Configure Autonomous Database for Proof of Concept (POC)
Oracle Autonomous Database on Dedicated Exadata Infrastructure is a highly automated, fully managed database environment running in Oracle Cloud Infrastructure (OCI) with committed hardware and software resources. These isolated resources enable organizations to meet stringent security, availability, and performance requirements while reducing cost and complexity.
If you are looking to quickly create an Autonomous Database POC environment, continue to read on.
Tip:
For a comprehensive and recommended configuration that involves setting up separate development and production Autonomous Database environments, see Configure Autonomous Database with Reference Architecture.Prerequisite Knowledge
To fully understand and appreciate this use case, you should have a basic understanding of Autonomous Database on Dedicated Exadata Infrastructure, including its deployment options, key infrastructure components, user roles, and main features. For more detailed information, please refer to About Autonomous Database on Dedicated Exadata Infrastructure.
- Use Case
- Resources Needed
- High-Level Steps
- Step 1. Create OCI IAM Components
- Step 2. Create the VCN and Subnets
- Step 3. Assign Fleet Administrator
- Step 4. Create Autonomous Database Resources
Parent topic: Configuration Use Cases
Use Case
Acme Company is considering Autonomous Database on Dedicated Exadata Infrastructure for its internal project applications. Before finalizing, Acme I.T. decides to develop a proof of concept (POC) application called PocApp using Autonomous Database on Dedicated Exadata Infrastructure to help them evaluate the service capabilities.
Acme I.T. department will assume the role of fleet administrator, responsible for creating and managing Exadata Infrastructure (EI) and Autonomous Exadata VM Cluster (AVMC) resources for the company. It also takes on the application DBA role to create Autonomous Container Database (ACD) and Autonomous Database for their database users.
This example illustrates the fleet administrator creating and managing Autonomous Container Database and Autonomous Database resources. However, your organization may prefer that the application DBA undertake this task.
Parent topic: Configure Autonomous Database for Proof of Concept (POC)
Resources Needed
OCI IAM Components

- One compartment named AcmeComp to place the resources.
- One group named AcmeGroup to which users can be assigned.
Note
Any user added to this group can perform as a fleet administrator, application DBA, or developer. - One policy called AcmeCompPolicy to specify user access to the resources at the compartment and tenancy levels.
Network Resources


-
Oracle Public Cloud deployments:
- One VCN to provide network connectivity to all dedicated infrastructure resources. This VCN will connect to the Acme Company VPN using an IPSec VPN and have an Internet Gateway resource that blocks all incoming internet traffic. It will be named AcmeVCN.
- Two subnets to provide network access isolation, one for the Autonomous Database resources and another for the application's client and mid-tier resources. These subnets will be named AcmeSubnet and AppSubnet respectively.
Note
For simplicity, we are using a single VCN and leveraging subnets to provide network isolation. However, you can also create multiple VCNs to provide the required network access isolation. In this example, we create both AcmeSubnet and AppSubnet under AcmeComp for simplicity. Depending on your requirements, you can optionally place these subnets in separate compartments. -
Exadata Cloud@Customer deployments:
- Set up network rules as listed in Network Requirements for Oracle Exadata Database Service on Cloud@Customer in Preparing for Exadata Database Service on Cloud@Customer.
- Additionally, open Port 1522 to allow TCP traffic between primary database and standby database in an Autonomous Data Guard setup.
Autonomous Database Resources

- One Exadata Infrastructure named AcmeInfrastructure.
- One Autonomous Exadata VM Cluster (AVMC) within AcmeInfrastructure. This AVMC is named PocAVMC.
- PocAVMC hosts the Autonomous Container Database (ACD) and Autonomous Database, which are named PocACD and PocADB respectively, for developing the PocApp application.
Parent topic: Configure Autonomous Database for Proof of Concept (POC)
High-Level Steps
Before Acme I.T. begins configuring Autonomous Database resources on Dedicated Exadata Infrastructure, it requests a service limit increase using the OCI console to add Exadata Infrastructure resources - Database Servers and Storage Servers to the tenancy. Refer to Request a Service Limit Increase for more details.
Listed below are the high-level steps to implement this use case:
- Acme I.T. or security administrator for Acme Company's cloud tenancy creates the AcmeComp compartment, AcmeGroup group, and AcmePolicy compartment policy for resource isolation.
- For access isolation:
- For Oracle Public Cloud deployments, Acme I.T. or the network administrator for Acme creates the following network resources in the AcmeComp compartment:
- VCN: AcmeVCN
- Private subnets: AcmeSubnet
- Public subnet: AppSubnet
- For Exadata Cloud@Customer deployments, Acme I.T. or the network administrator of Acme ensures to:
- Set up network rules as listed in Network Requirements for Oracle Exadata Database Service on Cloud@Customer in Preparing for Exadata Database Service on Cloud@Customer.
- Open Port 1522 to allow TCP traffic between primary database and standby database in an Autonomous Data Guard setup.
- For Oracle Public Cloud deployments, Acme I.T. or the network administrator for Acme creates the following network resources in the AcmeComp compartment:
- After creating network resources, the security administrator adds the cloud user of a designated Acme I.T. member to the AcmeGroup, thus authorizing that user as the fleet administrator.
- The newly authorized fleet administrator creates the following dedicated infrastructure resources in the AcmeComp compartment, in the below listed order:
- Exadata Infrastructure resource named AcmeInfrastructure.
- Autonomous Exadata VM Cluster (AVMC) named PocAVMC, specifying the newly created Exadata Infrastructure.
Note
For Oracle Public Cloud deployments, use AcmeVCN and AcmeSubnet as its VCN and subnet. - Autonomous Container Database (ACD) named PocACD in the AcmeComp compartment, specifying PocAVMC as its underlying resource.
- Autonomous Database named PocADB in the AcmeComp compartment, specifying PocACD as its underlying resource.
Parent topic: Configure Autonomous Database for Proof of Concept (POC)
Step 1. Create OCI IAM Components
-
AcmeComp compartment.
To perform this step, the security administrator follows the instructions in Managing Compartments in Oracle Cloud Infrastructure Documentation to create a compartment using the Oracle Cloud console. When following these instructions, the security administrator specifies the root compartment of the tenancy as the parent compartment of AcmeComp compartment.
-
AcmeGroup group.
To perform this step, the security administrator follows the instructions in Managing Groups in Oracle Cloud Infrastructure Documentation to create a group using the Oracle Cloud console.
-
AcmeCompPolicy Policy
To perform this step, the security administrator follows the instructions in Managing Policies in Oracle Cloud Infrastructure Documentation to create a policy using the Oracle Cloud console.
Note
In addition to creating the required policy statements, in this example the security administrator also creates "USE tag-namespaces" policy statements to permit group members to assign existing tags to the resources they create. To permit group members to create tags as well as use existing tags, the security administrator would instead create "MANAGE tag-namespaces" policy statements.When following these instructions to create AcmeCompPolicy, the security administrator:
-
Sets the Compartment in the side menu to AcmeComp before clicking Create Policy.
-
Adds either of the following Policy Statements depending on their deployment platform:
- Oracle Public Cloud deployments:
- Allow group AcmeGroup to MANAGE cloud-exadata-infrastructures in compartment AcmeComp
- Allow group AcmeGroup to MANAGE cloud-autonomous-vmclusters in compartment AcmeComp
- Allow group AcmeGroup to USE virtual-network-family in compartment AcmeComp
- Allow group AcmeGroup to MANAGE autonomous-container-databases in compartment AcmeComp
- Allow group AcmeGroup to MANAGE autonomous-databases in compartment AcmeComp
- Allow group AcmeGroup to MANAGE autonomous-backups in compartment AcmeComp
- Allow group AcmeGroup to MANAGE instance-family in compartment AcmeComp
- Allow group AcmeGroup to MANAGE metrics in compartment AcmeComp
- Allow group AcmeGroup to INSPECT work-requests in compartment AcmeComp
- Allow group AcmeGroup to USE tag-namespaces in compartment AcmeComp
- Exadata Cloud@Customer deployments:
- Allow group AcmeGroup to MANAGE exadata-infrastructures in compartment AcmeComp
- Allow group AcmeGroup to MANAGE autonomous-vmclusters in compartment AcmeComp
- Allow group AcmeGroup to MANAGE autonomous-container-databases in compartment AcmeComp
- Allow group AcmeGroup to MANAGE autonomous-databases in compartment AcmeComp
- Allow group AcmeGroup to MANAGE autonomous-backups in compartment AcmeComp
- Allow group AcmeGroup to MANAGE instance-family in compartment AcmeComp
- Allow group AcmeGroup to MANAGE metrics in compartment AcmeComp
- Allow group AcmeGroup to INSPECT work-requests in compartment AcmeComp
- Allow group AcmeGroup to USE tag-namespaces in compartment AcmeComp
- Oracle Public Cloud deployments:
-
Parent topic: Configure Autonomous Database for Proof of Concept (POC)
Step 2. Create the VCN and Subnets
APPLIES TO: Oracle Public Cloud only
In this step, Acme I.T. or the network administrator of Acme creates the AcmeVCN VCN and the AcmeSubnet and AppSubnet subnets in the AcmeComp compartment.
To perform this step, Acme I.T. first confers with the Acme I.T. department's networking to reserve a CIDR IP address range that will not conflict with the company's on-premises network. (Otherwise, the VCN would conflict with the on-premises network and an IPSec VPN could not be set up.) The reserved range is CIDR 10.0.0.0/16.
Then, Acme I.T. adapts the instructions in Scenario B: Private Subnet with a VPN in Oracle Cloud Infrastructure Documentation to create the VCN, the Subnets and other network resources using the Oracle Cloud console.
- 10.0.10.0/24 for AcmeSubnet (private subnet)
- 10.0.100.0/24 for AppSubnet (public subnet)
- AcmeSeclist: the basic security list for AcmeSubnet. It is used when the AcmeSubnet subnet is created.
- AppSeclist: the basic security list for AppSubnet. It is used when the AppSubnet subnet is created.
For more details on AVMC ingress and egress requirements, see Requirements to Provision an Autonomous Exadata VM Cluster.
Security Rules in AcmeSeclist
Here are the ingress rules created in AcmeSeclist:
Stateless | Source | IP Protocol | Source Port Range | Destination Port Range | Type and Code | Allows |
---|---|---|---|---|---|---|
No | 10.0.10.0/24 | ICMP | All | All | All | ICMP traffic for : All |
No | 10.0.10.0/24 | TCP | All | All | TCP traffic for ports: All | |
No | 10.0.100.0/24 | TCP | All | 1521 | TCP traffic for port: 1521 Oracle Net | |
No | 10.0.100.0/24 | TCP | All | 2484 | TCPS traffic for port: 2484 Oracle Net | |
No | 10.0.100.0/24 | TCP | All | 6200 | ONS/FAN for ports: 6200 | |
No | 10.0.100.0/24 | TCP | All | 443 | HTTPS traffic for port: 443 |
Here are the egress rules created in AcmeSeclist:
Stateless | Destination | IP Protocol | Source Port Range | Destination Port Range | Type and Code | Allows |
---|---|---|---|---|---|---|
No | 10.0.10.0/24 | ICMP | All | All | All | All ICMP traffic within DevVMSubnet |
No | 10.0.10.0/24 | TCP | All | All | All TCP traffic within DevVMSubnet |
Security Rules in AppSeclist
Here is the ingress rule created in AppSeclist:
Stateless | Source | IP Protocol | Source Port Range | Destination Port Range | Type and Code | Allows |
---|---|---|---|---|---|---|
No | 0.0.0.0/0 | TCP | All | 22 | All | SSH traffic for ports: 22 |
It is recommended to change 0.0.0.0/0 in the security rules to your approved list of CIDR range/IP addresses.
Here are the egress rules created in AppSeclist:
Stateless | Destination | IP Protocol | Source Port Range | Destination Port Range | Type and Code | Allows |
---|---|---|---|---|---|---|
No | 10.0.10.0/24 | TCP | All | 1521 | ||
No | 10.0.10.0/24 | TCP | All | 2484 | ||
No | 10.0.10.0/24 | TCP | All | 443 | ||
No | 10.0.10.0/24 | TCP | All | 6200 |
Parent topic: Configure Autonomous Database for Proof of Concept (POC)
Step 3. Assign Fleet Administrator
In this step, the security administrator adds the cloud user of a designated Acme I.T. member to the AcmeGroup.
To perform this step, the security administrator follows the instructions in Managing Users in Oracle Cloud Infrastructure Documentation to add a user to a group using the Oracle Cloud console.
Parent topic: Configure Autonomous Database for Proof of Concept (POC)
Step 4. Create Autonomous Database Resources
-
Exadata Infrastructure
In this step, the fleet administrator follows the instructions in Create an Exadata Infrastructure Resource to create an Exadata Infrastructure resource named AcmeInfrastructure.
-
Autonomous Exadata VM Cluster
In this step, the fleet administrator follows the instructions in Create an Autonomous Exadata VM Cluster to create PocAVMC with the following specifications, leaving all the other attributes at their default settings.
Setting Value AVMC Name PocAVMC Underlying Exadata Infrastructure AcmeInfrastructure Virtual cloud network (VCN) APPLIES TO:
Oracle Public Cloud only
AcmeVCN Subnet APPLIES TO:
Oracle Public Cloud only
AcmeSubnet -
Autonomous Container Database
In this step, the fleet administrator follows the instructions in Create an Autonomous Container Database to create PocACD with the following specifications, leaving all other attributes at their default settings.
Setting Value ACD Name PocACD Underlying AVMC PocAVMC Container Database Software version Latest software version (N) -
Autonomous Database
In this step, the fleet administrator follows the instructions in Create an Autonomous Database to create PocADB. These databases are created with the following specifications, leaving all other attributes at their default settings.
Setting Value Database Name PocADB Underlying ACD PocACD Database instance Can choose to create an Autonomous Database or an Autonomous Database for Developers
The Autonomous Database on Dedicated Exadata Infrastructure is now configured to develop quick proof of concept applications.
Parent topic: Configure Autonomous Database for Proof of Concept (POC)