Oracle PeopleSoft on Compute Engine with Oracle Exadata

Last reviewed 2025-08-21 UTC

This document provides a reference architecture to help you build the infrastructure to run Oracle PeopleSoft applications on Compute Engine VMs with low-latency connectivity to Oracle Database@Google Cloud (Oracle Cloud Infrastructure Exadata databases that run within Google Cloud). Oracle PeopleSoft is a suite of enterprise applications for human capital management, campus solutions, and enterprise resource planning.

The intended audience for this document is cloud architects and administrators of Oracle databases and Oracle PeopleSoft applications. The document assumes that you're familiar with Oracle PeopleSoft applications and Oracle databases.

Architecture

The following diagram shows an architecture where Oracle PeopleSoft applications run on Compute Engine VMs in a Google Cloud region and use Oracle Exadata databases in the same Google Cloud region.

Architecture for Oracle PeopleSoft with Oracle Exadata.

The architecture in the preceding diagram includes the following components:

Component Purpose
Regional external Application Load Balancer The load balancer receives user requests and distributes them to the Oracle PeopleSoft web servers. To ensure session affinity, the load balancer is configured to use generated cookies.
Google Cloud Armor security policy The Cloud Armor security policy helps to protect your application stack against threats like distributed denial-of-service (DDoS) attacks and cross-site scripting (XSS).
Oracle PeopleSoft web tier (BYOL) The Oracle PeopleSoft web tier consists of web servers that run independently on two Compute Engine VMs. You bring your own licenses (BYOL) for Oracle PeopleSoft, and you manage the VMs and the web server software.
Web server binaries A Filestore instance contains the web server binaries. The Filestore instance is mounted on all of the Compute Engine VMs that host the web servers.
Oracle PeopleSoft mid tier (BYOL)

The Oracle PeopleSoft mid tier consists of the following components:

  • OpenSearch
  • Application server
  • Process Scheduler

Each of these components runs independently on two Compute Engine VMs. You bring your own licenses (BYOL) for the Oracle PeopleSoft components, and you manage the VMs and the mid-tier software.

Mid-tier binaries A Filestore instance contains the mid-tier binaries. The Filestore instance is mounted on all of the Compute Engine VMs that host the mid-tier components.
Application backups Backups of the application are created, stored, and managed by using Backup and DR Service.
Virtual Private Cloud (VPC) network All of the Google Cloud resources in the architecture use a single VPC network. The web servers, mid-tier components, and databases are in separate subnets.
Oracle Database@Google Cloud

The Oracle PeopleSoft applications read data from and write to Oracle databases in Oracle Exadata Database Service. You provision Oracle Exadata Database Service by using Oracle Database@Google Cloud, a Cloud Marketplace offering that lets you run Oracle databases on Oracle-managed hardware within a Google Cloud data center.

You use Google Cloud interfaces like the Google Cloud console, the Google Cloud CLI, and APIs to create Exadata Infrastructure instances. Oracle sets up and manages the required compute, storage, and networking infrastructure in a data center within a Google Cloud region on hardware that's dedicated for your project.

To optimize the latency between the application and the database, deploy the application in the same zone where you create the Exadata Infrastructure instances.

Exadata Infrastructure instance The Exadata Infrastructure instance contains two or more physical database servers and three or more storage servers. These servers, which aren't shown in the diagram, are interconnected using a low-latency network fabric. When you create the Exadata Infrastructure instance, you specify the number of database servers and storage servers that must be provisioned.
Exadata VM Clusters

Within the Exadata Infrastructure instance, you create one or more Exadata VM Clusters. For example, you can choose to create and use a separate Exadata VM Cluster to host the databases that are required for each of your business units. Each Exadata VM Cluster contains one or more Oracle Linux VMs that host Oracle Database instances.

When you create an Exadata VM Cluster, you specify the following:

  • The number of database servers.
  • The compute, memory, and storage capacity to be allocated to each VM in the cluster.
  • The VPC network that the cluster must connect to.
  • The IP address ranges of the backup and client subnets for the cluster.

The VMs within Exadata VM Clusters are not Compute Engine VMs.

