The My Services dashboard and APIs are deprecated.
The following use case examples can get you started working with the Exadata operations available in the Oracle Cloud My Services API.
Important
These procedures are for use with Oracle Database Exadata Database Service on Cloud@Customer ONLY. For more information, see Administering Oracle Database Exadata Cloud at Customer. These procedures DO NOT apply to the Exadata Cloud Service available in Oracle Cloud Infrastructure.
Exadata Firewall Allowlisting
To enable access to your Exadata Cloud Service instance, you can configure security rules
and associate them with your instance. The security rules define an allowlist of allowed
network access points.
The firewall provides a system of rules and groups. By default, the firewall denies network access to the Exadata Cloud Service instance. When you enable a security rule, you enable access to the Exadata Cloud Service instance. To enable access you must:
Create a security group and create security rules that define specific network access allowances.
Assign the security group to your Exadata Cloud Service instance.
You can define multiple security groups, and each security group can contain multiple security rules. You can associate multiple security groups with each Exadata
Cloud Service instance, and each security group can be associated with multiple Exadata Cloud Service instances. You can dynamically enable and disable
security rules by modifying the security groups that are associated with each Exadata Cloud Service instance.
To enable access to an Exadata Cloud Service instance:
Note
In the following examples, <domain> is the identity domain ID. An identity domain ID can be either the IDCS GUID that identifies the identity domain for the users within Identity Cloud Service (IDCS) or the Identity Domain name for a traditional Cloud Account.
This example payload shows that /itas/<domain>/myservices/api/v1/serviceInstances/csi-585928949/serviceConfigurations/Exadata/securityGroupAssignments is used for Exadata Firewall.
Get the current security groups for the service entitlement.
This must be the same as the <serviceEntitlementId>
direction
Required: Yes
String
Allowed values: [ingress | egress] for inbound or outbound.
proto
Required: Yes
String
Allowed values: [tcp | udp].
startPort
Required: Yes
Integer
startPort defines the beginning of a range of ports to open/white-list
[0 - 65535].
endPort
Required: Yes
Integer
endPort defines the ending of a range of ports to open/white-list [0 -
65535].
ipSubnet
Required: Yes
String
Single IP address or range specified in CIDR notation.
ruleInterface
Required: Yes
String
Allowed values: [admin | client | backup] where:
admin — specifies
that the rule applies to network communications over the administration
network interface. The administration network is typically used to support
administration tasks by using terminal sessions, monitoring agents, and so
on.
client — specifies that
the rule applies to network communications over the client access network
interface, which is typically used by Oracle Net Services connections.
backup — specifies
that the rule applies to network communications over the backup network
interface, which is typically used to transport backup information to and
from network-based storage that is separate from Exadata Cloud Service.
If successful, the POST request will return the unique ID of the newly created security group.
For the next step, we'll assume that the newly created security group ID is 3.
Go to the Users page in My Services dashboard and click Identity Console. The URL in the browser address field displays the IDCS GUID for your identity domain. For example:
In the above URL, idcs-105bbbdfe5644611bf7ce04496073adf is the IDCS GUID for your identity domain.
Exadata Scaling with Bursting 🔗
You can temporarily modify the capacity of your Exadata environment by configuring bursting. Bursting is a method you can use to scale Exadata Cloud Service non-metered instances within an Exadata system.
To scale up your non-metered instances, increase the number of compute nodes by modifying the burstOcpu attribute of the host. When you no longer need the additional nodes, update the burstOcpu attribute back to its original setting.
Note
In the following examples, <domain> is the identity domain ID. An identity domain ID can be either the IDCS GUID that identifies the identity domain for the users within Identity Cloud Service (IDCS) or the Identity Domain name for a traditional Cloud Account.
This example payload shows that /itas/<domain>/myservices/api/v1/serviceInstances/csi-585928949/serviceConfigurations/Exadata/securityGroupAssignments is used for Bursting.
Go to the Users page in My Services dashboard and click Identity Console. The URL in the browser address field displays the IDCS GUID for your identity domain. For example: