenGate machine.
    export TNS_ADMIN=/u02/deployments/Target/etc/adb 
    export ORACLE_HOME=/u01/app/client/oracle19
    cd $ORACLE_HOME/bin
    /sqlplus admin/<admin_password>@<ATP_databasename>
  2. Create a role manually, if not present.
    CREATE ROLE STBROLE;
  3. Check the GLOBAL_NAMES parameter. If the parameter is set to true, change it to false.
    show parameter global;
    alter system set global_names=false;
Accessing the Database Migration Service

You can access Oracle Cloud Infrastructure Database Migration using the Oracle Cloud Interface Console (a browser based interface), REST APIs, or Oracle Cloud Infrastructure Software Development Kits and Command Line Interface.

For complete information, see Accessing Oracle Cloud Infrastructure Database Migration Service in Using Oracle Cloud Infrastructure Database Migration Service.

Registering Databases

You must register source and target databases to use with Oracle Cloud Infrastructure Database Migration by creating registered database resources.

To register databases, see Managing Registered Databases in Using Oracle Cloud Infrastructure Database Migration Service.

Premigration Tasks

Perform the following premigration tasks before you migrate data from an on-premises database to Oracle Autonomous Transaction Processing-Shared (ATP-S) database

Premigration Task for Oracle Internet Directory

For Oracle Internet Directory, you must perform the premigration task of disabling auto purge, before you migrate data to Oracle Autonomous Transaction Processing-Shared (ATP-S) database.

To disable auto purge on the on-premises database:
  1. Set the environment variables.
    export JAVA_HOME=<JAVA_HOME>
    export ORACLE_HOME=<ORACLE_HOME>
    export DOMAIN_HOME=<DOMAIN_HOME>
    export WL_HOME=<ORACLE_HOME>/wlserver
    export PATH=$JAVA_HOME/bin:$ORACLE_HOME/bin:$ORACLE_HOME/ldap/bin:$DOMAIN_HOME/bin:$PATH
  2. Read the current purge config data in the source database using ldapsearch command and capture the current value of orclpurgeenable for all containers.
    ldapsearch -p <nonssl_ldap_port> -D cn=orcladmin -w <password> -b "cn=changelog
    purgeconfig,cn=purgeconfig,cn=subconfigsubentry"  -s base  "objectclass=*"
    ldapsearch -p <nonssl_ldap_port> -D cn=orcladmin -w <password> -b "cn=general stats
    purgeconfig,cn=purgeconfig,cn=subconfigsubentry"  -s base  "objectclass=*"
    ldapsearch -p <nonssl_ldap_port> -D cn=orcladmin -w <password> -b "cn=health stats
    purgeconfig,cn=purgeconfig,cn=subconfigsubentry"  -s base  "objectclass=*"
    ldapsearch -p <nonssl_ldap_port> -D cn=orcladmin -w <password> -b "cn=perf stats
    purgeconfig,cn=purgeconfig,cn=subconfigsubentry" -s base  "objectclass=*"
    ldapsearch -p <nonssl_ldap_port> -D cn=orcladmin -w <password> -b "cn=tombstone
    purgeconfig,cn=purgeconfig,cn=subconfigsubentry" -s base  "objectclass=*"
    ldapsearch -p <nonssl_ldap_port> -D cn=orcladmin -w <password> -b "cn=secrefresh events
    purgeconfig,cn=purgeconfig,cn=subconfigsubentry" -s base  "objectclass=*"
    ldapsearch -p <nonssl_ldap_port> -D cn=orcladmin -w <password> -b "cn=sysresource events
    purgeconfig,cn=purgeconfig,cn=subconfigsubentry" -s base  "objectclass=*"
    ldapsearch -p <nonssl_ldap_port> -D cn=orcladmin -w <password> -b
    "cn=oidstats_config,cn=purgeconfig,cn=subconfigsubentry" -s base
    "objectclass=*"
    ldapsearch -p <nonssl_ldap_port> -D cn=orcladmin -w <password> -b "cn=user statistics
    purgeconfig,cn=purgeconfig,cn=subconfigsubentry" -s base  "objectclass=*"
    ldapsearch -p <nonssl_ldap_port> -D cn=orcladmin -w <password> -b "cn=bindsec stats
    purgeconfig,cn=purgeconfig,cn=subconfigsubentry" -s base  "objectclass=*"
    ldapsearch -p <nonssl_ldap_port> -D cn=orcladmin -w <password> -b "cn=comparesec stats
    purgeconfig,cn=purgeconfig,cn=subconfigsubentry" -s base  "objectclass=*"
    ldapsearch -p <nonssl_ldap_port> -D cn=orcladmin -w <password> -b "cn=comparefailure stats
    purgeconfig,cn=purgeconfig,cn=subconfigsubentry" -s base  "objectclass=*"
  3. Based on the current purge config captured in step 2, modify original_purge_config.ldif to save the original purge configuration.

    Example contents of original_purge_config.ldif file. In this example, for one of the entries in original_purge_config.ldif - oidstats_config, the purge value does not change, as it is disabled by default and has value "0".

    dn: cn=changelog purgeconfig, cn=purgeconfig, cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 1
    
    dn: cn=general stats purgeconfig,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 1
    
    dn: cn=health stats purgeconfig,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 1
    
    dn: cn=perf stats purgeconfig,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 1
    
    dn: cn=tombstone purgeconfig,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 1
    
    dn: cn=secrefresh events purgeconfig,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 1
    
    dn: cn=sysresource events purgeconfig,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 1
    
    dn: cn=oidstats_config,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 0
    
    dn: cn=user statistics purgeconfig,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 1
    
    dn: cn=bindsec stats purgeconfig,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 1
    
    dn: cn=comparesec stats purgeconfig,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 1
    
    dn: cn=comparefailure stats purgeconfig,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 1
  4. Disable purging on the source database using the ldapmodify command and set the value of orclpurgeenable to "0" for all containers obtained from step 2.
    ldapmodify  -p <nonssl_ldap_port> -D cn=orcladmin -w <password> -f disable_purge.ldif 

    Example contents of disable_purge.ldif file:

    dn: cn=changelog purgeconfig, cn=purgeconfig, cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 0
    
    dn: cn=general stats purgeconfig,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 0
    
    dn: cn=health stats purgeconfig,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 0
    
    dn: cn=perf stats purgeconfig,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 0
    
    dn: cn=tombstone purgeconfig,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 0
    
    dn: cn=secrefresh events purgeconfig,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 0
    
    dn: cn=sysresource events purgeconfig,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 0
    
    dn: cn=oidstats_config,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 0
    
    dn: cn=user statistics purgeconfig,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 0
    
    dn: cn=bindsec stats purgeconfig,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 0
    
    dn: cn=comparesec stats purgeconfig,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 0
    
    dn: cn=comparefailure stats purgeconfig,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 0
Premigration Task for Oracle Identity Manager

Perform the following premigration task before you migrate data to Oracle Autonomous Transaction Processing-Shared (ATP-S) database for Oracle Identity Manager.

Login to the source PDB as ggadmin user and grant alter session to <schema_prefix>_SOAINFRA.

For example:
grant alter session to <schema_prefix>_SOAINFRA;
Premigration Task for Oracle Forms

Perform the following premigration task before you migrate data to Oracle Autonomous Transaction Processing-Shared (ATP-S) database for Oracle Forms.

If user has created their own user defined schemas, run the commands listed below on the source database as a SYS user:

Example:
ALTER USER abc identified by <Schema_Password> account unlock;
GRANT read,write on DIRECTORY test_dir to abc;
commit;
# Export the schemas using expdp
expdp system/<SYS_PASSWORD>@<DB_SID> schemas=abc directory=test_dir dumpfile=abc_meta.dmp logfile=abc1.log

If you exported your users from an on-premises database, run the commands listed below on the target database:

Example:
CREATE TABLESPACE "USERS";
Create user abc identified by <Schema_Password> DEFAULT TABLESPACE USERS TEMPORARY TABLESPACE TEMP;
GRANT UNLIMITED TABLESPACE to abc;
GRANT CONNECT, create view, create table, create procedure, create trigger, create synonym, create sequence, create type to abc;
commit;
#connect as abc user
connect abc/<password>@fmwatpdedic2_tp;
CREATE TABLE DEPT("DEPTNO" NUMBER(2,0),"DNAME" CHAR(14 BYTE),"LOC" CHAR(13 BYTE));
CREATE TABLE EMP("EMPNO" NUMBER(4,0),"ENAME" CHAR(10 BYTE), "JOB" CHAR(9 BYTE), "MGR" NUMBER(4,0),"HIREDATE" DATE,"SAL" NUMBER(7,2),"COMM" NUMBER(7,2), "DEPTNO" NUMBER(2,0));
commit;
# Drop the current table in the database and recreate the new table as in the dump file using impdp
impdp admin/<admin_password>@fmwatpdedic2_tp credential=DEF_CRED_NAME /
dumpfile=https://objectstorage.us-ashburn-1.oraclecloud.com/n/atpdpreview2/b/FormsInstallDBMigration/o/abc_meta.dmp /
TABLE_EXISTS_ACTION=REPLACE
Premigration Task for Oracle GoldenGate Veridata

Perform the following premigration task before you migrate data to Oracle Autonomous Transaction Processing-Shared (ATP-S) databasefor Oracle GoldenGate Veridata.

For Oracle GoldenGate Veridata, create the following roles as a SYS user on the source database:

CREATE ROLE VERIDATA_ROLE;
GRANT CREATE SESSION, CREATE TABLE, CREATE VIEW, CREATE PROCEDURE, CREATE SYNONYM TO VERIDATA_ROLE;
GRANT VERIDATA_ROLE TO <PREFIX_GIVEN>_STB;
GRANT VERIDATA_ROLE TO <PREFIX_GIVEN>_IAU;
GRANT VERIDATA_ROLE TO <PREFIX_GIVEN>_IAU_APPEND;
GRANT VERIDATA_ROLE TO <PREFIX_GIVEN>_IAU_VIEWER;
GRANT VERIDATA_ROLE TO <PREFIX_GIVEN>_OPSS;
GRANT VERIDATA_ROLE TO <PREFIX_GIVEN>_VERIDATA;
GRANT VERIDATA_ROLE TO <PREFIX_GIVEN>_WLS;
GRANT VERIDATA_ROLE TO <PREFIX_GIVEN>_WLS_RUNTIME;
Creating a Backup of the Schema Version Registry

Use the Upgrade Assistant on the on-premises host to create a backup of the existing schema version registry on the on-premises database.

To create a backup of the schema version registry:

  1. Navigate to $OH/oracle_common/upgrade/bin.
  2. Export ORACLE_HOME=<Oracle_home>.
  3. Execute ua -backupRegistry on your on-premises database, to backup the existing schema version registry.
    ./ua -backupRegistry
    Oracle Fusion Middleware Upgrade Assistant 12.2.1.4.0
    Enter the Database Connect String(host:port/service or host:port:SID or TNS connect string):
    myhost.us.example.com:<port_number>/myservice.us.example.com
    Enter the DBA User Name: sys as sysdba
    Enter the DBA Password: <DBA_Password>
    The schema version registry is saved to ./registry.xml location.
Creating Migration

A migration contains the parameter settings for running a migration job with Oracle Cloud Infrastructure database migration.

