2 Migrate Using DMS

Migrate data from an on-premises database to an Oracle Autonomous Transaction Processing-Shared (ATP-S) database using Database Migration (DMS) service.

The topics covered in this section describe the preparation steps, the migration tasks, and the postmigration tasks.

Prepare to Migrate

Before you begin with the migration of data an on-premises database to an Oracle Autonomous Transaction Processing-Shared (ATP-S) database, you must understand the high-level migration workflow, and meet the prerequisites and perform the premigration tasks that are described in this section.

Roadmap for Migrating Data to an Oracle Autonomous Transaction Processing-Shared (ATP-S) Database

This roadmap provides the migration workflow for migrating data from an on-premises database to an Oracle Autonomous Transaction Processing-Shared (ATP-S) database.

Table 2-1 provides the high-level steps required for migrating data to an ATP-S database, for all Oracle Fusion Middleware products that are certified with ATP-S database.

Prerequisites

The prerequisites to migrate data from an on-premises database to an Oracle Autonomous Transaction Processing-Shared (ATP-S) database is described in the following sections.

Note:

Before you perform the prerequisite tasks, apply the latest bundle patches for the products, and the prerequisite patches needed for the bundle patches, if any.
Database Requirements

Your source and target database environment must meet these requirements to use Oracle Cloud Infrastructure Database Migration.

Table 2-2 Database requirements

Components Supported versions
Source Database

Oracle Database 19c

Supported Target Database Versions

Oracle Autonomous Database with Shared Exadata Infrastructure

Source Platforms

Linux-x86-64

Creating Resources

To create the resources that Oracle Cloud Infrastructure Database Migration operations depends on, see Creating Resources in Using Oracle Cloud Infrastructure Database Migration Service.

Setting Oracle GoldenGate for Online Migrations

Online migrations with Oracle Cloud Infrastructure Database Migration have a few additional prerequisite tasks because you must install Oracle GoldenGate Microservices, create GoldenGate users on the source database, and unlock the GoldenGate user on the target database.

Installing Oracle GoldenGate Microservices
  1. Deploy the "Oracle GoldenGate for Oracle - Database Migrations" image from Oracle Cloud Marketplace as follows.
    1. Log in to Oracle Cloud Marketplace.
    2. Search for the "Oracle GoldenGate for Oracle - Database Migrations" Marketplace listing.
    3. From the Marketplace search results, select the "Oracle GoldenGate for Oracle - Database Migrations" listing.
    4. Deploy the image using the instructions at Deploying Oracle GoldenGate Microservices on Oracle Cloud Marketplace in Using Oracle GoldenGate on Oracle Cloud Marketplace.

      Note:

      For Autonomous Database Shared Infrastructure, specify the Autonomous Database target during the deployment.
  2. Modify the wallet containing certificates for TLS authentication:
    1. Copy the wallet to GoldenGate instance.
      scp -i privatekey.ssh wallet_ATPS.zip opc@oggmachine:/u02/deployments/Target/etc
    2. Log in to the GoldenGate instance and unzip the wallet to the specified location.
      /u02/deployments/Target/etc/adb
    3. Modify the wallet location in sqlnet.ora file.
      /u02/deployments/Target/etc/adb

      Note:

      There is one more sqlnet.ora file in /u02/deployments/Target/etc/. Ensure to delete this file and update with sqlnet.ora present in /u02/deployments/Target/etc/adb.
    4. Delete existing tnsnames.ora file located in /u02/deployments/Target/etc directory.
    5. Copy tnsnames.ora file from /u02/deployments/Target/etc/adb to /u02/deployments/Target/etc directory.
      -bash-4.2$ cat sqlnet.ora
      WALLET_LOCATION = (SOURCE = (METHOD = file) (METHOD_DATA = (DIRECTORY="/u02/deployments/Target/etc/adb")))
      SSL_SERVER_DN_MATCH=yes
  3. Verify that the GoldenGate hub subnet allows ingress for port 443. See the security ingress rules in the example in Oracle Autonomous Database on Dedicated Exadata Infrastructure.
Creating GoldenGate Users on the Source Database

You must create Goldengate users on the source database as a SYS user with SYSDBA privileges.

  1. Connect to the PDB database as SYS as SYSDBA user and then create a GoldenGate administration user ggadmin in the PDB source database.
    CREATE USER ggadmin IDENTIFIED BY <ggadmin_password> DEFAULT TABLESPACE users TEMPORARY TABLESPACE temp;
    ALTER USER ggadmin QUOTA 100M ON USERS;
    GRANT UNLIMITED TABLESPACE TO ggadmin;
    GRANT CONNECT, RESOURCE TO ggadmin;
    GRANT SELECT ANY DICTIONARY TO ggadmin;
    GRANT CREATE VIEW TO ggadmin;
    GRANT DBA to ggadmin;
    GRANT EXECUTE ON dbms_lock TO ggadmin;
    EXEC dbms_goldengate_auth.GRANT_ADMIN_PRIVILEGE('ggadmin');
  2. Connect to the CDB database as SYS as SYSDBA user and create a different user in the CDB root as c##ggadmin.
    CREATE USER c##ggadmin IDENTIFIED BY <c##ggadmin_password> DEFAULT TABLESPACE users TEMPORARY TABLESPACE temp;
    ALTER USER c##ggadmin QUOTA 100M ON USERS;
    GRANT UNLIMITED TABLESPACE TO c##ggadmin;
    GRANT CONNECT, RESOURCE TO c##ggadmin container=all;
    GRANT SELECT ANY DICTIONARY TO c##ggadmin container=all;
    GRANT CREATE VIEW TO c##ggadmin container=all;
    GRANT EXECUTE ON dbms_lock TO c##ggadmin container=all;
    GRANT DBA to c##ggadmin container=all;
    EXEC dbms_goldengate_auth.GRANT_ADMIN_PRIVILEGE('c##ggadmin',container=>'all');
Creating or Unlocking the GoldenGate User on the Target Database

Run these commands on the GoldenGate marketplace target instance to unlock the ggadmin user on the target database.

  1. Connect to the target database as admin.
    export TNS_ADMIN=/u02/deployments/Target/etc/adb
    export ORACLE_HOME=/u01/app/client/oracle19
    $ORACLE_HOME/bin/sqlplus admin/<admin_password>@<ATP_databasename>

    An example of the ATP_databasename would be targetatp_tp.

  2. Unlock ggadmin.
    SQL> ALTER USER ggadmin IDENTIFIED BY <ggadmin_password> ACCOUNT UNLOCK;
  3. Verify that ggadmin is unlocked.
    export TNS_ADMIN=/u02/deployments/Target/etc/adb
    export ORACLE_HOME=/u01/app/client/oracle19
    $ORACLE_HOME/bin/sqlplus ggadmin/<ggadmin_password>@<ATP_databasename>
Preparing the Database for Migration

Giving Permissions to Database Migration Users

Add the users in charge of database migrations to the specified group and provide required permissions.

Ensure to grant the following policies to non-admin user in tenancy before you start data migration:
Allow group dmsGroup to manage odms-connection in compartment dmsCompartment
Allow group dmsGroup to manage odms-migration in compartment dmsCompartment
Allow group dmsGroup to manage odms-agent in compartment dmsCompartment
Allow group dmsGroup to manage odms-job in compartment dmsCompartment
Allow group dmsGroup to manage users in tenancy where all {target.user.id=‘ocid1.user.oc1..aaaaaaaaqutjpgdabhqd4p4jfoyrbu6n6ihjoqisucfqdljikengtlnlvnyq’, request.operation=/*AuthToken*/}
Allow group dmsGroup to inspect users in tenancy where all {target.user.id=‘ocid1.user.oc1..aaaaaaaaqutjpgdabhqd4p4jfoyrbu6n6ihjoqisucfqdljikengtlnlvnyq’}
Allow group dmsGroup to manage tag-namespaces in compartment dmsCompartment
Allow group dmsGroup to manage virtual-network-family in compartment Networks
Allow group dmsGroup to manage buckets in compartment dmsCompartment
Allow group dmsGroup to manage objects in compartment dmsCompartment
Allow group dmsGroup to manage autonomous-database-family in compartment dmsCompartment
Allow group dmsGroup to manage database-family in compartment dmsCompartment
Allow group dmsGroup to manage instance-family in compartment dmsCompartment
Allow group dmsGroup to manage volume-family in compartment dmsCompartment
Allow group dmsGroup to manage goldengate-family in compartment dmsCompartment
Allow service goldengate to manage vaults in tenancy
Allow service goldengate to manage keys in tenancy
Allow service goldengate to manage secret-family in tenancy
Allow service goldengate to manage objects in compartment dmsCompartment
Allow group dmsGroup to manage all-resources in compartment dmsCompartment
Allow group dmsGroup to inspect teanancies in tenancy
For more information about providing permissions to database migration users, see Giving Permissions to Database Migration Users in Using Oracle Cloud Infrastructure Database Migration Service.
Configuring SUDO Access

You may need to grant certain users authority to perform operations using sudo on the source database servers.

To configure sudo access for source database servers, see Configuring Sudo Access in Using Oracle Cloud Infrastructure Database Migration Service.
Preparing the Source Database for Migration

Ensure to configure your source database before you start migrating data.

  1. Prepare the source database for online logical migration with a minimum of 2.1 GB STREAMS_POOL_SIZE.

    Note:

    Offline logical migrations is not supported.
    1. Configure STREAMS_POOL_SIZE.
    2. Connect to CDB source database as SYS user and execute the following commands:
      SQL> ALTER SYSTEM SET streams_pool_size > 2 GB scope=both;
      ALTER SYSTEM SET global_names=false;
      archive log list;
      commit;
    3. Connect to PDB source database as SYS user and execute the following commands:
      SQL> ALTER DATABASE ADD SUPPLEMENTAL LOG DATA;
      ALTER SYSTEM SET global_names=false;
      archive log list;
      commit;
  2. Enable ARCHIVELOG if it is not already enabled. See step 3b in Preparing the Source Database for Migration in Using Oracle Cloud Infrastructure Database Migration Service.
  3. Enable logging.
    sqlplus > ALTER DATABASE ADD SUPPLEMENTAL LOG DATA; (execute on both cdb and pdb)
    sqlplus > ALTER DATABASE FORCE LOGGING;(execute only on cdb)

    Note:

    To prevent migration failure in upgrade scenarios, ensure to revoke DBA role from a Fusion Middleware user before you start migration in PDB using the command, SQL> revoke DBA from FMW;. If there are any failures due to grants, see DBA Role Privileges Issue.
  4. If you are using Object Storage as a data transfer medium, ensure that an export Directory Object exists and is usable by Data Pump to store generated dump files.
    1. The directory object is a file path on the source database server file system. The name needs to comply with Oracle Database directory object rules.
    2. The export Directory Object must be owned by same OS user who owns the database Oracle home.
  5. Connect to the source database server.
    1. Create a new directory in source database and provide required permissions.
    2. Connect to source database PDB as sys user.

      Note:

      Ensure to verify that ggadmin user you created in Creating GoldenGate Users on the Source Database exist in PDB.
      CREATE OR REPLACE DIRECTORY <DPDIR> as '/u01/app/oracle/product/19.0.0.0/dbhome_1/rdbms/log/<DPDIR>'; (Directory Created)
      Note: Make sure that this folder structure exists.
      GRANT READ,WRITE ON DIRECTORY <DPDIR> to ggadmin; (grant succeeded)
      commit;
      SELECT OWNER,directory_path from dba_directories where directory_name like '%<DPDIR>%'; ( It should display 1 row)
      exit ;

      Note:

      The directory object is a file path on the source database server file system. The name needs to comply with Oracle Database directory object rules. See CREATE DIRECTORY in SQL Language Reference.

  6. Apply mandatory RDBMS patches on the source database.
Preparing the Target Database for Migration

Ensure to configure your target database before you start migrating data.

You must use only one of the database service names,databasename_tpurgent ordatabasename_tp, specified in tnsnames.ora. For database service name details, see MDW Database Service Names for Autonomous Database in Using Oracle Autonomous Database on Shared Exadata Infrastructure.

  1. Connect to target database from GoldenGate machine.
    export TNS_ADMIN=/u02/deployments/Target/etc/adb 
    export ORACLE_HOME=/u01/app/client/oracle19
    cd $ORACLE_HOME/bin
    /sqlplus admin/<admin_password>@<ATP_databasename>
  2. Create a role manually, if not present.
    CREATE ROLE STBROLE;
  3. Check the GLOBAL_NAMES parameter. If the parameter is set to true, change it to false.
    show parameter global;
    alter system set global_names=false;
Accessing the Database Migration Service

You can access Oracle Cloud Infrastructure Database Migration using the Oracle Cloud Interface Console (a browser based interface), REST APIs, or Oracle Cloud Infrastructure Software Development Kits and Command Line Interface.

For complete information, see Using Oracle Cloud Infrastructure Database Migration Service.

Registering Databases

You must register source and target databases to use with Oracle Cloud Infrastructure Database Migration by creating registered database resources.

To register databases, see Using Oracle Cloud Infrastructure Database Migration Service.

Premigration Tasks

Perform the following premigration tasks before you migrate data from an on-premises database to Oracle Autonomous Transaction Processing-Shared (ATP-S) database

Premigration Task for Oracle Forms

Perform the following premigration task before you migrate data to Oracle Autonomous Transaction Processing-Shared (ATP-S) database for Oracle Forms.

If user has created their own user defined schemas, run the commands listed below on the source database as a SYS user:

Example:
ALTER USER abc identified by <Schema_Password> account unlock;
GRANT read,write on DIRECTORY test_dir to abc;
commit;
# Export the schemas using expdp
expdp system/<SYS_PASSWORD>@<DB_SID> schemas=abc directory=test_dir dumpfile=abc_meta.dmp logfile=abc1.log

If you exported your users from an on-premises database, run the commands listed below on the target database:

Example:
CREATE TABLESPACE "USERS";
Create user abc identified by <Schema_Password> DEFAULT TABLESPACE USERS TEMPORARY TABLESPACE TEMP;
GRANT UNLIMITED TABLESPACE to abc;
GRANT CONNECT, create view, create table, create procedure, create trigger, create synonym, create sequence, create type to abc;
commit;
#connect as abc user
connect abc/<password>@fmwatpdedic2_tp;
CREATE TABLE DEPT("DEPTNO" NUMBER(2,0),"DNAME" CHAR(14 BYTE),"LOC" CHAR(13 BYTE));
CREATE TABLE EMP("EMPNO" NUMBER(4,0),"ENAME" CHAR(10 BYTE), "JOB" CHAR(9 BYTE), "MGR" NUMBER(4,0),"HIREDATE" DATE,"SAL" NUMBER(7,2),"COMM" NUMBER(7,2), "DEPTNO" NUMBER(2,0));
commit;
# Drop the current table in the database and recreate the new table as in the dump file using impdp
impdp admin/<admin_password>@fmwatpdedic2_tp credential=DEF_CRED_NAME /
dumpfile=https://objectstorage.us-ashburn-1.oraclecloud.com/n/atpdpreview2/b/FormsInstallDBMigration/o/abc_meta.dmp /
TABLE_EXISTS_ACTION=REPLACE
Premigration Task for Oracle GoldenGate Veridata

Perform the following premigration task before you migrate data to Oracle Autonomous Transaction Processing-Shared (ATP-S) databasefor Oracle GoldenGate Veridata.

