Organiza tus páginas con colecciones
Guarda y categoriza el contenido según tus preferencias.
Configura el nombre de acceso de cliente único con Cloud DNS
Puedes acceder a un clúster de Oracle® Real Application Clusters (RAC) mediante un nombre de DNS con alta disponibilidad proporcionado por Cloud DNS.
Para ello, se apunta la entrada de DNS a un nombre de acceso de cliente único (SCAN) de RAC, que se mantiene como cambios de la topología del clúster.
Antes de comenzar
Necesitas acceso a los siguientes recursos y servicios para completar esta guía:
En el siguiente diagrama, se muestra la arquitectura del sistema que se usa en esta guía:
Configura Cloud DNS para que se oriente a tu clúster de RAC
Para configurar el acceso de nombre de DNS único al clúster de RAC, completa los siguientes pasos:
Si no ejecutaste Google Cloud CLI antes, debes ejecutar el siguiente comando para especificar el nombre del proyecto y autenticarlo con la consola de Google Cloud :
Crea una política del servidor entrante en Cloud DNS para la VPC conectada a los servidores de la solución Bare Metal. Esto garantiza que los servidores de la solución Bare Metal puedan comunicarse con Cloud DNS.
Configura cada servidor de la solución Bare Metal a fin de usar la dirección IP del paso anterior para la resolución de nombres. Los pasos involucrados son específicos de tu sistema operativo.
Por ejemplo, para configurar la resolución de nombres en Red Hat Enterprise Linux 8, haz lo siguiente:
Accede a un servidor de la solución Bare Metal que aloja una base de datos de RAC como usuario de la base de datos que se configuró en el momento de la instalación.
Si no configuraste las variables de entorno ORACLE_HOME y PATH en tu perfil de shell, hazlo ahora para poder conectarte a la base de datos.
Solicita la configuración de SCAN con srvctl para encontrar el nombre de SCAN:
srvctlconfigscan
Deberías recibir una respuesta similar a la del siguiente ejemplo:
Un nombre de zona nuevo, que permite identificar la zona en los comandos de configuración
Una descripción de tu zona para definir mejor su propósito
El sufijo DNS para tu zona, como mycompany.internal. Este debe coincidir con el sufijo del nombre de SCAN que se mostró en el comando srvctl config scan anterior.
La red de VPC en la que la zona DNS privada debe ser visible
Agrega un registro a la zona anterior y proporciona los siguientes detalles:
El nombre de la zona que creaste en el paso anterior
El nombre completo de DNS. En esta guía, sería cluster01-scan.mycompany.internal.
El tiempo de actividad (TTL). Este es el tiempo que debe tener el registro DNS en caché antes de que se actualice.
El tipo de registro del recurso. Para SCAN, este es un registro A.
Las IP de SCAN que se muestran en el comando srvctl config scan anterior.
Repite este proceso para los nombres adicionales que necesiten resolverse.
