Network planning for Oracle Database@Azure

In this article, learn about network topologies and constraints in Oracle Database@Azure.

After you purchase an offer through Azure Marketplace and provision the Oracle Exadata infrastructure, the next step is to create your virtual machine cluster to host your instance of Oracle Exadata Database@Azure. The Oracle database clusters are connected to your Azure virtual network via a virtual network interface card (virtual NIC) from your delegated subnet (delegated to Oracle.Database/networkAttachment).

Supported topologies

The following table describes the network topologies that are supported by each configuration of network features for Oracle Database@Azure:

Topology Supported
Connectivity to an Oracle database cluster in a local virtual network Yes
Connectivity to an Oracle database cluster in a peered virtual network (in the same region) Yes
Connectivity to an Oracle database cluster in a spoke virtual network in a different region with a virtual wide area network (virtual WAN) Yes
Connectivity to an Oracle database cluster in a peered virtual network (cross-region or global peering) without a virtual WAN* No
On-premises connectivity to an Oracle database cluster via global and local Azure ExpressRoute Yes
Azure ExpressRoute FastPath No
Connectivity from on-premises to an Oracle database cluster in a spoke virtual network over an ExpressRoute gateway and virtual network peering with a gateway transit Yes
On-premises connectivity to a delegated subnet via a virtual private network (VPN) gateway Yes
Connectivity from on-premises to an Oracle database in a spoke virtual network over a VPN gateway and virtual network peering with gateway transit Yes
Connectivity over active/passive VPN gateways Yes
Connectivity over active/active VPN gateways No
Connectivity over active/active zone-redundant gateways No
Transit connectivity via a virtual WAN for an Oracle database cluster provisioned in a spoke virtual network Yes
On-premises connectivity to an Oracle database cluster via a virtual WAN and attached software-defined wide area network (SD-WAN) No
On-premises connectivity via a secured hub (a firewall network virtual appliance) Yes
Connectivity from an Oracle database cluster on Oracle Database@Azure nodes to Azure resources Yes

* You can overcome this limitation by using a site-to-site VPN.

Constraints

The following table describes required configurations of supported network features:

Features Basic network features
Delegated subnet per virtual network 1
Network security groups on Oracle Database@Azure delegated subnets No
User-defined routes (UDRs) on Oracle Database@Azure delegated subnets Yes
Connectivity from an Oracle database cluster to a private endpoint in the same virtual network on Azure-delegated subnets No
Connectivity from an Oracle database cluster to a private endpoint in a different spoke virtual network connected to a virtual WAN Yes
Load balancers for Oracle database cluster traffic No
Dual stack (IPv4 and IPv6) virtual network Only IPv4 is supported

Note

If you want to configure a route table (UDR route) to control the routing of packets through a network virtual appliance or firewall destined to an Oracle Database@Azure instance from a source in the same VNet or a peered VNet, the UDR prefix must be more specific or equal to the delegated subnet size of the Oracle Database@Azure instance. If the UDR prefix is less specific than the delegated subnet size, it isn't effective.

For example, if your delegated subnet is x.x.x.x/24, you must configure your UDR to x.x.x.x/24 (equal) or x.x.x.x/32 (more specific). If you configure the UDR route to be x.x.x.x/16, undefined behaviors such as asymmetric routing can cause a network drop at the firewall.