For Oracle GoldenGate Veridata, create the following roles as a SYS user on the source database:

CREATE ROLE VERIDATA_ROLE;
GRANT CREATE SESSION, CREATE TABLE, CREATE VIEW, CREATE PROCEDURE, CREATE SYNONYM TO VERIDATA_ROLE;
GRANT VERIDATA_ROLE TO <PREFIX_GIVEN>_STB;
GRANT VERIDATA_ROLE TO <PREFIX_GIVEN>_IAU;
GRANT VERIDATA_ROLE TO <PREFIX_GIVEN>_IAU_APPEND;
GRANT VERIDATA_ROLE TO <PREFIX_GIVEN>_IAU_VIEWER;
GRANT VERIDATA_ROLE TO <PREFIX_GIVEN>_OPSS;
GRANT VERIDATA_ROLE TO <PREFIX_GIVEN>_VERIDATA;
GRANT VERIDATA_ROLE TO <PREFIX_GIVEN>_WLS;
GRANT VERIDATA_ROLE TO <PREFIX_GIVEN>_WLS_RUNTIME;
Creating a Backup of the Schema Version Registry

Use the Upgrade Assistant on the on-premises host to create a backup of the existing schema version registry on the on-premises database.

To create a backup of the schema version registry:

  1. Navigate to $OH/oracle_common/upgrade/bin.
  2. Export ORACLE_HOME=<Oracle_home>.
  3. Execute ua -backupRegistry on your on-premises database, to backup the existing schema version registry.
    ./ua -backupRegistry
    Oracle Fusion Middleware Upgrade Assistant 12.2.1.4.0
    Enter the Database Connect String(host:port/service or host:port:SID or TNS connect string):
    myhost.us.example.com:<port_number>/myservice.us.example.com
    Enter the DBA User Name: sys as sysdba
    Enter the DBA Password: <DBA_Password>
    The schema version registry is saved to ./registry.xml location.
Creating Migration

A migration contains the parameter settings for running a migration job with Oracle Cloud Infrastructure database migration.

  1. Log in to the Oracle GoldenGate instance.
  2. Navigate to /home/opc to access GoldenGate credentials.
  3. Create migration job using the following:
    1. Datapump via Object Storage
    2. Online Replication
    For more information, see Managing Migrations in Using Oracle Cloud Infrastructure Database Migration Service.
  4. To find the default and temporary tables spaces for all the schemas in each product, run the following commands on the source database:
    • For all products:
      select username,default_tablespace,temporary_tablespace from dba_users;

    Map these default and temporary tablespaces obtained in this step to DATA and TEMP respectively, in the DMS user interface. For more information, see Using Oracle Cloud Infrastructure Database Migration Service.

Validating a Migration

Before you can run a job with a migration resource in Oracle Cloud Infrastructure Database Migration, the migration resource must be validated.

  1. Validate migration job. For more information, see Validating a Migration in Using Oracle Cloud Infrastructure Database Migration Service.
    Ensure to select the following checkboxes while validating the migration job:
    • Run premigration advisor during validation.
    • Continue premigration advisor validation on error.
  2. Fix issues found during validation. For more information about known issues and workarounds, see Troubleshooting ATP-S Database Migration.
Excluding Unsupported Objects

You must specify objects to include or exclude from a migration job while you are creating a migration resource.

Few data types are not supported by GoldenGate for replication purpose. These unsupported objects fail during validation phase. Few objects related to Oracle Text Search (OTS) are not supported on the Oracle Autonomous Transaction Processing-Shared (ATP-S) database. So, these unsupported objects must be excluded from online migration and later exported and imported manually using data pump. For more information, see Details of Support for Oracle Data Types and Objects in Using Oracle GoldenGate for Oracle Database.

Select ALL_OBJECTS view to display the correct OWNER and OBJECT_NAME values for any objects you want to exclude. For complete information, see Selecting Objects for Oracle Migration in Using Oracle Cloud Infrastructure Database Migration Service.

To exclude Oracle GoldenGate unsupported objects, see Table B-1, and to exclude the objects due to CPAT tool errors, see Objects To Be Excluded from the Migration Job due to CPAT Tool Errors.

Note:

After the migration is completed, for OTS, the excluded objects are regenerated dynamically.