  1. Log in to the Oracle GoldenGate instance.
  2. Navigate to /home/opc to access GoldenGate credentials.
  3. Create migration job using the following:
    1. Datapump via Object Storage
    2. Online Replication
    For more information, see Managing Migrations in Using Oracle Cloud Infrastructure Database Migration Service.
  4. To find the default and temporary tables spaces for all the schemas in each product, run the following commands on the source database:
    • For all products, except Oracle Access Manager, Oracle Identity Manager, and Oracle Internet Directory:
      select username,default_tablespace,temporary_tablespace from dba_users;
    • For Oracle Identity Manager and Oracle Access Manager:
      select username,default_tablespace,temporary_tablespace from dba_users where username like '<Schema_Prefix>%';
    • For Oracle Internet Directory:
      select username,default_tablespace,temporary_tablespace from dba_users where username like '<Schema_Prefix>%';
      select username,default_tablespace ,temporary_tablespace from dba_users where username like 'ODS%';

    Map these default and temporary tablespaces obtained in this step to DATA and TEMP respectively, in the DMS user interface. For more information see Configuring Optional Initial Load Advanced Options in Using Oracle Cloud Infrastructure Database Migration Service.

Validating a Migration

Before you can run a job with a migration resource in Oracle Cloud Infrastructure Database Migration, the migration resource must be validated.

  1. Validate migration job. For more information, see Validating a Migration in Using Oracle Cloud Infrastructure Database Migration Service.
    Ensure to select the following checkboxes while validating the migration job:
    • Run premigration advisor during validation.
    • Continue premigration advisor validation on error.
  2. Fix issues found during validation. For more information about known issues and workarounds, see Troubleshooting ATP-S Database Migration.
Excluding Unsupported Objects

You must specify objects to include or exclude from a migration job while you are creating a migration resource.

Few data types are not supported by GoldenGate for replication purpose. These unsupported objects fail during validation phase. Few objects related to Oracle Text Search (OTS) are not supported on the Oracle Autonomous Transaction Processing-Shared (ATP-S) database. So, these unsupported objects must be excluded from online migration and later exported and imported manually using data pump. For more information, see Details of Support for Oracle Data Types and Objects in Using Oracle GoldenGate for Oracle Database.

Select ALL_OBJECTS view to display the correct OWNER and OBJECT_NAME values for any objects you want to exclude. For complete information, see Selecting Objects for Migration in Using Oracle Cloud Infrastructure Database Migration Service.

To exclude Oracle GoldenGate unsupported objects, see Table B-1, and to exclude the objects due to CPAT tool errors, see Table B-2.

Note:

After the migration is completed, for OTS, the excluded objects are regenerated dynamically.

Migrate Your Data

Register source (both PDB and CDB separately) and target databases to use with Oracle Cloud Infrastructure Database Migration by creating registered database resources. Registered database resources enable networking and connectivity for the source and target databases.

Performing Migration

Perform the following steps to migrate data from an on-premises database, for all Oracle Fusion Middleware products except Oracle Identity and Access Management Suite of products.

For Oracle Identity and Access Management Suite of products, see Performing Migration for Oracle Identity and Access Management and for Oracle Internet Directory, see Performing Migration for Oracle Internet Directory.
  1. Run the migration job. For more information, see Running a Migration Job in Using Oracle Cloud Infrastructure Database Migration Service.
  2. Pause after the Monitor Replication Lag phase for the transaction replication to continue during the waiting state.
  3. Migrate the excluded objects manually using Oracle Data Pump expdp and impdp commands.

    See step 5 in Preparing the Source Database for Migration. For the user privileges, see Table A-1 for each product.

    To create a parameter in the <DB $OH> directory, see Table A-2.

  4. Export all schemas at once using the expdp command.
    Example:
    ./expdp ggadmin/<ggadmin_password>@<PDB_connect_string> dumpfile=dump_tables.dmp 
    logfile=<logfilename>.log directory=<DPDIR> parfile=<parfilename>.par full=y

    To export the MDS (Metadata Services) schema individually, run the following command:

    Example:

    ./expdp <schema_prefix>_MDS/<MDS_schema_password>@<PDB_connect_string> directory=<DPDIR> dumpfile=<dumpfilename>.dmp logfile=<logfilename>.log
    parfile=<parfilename>.par

    For the expdp commands for each product, see Table A-3.

  5. After the export, for MDS schema, do the following:
    1. Generate sqlfile to validate the contents before executing import on ATP-S.
      impdp <schema_prefix>_MDS/<MDS_schema_password>@<PDB_connect_string> dumpfile=<dumpfilename>.dmp sqlfile=<DPDIR>:<filename>_imp.sql

      where, dumpfilename.dmp is the dump file from the expdp command of MDS schema in step 4.

    2. Execute the SQL command as a SYS or ggadmin user in PDB.
      sqlplus > select dbms_metadata.get_ddl('TABLE','TABLE_NAME','<schema_prefix>_MDS') from dual;

      Note:

      Verify the results of the above query with the contents of <filename>_imp.sql in /u01/app/oracle/product/19.0.0.0/dbhome_1/rdbms/log/<DPDIR>. Both the results must be same.
  6. Upload the dumpfile into cloud object storage and copy the path.
  7. Import the data dump file to an ATP-S database for your schemas.
    1. Set the following environment variables on the Oracle Cloud Infrastructure (OCI) host on which you have installed your Oracle Fusion Middleware product.
      cd /usr/lib/oracle/21/client64/bin
      export LD_LIBRARY_PATH=/usr/lib/oracle/21/client64/lib:$LD_LIBRARY_PATH
      export PATH=/usr/lib/oracle/21/client64/bin:$PATH
      export TNS_ADMIN=<ATP-S_wallet_location>
      /sqlplus /nolog
      connect admin/<admin_password>@<ATP_databasename>                                                                                                                                                                                                                                                                                                                                                                                                       
    2. Create credentials.
      BEGIN
        DBMS_CLOUD.CREATE_CREDENTIAL(
        credential_name => '<DEF_CRED_NAME>',
        username => '<OCI_Username>',
        password => '<Your_Auth_Token_Here>'
        );
      END;
      /
    3. Remap the tablespaces using the impdp command.
      Example:
      impdp admin/<admin_password>@<ATP_databasename> credential=def_cred_name dumpfile= <dump_file_cloud_object_storage_location>.dmp REMAP_TABLESPACE=<schema_prefix>_SCHEMA:DATA
      REMAP_TABLESPACE=<schema_prefix>_IAS_TEMP:TEMP
      

      For the impdp commands for each product, see Table A-3.

