Skip to content

Commit 1203619

Browse files
committed
README updates
At line 53, it´s noted that the Terraform config will set port to 1521 if no value is provided in JSON-input At line 84-85, it´s noted that credential details are visible as plain text in both the JSON-input and in the tfstate, so both files should be managed securely
1 parent def7498 commit 1203619

File tree

1 file changed

+3
-1
lines changed
  • manageability-and-operations/observability-and-manageability/external-database-enablement

1 file changed

+3
-1
lines changed

manageability-and-operations/observability-and-manageability/external-database-enablement/README.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -50,7 +50,7 @@ This asset is for anyone managing multiple on-prem database systems who needs to
5050
| ***Key*** | ***Description*** | ***Mandatory*** |
5151
|--------------|-----------|------------|
5252
| **host** | Host name used by management agent for connections with container and pluggable databases in system<br>**NOTE**: It is recommended to use the SCAN hostname for RAC systems | Yes |
53-
| **port** | Port used by management agent for connections with container and pluggable databases in system | Yes |
53+
| **port** | Port used by management agent for connections with container and pluggable databases in system<br>**NOTE**: Set to 1521 by default if no value is provided | Yes |
5454
| **protocol** | Protocol used by management agent for connections with container and pluggable databases in system<br>**NOTE**: Must be **TCP** or **TCPS** | Yes |
5555
| **managementAgentId** | OCID of the management agent connecting to container and pluggable databases in system | Yes |
5656
| **databaseCredentials** | Key for credential object in **root_module/db_credentials.json** used by management agent for database connections<br>**NOTE**: If **protocol** is set to **TCPS**, the credential object must include **sslSecretId** | Yes |
@@ -81,6 +81,8 @@ This asset is for anyone managing multiple on-prem database systems who needs to
8181
| **userPasswordSecretId** | OCID for encrypted Secret with database user password in OCI Vault. Click [here](https://docs.oracle.com/en-us/iaas/Content/KeyManagement/Tasks/managingsecrets.htm) for more<br>**NOTE**: Required to enable Stack Monitoring for ASM | No, if using **userPassword** instead |
8282
| **userRole** | Database user role for management agent connections<br>**NOTE**: For database connections, **userRole** can be **NORMAL** or **SYSDBA**. For ASM connections, **userRole** can be **SYSASM**, **SYSDBA**, or **SYSOPER** | Yes |
8383
| **sslSecretId** | OCID for encrypted Secret with JSON containing SSL-settings for database connections via TCPS. Click [here](https://docs.oracle.com/en-us/iaas/external-database/doc/create-connection-external-database.html#EXTUG-GUID-59ECD72C-EAC2-426D-B865-D8DDB1297F0E) for more | Yes, if **protocol** is set to **TCPS** for database system object in **root_module/db_systems.json**|
84+
85+
**NOTE**: **CREDENTIAL VALUES ABOVE ARE SAVED AS PLAIN TEXT** IN BOTH **root_module/db_credentials.json** AS WELL AS IN **root_module/terraform.tfstate** AFTER APPLYING THE TERRAFORM CONFIGURATION. **ENSURE THAT THESE FILES ARE STORED SECURELY**
8486

8587
6. Run the following commands from **root_module** to initialize the Terraform configuration, see its execution plan, and finally apply that plan:
8688

0 commit comments

Comments
 (0)