Mantenha tudo organizado com as coleções
Salve e categorize o conteúdo com base nas suas preferências.
Configurar nome de acesso único de cliente com o Cloud DNS
É possível acessar um cluster do Oracle® Real Application Clusters (RAC) por meio de um
nome DNS altamente disponível fornecido pelo Cloud DNS.
Para isso, aponte a entrada DNS em um Nome de acesso único ao cliente (SCAN) do RAC, que permanece permanente à medida que a topologia do cluster é alterada.
Antes de começar
Você precisa ter acesso aos seguintes recursos e serviços para concluir este guia:
O diagrama a seguir mostra a arquitetura do sistema usada neste guia:
Configurar o Cloud DNS de modo a apontar para o cluster do RAC
Para configurar o acesso de nome DNS único ao seu cluster de RAC, conclua as seguintes etapas:
Se você ainda não executou a Google Cloud CLI, execute o comando a seguir para especificar o nome do projeto
e fazer a autenticação com o console Google Cloud :
Configure cada servidor da Solução Bare Metal para usar o endereço IP da etapa anterior da resolução de nomes. As etapas envolvidas são específicas para seu sistema
operacional.
Por exemplo, para configurar a resolução de nomes no Red Hat Enterprise Linux 8:
Faça login em um servidor da Solução Bare Metal que hospeda um banco de dados RAC como o usuário do banco de dados
configurado no momento da instalação.
Se você não tiver definido as variáveis de ambiente ORACLE_HOME e PATH no seu perfil de shell, defina-as agora para se conectar ao banco de dados.
Solicite a configuração SCAN com srvctl para encontrar o nome SCAN:
srvctlconfigscan
Você receberá uma resposta semelhante ao seguinte exemplo:
Um novo nome de zona para identificar a zona nos comandos de configuração.
Uma descrição da sua zona, para definir melhor a finalidade dela.
O sufixo DNS da sua zona, como mycompany.internal. Isso
precisa corresponder ao sufixo do nome do SCAN retornado no
comando srvctl config scan anterior.
A rede VPC em que a zona DNS particular precisa estar visível.
[[["Fácil de entender","easyToUnderstand","thumb-up"],["Meu problema foi resolvido","solvedMyProblem","thumb-up"],["Outro","otherUp","thumb-up"]],[["Difícil de entender","hardToUnderstand","thumb-down"],["Informações incorretas ou exemplo de código","incorrectInformationOrSampleCode","thumb-down"],["Não contém as informações/amostras de que eu preciso","missingTheInformationSamplesINeed","thumb-down"],["Problema na tradução","translationIssue","thumb-down"],["Outro","otherDown","thumb-down"]],["Última atualização 2025-09-04 UTC."],[[["\u003cp\u003eCloud DNS allows access to an Oracle RAC cluster via a highly-available DNS name that is pointed to a persistent Single Client Access Name (SCAN).\u003c/p\u003e\n"],["\u003cp\u003eSetting up Cloud DNS for a RAC cluster involves configuring an inbound server policy, setting the correct entry point IP address on Bare Metal Solution servers, and setting up Cloud DNS for private Google Access.\u003c/p\u003e\n"],["\u003cp\u003eTo configure the RAC cluster's DNS name, a private zone must be created in Cloud DNS matching the SCAN name's suffix, and an "A" record with the SCAN IPs must be added to that zone.\u003c/p\u003e\n"],["\u003cp\u003eTo verify the success of the configuration, use the \u003ccode\u003enslookup\u003c/code\u003e command on the Bare Metal Solution server to ensure the SCAN name correctly resolves to the associated SCAN IPs.\u003c/p\u003e\n"]]],[],null,["# Configure Single Client Access Name with Cloud DNS\n==================================================\n\nYou can access an Oracle® Real Application Clusters (RAC) cluster via a\nhighly-available DNS name provided by [Cloud DNS](https://cloud.google.com/dns).\nThis is achieved by pointing the DNS entry at a RAC\n[Single Client Access Name (SCAN)](https://www.oracle.com/jp/a/tech/docs/technical-resources/single-client-access-name.pdf),\nwhich stays persistent as cluster topology changes.\n| **Note:** Customers are responsible for procuring licenses for the Oracle workloads they choose to run on Bare Metal Solution, and customers are responsible for complying with those licenses. Google does not provide licenses for Oracle workloads.\n\nBefore you begin\n----------------\n\nYou need access to the following resources and services to complete this guide:\n\n- A [configured Bare Metal Solution server](/bare-metal/docs/bms-setup) that connects to a Google [Virtual Private Cloud (VPC)](https://cloud.google.com/vpc) via a [Partner Cloud Interconnect](https://cloud.google.com/network-connectivity/docs/interconnect).