Oracle Database instances You create and manage Oracle Database instances through the Oracle Cloud Infrastructure (OCI) console and other OCI interfaces. Oracle Database software runs on the VMs within the Exadata VM Cluster. When you create the Exadata VM Cluster, you specify the Oracle Grid Infrastructure version and choose the license type. You can either bring your own licenses (BYOL) or opt for the license-included model.
OCI VCN and subnets When you create an Exadata VM Cluster, an OCI virtual cloud network (VCN) is created automatically. The VCN has a client subnet and a backup subnet with IP address ranges that you specify. The client subnet is used for connectivity from your VPC network to the Oracle databases. The backup subnet is used to send database backups to OCI Object Storage.
Cloud Router, Partner Interconnect, and OCI DRG Traffic between your VPC network in Google Cloud and the OCI VCN is routed by a Cloud Router through a dynamic routing gateway (DRG) that's attached to the OCI VCN. The traffic flows through a low-latency connection that Google sets up using Partner Interconnect.
Private Cloud DNS zone When you create an Exadata VM Cluster, a Cloud DNS private zone is created automatically. When your applications send read and write requests to the Oracle databases, Cloud DNS resolves the database hostnames to the corresponding IP addresses.
OCI Object Storage and OCI Service Gateway By default, backups of the Oracle Exadata databases are stored in OCI Object Storage. Database backups are routed to OCI Object Storage through a Service Gateway.
Public Cloud NAT gateway (optional) The architecture includes an optional public Cloud NAT gateway. The gateway enables secure outbound connections from the Compute Engine VMs, which have only internal IP addresses.
Cloud Interconnect or Cloud VPN To connect your on-premises network to the VPC network in Google Cloud, you can use Cloud Interconnect or Cloud VPN. For information about the relative advantages of each approach, see Choosing a Network Connectivity product.
Cloud Monitoring You can use Cloud Monitoring to observe the behavior, health, and performance of your application and Google Cloud resources, including the Oracle Exadata resources. You can also monitor the Oracle Exadata resources by using the OCI Monitoring service.

Products used

This reference architecture uses the following Google Cloud products:

  • Compute Engine: A secure and customizable compute service that lets you create and run VMs on Google's infrastructure.
  • Cloud Load Balancing: A portfolio of high performance, scalable, global and regional load balancers.
  • Google Cloud Armor: A network security service that offers web application firewall (WAF) rules and helps to protect against DDoS and application attacks.
  • Virtual Private Cloud (VPC): A virtual system that provides global, scalable networking functionality for your Google Cloud workloads. VPC includes VPC Network Peering, Private Service Connect, private services access, and Shared VPC.
  • Cloud Interconnect: A service that extends your external network to the Google network through a high-availability, low-latency connection.
  • Partner Interconnect: A service that provides connectivity between your on-premises network and your Virtual Private Cloud networks and other networks through a supported service provider.
  • Cloud VPN: A service that securely extends your peer network to Google's network through an IPsec VPN tunnel.
  • Cloud NAT: A service that provides Google Cloud-managed high-performance network address translation.
  • Backup and DR Service: A secure, centrally-managed backup and recovery service for Google Cloud workloads that helps protect backup data from malicious or accidental deletion.
  • Cloud DNS: A service that provides resilient, low-latency DNS serving from Google's worldwide network.

This reference architecture uses the following Oracle products:

  • Oracle PeopleSoft: A suite of enterprise applications for human capital management, campus solutions, and enterprise resource planning.
  • Exadata Database Service on Dedicated Infrastructure: A service that lets you run Oracle Database instances on Exadata hardware that's dedicated for you.
  • VCN and subnets: A VCN is a virtual and private network for resources in an OCI region. A subnet is a contiguous range of IP addresses with a VCN.
  • Dynamic Routing Gateway: A virtual router for traffic between a VCN and external networks.
  • Object Storage: A service for storing large amounts of structured and unstructured data as objects.
  • Service Gateway: A gateway to let resources in a VCN access specific Oracle services privately.

You're responsible for procuring licenses for the Oracle products that you deploy in Google Cloud, and you're responsible for complying with the terms and conditions of the Oracle licenses.

Design considerations

This section describes design factors, best practices, and design recommendations that you should consider when you use this reference architecture to develop a topology that meets your specific requirements for security, reliability, operational efficiency, cost, and performance. When you build the architecture for your workload, also consider the best practices and recommendations in the Google Cloud Well-Architected Framework.

System design

This section provides guidance to help you to choose Google Cloud regions for your deployment and to select appropriate Google Cloud services.

