X

News, tips, partners, and perspectives for Oracle’s virtualization offerings

Recent Posts

Events

Q: What do penguins, pop sockets and VR have in common? A: The Oracle Infrastructure Technologies Showcase at Oracle OpenWorld

It’s refreshing to be in San Francisco in the fall. The weather is typically “temperate” but can be unpredictable, so it’s always good to bring layers, just in case. Joining the throng of people heading to Oracle OpenWorld adds an even more energizing buzz to the city by the bay. I enjoy a walk in the Howard and 3rd St. neighborhood as I grab a cappuccino and head to Moscone Center. Like the convention center, which is undergoing an expansion and transformation, so too is The Exchange, this year’s demo grounds at Oracle OpenWorld, located in Moscone South. With a focus on attendees’ experience, there are several new things to make navigating the exhibit floor easier. A wayfinder application provides an easy, self-service portal for finding demos and product experts. On-demand demos join always-on demos to provide time savings, and meetings can be booked on the spot to fit your schedule. Also new this year is the Oracle Infrastructure Technologies showcase, #120. This showcase, located on the right side of the show floor, near the Oracle Cloud Infrastructure and Autonomous Database showcases, is a stop you'll want to make. Attendees will find a wealth of information and an opportunity to have some fun. Here’s an outline of what will be covered in the Oracle Infrastructure Technologies showcase. Products, technologies, and training: Servers: X86 Servers, SPARC Servers Storage: Zero Data Loss Recovery Appliance, Oracle ZFS Storage Appliance, StorageTek Tape Automation Operating Systems: Oracle Linux, Oracle Solaris Virtualization: Oracle VM for x86, Oracle VM Server for SPARC, Oracle VM VirtualBox, Tools and Platform: Oracle Containers, Oracle OpenStack, Oracle Enterprise Manager, Kubernetes Converged Infrastructure: Oracle MiniCluster, Oracle SuperCluster, Oracle Private Cloud Appliance Training Partners: AMD, Hewlett Packard Enterprise, Lenovo, Pure Storage, and Symantec Fun with VR: Join us for some fun in this virtual world (with all of the gear), where you’ll transform into the role of a solution architect. Shoot down the Oracle Infrastructure Technology product(s) that best fit your IT requirements and you could win an Oracle penguin pop socket.  And there’s more… More fun at CloudFest. 18 and if you’re planning to extend your stay in San Francisco, be sure to check out all of the Halloween parties – this city knows how to do them right! Finally, back to Oracle OpenWorld -- don’t forget to register for sessions now, they’re filling up fast. Enjoy fall in San Francisco and your time at Oracle OpenWorld 2018.

It’s refreshing to be in San Francisco in the fall. The weather is typically “temperate” but can be unpredictable, so it’s always good to bring layers, just in case. Joining the throng of...

Events

Six Must-Attend Sessions at Oracle OpenWorld 2018

Building your Oracle OpenWorld 2018 schedule? You won't want to miss these six sessions. Our executives will share details on architecture and technical directions, the latest innovations, business strategies, and customer successes. You’ll come away with a better understanding of the unique capabilities Oracle Linux, Virtualization and other Oracle Infrastructure Technologies are delivering now and going forward – whether you want to deploy on premises, in the cloud or integrate between. Register now to ensure you have a seat!  Day/Time/Location    Session Title   Speakers Monday, Oct. 22     11:30 a.m. - 12:15 p.m. Moscone West - Room 2000 Oracle Linux: State of  the Penguin  [PRO4720] Wim Coekaerts, Senior Vice President, Operating Systems and Virtualization Engineering, Oracle 3:45 p.m. - 4:45 p.m. The Exchange @ Moscone South - The Arena Oracle's Systems Strategy for Cloud and On-Premises [PKN5901] Ali Alasti, Senior Vice President, Hardware Engineering, Oracle Wim Coekaerts, Senior Vice President, Operating Systems and Virtualization Engineering, Oracle Edward Screven, Chief Corporate Architect, Oracle Tuesday, Oct. 23     11:15 a.m. - 12:00 p.m. Moscone West - Room 2000 An Overview of Oracle Infrastructure Technologies in Oracle Cloud [PRO5904] Robert Shimp, Product Management Group Vice President - Oracle Linux, Virtualization and Linux and VM Development, Oracle Ajay Srivastava, Senior Vice President, Operating Systems and Virtualization, Oracle 11:30 a.m. - 12:15 p.m. Moscone West - Room 2009 Kubernetes, Docker, and Oracle Linux from On-Premises to Oracle Cloud with Ease [DEV6015] Wim Coekaerts, Senior Vice President, Operating Systems and Virtualization Engineering, Oracle Wednesday, Oct. 24     11:15 a.m. - 12:00 p.m.  Moscone West - Room 2000 The OS Factor: Advice for the Technology Buyer from IDC [BUS4729] Ashish Nadkarni, Research Director, IDC Karen Sigman, Vice President, Product and Partner Marketing, Oracle Thursday, Oct. 25     9:00 a.m. - 9:45 a.m.  Moscone West - Room 2003 Oracle Linux Is Really the Ideal Linux for Oracle Cloud Developers [DEV6017] Wim Coekaerts, SVP, Operating Systems and Virtualization Engineering, Oracle   To learn more about these sessions and to register, click on the session title above, in the search box enter the session code, click "+" to complete your registration. Visit and bookmark this Focus on Oracle Linux and Virtualization page to access the full list of our general sessions and hands-on labs. Check the Oracle Linux and Virtualization blogs regularly for news and updates. And, while at Oracle OpenWorld, be sure to stop by the Infrastructure Technologies showcase, booth #120, located in Moscone South (on the right side, just past the Autonomous Database showcase). Featuring Oracle Linux and Virtualization technologies, at the showcase you can experience demos, a virtual reality game, and speak with product experts and partners.  

Building your Oracle OpenWorld 2018 schedule? You won't want to miss these six sessions. Our executives will share details on architecture and technical directions, the latest innovations, business...

Events

Oracle Linux and Virtualization Hands-On Labs at Oracle OpenWorld

We have a great selection of hands-on labs for Oracle Linux and Virtualization at Oracle OpenWorld. To join the product experts for these sessions at the Marriott Marquis (Yerba Buena Level) - Salon 12/13, add the following six sessions to your Oracle OpenWorld calendar.   Session: Container Orchestration Using Oracle Linux (Kubernetes/Docker) - HOL6334 When: Monday October 22, 3.45 - 4.45pm Speaker: Avi Miller, Product Management Director, Oracle   Session: Build a High Availability Solution with Oracle Linux: Corosync/Pacemaker - HOL3137 When: Monday October 22, 5.15 - 6.15 pm Speaker: Jeff Savit, Director, Oracle   Session: Provide Zero Downtime Update for your Cloud Infrastructure - HOL6340 When: Wednesday October 24, 8:00  - 9:00 a.m Speaker: Christophe Pauliat, Oracle Solution Center Sales Consultant, Oracle; Simon Coter, Director of Product Management, Linux and Virtualization, Oracle   Session: Infrastructure as Code on Oracle Cloud Infrastructure with Terraform - HOL5139 When: Thursday October 25, 10:30 - 11:30 a.m Speaker: Simon Hayler, Sr Principal Technical Product Manager; Christophe Pauliat, Oracle Solution Center Sales Consultant, Oracle; Paul Bramy, CEO reloca; Matthieu Bordonne, Oracle Solution Center Sales Consultant   Session: Observing and Optimizing your Application on Oracle Linux with DTrace - HOL6339 When: Thursday October 25, 12.00 - 1.00pm Speaker: Jeff Savit, Director, Oracle   Session: Oracle Database 18c: Reliable DevOps with Vagrant, Oracle VM VirtualBox, and Oracle Linux - HOL6394 When: Thursday October 25, 1:30 - 2:30 p.m Speaker: Simon Coter, Director of Product Management, Linux and Virtualization, Oracle; Gerald Venzl, Senior Principal Product Manager, Oracle   At Oracle OpenWorld, to learn more about Oracle Linux and Virtualization, visit the Oracle Infrastructure Technologies showcase, booth #120, located in Moscone South, on the right side, just past the Autonomous Database showcase.

We have a great selection of hands-on labs for Oracle Linux and Virtualization at Oracle OpenWorld. To join the product experts for these sessions at the Marriott Marquis (Yerba Buena Level) -...

Events

Optimizing and Automating Your Oracle VM Deployments - Oracle OpenWorld 2018

Interested to hear the latest information on Oracle VM and see how a global enterprise application services provider optimizes Oracle VM infrastructure with automation to ensure higher reliability and predictability?  Please plan to join the us on Day 1 of OpenWorld at the Customer Case Study Session: Optimizing and Automating Your Oracle VM deployments [CAS4728] Monday, Oct 22, 10:30 a.m. - 11:15 a.m. | Moscone West - Room 2000 John Priest (Oracle VM Director of Product Management) will share the latest Oracle VM product information and roadmap, including: Oracle VM latest releases Ksplice for Oracle VM The future of Oracle VM Alain Campos (Architect - Cloud Services Engineering, IT Convergence, Inc.) will present information on how IT Convergence has automated their service delivery using Oracle VM: Oracle VM and Oracle Linux use case at IT Convergence Oracle VM Build Automation and Optimization: Goals --> Challenges --> Solution Short video demo of the automation infrastructure that IT Convergence has built around Oracle VM. To learn more, visit the Oracle Infrastructure Technologies showcase featuring Oracle Linux and Virtualization technologies, booth #120, located in Moscone South (on the right side, just past the Autonomous Database showcase), where you can experience demos, a virtual reality game, and speak with product experts and partners. We look forward to sharing this open world with you!

Interested to hear the latest information on Oracle VM and see how a global enterprise application services provider optimizes Oracle VM infrastructure with automation to ensure higher reliability and...

Events

Oracle Virtualization at Oracle OpenWorld 2018

It’s time to plan your schedule for Oracle OpenWorld 2018, in San Francisco, CA. You won’t want to miss the lineup of Oracle Virtualization sessions. This year’s content includes product roadmaps, tips and tricks, product training, customer case studies, and more. The highlighted sessions below are ones in which you’ll hear from our executives. Register now to be sure you have a seat. At the conference, you’ll also have the opportunity to connect with other Oracle customers, product experts, and partners, to help you make the most of your time. Read on and register for sessions now! The Sessions: Monday, Oct 22: Oracle Linux and Oracle VM VirtualBox: The Enterprise Development Platform, Simon Coter, Sergio Leunissen [PRO4724], 9:00 a.m. - 9:45 a.m. Tips for Securing Your Cloud Infrastructure, Jan Hendrik Mangold, Jeff Savit [TIP4727], 9:00 a.m. - 9:45 a.m. Oracle Linux and Oracle VM: Get Trained for Cloud, Hybrid, and On-Premises, Avi Miller, Anotinette O’Sullivan [TRN5828], 10:30 a.m. - 11:15 a.m. -- more from Antoinette Optimizing and Automating Your Oracle VM Deployments, John Priest, Alain Campos [CAS4728], 10:30 a.m. - 11:15 a.m.  Oracle Linux: State of the Penguin, Wim Coekaerts [PRO4720], 11:30 a.m. - 12:15 p.m. Automating Workload Migration to Oracle Cloud Infrastructure, Simon Coter, Gilson Melo, Alessandr Pilotti [PRO5796], 12:30 p.m. - 1:15 p.m. Oracle’s Systems Strategy for Cloud and On-Premises, Ali Alasti, Wim Coekaerts, Edward Screven [PKN5901], 3:45 p.m. - 4:45 p.m. Perform In-Place Upgrade for Large-Scale Cloud Infrastructure, Jeff Savit, Jeffery Yoder, Rodolfo Martinez [CAS5088], 3:45 p.m. - 4:30 p.m.   Tuesday, Oct 23: An Overview of Oracle Infrastructure Technologies in Oracle Cloud, Robert Shimp, Ajay Srivastava [PRO5904], 11:15 a.m. - 12:00 p.m.  Best Practices: Oracle Linux and Oracle VM in Oracle Cloud Infrastructure, Julie Wong, Simon Coter [PRO4721], 4:45 p.m. - 5:30 p.m. Maximize Performance with Oracle Linux and Oracle VM, Greg Marsden, Jeff Savit, Kevin Tribbey [TIP4725], 5:45 p.m. - 6:30 p.m.    Wednesday, Oct 24: The OS Factor: Advice for the Technology Buyer from IDC, Karen Sigman, Ashish Nadkarni [BUS4729], 11:15 a.m. - 12:00 p.m.   Thursday, Oct 25: Oracle Linux is really the ideal Linux for Oracle Cloud Developers, Wim Coekaerts [DEV6017], 9:00 a.m. - 9:45 a.m.  Practical DevOps with Linux and Virtualization, Simon Coter [DEV5029], 10:00 a.m. - 10:45 a.m.  Embrace Open Source Projects on GitHub for Cloud Automation, Avi Miller, Simon Coter [TIP5795], 12:00 p.m. - 12:45 p.m.    Add these sessions to your schedule and don't forget to bookmark our Focus on Oracle Linux and Virtualization page. And, there’s more…   The Showcase, Moscone South – Booth #120 To learn more, visit the Oracle Infrastructure Technologies showcase featuring Oracle Linux and Virtualization technologies, booth #120, located in Moscone South (on the right side, just past the Autonomous Database showcase), where you can experience demos, a virtual reality game, and speak with product experts and partners. Stay tuned to this blog for more information on #OOW18 in the coming days. We look forward to sharing this open world with you!

It’s time to plan your schedule for Oracle OpenWorld 2018, in San Francisco, CA. You won’t want to miss the lineup of Oracle Virtualization sessions. This year’s content includes product roadmaps, tips...

Oracle Private Cloud Appliance

Ansible: Automate and Accelerate Deployments on Oracle Private Cloud Appliance

We are excited to announce that you can now use Ansible playbooks to automate repeatable IT tasks (like creating and deleting Virtual Machines, deploying databases and applications) on Oracle Private Cloud Appliance 2.3.1 and Oracle VM 3.4 and newer. Automation is a key requirement for achieving cloud like agility and Ansible is the tool of choice to automate and accelerate provisioning, configuration management and application deployment on remote systems.  Ansible is an open-source IT automation engine that automates provisioning, configuration management, application deployment on remote systems. It is an agentless automation solution that works by executing code blocks called "modules" on remote systems over SSH and uses YAML based "playbooks" to describe automation jobs. Why Ansible? Ansible is the de-facto tool for cloud automation and can be used for automating deployments across Oracle PCA, Oracle VM and Oracle ZFSSA. It is Agentless, which means it just needs to be installed on a central “Control Machine” and interfaces with the Oracle VM REST API to control deployments on PCA It saves time and effort, so reduces OpEx – One of our retail customers saw savings of up to 90% in database deployment times on PCA with Ansible Ansible playbook are a lightweight evolution of Oracle VM Templates How does it work? Ansible manages configuration and application deployment on the Oracle Private Cloud Applinace by connecting to the REST APIs for Oracle VM Manager (accessible by HTTPS over port 7002 as shown in figure). Fig: Architecture diagram for Ansible managing Oracle PCA (Oracle VM 3.4) The setup requires the following components: Control Machine: The central machine where Ansible is installed. It is an Oracle Linux 7 system with Ansible package installed from ol7_developer_EPEL yum repository Managed Nodes: The remote machines that Ansible communicates with and automates tasks on. PCA Management Node would be the managed node in this case. You must have a PCA 2.3.1 or newer for using this version of the REST APIs Automating Infrastructure Lifecycle Management on PCA The first custom Ansible module in a series of planned Infrastructure Lifecycle Management modules is now available for Oracle Private Cloud Appliance and Oracle VM. The Ansible module and accompanying playbooks automate Creation of VMs attached to VNICs and disks of desired specifications Deletion of an existing VM along with all the attached disks Starting and stopping VMs  Step-by-step procedures to execute the module on Oracle Private Cloud Appliance are in this whitepaper Results/Benefits Deploy a VM with 2 disks and 2 VNICs in 9 seconds as opposed to ~50 seconds using OVM GUI Reduce DB deployment times by 90% This module can be used in conjunction with playbooks to automate deployment of DBs and applications. Where to download from? The Ansible module and accompanying playbooks can be downloaded as an RPM from OTN

We are excited to announce that you can now use Ansible playbooks to automate repeatable IT tasks (like creating and deleting Virtual Machines, deploying databases and applications) on Oracle...

Announcements

Announcing Ksplice Enhancements for Oracle VM

Ksplice patching for Xen and User space now available for Oracle VM release 3.4.5! We are excited to announce an important enhancement to the Oracle VM product. Oracle VM Server release 3.4.5 now supports Ksplice patching for the Xen hypervisor and critical user space packages. This product enhancement extends the Ksplice kernel patching support already offered on the Oracle VM Server to cover the following Oracle VM components: Xen hypervisor glibc openssl QEMU Oracle Ksplice technology allows you to update systems with new security errata (CVE) patches without the need to reboot. This enables you to remain current with operating system vulnerability patches while minimizing downtime. Oracle Ksplice actively applies updates to the running images instead of making on-disk changes that would take effect only after a subsequent reboots. With the addition of Xen patching and user space patching, Oracle VM administrators now have an enhanced set of tools to cope with security threats and other issues without impacting running systems. To install Ksplice support on your Oracle VM Server, please review the updated documents that give additional information on these new enhancements: Oracle VM Administrator's Guide for Release 3.4 - Information on accessing the Oracle VM ULN channels, Configuring Yum for Oracle Ksplice, Installing the Ksplice Enhanced Client, and Installing Oracle Ksplice Updates on Oracle VM Server. Oracle Linux Ksplice User Guide - Overview of Oracle Ksplice, and Ksplice Enhanced Client support for Oracle VM. For Oracle VM users that are setting up Ksplice for the first time, follow the instructions in the Oracle VM Administrator's Guide to install the Ksplice Enhanced Client and to configure the Ksplice channels. The Unbreakable Enterprise Kernel updates will continue to be located in the Ksplice for Oracle Linux 6 (x86_64) channel, ol6_x86_64_ksplice. The Ksplice Enhanced Client and user space updates for Oracle VM are in a new ULN channel in Oracle VM 3.4 latest, ovm34_x86_64_ksplice. For Oracle VM users that already have support for Ksplice kernel patching, you will need to switch from the Uptrack Client to the Enhanced Client to patch the Xen and user space updates. Instructions to switch between the clients is located in the Oracle VM Administrator's Guide. And as noted above, you need to be on Oracle VM Server 3.4.5 or higher to take advantage of the new Ksplice enhancements. Ksplice patching for Oracle VM is available for customers with Oracle VM Premier Support. You can read more about the Oracle Ksplice technology in Ksplice Overview in the Oracle Technology Network. And when you’re ready to try it out, point your Oracle VM Manager to the updates on the Unbreakable Linux Network and start patching your Oracle VM Servers while keeping your business applications running.  

Ksplice patching for Xen and User space now available for Oracle VM release 3.4.5! We are excited to announce an important enhancement to the Oracle VM product. Oracle VM Server release 3.4.5 now...

Oracle VM Server for x86

Oracle VM adds Windows 2016 to Microsoft SVVP Certification

  Oracle VM 3.4 SVVP Certification  Oracle has been a part of the Microsoft Server Virtualization Validation Program (SVVP) and previously certified Oracle VM 3.4 with Windows 2008 and 2012.  The Oracle VM team is committed to continuing our support for users that are running Windows Server guests on Oracle VM Server for x86.  With the introduction of Windows 2016 support on Oracle VM, a new test certification was completed to validate the following components under the Microsoft SVVP:  Oracle VM 3.4 Oracle VM Windows PV Driver 3.4.3 Windows 2008/R2, Windows 2012/R2 and Windows 2016 guest OSs Oracle VM 3.4 has successfully passed all of the test requirements and is a validated virtualization product to support Windows guests.  Certification details can be found on the Windows Server Catalog site. Microsoft SVVP Overview  Microsoft launched the Server Virtualization Validation Program (SVVP) to improve customers' support experiences when running Windows Server operating systems on virtualization technologies. This validation program is open to vendors that deliver machine virtualization products and have customers that run Windows Server-based workloads in their virtualization environment. Customers can benefit from the regular Windows Server technical support provided by Microsoft when running currently supported versions of Windows Server on validated machine virtualization solutions. All testing for this program is done by the virtualization product vendors, with the results of that testing submitted to Microsoft for review and approval. Oracle VM and Windows PV Driver Overview Oracle VM Server virtualization software is engineered for open cloud infrastructure. It delivers leading performance, scalability and reliability for enterprise SaaS and PaaS workloads as well as traditional enterprise applications. The Oracle VM Windows PV Driver is a component of the Oracle virtualization solution and provides a performance boost for network and disk I/O on Microsoft Windows guests running in a virtual environment on Oracle VM x86 Servers.

  Oracle VM 3.4 SVVP Certification  Oracle has been a part of the Microsoft Server Virtualization Validation Program (SVVP) and previously certified Oracle VM 3.4 with Windows 2008 and 2012.  The Oracle...

Oracle VM Server for SPARC

Oracle VM Server for SPARC 3.6 Released

We are pleased to announce the release of Oracle VM Server for SPARC 3.6. This new release is integrated with Oracle Solaris 11.4 and provides new and enhanced features. These include The new 'ldmconsole' command, which simplifies secure access to guest domain virtual consoles. Improved Time Of Day clock handling, for consistent clock values over live migration. The virtual SCSI Host Bus Adapter (vHBA) feature is enhanced to provide device masking, which lets administrators configure a virtual Storage Area Network (vSAN) device with an explicit set of SCSI devices. Virtual networking enhancements, notably DLMP (Datalink Multipathing) aggregation support for virtual network devices, and improved network visibility Improved SR-IOV feature to create multiple Virtual Functions (VFs) and name them in the same command. Enhanced 'ovmtutils' template utilities Removal of support for MAU (Modular Arithmetic Unit) for old T1-T3 servers that are no longer supported, and removal of ldm power management For additional resources about Oracle VM Server for SPARC Learn What's New Review the Oracle VM Server for SPARC white papers Download Oracle VM Server for SPARC Attend the training course offered by Oracle University: Oracle VM Server for SPARC: Installation and Configuration

We are pleased to announce the release of Oracle VM Server for SPARC 3.6. This new release is integrated with Oracle Solaris 11.4 and provides new and enhanced features. These include The new 'ldmcons...

Announcements

Announcing Oracle VM 3.4.5 on Oracle Cloud Infrastructure

We are proud to announce the availability of Oracle VM 3.4.5 in Oracle Cloud Infrastructure. Oracle VM makes enterprise applications easier to deploy, manage, and support. Backed worldwide by affordable enterprise-quality support for both Oracle and non-Oracle environments, Oracle VM reduces operations and support costs while increasing IT efficiency and agility. Oracle VM 3.4.5 introduces the following enhancements for Oracle Cloud Infrastructure: Support for Oracle Cloud Infrastructure File Storage service Support for the new generation Compute Nodes like "BM.Standard2.52 and BM.DenseIO2.52" Image availability in London Region and, at the same time, delivers numerous bug fixes, security fixes, and product enhancements. Details on the updated Oracle VM Server and Manager OCI images are available in the "Oracle VM Requirements and Installation guide." Oracle VM offers a certified virtualization solution for your workloads that: Enables rapid enterprise application deployment, such as Oracle Database, Middleware, and Applications, as well as many non-Oracle applications. Supports the latest Oracle Linux, Microsoft Windows (Oracle VM is also part of Microsoft SVVP), Oracle Solaris, and many other Linux distributions. Applies existing Oracle VM on-premises knowledge, practices, tools, and support to Oracle Cloud Infrastructure deployments. Easily migrates workloads from on-premises to Oracle Cloud Infrastructure. Oracle VM images are available in all Oracle Cloud Infrastructure regions including Phoenix, Ashburn, Frankfurt, and London. If you have any questions about Oracle VM in Oracle Cloud Infrastructure, please contact us at oraclevm-oci-info_ww_grp@oracle.com.

We are proud to announce the availability of Oracle VM 3.4.5 in Oracle Cloud Infrastructure. Oracle VM makes enterprise applications easier to deploy, manage, and support. Backed worldwide by...

