Task 1: Prerequisites for Oracle Database@AWS
This topic explains the prerequisites required to begin provisioning Exadata Services.
Many of the tasks you perform during Exadata Services provisioning require specific permissions. The following table provides details of the permissions you need for each task.
Note
The following notes are regarding to OCI IAM:
The following notes are regarding to OCI IAM:
- If the user is an OCI tenancy administrator, then no additional permissions are required for the steps outlined in the table below.
- If the user is not an OCI tenancy administrator, then user needs to be part of a group that has the required permissions described in the table below.
- During the onboarding process. some groups are automatically created with required polices, and you can add an user to those groups so that the user can perform the tasks.
- If you want to allow a different group to perform the tasks, then follow these steps below.
- Create a new group in the default domain, or use an existing group. For more information, see Create a new group.
- Create a policy in the root compartment of the OCI tenancy with the required policy statements and add it to the group. For more information, see Create a policy.
- Add users to the group. For more information, see Add the user.
Note
The following notes are regarding to AWS IAM:
The following notes are regarding to AWS IAM:
- If the user is an AWS tenancy administrator, then no additional permissions are required for the steps outlined in the table below.
- If the user is not an AWS tenancy administrator, then user needs to have additional permissions.
- The policies listed in the table below provide examples of the AWS IAM actions needed to perform the steps.
- To create JSON policies and add them to a user, see Creating policies using the JSON editor and To add permissions by attaching policies directly to the IAM user.
- If the user is an AWS tenancy administrators, then a policy must be created. to grant permissions which are required for onboarding Oracle Database@AWS.
- You must replace [policy_name] with the name of the policy, and [actionX] with the permissions you are granting.
{ "Version": "2012-10-17", "Statement": [ { "Sid": "[policy_name]", "Effect": "Allow", "Action": [ "[action1]", "[action2]", ... ], "Resource": "*" } ] }
- You must replace [policy_name] with the name of the policy, and [actionX] with the permissions you are granting.
Note
Both AWS Service Control Policies (SCPs) and permissions boundaries set at the organizational level can override user permission as described in this topic. This can cause onboarding and provisioning operations for Oracle Database@AWS to fail, even if users have the required permissions. For more information, see Service control policies (SCPs) , Permissions boundaries for IAM entities, and Evaluating identity-based policies with resource-based policies.
Both AWS Service Control Policies (SCPs) and permissions boundaries set at the organizational level can override user permission as described in this topic. This can cause onboarding and provisioning operations for Oracle Database@AWS to fail, even if users have the required permissions. For more information, see Service control policies (SCPs) , Permissions boundaries for IAM entities, and Evaluating identity-based policies with resource-based policies.
Table 1-2 Exadata Services Permissions by Task
Task | Cloud | Persona | Permissions |
---|---|---|---|
Task 2: Create an ODB Network for Oracle Database@AWS | AWS | Networking administrator | AWS IAM:
|
Task 3: Create an Exadata Infrastructure for Oracle Database@AWS | AWS | Infrastructure administrator | AWS IAM:
|
Task 4 :Create an Exadata VM Cluster for Oracle Database@AWS | AWS | Infrastructure administrator and Database administrator | AWS IAM:
|
Task 5: Create Exadata Database and Migrate Data for Oracle Database@AWS | OCI | Database administrator | OCI IAM: If the user is not an OCI tenancy administrator, then user needs to either be part of :
|
Task 6: Configure connectivity between the AWS VPC and the ODB Network for Oracle Database@AWS | AWS |
To download private preview CLI bits, these following permissions are required.
To create route rule in App VPC's route table, the following EC2 IAM permissions are required.
To create outbound endpoint in Route 53, the following Route 53 Resolver IAM permissions are required.
EC2 IAM:
To configure security rules in security group, EC2 IAM permissions are required.
|
|
Task 7: Verifications for Connectivity, Metrics and Billing for Oracle Database@AWS | AWS |
For connectivity:
For observability:
For billing and invoices:
For read-only policies about billing that includes payments and invoices, see AWSBillingReadOnlyAccess. |
For more information on how to grant the required permissions, see the following:
What's Next?
Continue provisioning with Task 2: Create an ODB Network for Oracle Database@AWS.