Region selection

When you choose the Google Cloud regions where your applications must be deployed, consider the following factors and requirements:

  • Availability of Google Cloud services in each region. For more information, see Products available by location.
  • Availability of Compute Engine machine types in each region. For more information, see Regions and zones.
  • End-user latency requirements.
  • Cost of Google Cloud resources.
  • Cross-regional data transfer costs.
  • Regulatory requirements.

Some of these factors and requirements might involve trade-offs. For example, the most cost-efficient region might not have the lowest carbon footprint. For more information, see Best practices for Compute Engine regions selection.

Database migration

When you plan to migrate on-premises databases to Oracle Database@Google Cloud, assess your current database environment and get configuration and sizing recommendations by using the Database Migration Assessment (DMA) tool.

For information about the procedure and tools that you can use to migrate Oracle databases to Google Cloud, see the Oracle Migration Methods Advisor.

Before you use the migrated databases in a production environment, verify connectivity from your applications to the databases.

Storage options

For the Compute Engine VMs in the architecture, you can use Hyperdisk or Persistent Disk boot volumes. Hyperdisk volumes provide better performance, flexibility, and efficiency than Persistent Disk. With Hyperdisk Balanced, you can provision IOPS and throughput separately and dynamically, which lets you tune the volume to a wide variety of workloads.

To store application binaries, use Filestore. Files that you store in a Filestore Regional instance are replicated synchronously across three zones within the region. This replication helps to ensure high availability and robustness against zone outages. For robustness against region outages, you can replicate a Filestore instance to a different region. For more information, see Instance replication.

When you design storage for your workloads, consider the functional characteristics of the workloads, resilience requirements, performance expectations, and cost goals. For more information, see Design an optimal storage strategy for your cloud workload.

Oracle Database@Google Cloud network design

Choose a network design that meets your business and technical requirements. For example, you can use a single VPC network or multiple VPC networks. For more information, see Learn about selecting network topologies for Oracle Database@Google Cloud.

When you assign IP address ranges for the client and backup subnets to be used for the Exadata VM Clusters, consider the minimum subnet size requirements. For more information, see Plan for IP Address Space in Oracle Database@Google Cloud.

Security, privacy, and compliance

This section describes factors to consider when you use this reference architecture to design a topology in Google Cloud that meets the security and compliance requirements of your workloads.

Protection against external threats

To protect your application against threats like distributed-denial-of-service (DDoS) attacks and cross-site scripting (XSS), you can use Google Cloud Armor security policies. Each policy is a set of rules that specifies certain conditions that should be evaluated and actions to take when the conditions are met. For example, a rule could specify that if the source IP address of the incoming traffic matches a specific IP address or CIDR range, then the traffic must be denied. You can also apply preconfigured web application firewall (WAF) rules. For more information, see Security policy overview.

External access for VMs

In the reference architecture that this document describes, the Compute Engine VMs don't need inbound access from the internet. Don't assign external IP addresses to the VMs. Google Cloud resources that have only a private, internal IP address can still access certain Google APIs and services by using Private Service Connect or Private Google Access. For more information, see Private access options for services.

To enable secure outbound connections from Google Cloud resources that have only private IP addresses, like the Compute Engine VMs in this reference architecture, you can use Secure Web Proxy or Cloud NAT.

For the subnets that are used by the Exadata VMs, Oracle recommends that you assign private IP address ranges.

Service account privileges

For the Compute Engine VMs in the architecture, instead of using the default service accounts, we recommend that you create dedicated service accounts and specify the resources that the service account can access. The default service account has a broad range of permissions, including some that might not be necessary. You can tailor dedicated service accounts to have only the essential permissions. For more information, see Limit service account privileges.

SSH security

To enhance the security of SSH connections to the Compute Engine VMs in your architecture, implement Identity-Aware Proxy (IAP) and Cloud OS Login API. IAP lets you control network access based on user identity and Identity and Access Management (IAM) policies. Cloud OS Login API lets you control Linux SSH access based on user identity and IAM policies. For more information about managing network access, see Best practices for controlling SSH login access.

Data encryption

By default, the data that's stored in Hyperdisk, Persistent Disk, and Filestore is encrypted using Google-owned and Google-managed encryption keys. As an additional layer of protection, you can choose to encrypt the Google-owned and managed key by using keys that you own and manage in Cloud Key Management Service (Cloud KMS). For more information, see About disk encryption for Hyperdisk and Persistent Disk volumes and Encrypt data with customer-managed encryption keys for Filestore.

By default, Exadata databases use Transparent Data Encryption (TDE), which lets you encrypt sensitive data that's stored in tables and tablespaces.

Network security

To control network traffic between the resources in the architecture, you must configure appropriate Cloud Next Generation Firewall (NGFW) policies.

For the web server VMs, ensure that the ingress policy's source field includes the following:

Oracle Exadata security and compliance

Oracle Exadata Database Service includes Oracle Data Safe, which helps you manage security and compliance requirements for Oracle databases. You can use Oracle Data Safe to evaluate security controls, monitor user activity, and mask sensitive data. For more information, see Manage Database Security with Oracle Data Safe.

More security considerations

When you build the architecture for your workload, consider the platform-level security best practices and recommendations that are provided in the Enterprise foundations blueprint and Google Cloud Well-Architected Framework: Security, privacy, and compliance.

Reliability

This section describes design factors to consider when you use this reference architecture to build and operate reliable infrastructure for your deployment in Google Cloud.

Robustness of the application layer against VM failures

If one of two VMs that host each Oracle PeopleSoft component fails, the application continues to be available. Requests are routed to the other VM.

Sometimes a VM might be running and available, but there might be issues with the Oracle Peoplesoft component itself. The component might freeze, crash, or not have enough memory. In these scenarios, the VM won't respond to load-balancer health checks, and the load balancer won't route traffic to the unresponsive VM.

Robustness against zone or region outages

If a zone or region outage occurs, the application is unavailable. To reduce the downtime caused by such outages, you can implement the following approach:

  • Maintain a passive (failover) replica of the application stack in another Google Cloud region or zone.
  • Create a standby Exadata Infrastructure instance with the required Exadata VM Clusters in the same zone that has the passive replica of the application stack. Use Oracle Active Data Guard for data replication and automatic failover to the standby Exadata databases. If your application needs a lower recovery point objective (RPO), you can back up and recover the databases by using Oracle Autonomous Recovery Service.
  • If an outage occurs in the primary region or zone, use the database replica or backup to restore the database to production and to activate the application in the failover region or zone.
  • If the passive replica is in a different region, use Cloud DNS routing policies to route traffic to the external load balancer in that region.

For more information, see Oracle Maximum Availability Architecture (MAA) for Oracle Database@Google Cloud.

Oracle manages the infrastructure in Oracle Database@Google Cloud. For information about the service level objectives (SLOs) for Oracle Exadata Database Service on Dedicated Infrastructure, see Service Level Objectives for Oracle PaaS and IaaS Public Cloud Services.

VM capacity planning

To make sure that capacity for Compute Engine VMs is available when VMs need to be provisioned, you can create reservations. A reservation provides assured capacity in a specific zone for a specified number of VMs of a machine type that you choose. A reservation can be specific to a project, or shared across multiple projects. For more information about reservations, see Choose a reservation type.

Oracle Exadata capacity

You can scale Exadata Infrastructure by adding database servers and storage servers as needed. After you add the required database servers or storage servers to Exadata Infrastructure, to be able to use the additional CPU or storage resources, you must add the capacity to the associated Exadata VM cluster. For more information, see Scaling Exadata Compute and Storage.

Data durability

You can use Backup and DR Service to create, store, and manage backups of Compute Engine VMs. Backup and DR stores backup data in its original, application-readable format. When required, you can restore workloads to production by directly using data from long-term backup storage without time-consuming data-movement or preparation activities. For more information, see Backup and DR for Compute Engine instance backups.

To ensure the durability of data in your Filestore instances, you can create backups and snapshots of the instance or use Backup and DR for Filestore and file systems.

By default, backups of databases in Oracle Exadata Database Service on Dedicated Infrastructure are stored in OCI Object Storage. To achieve a lower RPO, you can backup and recover the databases by using Oracle Autonomous Recovery Service.

More reliability considerations

When you build the cloud architecture for your workload, review the reliability-related best practices and recommendations that are provided in the following documentation:

Cost optimization

This section provides guidance to optimize the cost of setting up and operating a Google Cloud topology that you build by using this reference architecture.

VM machine types

To help you optimize the resource utilization of your VM instances, Compute Engine provides machine type recommendations. Use the recommendations to choose machine types that match your workload's compute requirements. For workloads with predictable resource requirements, you can customize the machine type to your needs and save money by using custom machine types.

Oracle product licenses

You're responsible for procuring licenses for the Oracle products that you deploy on Compute Engine, and you're responsible for complying with the terms and conditions of the Oracle licenses. For more information, see Licensing Oracle Software in the Cloud Computing Environment.

Oracle Exadata database licensing

When you create an Exadata VM Cluster, you can either bring your own license (BYOL) or use a license that you purchased as part of your Google Cloud Marketplace order for Oracle Database@Google Cloud.

Networking charges for data transfer between your applications and Oracle Exadata databases that are within the same region are included in the price of the Oracle Database@Google Cloud offering.

More cost considerations

When you build the architecture for your workload, also consider the general best practices and recommendations that are provided in Google Cloud Well-Architected Framework: Cost optimization.

Operational efficiency

This section describes the factors to consider when you use this reference architecture to design a Google Cloud topology that you can operate efficiently.

Oracle Linux images

For your VMs, you can use Oracle Linux images that are available in Compute Engine or you can import Oracle Linux images that you build and maintain. You can also create and use custom OS images that include the configurations and software that your applications require. You can group your custom images into a custom image family. An image family always points to the most recent image in that family, so your instance templates and scripts can use that image without you having to update references to a specific image version. You must regularly update your custom images to include the security updates and patches that are provided by the OS vendor.

Oracle Exadata database administration

Oracle manages the physical database servers, storage servers, and networking hardware in Oracle Exadata Database Service on Dedicated Infrastructure. You can manage the Exadata Infrastructure instances and the Exadata VM Clusters through the OCI or Google Cloud interfaces. You create and manage databases through the OCI interfaces. The Google Cloud console pages for Oracle Database@Google Cloud include links that you can use to go directly to the relevant pages in the OCI console. To avoid the need to sign in again to OCI, you can configure identity federation between OCI and Google Cloud.

Observability for Oracle applications

To implement observability for Oracle workloads deployed in Google Cloud, you can use Google Cloud Observability services or Oracle Enterprise Manager. Choose an appropriate monitoring strategy depending on your requirements and constraints. For example, if you run other workloads in Google Cloud in addition to Oracle workloads, then you can use Google Cloud Observability services to build a unified operations dashboard for all of the workloads.

Oracle documentation and support

Oracle products that run on Compute Engine VMs have similar operational concerns as Oracle products that run on-premises. However, you don't need to manage the underlying compute, networking, and storage infrastructure. For guidance about operating and managing Oracle products, see the relevant Oracle documentation.

For information about Oracle's support policy for Oracle Database instances that you deploy in Google Cloud, see Oracle Database Support for Non-Oracle Public Cloud Environments (Doc ID 2688277.1).

More operational considerations

When you build the architecture for your workload, consider the general best practices and recommendations for operational efficiency that are described in Google Cloud Well-Architected Framework: Operational excellence.

Performance optimization

This section describes the factors to consider when you use this reference architecture to design a topology in Google Cloud that meets the performance requirements of your workloads.

Compute performance

Compute Engine offers a wide range of predefined and customizable machine types for the workloads that you run on VMs. Choose an appropriate machine type based on your performance requirements. For more information, see Machine families resource and comparison guide.

Network performance

Compute Engine has a per-VM limit for egress network bandwidth. This limit depends on the VM's machine type and whether traffic is routed through the same VPC network as the source VM. For VMs with certain machine types, you can get a higher maximum egress bandwidth by enabling Tier_1 networking. For more information, see Configure per VM Tier_1 networking performance.

Network traffic between the application VMs and the Oracle Exadata network is routed through a low-latency Partner Interconnect connection that Google sets up.

Exadata Infrastructure uses RDMA over Converged Ethernet (RoCE) for high bandwidth and low latency networking among its database servers and storage servers. The servers exchange data directly in main memory without involving the processor, cache, or operating system.

To optimize the latency between your application and the database, deploy the application in the same zone where you create the Exadata Infrastructure instance.

More performance considerations

When you build the architecture for your workload, consider the general best practices and recommendations that are provided in Google Cloud Well-Architected Framework: Performance optimization.

What's next

Contributors

Author: Kumar Dhanagopal | Cross-Product Solution Developer

Other contributors: