Edit

Share via


Organize Oracle Database@Azure resources for consistent deployments

This article describes how to organize Oracle Database@Azure resources across Azure subscriptions and establish consistent deployment patterns. Proper resource organization reduces operational complexity and improves security posture for Oracle database workloads.

Oracle Database@Azure is an Oracle database service that runs on Oracle Cloud Infrastructure (OCI) hardware colocated in Microsoft datacenters. You can deploy two types of Oracle Database@Azure services:

  • Oracle Exadata Database@Azure: Dedicated Exadata racks that you provision and operate inside your Azure subscriptions

  • Oracle Autonomous Database@Azure: Fully managed, self-driving autonomous databases that run on shared Exadata infrastructure

This article expands on considerations and recommendations described in the Azure landing zone design area for resource organization. These recommendations help you create consistent deployment patterns for Oracle Database@Azure services.

Establish naming and tagging conventions

Consistent naming conventions reduce management complexity and enable teams to identify Oracle Database@Azure resources quickly. These conventions provide operational efficiency and support governance policies across your deployment. Implement standardized naming patterns that accommodate both Azure requirements and Oracle-specific constraints:

  • Apply Azure baseline naming standards consistently. The Azure general naming conventions establish patterns for resource identification and organization. These conventions work with Oracle Database@Azure resources but require adjustments for Oracle-specific limitations like character restrictions and length limits.

  • Account for Oracle Database@Azure resource constraints. Virtual machine (VM) clusters and database instances have specific naming requirements that differ from standard Azure resources. Oracle Autonomous Database@Azure instance names accept only letters and numbers, limit names to 30 characters maximum, and prohibit spaces or special characters.

  • Create environment-specific naming patterns. Consistent patterns identify the environment, application, and purpose of each Oracle Database@Azure instance. This standardization simplifies resource management and improves operational visibility across your deployment.

  • Implement comprehensive tagging strategies. Tags organize resources, track costs, and enforce governance policies across Oracle Database@Azure deployments. Apply tags for environment classification, cost center allocation, application ownership, and compliance requirements to maintain visibility and control.

Apply naming and tagging conventions for Oracle Database@Azure

Oracle Database@Azure resources have specific naming constraints that require careful consideration. VM clusters have character limits and allowed character restrictions that differ from standard Azure resources. You must understand these constraints to create effective naming patterns. Use the Azure general naming conventions as your baseline and adapt them for Oracle Database@Azure requirements.

Oracle Autonomous Database@Azure instance names can contain only letters and numbers, have a maximum length of 30 characters, and can't include spaces. Create a consistent naming pattern that clearly identifies the environment, application, and purpose of each Oracle Autonomous Database@Azure instance.

Environment Application type Azure region Example name
Production Enterprise Resource Planning (ERP) applications East US adbeuserpprod
Disaster recovery Human Resources (HR) applications Canada Central adbcachrdr
Quality assurance Business intelligence Australia East adbaueabiqa

The examples reflect the resource type, region, application type, and environment:

  • adbeuserpprod: An autonomous database (adb) in East US (eus) for ERP applications (erp) in production (prod).

  • adbcachrdr: An autonomous database (adb) in Canada Central (cac) for HR applications (hr) in disaster recovery (dr).

  • adbaueabiqa: An autonomous database (adb) in Australia East (auea) for business intelligence (bi) in quality assurance (qa).

For more information about character limits and allowed characters, see Provision Oracle Database@Azure and Use tags to organize your Azure resources.

Implement security and isolation best practices

Security isolation protects Oracle Database@Azure deployments from unauthorized access and reduces the blast radius during incidents. Proper isolation strategies ensure that compromises in one environment don't affect other areas across your multiple subscription architecture.

To implement comprehensive isolation measures that protect both Oracle Database@Azure resources and supporting Azure infrastructure, apply the following practices:

  • Apply logical isolation between environments. Each Oracle Database@Azure environment requires separate security boundaries to prevent cross-environment access and maintain compliance requirements. To ensure that development teams can't access production Oracle databases, use Azure subscriptions as primary isolation boundaries and implement Azure role-based access control (RBAC) by using environment-specific permissions.

  • Enforce least privilege access principles. Oracle Database@Azure resources need restricted access that grants users only the minimum permissions necessary for their roles.

    • Configure Microsoft Entra ID groups with environment-specific access to Oracle Database@Azure resources.

    • Audit permissions regularly to maintain security posture and compliance standards.

  • Implement network segmentation strategies. Network isolation protects Oracle Database@Azure traffic from unauthorized interception and lateral movement attacks.

    • Use Azure virtual networks that have dedicated subnets for Oracle Database@Azure resources.

    • Configure network security groups (NSGs) by defining restrictive rules.

    • Implement Azure Firewall or non-Microsoft network virtual appliances for advanced threat protection.

  • Configure monitoring and alerting systems. Security monitoring detects anomalous activity across Oracle Database@Azure deployments and enables rapid incident response.

    • Deploy Azure Security Center for unified security management.

    • Configure Microsoft Sentinel for security information and event management (SIEM).

    • Establish automated alerts for suspicious Oracle database access patterns or configuration changes.

For more information, see Best practices for isolation architectures.

Use a multiple subscription architecture

Multiple subscription architectures provide environment isolation and improve security posture for Oracle Database@Azure deployments. Each environment operates within its own Azure subscription boundary to create clear separation for security, networking, cost allocation, and management purposes. This isolation prevents cross-environment access and reduces the impact radius during security incidents or operational problems.

Design a subscription model that assigns a dedicated Azure subscription to each environment:

  • Create environment-specific subscriptions. Establish separate Azure subscriptions for production, development, testing, and disaster recovery environments. This subscription isolation prevents cross-environment access and reduces the impact radius during security incidents or operational problems.

  • Configure subscription billing alignment. Ensure that all subscriptions use the same billing account as the primary subscription to maintain consistent cost management and avoid billing complications across your Oracle Database@Azure deployment.

  • Plan for workload isolation in production. For mission-critical workloads that use Oracle Autonomous Database@Azure, create separate production subscriptions for each major application to minimize the impact radius and simplify RBAC management.

Verify onboarding permissions

Azure identities need specific permissions to deploy and manage Oracle Database@Azure resources. You must validate that your identity can perform required actions before you begin the onboarding process. This verification prevents deployment failures and ensures smooth resource provisioning.

Confirm the following permissions in your Azure subscription:

  • Register required resource providers. Oracle Database@Azure relies on specific Azure resource providers that you must register before deployment. Register the following providers in each subscription that hosts Oracle Database@Azure resources:

    • Oracle.Database
    • Microsoft.BareMetal
    • Microsoft.Network
    • Microsoft.Compute
  • Create Oracle Account resources. The onboarding process creates an Oracle Account resource that establishes the connection between Azure and OCI. Your identity must have permissions to create and manage these account resources.

  • Manage network infrastructure. Oracle Database@Azure requires dedicated network resources, including virtual networks, delegated subnets, route tables, and NSGs. Your identity must have permissions to create and configure these networking components.

  • Assign RBAC permissions. You must assign appropriate RBAC permissions to enable team members to access and manage Oracle Database@Azure resources according to their roles and responsibilities.

To provide the necessary permissions for Oracle Database@Azure onboarding and management tasks, we recommend that you use the Owner role or the Contributor role combined with the User Access Administrator role.

For the complete permissions matrix organized by persona and task, see Onboarding permissions.

Monitor billing across subscriptions

Cost tracking requires careful monitoring across multiple subscription architectures because Oracle Database@Azure billing consolidates under the primary subscription. Understand cost allocation patterns and use appropriate tools for comprehensive expense tracking.

Use Microsoft Cost Management tools to track overall Azure expenses across all subscriptions:

  • Review costs regularly by using Cost Management tools. These tools provide insights into overall Azure expenses and track resource usage patterns across your Oracle Database@Azure deployment.

  • Understand billing consolidation. Charges related to the Oracle Account resource in the primary subscription consolidate under that subscription through the private offer. Individual per-subscription billing details aren't itemized in Azure for Oracle Database@Azure resources.

  • Track independent charges through OCI. For detailed cost tracking and invoicing specific to Oracle Database@Azure usage, refer to OCI cost management tools and reports.

Implement a multiple subscription setup

Multiple subscription architectures support Oracle Database@Azure deployments across development, testing, production, and disaster recovery environments. This architecture provides environment isolation while maintaining operational efficiency through shared infrastructure components.

The following diagram illustrates a multiple subscription setup for Oracle Exadata Database@Azure.

Diagram that shows Oracle Exadata Database@Azure deployed across multiple Azure subscriptions.

When you plan deployments across subscriptions, consider how infrastructure placement affects latency and availability:

  • Understand availability zone mappings. Logical availability zones in different subscriptions don't correspond to the same physical availability zones. This mapping difference can create performance inconsistencies for applications that access Oracle databases across subscription boundaries.

    For example, deploying an Oracle database in zone 1 of subscription A and a related client application in zone 1 of subscription B can result in unexpected latency if these zones map to physically distant locations. Understand zone mappings for each subscription and align applications with databases in zones that provide intended geographical and network proximity. For more information, see Physical and logical availability zones.

  • Configure shared Exadata infrastructure. You can share Oracle Exadata Database@Azure infrastructure across multiple environments, including production, development, unit testing, and system integration testing. This shared infrastructure approach optimizes resource usage while maintaining environment isolation through separate Azure subscriptions.

Consider the following factors when you design the subscription setup for Oracle Database@Azure:

  • Primary subscription: During onboarding, choose an initial Azure subscription. This subscription serves as the primary subscription for Oracle Database@Azure and forms the foundation for all Oracle Database@Azure deployments.

    • Onboarding permissions and resource providers: See the onboarding permissions table for the minimum Azure and OCI roles required.

    • Resource registration: Oracle Database@Azure operates on Azure as a bare-metal service. Register the following resource providers before you begin Oracle Database@Azure onboarding:

      • Oracle.Database
      • Microsoft.BareMetal/BareMetalConnections/read
      • Microsoft.BareMetal/BareMetalConnections/write
      • Microsoft.BareMetal/BareMetalConnections/delete
  • Secondary subscriptions: When you expand into secondary subscriptions, Oracle Exadata Database@Azure VM clusters in these subscriptions default to the same availability zone as the primary subscription. To ensure performance, high availability, and redundancy, align application services with the availability zone of the VM cluster.

  • Resource groups: Within each subscription, you can organize resources such as Oracle Exadata Database@Azure VM clusters, virtual networks, and supporting infrastructure into different resource groups. This setup allows for the logical separation and management of resources and enables flexibility in how you deploy and maintain infrastructure components.

Azure resources

The following table lists Azure tools and resources that support Oracle Database@Azure resource organization recommendations.

Category Tool Description
Resource organization Azure Resource Manager Provides deployment and management capabilities for Oracle Database@Azure resources across multiple subscriptions
Cost management Cost Management Tracks expenses and usage patterns across Oracle Database@Azure deployments in multiple subscriptions
Identity and access Microsoft Entra ID Manages user identities and access permissions for Oracle Database@Azure resources
Resource tagging Azure resource tags Organizes Oracle Database@Azure resources for cost allocation and governance
Security monitoring Microsoft Defender for Cloud Provides unified security management for Oracle Database@Azure resources
Network security Azure NSGs Controls network access to Oracle Database@Azure resources
Monitoring and alerts Microsoft Sentinel Delivers SIEM for Oracle Database@Azure deployments

Next step