Friday, 15 May 2026

Understanding SQL Query Output and Session Statistics in Oracle Database 26ai

When working with Oracle Database, especially in environments like Autonomous Database 26ai, it’s not just about running queries— it’s equally important to understand what happens behind the scenes.

In this article, we will:

  • Run a simple query on the EMP table
  • Analyze the output
  • Understand session-level statistics generated by Oracle

Step 1: Querying the EMP Table

Let’s start with a basic query:

SQL> SELECT * FROM emp;

Query Output

   EMPNO ENAME     JOB        MGR HIREDATE     SAL   COMM DEPTNO
________ _________ __________ ____ __________ _____ _____ ______
    7698 BLAKE     MANAGER    7839 01-05-81   2850       30
    7902 FORD      ANALYST    7566 03-12-81   3000       20
    7876 ADAMS     CLERK      7788 23-05-87   1100       20
    7566 JONES     MANAGER    7839 02-04-81   2975       20
    7369 SMITH     CLERK      7902 17-12-80    800       20
    7499 ALLEN     SALESMAN   7698 20-02-81   1600   300 30
    7900 JAMES     CLERK      7698 03-12-81    950       30
    7934 MILLER    CLERK      7782 23-01-82   1300       10
    7839 KING      PRESIDENT       17-11-81   5000       10
    7521 WARD      SALESMAN   7698 22-02-81   1250   500 30
    7844 TURNER    SALESMAN   7698 08-09-81   1500     0 30
    7782 CLARK     MANAGER    7839 09-06-81   2450       10
    7788 SCOTT     ANALYST    7566 19-04-87   3000       20
    7654 MARTIN    SALESMAN   7698 28-09-81   1250  1400 30

14 rows selected.

This is a classic Oracle sample table showing employee details such as:

  • EMPNO – Employee ID
  • ENAME – Name
  • JOB – Role
  • SAL – Salary
  • COMM – Commission (if applicable)
  • DEPTNO – Department number

Step 2: Understanding SQL Execution Statistics

After executing the query, Oracle provides detailed session-level statistics that help us understand how the query was processed internally.

Statistics Output

Statistics
-----------------------------------------------------------
               1  CPU used by this session
               1  CPU used when call started
               1  DB time
            7337  RM usage by this session
               3  Requests to/from client
               8  SCN increments due to another database
               2  SQL*Net roundtrips to/from client
             296  bytes received via SQL*Net from client
           65061  bytes sent via SQL*Net to client
               2  calls to get snapshot scn: kcmgss
               2  calls to kcmgcs
               1  cursor authentications
               2  execute count
               2  global enqueue gets sync
               2  global enqueue releases
               8  non-idle wait count
               2  opened cursors cumulative
               1  opened cursors current
               2  parse count (total)
               9  process last non-idle time
               1  redo scn array scans
               2  session cursor cache count
               3  user calls

Breaking Down the Key Statistics

Let’s simplify what these numbers actually mean:

1. CPU & DB Time

  • CPU used by this session: Amount of CPU consumed
  • DB time: Total time spent executing the query

👉 In our case, both values are very low, indicating a lightweight query.

2. SQL*Net Communication

  • Roundtrips: Number of back-and-forth communications between client and database
  • Bytes sent/received: Data transferred over the network

👉 65KB sent shows that result data (14 rows) was returned efficiently.

3. Parse and Execute

  • Parse count: How many times SQL was parsed
  • Execute count: Number of executions

👉 Ideally, parsing should be minimized for better performance.

4. Cursor Activity

  • Opened cursors: SQL statements held in memory
  • Session cursor cache: Helps reuse SQL statements

5. Wait Events

  • Non-idle wait count: Times the session waited for resources

👉 Low wait counts = good performance.

6. SCN (System Change Number)

  • SCN increments: Tracks database changes for consistency

👉 Important for read consistency and transaction management.


Why These Statistics Matter

Even for a simple SELECT query, Oracle provides deep insights into:

  • Performance behavior
  • Resource utilization
  • Network overhead
  • Execution efficiency

For developers and DBAs, these statistics are extremely useful when:

  • Troubleshooting slow queries
  • Optimizing SQL performance
  • Understanding database workload

Conclusion

A simple query like SELECT * FROM emp may look trivial, but Oracle Database captures a rich set of execution statistics behind the scenes.

Understanding these metrics helps you move from just writing SQL to mastering database performance and internals.