Migrate Your Data

Register source (both PDB and CDB separately) and target databases to use with Oracle Cloud Infrastructure Database Migration by creating registered database resources. Registered database resources enable networking and connectivity for the source and target databases.

Performing Migration

Perform the following steps to migrate data from an on-premises database, for all Oracle Fusion Middleware products except Oracle Identity and Access Management Suite of products.

  1. Run the migration job. For more information, see Running a Migration Job in Using Oracle Cloud Infrastructure Database Migration Service.
  2. Pause after the Monitor Replication Lag phase for the transaction replication to continue during the waiting state.
  3. Migrate the excluded objects manually using Oracle Data Pump expdp and impdp commands.

    See step 5 in Preparing the Source Database for Migration. For the user privileges, see Table A-1 for each product.

    To create a parameter in the <DB $OH> directory, see Table A-2.

  4. Export all schemas at once using the expdp command.
    Example:
    ./expdp ggadmin/<ggadmin_password>@<PDB_connect_string> dumpfile=dump_tables.dmp 
    logfile=<logfilename>.log directory=<DPDIR> parfile=<parfilename>.par full=y

    To export the MDS (Metadata Services) schema individually, run the following command:

    Example:

    ./expdp <schema_prefix>_MDS/<MDS_schema_password>@<PDB_connect_string> directory=<DPDIR> dumpfile=<dumpfilename>.dmp logfile=<logfilename>.log
    parfile=<parfilename>.par

    For the expdp commands for each product, see Table A-3.

  5. After the export, for MDS schema, do the following:
    1. Generate sqlfile to validate the contents before executing import on ATP-S.
      impdp <schema_prefix>_MDS/<MDS_schema_password>@<PDB_connect_string> dumpfile=<dumpfilename>.dmp sqlfile=<DPDIR>:<filename>_imp.sql

      where, dumpfilename.dmp is the dump file from the expdp command of MDS schema in step 4.

    2. Execute the SQL command as a SYS or ggadmin user in PDB.
      sqlplus > select dbms_metadata.get_ddl('TABLE','TABLE_NAME','<schema_prefix>_MDS') from dual;

      Note:

      Verify the results of the above query with the contents of <filename>_imp.sql in /u01/app/oracle/product/19.0.0.0/dbhome_1/rdbms/log/<DPDIR>. Both the results must be same.
  6. Upload the dumpfile into cloud object storage and copy the path.
  7. Import the data dump file to an ATP-S database for your schemas.
    1. Set the following environment variables on the Oracle Cloud Infrastructure (OCI) host on which you have installed your Oracle Fusion Middleware product.
      cd /usr/lib/oracle/21/client64/bin
      export LD_LIBRARY_PATH=/usr/lib/oracle/21/client64/lib:$LD_LIBRARY_PATH
      export PATH=/usr/lib/oracle/21/client64/bin:$PATH
      export TNS_ADMIN=<ATP-S_wallet_location>
      /sqlplus /nolog
      connect admin/<admin_password>@<ATP_databasename>                                                                                                                                                                                                                                                                                                                                                                                                       
    2. Create credentials.
      BEGIN
        DBMS_CLOUD.CREATE_CREDENTIAL(
        credential_name => '<DEF_CRED_NAME>',
        username => '<OCI_Username>',
        password => '<Your_Auth_Token_Here>'
        );
      END;
      /
    3. Remap the tablespaces using the impdp command.
      Example:
      impdp admin/<admin_password>@<ATP_databasename> credential=def_cred_name dumpfile= <dump_file_cloud_object_storage_location>.dmp REMAP_TABLESPACE=<schema_prefix>_SCHEMA:DATA
      REMAP_TABLESPACE=<schema_prefix>_IAS_TEMP:TEMP
      

      For the impdp commands for each product, see Table A-3.

    4. For MDS, test if the MDS purge path table is imported successfully.
      select table_name from dba_tables where owner='<schema_prefix>_MDS' and table_name like 'MDS_PURGE_PATHS';
You must now restore the schema version registry, rewire the domain with the target ATP-S target database that you created, update the configuration files, restart servers, and perform sanity check. See Restoring the Schema Version Registry, Rewiring the Domain with the ATP-S Target Database, Updating the Configuration Files, Restarting the Servers, and Performing Sanity Check.

Restoring the Schema Version Registry

To migrate schema version registry from an on-premises database to an Oracle Autonomous Transaction Processing-Shared (ATP-S) database, you must restore the schema version registry on your shared autonomous database.

Note:

The following topic is applicable when you migrate data from an on-premises database to ATP-S database using Database Migration (DMS) service.
To restore the schema version registry to your ATP-S database
  1. Navigate to $OH/oracle_common/upgrade/bin.
  2. Apply the OPatch 32089134 for ua restoreRegistry, and the patches 31676526 and 30540494 applicable to an Autonomous Transaction Processing database. See Applying Patches on Oracle Home in Creating Schemas with the Repository Creation Utility.
  3. Set the following environment variable:
    export UA_PROPERTIES="-Doracle.jdbc.fanEnabled=false"

    If you do not set this environment variable, you will see the error, SEVERE: attempt to configure ONS in FanManager failed with oracle.ons.NoServersAvailable: Subscription time out.

  4. Execute ua -restoreRegistry on the ATP-S database.
    [opc@fmw-atps-3 bin]$ cd <OH>/oracle_common/upgrade/bin
    [opc@fmw-atps-3 bin]$ export ORACLE_HOME=<OH>
    [opc@fmw-atps-3 bin]$ ./ua -restoreRegistry
    Oracle Fusion Middleware Upgrade Assistant 12.2.1.4.0
    Enter location of Schema Version Registry backup file:
    <OH>/oracle_common/upgrade/bin/registry.xml
    Restoring from <OH>/oracle_common/upgrade/bin/registry.xml
    Enter prefix or * for list:
    <schema_prefix>
    Enter the Database Connect String:
    (host:port/service or host:port:SID or TNS connect string)
    jdbc:oracle:thin:@<ATP_databasename>?TNS_ADMIN=<ATP-S_wallet_location>
    Enter the DBA User Name:
    ADMIN
    Enter the DBA Password:
    <Date Time> oracle.simplefan.impl.FanManager configure
    Schema Version Registry restored from <OH>/oracle_common/upgrade/bin/registry.xml
    Rows removed: 0. Rows inserted: 6

    Note:

    You must enter the complete location of the registry.xml file and pass the complete database connect string.

Complete the Postmigration Tasks

After migrating data from an on-premises database to an Oracle Autonomous Transaction Processing-Shared (ATP-S) database, perform the tasks described in this section. Some of these tasks apply to specific schemas.

Note:

The following topics are applicable when you migrate data from an on-premises database to ATP-S database using Database Migration (DMS) service.

Postmigration Tasks for Oracle Data Integrator

Perform the postmigration steps described in this section after migrating data from an on-premises database to an Oracle Autonomous Transaction Processing-Shared (ATP-S) database for Oracle Data Integrator (ODI).

Change the work repository connection URL setting in ODI Studio by connecting to the master repository and changing the work repository details.
  1. Connect to the Master repository with valid credentials.
  2. To open the work repository, click Topology and then click WORK_REPO.
  3. Click Connection Information of the Work repository and update the connection string.
    Example connection string:
    jdbc:oracle:thin:@<<connect_name>?TNS_ADMIN=/home/opc/WalletDB
  4. Save and test the connection.
  5. In the Login screen, choose the Work repository and proceed with login.

Rewiring the Domain with the ATP-S Target Database

You must rewire the datasources in the Oracle Fusion Middleware domain with the newly created ATP-S target database.

To rewire the domain:
  1. Log into the WebLogic Remote Console.
  2. Navigate to Services and select Datasources.
  3. Update all the data sources connect string with ATP-S database connection string.
    The connect sting format is jdbc:oracle:thin:@TNS_alias?TNS_ADMIN=<path_of_the_wallet_files, ojdbc.properties, and tnsnames.ora>

Updating the Configuration Files

Follow the steps in this section to update the config.xml configuration file, and the Oracle Platform Security Services ( OPSS) configuration files, jps-config.xml and jps-config-jse.xml files in the Oracle Cloud Infrastructure Database Migration domain host.

  1. To update the config.xml file:
    1. Navigate to the directory, $DOMAINHOME/config on the OCI domain host.
    2. If the RDBMS security store is enabled in the on-premises domain, update the config.xml file in one of the following ways:
      • In the WebLogic Remote Console, navigate to Security > Realms, click RDBMS Security Store and update the RDBMS connection configuration.
      • Use the WebLogic Scripting Tool (WLST).

        Note:

        For sec:connection-url, update jdbc:oracle:thin:@@//dbserver:listener_port/DB_ServiceName with the new database location, jdbc:oracle:thin:@TNS_alias?TNS_ADMIN=<path_of_the_wallet_files, ojdbc.properties, and tnsnames.ora>.

        Example command to update the config.xml file:

        store = realm.getRDBMSSecurityStore()
        store.setUsername('<Db_SchemaUser>')
        store.setPassword('<Db_SchemaPassword>')
        store.setConnectionURL('jdbc:oracle:thin:@TNS_alias?TNS_ADMIN=<path_of_the_wallet_files, ojdbc.properties, and tnsnames.ora>')
        store.setDriverName('<driverName>')

        Example of config.xml after update:

        <sec:rdbms-security-store>
            <sec:username><Db_SchemaUser></sec:username>
            <sec:password-encrypted><Db_SchemaPassword></sec:password-encrypted>
            <sec:connection-url>jdbc:oracle:thin:@TNS_alias?TNS_ADMIN=<path_of_the_wallet_files, ojdbc.properties, and tnsnames.ora>
            <sec:driver-name><driverName></sec:driver-name>
        </sec:rdbms-security-store>
  2. To update the jps-config.xml and jps-config-jse.xml files:
    1. Navigate to $DOMAINHOME/config/fmwconfig directory on the OCI domain host.
    2. In the jps-config.xml, replace jdbc.url property with the new connection string.
      jdbc:oracle:thin:@TNS_alias?TNS_ADMIN=<path_of_the_wallet_files, ojdbc.properties, and tnsnames.ora>

      Example:

      jdbc:oracle:thin:@fmwatpsim_tp?TNS_ADMIN=/home/opc/
    3. In thejps-config-jse.xml, replace jdbc.url and audit.loader.jdbc.string property with the new connection string.
      During migration, if you have changed the OPSS password in your Oracle Autonomous Transaction Processing-Shared (ATP-S) database, execute the following WebLogic Scripting Tool (WLST) commands in offline mode:
      cd <Domain_Home>/oracle_common/common/bin./wlst.sh
      
      Initializing WebLogic Scripting Tool (WLST) ...Jython scans all the jar files it can find at first startup.
      Depending on the system, this process may take a few minutes to complete, and WLST may not return a prompt right away.
      Welcome to WebLogic Server Administration Scripting Shell Type help() for help on available commands
      
      modifyBootStrapCredential(jpsConfigFile="<Domain_Home>/config/fmwconfig/jps-config-jse.xml",
      username="<Prefix>_OPSS", password="<New_Password>")
  3. Save the changes.

Restarting the Servers

After the migration of your data from on-premises to an Oracle Autonomous Transaction Processing-Shared (ATP-S) database, restart all processes and servers, including the Administration Servers and any Managed Servers.

See Starting and Stopping Administration and Managed Servers and Node Manager in Administering Oracle Fusion Middleware.

Performing Sanity Check

After the migration of data from your on-premises to an Oracle Autonomous Transaction Processing-Shared (ATP-S) database, verify the application URLs, and ensure that data is accessible from the application.

After you perform sanity check:

  • For Oracle Fusion Middleware products - Resume the job at the Switchover phase, complete the Switchover phase and Cleanup phase, and complete migration.