If anyone in your organization implements a regional subnet, you might need to
update any client code that works with Networking
service subnets and private IPs. There are possible breaking API changes.
For more information, see the regional subnet release note .
DNS Resolver Endpoints
Network security groups (NSGs) act as a virtual firewall for your DNS resolver
endpoints. An NSG consists of a set of ingress and egress security rules that apply only to
the associated DNS resolver endpoints.
Secondary IP Address
If you assigned a secondary IP to a secondary VNIC, and you're using policy-based routing for the secondary VNIC, configure the route rules for the instance to look up the same route table for the secondary IP address, using the ip rule add from <source address> lookup <table name> command.
DNS in Your VCN
You use the Domain Name Server DHCP option to specify the DNS Type for the associated
subnet. If you change the option's value, either restart the DHCP client on the instance
or reboot the instance. Otherwise, the change does not get picked up until the DHCP
client refreshes the lease (within 24 hours).
By default, the Internet and VCN Resolver does not let instances resolve the hostnames of
hosts in your on-premises network connected to your VCN by Site-to-Site VPN or FastConnect. That
functionality can be achieved either by using a custom resolver or by configuring the
VCN's private DNS
resolver.
Requirements for DNS Labels and Hostnames
VCN and subnet labels: Max 15 alphanumeric characters and must start with a letter. Notice that hyphens and underscores are NOT allowed. The value cannot be changed later.
Hostnames: Max 63 characters, letters and numbers are allowed. Hyphens are
allowed. Notice that periods are NOT allowed, hyphens aren't allowed at the
beginning or end of the hostname, and the hostname can't be all numbers.
Hostnames must be compliant with RFCs 952
and 1123. The value can be changed
later.
Don't confuse the DNS label or hostname with the friendly name you can assign to the
object (the display name), which doesn't have to be unique.
Your instances running platform images also have OS firewall rules that control access to the instance. When troubleshooting access to an instance, ensure that all of the following items are set correctly:
The rules in the network security groups that the instance is in
The rules in the security lists associated with the instance's subnet
The instance's OS firewall rules
If an instance is running Oracle Autonomous Linux 8.x, Oracle Autonomous Linux 7, Oracle Linux 8, Oracle Linux 7, or Oracle Linux Cloud Developer 8, you need to use firewalld to interact with the iptables rules. For reference, here are commands for opening a port (1521 in this example):
Tenancies made after June 23, 2021 are by default not allowed to send e-mail through outbound TCP port 25 to the internet. Tenancies made before June 23, 2021 are unaffected. If you require the ability to send email from your tenancy, open a service limits request to obtain an exemption.
New connections to a compute instance are failing
Oracle uses connection tracking to allow responses for traffic that matches stateful
rules. Each compute instance has a maximum number of concurrent connections that can
be tracked, based on the instance's shape. If you reach the tracking limit for
instance connections, any new connections to the instance are dropped.
To use the Console to see if new connections are dropping, check the instance VNIC
metrics:
Confirm you're viewing the compartment that contains the instance you're
interested in.
Open the navigation menu and select Compute. Under Compute, select Instances.
Click the instance to view its details.
Under Resources, click Attached VNICs.
The primary VNIC and any secondary VNICs attached to the instance are
displayed.
Click the VNIC that you're interested in.
Under Metrics, four tables are relevant to connection tracking:
INGRESS PACKETS DROPPED BY FULL CONNECTION TRACKING TABLE
Any value
other than zero indicates that the tracking table is full.
EGRESS PACKETS DROPPED BY FULL CONNECTION TRACKING TABLE
Any value
other than zero indicates that the tracking table is full.
CONNECTION TRACKING TABLE UTILIZATION
A value of 100% indicates that
the tracking table is full.
CONNECTION TRACKING TABLE FULL
A value of 1/True indicates that the
tracking table is full.
If the tracking table is full, you can resolve the problem of failed connections and
dropped packets by implementing one of the following changes:
Change stateful ingress rules to stateless rules (remember to create a
corresponding stateless egress rule to allow replies)
This topic covers reasons why deletion of a subnet or VCN might fail.
Remember:
To delete a VCN, it must first be empty and have no related resources or attached gateways (for example: no internet gateway, dynamic routing gateway, and so on).
To delete a VCN's subnets, they must first be empty (for example, no VNICs or
resolver endpoints homed in the subnet).
Delete All Option
The Console has an easy "Delete all" process that scans the chosen compartments then deletes a VCN and its related Networking resources (subnets, route tables, security lists, sets of DHCP options, internet gateway, and so on). If the VCN is attached to a Dynamic Routing Gateway (DRG), the process deletes the attachment, but the DRG remains.