Oracle VM Server for SPARC

Oracle VM Server for SPARC 3.6 - virtual HBA (vHBA) Device Masking

Oracle VM Server for SPARC developer Andrew Rutz contributed this post. Background Oracle VM Server for SPARC provides the virtual SCSI Host Bus Adapter (vHBA) subsystem which permits guest domains to address virtual SANs (vSAN) and pass SCSI I/O requests to physical SCSI HBA drivers that execute in the service domain. A vHBA can recognize any SCSI device type such as disk, CD, DVD, or tape, and use full Solaris device capabilities. This offers functional improvement over the traditional virtual disk (vdisk). It also reduces the number of commands needed to configure virtual devices, and reduces the number of logical domain channels (LDC) needed. Requirements The vHBA feature is available with the Oracle Solaris 11.3 OS. Control, service, and guest domains should run at least Oracle Solaris 11.3 SRU 23. The new features described in this post require Solaris 11.4 public beta refresh 2, which includes Oracle VM Server for SPARC 3.6. vHBA Device Masking Oracle VM Server for SPARC 3.6 extends the virtual SCSI Host Bus Adapter (vHBA) subsystem by enabling the administrator to configure a virtual Storage Area Network (vSAN) device to have an explicit set of SCSI device(s).  This provides administrator control over the devices visible to the guest domain while providing full vHBA functionality. The new implementation is backward compatible so the default arguments to the add-vsan command produce the same, historical behavior in which all SCSI devices reachable from the specified SCSI Initiator Port (iport) will be members of the vSAN. Oracle VM Server for SPARC 3.6 adds or modifies five ldm(8) commands in order to create a per-vSAN device mask, where each mask member is the worldwide number (WWN) of a SCSI device reachable from the vSAN's iport.  The vhba instance associated with the vSAN device has access to only those devices in the mask. This feature enables Oracle VM Server for SPARC 3.6 guest domains to have customer-driven access-control at a per-SCSI-device granularity.  Note that this feature does not prevent a specific SCSI device from being a member of one or more vSANs.  Also, devices can be dynamically added and removed from the vSAN's mask.  Completion of outstanding I/O requests is synchronized with changes to mask membership.  Lastly, Oracle Solaris Multipathing interacts as expected with this feature such that all paths that reference the specified SCSI devices will be used to access the vSAN's devices. Summary With Oracle VM Server for SPARC 3.6, introduced with Oracle Solaris 11.4 beta, the vHBA function is enhanced to permit individual device masking, providing operational control of which devices guest domains can access on their virtual SANs, while compatibly retaining the functional benefits provided by vHBA.

Oracle VM Server for SPARC developer Andrew Rutz contributed this post. Background Oracle VM Server for SPARC provides the virtual SCSI Host Bus Adapter (vHBA) subsystem which permits guest domains to...

Oracle VM Server for SPARC

Oracle VM Server for SPARC 3.6 features - improved network statistics visibility

Oracle VM Server for SPARC developer Lidong Chen contributed this post describing enhanced functionality. ldm list-netstat command shows network statistics for multiple domains Oracle VM Server for SPARC 3.6 enhances the 'ldm list-netstat'  command to show network statistics display for multiple guest domains. This enables you to view network statistics for specified guest domains in the system with a single command, which improves visibility of virtual network device activity. Requirements To use this command, the guest domains must run at least Oracle Solaris 11.2 SRU1, and the control domain must run Oracle Solaris 11.4, now in public open beta. Usage ldm list-netstat [-p] [-u R|K|M|G] [-t <interval>] [-c <count>][-o <net-device>] [<ldom>....] Examples: Show network statistics for the primary and ldg5 domains every two seconds. Statistics are output every two seconds until you issue Ctrl-C.. # ldm list-netstat –t 2 primary ldg5   Show network statistics for the ldg5 and ldg6 domains every second five times. # ldm list-netstat -t 1 -c 5 ldg5 ldg6   Show network statistics for net1 on the ldg5 and ldg6 domains every second 3 times. # ldm list-netstat –t 1 –c 3 –o net1 ldg5 ldg6   Show parseable network statistics for net1 on the primary and ldg6 domains every second 10 times. # ldm list-netstat –p –t 1 –c 10 net1 primary ldg6 An example showing network activity between two domains: primary $ ldm list-netstat  ldg1 ldg2 DOMAIN ldg1 NAME               IPACKETS     RBYTES       OPACKETS     OBYTES       ----               --------     ------       --------     ------       net0               280.06K      18.48M       1.06M        7.41G        ------------------------------------------------------------------------------ DOMAIN ldg2 NAME               IPACKETS     RBYTES       OPACKETS     OBYTES       ----               --------     ------       --------     ------       net0               1.06M        7.39G        279.00K      18.41M Summary This new feature can be used to display virtual network activity for multiple domains, improving system visibility in Oracle VM Server for SPARC.    

Oracle VM Server for SPARC developer Lidong Chen contributed this post describing enhanced functionality. ldm list-netstat command shows network statistics for multiple domains Oracle VM Server for...

Oracle VM Server for SPARC

Oracle VM Server for SPARC 3.6 features - DLMP aggregation on virtual networks

Oracle VM Server for SPARC developer Lidong Chen contributed this post describing enhanced functionality. DLMP Over a Virtual Network The Oracle VM Server for SPARC 3.6 software supports datalink multipathing (DLMP) aggregation over virtual network devices. Previously, this feature was only available for physical network devices. DLMP aggregation is similar to IP multipathing (IPMP). Both provide high-availability (HA) for network connections. While IPMP manages IP addresses on a set of network interfaces, DLMP manages the virtual NICs. DLMP provides high-availability capabilities that enable network connections to remain up even when a service domain becomes unavailable due to a reboot or a panic. With this new release, DLMP is available over virtual network devices, so physical devices can be more efficiently shared, and the guest domains can be live migrated to other hosts. For details on advantages of DLMP aggregation, see Managing Network Datalinks in Oracle Solaris 11.4. DLMP aggregation over virtual network devices has the following limitations: A DLMP aggregation is not operable if one of the connected virtual switches is configured over an Ethernet stub. The underlying physical device of each connected virtual switch (as specified by the net-dev property) must have the same link speed. Configure a High-Availability DLMP Aggregation To configure DLMP aggregation over virtual network devices on a domain, the service domain and the guest domain must run Oracle Solaris 11.4. Before configuring a DLMP aggregation on a domain, the virtual network devices must have the linkprop property set to phys-state and the custom property set to enable. The following example shows how to configure a HA DLMP aggregation on the ldg6 domain. In this example, DLMP aggregation is configured on top of two virtual switches. primary-vsw0 is on the primary domain  and ldg5-vsw0 is on the ldg5 domain. Note that the shell prompt indicates the domain in which to run the commands: primary# for the primary domain ldg5# for the second service domain ldg5 ldg6# for the guest domain ldg6 on which the DLMP aggregation is configured. domain# for an external host. Ensure that the underlying physical device of each virtual switch has the same link speed. net0 and net2 are the underlying physical device of the primary-vsw0 and ldg5-vsw0 virtual switches, respectively. primary# dladm show-phys  net0 LINK            MEDIA         STATE  SPEED  DUPLEX    DEVICE net0            Ethernet      up         1000      full            igb0 ldg5# dladm show-phys net2 LINK            MEDIA         STATE   SPEED  DUPLEX    DEVICE net2            Ethernet      up          1000       full            igb2 Determine which virtual network devices to use. In this example, the DLMP aggregation is configured over net0 and net1 on the ldg6 domain. net0 and net1 are the Oracle Solaris 11 vanity names for the vnet6 and vnet1 virtual network devices. vnet6 connects to primary-vsw0 and vnet1 connects to ldg5-vsw0. primary# ldm list-netdev ldg6 NAME    CLASS    MEDIA   STATE    SPEED  OVER     LOC            ----          -----        -----        -----        -----        ----         ---            net0       VNET     ETHER    up          1G         vnet0    primary-vsw0/vnet6 net1       VNET     ETHER    up          1G         vnet1    ldg5-vsw0/vnet1 ldg6# dladm show-phys LINK            MEDIA         STATE    SPEED  DUPLEX    DEVICE net0            Ethernet      up          1000       full            vnet0 net1            Ethernet      up          1000       full            vnet1 Ensure that the virtual network devices for DLMP aggregation have the custom property set to enable and the linkprop property set to phys-state.      primary# ldm list –o network ldg6 NETWORK     NAME         SERVICE                      MACADDRESS          PVID|PVLAN|VIDs     ----               -------                          -------------------          -----------------------     vnet6        primary-vsw0@primary   00:14:4f:f9:cf:47      1|--|--                  DEVICE        :network@0         ID         :0                          LINKPROP   :phys-state        MTU    :1500                       MAXBW      :--                        MODE :--                         CUSTOM     :enable                     MAX-CUSTOM-MACS:4096        MAX-CUSTOM-VLANS:4096             …     NAME        SERVICE                    MACADDRESS          PVID|PVLAN|VIDs     ----            ------------                    -------------------          ----------------------     vnet1        ldg5-vsw0@ldg5         00:14:4f:fb:f5:33         1|--|--                  DEVICE        :network@1     ID        :1                          LINKPROP   :phys-state       MTU    :1500                       MAXBW        :--                    MODE :--                         CUSTOM     :enable                     MAX-CUSTOM-MACS:4096        MAX-CUSTOM-VLANS:4096 Configure the DLMP aggregation. Note: Ensure that the net0 and net1 datalinks that are configured into the DLMP aggregation do not have any IP interface configured over them ldg6# dladm  create-aggr -m dlmp -l net0 -l net1 aggr0 Configure an IP address for the DLMP aggregation. ldg6# ipadm create-ip aggr0 ldg6# ipadm create-addr –T dhcp aggr0/v4 Verify the DLMP configuration. ldg6# dladm show-aggr aggr0    LINK              MODE  POLICY   ADDRPOLICY      LACPACTIVITY  LACPTIMER aggr0             dlmp    --             --                          --                         -- ldg6# dladm show-aggr –x LINK      PORT       SPEED    DUPLEX   STATE     ADDRESS             PORTSTATE aggr0     --             1000Mb    full           up          2:8:20:88:84:ba      --               net0         1000Mb    full           up          0:14:4f:f9:cf:47     attached               net1         1000Mb    full           up          0:14:4f:fb:f5:33     attached Enable probe-based failure detection for the DLMP aggregation. ldg6# dladm set-linkprop  -p  probe-ip=+  aggr0 Verify the detailed probe information about the DLMP aggregation. ldg6# dladm show-aggr –nS LINK       PORT           FLAGS    STATE   TARGETS      XTARGETS aggr0      net0             u--3         active     10.129.68.1    net1 --             net1            u-2-         active      --                    net0 ldg6# ipadm NAME               CLASS/TYPE  STATE     UNDER      ADDR aggr0                 ip                   ok             --                --       aggr0/v4     dhcp              ok            --               10.129.71.230/22 Confirm that the DLMP aggregation on the ldg6 domain provides HA capability for the domain. Reboot one of the service domains and confirm that the ldg6 guest domain network connection remains up by pinging ldg6 via the DLMP interface. In this example, the rebooted service domain is the primary domain. primary# reboot domain# ping 10.129.71.230 10.129.71.230 is alive At this point, DLMP aggregation is successfully configured on the ldg6 domain and provides HA capability for the domain. Summary This new feature of Oracle VM Server for SPARC permits datalink multipathing (DLMP) in guest domains, using virtual network devices. This provides improved network availability for virtual network devices, increases ability to share physical devices, and permits flexibility for domain configuration and migration.

Oracle VM Server for SPARC developer Lidong Chen contributed this post describing enhanced functionality. DLMP Over a Virtual Network The Oracle VM Server for SPARC 3.6 software supports datalink...

Oracle VM Server for SPARC

Oracle VM Server for SPARC 3.6 features - connecting to domain consoles with ldmconsole

Oracle VM Server for SPARC developer Dawn Tse contributed this post describing enhanced functionality. Background Oracle VM Server for SPARC (informally called Logical Domains) lets an administrator log into guest domain consoles by logging into the server's control domain and issuing 'telnet localhost <portnumber>' where the domain console port number is obtained by issuing the 'ldm list' command. This is secure, since login to the control domain is done via ssh and no traffic is in clear text, but requires an additional step. Oracle VM Server for SPARC 3.6 addresses this with a convenient new command. ldmconsole In addition to the telnet command, the Oracle Solaris 11.4 OS includes the new 'ldmconsole' command to connect by name to an Oracle VM Server for SPARC console on non-primary domains, or to a console group. You do not need to install the telnet command to use the ldmconsole command, and the ldmconsole command does not have the security issues that misuse of the telnet command potentially has. The following ldmconsole command connects to the console of the ldg1 domain: primary# ldmconsole ldg1 Connecting to console "ldg1" in group "ldg1" .... Press ~? for control options .. ldg1 console login:   Use the keyboard sequence "~." to exit. Also, use the ldmconsole command to list available domain consoles and console groups. The following command shows how to list the available console groups and domain consoles: primary# ldmconsole GROUP DOMAINS ldg1 ldg1 ldg2 ldg2   See the ldmconsole(8) and the vntsd (8) man pages for detailed information. Summary The new ldmconsole command provides convenience for domain administrators on Oracle VM Server for SPARC, by permitting simpler and secure access to their domain consoles.    

Oracle VM Server for SPARC developer Dawn Tse contributed this post describing enhanced functionality. Background Oracle VM Server for SPARC (informally called Logical Domains) lets an administrator log...

Oracle VM Server for SPARC

Oracle VM Server for SPARC 3.6 in Oracle Solaris 11.4 Open Beta refresh 2

Oracle has just released Solaris 11.4 Open Beta Release refresh 2, described here. The beta refresh includes Oracle VM Server for SPARC 3.6, which provides improved functionality over the current release by adding: The new 'ldmconsole' command, which simplifies secure access to guest domain virtual consoles. Improved Time Of Day clock handling, to provide consistent clock values over live migration by adjusting for migration and suspend times. The virtual SCSI Host Bus Adapter (vHBA) feature is enhanced to provide device masking, which enables the administrator to configure a virtual Storage Area Network (vSAN) device with an explicit set of SCSI devices. This provides better control of domain visibility to virtual SAN devices, while maintaining compatibility and full access to device features. Virtual networking enhancements: DLMP (Datalink Multipathing) aggregation support for virtual network devices. DLMP aggregations allow failover between multiple switches without requiring vendor-proprietary extensions, and improve performance and resilience for guest domain networking Improved visibility in the 'ldm list netstat' command Improved SR-IOV feature to both create multiple Virtual Functions (VFs) and name them in the same command. Enhanced 'ovmtutils' template utilities, deprecates SHA-1 in 'ovmtcreate' command, supports multiple encryption algorithms in the same template, and permits clearing domain properties in 'ovmtconfig' command. Removal of support for MAU (Modular Arithmetic Unit) for old T1-T3 servers that are no longer supported. Removal of ldm power management Several of these items will be described in detail in followup blogs that will be published in the next few days. Watch this space!  

Oracle has just released Solaris 11.4 Open Beta Release refresh 2, described here. The beta refresh includes Oracle VM Server for SPARC 3.6, which provides improved functionality over the current...

Announcements

Oracle VM 3 Premier Support extended to March 2021

Oracle VM 3 Premier Support extended to March 2021  To give customers more flexibility and time to take advantage of the latest features offered with Oracle VM 3.4, Oracle has extended the Premier Support end date for Oracle VM Release 3 to March 2021. Oracle VM 3 was introduced in August 2011 with a standard eight year lifecycle that set the Premier Support end date at August 2019.  A number of minor releases (3.1, 3.2, 3.3, 3.4) have been delivered since, each delivering new features and updates to support customer growth and reduce operational expenses. In March 2016, Oracle VM 3.4 was released as the latest minor version in the Oracle VM 3 program.  The stability and features in this release made it among the fastest to be upgraded to and deployed by enterprise customers, Oracle engineered systems and cloud providers, which prompted the support extension.  Available since June 2018, Oracle VM 3.4.5 is the most current release. The new Oracle VM 3 Premier Support timeline can be found in either of the following documents: Lifetime Support Policy: Coverage for Oracle Linux and Oracle VM Oracle Lifetime Support Policy: Oracle and Sun System Software Both of these documents reference the new Oracle VM 3 Premier Support end date: The Oracle VM team will continue to deliver update releases, bug fixes and security patches for the 3.4 release for the duration of the Oracle VM 3 Premier Support timeline.  Customers running an older minor release (e.g. 3.2.11 or 3.3.5) are encouraged to upgrade to 3.4 to take advantage of the updates and patches that will be delivered. Oracle VM Software Download  Oracle VM and all product updates can be downloaded, used, and distributed free of charge. Instructions to download Oracle VM and the product utilities can be found on the Oracle Technology Network. Additional Oracle VM Information Oracle VM continues to deliver leading performance, scalability, and reliability to support enterprise applications.  Oracle VM is engineered for an open cloud infrastructure and is the foundation supporting many SaaS and PaaS workloads in public and private clouds.  For the latest product information, best practices white papers and webinars, please visit http://oracle.com/virtualization. The latest education and training information for Oracle VM can be found on the recent blog: https://blogs.oracle.com/virtualization/learn-how-oracle-vm-is-a-key-part-of-your-it-infrastructure Oracle VM Support offers access to award-winning Oracle support resources and virtualization support specialists, zero-downtime updates using Ksplice, additional management tools such as Oracle Enterprise Manager, and lifetime support, all at a low cost.

Oracle VM 3 Premier Support extended to March 2021  To give customers more flexibility and time to take advantage of the latest features offered with Oracle VM 3.4, Oracle has extended the Premier...

Enhanced Oracle Fabric Interconnect Switch (Xsigo) monitoring for the Private Cloud Appliance with Enterprise Manager 13.3

The Oracle Enterprise Manager 13.3 release provides enhanced monitoring for the Oracle Fabric Interconnect switches within the Private Cloud Appliance (PCA). These new monitoring features are: Cumulative fabric performance Managed devices Discovered PCA compute nodes Configured IO templates Network and storage clouds Alarms tracked by the Oracle Fabric Manager (OFM) To view this enhanced information select the Fabric Interconnect Target from the All Targets Menu or click on the Fabric Interconnects on the PCA target Navigation tree. The following regions are enhanced: Summary The summary section of the Fabric Interconnect home page lists the current Oracle Fabric Manager's status and version, and the high availability mode. Oracle Fabric Manager supports high availability mode, in which multiple Fabric Manager servers are associated with each other to provide a system of Fabric Manager servers that operate in active or passive roles. Cumulative Performance When vNICs and vHBAs are configured and deployed on the PCA compute nodes it can be seen in the graph of the network and storage total throughput. Devices Information about the Oracle Fabric Interconnect chassis and the Oracle Software Defined Networking (SDN) that are managed through the Oracle Fabric Manager is displayed in the Fabric Interconnect home page. The Devices table displays the host name of each managed device, the device IP address, the software version currently installed on each managed device, the current state of the managed device and the model of the device. Servers Oracle Fabric Manager discovers servers that are connected through the devices and have Oracle Virtual Networking Drivers installed. This table lists the host name of each PCA compute node that Oracle Fabric Manager has discovered, the operating system currently in use, the name of the I/O profile and the total number of vNICs and vHBAs that are configured. I/O Templates When I/O templates are configured, they are listed in the Fabric Interconnect home page regardless of whether they are deployed to a PCA compute node or not. This table lists the name of each configured I/O template, the total number of vNICs and vHBAs configured in each I/O template, and the description that was applied to the I/O template. For PCA we currently do not use I/O templates, however added for completeness. Network Clouds Information about the Private Virtual Interconnect (PVI) clouds is displayed. This table lists the name of each configured cloud, the number of Ethernet ports, and link aggregation groups (LAGs) in the cloud. Currently PCA does not support LAG’s. However added for completeness. Storage Clouds Information about the configured storage clouds is displayed. This table lists the name of each configured cloud, and the number of Fibre Channel ports in the storage cloud. Alarms The Oracle Fabric Interconnect target monitors system events and network management alarms tracked by the Oracle Fabric Manager. The alarms shown in the Fabric Interconnect home page are of one of the following severities: Critical Major Minor Warning To view critical, major, minor, and warning alarms go to the Oracle Fabric Interconnect's All Metrics page, and select the Alarms metric. Critical alarms are displayed in the Incidents and Problems section of the Fabric Interconnect home page. Major, warning and minor alarms can also appear on the Incidents and Problems section, if the user activates a rule for this purpose. To enable this enhanced monitoring the following high level steps are required: Upgrade the Oracle Enterprise Manager server (OMS) to version 13.3 Via the Enterprise Manager OMS UI enable a blackout state for both Oracle Fabric Interconnect Switches via their home pages (available via the PCA rack home page) On the PCA active management node upgrade the EM agent to EM 13.3 Run the pre-requisite steps described in the documentation: Download and add the Oracle Fabric Manager (OFM) plugin Import the OFM certificate into the PCA active management node agent keystore Re-discover the Fabric Interconnect Targets by following the steps in the PCA Rack Discovery documentation. Once the Fabric Interconnect Targets are discovered promote them via the discovery process. Remove the blackout state for the Fabric Interconnect targets For further information on Oracle Enterprise Manager 13.3 refer here, and for further information on the Oracle Private Cloud Appliance 2.3 refer here.

The Oracle Enterprise Manager 13.3 release provides enhanced monitoring for the Oracle Fabric Interconnect switches within the Private Cloud Appliance (PCA). These new monitoring features are: Cumulative...

Announcements

Latest Oracle VM software available on OSDC

Download the latest Oracle VM software from the Oracle Software Delivery Cloud We recently announced the availability of the Oracle VM 3.4.5 release.  This is the latest Oracle VM release delivering leading performance, scalability, and reliability for enterprise SaaS and PaaS workloads as well as traditional enterprise applications. Oracle VM Software Downloads The Oracle VM 3.4.5 software downloads have been available on My Oracle Support, the Unbreakable Linux Network (ULN), the Oracle Linux Yum Server or the Oracle Technology Network.  Details on the download locations and patch versions can be found in the Oracle VM 3.4.5 download blog. The Oracle VM 3.4.5 release can now also be found on the Oracle Software Delivery Cloud. To download this latest version, connect to OSDC at https://edelivery.oracle.com/osdc/faces/SoftwareDelivery, search "Oracle VM Server 3.4.5" and add the package to your cart.  The media kit contains the Oracle VM Manager, Oracle VM Server for x86 and the Oracle VM SPARC Agent.  And as an added bonus, the latest Oracle VM Windows PV Driver 3.4.3 is also part of the media kit.  Download the kit today and take advantage of the latest software releases from the Oracle VM team. Additional Oracle VM Information Oracle VM Server virtualization software is engineered for open cloud infrastructure.  For the latest product information, best practices white papers and webinars, please visit http://oracle.com/virtualization. The latest education and training information for Oracle VM can be found on the recent blog here: https://blogs.oracle.com/virtualization/learn-how-oracle-vm-is-a-key-part-of-your-it-infrastructure

Download the latest Oracle VM software from the Oracle Software Delivery Cloud We recently announced the availability of the Oracle VM 3.4.5 release.  This is the latest Oracle VM release delivering...

Announcements

Oracle VM 3.4.5 Downloads

Where to download Oracle VM 3.4.5 Last week we announced the availability of the Oracle VM 3.4.5 release.  This is the latest Oracle VM release delivering leading performance, scalability, and reliability for enterprise SaaS and PaaS workloads as well as traditional enterprise applications.  Information on the new features offered with this release can be found in the release announcement blog:  https://blogs.oracle.com/virtualization/oracle-vm-release-345-is-now-available Oracle VM Software Downloads Customers with an Oracle support plan covering Oracle VM may download the 3.4.5 release from My Oracle Support or the Unbreakable Linux Network (ULN): Download Oracle VM 3.4.5 from My Oracle Support Oracle VM Server ISO, search patch ID 22902487 Oracle VM Manager Installer ISO, search patch ID 22902502 Oracle VM Agent for SPARC, search patch ID 22902518 Download Oracle VM 3.4.5 Server Updates from Oracle Unbreakable Linux Network All customers may download Oracle VM 3.4.5 from the Oracle Technology Network, Oracle Linux Yum Server or the Oracle Software Delivery Cloud: Download Oracle VM 3.4.5 from Oracle Technology Network Download Oracle VM 3.4.5 Server Updates from Oracle Linux Yum Server Download Oracle VM Server for x86 and Oracle VM Manager from Oracle Software Delivery Cloud (3.4.5 uploads pending - blog will be updated when completed) Additional Oracle VM Information Oracle VM Server virtualization software is engineered for open cloud infrastructure.  For the latest product information, best practices white papers and webinars, please visit http://oracle.com/virtualization. The latest education and training information for Oracle VM can be found on the recent blog here: https://blogs.oracle.com/virtualization/learn-how-oracle-vm-is-a-key-part-of-your-it-infrastructure

Where to download Oracle VM 3.4.5 Last week we announced the availability of the Oracle VM 3.4.5 release.  This is the latest Oracle VM release delivering leading performance, scalability, and...

Announcing Oracle VM 3.4.5 certification with Oracle Enterprise Manager 13c

We are pleased to announce that Oracle VM 3.4.5 is certified with Oracle Enterprise Manager 13c release 13.2PG.  This enables the discovery, monitoring and management of Oracle VM 3.4.5 with this release.  The Oracle Enterprise Manager 13c 13.2PG release denotes the use of the latest Enterprise Manager VT (Virtualization) plug-in which is version 13.2.3. The following Oracle Enterprise Manager 13c patches are recommended and have been tested for use with Oracle VM 3.4.5; use the various patch readme files for further information. For the Enterprise Manager Server (OMS): - 6880880 - Opatch Version 13.9.3.2.0 for EMCC 13.x - 19999993 – OMSPatcher patch of version 13.8.0.0.2 for EMCC 13.2.0.0.0 - 27612395 – EMBP Patch Set Update (PSU) 13.2.0.0.180417 - 27807486 – Enterprise manager for oms plugins 13.2.3.0.180430 For the Oracle VM Manager Host Enterprise Manager Agent: - 6880880 - Opatch Version 13.9.3.2.0 for EMCC 13.x - 27585167  - EM-Agent agent bundle patch 13.2.0.0.180331 - 28195767 -  EM VT plugin Monitoring patch 13.2.3.0.180630 (agent monitoring) - 27110236 -  EM VT Plugin Discovery patch 13.2.3.0.171130 (agent discovery)   High level steps for an upgrade to Oracle VM 3.4.5 with Enterprise Manager 13c 13.2: 1. Check and if needed upgrade the Enterprise Manager Server (OMS) VT (Virtualization) plug-in to version 13.2.3 2. Check and if needed install the patches for the Enterprise Manager Server (OMS) as listed above 3. Check and if needed install the patches for the Oracle VM Manager Enterprise Manager Agent as listed above (leave the Enterprise Manager Agent stopped after the patch install) 4. Upgrade the Oracle VM Manager to version 3.4.5 using this documentation 5. Start the Oracle VM Manager Enterprise Manager Agent Oracle VM is monitored and managed with Oracle Enterprise Manager using this documentation from the Oracle Enterprise Manager Cloud Control Administration Guide. For further information on the exciting new features of Oracle VM 3.4.5 please refer here. For further information on Enterprise Manager 13c please refer here.  

We are pleased to announce that Oracle VM 3.4.5 is certified with Oracle Enterprise Manager 13c release 13.2PG.  This enables the discovery, monitoring and management of Oracle VM 3.4.5 with this...

Announcements

Oracle VM release 3.4.5 is now available!

Announcing Oracle VM release 3.4.5  Oracle VM Server virtualization software is engineered for open cloud infrastructure and delivers leading performance, scalability, and reliability for enterprise SaaS and PaaS workloads as well as traditional enterprise applications.  Today, we are pleased to announce Oracle VM release 3.4.5. What's New with Oracle VM release 3.4.5? Oracle VM release 3.4.5 offers updated versions of the Oracle VM Manager, Oracle VM Server for x86, and Oracle VM Agent for SPARC, delivering performance improvements, security updates, and cumulative bug fixes since the previous 3.4.4 release. The notable enhancements and updates with this release are: Support for Hybrid Columnar Compression (HCC) for better Oracle Database performance — Hybrid Columnar Compression is an Oracle Database compression technology that enables the highest levels of data compression and provides cost savings and performance improvements due to reduced I/O. As of this release, Oracle VM provides support for Hybrid Columnar Compression on Oracle Database Release 18c with Oracle ZFS Storage Appliance and Oracle FS1 Series Flash Storage Systems. A new Fiber Channel storage refresh option with Oracle generic storage plugin deployments — In addition to the Loop Initialization Protocol (LIP) scan done in previous releases, a new soft scan option is offered which can result in faster refresh times for storage arrays. A new Balance Server start policy to complement the Best Server policy — With the Balance Server policy, virtual machines can be started on the best available Oracle VM Server, as determined by CPU and memory utilization, to help ensure an even distribution amongst all Oracle VM Servers in the server pool. Increased performance for Microsoft Windows guest operating systems — This release provides the ability to enable the exposure of Windows virtualization (also referred to as viridian) compatible entitlements to Microsoft Windows guest operating systems. Enabling viridian support is strongly recommended to improve performance for Microsoft Windows guest operating systems. Support for TLS1.2 as the default connectivity protocol — Oracle VM Manager uses the TLSv1.2 protocol for all connections for enhanced security protection. Update to the dom0 kernel — The dom0 kernel for Oracle VM Server is updated to the Unbreakable Enterprise Kernel (UEK) Release 4 Update 7. This updated kernel adds support for new hardware drivers, as well as additional security and bug fixes. Additional information on this version of UEK can be found in the Unbreakable Enterprise Kernel Release 4 Update 7 Release Notes. Updated Xen hypervisor — The Xen hypervisor used in the Oracle VM x86 Server has been updated for additional performance and scalability. Security and patch updates for Oracle VM Manager components — Oracle WebLogic Server, Oracle Application Development Framework, MySQL, Java SE Development Kit (JDK) and many of the open source software products used in Oracle VM Manager have been updated. Security and patch updates for Oracle VM Server for x86 packages — All user space packages have been updated to mirror the versions delivered in Oracle Linux 6 Update 9. In addition, some of the packages have had incremental updates to deliver new features or bug fixes. A full summary of the updates and enhancements available in Oracle VM 3.4.5 can be found in the Oracle VM Release Notes for 3.4.5. Oracle VM Software Download  Oracle VM can be downloaded, used and distributed free of charge, and all updates and errata are freely available. Instructions to download the Oracle VM Release 3.4.5, Oracle VM Windows PV drivers, tools, and utilities can be found on the Oracle Technology Network. Oracle VM Support Oracle VM Support offers access to award-winning Oracle support resources and virtualization support specialists, zero-downtime updates using Ksplice, additional management tools such as Oracle Enterprise Manager, and lifetime support, all at a low cost. Additional Oracle VM Information For the latest product information, best practices white papers and webinars, please visit http://oracle.com/virtualization. The latest education and training information for Oracle VM can be found on the recent blog here: https://blogs.oracle.com/virtualization/learn-how-oracle-vm-is-a-key-part-of-your-it-infrastructure

Announcing Oracle VM release 3.4.5  Oracle VM Server virtualization software is engineered for open cloud infrastructure and delivers leading performance, scalability, and reliability for enterprise...

Announcements

Hitachi Certifies New Storage Arrays with Oracle VM

      Several new Hitachi Vantara hybrid and all-flash storage arrays have been qualified on Oracle VM. Adding to the extensive list of hardware and storage certifications Hitachi has delivered as part of the Oracle HCL program, these new Hitachi Virtual Storage Platform (VSP) certifications help provide mutual customers with added choice to meet the varying demands of on premises and cloud deployments. The new Hitachi VSP models focus on enhanced resiliency. Highlights of the new arrays include additional and faster processors and memory, improved flash design, more IOPS and lower latency. They scale further with more capacity, consolidate more operations, and provide more support for containers. The latest certifications by Hitachi for Oracle VM include: Hitachi Virtual Storage Platform G Series models: G350, G370, G700, G900 Offering reliability and operational simplicity that delivers data faster, these hybrid flash-powered cloud platforms provide superior value for applications. Hitachi Virtual Storage Platform F Series models: F350, F370, F700, F900 Accelerating delivery of applications with flash performance, virtually penalty-free compression and faster response times, these all-flash arrays help speed workloads with robust, automated data management and protection. To learn more, visit: Hitachi VSP G Series Hitachi VSP F Series  

      Several new Hitachi Vantara hybrid and all-flash storage arrays have been qualified on Oracle VM. Adding to the extensive list of hardware and storage certifications Hitachi has delivered as part of...

Upgrade to Oracle Private Cloud Appliance 2.3.3 from 2.3.2 with Oracle Enterprise Manager 13.2

Recently we announced the Oracle Private Cloud Appliance (PCA) software 2.3.3 release which adds support for an enhancement to the internal Oracle ZFS Storage Appliance to model ZS5-ES. The high level steps for the PCA 2.3.2 to 2.3.3 upgrade including the PCA are as follows. If your PCA is not 2.3.1 or 2.3.2 then refer to My Oracle Support note 2242177.1 which includes steps for Oracle Enterprise Manager. - Update the required Enterprise Manager Plug-ins to latest available - Install patches on the Enterprise Manager 13.2 Server (OMS) and agents - Backup the oraInventory - Move the PCA to a blackout state - Upgrade PCA to 2.3.3 - Recover the PCA management node agent - Remove the blackout state Step 1: If needed, update the required Enteprise Manager Plug-ins The following plug-ins should be at the following versions: Virtualization (VT) 13.2.3 or later, Cloud Framework (CFW) 13.2.2 or later, Systems Infrastructure (SI) 13.2.3 or later  and Oracle Cloud Application (SSA) 13.2.2 or later. To check the current versions go to Setup > Extensibility > Plugins Expose the Server folder and for example look for the SI plugin: The Blue icon in this example tells us there is a later version of the plugin available. To download this latest version follow the documentation which is here. Check the versions of the VT, CFW and SSA plug-in and if required update to the latest version. With the SI plug-in upgrade for example, down time is required for the Oracle Enterprise Manager server (OMS). Step 2: If needed, install patches on the Oracle Enterprise Manger 13.2 Server (OMS) and PCA management node agent: Enterprise Manager has the concept of PSU’s (Patch Set Update), plugin patches and agent patches. From My Oracle Support (MOS) use the following document to determine the version of your Enterprise Manager environment: Doc ID 2319892.1 EM 13c: How to Determine the Patch Set Update (PSU) Applied to the Enterprise Manager 13c Cloud Control OMS and the Bundle Patch applied to Plug-ins and Agent. This document also refers to a master document: Master Note for Enterprise Manager Proactive Patch Program Doc ID 822485.1 which has links to documents for the latest PSU (Patch Set Update), agent and plugin patches. Oracle recommend that the Oracle Enterprise Manager Server (OMS) and Agents are at the latest PSU, plugin and agent patches. For the agent patches it is recommended to deploy any bundle, plugin, discovery and monitoring patches. The following patches are recommended and have been tested for use with PCA 2.3.3. Use the various patch readme files for further information. For the Enterprise Manager Server (OMS): - 6880880 - Opatch Version 13.9.3.2.0 for EMCC 13.x - 19999993 – OMSPatcher patch of version 13.8.0.0.2 for EMCC 13.2.0.0.0 - 27612395 – EMBP Patch Set Update (PSU) 13.2.0.0.180417 - 27807486 – Enterprise manager for oms plugins 13.2.3.0.180430 For the PCA Management Agent: - 6880880 - Opatch Version 13.9.3.2.0 for EMCC 13.x - 27585167  - EM-Agent agent bundle patch 13.2.0.0.180331 - 27664097  - EM VT Plugin bundle patch 13.2.3.0.180331 (agent monitoring) - 27110236 -  EM VT Plugin Discovery patch 13.2.3.0.171130 (agent discovery) Step 3: Backup the Oracle inventory: The first step is to take a backup of the PCA management node agent oraInventory. The Oracle Inventory directory (oraInventory) stores an inventory of all software installed on the system. It is required and shared by all Oracle software installations on a single system. Firstly, as the root user ssh into the active management VIP (Virtual IP Address) and confirm we are on the active management node: [root@ovcamn06r1 ~]# pca-check-master NODE: 192.168.4.4 MASTER: True Backup the oraInventory and copy to the shared NFS storage: [root@ovcamn06r1~]# cd /u01/app [root@ovcamn06r1 app]# tar -cvf EMagent_oraInventory.tar oraInventory [root@ovcamn06r1 app]# cp EMagent_oraInventory.tar /nfs/shared_storage/ Step 4: Move the PCA to a blackout state: We should place the PCA into a blackout state within Oracle Enterprise Manger 13c. Blackouts allow Oracle Enterprise Manager administrators to suspend all data collection activity on one or more monitored targets. The primary reason for blacking out targets is to allow Oracle Enterprise Manager administrators to perform scheduled maintenance on those targets. Alerts may also being sent to other management tools external to Oracle Enterprise Manager therefore this procedure is vital in false alerts being sent. Using the Enterprise Manager 13c UI as the Cloud Administrator go to the Private Cloud Appliance Home Page. Oracle Enterprise Manager 13c is able to manage multiple Oracle Private Cloud Appliances, therefore if this is the case click on the Oracle Private Cloud Appliance to update: From the Oracle Private Cloud Appliance home page menu select the Create Blackout option: Enter suitable information describing the reason for the blackout (see below example) It is suggested to tick Enable Full blackout for all hosts and agents. Also on the Schedule set the duration to Indefinitely. Notice that there is a single target of type Oracle Private Cloud Appliance and also in the Related Targets Included in the Blackout. This single target of the Oracle Private Cloud Appliance will encapsulate all the physical and logical / virtual components: The Home Page will return with a notification that the Oracle Private Cloud Appliance is now under Blackout: Similarly as with the physical targets the single target of the Oracle VM Manager will encapsulate all the logical targets it manages into a single blackout. This is shown with a wrench / screwdriver icon as follows within the Infrastructure Cloud View: Step 5: Upgrade PCA to 2.3.3 by referring to the documentation. Step 6: Recover the PCA management node agent: The next step is to recover the Oracle Enterprise Manager agent installed on the NFS shared storage which is presented to both active and passive management nodes. We firstly restore the oraInventory backup we took in the first step as the root user on the active management node: [root@ovcamn06r1 ~]# pca-check-master NODE: 192.168.4.4  MASTER: True [root@ovcamn06r1 ~]# cp /nfs/shared_storage/EMagent_oraInventory.tar /u01/app [root@ovcamn06r1 ~]# cd /u01/app [root@ovcamn06r1 app]# ls EMagent_oraInventory.tar  oracle [root@ovcamn06r1 app]# tar -xvf Emagent_oraInventory.tar We then need to change the oracle passwd to the same one we used on the original Oracle Enterprise Manager agent install as the root user on both management nodes active and passive: [root@ovcamn06r1 ~]# passwd oracle [root@ovcamn05r1 ~]# passwd oracle Next on the active management node and as the root user we need to run the privilege scripts: [root@ovcamn06r1 ~]# /nfs/shared_storage/oem13agent/agent_13.2.0.0.0/root.sh [root@ovcamn06r1 ~]# /u01/app/oraInventory/orainstRoot.sh These scripts create the /etc/oragchomelist /etc/oraInst.loc & /etc/init.d/gcstartup scripts. We need the Oracle Enterprise Manager agent to be under the control of the Oracle Private Cloud Appliance software and not any local OS based startup scripts. Therefore we need to remove any OS based rc.* links to scripts. As the root user on the active management node: [root@ovcamn06r1 ~]# for x in `find /etc/rc.*/rc* | grep gcstart`; do rm $x; done Next, copy the the Oracle Enterprise Manager agent installation files from the active management node (in our case ovcamn06r1) to the passive management node (ovcamn05r1) as the root user: [root@ovcamn06r1 ~]# scp /etc/init.d/gcstartup root@ovcamn05r1:/etc/init.d/ [root@ovcamn06r1 ~]# rsync -og /etc/oragchomelist root@ovcamn05r1:/etc/oragchomelist [root@ovcamn06r1 ~]# rsync -rog /u01/app/oraInventory/ oracle@ovcamn05r1:/u01/app/oraInventory The Oracle Private Cloud Appliance software is automatically configured with the default Oracle Enterprise Manager agent firewall port (3872) open. If you are not using the default port of 3872 you need to open the firewall as the root user on both the active and passive management nodes to enable the Oracle Enterprise Manager agent to function: [root@ovcamn06r1]# iptables -A INPUT -m state --state NEW -m tcp -p tcp --dport <Chosen Port> -j ACCEPT [root@ovcamn06r1]# service iptables save iptables: Saving firewall rules to /etc/sysconfig/iptables:[ OK ] [root@ovcamn06r1]# service iptables start [root@ovcamn06r1]# service iptables status|grep <Chosen Port> 22 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:<Chosen Port> [root@ovcamn05r1]# iptables -A INPUT -m state --state NEW -m tcp -p tcp --dport <Chosen Port> -j ACCEPT [root@ovcamn05r1]# service iptables save iptables: Saving firewall rules to /etc/sysconfig/iptables:[ OK ] [root@ovcamn05r1]# service iptables start [root@ovcamn05r1]# service iptables status|grep <Chosen Port> 22 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:<Chosen Port> We now need to start the Oracle Enterprise Manager agent either as the root or oracle user on the active management node. Example as the root user: [root@ovcamn06r1 ~]# /etc/init.d/gcstartup start Example as the oracle user: -bash-4.1$ /nfs/shared_storage/oem13agent/agent_inst/bin/emctl start agent Step 7: Remove the blackout state: We now need to remove the indefinite Blackout from the Oracle Private Cloud Appliance physical, logical and virtual components. To do this either go to the Oracle Private Cloud Appliance home page and use the main menu to select Control=>End Blackout. From this page click on the Yes button to stop the Blackout. The Blackout will now be stopped and confirmed by being removed from the Oracle Private Cloud Appliance home page.

Recently we announced the Oracle Private Cloud Appliance (PCA) software 2.3.3 release which adds support for an enhancement to the internal Oracle ZFS Storage Appliance to model ZS5-ES. The high level...

Oracle VM Server for x86

Storware, Partner Spotlight

                                                            Storware vProtect is an enterprise backup solution for virtual environments. It facilitates the implementation of virtual machine backups running on Oracle VM. The latest release, 3.4, provides a new UI, CLI, open API, app server, and database. This release also introduced several improvements including file-level restore, the possibility to stream backups directly from a file system backup provider, virtually instant access to specific files in VM backups, and new settings for third-party S3 API implementations (i.e. Scality). With vProtect you can scale horizontally with multi-node centralized management and store backups in different backup destinations (locally, in OpenStack Swift object storage, IBM Spectrum Protect, Veritas NetBackup, EMC Networker or S3). The 3.4 release also introduced RPM-based installation and upgrade capabilities, several security enhancements, and improved configurability of S3 API for third-party object storage compatibility. Multiple backup destinations can be used simultaneously. E-mail reports with VM grouping and cluster and storage indexing as well as extended scheduling options are new in this release. Find more details in the product documentation.

                                                            Storware vProtect is an enterprise backup solution for virtual environments. It facilitates the implementation of virtual machine backups...

Oracle VM Server for x86

Learn How Oracle VM is a Key Part of Your IT Infrastructure

With more than 100 preconfigured, pretested templates for Oracle applications, Oracle has done the heavy lifting for you enabling the virtualization of complex applications with near-zero application knowledge.    In addition, you can move existing virtualized workloads to the cloud with a simple lift and shift to Oracle VM on Oracle Cloud Infrastructure. We have a selection of training options to accompany you and your colleagues as you progress in your use of Oracle VM: Oracle VM Server for x86: Administration: Learn to deploy pooled server resources to create virtual machines supporting enterprise applications. This course is available in the following formats: Training-on-Demand: Start training straight away, following lecture delivery by expert instructors through streaming video, at your own pace, and booking time to get hands-on experience when suits your needs. Live-Virtual Event: Attend a live event from your own desk, no travel required. Events are added to the schedule to suit different time-zones. Current events on the schedule include 6, 18 and 27 June, 8 August, 10 and 24 October and 14 November 2018 in English, 27 June 2018 in Spanish, 18 July 2018 in Brazilian Portuguese, and 27 May 2018 in Chinese. In-Class Event: Travel to an education center to take this course. In-Class events on the schedule include: Location Date Delivery Language Gaborone, Botswana 21 May 2018 English Rio De Janeiro, Brazil 11 June 2018 Brazilian Portuguese Toronto, Canada 4 June 2018 English Bogota, Columbia 17 September 2018 Spanish Cairo, Egypt 24 June 2018 Arabic Paris, France 21 November 2018 French Munich, Germany 30 July 2018 German Turin, Italy 18 June 2018 Italian Tokyo, Japan 25 September 2018 Japanese Mexico City, Mexico 29 October 2018 Spanish Warsaw, Poland 18 June 2018 Polish Praha, Slovakia 24 September 2018 Czech Johannesburg, South Africa 25 June 2018 English Zurich, Switzerland 27 August 2018 German Miami, FL, United States 19 November 2018 English Oracle VM Server for x86: Implementation: Learn how to administer, redistribute, troubleshoot and protect Oracle VM to ensure continuous and seamless access of your applications. This course is available in the following formats: Training-on-Demand: Start training straight away. Follow lecture delivery by expert instructors through streaming video, at your own pace, and book time to get hands-on experience whenever suits your needs. Live-Virtual Event: Attend a live event from your own desk, no travel required. Events are added to the schedule to suit different time-zones. Events currently on the schedule include 11 July, 7 and 15 August, 3 October, and 6 and 14 November 2018 in English and 8 August 2018 in Spanish. In-Class Event: Travel to an education center to take this course. In-Class events on the schedule include: Location Date Delivery Language Sydney, Australia 13 June 2018 English Rio De Janeiro, Brazil 19 November 2018 Brazilian Portuguese Praha, Slovakia 12 November 2018 Czech Johannesburg, South Africa 9 July 2018 English Providence, RI, United States 16 July 2018 English Integrate Oracle VM Workloads on Oracle Cloud Infrastructure: Learn to configure and manage Oracle VM on the cloud as part of the Oracle Cloud Infrastructure Services learning subscription. Resources: Register for an event or learn more about Oracle VM training, go to http://education.oracle.com/virtualization Oracle VM Server for x86 and Oracle VM Manager Product Documentation Oracle VM Server for x86 product pages Oracle VM Server for x86 and Oracle VM Manager Downloads Bring your Oracle VM workloads on Oracle Cloud Infrastructure

With more than 100 preconfigured, pretested templates for Oracle applications, Oracle has done the heavy lifting for you enabling the virtualization of complex applications with near-zero application...

Announcements

New Oracle VM Templates for Oracle Database available!

We are proud to announce the updated release of Oracle VM Templates for Oracle Database - Single Instance and Real Application Clusters. Oracle VM Templates are designed to provide a fast and easy way of deploying Single Instance or Oracle RAC cluster in Oracle VM for test as well as production environments. This updated release includes ALL the absolute latest bits for different Oracle Database releases (11.2.0.4, 12.1.0.2 / 12.2.0.2 April 2018 PSU/RU), Oracle Linux releases (Oracle Linux L6.9, Oracle Linux 7.5) and Oracle Unbreakable Enterprise Kernel release (UEK4 Update 7) that also includes latest fixes for Spectre & Meltdown; latest bits now available are: [Apr 2018] Single Instance & Oracle RAC 12c Release 2 Enterprise/Standard Edition, including Oracle Grid Infrastructure Release Update (12.2.0.1.180417) & Oracle Linux 7 Update 5 - Available from My Oracle Support under Patch number 25500208 for 64-Bit Oracle Linux [Apr 2018] Single Instance & Oracle RAC 12c Release 1 Enterprise Edition , including Oracle Grid Infrastructure Patch Set Update (12.1.0.2.180417) & Oracle Linux 7 Update 5 - Available from My Oracle Support under Patch number 25500207 for 64-Bit Oracle Linux [Apr 2018] Single Instance & Oracle RAC 11g Release 2 Enterprise Edition, including Oracle Grid Infrastructure Patch Set Update (11.2.0.4.180417) & Oracle Linux 6 Update 9 - Available from My Oracle Support under Patch number 25500206 for 64-Bit Oracle Linux Deployment documentation for Oracle VM The Oracle VM Templates for Oracle Database provides a framework that fully automates the creation of a Single Instance, Oracle Restart (Single Instance/HA) or Oracle Real Application Clusters (RAC) configurations in an Oracle VM environment. In a matter of minutes the versatile and powerful Oracle VM Templates for Oracle Database can be cloned into any number of VMs which could be deployed as a Single Instance, Oracle Restart (Single Instance/HA) or Oracle RAC of any number of nodes. To get further details on Oracle VM Templates for Oracle Database: Oracle VM Templates for Oracle Database - Main Page Oracle VM Templates for Oracle Database - Single Instance, Oracle Restart (SIHA) and Oracle RAC - MyOracle Support Knowledge Base DeployCluster tool for Oracle VM Templates for Oracle Database - Deployment Guide Oracle Real Application Clusters on Oracle VM Environment - White Paper

We are proud to announce the updated release of Oracle VM Templates for Oracle Database - Single Instance and Real Application Clusters. Oracle VM Templates are designed to provide a fast and easy...

Events

Oracle Code Online: Practical DevOps with Linux and Virtualization.

In the huge list of very interesting sessions that are part of Oracle Code Online 2018, a new webcast has been added that you won't want to miss: Practical DevOps with Linux and Virtualization This session offers a practical, and live, hands-on example of how to implement Infrastructure as code and build repeatable development building blocks for both solo developers and teams. Replace hand built "one-off" development runtimes and say good-bye to "it works on my machine"! This session walks you through building a DevOps toolchain, suitable for deploying an automated infrastructure for microservices, across multiple virtualization and cloud environments. Tooling includes Docker, Vagrant, VirtualBox, Oracle Linux and GitHub. Oracle Code Online includes many Developer Session Paths covering: Java, Database, Emerging Technologies, DevOps/Containers and JavaScript. Further information on paths, session dates & times are available here. Oracle Code Online will be available on three dates, to accommodate all timezones; below are the URL's to register: Thursday, April 19, 2018 - Time: 09:00 AM PDT Tuesday, May 8, 2018 - Time 10:00 AM CEST Tuesday, May 29, 2018 - Time: 11:30 AM IST Dates/Times for my session, "Practical DevOps with Linux and Virtualization" are: Hope to virtually meet you during the "Practical DevOps with Linux and Virtualization" session! I look forward to discussing your questions and ideas during the Q/A portion.  

In the huge list of very interesting sessions that are part of Oracle Code Online 2018, a new webcast has been added that you won't want to miss: Practical DevOps with Linux and Virtualization This...

Oracle Private Cloud Appliance

Announcing Oracle Private Cloud Appliance Software Release 2.3.3

Today, we are pleased to announce Oracle Private Cloud Appliance release 2.3.3. The patch can be downloaded from MOS using patch ID 27275963. The release is applicable to Private Cloud Appliance X3-2, X4-2 and X5-2. Here are some of the new features and enhancements in PCA Release 2.3.3: Latest Storage Server Software AK 8.7.14 PCA 2.3.3 adds provisioning and orchestration support for the next generation Oracle ZFS Storage Appliance ZS5-ES as the internal storage.  It is a standard component in new release PCA 2.3.3 systems and offers improved storage performance and disk space. This release ships with the latest storage server software AK 8.7.14 and continues to support previous generations of internal ZFS Storage Appliance namely ZS3-ES and ZFS 720. Latest Oracle VM 3.4.4 This consolidated software release includes Oracle VM 3.4.4 with Xen and Kernel Security fixes to address various CVEs. For more details, refer to MOS Doc ID 2370398.1. Security Enhancements for Appliance and VMs This release of PCA includes the latest supported OS and kernel for all Compute and Management nodes: Oracle Linux 6 Update 9 with UEK Release 4 Update 6. These contain important bug fixes to improve stability and compatibility, and eliminate a number of vulnerabilities. PCA release 2.3.3 is a major step to ensure a secure multitenant private cloud deployment with Oracle PCA. The release, along with the provisioning support for Oracle ZS5-ES, includes the latest supported software for compute and management nodes, thus eliminating many security vulnerabilities. Resources Refer to the product documentation for additional details on features and bugs fixed in this release.

Today, we are pleased to announce Oracle Private Cloud Appliance release 2.3.3. The patch can be downloaded from MOS using patch ID 27275963. The release is applicable to Private Cloud Appliance X3-2,...

Oracle VM Server for x86

Training to Integrate Oracle VM Workloads on Oracle Cloud Infrastructure

We are very excited to announce the release of the all new course - Integrate Oracle VM Workloads on Oracle Cloud Infrastructure. This course is part of Oracle University's digital learning subscription. By purchasing the Oracle University Cloud learning subscription, under Oracle Cloud Infrastructure Services, you access a selection of learning paths to help you implement, administer, optimize and use Oracle Cloud. The Integrate Oracle VM Workloads on Oracle Cloud Infrastructure course provides you with a series of short, easy to consume, instructor-led videos which strengthen your cloud administrative skills by enabling you to integrate a full deployment of Oracle VM in the cloud. You will learn to: Launch Oracle VM instances from prepackaged images. Launch Oracle VM instances from fixed shapes. Integrate Oracle VM networking with Oracle Cloud Infrastructure virtual cloud networks. Integrate Oracle Cloud Infrastructure storage for use by Oracle VM. Import on-premise Oracle VM virtual machines to Oracle VM on Oracle Cloud Infrastructure. The content of the Oracle Cloud learning subscription teaches you tasks that are specific to the cloud. For many cloud administration tasks, you will draw on knowledge that applies equally well on or off cloud. Here are a selection of further resources to guide you. Resources: Announcement: Bring your Oracle VM workloads on Oracle Cloud Infrastructure Oracle Virtualization Curriculum Oracle VM Product Documentation Oracle Cloud Infrastructure Products Oracle Cloud Infrastructure Product Documentation

We are very excited to announce the release of the all new course - Integrate Oracle VM Workloads on Oracle Cloud Infrastructure. This course is part of Oracle University's digital learning...

Oracle Secure Global Desktop

Oracle Secure Global Desktop 5.4 Now Available

We are happy to announce the release of Oracle Secure Global Desktop (Oracle SGD) 5.4. Oracle SGD is a secure remote access solution for cloud-hosted enterprise applications and hosted desktops running on Oracle Linux and other Linux distributions, Oracle Solaris, Microsoft Windows, and mainframe servers. What's New: This new release of Oracle SGD comes with many new features, enhancements, and bug fixes. Highlights include: Java-less client launch Previous versions of SGD used Java in the browser, or Java WebStart, to install and launch the native client on Mac OS X, Windows, Linux and Oracle Solaris. However, many web browsers have removed support for Java, so we have added a new option to the supported launch methods. Once the client for Oracle SGD 5.4 is installed, either system wide or per user, the web browser uses a registered URL schema to launch the native client. This new approach no longer requires Java and is supported on virtually all browsers. Improved HTML5 client In previous versions of Oracle SGD, the HTML5 client had some limitations; you couldn't resume sessions and only a single application session was supported at any given time. With Oracle SGD 5.4 we have removed those restrictions and it functions like a native client. You now can launch, suspend and resume multiple application sessions simultaneously. Regardless of which client you launch an application with, you can resume any suspended session with the native client or the HTML5 client, except for Client Window Management applications, which are not supported with HTML5. Oracle SGD 5.4 also supports character applications with HTML5. Support for smart card and client certificate authentication A certificate containing an identity can be installed on the client and registered with the Oracle SGD Gateway. This way, only users with the registered certificates can access the gateway. This works in three different configurations: Certificate required and sufficient for authentication: gateway will require a certificate and Oracle SGD server will trust the certificate Certificate required and insufficient for authentication: gateway will require a certificate, but the user still needs to provide credentials to authenticate Certificate optional and sufficient for authentication: if the gateway is presented a certificate and the Oracle SGD server trusts it, the user is authenticated, otherwise, the user needs to authenticate with username/password Client IP address propagation Until the 5.4 release, the Oracle SGD servers only saw the IP address of the Oracle SGD Gateway as the remote end of the connection. In Oracle SGD 5.4, the gateway now passes up to three IP addresses to the Oracle SGD server: Remote end of the incoming connection to the Gateway Any X-Forwarded-For headers added to HTTP traffic (load balancers) The client’s view of its IP address The following example shows a running gnome terminal session on an Oracle SGD server with a co-located gateway. [sgdadmin@sgdsrv1 ~]$ sudo /opt/tarantella/bin/tarantella emulatorsession list User: .../_ens/o=Tarantella System Objects/cn=SGD Administrator Application: .../_ens/o=applications/cn=gnome-terminal Application Server: .../_ens/o=appservers/cn=Tarantella server sgdsrv1 Application Server DNS: sgdsrv1.compute-sgdpm.oraclecloud.internal Application Server User: sgdadmin Client: 148.87.19.202 Client (forwarded): Client (tcc): 127.0.0.1 Protocol Engine ID: 22402 Resumable For: Always Session ID: sgdsrv2.compute-sgdpm.oraclecloud.internal:1521588707829:-4094901712694853239:Li4uL19lbnMvbz1UYXJhbnRlbGxhIFN5c3RlbSBPYmplY3RzL2NuPVNHRCBBZG1pbmlzdHJhdG9y Start Time: 2018-03-20 23:31:47.831 Status: Running [sgdadmin@sgdsrv1 ~]$ Support for SSH key authentication to application servers In addition to username/password authentication when launching applications on application servers, Oracle SGD 5.4 provides private key authentication to Unix application servers. The SSH private key does not leave a user's system. On both Oracle SGD clients, you can use a private key to connect to application servers. Installation and upgrade The aim is to get as many customers as possible to upgrade from older, unsupported versions of Oracle SGD to SGD 5.4.  For this reason, upgrades are allowed from many Oracle SGD releases. Release OL5 OL6 OL7 Solaris 10 Solaris 11 4.63 u5, u6, u7 N/A N/A u8 N/A 4.71 u7, u8 u2, u3 N/A u10 u0 5.0 u8, u9 u2, u3, u4 N/A u10, u11 u0, u1 5.1 u8, u9 u2, u3, u4 N/A u10, u11 u0, u1 5.2 u8+ u2+ N/A u10+ u0+ 5.3 u8+ u2+ u0+ u10+ u0+ 5.4 u8+ u2+ u0+ u10+ u0+ There is an issue that none of the OS platforms supported by Oracle SGD 4.63 are supported in Oracle SGD 5.4.  The recommendation for these upgrades is: 1. Stop the Oracle SGD server (or Gateway). 2. Upgrade the OS to a version supported by Oracle SGD 5.4. 3. Upgrade the Oracle SGD server (or Gateway). Resources For more details on Oracle SGD and the 5.4 release,  please consult the release notes in the documentation. To get started, you can download Oracle SGD software from Oracle Software Delivery Cloud by following the instructions on Oracle Technology Network.

We are happy to announce the release of Oracle Secure Global Desktop (Oracle SGD) 5.4. Oracle SGD is a secure remote access solution for cloud-hosted enterprise applications and hosted desktops...

Perspectives

Oracle VM Server for SPARC: redundant domains on scale-out servers

An update to the Oracle VM Server for SPARC Best Practices whitepaper was just published. This brings the paper up to date with references to the latest servers and pointers to the current documentation, and adds discussion for resiliency when using scale-out servers like the S7-2. Background A review: Oracle VM Server for SPARC provides virtual I/O in which guest domains perform I/O though virtual devices provided by service domains. This is similar in concept to how guest domains (domU) in Oracle VM Server for x86 pass I/O through a Xen control domain (dom0). SPARC service domains are assigned physical PCIe buses and I/O devices, and perform I/O operations on behalf of the guests.  Note that not all I/O domains are service domains - physical I/O can also be used for a domain's own native-performance I/O. . Oracle VM Server for SPARC supports redundancy in a single host with multiple paths for I/O, as is common to many platforms. That insulates against failure of an I/O device, such as HBA, network card, switch, cable. Oracle VM Server for SPARC also supports multiple service domains, so guests can continue I/O operations without an interruption even if a service domain fails or is rebooted. This is very powerful - you can tolerate a service domain outage without loss of function or having to evacuate a server. A typical use case is for planned service domain reboots: update Solaris in each of a redundant pair of service domains, and then reboot them one at a time without disrupting guest domain operations. Smaller and scale-out servers This technique is powerful for continuous availability. However, it has hardware requirements. For starters, it requires that the server have enough PCIe buses to create multiple root domains. One bus simply will not do. Second, it requires I/O devices be available on multiple buses for the control domain and a secondary root domain to both boot up, That particularly means network and boot disk, using either the built-in devices configured with the server, or additional ones. On servers like the S7-2 or T8-1 there may not be sufficient devices to do this with internal disk and on-motherboard network adapters, or they maybe presented on a single bus. The S7-2 and T8-1 have a builtin quad-10GbE network card, and its devices (i40e0 to i40e3) are all on pci@300, so they cannot be used for a redundant service domain. An additional network would have to be acquired and placed on a different bus.  The S7-2 has its builtin disks on pci@302 (I didn't look at a T8 with multiple disks) so couldn't be used as boot device for a second domain - external storage would have to be used, requiring a HBA card.  On low-cost servers like these, the additional I/O cards needed for multiple service domains might be a disproportionate price, and the CPU cores and memory on smaller servers might reduce the number of guest domains that would fit.  In these servers, the best approach is to use resilient applications like Oracle Real Application Cluster, and live migrate domains off the server for planned outages. IP Multipathing, Link Aggregation, and MPxIO are still available for I/O resiliency within the control domain, and should be used to insulate guests from I/O failures. Summary and Resources Oracle VM Server for SPARC permits high availability with a combination of techniques for reliabiliy, availability and serviceability (RAS). Not all of these techniques are applicable to all servers. In particular, the scale-out servers are designed for horizontal scale and availability across multiple servers, rather than multiple service domains on a single server. While that can be done in some cases, it may be more cost effective to use multiple servers instead, or to consider SPARC servers with more I/O diversity. See the Oracle VM Server for SPARC Administration Guide and the best practices whitepaper linked above for details on how to check I/O buses and devices and configure for multiple root and service domains..

An update to the Oracle VM Server for SPARC Best Practices whitepaper was just published. This brings the paper up to date with references to the latest servers and pointers to the current...

Oracle VM VirtualBox

Use Vagrant and VirtualBox to setup Oracle Container Services for use with Kubernetes

Recently we announced the Oracle Vagrant boxes GitHub repository. Now you have a more streamlined way to create virtual machines with Oracle software fully configured and ready to go inside of them. With Oracle VM VirtualBox, Oracle Linux and Vagrant, you can easily build a consistent workflow to create disposable Linux environment whose configuration and dependencies are isolated from your development machine on every platform (Windows, MacOS or Linux). With just a few simple steps, download the vagrantfile from GitHub and you can quickly set up Oracle Container Services for use with Kubernetes. $ git clone https://github.com/oracle/vagrant-boxes $ cd vagrant-boxes/Kubernetes/ $ vagrant up master $ vagrant ssh master [vagrant@master ~]$ su root [root@master vagrant]# /vagrant/scripts/kubeadm-setup-master.sh $ vagrant up worker1 $ vagrant ssh worker1 [vagrant@worker1 ~]$ su root [root@worker1 vagrant]# /vagrant/scripts/kubeadm-setup-worker.sh $ vagrant up worker2 $ vagrant ssh worker2 [vagrant@worker2 ~]$ su root [root@worker2 vagrant]# /vagrant/scripts/kubeadm-setup-worker.sh and your Kubernetes cluster is ready to use. [vagrant@master ~]$ kubectl cluster-info Kubernetes master is running at https://192.168.99.100:6443 KubeDNS is running at https://192.168.99.100:6443/api/v1/namespaces/kube-system/services/kube-dns:dns/proxy To further debug and diagnose cluster problems, use 'kubectl cluster-info dump'. [vagrant@master ~]$ kubectl get nodes NAME STATUS ROLES AGE VERSION master.vagrant.vm Ready master 49m v1.9.1+2.0.2.el7 worker1.vagrant.vm Ready <none> 24m v1.9.1+2.0.2.el7 worker2.vagrant.vm Ready <none> 6m v1.9.1+2.0.2.el7 To learn more, read the article in details.

Recently we announced the Oracle Vagrant boxes GitHub repository. Now you have a more streamlined way to create virtual machines with Oracle software fully configured and ready to go inside of them. Wit...

Perspectives

Accessing Oracle VM Manager Guest VM Consoles with SSH Port Forwarding or a Proxy

This short note is about a little problem. Users are on one network own and administer VMs via Oracle VM Manager, but Oracle VM Manager's server is on a different network, as are the (in this case) SPARC servers hosting their VMs. The users cannot even ping the server running Oracle VM Manager or the SPARC hosts. This is the rule for security and isolation. How can they log into Oracle VM Manager and access their guest VM consoles? First I asked: is there any server that is both on the user's network and the datacenter network hosting Oracle VM Manager? If not, then Game Over. Yes, there was. Okay, we can do this. My first thought was SSH port forwarding, as described in MOS note "Private network access using SSH console hopping, port forwarding and SOCKS proxies (Doc ID 2100732.1)".  With that method, the end user on the client networks issues ssh (or Putty or its equivalent on Windows) to a bastion host, and securely tunnels to the target network. The user would do something like: "ssh -L2002:targethost:7002 myuserid@bastionhost", where targethost is the server running Oracle VM Manager, and bastion host is the (you guessed it) the host on both client and datacenter networks.  Then open a browser window to https://localhost:2002/ovm/console and you're done. Note that you use the local port (here, 2002) which gets you to the target system's port 7002. That worked (for some value of "worked") but they wanted something less cumbersome, and I wanted a solution that didn't require a userid on the bastion host, or any end-user command line. Can we install software on the bastion host? Sure. Okay, let's use tinyproxy. Very simple then: I installed tinyproxy ("yum install tinyproxy"), on the bastion host, and then edited /etc/tinyproxy/tinyproxy.conf to include an "Allow" line for the client access network, and a "ConnectPort 7002" line for the port used to log into Oracle VM Manager.   Simple. Now, all the user has to do is point their browser (in Firefox: about:preferences -> Advanced -> Network Settings -> proxy) to the bastion host port 8888 (the port could be different) and then connect to Oracle VM Manager as usual. Virtual Machine (domain) consoles on both x86 and SPARC work fine. This simple (I should say "tiny") trick shows how you can have an isolated, secure datacenter network, and provide a secure method of getting to Oracle VM Manager and the resources it controls from a separate network

This short note is about a little problem. Users are on one network own and administer VMs via Oracle VM Manager, but Oracle VM Manager's server is on a different network, as are the (in this case)...

Perspectives

Upgrade to the Latest Oracle Linux 7 Developer Preview

Recently we had a number of releases that make Oracle Linux an even better development platform. Announcing Oracle Linux 7 Update 5 Developer Preview Oracle Linux 7 UEK5 (Linux kernel 4.14) sneak preview Oracle linux 7 for ARM updated to OL7.4 Announcing Oracle Container Runtime for Docker 17.12 Developer Preview Announcing Software Collections 3.0 Now I want to share how to upgrade an existing Oracle Linux 7 installation to the latest Oracle Linux 7 Update 5 Developer Preview with the Unbreakable Enterprise Kernel (UEK) Release 5 Developer Preview (4.14.23-1.el7uek.x86_64). Modify the yum channel setting and enable the Oracle Linux 7 Update 5 Developer Preview and UEK Release 5 Developer Preview channels. Then you perform the upgrade. # vi /etc/yum.repos.d/public-yum-ol7.repo [ol7_u5_developer] name=Oracle Linux $releasever Update 5 installation media copy ($basearch) baseurl=http://yum.oracle.com/repo/OracleLinux/OL7/5/developer/$basearch/ gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-oracle gpgcheck=1 enabled=1 [ol7_u5_developer_optional] name=Oracle Linux $releasever Update 5 optional packages ($basearch) baseurl=http://yum.oracle.com/repo/OracleLinux/OL7/optional/developer/$basearch/ gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-oracle gpgcheck=1 enabled=1 [ol7_developer_UEKR5] name=Oracle Linux $releasever UEK5 Development Packages ($basearch) baseurl=http://yum.oracle.com/repo/OracleLinux/OL7/developer_UEKR5/$basearch/ gpgkey=file:///etc/pki/rpm-gpg/RPM-GPG-KEY-oracle gpgcheck=1 enabled=1 # yum update After the upgrade is completed, reboot the system to have the updated OS environment running. # cat /etc/oracle-release Oracle Linux Server release 7.5 # uname -a Linux honsu-ol7-vm1 4.14.23-1.el7uek.x86_64 #2 SMP Thu Mar 1 12:35:10 PST 2018 x86_64 x86_64 x86_64 GNU/Linux The above instructions apply to any Oracle Linux 7 instances on-premises or on Oracle Cloud Infrastructure. For the latest update about Oracle Linux, follow blogs.oracle.com/linux.

Recently we had a number of releases that make Oracle Linux an even better development platform. Announcing Oracle Linux 7 Update 5 Developer Preview Oracle Linux 7 UEK5 (Linux kernel 4.14) sneak...

Perspectives

DTrace on Oracle Linux

DTrace - dynamic tracing on Oracle Linux I like to joke that "all performance problems are either trivial or unsolvable", but that's really not true. While many performance issues can be diagnosed using standard tools like vmstat, mpstat, iostat, prstat, perf, and so on, sometimes you need to inspect the internal behavior of the system to understand what's going on. DTrace, the fantastic dynamic tracing tool introduced with Solaris, is ideal for this. While I haven't focussed on DTrace, I've blogged in the past on how I used it to discover interesting things about Oracle VM Server for SPARC live migration and internal workings of the Hercules emulator.  In one of those blogs I refer to the '*stat' tools as a stethoscope, while DTrace is the MRI you deploy when needed for deep information. In that spirit, I'm very happy to see that DTrace continues to be enhanced on Oracle Linux. It's been around for some time, but has been increasing in scope and capability, such as recently adding the lockstat provider. This is very useful and interesting, and lets Oracle Linux uniquely provide capabilities for understanding the behavior of Linux systems. Getting Started - Installing First, install Oracle Linux and use the Unbreakable Enterprise Kernel (UEK). While much of this and subsequent blog entries apply to previous UEK versions, I'll use the latest UEK5 sneak preview described in Wim Coekaerts' blog. Follow the instructions there to install UEK5 and then simply yum install dtrace-utils to install DTrace. That's all there is to it. Getting Started - simple examples I start with DTrace on Oracle Linux the same way I do on Solaris, with 'one-liner' commands or simple scripts, and delving deeper as needed. Even trivial DTrace commands can show a lot. In this blog I'll show examples entered directly from the command line, rather than complex and powerful stored scripts. The cliche first script below simply shows which processes are doing the most system calls. It fit on one line, but I split it here for readability. The syscall probe counts system calls by execname into a DTrace aggregate to show who issues the most system calls. The END probe fires when I stop the script, and truncates the aggregate to the highest and most interesting entries  I ran this while starting a large Java application (Oracle VM Manager, which runs under WebLogic), which explains why it's the top syscall user. Note: the exact same script works on Solaris. System calls # dtrace -n 'syscall:::entry { @num[execname] = count();}     END {trunc(@num,10)}' dtrace: description 'syscall:::entry ' matched 320 probes ^C CPU     ID                    FUNCTION:NAME   3      2                             :END  dockerd                              7090  postqueue                            7868  tc                                   9618  rpm                                 10148  bash                                16562  mysqld                              16901  setroubleshootd                     31843 netdata                             205353 apps.plugin                         533458 java                                716525   Now let's find out which system calls are being executed: which system calls # dtrace -n 'syscall:::entry { @num[execname,probefunc] = count();} END {trunc(@num,10)}' dtrace: description 'syscall:::entry ' matched 320 probes ^C CPU     ID                    FUNCTION:NAME   1      2                             :END   apps.plugin           getdents       23604   netdata                 read             31241   apps.plugin           open            35258   apps.plugin           lseek           35290   apps.plugin           close           47048   java                      futex            50128   java                      newstat        50384   apps.plugin           read             70594   java                      lseek          130673   java                      read           263427   That shows which are the hottest system calls, by caller.  Just for quick fun, let's see which files are being opened by Java (output randomly edited to just show some of the many items). Note the use of a predicate to restrict to system calls made by the Java process: Which files are being opened? # dtrace -qn 'syscall::open*:entry /execname=="java"/ { printf("%s \n",copyinstr(arg0)); }' /u01/app/oracle/java/bin/../lib/amd64/jli/tls/x86_64/libpthread.so.0 /u01/app/oracle/java/bin/../lib/amd64/jli/tls/libpthread.so.0 /u01/app/oracle/java/bin/../lib/amd64/jli/x86_64/libpthread.so.0 /u01/app/oracle/java/jre/lib/rt.jar /etc/passwd /etc/localtime I did the same for 'apps.plugin', and saw entries for /proc/pid/stat, because I was running Netdata, which I had forgotten. If motivated I could drill further, such as looking at call stacks, or seeing which files are used with lseek, and read, or compute system calls per second. Or, see how locks are being managed with futex, such as how long they are held. Lock management will probably be in a later article. Another simple example Let's change gears. The next one-liner shows which processes are being started (again, the identical script works on Solaris). I immediately see the following (many limes omitted). That's pretty cool - you can see all this activity going on. proc:::exec-success #  dtrace -n 'proc:::exec-success { trace(curpsinfo->pr_psargs); }' dtrace: description 'proc:::exec-success ' matched 1 probe CPU     ID                    FUNCTION:NAME   1   1864  do_execveat_common:exec-success   /usr/sbin/tc -s qdisc show dev eth0   0   1864  do_execveat_common:exec-success   rpm -q selinux-policy                         0   1864  do_execveat_common:exec-success   /usr/bin/python -Es /usr/sbin/setroubleshootd -f   0   1864  do_execveat_common:exec-success   basename /etc/cron.hourly/0anacron ...   These are very simple, trivial examples - just barely scratching the surface, but show how a lot of information can be obtained. Summary. Oracle Linux incorporates the Dynamic Tracing (DTrace) feature pioneered in Solaris. DTrace is an exceptionally powerful tool for finding out what is going on in your system. Later articles will show more interesting (I hope) examples, and illustrate some of the features recently added to Oracle Linux. For further information, see the DTrace Guide and the DTrace Tutorial.

DTrace - dynamic tracing on Oracle Linux I like to joke that "all performance problems are either trivial or unsolvable", but that's really not true. While many performance issues can be diagnosed...

Oracle VM Server for x86

ovm-bkp v1.0: Backup Utilities for Oracle VM 3.4

I'm so proud to announce ovm-bkp v1.0, Backup Utilities for Oracle VM 3.4. Target of those utilities is to manage Virtual Machine Backups on Oracle VM 3.4; based on scripts installed on Oracle VM Manager Instance, ovm-bkp allows to easily manage backups and restore of Virtual Machines running on Oracle VM 3.4. This project, started years ago, evolved in the time thanks to the feedback received on my personal blog. ovm-bkp v1.0 introduced a lot of new features, compared to the old 0.8b release: Restore process: a script dedicated to the restore process with different options related to how-to restore Preserve option: a script that gives the option to preserve a backup from the retention policy applied Backup list: a script to get the list of backups available for a specific virtual machine Backup delete: a script to remove a specific backup, not more required VM configuration file: one config file, for each Virtual Machine, dedicated to the backup configuration (target repository, retention policy) Log files: now each operation is logged into a dedicated log-file Backup Information file: now each backup executed also creates a file containing all the information of the Virtual Machine Setup process: two dedicated scripts to automate the environment configuration While a huge list of enhancements has been added to this release, the backup flowchart remains the same as in the past: "ovm-bkp v1.0" is now available on Oracle Technology Network website under the "Oracle VM Tools" group; at the same page you can also find the "Installation and User Guide for ovm-bkp v1.0 Backup Utilities". "ovm-bkp v1.0" is based on an RPM for Oracle Linux 6 and 7 and needs to be installed on Oracle VM Manager: Download ovm-bkp v1.0-20180215 Installation and User Guide for ovm-bkp v1.0 Feel free to leave your feedback on this blog entry or on my personal blog on the dedicated article "Hands on Backup Utilities for Oracle VM 3.4".

I'm so proud to announce ovm-bkp v1.0, Backup Utilities for Oracle VM 3.4. Target of those utilities is to manage Virtual Machine Backups on Oracle VM 3.4; based on scripts installed on Oracle VM...

FRIDAY SPOTLIGHT: New whitepaper: Expanding Oracle PCA with Oracle ZFS Storage Appliance

Oracle Private Cloud Appliance ships with pre-configured servers, storage and networking to provide a true private cloud infrastructure for Oracle and non-Oracle workloads. The Oracle ZFS Storage Appliance located in the PCA rack is configured for resiliency and availability, rather than performance or scale and thus should be considered as a PCA “system disk”. For high performance and I/O intensive workloads like databases, it is therefore recommended to use an additional external ZFS Storage Appliance. The new whitepaper “Expanding Oracle Private Cloud Appliance with Oracle ZFS Storage Appliance” describes the process to connect PCA to an external ZFS Storage Appliance cluster over Infiniband and 10Gb Ethernet. This document covers cabling and detailed configuration steps for ZFSSA and Oracle VM to set up NFS and iSCSI based connectivity. The last section of the paper goes through best practices for increasing availability and performance of the Oracle PCA and Oracle ZFSSA combination. This whitepaper augments the instructions in the PCA Installation guide and should be used in conjunction to ensure the best storage performance for your PCA. Resources Please refer to the PCA Oracle Technology Network page for more whitepapers and cookbooks  

Oracle Private Cloud Appliance ships with pre-configured servers, storage and networking to provide a true private cloud infrastructure for Oracle and non-Oracle workloads. The Oracle ZFS Storage...

Oracle VM Server for x86

Announcing Oracle VM Windows PV Driver release 3.4.3

Announcing Oracle VM Windows PV Driver release 3.4.3  Oracle VM Paravirtual (PV) Drivers for Microsoft Windows are a component of Oracle VM and provide a performance boost for network and disk I/O on Microsoft Windows guests running in a virtual environment on Oracle VM x86 Servers. What's New? The Oracle VM Windows PV Driver release 3.4.3 offers both new features and cumulative bug fixes since the previous 3.4.2 release.  The notable enhancements with this release include: Microsoft Windows Server 2016 support: Full support is now offered for Microsoft Windows Server 2016 guests in an Oracle VM Release 3.4.4 or later environment. Increased guest VM memory support to 480G: Oracle VM PV Drivers for Microsoft Windows now support a maximum configuration limit of 480GB virtual RAM for the following guest operating systems in an Oracle VM release 3.4.4 or later environment: Microsoft Windows Server 2016 Microsoft Windows Server 2012 R2 Microsoft Windows Server 2012 Microsoft Windows Server 2008 R2 Reduced CPU utilization: Performance improvements have been implemented that result in lower CPU utilization rates for Windows guests The drivers have been certified in the Microsoft Windows Server Catalog and Microsoft signed drivers are included with this release Security updates and performance improvements The full list of Windows operating systems supported, bug fixes, known issues and upgrade considerations can be found in the Oracle VM Windows PV Drivers User Guide. Oracle VM Software Download  Instructions to download the Oracle VM, Windows PV drivers, tools and utilities can be found on Oracle Technology Network. For the latest information, best practices white papers, webinars and training, please visit http://oracle.com/virtualization.

Announcing Oracle VM Windows PV Driver release 3.4.3  Oracle VM Paravirtual (PV) Drivers for Microsoft Windows are a component of Oracle VM and provide a performance boost for network and disk I/O on...

Oracle VM Server for SPARC

Learn about Oracle VM for Dev, Test, and Cloud Migration

Happy New Year to all and best wishes for 2018. With Oracle VM, you are a step ahead because you can test and develop equally well on-premise or in the cloud using the same hypervisor and the same OSes as Oracle Cloud. And you can use Oracle VM to migrate workloads to the cloud. Learn more about Oracle VM by taking the Oracle VM Server for x86: Administration course in one of the following formats: Training-on-Demand: Start training straight away, following lecture delivery by expert instructors through streaming video, at your own pace, and booking time to get hands-on experience when suits your needs. Live-Virtual Event: Attend a live event from your own desk, no travel required. Events are added to the schedule to suit different time-zones. Current events on the schedule include 16, 17, 24 and 30 January, 21 February and 14 and 21 March 2018. In-Class Event: Travel to an education center to take this course. In-Class events on the schedule include: Location Date Delivery Language Sydney, Australia 21 May 2018 English Brasilia, Brazil 12 March 2018 Brazilian Portuguese Toronto, Canada 5 February 2018 English Ottawa, Canada 5 February 2018 English Bogota, Columbia 7 May 2018 Spanish Cairo, Egypt 28 January 2018 English Helsinki, Finland 21 May 2018 English Munich, Germany 29 January 2018 German Milan, Italy 19 February 2018 Italian Nairobi, Kenya 7 February 2018 English Warsaw, Poland 15 January 2018 Polish Warsaw, Poland 26 February 2018 Polish Johannesburg, South Africa 25 June 2018 English Barcelona, Spain 9 April 2018 Spanish Zurich, Switzerland 2 May 2018 German Edison, NJ, United States 5 February 2018 English Philadelphia, PA, United states 5 February 2018 English If you are using Oracle VM Server for SPARC, consider taking the Oracle VM Server for SPARC: Installation and Configuration course in the following formats: Live-Virtual Event: Attend a live event from your own desk, no travel required. Events are added to the schedule to suit different time-zones. Events currently on the schedule include 7 February, 11 and 14 March and 11 April 2018. In-Class Events: Travel to an education center to attend to take this course. In-Class events currently on the schedule include: Location Date Delivery Language Kuala Lumpur, Malaysia 29 January 2018 English Auckland, New Zealand 22 January 2018 English Madrid, Spain 16 April 2018 Spanish Resources: To register for an event or to learn more about Oracle VM training, go to http://education.oracle.com/virtualization Oracle VM Server for x86 and Oracle VM Manager Product Documentation Oracle VM Server for SPARC Product Documentation Oracle's Virtualization Product Pages

Happy New Year to all and best wishes for 2018. With Oracle VM, you are a step ahead because you can test and develop equally well on-premise or in the cloud using the same hypervisor and the same OSes...

Perspectives

Upgrading to Oracle Private Cloud Appliance Software Release 2.3.2

Zero downtime upgrade architecture Oracle recently announced Private Cloud Appliance Software Release 2.3.2, which adds support for X7-2 compute nodes, upgrades Oracle VM to release 3.4.4, and adds several other features. This article gives tips for upgrading to this new release. Don't worry - it's all documented. I just like to add my own .02 and enjoy over-explaining. Important: PCA is designed for zero downtime upgrades. It uses redundant management, network, storage, and compute resources to avoid single points of failure for both normal operation and during upgrades. Rolling upgrades let us take components offline to upgrade them, while redundant partner components carry on providing service. Much of the effort is automated to reduce errors and administrative effort. While I'm a cynical old-school datacenter guy who says "block off a maintenance window for the most trivial thing", a PCA upgrade can be done without service interruption, permitting 24/7 operation even during upgrade.  Preparation First, read the Administration Guide chapter Updating Private Cloud Appliance. Download the updated software release from My Oracle Support (MOS). Release 2.3.2 is contained in patch ID 26982346 and consists of two zip files. Don't go to MOS and look for upgraded firmware or software for PCA components (ZFS appliance, InfiniBand switches, etc).unless directed to do so by Oracle PCA support. The components have been tested with each other with the versions that are shipped. Read the patch README. Yes, really! Always a good idea, and it gives explicit instructions for the next steps. Check the pre-requisites and update matrix (from which release, to which release) in the README file. PCAs at a version before 2.1.1 must be updated to an intermediate release before going to 2.3.2. The next few steps can be done locally on your own Linux workstation, or you can scp the zip files to the active PCA management node and do them there. Unzip the two zip files, which contains the pieces that make up the install image, another copy of the README, a pre-upgrade check script, and a script cleverly called RUN_ME_FIRST.sh. Run the RUN_ME_FIRST.sh script, which prints the contents the upgrade matrix and points to the MOS note "PCA 2.3.X Upgrade Checklist and Prerequisites (Doc ID 2242177.1)". This MOS note contains mandatory steps for pre- and post-upgrade checks and administrative actions combines component parts into the install image iso.zip file. Recommends the administrator open an proactive Service Request with Oracle so we can be aware of the upgrade and provide assistance if needed. If you did the above steps locally, preferably using a fresh filesystem directory, move this directory's contents to the active PCA management node. Steps below are done on the PCA. Follow the instructions in MOS note 2242177.1. This includes running pre-checks, which comprehensively test component health. If Enterprise Manager is being used to administer the PCA, the checklist directs you to place the PCA in blacklist mode, so it won't think that it's in trouble when it's doing expected upgrade and reboots. This is documented in MOS note "[ PCA ] Specific steps for customers making use of Enterprise Manager 13c when upgrading Private Cloud Appliance to release 2.3.1 (Doc ID 2280818.1)" and Simon Hayler's blog "Friday Spotlight: Upgrade to Oracle Private Cloud Appliance 2.3.2 from 2.3.1 with Oracle Enterprise Manager 13.2" PCA controller software upgrade Once the preparation is done, proceed by upgrading the PCA controller software on the management nodes. Remember that the management nodes run as an active/passive server pair for resiliency. It's an optional but good idea to first reboot the passive node and then the active node, so we know they're in clean state and cluster status and to verify that failover worked correctly. Determine which node is the master by logging into each management node and typing the command pca-check-master, which will display True or False as needed. The update is started on the currently active management node, which copies install image iso contents into target directories, and then reimages the passive management node using those contents (the active management node acts as a kickstart server for the passive node).  I like to watch the process running by logging into the management nodes ILOMs and watching the consoles, as described in section 3.3.3. of the Administration Guide. The pca-admin command is used to perform the upgrade. Issue pca-admin, and then enter update appliance get_image FILEURL where FILEURL can be an http URL: or a file URL on the PCA. A complete command (assuming you place the image in a directory on /nfs/shared_storage) could be pca-admin update appliance get_image file:///nfs/shared_storage/2.3.2/ovca-2.3.2-b286.iso.zip    If you previously unzipped the iso.zip file, that's fine too - the command handles it whether you previously zipped or not.  Administration Guide section 3.3.4 shows how to monitor the progress of this task. When it finishes, issue pca-admin update appliance install_image which starts the reimaging and reboots of each management .mode. When the passive node finishes upgrading to the new release, it takes over the active role, and then reboots and acts as a kickstart server for the previously active management node. Compute nodes and virtual machines continue operating without disruption to business or applications. When the process completes, the PCA controller software is upgraded to PCA 2.3.2, and the previously inactive one is the active one. If you like, you can switch their roles again by rebooting (init 6) the active one. You can flip flop them all day long if you're easily entertained :)  It's instructive to see how quickly the passive management node becomes that active one during a failover. Again: VMs continue to operate without being affected by any of this. Upgrading the Virtualization Platform The virtualization platform (on the compute nodes running Oracle VM Server) is upgraded after the controller software. You can operate the PCA with upgraded controller software while the compute nodes continue to operate at the prior software level but we recommend upgrading them shortly after in a timely fashion. Virtualization platform upgrade is done on a one at a time compute node basis. If there are multiple tenant groups, upgrade each tenant group completely before moving to the next one. Log into Oracle VM Manager, select a tenant group (server pool). If the system is currently on PCA 2.2. or earlier, edit the server pool and see which server has the "master server" role. Upgrade that server last. Once the pool is upgraded, it no longer even needs the "master server" role. For each server in the pool, edit it in the Oracle VM Manager user interface to put it in maintenance mode (set the checkbox). That evacuates the server by live migrating all running VMs to other servers in the pool. They continue provide services without interruption. From the active management node, issue the command pca-admin update compute-node ovcacnXXr1 where ovcacnXXr1 is the server selected in the previous step. When the upgrade is complete, go back to Oracle VM Manager user interface, edit the server, and remove the maintenance mode checkbox. Go on to the next server. Lather, rinse, repeat. The server pool and VMs are continuously available. Post-install MOS note 2242177.1 has several administrative steps and health checks to perform after the upgrade completes. Perform them, and you're all done. Summary This article provides tips and links for upgrading the Oracle Private Cloud Appliance to the latest version. It should be emphasized that virtual machines - where the applications run - continue to operate without any interruption of service, providing continuous application availability for applications.        

Zero downtime upgrade architecture Oracle recently announced Private Cloud Appliance Software Release 2.3.2, which adds support for X7-2 compute nodes, upgrades Oracle VM to release 3.4.4, and adds...

Friday Spotlight: Upgrade to Oracle Private Cloud Appliance 2.3.2 from 2.3.1 with Oracle Enterprise Manager 13.2

Recently we announced the Oracle Private Cloud Appliance (PCA) software 2.3.2 release which adds support for the X7-2 compute nodes. The high level steps for the PCA 2.3.1 to 2.3.2 upgrade with Oracle Enterprise Manager 13c are as follows. If your PCA is not 2.3.1 then refer to My Oracle Support note 2242177.1 which includes steps for Oracle Enterprise Manager. - Update the required Enterprise Manager Plug-ins - If needed, install patches on the Enterprise Manager 13.2 Server (OMS) and agents - Backup the oraInventory - Move the PCA to a blackout state - Upgrade PCA to 2.3.2 - Recover the PCA management node agent  - Remove the blackout state  Step 1: Update the required Enterprise Manager Plug-ins: The Systems Infrastructure (SI) plug-in has been updated to support the Oracle X7 servers. This plugin needs to be updated to the latest version which currently is 13.2.3. The following plug-ins should also be at the latest version: Virtualization (VT), Cloud Framework (CFW) and Oracle Cloud Application (SSA). To check the current versions go to Setup > Extensibility > Plugins   Expose the Server folder and look firstly for the SI plugin: The Blue icon tells us there is a later version of the plugin available. To download this latest version follow the documentation which is here. Check the versions of the VT, CFW and SSA plug-in and if required update to the latest version. With the SI plug-in upgrade down time is required for the Oracle Enterprise Manager server (OMS) and the agent on the PCA. Step 2: If needed, install patches on the Oracle Enterprise Manger 13.2 Server (OMS) and PCA management node agent: Enterprise Manager has the concept of PSU’s (Patch Set Update), plugin patches and agent patches. From My Oracle Support (MOS) use the following document to determine the version of your Enterprise Manager environment: Doc ID 2319892.1 EM 13c: How to Determine the Patch Set Update (PSU) Applied to the Enterprise Manager 13c Cloud Control OMS and the Bundle Patch applied to Plug-ins and Agent. This document also refers to a master document: Master Note for Enterprise Manager Proactive Patch Program Doc ID 822485.1 which has links to documents for the latest PSU (Patch Set Update), agent and plugin patches. Oracle recommend that the Oracle Enterprise Manager Server (OMS) and Agents are at the latest PSU, plugin and agent patches. For the agent patches it is recommended to deploy any bundle, plugin, discovery and monitoring patches. In January 2018 a PSU was released (13.2.0.0.180116 Enterprise Manager Base Platform Patch Set Update (PSU)) contained in patch 27116243. This patch should be deployed on the Enterprise Manager Server (OMS) using the latest version of omspatcher including the following version of opatch:  Patch 6880880: OPatch version 13.9.2.1.1 for EMCC 13.x customers Only (not for FMW 12c). Use the various patch readme files for further information. In summary, using the January 2018 PSU for the Oracle Enterprise Manager Server (OMS) the following patches are required: - 27116243 – January 2018 PSU - 6880880 -  OPatch version 13.9.2.1.1 for the OMS and Management Agent on the OMS - 27336172 – January 2018 plugin bundle patch - 27319514  - January 2018 agent bundle patch for the agent running on the OMS In summary using the January 2018 PSU for the PCA Management Agent the following patches are required: - 6880880 -  OPatch version 13.9.2.1.1 - 27319514  - January 2018 agent bundle patch - 27359568  - January 2018 VT Plugin Monitoring patch - 27110236 -  November 2017 VT Plugin Discovery patch Step 3: Backup the Oracle inventory: The first step is to take a backup of the PCA management node agent oraInventory. The Oracle Inventory directory (oraInventory) stores an inventory of all software installed on the system. It is required and shared by all Oracle software installations on a single system. Firstly, as the root user ssh into the active management VIP (Virtual IP Address) and confirm we are on the active management node: [root@ovcamn06r1 ~]# pca-check-master NODE: 192.168.4.4 MASTER: True Backup the oraInventory and copy to the shared NFS storage: [root@ovcamn06r1~]# cd /u01/app [root@ovcamn06r1 app]# tar -cvf EMagent_oraInventory.tar oraInventory [root@ovcamn06r1 app]# cp EMagent_oraInventory.tar /nfs/shared_storage/ Step 4: Move the PCA to a blackout state: We should place the PCA into a blackout state within Oracle Enterprise Manger 13c. Blackouts allow Oracle Enterprise Manager administrators to suspend all data collection activity on one or more monitored targets. The primary reason for blacking out targets is to allow Oracle Enterprise Manager administrators to perform scheduled maintenance on those targets. Alerts may also being sent to other management tools external to Oracle Enterprise Manager therefore this procedure is vital in false alerts being sent. Using the Enterprise Manager 13c UI as the Cloud Administrator go to the Private Cloud Appliance Home Page. Oracle Enterprise Manager 13c is able to manage multiple Oracle Private Cloud Appliances, therefore if this is the case click on the Oracle Private Cloud Appliance to update. From the Oracle Private Cloud Appliance home page menu select the Create Blackout option: Enter suitable information describing the reason for the blackout (see below example) It is suggested to tick Enable Full blackout for all hosts and agents. Also on the Schedule set the duration to Indefinitely. Notice that there is a single target of type Oracle Private Cloud Appliance and also in the Related Targets Included in the Blackout. This single target of the Oracle Private Cloud Appliance will encapsulate all the physical and logical / virtual components.The Home Page will return with a notification that the Oracle Private Cloud Appliance is now under Blackout. Similarly as with the physical targets the single target of the Oracle VM Manager will encapsulate all the logical targets it manages into a single blackout. This is shown with a wrench / screwdriver icon as follows within the Infrastructure Cloud View: Step 5: Upgrade PCA to 2.3.2 by referring to the documentation. Step 6: Recover the PCA management node agent: The next step is to recover the Oracle Enterprise Manager agent installed on the NFS shared storage which is presented to both active and passive management nodes. We firstly restore the oraInventory backup we took in the first step as the root user on the active management node: [root@ovcamn06r1 ~]# pca-check-master NODE: 192.168.4.4  MASTER: True [root@ovcamn06r1 ~]# cp /nfs/shared_storage/EMagent_oraInventory.tar /u01/app [root@ovcamn06r1 ~]# cd /u01/app [root@ovcamn06r1 app]# ls EMagent_oraInventory.tar  oracle [root@ovcamn06r1 app]# tar -xvf Emagent_oraInventory.tar We then need to change the oracle passwd to the same one we used on the original Oracle Enterprise Manager agent install as the root user on both management nodes active and passive: [root@ovcamn06r1 ~]# passwd oracle [root@ovcamn05r1 ~]# passwd oracle Next on the active management node and as the root user we need to run the privilege scripts: [root@ovcamn06r1 ~]# /nfs/shared_storage/oem13agent/agent_13.2.0.0.0/root.sh [root@ovcamn06r1 ~]# /u01/app/oraInventory/orainstRoot.sh These scripts create the /etc/oragchomelist /etc/oraInst.loc & /etc/init.d/gcstartup scripts. We need the Oracle Enterprise Manager agent to be under the control of the Oracle Private Cloud Appliance software and not any local OS based startup scripts. Therefore we need to remove any OS based rc.* links to scripts. As the root user on the active management node: [root@ovcamn06r1 ~]# for x in `find /etc/rc.*/rc* | grep gcstart`; do rm $x; done Next, copy the the Oracle Enterprise Manager agent installation files from the active management node (in our case ovcamn06r1) to the passive management node (ovcamn05r1) as the root user: [root@ovcamn06r1 ~]# scp /etc/init.d/gcstartup root@ovcamn05r1:/etc/init.d/ [root@ovcamn06r1 ~]# rsync -og /etc/oragchomelist root@ovcamn05r1:/etc/oragchomelist [root@ovcamn06r1 ~]# rsync -rog /u01/app/oraInventory/ oracle@ovcamn05r1:/u01/app/oraInventory The Oracle Private Cloud Appliance software is automatically configured with the default Oracle Enterprise Manager agent firewall port (3872) open. If you are not using the default port of 3872 you need to open the firewall as the root user on both the active and passive management nodes to enable the Oracle Enterprise Manager agent to function: [root@ovcamn06r1]# iptables -A INPUT -m state --state NEW -m tcp -p tcp --dport <Chosen Port> -j ACCEPT [root@ovcamn06r1]# service iptables save iptables: Saving firewall rules to /etc/sysconfig/iptables:[ OK ] [root@ovcamn06r1]# service iptables start [root@ovcamn06r1]# service iptables status|grep <Chosen Port> 22 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:<Chosen Port> [root@ovcamn05r1]# iptables -A INPUT -m state --state NEW -m tcp -p tcp --dport <Chosen Port> -j ACCEPT [root@ovcamn05r1]# service iptables save iptables: Saving firewall rules to /etc/sysconfig/iptables:[ OK ] [root@ovcamn05r1]# service iptables start [root@ovcamn05r1]# service iptables status|grep <Chosen Port> 22 ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpt:<Chosen Port> We now need to start the Oracle Enterprise Manager agent either as the root or oracle user on the active management node. Example as the root user: [root@ovcamn06r1 ~]# /etc/init.d/gcstartup start Example as the oracle user: -bash-4.1$ /nfs/shared_storage/oem13agent/agent_inst/bin/emctl start agent Step 7: Remove the blackout state: We now need to remove the indefinite Blackout from the Oracle Private Cloud Appliance physical, logical and virtual components. To do this either go to the Oracle Private Cloud Appliance home page and use the main menu to select Control=>End Blackout. From this page click on the Yes button to stop the Blackout. The Blackout will now be stopped and confirmed by being removed from the Oracle Private Cloud Appliance home page.

Recently we announced the Oracle Private Cloud Appliance (PCA) software 2.3.2 release which adds support for the X7-2 compute nodes. The high level steps for the PCA 2.3.1 to 2.3.2 upgrade with Oracle...

Perspectives

Storage Live Migration on Private Cloud Appliance

In preparing for upgrading our lab Private Cloud Appliance (PCA) to the new release 2.3.2 (more on that later, but read here first) I remembered that we had  already introduced a feature called Storage Live Migration (SLM). That lets you live migrate a VM from one server to another, even when its virtual disks and metadata are on a local file system repository instead of the typical shared SAN or NAS storage resource which would be accessible to both source and target servers. SLM came with Oracle VM 3.4.2, which is part of PCA 2.3.1 which my lab was already running. Why not try it? This could be handy on PCA, since every compute node (Oracle VM Server host) on the Private Cloud Appliance includes a disk repository (named ovcacnXXr1-localfsrepo where XX matches the host name) with about 1TB of capacity, which can be used to augment the internal ZFS storage array and the recommended external storage. With SLM, I could have VMs on local disk storage but still move them to other servers while running. I created a VM on one of the compute nodes, using it's local storage repository. When I had it up and running. I went to live migrate it and selected the option to migrate it and its storage. I then moved to the next screen and picked the destination host: I clicked "Finish" and that kicked off the migration. No muss, no fuss - it Just Worked. Summary Live migration is a widely used and useful administrative procedure that moves a running VM from one server to another without loss of service. It's intended for load balancing VMs across a pool or server or to evacuate a server for maintenance, Storage Live Migration enhances this feature by permitting its use when virtual machine contents are on local storage rather than disk storage available to all the server.  The Private Cloud Appliance has had this capability since PCA 2.3.1 was released last summer, making it an even more agile solution and permitting use of each server's storage capacity.    

In preparing for upgrading our lab Private Cloud Appliance (PCA) to the new release 2.3.2 (more on that later, but read here first) I remembered that we had  already introduced a feature called...

Oracle Private Cloud Appliance

Friday Spotlight: Latest Oracle Private Cloud Appliance Training Released

Oracle Private Cloud Appliance keeps getting better. To get the most out of this engineered system, read about the latest product release and sign up for the just released, Oracle Private Cloud Appliance: Administration training course. Oracle Private Cloud Appliance automates private cloud implementations in a cost-effective way. The Oracle Private Cloud Appliance: Administration training course teaches you to Review the hardware and software in the Private Cloud Appliance Monitor the health of hardware Allocate memory, CPU, network, and storage resources Create, deploy, manage and delete virtual machines Configure the allocation of IaaS resources Configure the Private Cloud Appliance Oracle VM environment Provide IaaS with Oracle Enterprise Manager Cloud Control Manage the efficient allocation of appliance resources Design an effective disaster recovery solution for the Private Cloud Appliance Perform a selection of activities on a simulated lab environment You can take this course in the following formats: Training-on-Demand: Start training straight away, following lecture delivery by expert instructors through streaming video, at your own pace, and booking time to get hands-on experience when suits your needs. Live-Virtual Event: Attend a live event from your own desk, no travel required. Events are added to the schedule to suit different time-zones. In-Class Event: Travel to an education center to take this course. Be the first to register your interest in a date or location for a live-virtual event or in-class event for this newly released course. Resources: Oracle Private Cloud Appliance curriculum Oracle Private Cloud Appliance product documentation Oracle Private Cloud Appliance product page

Oracle Private Cloud Appliance keeps getting better. To get the most out of this engineered system, read about the latest product release and sign up for the just released, Oracle Private Cloud...

Oracle Private Cloud Appliance

Announcing Oracle Private Cloud Appliance Software Release 2.3.2 and X7-2 Compute Nodes

Today, we are pleased to announce Oracle Private Cloud Appliance release 2.3.2. The patch can be downloaded from MOS using patch ID 26982346. The release is applicable to Private Cloud Appliance X3-2, X4-2 and X5-2. Here are some of the new features and enhancements in PCA Release 2.3.2: Support for X7-2 Compute Nodes The most notable change with this release is the support for Oracle X7-2 Compute nodes for PCA that are powered by two Intel® Xeon® 8160 processors with 24 cores per socket. These compute nodes can be ordered in three different memory configurations from the factory – 384GB, 768GB and 1.5 TB, thus providing an optimal balance of cores, memory and I/O for your enterprise applications. Built in VM level Disaster Recovery with SiteGuard at no additional cost VM level Disaster Recovery for all applications except Oracle Database and Oracle WebLogic (as these require separate licenses for application level DR) is included with the PCA at no additional cost.   Other Improvements Oracle VM Server upgrade: This release of PCA also gets an upgrade to the Oracle VM Server release 3.4.4. Oracle VM Server 3.4.4 provides 20-30% improvement in storage refresh times along with fixing a few critical security issues. Improved VLAN support: This release supports 256 VLANs/tenant group* thus further enhancing Oracle PCA’s ability to manage large multi-tenant environments securely.  (* 512 VLANs/tenant group for select customers) This release is a step in our ongoing effort to provide the best in class Enterprise Private Cloud Infrastructure that allows for seamless application consolidation, zero downtime upgrades, automated deployment and configuration management. PCA is the ideal system for providing a homogenized infrastructure for integrating all your mission critical applications. Oracle Enterprise Manager helps operationalize a true hybrid cloud by unified management of Oracle PCA and Oracle Cloud.   Resources Refer to the product documentation for additional details on features and bugs fixed in this release.

Today, we are pleased to announce Oracle Private Cloud Appliance release 2.3.2. The patch can be downloaded from MOS using patch ID 26982346. The release is applicable to Private Cloud Appliance X3-2,...

Friday Spotlight: Hands on Oracle VM for Oracle Cloud Infrastructure

As you know, on November 29th, we've announced Oracle VM for Oracle Cloud Infrastructure. This options allows to easily build an Oracle VM architecture on top of Oracle Cloud Infrastructure by using both Bare-Metal and Virtual-Machine instances. Getting started is very easy with the Oracle VM Requirements and Installation Guide and Oracle images for Server and Manager built, tested and certified by Oracle. So, there is no need to install Oracle VM Server because, thanks to the images available, you only need to "Launch Instance" and choose the correct OCID for the source image: and after some minutes, your Oracle VM Manager/Server instance will be available. You can take advantage of this option on different purposes: Easily test Oracle VM 3.4 without the requirement to buy and/or dedicate new/existing hardware Move your workload to the Cloud while applying the same Oracle VM on-premise know-how Create Virtual Machines with your desired custom shapes, in term of vCPU(s), memory and storage size Create Virtual Machines with your desired Operating System, Kernel release etc etc and many others. By leveraging Oracle Cloud Infrastructure features in term of Networking, Routing, Security Lists, Subnet(s) and more you can also build a secured Cloud solution built on top of Oracle VM: With the options to have two different Virtual NIC types Oracle VM Intra-Network vNIC(s) Created on Oracle VM Infrastructure by using standard interfaces (Oracle VM Manager, CLI, WS-API) Used by Virtual Machines running on Oracle VM This type of network allows communication between the virtual machines running on a single Oracle VM Server, and does not allow external network traffic. OCI vNIC(s) Created on Oracle Cloud Infrastructure environment by using dedicated scripts Used by Virtual Machines running on Oracle VM Grant Private/Public Network access you also have the option to keep everything internal unless the real service supplied by the web-server and/or the reverse-proxy of your application: By leveraging Oracle Cloud Infrastructure features in term of storage, you can use either high-speed, low latency local NVMe storage of DenseIO compute instances, or highly durable Oracle Cloud Infrastructure Block Storage, available on both DenseIO and StandardIO: Oracle VM images are available in all Oracle Cloud Infrastructure regions including Phoenix, Ashburn, and Frankfurt. If you have any questions about Oracle VM on Oracle Cloud Infrastructure, please feel free to reach us at oraclevm-oci-info_ww_grp@oracle.com.

As you know, on November 29th, we've announced Oracle VM for Oracle Cloud Infrastructure. This options allows to easily build an Oracle VM architecture on top of Oracle Cloud Infrastructure by using...

Oracle VM Server for x86

Learn how Oracle VM Powers Demanding Workloads

Oracle VM is a proven solution for enterprise tier-1 applications. Oracle VM powers the most demanding customer workloads on Oracle Engineered Systems, as well as workloads on and off cloud. If you already experienced in installing Oracle VM, further your skills by taking the Oracle VM Server for x86: Implementation course. This course is available in the following formats: Training-on-Demand: Start training straight away. Follow lecture delivery by expert instructors through streaming video, at your own pace, and book time to get hands-on experience whenever suits your needs. Live-Virtual Event: Attend a live event from your own desk, no travel required. Events are added to the schedule to suit different time-zones. Events currently on the schedule include 5 December 2017, and 6 and 21 February, 7, 14 and 20 March 2018. In-Class Event: Travel to an education center to take this course. In-Class events on the schedule include: Location Date Delivery Language Melbourne, Australia 4 December 2017 English Paris, France 4 April 2018 French Milan, Italy 18 December 2017 Italian Wellington, New Zealand 13 December 2017 English Orlando, Florida 30 May 2018 English If you are new to Oracle VM, you can start learning by taking the Oracle VM Server for x86: Administration course. Resources: To register for an event or to learn more about Oracle VM training, go to http://education.oracle.com/virtualization Oracle VM Server for x86 and Oracle VM Manager Product Documentation Oracle VM Server for x86 product pages Oracle VM Server for x86 and Oracle VM Manager Downloads

Oracle VM is a proven solution for enterprise tier-1 applications. Oracle VM powers the most demanding customer workloads on Oracle Engineered Systems, as well as workloads on and off cloud. If you...

Oracle Private Cloud Appliance

Build your own Enterprise Private Cloud with Oracle Private Cloud Appliance

There are many reasons to adopt Oracle Private Cloud Appliance when building your own Enterprise Private Cloud. With Private Cloud Appliance you get IaaS out-of-the box in minutes. The combination of Private Cloud Appliance and Oracle Enterprise Manager delivers self-service portal, metering and chargeback, and all with no additional license required. To get the most out of Private Cloud Appliance, take the Oracle Private Cloud Appliance: Administration training. You can take this training in the following formats: Training-on-Demand: Start training straight away, following lecture delivery by expert instructors through streaming video, at your own pace, and booking time to get hands-on experience when suits your needs. Live-Virtual Event: Attend a live event from your own desk, no travel required. Events are added to the schedule to suit different time-zones. Events currently on the schedule include 30 November 2017. In-Class Event: Travel to an education center to take this course. Register your interest in a location and date to have an event added to the schedule. Resources: Oracle Private Cloud Appliance curriculum Oracle Private Cloud Appliance product documentation Oracle Engineered Systems products page

There are many reasons to adopt Oracle Private Cloud Appliance when building your own Enterprise Private Cloud. With Private Cloud Appliance you get IaaS out-of-the box in minutes. The combination of...

Oracle Secure Global Desktop

Friday Spotlight: Security Patch Set Updates for Oracle Secure Global Desktop 5.3

New Security and JVM Patches Now Available We have released an important Patch Set Update (PSU) for Oracle Secure Global Desktop (SGD) in parallel with Oracle's October 2017 CPU, 5.3p2. PSUs are maintenance patch roll-ups, and include critical security and stability fixes for identified maintenance platforms. The following reference documentation has been updated in parallel with these releases, and includes detailed information regarding the content of these updates, as well as instructions for procuring and installing the patches in existing Oracle SGD deployments. Oracle SGD 5.3 ​Patch Set Updates for Oracle Secure Global Desktop 5.3 (Doc ID 2255450.1) As always: these changes have been documented within the ever-evolving Patch Matrices of the Oracle SGD Release Announcement Reference: the one-stop-shop for the latest publicly available updates for Oracle SGD! Oracle Secure Global Desktop Release Announcement Reference (Doc ID 2093579.2) More information on Oracle Critical Patch Update Advisories, including details for Oracle's October 2017 announcement can be found here: http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html New JVM Updates now available for Oracle SGD server and Oracle SGD Gateway, versions 5.3 We also published a JVM Update for Oracle SGD 5.3. The following reference documentation has been updated, and includes instructions for procuring and installing JVM updates within existing Oracle SGD deployments.  Java Virtual Machine Updates for Secure Global Desktop (Doc ID 1585558.1) These JVM patches have also been documented within the ever-evolving Patch Matrices of the SGD Release Announcement Reference: Oracle Secure Global Desktop, Release Announcement Reference (Doc ID 2093579.2)

New Security and JVM Patches Now Available We have released an important Patch Set Update (PSU) for Oracle Secure Global Desktop (SGD) in parallel with Oracle's October 2017 CPU, 5.3p2. PSUs are...

Oracle Secure Global Desktop

Friday Spotlight: Use SGD to automatically provision and access OCI VM serial consoles

I have created a Proof of Concept (POC) how to use the Python SDK to manage access to VM serial consoles in Oracle Cloud Infrastructure (OCI). This POC currently is implemented by creating an Oracle Secure Global Desktop (SGD) application that launches a python script on the SGD server. Problem Statement There is a feature for VM shapes provisioned in OCI that allows to create a connection to the serial console of the VM to troubleshoot issues that might have occurred when booting the VM. In order to create this connection, access to the OCI Web Console or the API is required. Finally access via ssh can be established to the console. The ssh command to accomplish this is a little bit involved and requires some familiarity with the ssh command options, and even more tweaking when using it from Windows with putty, for example. Here is an example ssh command ssh -o ProxyCommand='ssh -W %h:%p -p 443 ocid1.instanceconsoleconnection.oc1.phx.abyhqljrgt3wvfxt765457ew3hpk7mwibnhnyo2rltyv3icfbfahwjmstava@instance-console.us-phoenix-1.oraclecloud.com' ocid1.instance.oc1.phx.abyhqljrks2ie4ph25d266gpua7q52j3oaft2uoytc7wr2nojxsum3zezbpq Use Cases Simplify access to Serial Consoles in OCI Give users who don't have API credentials access to OCI resources Granular Access Control to Serial Consoles for users who do NOT have API access Proof of Concept This POC script does the following relies on a properly configured OCI SDK on the SGD server provides its own generic ssh key for the console connection supports profiles lists compartments lists VMs in a compartment checks if a VM has a Serial Console Connection configured (SC) checks if the  SC has been configured through the POC script and deletes it if it has been created outside the POC creates a SC with a generic ssh key known to the POC drops the SGD user into the console of selected VM Serial Console Access without SGD In order for a user to access the Serial Console of a VM, valid credentials for the OCI API are required. Either the user goes to the Web UI and creates the SC and then uses the provided ssh command to connect, or does the same via oci-cli Both ways will require the user to either specify the used ssh key as the default key in ${HOME}/.ssh/id_rsa or modify the command to include the required key, twice. Serial Console Access with SGD All a user needs is access to an SGD server configured with this POC. After authentication to the SGD server, the user is offered the typical workspace in the web browser. After launching the OCI Console SGD application (name is arbitrary) the user will be presented with a menu to choose the VM to connect to and either a Serial Console Connection is being created on the fly, or an existing SC is being used and the appropriate ssh command is being launched All the user needs to know are the credentials for SGD, no OCI API setup needs to be performed on the users system.

I have created a Proof of Concept (POC) how to use the Python SDK to manage access to VM serial consoles in Oracle Cloud Infrastructure (OCI). This POC currently is implemented by creating an Oracle...

Oracle VM VirtualBox

Oracle VM VirtualBox 5.2 is now available!

Oracle VM VirtualBox 5.2 delivers security updates and cumulative bug fixes since the previous 5.1 major release. Notable enhancements in this release: VM export to Oracle Cloud Infrastructure Classic (OCI Classic) format Automatic, unattended guest OS installation for Oracle VM VirtualBox Virtual Machines Improved Virtual Machine Tools, including a new dynamic interface to manage Virtual Machine configuration and snapshot capabilities New Global Tools handling Virtual Media Manager manages media attributes like size, location, type and description Host Network Manager simplifies managing corresponding networks and their attributes GUI accessibility New GUI icons for VirtualBox on all platforms (Windows, Linux, Oracle Solaris and Mac OS X) Enhanced Virtual Machine Selector Extended audio settings, with the option to enable/disable audio input/output Snapshot Pane updates allow easier management of snapshot attributes, like name and description Audio Device enumeration support for audio backends (optional) Support for host device callbacks (optional) and further enhancements HDA emulation now uses asynchronous data processing in separate threads Storage Support for CUE/BIN images as CD/DVD media including multiple tracks Support for the controller memory buffer feature for NVMe All enhancements and fixes can be found in the official Oracle VM VirtualBox change-log file. Oracle VM VirtualBox Supported Upgrade Path Oracle VM VirtualBox can be easily upgraded from older releases, like 4.x or 5.x, to the 5.2 release on all platforms. Oracle VM VirtualBox Product Support       All "Host" and "Guest" platforms supported can be found at this link. Oracle VM VirtualBox Software Download Oracle VM VirtualBox GA releases are available at oracle.com.  Oracle VM VirtualBox Test-build release can be downloaded at virtualbox.org. Oracle VM VirtualBox Overview To enable organizations and developers to more easily and flexibly create and deploy on-premises and cloud applications, Oracle has announced that Oracle VM VirtualBox 5.2, the latest release of the world’s most popular free and open source, cross-platform virtualization software, is generally available today. A key tool for developers and users creating cloud and local applications without the overhead of using a full server environment, Oracle VM VirtualBox runs on standard x86 desktop and laptop computers. It allows users to set up multi-platform virtual machine environments for software development, testing, and general purpose operating system (OS) virtualization, with optional runtime encryption. Software engineers can develop for cloud technologies such as Docker and OpenStack from within Oracle VM VirtualBox VMs directly on their Windows, Mac OS X, Linux, and Oracle Solaris machines, making it easier to create multi-tier applications with just a standard laptop. Oracle VM VirtualBox also enables users to create and update virtual machines locally, including the OS and applications, and then package them into an industry standard file format for easy distribution and cloud deployment in conjunction with Oracle VM Server, or other server virtualization solutions. Oracle VM VirtualBox allows users to run nearly any standard x86 OS to run applications that are not available natively on their systems. Resources  Documentation Oracle VM VirtualBox Software Download Oracle VM VirtualBox Blogs  Oracle Virtualization Blog Simon Coter's Blog Social Media Oracle VM VirtualBox on Facebook Oracle Virtualization on Twitter Oracle Virtualization on Google+ Data Sheets, White Papers, Videos, Training, Support & more Oracle VM VirtualBox Further development utilities Pre-built Developer Virtual Machines for Oracle VM VirtualBox

Oracle VM VirtualBox 5.2 delivers security updates and cumulative bug fixes since the previous 5.1 major release. Notable enhancements in this release: VM export to Oracle Cloud Infrastructure Classic...

Oracle OpenWorld 2017 Recap, Presentations and Content

We had an amazing Oracle OpenWorld in San Francisco this year! Just check out some of the numbers above. Over 60,000 attendees,18 million+ online views, thousands of sessions with speakers from over 90 countries. However, If you were not able to attend, no worries! You can still access much of the content online. Here's a quick recap for you: Watch Keynotes online Download Oracle Linux and Virtualization presentation slides: Five Key Steps to Automating Your Workload Migration to Cloud [SUN6469] Migrating Your Traditional Data Center to Open Cloud Infrastructure [SUN6533] OPN Central: Oracle Cloud Infrastructure Software Can Help Grow Your Business [CON6742] Complete Management and Monitoring Solution for Cloud Infrastructure [THT8170] Tips for Securing Your Docker Containers [CON6462] Increase Performance with Oracle Linux and Oracle VM [CON6498] Implement a Business Continuity Solution for Your Open Cloud Infrastructure [CON6745] Secure Your Open, Cloud-Ready Infrastructure Without Disrupting Your Operations [CON6468] Secure Application Access in the Cloud or On-Premises [CON6471] Secure and Agile Orchestration for Docker Containers [THT8169] Automating Your Workload Migration to Oracle Cloud Infrastructure [THT8171] DevOps Best Practices for Your Cloud Deployment [CON6743] Easy, Rapid Deployment of Oracle Database and Oracle RAC with Oracle OpenStack [CON6470] Oracle and the Linux Foundation [CON8109] A Fireside Chat with Oracle Linux and Oracle VM Product Management Team [BQS7804] Performance Optimization for Oracle Cloud Infrastructure [THT8135]  Best Practices for Maximizing Oracle Database Performance with Oracle Linux/EMC [CON8090] Watch the Dev Live session: Develop on the desktop of your choice and deploy to the cloud with Oracle VirtualBox   Watch what Deutsche Telekom's Gregor Buchner had to say about Oracle Exadata and Oracle Linux Comet Enterprises announced a new solution that embeds Oracle VM VirtualBox with its cutting-edge LeVAULT security software And here's what some of our customers shared about Oracle Linux and Virtualization during the conference: Don't forget to follow us on twitter.com/oraclelinux and like us on facebook.com/OracleLinux/.

We had an amazing Oracle OpenWorld in San Francisco this year! Just check out some of the numbers above. Over 60,000 attendees,18 million+ online views, thousands of sessions with speakers from over...

FRIDAY SPOTLIGHT: United Airlines slashes downtime to update server fleet

Happy Friday! It had been a very busy week for us wrapping up Oracle OpenWorld and gathering information for you to understand key news and activities during that time if you have not attended this great event in person. Please monitor this blog and Oracle Linux blog for detailed Oracle OpenWorld re-cap on Monday, October 16.  During Oracle OpenWorld one of our customers United Airlines had a great presentation about kernel patching and how to avoid downtime with Oracle KSplice which is available for Oracle Linux and Oracle VM as part of Premier Support offering.  In this article by ITNews' By Sholto Macpherson talks about how United Airlines reduces downtime: " United Airlines has moved to synchronise its patch cycles across Windows and Linux servers and cut administrative effort out of applying updates to applications running on top of its infrastructure. The airline operates three data centres in Chicago, Denver and San Francisco, which collectively house nine Oracle converged Oracle SuperClusters, as well as HP blade servers running Oracle Linux.  ...Unix engineering senior manager Marshall Weymouth told the recent Oracle Openworld 2017 conference that the airline's security team wanted the Windows and Linux teams to synchronise their patch cycles. This was primarily to reduce pain for sysadmins, security, change management, application teams and airline customers. "Patching and updating meant rebooting servers that would affect applications co-ordinating 5000 daily departures for our 700-plane fleet," Weymouth said. “When you say 'reboot' to change management people, they panic. You need 10 days to discuss it. Then you have to bubble it up to application management teams and that was [all] pretty painful...." Read more. Oracle  Get more information about Oracle Linux Support and Oracle VM  support.

Happy Friday! It had been a very busy week for us wrapping up Oracle OpenWorld and gathering information for you to understand key news and activities during that time if you have not attended this...

Perspectives

Upgrade to Oracle Container Runtime for Docker Release 17.06

Oracle Container Runtime allows you to create and distribute applications across Oracle Linux systems and other operating systems that support Docker. Oracle Container Runtime for Docker consists of the Docker Engine, which packages and runs the applications, and integrates with the Docker Hub, Docker Store and Oracle Container Registry to share the applications in a Software-as-a-Service (SaaS) cloud. The Oracle Container Runtime for Docker Release 17.06 is the latest release available on Oracle Linux 7 (x86_64). The current release of Oracle Container Runtime for Docker is based on the upstream Docker 17.06 release and incorporates the changes present in subsequent upstream releases since the previous release. Here's an example to show the easy upgrade from an earlier version of Docker engine 17.03.1-ce to the latest release 17.06. # docker --version Docker version 17.03.1-ce, build 276fd32 Before the upgrade, make sure that you subscribe to the appropriate channels from Oracle Unbreakable Linux Network (ULN): Oracle Linux 7 Addons (x86_64) Oracle Linux 7 Latest (x86_64) Unbreakable Enterprise Kernel Release 4 for Oracle Linux 7 (x86_64) Similarly, if you are using Oracle Linux Yum Server, enable ol7_latest, ol7_uekr4 and ol7_addons channels in your Oracle Linux 7 yum repository setting. Next you simply run yum upgrade docker-engine command to perform the upgrade. If it's a fresh install, use yum install docker-engine. # yum upgrade docker-engine Loaded plugins: langpacks, rhnplugin, ulninfo This system is receiving updates from ULN. ol7_x86_64_addons | 1.2 kB 00:00 ol7_x86_64_addons/updateinfo | 39 kB 00:00 ol7_x86_64_addons/primary | 77 kB 00:00 ol7_x86_64_addons 247/247 Resolving Dependencies --> Running transaction check ---> Package docker-engine.x86_64 0:17.03.1.ce-3.0.1.el7 will be updated ---> Package docker-engine.x86_64 0:17.06.2.ol-1.0.1.el7 will be an update --> Processing Dependency: container-selinux >= 2.9 for package: docker-engine-17.06.2.ol-1.0.1.el7.x86_64 --> Running transaction check ---> Package container-selinux.noarch 2:2.21-1.el7 will be installed --> Finished Dependency Resolution Dependencies Resolved ================================================================================ Package Arch Version Repository Size ================================================================================ Updating: docker-engine x86_64 17.06.2.ol-1.0.1.el7 ol7_x86_64_addons 21 M Installing for dependencies: container-selinux noarch 2:2.21-1.el7 ol7_x86_64_addons 28 k Transaction Summary ================================================================================ Install ( 1 Dependent package) Upgrade 1 Package Total download size: 21 M Is this ok [y/d/N]: y Downloading packages: No Presto metadata available for ol7_x86_64_addons (1/2): container-selinux-2.21-1.el7.noarch.rpm | 28 kB 00:00 (2/2): docker-engine-17.06.2.ol-1.0.1.el7.x86_64.rpm | 21 MB 00:12 -------------------------------------------------------------------------------- Total 1.6 MB/s | 21 MB 00:13 Running transaction check Running transaction test Transaction test succeeded Running transaction Installing : 2:container-selinux-2.21-1.el7.noarch 1/3 Updating : docker-engine-17.06.2.ol-1.0.1.el7.x86_64 2/3 Cleanup : docker-engine-17.03.1.ce-3.0.1.el7.x86_64 3/3 Verifying : docker-engine-17.06.2.ol-1.0.1.el7.x86_64 1/3 Verifying : 2:container-selinux-2.21-1.el7.noarch 2/3 Verifying : docker-engine-17.03.1.ce-3.0.1.el7.x86_64 3/3 Dependency Installed: container-selinux.noarch 2:2.21-1.el7 Updated: docker-engine.x86_64 0:17.06.2.ol-1.0.1.el7 Complete! Verify you've installed the latest version: # docker --version Docker version 17.06.2-ol, build d02b7ab To learn more, read the documentation Oracle Linux 7 Oracle Container Runtime for Docker User's Guide Oracle Linux Container Services for use with Kubernetes User's Guide

Oracle Container Runtime allows you to create and distribute applications across Oracle Linux systems and other operating systems that support Docker. Oracle Container Runtime for Docker consists of...

OOW17: Your Wednesday Guide

On this fourth day of the conference, we have many great Oracle Linux and Virtualization sessions and hands-on labs that we hope you can attend. These are the last sessions for us at the conference this year: We have 4 conference sessions at the Marriott Marquis: 1:00 p.m. - 1:45 p.m. - DevOps Best Practices for Your Cloud Deployment [CON6743] @ Marriott Marquis (Yerba Buena Level) - Salon 13 3:30 p.m. - 4:15 p.m. - Easy, Rapid Deployment of Oracle Database and Oracle RAC with Oracle OpenStack [CON6470] @ Marriott Marquis (Yerba Buena Level) - Salon 13 3:30 p.m. - 4:15 p.m. - Oracle Linux in Oracle Cloud Infrastructure [CON8108] @ Marriott Marquis (Yerba Buena Level) - Salon 15 4:30 p.m. - 5:15 p.m. - Oracle and the Linux Foundation [CON8109] @ Marriott Marquis (Yerba Buena Level) - Salon 15 Don't miss our  new Burning Questions session where anextended Q&A format allows for all of our attendees to have their most pressing questions answered. It's part of Collective Learning, which is a new series of session formats focused on learning, retention, and exchange of information.   5:30 p.m. - 6:15 p.m. - A Fireside Chat with Oracle Linux and Oracle VM Product Management Team [BQS7804] @ Oracle Cloud Plaza - Collective Learning Room 1 We also have 2 hands-on labs at the Hilton: 8:00 a.m. - 9:00 a.m. -  Creating a Private Cloud in Minutes with Oracle Enterprise Manager and Oracle VM [HOL4739] @ Hilton San Francisco Union Square (Ballroom Level) - Continental Ballroom 5 3:00 p.m. - 4:00 p.m. - Building Development Environments with Docker and Software Collections [HOL7550]  @ Hilton San Francisco Union Square (Ballroom Level) - Continental Ballroom 3 Today is also your last chance to visit us at the demogrounds at Moscone West, to have one-on-one discussion with our experts, provide your insights at the IT Central Station kiosk, pick up up some cool tchotchkes and win some great prizes! While you are there stop by and listen to our last mini theater session: 10:30 a.m. - 10:50 a.m. - Performance Optimization for Oracle Cloud Infrastructure [THT8135] @ The Exchange @ Moscone West - Showcase Theater 2 For developers we have a second lightning talk at the Developer Lounge/Workshop DevLive stage @ Moscone West: 3:30 p.m. - 4:00 p.m. -  DevOps with Oracle Linux and Virtualization What better way to end the day than by going to a big party under the stars! Go to AT&T park @ 7pm for this year's Oracle CloudFest.17 where you can enjoy a night of fun and dancing with two of today's top entertainers: The Chainsmokers and Ellie Goulding! Its only a 15-minute walk from Moscone center and your ticket for it is included in your full conference pass. Have a great day and dance the night away!

On this fourth day of the conference, we have many great Oracle Linux and Virtualization sessions and hands-on labs that we hope you can attend. These are the last sessions for us at the conference...

Virtualization

OOW17: Your Tuesday Guide

Today starts with the Keynote: Oracle's Integrated Cloud Platform, Intelligent Cloud Applications, and Emerging Technologies for Business where Thomas Kurian and Dave Donatelli detail how Oracle Cloud helps your business seize opportunity in a rapidly changing and increasingly competitive environment.  Then the Oracle Linux and Virtualization team has prepared a variety of topics for you to choose from: Stop by our demogrounds at Moscone West which opens at 11 am today, to talk to our  product experts one-on-one. You can also provide your insights and reviews at the IT Central Station: Peer-to-Peer Reviews for Oracle Linux and Virtualization @ Workstation:SOA-108 in the same area. Don't miss our General Session: 12:45 p.m. - 1:30 p.m. - Oracle Linux – State of the Penguin [GEN6459] @ Marriott Marquis (Golden Gate Level) - Golden Gate A We have 3 conference sessions today all @ Marriott Marquis (Yerba Buena Level) - Salon 13: 3:45 p.m. - 4:30 p.m. - Implement a Business Continuity Solution for Your Open Cloud Infrastructure [CON6745] 4:45 p.m. - 5:30 p.m. - Secure Your Open, Cloud-Ready Infrastructure Without Disrupting Your Operations [CON6468] 5:45 p.m. - 6:30 p.m. - Secure Application Access in the Cloud or On-Premises [CON6471] Check out our "Flipped Session",  a two-part session format that give you a chance to apply our content to your real-world challenges. Its part of the Collective Learning sessions: a new series of session formats focused on learning, retention, and exchange of information. 4:45 p.m. - 5:30 p.m. Agile Security for Cloud-Based Infrastructure [FLP7825]  The Exchange @ Moscone South - Collective Learning Room - Booth 1509 We have 3 mini theater sessions today all at the The Exchange @ Moscone West - Showcase Theater 1: 2:00 p.m. - 2:20 p.m. - Secure and Agile Orchestration for Docker Containers [THT8169] 4:30 p.m. - 4:50 p.m. - Automating Your Workload Migration to Oracle Cloud Infrastructure [THT8171] 5:00 p.m. - 5:20 p.m. - Modernize Your Data Centers with Oracle Cloud Infrastructure [THT8134] If you are a developer, come by to our lightning talk at the Developer Lounge/Workshop DevLive stage @ Moscone West: 3:30 p.m. - 4:00 p.m . - Develop on the desktop of your choice and deploy to the cloud with Oracle VirtualBox   Looking forward to seeing many of you at the Oracle Linux and Virtualization Customer Dinner tonight! Have a great day!

Today starts with the Keynote: Oracle's Integrated Cloud Platform, Intelligent Cloud Applications, and Emerging Technologies for Business where Thomas Kurian and Dave Donatelli detail how Oracle Cloud...

Virtualization

OOW17: Your Monday Guide

Did you enjoy your Sunday at the conference? Did you like having conference sessions starting right on Sunday? Well, we have a great line up of sessions and hand-on labs on Oracle Linux and Virtualization topics for you today. The day starts with the 9:00 AM Keynote:The Cloud: Transformational. Innovative. Foundational.​ where Oracle CEO Mark Hurd and Oracle customers—Bloom Energy, FedEx and Gap— look at where we are now and where we're headed in a cloud foundational world. Right after that the exhibit halls open and you can head to Moscone West to visit us at the IT Infrastructure demogrounds.  You can stop by and listen to our first mini theater presentation there @ Showcase Theater 2: 10:30 a.m. - 10:50 a.m.  - Complete Management and Monitoring Solution for Cloud Infrastructure [THT8170] Our General Sessions are not to be missed:  11:00 a.m. - 12:30 p.m. - Oracle's Systems Strategy for Cloud and On-Premises [GEN8012] @ Moscone South - The Arena @ The Exchange Wim Coekaerts, Senior Vice President, Operating Systems and Virtualization Engineering, Oracle Ali Alasti, SVP, Hardware Development, Oracle Edward Screven, Chief Corporate Architect, Oracle 2:15 p.m. - 3:00 p.m. - Strategies for Building Open, Cloud-Ready Infrastructure [GEN6456]  @ Marriott Marquis (Golden Gate Level) - Golden Gate A Robert Shimp, Group Vice President, Technology Business Group , Oracle Ajay Srivastava, SVP, Linux & Virtualization , Oracle We have 2 conference sessions in the afternoon: 1:15 p.m. - 2:00 p.m. -  Tips for Securing Your Docker Containers [CON6462]  @  Marriott Marquis (Yerba Buena Level) - Salon 13 4:45 p.m. - 5:30 p.m. -  Increase Performance with Oracle Linux and Oracle VM [CON6498] @ Marriott Marquis (Yerba Buena Level) - Salon 13 and 3 hands-on labs to choose from: 12:45 p.m. - 1:45 p.m. -  Migration to the Oracle Open Cloud Infrastructure [HOL7552] @ Hilton San Francisco Union Square (Ballroom Level) - Continental Ballroom 3 2:30 p.m. - 3:30 p.m.  -  Practical DevOps with Linux and Virtualization [HOL7554] @  Hilton San Francisco Union Square (Ballroom Level) - Continental Ballroom 3 4:15 p.m. - 6:15 p.m. -  Systems Management with Spacewalk 2.6 [HOL7551] @ Hilton San Francisco Union Square (Ballroom Level) - Continental Ballroom 3 See you at the sessions and demogrounds!

Did you enjoy your Sunday at the conference? Did you like having conference sessions starting right on Sunday? Well, we have a great line up of sessions and hand-on labs on Oracle Linux...

Virtualization

Oracle OpenWorld 2017: Your Sunday Guide

   On this first day of Oracle OpenWorld 2017 in beautiful San Francisco, there are many exciting events and sessions for you to attend and start the conference on the right note. This year, for the first time, we have two conference sessions on Sunday. Both are @ Moscone South - Room 152 :  10:45 a.m. - 11:30 a.m. - Five Key Steps to Automating Your Workload Migration to Cloud [SUN6469] 1:45 p.m. - 2:30 p.m.  -  Migrating Your Traditional Data Center to Open Cloud Infrastructure [SUN6533] In the morning, we also have two partner sessions @ Marriott Marquis (Golden Gate Level) - Golden Gate B: 10:00 a.m. - 11:00 a.m. -  OPN Central: Oracle Cloud Infrastructure Software Can Help Grow Your Business [CON6742] 11:15 a.m. - 12:15 p.m.  - OPN Central: Drive New Cloud Opportunities with Oracle’s Linux and Virtualization [CON6414] Followed by the keynote for partners:  1:00 – 2:30 PM Oracle PartnerNetwork Keynote Salon 7- 9 (Yerba Buena Ballroom) Speakers include: Mark Hurd & Dave Donatelli. Host: Penny Philpot  At 1 pm, outside the main entrance to Moscone South you can join San Francisco’s Mayor Ed Lee and Oracle’s SVP and CMO Judy Sim at a ribbon cutting ceremony to commemorate the largest technology conference to be held in the newly redesigned Moscone Center. Attendees will receive an Oracle hoodie while supplies last.  Don't miss the Oracle OpenWorld Opening Keynote: 5:00-7:00 pm  @ Moscone North, Hall D Larry Ellison, CTO and Executive Chairman, Oracle Oracle Cloud and the Future of Data Doug Fisher, Senior Vice President and General Manager, Software and Services Group, Intel Data: Front and Center If you are an Oracle partner, you can head over to the Metreon City View Terrace – 4th Floor for the famed Oracle PartnerNetwork AfterDark Reception,  right after the keynote.  Hope you enjoy these sessions and events. Don't forget to share your thoughts and highlights at #oow17!

   On this first day of Oracle OpenWorld 2017 in beautiful San Francisco, there are many exciting events and sessions for you to attend and start the conference on the right note. This year, for the...

Virtualization

Top 10 Things to Do at Oracle OpenWorld 2017

Oracle OpenWorld begins this Sunday in the beautiful city of San Francisco. We hope to see you there, where you will not only have access to so many sessions, training opportunities and insights from experts and peers, but can also have lots of fun!  Top 10 Things To Do at OOW17 1. Attend the Keynotes by Larry Ellison, Mark Hurd, Dave Donatelli and many other key executives.  2. Register for Oracle Linux and Virtualization General Sessions by Edward Screven, Ajay Srivastava and Wim Coekaerts: Oracle's Systems Strategy for Cloud and On-Premises [GEN8012] Strategies for Building Open, Cloud-Ready Infrastructure [GEN6456] Oracle Linux – State of the Penguin [GEN6459] 3. Attend our sessions and hands-on labs that match your interest. The latest complete list is included in our Focus on Document. 4. Visit our booths in the Mascone West, IT infrastructure demogrounds for one-on-one conversations with our product experts. Demogrounds maps here. Booth topics and numbers are listed in the same Focus on Document. 5. Share your insights with your peers at the IT Central Station kiosk in the same demogrounds. It's like Yelp or TripAdvisor, but for enterprise software solutions. Examples here. 6. Attend the lightning talks at the Developer Lounge in Moscone West: Develop on the desktop of your choice and deploy to the cloud with Oracle VirtualBox - Tuesday 3:30-4:00 pm DevOps with Oracle Linux and Virtualization - Wednesday 3:30-4:00 pm 7. Stop by the two showcase theaters in our demogrounds and listen to short interesting presentations and enter drawings for cool prizes. You can find the list in our Focus on Document. 8. Watch our twitter channel @OracleLinux for daily updates and highlights and re-tweet with #oow17 and #cloudready. 9. Don't miss the Wednesday night Cloud Fest featuring the Chainsmokers and Ellie Gouldingthe 7-10 pm @ the AT&T park!  Make sure your phone has room for pictures! 10. Enjoy San Francisco and all that it has to offer! The Oracle Linux and Virtualization Team

Oracle OpenWorld begins this Sunday in the beautiful city of San Francisco. We hope to see you there, where you will not only have access to so many sessions, training opportunities and insights from...

Oracle Secure Global Desktop

Security Challenges when moving into the Cloud

A recent article in the Wall Street Journal described an increasing danger of companies exposing sensitive information after a move to the cloud. Services and data that used to live in tightly controlled data centers on a companies premises, often not even accessible from the open internet, have been migrated into cloud-hosted environments. Along the way, configuration mistakes might have been made, or third parties were given access to facilitate the transition. While cloud providers offer the necessary solutions to harden network access into hosted environments, the issues highlighted in the article have more to do with the sudden need, and sometimes the inconvenience, of securely accessing data and applications that used to be local and are now remote. When something is inconvenient, we tend to create shortcuts. For example, in order to access IaaS instances provisioned in the cloud, a public SSH key needs to be provided when instantiating the instance, since ssh access with a password is not permitted. This is done to prevent brute force password hacking attacks from the open internet. In order to manage these instances, especially by multiple people, additional public keys need to be added to allow remote access, or the private key needs to be shared between multiple people, which is not recommended. Once access is possible, individuals can login to cloud-hosted environments and transfer data in and out. To make matters worse, it is hard to monitor who is doing what with unfettered ssh access. Here is how Oracle Secure Global Desktop can help solve this problem With Oracle Secure Global Desktop (Oracle SGD) all access into the cloud-hosted environments, IaaS, SaaS and PaaS, can be provided through a centralized web interface over HTTPS. User authentication can be integrated with existing identity management systems, or implemented separately. Access to applications and systems, as well as the flow of data, is strictly controlled by a granular authorization system built into Oracle SGD. A user launches applications like a terminal connection, or entire desktop environments, via a single click in the user's Oracle SGD workspace. Only authorized applications and servers will be listed. The naming of applications and servers can be abstracted as well and does not have to be the actual hostname of the system. For example, Oracle SGD lists access to your  DB production Tag Name and DB development Tag Name , instead of db01.sub09151850171.example.oraclevcn.com and db02.sub09151850171.example.oraclevcn.com , thus preventing confusion on which systems to perform certain tasks. Oracle SGD itself is a non-intrusive, completely software based solution. No additional modules or utilities need to be installed on any IaaS, PaaS or SaaS instance. Oracle SGD sits in between the user and the actual systems the user needs to have access to, thus providing a well-managed control point. Once a user is deemed to no longer need access to a particular resource, a simple change in Oracle SGDs configuration, via web UI or command line, will remove the resource in question from a users choice, regardless of whether passwords are known or ssh public keys are had. For customers with even more specific security requirements, our partner Amitego provides a suite of additional modules called VISULOX, implemented on top of Oracle SGD, unique in its ability to manage, monitor, document, check and approve all remote access by internal and external administrators to critical business systems. VISULOX together with Oracle SGD provides a unique solution for recording of sessions, dual control and many other features. Customers with existing deployments of SunRay or interested in a Thin Client solution for accessing centrally provisioned resources, I want to mention our partner Stratodesk and their product No Touch OS and No Touch Center. The No Touch product pallet supports not only any x86 based platform on the market, but allows allows management of multiple, heterogeneous vendor Thin Client HW devices. Of course Stratodesk fully supports Oracle SGD. Visit us at Oracle Open World 2017 for our presentation CON6471 Secure Application Access in the Cloud or On-Premises on Tuesday at 5:45-6:00PM in the Marriott Marquis Salon. You can find more information at our Oracle Secure Global Desktop website.

A recent article in the Wall Street Journal described an increasing danger of companies exposing sensitive information after a move to the cloud. Services and data that used to live in...

Perspectives

Ksplice Zero-downtime Patching for User Space Packages

Oracle has provided thousands of Ksplice kernel patches to address Linux kernel security issues. But many vulnerabilities are in user space. Heartbleed is a good example of a huge user space openssl vulnerability that left thousands of servers at risk and cost companies hundreds of millions of dollars. glibc is another essential package in user space. With Ksplice for Oracle Linux, you are able to install bug fixes and protect your system against security vulnerabilities, in the user space or kernel, without having to restart your running process, service, or system. It's easy and simple to install the Ksplice enhanced client for Oracle Linux 7 and Oracle Linux 6. You manage the enhanced Ksplice client by using the ksplice command to patch in-memory pages of Ksplice-aware shared libraries such as glibc and openssl for user space processes in addition to the kernel updates. First, subscribe to the Ksplice channels on Unbreakable Linux Network (ULN). For Oracle Linux 7, they are Ksplice for Oracle Linux 7 (x86_64) Ksplice aware userspace packages for Oracle Linux 7 (x86_64) Second, install the Ksplice enhanced client. # yum install -y ksplice Loaded plugins: langpacks, rhnplugin, ulninfo This system is receiving updates from ULN. ol7_x86_64_ksplice | 1.2 kB 00:00 ol7_x86_64_ksplice/updateinfo | 2.6 kB 00:00 ol7_x86_64_ksplice/primary | 397 kB 00:00 ol7_x86_64_ksplice 3739/3739 Resolving Dependencies --> Running transaction check ---> Package ksplice.x86_64 0:1.0.25-1.el7 will be installed --> Processing Dependency: ksplice-tools = 1.0.25-1.el7 for package: ksplice-1.0.25-1.el7.x86_64 --> Processing Dependency: ksplice-core0 = 1.0.25-1.el7 for package: ksplice-1.0.25-1.el7.x86_64 --> Running transaction check ---> Package ksplice-core0.x86_64 0:1.0.25-1.el7 will be installed --> Processing Dependency: libboost_filesystem-mt.so.1.53.0()(64bit) for package: ksplice-core0-1.0.25-1.el7.x86_64 --> Processing Dependency: libboost_regex-mt.so.1.53.0()(64bit) for package: ksplice-core0-1.0.25-1.el7.x86_64 --> Processing Dependency: libboost_python-mt.so.1.53.0()(64bit) for package: ksplice-core0-1.0.25-1.el7.x86_64 ---> Package ksplice-tools.x86_64 0:1.0.25-1.el7 will be installed --> Running transaction check ---> Package boost-filesystem.x86_64 0:1.53.0-27.el7 will be installed ---> Package boost-python.x86_64 0:1.53.0-27.el7 will be installed ---> Package boost-regex.x86_64 0:1.53.0-27.el7 will be installed --> Finished Dependency Resolution Dependencies Resolved ================================================================================ Package Arch Version Repository Size ================================================================================ Installing: ksplice x86_64 1.0.25-1.el7 ol7_x86_64_ksplice 5.0 k Installing for dependencies: boost-filesystem x86_64 1.53.0-27.el7 ol7_x86_64_latest 67 k boost-python x86_64 1.53.0-27.el7 ol7_x86_64_latest 128 k boost-regex x86_64 1.53.0-27.el7 ol7_x86_64_latest 300 k ksplice-core0 x86_64 1.0.25-1.el7 ol7_x86_64_ksplice 232 k ksplice-tools x86_64 1.0.25-1.el7 ol7_x86_64_ksplice 88 k Transaction Summary ================================================================================ Install 1 Package (+5 Dependent packages) Total download size: 820 k Installed size: 3.8 M Downloading packages: (1/6): boost-filesystem-1.53.0-27.el7.x86_64.rpm | 67 kB 00:00 (2/6): boost-python-1.53.0-27.el7.x86_64.rpm | 128 kB 00:00 (3/6): boost-regex-1.53.0-27.el7.x86_64.rpm | 300 kB 00:00 (4/6): ksplice-1.0.25-1.el7.x86_64.rpm | 5.0 kB 00:00 (5/6): ksplice-core0-1.0.25-1.el7.x86_64.rpm | 232 kB 00:00 (6/6): ksplice-tools-1.0.25-1.el7.x86_64.rpm | 88 kB 00:00 -------------------------------------------------------------------------------- Total 490 kB/s | 820 kB 00:01 Running transaction check Running transaction test Transaction test succeeded Running transaction Installing : boost-python-1.53.0-27.el7.x86_64 1/6 Installing : boost-filesystem-1.53.0-27.el7.x86_64 2/6 Installing : boost-regex-1.53.0-27.el7.x86_64 3/6 Installing : ksplice-core0-1.0.25-1.el7.x86_64 4/6 Installing : ksplice-tools-1.0.25-1.el7.x86_64 5/6 Installing : ksplice-1.0.25-1.el7.x86_64 6/6 Verifying : ksplice-1.0.25-1.el7.x86_64 1/6 Verifying : ksplice-core0-1.0.25-1.el7.x86_64 2/6 Verifying : boost-regex-1.53.0-27.el7.x86_64 3/6 Verifying : ksplice-tools-1.0.25-1.el7.x86_64 4/6 Verifying : boost-filesystem-1.53.0-27.el7.x86_64 5/6 Verifying : boost-python-1.53.0-27.el7.x86_64 6/6 Installed: ksplice.x86_64 0:1.0.25-1.el7 Dependency Installed: boost-filesystem.x86_64 0:1.53.0-27.el7 boost-python.x86_64 0:1.53.0-27.el7 boost-regex.x86_64 0:1.53.0-27.el7 ksplice-core0.x86_64 0:1.0.25-1.el7 ksplice-tools.x86_64 0:1.0.25-1.el7 Complete! Third, update the system to install the Ksplice-aware versions of the user space libraries: # yum update glibc* openssl* Loaded plugins: langpacks, rhnplugin, ulninfo This system is receiving updates from ULN. ol7_x86_64_userspace_ksplice | 1.2 kB 00:00:00 ol7_x86_64_userspace_ksplice/updateinfo | 19 kB 00:00:00 ol7_x86_64_userspace_ksplice/primary | 63+ kB 00:00:00 ol7_x86_64_userspace_ksplice 261/261 Resolving Dependencies --> Running transaction check ---> Package glibc.i686 0:2.17-196.el7 will be updated ---> Package glibc.x86_64 0:2.17-196.el7 will be updated ---> Package glibc.i686 2:2.17-196.ksplice1.el7 will be an update --> Processing Dependency: ksplice-helper for package: 2:glibc-2.17-196.ksplice1.el7.i686 ---> Package glibc.x86_64 2:2.17-196.ksplice1.el7 will be an update ---> Package glibc-common.x86_64 0:2.17-196.el7 will be updated ---> Package glibc-common.x86_64 2:2.17-196.ksplice1.el7 will be an update ---> Package glibc-devel.x86_64 0:2.17-196.el7 will be updated ---> Package glibc-devel.x86_64 2:2.17-196.ksplice1.el7 will be an update ---> Package glibc-headers.x86_64 0:2.17-196.el7 will be updated ---> Package glibc-headers.x86_64 2:2.17-196.ksplice1.el7 will be an update ---> Package openssl.x86_64 1:1.0.2k-8.0.1.el7 will be updated ---> Package openssl.x86_64 2:1.0.2k-8.ksplice1.el7 will be an update ---> Package openssl-libs.x86_64 1:1.0.2k-8.0.1.el7 will be updated ---> Package openssl-libs.x86_64 2:1.0.2k-8.ksplice1.el7 will be an update --> Running transaction check ---> Package ksplice-helper.x86_64 0:1.0.25-1.el7 will be installed --> Finished Dependency Resolution Dependencies Resolved ========================================================================================================================== Package Arch Version Repository Size ========================================================================================================================== Updating: glibc i686 2:2.17-196.ksplice1.el7 ol7_x86_64_userspace_ksplice 4.2 M glibc x86_64 2:2.17-196.ksplice1.el7 ol7_x86_64_userspace_ksplice 3.6 M glibc-common x86_64 2:2.17-196.ksplice1.el7 ol7_x86_64_userspace_ksplice 11 M glibc-devel x86_64 2:2.17-196.ksplice1.el7 ol7_x86_64_userspace_ksplice 1.1 M glibc-headers x86_64 2:2.17-196.ksplice1.el7 ol7_x86_64_userspace_ksplice 675 k openssl x86_64 2:1.0.2k-8.ksplice1.el7 ol7_x86_64_userspace_ksplice 491 k openssl-libs x86_64 2:1.0.2k-8.ksplice1.el7 ol7_x86_64_userspace_ksplice 1.2 M Installing for dependencies: ksplice-helper x86_64 1.0.25-1.el7 ol7_x86_64_userspace_ksplice 17 k Transaction Summary ========================================================================================================================== Install ( 1 Dependent package) Upgrade 7 Packages Total download size: 23 M Is this ok [y/d/N]: y Downloading packages: No Presto metadata available for ol7_x86_64_userspace_ksplice (1/8): glibc-2.17-196.ksplice1.el7.i686.rpm | 4.2 MB 00:00:02 (2/8): glibc-2.17-196.ksplice1.el7.x86_64.rpm | 3.6 MB 00:00:02 (3/8): glibc-common-2.17-196.ksplice1.el7.x86_64.rpm | 11 MB 00:00:07 (4/8): glibc-devel-2.17-196.ksplice1.el7.x86_64.rpm | 1.1 MB 00:00:00 (5/8): glibc-headers-2.17-196.ksplice1.el7.x86_64.rpm | 675 kB 00:00:00 (6/8): ksplice-helper-1.0.25-1.el7.x86_64.rpm | 17 kB 00:00:00 (7/8): openssl-1.0.2k-8.ksplice1.el7.x86_64.rpm | 491 kB 00:00:00 (8/8): openssl-libs-1.0.2k-8.ksplice1.el7.x86_64.rpm | 1.2 MB 00:00:00 -------------------------------------------------------------------------------------------------------------------------- Total 1.4 MB/s | 23 MB 00:00:15 Running transaction check Running transaction test Transaction test succeeded Running transaction Installing : ksplice-helper-1.0.25-1.el7.x86_64 1/15 Updating : 2:glibc-common-2.17-196.ksplice1.el7.x86_64 2/15 Updating : 2:glibc-2.17-196.ksplice1.el7.x86_64 3/15 Updating : 2:glibc-headers-2.17-196.ksplice1.el7.x86_64 4/15 Updating : 2:openssl-libs-1.0.2k-8.ksplice1.el7.x86_64 5/15 Updating : 2:openssl-1.0.2k-8.ksplice1.el7.x86_64 6/15 Updating : 2:glibc-devel-2.17-196.ksplice1.el7.x86_64 7/15 Updating : 2:glibc-2.17-196.ksplice1.el7.i686 8/15 Cleanup : glibc-devel-2.17-196.el7.x86_64 9/15 Cleanup : 1:openssl-1.0.2k-8.0.1.el7.x86_64 10/15 Cleanup : glibc-2.17-196.el7 11/15 Cleanup : glibc-headers-2.17-196.el7.x86_64 12/15 Cleanup : 1:openssl-libs-1.0.2k-8.0.1.el7.x86_64 13/15 Cleanup : glibc-common-2.17-196.el7.x86_64 14/15 Cleanup : glibc-2.17-196.el7 15/15 Verifying : ksplice-helper-1.0.25-1.el7.x86_64 1/15 Verifying : 2:glibc-headers-2.17-196.ksplice1.el7.x86_64 2/15 Verifying : 2:glibc-2.17-196.ksplice1.el7.x86_64 3/15 Verifying : 2:glibc-common-2.17-196.ksplice1.el7.x86_64 4/15 Verifying : 2:openssl-libs-1.0.2k-8.ksplice1.el7.x86_64 5/15 Verifying : 2:glibc-devel-2.17-196.ksplice1.el7.x86_64 6/15 Verifying : 2:openssl-1.0.2k-8.ksplice1.el7.x86_64 7/15 Verifying : 2:glibc-2.17-196.ksplice1.el7.i686 8/15 Verifying : 1:openssl-libs-1.0.2k-8.0.1.el7.x86_64 9/15 Verifying : glibc-common-2.17-196.el7.x86_64 10/15 Verifying : glibc-2.17-196.el7.i686 11/15 Verifying : glibc-devel-2.17-196.el7.x86_64 12/15 Verifying : glibc-2.17-196.el7.x86_64 13/15 Verifying : 1:openssl-1.0.2k-8.0.1.el7.x86_64 14/15 Verifying : glibc-headers-2.17-196.el7.x86_64 15/15 Dependency Installed: ksplice-helper.x86_64 0:1.0.25-1.el7 Updated: glibc.i686 2:2.17-196.ksplice1.el7 glibc.x86_64 2:2.17-196.ksplice1.el7 glibc-common.x86_64 2:2.17-196.ksplice1.el7 glibc-devel.x86_64 2:2.17-196.ksplice1.el7 glibc-headers.x86_64 2:2.17-196.ksplice1.el7 openssl.x86_64 2:1.0.2k-8.ksplice1.el7 openssl-libs.x86_64 2:1.0.2k-8.ksplice1.el7 Complete! And finally, reboot the system so that it uses the new ksplice-aware user space libraries glibc and openssl. Now you use ksplice command to perform user space patching as well as kernel patching. To learn more how to manage Ksplice enhanced client, how to subscribe to Oracle Linux Unbreakable Linux Network, or how to configure Ksplice offline enhanced client, visit the resources below: Working With the Ksplice Enhanced Client Oracle Linux Unbreakable Linux Network User's Guide Installing and Configuring the Ksplice Offline Enhanced Client Webcast replay "Provide zero-downtime for critical applications, including container deployments"

Oracle has provided thousands of Ksplice kernel patches to address Linux kernel security issues. But many vulnerabilities are in user space. Heartbleed is a good example of a huge user space...

Virtualization

Oracle OpenWorld 2017: Oracle Linux and Virtualization Demogrounds

With only 8 days left to Oracle OpenWorld 2017, we would like to highlight what you can find in the demogrounds this year for Oracle Linux and Virtualization. In addition the sessions and hands-on labs we have the following demonstrations at Moscone West exhibit hall in the IT infrastructure area: Secure and Agile Orchestration for Docker Containers In this demo, see how building a secure and agile production environment can be simple when you leverage Docker containers and Kubernetes orchestration on Oracle Linux. Oracle Linux, Oracle VM, and Oracle OpenStack: Engineered for the Open Cloud In this demo, see how Oracle infrastructure software, Oracle Linux, Oracle VM, and Oracle OpenStack provide an open, simplified, modern, and cost-effective foundation for the cloud. Securing Your Open Cloud-Ready Infrastructure In this demo, learn how to ensure secure application access from a multitude of different users and their devices to your cloud infrastructure with Oracle Secure Global Desktop and hear about the business and technical advantages of using Ksplice to manage security fixes for an open cloud infrastructure built with Oracle Linux and Oracle VM DevOps with Oracle Linux and Virtualization In this demo, learn how to build a 100 percent reproducible environment that creates an up-to-date Oracle Linux environment and requires no user intervention at all, other than a single command. With Oracle VM VirtualBox, Oracle Linux, and Vagrant, you can easily build a consistent workflow to create a disposable Linux environment whose configuration and dependencies are isolated from your development machine on every platform (Windows, macOS, or Linux). A Complete Management and Monitoring Solution for Cloud Infrastructure In this demo, learn about the complete management/monitoring solutions—single pane of glass—for the infrastructure software (Oracle VM, Oracle Private Cloud Appliance, IaaS with Oracle Private Cloud Appliance, Oracle Linux, Oracle Ksplice, and Oracle OpenStack) and next-generation monitoring services using Oracle Management Cloud. IT Central Station: Peer-to-Peer Reviews for Oracle Linux and Virtualization Access authentic, real user reviews of Oracle Linux and virtualization at IT Central Station, the leading review site for enterprise technology products and services. Spend a few minutes, and provide your own review. Check out this map for details of the IT infrastructure area in Moscone west. Stop by to see these product demonstrations and have one-on-one discussions with our experts. And, maybe pick up a tchotchke or two.  We know you love penguins!

With only 8 days left to Oracle OpenWorld 2017, we would like to highlight what you can find in the demogrounds this year for Oracle Linux and Virtualization. In addition the sessions and hands-on...

Oracle OpenWorld 2017: Oracle Linux and Virtualization Hands-on Labs

Happy Friday Everyone! Last week, we covered our conference sessions and this week we are focusing on the Hands-on Labs for Oracle Linux and Virtualization at Oracle OpenWorld. These sessions provide great learning opportunity working on the products directly with product experts.  Migration to the Oracle Open Cloud Infrastructure  In this hands-on lab learn different methods of migrating services running on legacy and proprietary virtualization solutions such as VMware to Oracle VM and Oracle Linux. Practical DevOps with Linux and Virtualization In this session learn how to build a 100 percent reproducible environment that creates an up-to-date Oracle Linux 7 environment and requires no user intervention at all other than a single command. With Vagrant, VirtualBox, and Oracle Linux, you can easily build a consistent workflow to create a disposable Linux environment whose configuration and dependencies are isolated from your development machine on every platform (Windows, MacOS, or Linux). Systems Management with Spacewalk 2.6 Spacewalk is an open source Linux systems management solution that manages software content updates for Linux distributions, including Oracle Linux. It allows you to synchronize updates from upstream sources, and then store and deploy those updates to your local servers. In this hands-on lab learn the basics of systems management using Spacewalk 2.6. Creating a Private Cloud in Minutes with Oracle Enterprise Manager and Oracle VM This hands-on lab walks through managing and using a private cloud with Oracle VM 3.4 and Oracle Enterprise Manager 13c. Learn how self-service users can deploy new virtual machines and new Oracle Databases in minutes from Oracle Enterprise Manager’s self-service portal. Also see how cloud administrators manage the private cloud, including the chargeback feature. Building Development Environments with Docker and Software Collections ​ In this lab attendees learn about software collections, which are updated system and development tools that can be used with Oracle Linux. See how to develop Docker containers that leverage software collections to provide development and production images. Add these Hand-on Labs to your schedule and don't forget to bookmark our Focus on Oracle Linux and Virtualization page to access the full list of our general sessions, conference sessions, hands-on-labs and demos.

Happy Friday Everyone! Last week, we covered our conference sessions and this week we are focusing on the Hands-on Labs for Oracle Linux and Virtualization at Oracle OpenWorld. These sessions provide...

Oracle Secure Global Desktop

Installing Secure Cloud Access Solution on-premises or in the Cloud

Customers are facing challenges to provide remote access to the console, desktop, or application environments in the Cloud or on premises while ensuring privileged user access to data. How do you access the full Linux desktop environment for application or database installation and administration without the pain to set up the VNC access? Oracle Secure Global Desktop (SGD) is the secure remote access solution for any cloud-hosted enterprise applications and desktops running on Microsoft Windows, Linux, Solaris and mainframe servers, from a wide range of popular client devices. The easiest way to install SGD on Linux (in a VM or a physical host on Oracle Cloud Infrastructure or on-premises) without the use of a pre-defined template, is to create a Single Host Gateway Deployment as described in this blog post (referenced in the Deployment Guide)   The setup described here co-locates the SGD gateway with the SGD server on the same OS instance which has two important caveats: A colocated setup of SGD gateway and server does not support the formation of SGD arrays The setup can not be easily reversed Download SGD Download SGD 5.3 rpm from here by looking for Oracle Secure Global Desktop and choose the latest version (as of this writing 5.3.0.0.0) And select the desired Architecture (the rest of the instructions assume Linux) Preparation and Installation Prepare your Linux instance by installing a GUI (that step is really only important if you want to be able to launch graphical applications on the SGD server itself, like gnome-terminal or gnome-session). [root@d7fb76 ~]# yum groupinstall "Server with GUI" Next install the rpm and start SGD for the first time, which guides you through the setup. On an oracle cloud instance SGD will automatically pick-up the internal hostname. You can continue because we will also install the SGD Gateway in a later step and configure that with the externally reachable FQDN (at this point I want to mention that it probably is a good idea to have a static external IP reservation for your server so you won't have to reconfigure everything after a reboot - on OPC that also applies to the internal IP address and can be achieved by giving your instance a name). [root@d7fb76 ~]# yum install tta-5.30-914.x86_64.rpm [root@d7fb76 ~]# /opt/tarantella/bin/tarantella start [root@d7fb76 ~]# /opt/tarantella/bin/tarantella stop --kill Now that the SGD server has been installed we stop it and install the Gateway. The reason we need to stop SGD is because it uses the same ports (80, 443) as the Gateway. [root@d7fb76 ~]# cd /opt/tarantella/var/docroot/gateway [root@d7fb76 ~]# yum install SUNWsgdg-5.30-914.x86_64.rpm [root@d7fb76 ~]# /opt/SUNWsgdg/bin/gateway setup # make sure you enter your external FQDN during setup [root@d7fb76 ~]# /opt/tarantella/bin/tarantella discover gateway --local [root@d7fb76 ~]# /opt/SUNWsgdg/bin/gateway config enable --routes-http-redirect [root@d7fb76 ~]# /opt/SUNWsgdg/bin/gateway config enable --services-reflection-auth [root@d7fb76 ~]# /opt/SUNWsgdg/bin/gateway start [root@d7fb76 ~]# /opt/tarantella/bin/tarantella start Adding a User Profile At this point you have a running SGD Gateway + Server setup on your instance. Next we will create and configure a local user to login to SGD. This will be a regular Unix user. On Oracle Cloud we can add that user to the ADMINS group, or the group configured to use sudo (check in /etc/group or /etc/sudoers), so this user will be able to sudo without a password. In order to add our new user to multiple groups, separate the group names with comma (,). [root@d7fb76 ~]# useradd -m -c "SGD Admin User" -G ADMINS sgdadmin [root@d7fb76 ~]# echo "superSecret" | passwd --stdin sgdadmin Now we tell SGD about this user and imbue him/her with SGD Admin privileges. The structure dc=com/dc=oraclecloud/dc=compute is arbitrary. The user profile we are creating does not have to match any particular structure [root@d7fb76 ~]# /opt/tarantella/bin/tarantella object new_dc --name dc=com [root@d7fb76 ~]# /opt/tarantella/bin/tarantella object new_dc --name dc=com/dc=oraclecloud [root@d7fb76 ~]# /opt/tarantella/bin/tarantella object new_dc --name dc=com/dc=oraclecloud/dc=compute [root@d7fb76 ~]# /opt/tarantella/bin/tarantella object new_person \ --name .../_ens/dc=com/dc=oraclecloud/dc=compute/cn=sgdadmin \ --user sgdadmin \ --surname "SGD Admin" \ --enabled true [root@d7fb76 ~]# /opt/tarantella/bin/tarantella role add_member \ --role "o=Tarantella System Objects/cn=Global Administrators" \ --member .../_ens/dc=com/dc=oraclecloud/dc=compute/cn=sgdadmin [root@d7fb76 ~]# /opt/tarantella/bin/tarantella role add_link \ --role "o=Tarantella System Objects/cn=Global Administrators" \ --link o=applications/cn=Applications You are ready to login to your SGD server with sgdadmin password superSecret and configure other users, applications and application servers either via the web-based Administration Console, or via the command-line interface /opt/tarantella/bin/tarantella (for certain CLI operations like stopping and starting SGD you need to be root, so use sudo). Oracle Linux 7 firewalld Most standard OL7 installations has firewalld installed and running. By default it only allows port 22, so we need to add port 80 and 443 [root@c3763d zones]# systemctl status firewalld ¿ firewalld.service - firewalld - dynamic firewall daemon Loaded: loaded (/usr/lib/systemd/system/firewalld.service; enabled; vendor preset: enabled) Active: active (running) since Mon 2017-05-22 12:23:55 EDT; 55min ago Docs: man:firewalld(1) Main PID: 1438 (firewalld) CGroup: /system.slice/firewalld.service ¿¿1438 /usr/bin/python -Es /usr/sbin/firewalld --nofork --nopid ... [root@c3763d zones]# firewall-cmd --zone=public --add-port=80/tcp --permanent success [root@c3763d zones]# firewall-cmd --zone=public --add-port=443/tcp --permanent success [root@c3763d zones]# firewall-cmd --reload FQDN changes When a server installed with SGD is stopped and started up again, the external Fully Qualified Domain Name (FQDN) might change, in case DHCP is used or the server is running in certain cloud environments without a reserved IP address. You can tell SGD to monitor a change and automatically react to it during startup by setting the value for tarantella.config.server.autorenameonstart to 1 [root@c3763d ~]# grep autorenameonstart /opt/tarantella/var/serverconfig/local/server.properties tarantella.config.server.autorenameonstart=0 [root@c3763d ~]# /opt/tarantella/bin/tarantella config edit --tarantella-config-server-autorenameonstart 1 Oracle Cloud Security considerations SGD uses ssh with username/password to connect to application servers. Oracle Cloud instances have ssh with password disabled by default. Modify sshd_config To allow password authentication from the internal network you need to modify the /etc/ssh/sshd_config file and restart ssh /etc/ssh/sshd_config on Linux instances # adjust address and CIDR based on your network Match Address 10.0.0.0/8 PasswordAuthentication yes /etc/ssh/sshd_config on Solaris instances # adjust address and CIDR based on your network Match Address 10.0.0.0/8 KbdInteractiveAuthentication yes PasswordAuthentication yes Provide the Oracle Cloud registered private key Alternatively one can provide the private key registered with the IaaS instance during provisioning for the SGD processes used to establish the connection to other application servers. Any X11 connection will be made as user ttasys, so providing the private key in ~ttasys/.ssh/. Once the key is provided SGD still needs to be told as which user to login. This can be accomplished by seeding a pass cache entry.  In the following example I assume the default user for IaaS is opc, so I add a pass cache entry for the person of sgdadmin for a specific application server (resource). I specify the user (opc) but the password doesn't really matter. In this example I am using a new application server named Oracle Solaris 11.3 I previously created [root@d7fb76 ~]# /opt/tarantella/bin/tarantella passcache new \ --person .../_ens/dc=com/dc=oraclecloud/dc=compute/cn=sgdadmin \ --resource "o=appservers/cn=Oracle Solaris 11.3" \ --resuser opc \ --respass "irrelevant" X11 keyboard mapping Once you launch a gnome-terminal and have problem with your ~ key, add this to your .bash_profile on the application server. It will modify the X11 keyboard mapping when coming in via SGD [ -z "${TTA_EXTDNSNAME}" ] || xmodmap -e "keycode 94 = grave asciitilde" Learn More For more details on SGD and the new release,  please consult the release notes in the documentation. To get started, you can download the SGD software from Oracle Software Delivery Cloud by following the instructions on Oracle Technology Network.

Customers are facing challenges to provide remote access to the console, desktop, or application environments in the Cloud or on premises while ensuring privileged user access to data. How do...

Oracle

Integrated Cloud Applications & Platform Services