Before you begin
What you need
Here are the prerequisites required to deploy Oracle GoldenGate Maximum Availability Hub:
- Oracle Cloud Account
- Access to an assigned Oracle Cloud Tenant
- Policies to create compute node resources within the Oracle Cloud Tenant
- Local SSH/RSA Key
Create an SSH/RSA Key
To work with the Oracle Cloud Infrastructure once the Oracle GoldenGate Compute Node is built, you have to provide a SSH Public Key during the interview process that will allow you to log in to the node once built.
In order to build your SSH keys, perform the following steps:
- Open a Terminal window and start the
key generation program by typing the following command:
$ ssh-keygen
- Enter the path to store this file.
By default, this gets saved in your home directory under a hidden folder called
.ssh
. Change this default location, if required.Enter file in which to save the key (/Users/johndoe/.ssh/id_rsa): <Return>
- Enter a passphrase for using your
key.
Enter passphrase (empty for no passphrase): <passphrase>
- Re-enter the passphrase to confirm
it.
Enter same passphrase again: <passphrase>
- Check the results.
The key fingerprint (a colon separated series of 2 digit hexadecimal values) is displayed. Check if the path to the key is correct. In the above example, the path is
/Users/johndoe/.ssh/id_rsa.pub
. You have now created a public or private key pair.
Note:
For generating key pair on Windows platform, refer to Creating a Key Pair section in Oracle Cloud Infrastructure Documentation.Required policies
Review the following information before you proceed:
Add the following required policies before you deploy the Oracle GoldenGate Maximum Availability Hub stack. You may need assistance from your Service administrator to add these policies to your compartment.
- Allow group <ggowner> to manage instance-family in compartment <Compartment Name>
- Allow group <ggowner> to manage orm-family in compartment <Compartment Name>
- Allow group <ggowner> to manage volume-family in compartment <Compartment Name>
- Allow group <ggowner> to use virtual-network-family in compartment <Compartment Name>
- Allow group <ggowner> to manage public-ips in compartment <Compartment Name>
- Allow group <ggowner> to use tag-namespaces in tenancy
- Allow group <ggowner> to inspect compartments in tenancy
Where <ggowner> is an example for a group and <Compartment Name> is an example of a compartment. The following are permission names: instance-family, orm-family, volume-family, virtual-network-family, and public-ips.
Note:
- The Networks compartment is an assumption that the customers follow
the practice of having a separate network group manage the network resources for
all users in the tenancy. If the tenancy instead allows you to create network
resources of your own, then the policy would be:
Allow group <marketplace-permissions> to manage virtual-network-family in compartment <Marketplace-Test>
.
Use one of the following examples to assign privileges required for VIP reassignment
-
Create a dynamic group,
OracleIdentityCloudService/VIP-Reassignment
, with the following rule for any compartment that requires access:
For each compartment listed, add the following required policy for the dynamic group to use APIs to reassign the VIP to another instance in failover events:Any {Instance.compartment.id = ‘<Compartment OCID>’}
Allow dynamic-group 'OracleIdentityCloudService'/'VIP-Reassignment' to { PRIVATE_IP_READ, PRIVATE_IP_UPDATE, VNIC_ASSIGN, VNIC_UNASSIGN, VNIC_ATTACHMENT_READ, INSTANCE_INSPECT } in compartment <child_compartment_name>
-
Instances created by the Oracle GoldenGate Maximum Availability Hub stack are tagged with the tag namespace,
GG_DEV
, and tag key,ogg-high-availability
.Create the tag namespace,GG_DEV
in the compartment in which you deploy Oracle GoldenGate Maximum Availability Hub. Create the tag key definitionogg-high-availability
in theGG_DEV
namespace. Create a dyamic group,OracleIdentityCloudService/VIP-Reassignment-Tag
, with the following matching rule to group all instances tagged with the given namespace and tag key:tag.GG_DEV.ogg-high-availability.value
Add the following required policy for the dynamic group that assigns privileges to all instances with this namespace and tag, enabling them to reassign the VIP address to other instances. For example:
Allow dynamic-group 'OracleIdentityCloudService'/'VIP-Reassignment-Tag' to { PRIVATE_IP_READ, PRIVATE_IP_UPDATE, VNIC_ASSIGN, VNIC_UNASSIGN, VNIC_ATTACHMENT_READ, INSTANCE_INSPECT } in compartment <child_compartment_name>
Set up the source and target databases for replication
Create a custom Virtual Cloud Network (VCN)
You can use an existing VCN or create one when you deploy the Oracle GoldenGate Maximum Availability Hub stack, but ensure that the VCN includes the following network configurations.
Note:
Whether you create a custom VCN or use an existing one, ensure that you're in the same compartment as the instances, or a child compartment of the same parent that hosts the instances. Instances cannot be in an unrelated parent compartment from the VCN compartment.
Before you begin
Take note of the following:
- When you create your VCN, you must create both a client subnet and a cluster subnet. The client subnet can be either public, which allows public access to instances created in the subnet, or private, which prohibits public IP address for instances created in the subnet. The cluster subnet is used only for internal communication between clusters, and must be private.
- If your client subnet is public, you must create and use an Internet Gateway. If your client subnet is private, then you must create and use a NAT Gateway.
- Two sets of security lists and route table rules are required, one set for the client subnet and one set for the cluster subnet. You can use the default security list and route table created when you create the subnet, and create a second security list and route table for the other subnet, or create two new security lists and route tables for each subnet, ensuring that the required ingress, egress, and route table rules are included as documented below.
- Log in to the Oracle Cloud console with your Oracle Cloud account, if you're not already logged in.
- Create the VCN:
- Create Gateways:
- Create an Internet Gateway, if the client subnet's access type is
public:
- On the Virtual Cloud Network details page, under Resources, click Internet Gateways.
- Click Create Internet Gateway.
- In the Create Internet Gateway panel, enter a name for the Internet
Gateway, such as
igwy01
, and then click Create Internet Gateway.
- Create a NAT Gateway for the cluster subnet, or if the client subnet's
access type is private:
- Use the breadcrumb to return to the VCN details page.
- On the Virtual Cloud Network details page, under Resources, click NAT Gateways, and then click Create NAT Gateway.
- In the Create NAT Gateway panel, enter a name for the NAT Gateway,
such as
ngwy01
, and then click Create NAT Gateway.
- Create an Internet Gateway, if the client subnet's access type is
public:
- Create Route Tables and add Route Rules:
- Create Security Lists:
- Create the client subnet:
- Create the cluster subnet:
- Create a private view:
- Use the Oracle Cloud console search bar to search for
private view
. - In the search results, under Services, select Private views (DNS Management).
- On the Private views page, click Create private view.
- In the Create private view panel, enter
goldengate_dns_view
, and then click Create.
- Use the Oracle Cloud console search bar to search for
- Create a zone:
- Use the Oracle Cloud console search bar to search for
zones
. - In the search results, under Services, select Zones (DNS Management).
- On the Zones page, click Private zones, and then click Create zone.
- In the Create private zone panel, enter
goldengate.com
, and then click Create. - Ensure that the DNS private view selected is the private view created in step 8, and then click Create.
- Use the Oracle Cloud console search bar to search for
- Update the associated DNS resolver:
- Use the breadcrumb to return to the Networking page, and then select Virtual cloud networks from the Networking menu.
- On the Virtual Cloud Networks page, select your VCN.
- On the Virtual Cloud Network details page, in the VCN information card, locate DNS Resolver, and click the VCN name.
- On the Private resolver details page, click Manage private views.
- In the Manage private views panel, select the DNS private view created in step 8 from the dropdown, and then click Save changes.