If you're exploring Oracle 26ai Autonomous Database, make it a habit to review these statistics—they reveal far more than just query results.

What’s Included in the Free Tier of Oracle Database 26ai Autonomous Database

In this blog, we will explore what you actually get when you provision a free tier Autonomous Database on Oracle Database 26ai. Instead of just relying on documentation, we will look at a real SQLcl session and inspect the available resources directly from the database.

Environment Details

SQLcl: Release 24.4 Production on Fri May 15 22:03:16 2026

Copyright (c) 1982, 2026, Oracle.  All rights reserved.

Last Successful login time: Fri May 15 2026 22:03:22 +05:30

Connected to:
Oracle AI Database 26ai Enterprise Edition Release 23.26.2.1.0 - Production
Version 23.26.2.1.0

Pluggable Database Information

Let’s first check the available PDB in the free tier:

SQL> show pdbs

   CON_ID CON_NAME                OPEN MODE     RESTRICTED
_________ _______________________ _____________ _____________
      600 RE2D3BGG7YWWTP7_PYDB    READ WRITE    NO

You get a single pluggable database (PDB) that is fully open in READ WRITE mode and not restricted.

CPU Allocation

Now let’s check how much CPU is allocated in the free tier:

SQL> show parameter cpu

NAME          TYPE   VALUE
------------- ------ -----
cpu_count     string 2
cpu_min_count string 2

The free tier provides:

  • 2 CPUs available
  • 2 CPUs guaranteed minimum

SGA (System Global Area)

Let’s inspect the memory allocated for SGA:

SQL> show parameter sga

NAME         TYPE        VALUE
------------ ----------- -------
sga_max_size big integer 219008M
sga_min_size big integer 0
sga_target   big integer 3400M

Key observations:

  • SGA Target: ~3.4 GB
  • SGA Max Size: Configured high but not fully utilized

PGA (Program Global Area)

Now let’s look at PGA allocation:

SQL> show parameter pga

NAME                 TYPE        VALUE
-------------------- ----------- ------
pga_aggregate_limit  big integer 10200M
pga_aggregate_target big integer 5100M

This shows:

  • PGA Target: ~5.1 GB
  • PGA Limit: ~10.2 GB

In-Memory & Memory Features

Finally, let’s review memory-related parameters:

SQL> show parameter memory

NAME                               TYPE        VALUE
---------------------------------- ----------- -------
inmemory_automatic_level           string      MEDIUM
inmemory_clause_default            string
inmemory_deep_vectorization        boolean     TRUE
inmemory_expressions_usage         string      ENABLE
inmemory_force                     string      DEFAULT
inmemory_graph_algorithm_execution string      DEFAULT
inmemory_optimized_arithmetic      string      DISABLE
inmemory_optimized_date            string      DISABLE
inmemory_prefer_xmem_memcompress   string
inmemory_prefer_xmem_priority      string
inmemory_query                     string      ENABLE
inmemory_size                      big integer 0
inmemory_virtual_columns           string      MANUAL
inmemory_xmem_size                 big integer 0
memory_target                      big integer 0
optimizer_inmemory_aware           boolean     TRUE
shard_apply_max_memory_size        big integer 0
vector_memory_size                 big integer 0

Important takeaways:

  • In-Memory features are enabled at a logical level
  • In-Memory size is 0 (not allocated in free tier)
  • Advanced optimizations like vectorization are enabled

Conclusion

The free tier of Oracle Database 26ai Autonomous Database is surprisingly capable and gives you:

  • 2 CPUs (guaranteed)
  • ~3.4 GB SGA
  • ~5 GB PGA
  • Fully functional Autonomous Database (READ WRITE)
  • Advanced optimizer and in-memory capabilities (partially enabled)

This makes it an excellent environment for:

  • Learning Oracle Database 26ai features
  • Testing SQL and PL/SQL
  • Exploring AI and Autonomous capabilities

Even though it is a free tier, it still provides a powerful sandbox to experiment with modern Oracle database features.

Annotations in Oracle Database 23ai / 26ai — A Complete Guide

Annotations in Oracle Database 23ai / 26ai

Oracle continues to innovate with Oracle Database 23ai and its evolution into Oracle Database 26ai. One of the most practical features introduced is Annotations — a structured and powerful way to attach metadata directly to database objects.


What Are Annotations?

Annotations allow you to attach custom metadata to database objects such as:

  • Tables
  • Columns
  • Views
  • Indexes
  • PL/SQL objects

Think of annotations as structured, queryable comments that can be used by developers, applications, and AI tools.


Why Annotations Matter

Before annotations, metadata management relied on:

  • DDL comments
  • External documentation
  • Naming conventions

This often resulted in inconsistency and poor discoverability.

With Annotations, you get:

  • Centralized metadata
  • Improved data governance
  • Better developer productivity
  • AI-ready schemas
  • Self-describing database objects

Syntax Overview

Table Annotation Example


CREATE TABLE customers (
    customer_id NUMBER,
    name        VARCHAR2(100),
    email       VARCHAR2(100)
)
ANNOTATIONS (
    'domain' VALUE 'crm',
    'pii' VALUE 'true'
);

Column Annotation Example


CREATE TABLE employees (
    emp_id NUMBER,
    salary NUMBER ANNOTATIONS ('sensitive' VALUE 'true')
);

Viewing Annotations

You can query annotations using Oracle dictionary views:


SELECT *
FROM USER_ANNOTATIONS
WHERE OBJECT_NAME = 'CUSTOMERS';

Other useful views:

  • ALL_ANNOTATIONS
  • DBA_ANNOTATIONS

Modifying Annotations


ALTER TABLE customers
ADD ANNOTATIONS ('retention_period' VALUE '5 years');

Dropping Annotations


ALTER TABLE customers
DROP ANNOTATIONS ('pii');

Real-World Use Cases

1. Data Classification & Security


'sensitive' VALUE 'true'

Useful for compliance such as GDPR and internal audits.

2. AI & Automation Integration


'domain' VALUE 'finance'

Helps AI systems understand data context and improve query intelligence.

3. Data Governance


'owner' VALUE 'finance_team',
'retention' VALUE '7 years'

Track ownership and lifecycle policies.

4. Application Integration

Applications can dynamically use annotations to:

  • Mask sensitive data
  • Drive UI behavior
  • Apply business rules

Best Practices

  • Use standardized keys: pii, sensitive, domain, owner
  • Keep values meaningful and concise
  • Leverage dictionary views for automation
  • Avoid overuse to keep metadata clean

What’s New in 26ai?

  • Better AI integration
  • Improved metadata indexing
  • Enhanced tooling support
  • Smarter automation capabilities

Summary

Annotations in Oracle Database 23ai and 26ai are a game-changer for metadata management. They transform how developers document, govern, and interact with database systems.

Instead of relying on external documentation, you can now embed intelligence directly into your database objects — making systems more scalable, maintainable, and AI-ready.


Final Thoughts

If you're working with modern Oracle environments, especially AI-driven or cloud-native architectures, annotations are quickly becoming a best practice rather than an option.

Saturday, 9 May 2026

Implementing Network Security Rules in Oracle Database@AWS: A Complete Deep Dive

As enterprises move mission-critical workloads to Oracle Database@AWS, securing the network layer becomes one of the most critical responsibilities.

Unlike traditional single-cloud deployments, Oracle Database@AWS spans:

  • AWS networking (VPC, Subnets, Security Groups)
  • Oracle Cloud Infrastructure (OCI) networking (VCN inside ODB)

This dual-layer architecture requires a well-planned, defense-in-depth network security model.


Architecture Overview: AWS + OCI Networking

AWS VPC (Your Application Layer)
 ├── Subnets (Private/Public)
 ├── Security Groups
 ├── Network ACLs
 ├── Route Tables
 └── Transit Gateway (Optional)
        │
        ▼
ODB Peering Connection
        │
        ▼
OCI VCN (ODB Network - Managed by AWS)
 ├── Subnets
 ├── Security Lists / NSGs
 ├── Route Tables
 └── Oracle Exadata Database

Think of ODB networking as an OCI VCN embedded behind AWS, securely connected via private peering.


1. Amazon VPC Design for Secure ODB Access

Your AWS Virtual Private Cloud (VPC) is the entry point for all application traffic.

Best Practices

  • Use private subnets for application servers connecting to database
  • Avoid exposing database traffic via public subnets
  • Separate environments (Dev / Test / Prod) into different VPCs
  • Use dedicated CIDR blocks that do not overlap with ODB network

2. Subnet-Level Isolation

Subnets provide logical isolation inside your VPC.

Recommended Layout

  • Public Subnet → Load balancers, bastion hosts
  • Private App Subnet → Application servers
  • Restricted Subnet → Internal services only

Only the application subnet should communicate with Oracle Database via ODB peering.


3. Security Groups (Stateful Firewall)

Security groups act as instance-level firewalls.

Key Rules for Database Connectivity

  • Allow outbound traffic from app servers to ODB CIDR
  • Restrict inbound traffic to only required ports (e.g., 1521 for Oracle)
  • Use least privilege rules

Example Rule

Type: Custom TCP
Port: 1521
Source: Application Subnet CIDR

Security groups are stateful, meaning return traffic is automatically allowed.


4. Network ACLs (Stateless Layer)

Network ACLs (NACLs) provide an additional subnet-level security layer.

Best Practices

  • Allow ephemeral ports (1024–65535) for return traffic
  • Deny all unnecessary inbound/outbound traffic
  • Use NACLs as a coarse-grained control, not primary firewall

Example

Inbound Rule:
ALLOW TCP 1521 FROM App Subnet

Outbound Rule:
ALLOW ALL (or restricted ephemeral range)

5. Route Tables: The Backbone of Connectivity

Routing determines how traffic reaches the Oracle Database.

Critical Rule for ODB Peering

Destination: ODB Network CIDR
Target: ODB Peering Connection

Without this route, traffic will never reach the database.

Common Mistakes

  • Missing route to ODB network
  • Overlapping CIDRs
  • Incorrect route table association

6. ODB Peering: Secure Private Connectivity

ODB Peering connects AWS VPC to the Oracle-managed network.

Key Security Characteristics

  • No internet exposure
  • Private IP communication only
  • Controlled via CIDR-based restrictions
  • Non-transitive by default

Traffic Flow

EC2 → Security Group → Route Table → ODB Peering → OCI VCN → Database

7. Transit Gateway for Scalable Architecture

In enterprise environments, multiple VPCs need database access.

Solution: Transit Gateway

Multiple VPCs
      │
      ▼
Transit Gateway
      │
      ▼
Shared VPC (with ODB Peering)
      │
      ▼
Oracle Database

Benefits

  • Centralized routing
  • Reduced peering complexity
  • Better security control

Note: ODB peering is not transitive, so Transit Gateway enables hub-and-spoke design.


8. OCI (ODB) Network Security Components

Behind the scenes, ODB uses an OCI Virtual Cloud Network (VCN).

Key Components

  • Subnets – Separate database tiers
  • Security Lists / NSGs – Similar to AWS security groups
  • Route Tables – Control internal traffic

Important Note

Most OCI networking is managed by AWS, but understanding it helps in troubleshooting.


9. DNS and Name Resolution Security

Secure DNS ensures applications can resolve database endpoints.

Setup

  • Use Route 53 Resolver
  • Create outbound endpoints
  • Configure forwarding rules to ODB domain

This ensures private DNS resolution without exposing endpoints publicly.


10. End-to-End Secure Traffic Flow

User Request
   │
   ▼
Application (EC2 in Private Subnet)
   │
   ▼
Security Group (Allow DB Port)
   │
   ▼
Route Table (ODB CIDR → Peering)
   │
   ▼
ODB Peering Connection
   │
   ▼
OCI VCN Security Rules
   │
   ▼
Oracle Database (Encrypted)

Defense-in-Depth Strategy

A strong network security model uses multiple layers:

  • Layer 1: VPC isolation
  • Layer 2: Subnet segmentation
  • Layer 3: Security groups
  • Layer 4: Network ACLs
  • Layer 5: Routing rules
  • Layer 6: ODB peering controls
  • Layer 7: OCI security rules

Common Pitfalls to Avoid

  • Overlapping CIDR ranges between VPC and ODB
  • Opening database ports to entire VPC
  • Misconfigured route tables
  • Ignoring DNS resolution setup
  • Relying only on security groups without NACLs

Best Practices Checklist

  • Use private-only connectivity
  • Apply least privilege rules
  • Segment networks by function
  • Monitor traffic using logs and flow logs
  • Use Transit Gateway for large environments
  • Regularly audit security rules

Conclusion

Implementing network security in Oracle Database@AWS requires understanding both AWS networking and OCI networking behind ODB.

By combining:

  • Secure VPC design
  • Strict security group rules
  • Proper routing and peering
  • OCI network awareness

…you can build a highly secure, scalable, and enterprise-grade database connectivity model.

Mastering these networking concepts is essential for any architect working with Oracle Database@AWS.


Stay tuned for more advanced blogs on Oracle Database@AWS architecture, security, and performance!

Implementing Security Controls in Oracle Database@AWS

As organizations adopt Oracle Database@AWS, security becomes a top priority. Since this platform combines AWS infrastructure and Oracle Cloud Infrastructure (OCI), it introduces a shared responsibility model and a layered security approach.

In this blog, we explore how to implement strong security controls in Oracle Database@AWS based on official AWS guidance.


Understanding the Shared Responsibility Model

Security in Oracle Database@AWS is built on a shared responsibility model:

  • AWS (Security of the Cloud): Protects infrastructure, data centers, and networking
  • You (Security in the Cloud): Responsible for access control, data protection, and configurations

This model ensures that while AWS provides a secure foundation, you must configure and manage security controls effectively. :contentReference[oaicite:0]{index=0}


Core Security Control Layers

Security in Oracle Database@AWS can be implemented across multiple layers:

  • Identity & Access Management
  • Network Security
  • Data Protection
  • Monitoring & Compliance

1. Identity and Access Management (IAM)

IAM is the first line of defense. It controls who can access and manage resources.

Key Controls

  • Use IAM policies to define permissions
  • Grant least privilege access
  • Use roles instead of long-term credentials
  • Enable Multi-Factor Authentication (MFA)

Oracle Database@AWS supports identity-based policies, allowing fine-grained control over actions and resources. :contentReference[oaicite:1]{index=1}

Example Policy Snippet

{
  "Effect": "Allow",
  "Action": [
    "odb:CreateOdbNetwork",
    "odb:DescribeOdbNetworks"
  ],
  "Resource": "*"
}

This ensures only authorized users can provision or view ODB resources.


2. Network Security Controls

Oracle Database@AWS is designed to run in private subnets and is not exposed to the internet by default. :contentReference[oaicite:2]{index=2}

Best Practices

  • Use ODB peering for private connectivity
  • Restrict access using CIDR ranges
  • Configure route tables correctly
  • Use security groups and NACLs to limit traffic

All communication between AWS VPC and Oracle databases happens over private IP space, ensuring secure connectivity.


3. Data Protection Controls

Encryption at Rest

  • Transparent Data Encryption (TDE) is enabled by default
  • Keys are managed using AWS Key Management Service (KMS)
  • Supports customer-managed keys

This ensures that database files, backups, and logs are encrypted automatically. :contentReference[oaicite:3]{index=3}

Encryption in Transit

  • Use TLS/SSL connections for database communication
  • Enable secure client connectivity

This protects sensitive data during transmission.

Advanced Data Security

  • Use Oracle Data Safe for monitoring and masking
  • Integrate with Oracle Key Vault or OCI Vault

4. Database-Level Security

Even though infrastructure is managed, database security remains your responsibility.

Controls to Implement

  • Strong user authentication policies
  • Role-based access control (RBAC)
  • Auditing and logging
  • Separation of schemas and users

These controls work the same way as on-premises Oracle databases. :contentReference[oaicite:4]{index=4}


5. Monitoring and Compliance

Continuous monitoring is essential for maintaining security posture.

Key Tools

  • AWS CloudWatch for metrics and alerts
  • AWS CloudTrail for API logging
  • Oracle Data Safe for database activity monitoring

AWS regularly audits its infrastructure as part of compliance programs, helping meet regulatory requirements. :contentReference[oaicite:5]{index=5}


6. Secure Resource Sharing

Oracle Database@AWS supports cross-account resource sharing using AWS RAM.

  • Share ODB networks securely across accounts
  • Control access via permissions
  • Maintain ownership in the primary account

This enables secure multi-account architectures. :contentReference[oaicite:6]{index=6}


Security Architecture Overview

User / Application
        │
        ▼
IAM Authentication & Authorization
        │
        ▼
VPC + Security Groups + ODB Peering
        │
        ▼
Encrypted Connection (TLS)
        │
        ▼
Oracle Database (TDE Encryption + DB Security)

Best Practices Summary

  • Apply least privilege access
  • Use private networking only
  • Enable encryption everywhere
  • Monitor continuously
  • Separate environments (Dev/Test/Prod)

Conclusion

Implementing security controls in Oracle Database@AWS requires a layered approach combining AWS security services and Oracle database features.

By properly configuring:

  • IAM policies
  • Network isolation
  • Encryption mechanisms
  • Monitoring tools

…you can build a secure, compliant, and enterprise-grade database environment.

Mastering these controls is essential for any organization running mission-critical workloads on Oracle Database@AWS.


Stay tuned for more deep dives on Oracle Database@AWS architecture and security!

Understanding ODB Peering in Oracle Database@AWS: How It Works

With the rise of multi-cloud architectures, Oracle Database@AWS brings together the power of Oracle Exadata and AWS infrastructure. One of the key networking features enabling this integration is ODB Peering.

In this blog, we’ll break down what ODB peering is, how it works, and how to configure it effectively based on the official AWS documentation:

👉 Configuring ODB Peering (AWS Docs)


What is ODB Peering?

ODB peering is a private network connection between an AWS VPC and an ODB (Oracle Database) network. It allows applications running in AWS (like EC2) to communicate directly with Oracle Exadata databases.

  • Private connectivity (no internet exposure)
  • Low latency communication
  • Secure and isolated network traffic

After peering, resources behave as if they are in the same network. :contentReference[oaicite:0]{index=0}


How ODB Peering Works

At a high level, ODB peering connects:

  • An Amazon VPC (your applications)
  • An ODB Network (Oracle Exadata environment)

Here’s a simplified flow:

Application (EC2 in VPC)
        │
        ▼
VPC Route Table
        │
        ▼
ODB Peering Connection
        │
        ▼
ODB Network (OCI VCN backend)
        │
        ▼
Oracle Exadata Database

Behind the scenes:

  • ODB network maps 1:1 to an OCI VCN
  • Traffic flows privately using internal IPs
  • No public internet routing is involved

Key Components of ODB Peering

1. Peering Connection

A dedicated resource that connects a VPC to an ODB network. Each connection is independent and manageable.

2. CIDR Control

You can restrict access by specifying peer network CIDRs, allowing only certain subnets to communicate. :contentReference[oaicite:1]{index=1}

3. Route Tables

Traffic routing is controlled via VPC route tables. You must route ODB network CIDR to the peering connection.

4. DNS Resolution

DNS is handled using Amazon Route 53 with outbound endpoints and resolver rules for database name resolution.


Types of ODB Peering

  • Same-account peering – VPC and ODB network in same AWS account
  • Cross-account peering – Enabled via AWS RAM sharing

This provides flexibility in enterprise multi-account architectures. :contentReference[oaicite:2]{index=2}


Step-by-Step: How to Configure ODB Peering

Step 1: Create Peering Connection

  • Select ODB network
  • Select target VPC
  • Optionally define route table and CIDRs
aws odb create-odb-peering-connection \
  --odb-network-id odbnet-xxxx \
  --peer-network-id vpc-xxxx

Step 2: Configure Route Tables

Add route in VPC route table:

Destination: ODB CIDR
Target: ODB Peering Connection

ODB side routes are configured automatically. :contentReference[oaicite:3]{index=3}

Step 3: Configure DNS

  • Create Route 53 outbound endpoint
  • Create resolver rule for ODB domain

This ensures database hostnames resolve correctly.

Step 4: Validate Connectivity

  • Test connection from EC2 to database
  • Verify security groups and network ACLs

Advanced Architecture Patterns

1. Multi-VPC Connectivity

You can connect multiple VPCs to a single ODB network using multiple peering connections.

2. Transit Gateway Integration

Instead of peering each VPC individually, use a transit gateway as a hub:

Multiple VPCs → Transit Gateway → Peered VPC → ODB Network

This simplifies large-scale architectures. :contentReference[oaicite:4]{index=4}


Benefits of ODB Peering

  • Low latency – Direct private routing
  • Security – No internet exposure
  • Isolation – Each VPC connection is independent
  • Scalability – Up to 45 peering connections supported

Important Considerations

  • CIDR ranges must not overlap
  • Maximum 45 peerings per ODB network
  • Peering is non-transitive (unless using Transit Gateway)
  • Route tables must be configured correctly

Failure to follow these can lead to connectivity issues. :contentReference[oaicite:5]{index=5}


Conclusion

ODB peering is a foundational capability in Oracle Database@AWS that enables seamless, secure communication between AWS applications and Oracle Exadata databases.

By combining:

  • Private networking
  • Fine-grained access control
  • Flexible architecture options

…it becomes a powerful building block for modern hybrid and multi-cloud database solutions.

If you're working with Exadata on AWS, mastering ODB peering is essential for designing scalable and secure architectures.


Stay tuned for more deep dives on Oracle Database@AWS networking and architecture!

Tuesday, 5 May 2026

Understanding ODB Network in Exadata@AWS: How Connectivity Works

Oracle Database@AWS brings together the power of Oracle Exadata with the scalability of AWS infrastructure. At the core of this integration lies the ODB Network (Oracle Database Network), which enables seamless, secure, and high-performance communication between Oracle database services and AWS resources.

In this blog, we will explore how the ODB Network works in Exadata@AWS, its architecture, and why it is critical for multi-cloud deployments.


What is ODB Network?

ODB Network is a dedicated networking layer designed to connect Oracle Database services running on Exadata@AWS with AWS services and customer environments.

  • Provides low-latency connectivity
  • Ensures secure traffic isolation
  • Enables integration with AWS-native services

Why ODB Network is Important?

  • Bridges Oracle-managed infrastructure with AWS VPCs
  • Supports enterprise-grade hybrid and multi-cloud architectures
  • Ensures predictable performance for database workloads
  • Enables access to services like S3, Lambda, and analytics tools

High-Level Architecture

The ODB Network acts as a communication backbone between:

  • Exadata Database Nodes (Oracle-managed)
  • AWS VPC (Customer-managed)
  • On-premises data centers (via VPN / Direct Connect)

Key idea: ODB Network is logically isolated but securely peered with AWS VPC.


Key Components of ODB Network

1. ODB VCN (Virtual Cloud Network)

This is the Oracle-managed network that hosts Exadata infrastructure. It is similar to OCI VCN but integrated into AWS deployment.

  • Contains database nodes and storage servers
  • Fully managed by Oracle

2. AWS VPC Integration

The ODB Network connects to your AWS VPC using secure peering mechanisms.

  • Private IP-based communication
  • No exposure to public internet
  • Works with existing AWS networking policies

3. Subnets and Routing

Traffic between ODB and AWS is controlled using routing tables and subnet-level isolation.

  • Application tier in AWS connects to DB in ODB
  • Custom route tables define traffic flow

4. Security Layers

  • Network Security Groups (NSGs)
  • Security Lists
  • AWS Security Groups

These layers ensure that only authorized traffic can flow between application and database tiers.


How Connectivity Works (Step-by-Step)

Step 1: Application Request

An application running inside an AWS VPC initiates a database connection request.

Step 2: Routing via VPC

The request is routed through AWS VPC routing tables towards the ODB Network.

Step 3: Secure Peering

The traffic passes through a private, secure connection established between AWS VPC and ODB Network.

Step 4: Database Access

The request reaches the Exadata database node inside the ODB VCN and is processed.

Step 5: Response Flow

The response follows the same path back to the application.

Result: Low latency, secure, and efficient communication.


Integration with AWS Services

ODB Network enables seamless access to AWS-native services:

  • Amazon S3: For backups and data transfer
  • AWS Lambda: Event-driven processing
  • Amazon Redshift: Analytics integration
  • AWS IAM: Secure authentication

This allows building modern data architectures without moving data out of AWS ecosystem.


Hybrid Connectivity

ODB Network also supports hybrid scenarios:

  • On-premises → Exadata@AWS via VPN or Direct Connect
  • AWS applications → Oracle Database

This is useful for phased migrations and disaster recovery setups.


Performance Considerations

  • High bandwidth between AWS and Exadata
  • Optimized for database workloads
  • Minimal network hops

ODB Network is designed to deliver Exadata-level performance even in a multi-cloud setup.


Best Practices

  • Use private endpoints for all communication
  • Restrict access using security groups and NSGs
  • Monitor traffic using AWS and Oracle tools
  • Design subnets for proper tier separation

Common Challenges

  • Misconfigured routing tables
  • Security rules blocking traffic
  • DNS resolution issues
  • Latency due to incorrect architecture design

Conclusion

The ODB Network is a foundational component of Exadata@AWS, enabling secure and high-performance connectivity between Oracle databases and AWS services.

By understanding how ODB networking works, architects and DBAs can design robust, scalable, and secure multi-cloud solutions that fully leverage both Oracle and AWS capabilities.


Further Reading

  • Oracle Database@AWS Documentation
  • Exadata Architecture Guides
  • AWS VPC Networking Best Practices