The "Delete All" process deletes one resource at a time. A VCN with many
compartments and resources takes longer to delete than a VCN with only a few. A
progress report is displayed to show the results of both the scan for resources and
the deletion of those resources.
Note
Before using the "Delete All" process, verify that no resources such as
compute instances, load balancers,
OCI database systems, or
orphaned mount targets are present in any of the subnets. If any of these are
present, the deletion process stalls when trying to delete the resource's
subnet. Deleted VCN resources are irretrievable. For more information, see Subnet or VCN Deletion.
If any subnet still contains resources, or if you don't have permission to delete
a particular Networking resource, the "Delete
All" process stops and returns an error message that includes the OCIDs of
the blocking resources and subnets, which link to the details page for that
resource. In some cases, you might need to contact your tenancy administrator to
help you delete any remaining resources if you don't have the needed
permissions.
The Subnet Isn't Empty 🔗
The most common reason a subnet (and thus a VCN) can't be deleted is because the subnet contains one or more of these resources:
OCI database systems (Exadata Database Service on Dedicated Infrastructure, Autonomous Database on Dedicated Exadata Infrastructure, or Base Database systems)
Note
When you create one of the preceding resources, you specify a VCN and
subnet for it. The relevant service creates at least one VNIC in the subnet and attaches the VNIC
to the resource. The service manages the VNICs on your behalf, so they are not readily
apparent to you in the Console. The VNIC enables the
resource to communicate with other resources over the network. Although this
documentation commonly talks about the resource itself being in the subnet, it's
actually the resource's attached VNIC. This documentation uses the term parent
resource to refer to this type of resource.
If the subnet is empty when you try to delete it, its state changes to TERMINATING briefly and then to TERMINATED.
If the subnet is not empty, you instead get an error indicating that there are still resources that you must delete first. The error includes the OCID of a VNIC that is in the subnet (there could be more, but the error returns only a single VNIC's OCID).
You can use the Oracle Cloud Infrastructure command line interface (CLI) or another SDK or client to call the GetVnic operation with the VNIC OCID. The response includes the VNIC's display name. Depending on the type of parent resource, the display name can indicate which parent resource the VNIC belongs to. You can then delete that parent resource, or you can contact your administrator to determine who owns the resource. When the VNIC's parent resource is deleted, the attached VNIC is also deleted from the subnet. If there are remaining VNICs in the subnet, repeat the process of determining and deleting each parent resource until the subnet is empty. Then you can delete the subnet.
For example, if you're using the CLI, use this command to get information about the VNIC.
Command
CopyTry It
oci network vnic get --vnic-id <VNIC_OCID>
Load balancer example 🔗
Here is an example CLI response for a VNIC that belongs to a load balancer. The display
name shows the load balancer's OCID:
Another reason a VCN can't be deleted is because it contains a one or more network security groups (NSGs) that are not yet empty. To delete an NSG, it must not contain any VNICs (or parent resources with VNICs). You can determine what parent resources are in an NSG by using either the Console or REST API. For more information, see Deleting an NSG.
There Are Resources in Compartments You Don't Have Access To 🔗
You might not be able to see all the resources in a subnet or VCN. This is because subnets and VCNs can contain resources in multiple compartments , and you might not have access to all the compartments. For example, the subnet might contain instances that your team manages but also DB systems that another team manages. Another example: The VCN might have security lists or a gateway in a compartment that another team manages. You might need to contact your tenancy administrator to help you determine who owns the resources in the subnet or VCN.
Repurposing an LPG fails 🔗
Details
An LPG created for a specific local peering connection can't be repurposed to be
used in a new and different local peering connection.
If you attempt to do this you might see the error message The Local
Peering Gateway with ID <LPG_OCID> has already been connected
when:
LPG 1 in VCN 1 was once successfully connected to LPG 2 in VCN 2.
VCN 1 (including LPG 1) is subsequently deleted. The LPG 2 peering
status changes to revoked or destroyed.
You try to connect LPG 2 to LPG 3.
You could also see a slightly different message (A peering with
VCN <VCN_OCID> has already been established) when:
LPG 1 in VCN 1 was once successfully connected to LPG 2 in VCN 2.
LPG 2 is subsequently deleted. The LPG 1 peering status changes to
revoked or destroyed.
You try to connect LPG 1 to LPG 3 (which could be a new LPG in VCN 2 or
any other VCN).
Suggested Solution
Perform the following actions:
Delete the LPG you're attempting to repurpose.
If this deletion
errors out with 409 - Local Peering Gateway <LPG_OCID> is
associated with one or more entities that are in use
the LPG is likely mentioned in route rules in one or more route
tables. Review the route tables for your VCN and remove those routes
from the relevant route tables, and then try again to delete the
LPG.
Create a new LPG and peer it with a fresh LPG in the desired VCN.