    4. For MDS, test if the MDS purge path table is imported successfully.
      select table_name from dba_tables where owner='<schema_prefix>_MDS' and table_name like 'MDS_PURGE_PATHS';
You must now restore the schema version registry, rewire the domain with the target ATP-S target database that you created, update the configuration files, restart servers, and perform sanity check. See Restoring the Schema Version Registry, Rewiring the Domain with the ATP-S Target Database, Updating the Configuration Files, Restarting the Servers, and Performing Sanity Check.
Performing Migration for Oracle Identity and Access Management

Perform the following steps to migrate data from an on-premises database for Oracle Identity and Access Management products, Oracle Access Manager (OAM) and Oracle Identity Manager (OIM).

  1. Run the migration job. For more information, see Running a Migration Job in Using Oracle Cloud Infrastructure Database Migration Service.
  2. Pause after the Monitor Replication Lag phase for the transaction replication to continue during the waiting state.
  3. Rewire the domain with the Oracle Autonomous Transaction Processing-Shared (ATP-S) database. See Rewiring the Domain with the ATP-S Target Database.
  4. Stop all services related to your domain on the source database. This stops all the workload on the source database.
  5. Migrate the excluded objects manually using Oracle Data Pump expdp and impdp commands.
    1. On the on-premises database, navigate to <DB $OH>.
      cd <DB $OH>/rdbms/log
      mkdir <DPDIR>
    2. Login to source PDB as ggadmin user and execute the following sql:
      CREATE OR REPLACE directory <DPDIR> as '/u01/app/oracle/product/19.0.0.0/dbhome_1/rdbms/log/<DPDIR>';
      SELECT OWNER,directory_path from dba_directories where directory_name like '<DPDIR>';
      GRANT READ,WRITE ON DIRECTORY <DPDIR> to <List_of_schemas>;
      #For the list of schemas, see Table A-1 for each product.
      
    3. Create a parameter file in the <DB $OH/>/bin directory.
      # Sample contents of par file of included tables are:
      INCLUDE=TABLE:"IN (<TABLE_NAMES>)"
      #For list of tables, see Table A-2 for each product.
      
  6. Export all schemas at once using the expdp command.
    Example:
    ./expdp ggadmin/<ggadmin_password>@<PDB_connect_string> dumpfile=<dumpfilename>.dmp 
    logfile=<logfilename>.log directory=<DPDIR> parfile=<parfilename>.par full=y

    Note:

    For OAM, you need to export only the MDS schema.

    To export the MDS (Metadata Services) schema individually, run the following command:

    Example:

    ./expdp <schema_prefix>_MDS/<MDS_schema_password>@<PDB_connect_string> directory=<DPDIR> dumpfile=<dumpfilename>.dmp logfile=<logfilename>.log
    parfile=<parfilename>.par

    For the expdp commands for OAM and OIM, see Table A-3.

  7. After the export, for MDS schema, do the following:
    1. Generate sqlfile to validate the contents before executing import on ATP-S.
      impdp <schema_prefix>_MDS/<MDS_schema_password>@<PDB_connect_string> dumpfile=<dumpfilename>.dmp sqlfile=<DPDIR>:<filename>_imp.sql

      where, dumpfilename.dmp is the dump file from the expdp command of MDS schema in step 6.

    2. Execute the SQL command as a SYS or ggadmin user in PDB.
      sqlplus > select dbms_metadata.get_ddl('TABLE','TABLE_NAME','<schema_prefix>_MDS') from dual;

      Note:

      Verify the results of the above query with the contents of <filename>_imp.sql in /u01/app/oracle/product/19.0.0.0/dbhome_1/rdbms/log/<DPDIR>. Both the results must be same.
  8. Upload the dumpfile into cloud object storage and copy the path.
  9. Import the data dump file to an ATP-S database for your schemas.
    1. Set the following environment variables on the Oracle Cloud Infrastructure (OCI) host on which you have installed your Oracle Fusion Middleware product.
      cd /usr/lib/oracle/21/client64/bin
      export LD_LIBRARY_PATH=`/usr/lib/oracle/21/client64/lib:$LD_LIBRARY_PATH
      export PATH=/usr/lib/oracle/21/client64/bin:$PATH
      export TNS_ADMIN=<ATP-S_wallet_location>
      ./sqlplus /nolog
      connect admin/<admin_password>@<ATP_databasename>
    2. Create credentials.
      BEGIN
        DBMS_CLOUD.CREATE_CREDENTIAL(
        credential_name => '<DEF_CRED_NAME>',
        username => '<OCI_Username>',
        password => '<Your_Auth_Token_Here>'
        );
      END;
      /
    3. Remap the tablespaces using the impdp command.

      Note:

      If the dump file is not accessible, then create a pre-auth request for the dump file. See To create a pre-authenticated request for a specific object in Oracle Cloud Infrastructure documentation.
      Example:
      impdp admin/<admin_password>@<ATP_database_name> credential=def_cred_name dumpfile= <dump_file_cloud_object_storage_location>.dmp REMAP_TABLESPACE=<schema_prefix>_SCHEMA:DATA
      REMAP_TABLESPACE=<schema_prefix>_IAS_TEMP:TEMP

      For the impdp commands for OAM and OIM, see Table A-3.

    4. For MDS, test if the MDS purge path table is imported successfully.
      select table_name from dba_tables where owner='<schema_prefix>_MDS' and table_name like 'MDS_PURGE_PATHS';
After you export and import the tables, resume the job at the Switchover phase. Once the Switchover phase is completed, pause the job before the Cleanup phase.

You must now restore the schema version registry, update the configuration files, restart servers, perform postmigration tasks for OAM and OIM, and perform sanity check. See Restoring the Schema Version Registry, Updating the Configuration Files, Restarting the Servers, Postmigration Tasks for Oracle Access Manager, Postmigration Tasks for Oracle Identity Manager, and Performing Sanity Check.

Performing Migration for Oracle Internet Directory

Perform the following steps to migrate data from an on-premises database for Oracle Internet Directory

  1. Run the migration job. For more information, see Running a Migration Job in Using Oracle Cloud Infrastructure Database Migration Service.
  2. Pause after the Monitor Replication Lag phase for the transaction replication to continue during the waiting state.
  3. Stop all services related to your domain on the source database. This stops all the workload on the source database.
  4. Log in to the Oracle Autonomous Transaction Processing-Shared (ATP-S) database as an admin user and modify the constraints present in the table using the following commands:
    1. SELECT TABLE_NAME, CONSTRAINT_NAME, CONSTRAINT_TYPE, STATUS, VALIDATED,
      LAST_CHANGE FROM DBA_CONSTRAINTS WHERE OWNER = 'ODS' and
      TABLE_NAME='CT_ORCLNORMDN' and status='DISABLED' and VALIDATED='VALIDATED';
      
    2. ALTER TABLE ODS.CT_ORCLNORMDN modify constraint <CONSTRAINT_NAME_Obtained_From_Step a> novalidate;
Resume the job at the Switchover phase. Once the Switchover phase is completed, pause the job before the Cleanup phase.

You must now perform the postmigration tasks and perform sanity check. See Postmigration Tasks for Oracle Internet Directory and Performing Sanity Check.

Note:

After migrating data from an on-premises database, you don't need to rewire the domain with the ATP-S target database that you created as rewiring is performed as part of the postmigration tasks for Oracle Internet Directory.

Restoring the Schema Version Registry

To migrate schema version registry from an on-premises database to an Oracle Autonomous Transaction Processing-Shared (ATP-S) database, you must restore the schema version registry on your shared autonomous database.

Note:

The following topic is applicable when you migrate data from an on-premises database to ATP-S database using Database Migration (DMS) service.
To restore the schema version registry to your ATP-S database
  1. Navigate to $OH/oracle_common/upgrade/bin.
  2. Apply the OPatch 32089134 for ua restoreRegistry, and the patches 31676526 and 30540494 applicable to an Autonomous Transaction Processing database. See Applying Patches on Oracle Home in Creating Schemas with the Repository Creation Utility.
  3. Set the following environment variable:
    export UA_PROPERTIES="-Doracle.jdbc.fanEnabled=false"

    If you do not set this environment variable, you will see the error, SEVERE: attempt to configure ONS in FanManager failed with oracle.ons.NoServersAvailable: Subscription time out.

  4. Execute ua -restoreRegistry on the ATP-S database.
    [opc@fmw-atps-3 bin]$ cd <OH>/oracle_common/upgrade/bin
    [opc@fmw-atps-3 bin]$ export ORACLE_HOME=<OH>
    [opc@fmw-atps-3 bin]$ ./ua -restoreRegistry
    Oracle Fusion Middleware Upgrade Assistant 12.2.1.4.0
    Enter location of Schema Version Registry backup file:
    <OH>/oracle_common/upgrade/bin/registry.xml
    Restoring from <OH>/oracle_common/upgrade/bin/registry.xml
    Enter prefix or * for list:
    <schema_prefix>
    Enter the Database Connect String:
    (host:port/service or host:port:SID or TNS connect string)
    jdbc:oracle:thin:@<ATP_databasename>?TNS_ADMIN=<ATP-S_wallet_location>
    Enter the DBA User Name:
    ADMIN
    Enter the DBA Password:
    <Date Time> oracle.simplefan.impl.FanManager configure
    Schema Version Registry restored from <OH>/oracle_common/upgrade/bin/registry.xml
    Rows removed: 0. Rows inserted: 6

    Note:

    You must enter the complete location of the registry.xml file and pass the complete database connect string.

Complete the Postmigration Tasks

After migrating data from an on-premises database to an Oracle Autonomous Transaction Processing-Shared (ATP-S) database, perform the tasks described in this section. Some of these tasks apply to specific schemas.

Note:

The following topics are applicable when you migrate data from an on-premises database to ATP-S database using Database Migration (DMS) service.

Postmigration Tasks for Oracle Internet Directory

Perform the postmigration steps described in this section after migrating data from an on-premises database to an Oracle Autonomous Transaction Processing-Shared (ATP-S) database for Oracle Internet Directory (OID).

  1. Set the following environment variable before restoring registry:
    export UA_PROPERTIES= -Doracle.jdbc.fanEnabled=false

    If you do not set this environment variable, you see the error, SEVERE: attempt to configure ONS in FanManager failed with oracle.ons.NoServersAvailable: Subscription time out.

  2. Create wallet for ATP-S database.
    1. Copy wallet files to $OH/network/admin.
    2. Update sqlnet.ora file to point to your wallet location: $OH/network/admin.
    3. Update ojdbc.properties by adding SSL_SERVER_DN_MATCH=yes at the end of the file.
  3. Apply the OPatch 32089134 for ua restoreRegistry, and the patches 30540494 and 31676526 applicable to an Autonomous Transaction Processing database, and restore schema version registry to TNS_ADMIN=<OH>/network/admin. For more information, see Applying Patches on Oracle Home in Creating Schemas with the Repository Creation Utility.
    [opc@fmw-atps-3 bin]$ cd <OH>/oracle_common/upgrade/bin
    [opc@fmw-atps-3 bin]$ export ORACLE_HOME=<OH>
    [opc@fmw-atps-3 bin]$ ./ua -restoreRegistry
    Oracle Fusion Middleware Upgrade Assistant 12.2.1.4.0
    