\n- A configured RAC cluster on the Bare Metal Solution server, with a SCAN listener active on each node.\n- [Cloud DNS](https://cloud.google.com/dns).\n\nSystem architecture\n-------------------\n\nThe following diagram shows the system architecture used in this guide:\n\nSet up Cloud DNS to point to your RAC cluster\n---------------------------------------------\n\nTo set up single DNS name access to your RAC cluster, complete the following steps:\n\n1. If you haven't run the [Google Cloud CLI](https://cloud.google.com/sdk/gcloud)\n previously, you must run the following command to specify your project name\n and authenticate with the Google Cloud console:\n\n gcloud auth login\n\n2. [Enable the Cloud DNS API](https://console.cloud.google.com/flows/enableapi?apiid=dns&credential=client_key)\n for your Google Cloud project.\n\n3. [Create an inbound server policy in Cloud DNS](https://cloud.google.com/dns/docs/policies#create-in)\n for the VPC connected to your Bare Metal Solution servers. This\n makes sure your Bare Metal Solution servers can communicate with Cloud DNS.\n\n4. [List the inbound forwarder entry points](https://cloud.google.com/dns/docs/policies#list-in-entrypoints)\n to determine the correct entry point IP address for each Bare Metal Solution\n server.\n\n5. Configure each Bare Metal Solution server to use the IP address from the previous\n step for name resolution. The steps involved are specific to your operating\n system.\n\n For example, to configure name resolution in Red Hat Enterprise Linux 8:\n 1. [Disable NetworkManager DNS processing](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/configuring_and_managing_networking/manually-configuring-the-etc-resolv-conf-file_configuring-and-managing-networking).\n 2. Add the following line to `/etc/resolv.conf`, replacing\n \u003cvar translate=\"no\"\u003eENTRY_POINT_IP_ADDRESS\u003c/var\u003e with the entry point IP address:\n\n nameserver \u003cvar translate=\"no\"\u003eENTRY_POINT_IP_ADDRESS\u003c/var\u003e\n\n6. Configure [Cloud DNS for Private Google Access](/vpc/docs/configure-private-google-access#config-domain).\n\n7. Log into a Bare Metal Solution server that hosts a RAC database as the database\n user that was configured at install time.\n\n8. If you haven't set the `ORACLE_HOME` and `PATH` environment variable in your\n shell profile, set it now so you can connect to your database.\n\n9. Request the SCAN configuration with `srvctl` to find the SCAN name:\n\n srvctl config scan\n\n You should receive a response similar to the following example: \n\n SCAN name: cluster01-scan.mycompany.internal, Network: 1\n Subnet IPv4: /192.168.1.0/255.255.255.0/bond0.118, static\n Subnet IPv6:\n SCAN 1 IPv4 VIP: 192.168.1.30\n SCAN VIP is enabled\n SCAN 2 IPv4 VIP: 192.168.1.31\n SCAN VIP is enabled\n SCAN 3 IPv4 VIP: 192.168.1.32\n SCAN VIP is enabled\n\n The SCAN name in the previous response is\n `cluster01-scan.mycompany.internal`.\n10. [Create a private zone in Cloud DNS](/dns/docs/zones#create-private-zone),\n providing the following details:\n\n - A new zone name, to identify the zone in configuration commands.\n - A description for your zone, to better define its purpose.\n - The DNS name suffix for your zone, such as `mycompany.internal`. This should match the suffix of the SCAN name returned in the previous `srvctl config scan` command.\n - The VPC network that the private DNS zone should be visible to.\n11. [Add a record](/dns/docs/records#adding_a_record) to the previous zone,\n providing the following details:\n\n - The name of the zone you created in the previous step.\n - The full DNS name. In this guide, that's `cluster01-scan.mycompany.internal`.\n - The time to live (TTL). This is how long the DNS record is cached before it's refreshed.\n - The resource record type. For SCAN, this is an `A` record.\n - The SCAN IPs returned in the previous `srvctl config scan` command.\n\n Repeat this process for any additional names that need to be resolved.\n12. On the Bare Metal Solution server, validate that SCAN resolution is working with\n `nslookup`:\n\n nslookup cluster01-scan.mycompany.internal\n\n If successful, you should receive a response similar to the following\n example: \n\n Server: 10.158.0.3\n Address: 10.158.0.3#53\n\n Name: cluster01-scan.mycompany.internal\n Address: 192.168.1.32\n Name: cluster01-scan.mycompany.internal\n Address: 192.168.1.30\n Name: cluster01-scan.mycompany.internal\n Address: 192.168.1.31\n\nYou can now access your RAC cluster using a single, highly available, resilient\nDNS name via Cloud DNS.\n\n~Oracle is a registered trademark of Oracle and/or its affiliates.~"]]