    Enter location of Schema Version Registry backup file:
    <OH>/oracle_common/upgrade/bin/registry.xml
    Restoring from <OH>/oracle_common/upgrade/bin/registry.xml
    
    Enter prefix or * for list:
    schema_prefix
    
    Enter the Database Connect String:
    (host:port/service or host:port:SID or TNS connect string)
    jdbc:oracle:thin:@<ATP_databasename>?TNS_ADMIN=<$OH>/network/admin
    Enter the DBA User Name:
    ADMIN
    Enter the DBA Password:
    <Date> oracle.simplefan.impl.FanManager configure
    Schema Version Registry restored from <OH>/oracle_common/upgrade/bin/registry.xml
    Rows removed: 0. Rows inserted: 6.
  4. Update data sources xml files in the <Domain_home>/config/jdbc/ directory:
    • opss-audit-jdbc.xml
    • opss-datasource-jdbc.xml
    • LocalSvcTblDataSource-jdbc.xml
    • opss-auditview-jdbc.xml
    • WLSSchemaDataSource-jdbc.xml

    Replace on-premises database URL in the URL property of the above xml files with ATP-S database as shown below:

    jdbc:oracle:thin:@<entry for tns_alias in tnsnames.ora of wallet>
    For example:
    jdbc:oracle:thin:@(description=(retry_count=20)(retry_delay=3)
    (address=(protocol=<protocol_name>)(port=<port_number>)(host=<host_name>))
    (connect_data=(service_name=<service_name>.adb.oraclecloud.com))
    (security=(ssl_server_cert_dn="CN=adwc.uscom-east-1.oraclecloud.com, OU=Oracle BMCS US, O=Oracle Corporation, L=Redwood City, ST=California, C=US")))
  5. Update jps-config.xml and jps-config-jse.xml files:
    1. Navigate to $Domain_home/config/fmwconfig directory.
    2. Replace jdbc.url property with the new connection string in jps-config.xml file.
    3. Replace jdbc.url and audit.loader.jdbc.string property with the new connection string in jps-config-jse.xml file.
    Here, we are providing a sample connection string for ATP-S database as an example.
    "jdbc:oracle:thin:@(description=(retry_count=20)(retry_delay=3)(address=(protocol=tcps)(port=1522)
    (host=pwyo5vyh.adb.us-ashburn-1.oraclecloud.com))(connect_data=(service_name=eotvufbvvdwnwko_fmwoid_tpurgent.adb.oraclecloud.com))
    (security=(ssl_server_cert_dn="CN=adwc.uscom-east-1.oraclecloud.com, OU=Oracle BMCS US, O=Oracle Corporation, L=Redwood City, 
    ST=California, C=US")))"

    Note:

    Ensure to replace double quotes (") inside the above sample connection string with &quot; as shown below:
    "jdbc:oracle:thin:@(description=(retry_count=20)(retry_delay=3)(address=(protocol=tcps)(port=1522)
    (host=pu77bvpd.adb.us-ashburn-1.oraclecloud.com))(connect_data=(service_name=eotvufbvvdwnwko_fmwatpsim_tp.adb.oraclecloud.com))
    (security=(ssl_server_cert_dn=&quot;CN=adwc.uscom-east-1.oraclecloud.com, OU=Oracle BMCS US, O=Oracle Corporation, L=Redwood City,
     ST=California, C=US&quot;)))"
  6. Copy wallet files from <OH>/network/admin to <Domain_home>/config/fmwconfig/components/OID/config except tnsnames.ora.
  7. Update sqlnet.ora to point to the new wallet location: <Domain_home>/config/fmwconfig/components/OID/config.
  8. Replace contents of tnsnames.ora in <Domain_home>/config/fmwconfig/components/OID/config with OIDDB=<connect string for service name of ATP-S database>.
    For example:
    OIDDB=(description=(retry_count=20)(retry_delay=3)
    (address=(protocol=tcps)(port=1522)(host=pu77bvpd.adb.us-ashburn-1.oraclecloud.com))
    (connect_data=(service_name=eotvufbvvdwnwko_fmwatpsim_tp.adb.oraclecloud.com))
    (security=(ssl_server_cert_dn="CN=adwc.uscom-east-1.oraclecloud.com, 
    OU=Oracle BMCS US, O=Oracle Corporation, L=Redwood City, ST=California, C=US")))
  9. Copy all the wallet files from <Domain_home>/config/fmwconfig/components/OID/config to the all OID instance config locations created before migration.
    For example, if there are two instances then copy from <Domain_home>/config/fmwconfig/components/OID/config to the following locations:
    • <Domain_home>/config/fmwconfig/components/OID/oid1/config replacing tnsnames.ora in this location.
    • <Domain_home>/config/fmwconfig/components/OID/oid2/config replacing tnsnames.ora in this location.
  10. Set TNS_ADMIN to <Domain_home>/config/fmwconfig/components/OID/config and startnodemanager.
  11. On a separate terminal, set TNS_ADMIN to <Domain_home>/config/fmwconfig/components/OID/config and start the Administration Server.
  12. Log in to ATP-S database as ODS user.
    SQL > ALTER PACKAGE OLADD COMPILE;
    SQL > @<OH>/oid/common/sql/oid/scripts/ldapxpkg.sql;
  13. Set environment variables and run the cleanup commands.

    Assuming that user has created two oid instances prior to migration: oid1 and oid2, perform the steps shown in the following example:

    [opc@fmw-atps-3 bin]$ export JAVA_HOME=<JAVA_HOME>
    [opc@fmw-atps-3 bin]$ export ORACLE_HOME=<ORACLE_HOME>
    [opc@fmw-atps-3 bin]$ export DOMAIN_HOME=<DOMAIN_HOME>
    [opc@fmw-atps-3 bin]$ export WL_HOME=<Oracle_home>/wlserver
    [opc@fmw-atps-3 bin]$ export
    PATH=$JAVA_HOME/bin:$ORACLE_HOME/bin:$ORACLE_HOME/ldap/bin:$DOMAIN_HOME/bin:$PATH
    [opc@fmw-atps-3 bin]$ export INSTANCE_NAME=oid1
    [opc@fmw-atps-3 bin]$ export COMPONENT_NAME=oid1
    [opc@fmw-atps-3 bin]$ oidctl connect=oiddb cleanup
    [opc@fmw-atps-3 bin]$ oidctl connect=oiddb cleanup
    [opc@fmw-atps-3 bin]$ export COMPONENT_NAME=oid2
    [opc@fmw-atps-3 bin]$ oidctl connect=oiddb cleanup
    [opc@fmw-atps-3 bin]$ oidctl connect=oiddb cleanup

    Note:

    Perform the cleanup two times for each instance. If you face any issues in running oid cleanup, see Issues in running oid cleanup.
  14. Use the WLST online command to start oid instance.

    For example:

    start('oid1')
  15. Restore the original values of orclpurgeenable using ldapmodify command and the original_purge_config.ldif.
    ldapmodify -p <nonssl_ldap_port> -D cn=orcladmin -w <password> -f original_purge_config.ldif
    

    Example contents of original_purge_config.ldif file:

    dn: cn=changelog purgeconfig, cn=purgeconfig, cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 1
    
    dn: cn=general stats purgeconfig,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 1
    
    dn: cn=health stats purgeconfig,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 1
    
    dn: cn=perf stats purgeconfig,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 1
    
    dn: cn=tombstone purgeconfig,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 1
    
    dn: cn=secrefresh events purgeconfig,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 1
    
    dn: cn=sysresource events purgeconfig,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 1
    
    dn: cn=oidstats_config,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 0
    
    dn: cn=user statistics purgeconfig,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 1
    
    dn: cn=bindsec stats purgeconfig,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 1
    
    dn: cn=comparesec stats purgeconfig,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 1
    
    dn: cn=comparefailure stats purgeconfig,cn=purgeconfig,cn=subconfigsubentry
    changetype: modify
    replace: orclpurgeenable
    orclpurgeenable: 1
You must now perform sanity check. See Performing Sanity Check.

Postmigration Tasks for Oracle Data Integrator

Perform the postmigration steps described in this section after migrating data from an on-premises database to an Oracle Autonomous Transaction Processing-Shared (ATP-S) database for Oracle Data Integrator (ODI).

Change the work repository connection URL setting in ODI Studio by connecting to the master repository and changing the work repository details.
  1. Connect to the Master repository with valid credentials.
  2. To open the work repository, click Topology and then click WORK_REPO.
  3. Click Connection Information of the Work repository and update the connection string.
    Example connection string:
    jdbc:oracle:thin:@<<connect_name>?TNS_ADMIN=/home/opc/WalletDB
  4. Save and test the connection.
  5. In the Login screen, choose the Work repository and proceed with login.

Rewiring the Domain with the ATP-S Target Database

You must rewire the datasources in the Oracle Fusion Middleware domain with the newly created ATP-S target database. This step is applicable for all products except Oracle Internet Directory.

To rewire the domain:
  1. Log in to the WebLogic console.
  2. Under Services, click Datasources.
  3. Update all the data sources connect string with ATP-S database connection string.
    The connect sting format is jdbc:oracle:thin:@TNS_alias?TNS_ADMIN=<path_of_the_wallet_files, ojdbc.properties, and tnsnames.ora>

Updating the Configuration Files

Follow the steps in this section to update the config.xml configuration file, and the Oracle Platform Security Services ( OPSS) configuration files, jps-config.xml and jps-config-jse.xml files in the Oracle Cloud Infrastructure Database Migration domain host. This step is applicable for all products except Oracle Internet Directory.

  1. To update the config.xml file:
    1. Navigate to the directory, $DOMAINHOME/config on the OCI domain host.
    2. If the RDBMS security store is enabled in the on-premises domain, update the config.xml file in one of the following ways:
      • In the WebLogic Server Administration Console, go to Security Realms, select the RealmName, click RDBMS Security Store, and update the RDBMS connection configuration.
      • Use the WebLogic Scripting Tool (WLST).

        Note:

        For sec:connection-url, update jdbc:oracle:thin:@@//dbserver:listener_port/DB_ServiceName with the new database location, jdbc:oracle:thin:@TNS_alias?TNS_ADMIN=<path_of_the_wallet_files, ojdbc.properties, and tnsnames.ora>.

        Example command to update the config.xml file:

        store = realm.getRDBMSSecurityStore()
        store.setUsername('<Db_SchemaUser>')
        store.setPassword('<Db_SchemaPassword>')
        store.setConnectionURL('jdbc:oracle:thin:@TNS_alias?TNS_ADMIN=<path_of_the_wallet_files, ojdbc.properties, and tnsnames.ora>')
        store.setDriverName('<driverName>')

        Example of config.xml after update:

        <sec:rdbms-security-store>
            <sec:username><Db_SchemaUser></sec:username>
            <sec:password-encrypted><Db_SchemaPassword></sec:password-encrypted>
            <sec:connection-url>jdbc:oracle:thin:@TNS_alias?TNS_ADMIN=<path_of_the_wallet_files, ojdbc.properties, and tnsnames.ora>
            <sec:driver-name><driverName></sec:driver-name>
        </sec:rdbms-security-store>
  2. To update the jps-config.xml and jps-config-jse.xml files:
    1. Navigate to $DOMAINHOME/config/fmwconfig directory on the OCI domain host.
    2. In the jps-config.xml, replace jdbc.url property with the new connection string.
      jdbc:oracle:thin:@TNS_alias?TNS_ADMIN=<path_of_the_wallet_files, ojdbc.properties, and tnsnames.ora>

      Example:

      jdbc:oracle:thin:@fmwatpsim_tp?TNS_ADMIN=/home/opc/
    3. In thejps-config-jse.xml, replace jdbc.url and audit.loader.jdbc.string property with the new connection string.
      During migration, if you have changed the OPSS password in your Oracle Autonomous Transaction Processing-Shared (ATP-S) database, execute the following WebLogic Scripting Tool (WLST) commands in offline mode:
      cd <Domain_Home>/oracle_common/common/bin./wlst.sh
      
      Initializing WebLogic Scripting Tool (WLST) ...Jython scans all the jar files it can find at first startup.
      Depending on the system, this process may take a few minutes to complete, and WLST may not return a prompt right away.
      Welcome to WebLogic Server Administration Scripting Shell Type help() for help on available commands
      
      modifyBootStrapCredential(jpsConfigFile="<Domain_Home>/config/fmwconfig/jps-config-jse.xml",
      username="<Prefix>_OPSS", password="<New_Password>")
  3. Save the changes.
You must now restart the servers. See Restarting the Servers. This step is applicable for all products except Oracle Internet Directory.

Restarting the Servers

After the migration of your data from on-premises to an Oracle Autonomous Transaction Processing-Shared (ATP-S) database, restart all processes and servers, including the Administration Servers and any Managed Servers.

Note:

This step is applicable for all products except Oracle Internet Directory

See Starting and Stopping Administration and Managed Servers and Node Manager in Administering Oracle Fusion Middleware.

For Oracle Access Manager, benign error messages are displayed. See Error when restarting servers.

Postmigration Tasks for Oracle Access Manager

Perform the postmigration steps described in this section only if the default store gets updated to Embedded LDAP provided it was defined to a different Oracle Access Manager (OAM) ID Store before migration.

Before you perform the postmigration tasks, you must restore the schema version registry, update the configuration files, and restart the servers. See Restoring the Schema Version Registry, Updating the Configuration Files, and Starting and Stopping Administration and Managed Servers and Node Manager.

  1. Set the following environment variables:
    $ORACLE_HOME = Set to the OAM Oracle Home location
    $DOMAIN_HOME = Set to the OAM Domain Home location
    $DB_ORACLE_HOME = Set to the Database Oracle Home location
    $JAVA_HOME = Set to the JAVA location

    Note:

    These environment variables may have to be changed to meet specific environments needs if the database is not on the same machine where the OAM server is installed. In such cases, the $DB_ORACLE_HOME path cannot be used to locate the ojdbc8.jar.
  2. Export oam-config.xml file from the on-premises database.
    <JAVA_HOME>/bin/java -cp <ORACLE_HOME>/idm/oam/server/tools/config-utility/config-utility.jar:<ORACLE_HOME>/oracle_common/modules/oracle.jdbc/ojdbc8.jar oracle.security.am.migrate.main.ConfigCommand $DOMAIN_HOME export <FILE_LOCATION>/prop.properties
    Sep 22, 2017 1:59:40 PM oracle.security.am.migrate.main.command.CommandFactory getCommand
    INFO: executable operation: export
    oam.exportDirPath=<DIRECTORY_PATH>
    oam.exportedFile=oam-config.xml
    oam.operation.time=2077

    The oam-config.xml file exported to the <FILE_LOCATION> directory.

  3. Check for the system and default stores in the exported oam-config.xml file and match with the changes made in the console before upgrade.

    Note:

    Do not modify the version of the oam-config.xml file.
  4. Import the updated oam-config.xml file back to the database.
    <JAVA_HOME>/bin/java -cp <ORACLE_HOME>/idm/oam/server/tools/config-utility/config-utility.jar:<ORACLE_HOME>/oracle_common/modules/oracle.jdbc/ojdbc8.jar oracle.security.am.migrate.main.ConfigCommand <DOMAIN_HOME> import <FILE_LOCATION>/prop.properties
    Sep 22, 2017 3:12:51 PM oracle.security.am.migrate.main.command.CommandFactory getCommand
    INFO: executable operation: import
    Sep 22, 2017 3:12:53 PM oracle.security.am.migrate.util.ConfigFileUtil replaceValue
    INFO: 70 will be replaced by 71
    Sep 22, 2017 3:12:54 PM oracle.security.am.migrate.operation.ImportConfigOperation invoke
    INFO: imported config file version to database:71
    oam.importDirPath=<DIRECTORY_PATH>
    oam.importedFile=oam-config.xml
    oam.importedVersion=71
    oam.operation.time=2217

You must now perform sanity check. See Performing Sanity Check.

Postmigration Tasks for Oracle Identity Manager

Perform the postmigration steps described in this section after migrating data from an on-premises database to an Oracle Autonomous Transaction Processing-Shared (ATP-S) database for Oracle Identity Manager (OIM).

Before you perform the postmigration tasks, you must restore the schema version registry, update the configuration files, and restart the servers. See Restoring the Schema Version Registry, Updating the Configuration Files, and Starting and Stopping Administration and Managed Servers and Node Manager.
  1. Log in to Oracle Identity Manager sysadmin console.
  2. Create the following configuration properties:
    • Property Name: Hierarchical Attributes Support for Entitlements
    • Keyword: Catalog.HierarchicalAttributesOfEntitlement
    • Value: False
  3. Restart the OIM server.
You must now perform sanity check. See Performing Sanity Check.

Performing Sanity Check

After the migration of data from your on-premises to an Oracle Autonomous Transaction Processing-Shared (ATP-S) database, verify the application URLs, and ensure that data is accessible from the application.

After you perform sanity check:

  • For Oracle Identity and Access Management Suite of products, Oracle Access Manager, Oracle Identity Manager, and Oracle Internet Directory - Resume the paused job at the Cleanup phase and complete migration.
  • For other Oracle Fusion Middleware products - Resume the job at the Switchover phase, complete the Switchover phase and Cleanup phase, and complete migration.