En el servidor de la solución Bare Metal, verifica que la resolución de SCAN funcione con nslookup:
nslookupcluster01-scan.mycompany.internal
Si se ejecuta correctamente, deberías recibir una respuesta similar a la del siguiente ejemplo:
[[["Fácil de comprender","easyToUnderstand","thumb-up"],["Resolvió mi problema","solvedMyProblem","thumb-up"],["Otro","otherUp","thumb-up"]],[["Difícil de entender","hardToUnderstand","thumb-down"],["Información o código de muestra incorrectos","incorrectInformationOrSampleCode","thumb-down"],["Faltan la información o los ejemplos que necesito","missingTheInformationSamplesINeed","thumb-down"],["Problema de traducción","translationIssue","thumb-down"],["Otro","otherDown","thumb-down"]],["Última actualización: 2025-09-04 (UTC)"],[[["\u003cp\u003eCloud DNS allows access to an Oracle RAC cluster via a highly-available DNS name that is pointed to a persistent Single Client Access Name (SCAN).\u003c/p\u003e\n"],["\u003cp\u003eSetting up Cloud DNS for a RAC cluster involves configuring an inbound server policy, setting the correct entry point IP address on Bare Metal Solution servers, and setting up Cloud DNS for private Google Access.\u003c/p\u003e\n"],["\u003cp\u003eTo configure the RAC cluster's DNS name, a private zone must be created in Cloud DNS matching the SCAN name's suffix, and an "A" record with the SCAN IPs must be added to that zone.\u003c/p\u003e\n"],["\u003cp\u003eTo verify the success of the configuration, use the \u003ccode\u003enslookup\u003c/code\u003e command on the Bare Metal Solution server to ensure the SCAN name correctly resolves to the associated SCAN IPs.\u003c/p\u003e\n"]]],[],null,["# Configure Single Client Access Name with Cloud DNS\n==================================================\n\nYou can access an Oracle® Real Application Clusters (RAC) cluster via a\nhighly-available DNS name provided by [Cloud DNS](https://cloud.google.com/dns).\nThis is achieved by pointing the DNS entry at a RAC\n[Single Client Access Name (SCAN)](https://www.oracle.com/jp/a/tech/docs/technical-resources/single-client-access-name.pdf),\nwhich stays persistent as cluster topology changes.\n| **Note:** Customers are responsible for procuring licenses for the Oracle workloads they choose to run on Bare Metal Solution, and customers are responsible for complying with those licenses. Google does not provide licenses for Oracle workloads.\n\nBefore you begin\n----------------\n\nYou need access to the following resources and services to complete this guide:\n\n- A [configured Bare Metal Solution server](/bare-metal/docs/bms-setup) that connects to a Google [Virtual Private Cloud (VPC)](https://cloud.google.com/vpc) via a [Partner Cloud Interconnect](https://cloud.google.com/network-connectivity/docs/interconnect).\n- A configured RAC cluster on the Bare Metal Solution server, with a SCAN listener active on each node.\n- [Cloud DNS](https://cloud.google.com/dns).\n\nSystem architecture\n-------------------\n\nThe following diagram shows the system architecture used in this guide:\n\nSet up Cloud DNS to point to your RAC cluster\n---------------------------------------------\n\nTo set up single DNS name access to your RAC cluster, complete the following steps:\n\n1. If you haven't run the [Google Cloud CLI](https://cloud.google.com/sdk/gcloud)\n previously, you must run the following command to specify your project name\n and authenticate with the Google Cloud console:\n\n gcloud auth login\n\n2. [Enable the Cloud DNS API](https://console.cloud.google.com/flows/enableapi?apiid=dns&credential=client_key)\n for your Google Cloud project.\n\n3. [Create an inbound server policy in Cloud DNS](https://cloud.google.com/dns/docs/policies#create-in)\n for the VPC connected to your Bare Metal Solution servers. This\n makes sure your Bare Metal Solution servers can communicate with Cloud DNS.\n\n4. [List the inbound forwarder entry points](https://cloud.google.com/dns/docs/policies#list-in-entrypoints)\n to determine the correct entry point IP address for each Bare Metal Solution\n server.\n\n5. Configure each Bare Metal Solution server to use the IP address from the previous\n step for name resolution. The steps involved are specific to your operating\n system.\n\n For example, to configure name resolution in Red Hat Enterprise Linux 8:\n 1. [Disable NetworkManager DNS processing](https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/configuring_and_managing_networking/manually-configuring-the-etc-resolv-conf-file_configuring-and-managing-networking).\n 2. Add the following line to `/etc/resolv.conf`, replacing\n \u003cvar translate=\"no\"\u003eENTRY_POINT_IP_ADDRESS\u003c/var\u003e with the entry point IP address:\n\n nameserver \u003cvar translate=\"no\"\u003eENTRY_POINT_IP_ADDRESS\u003c/var\u003e\n\n6. Configure [Cloud DNS for Private Google Access](/vpc/docs/configure-private-google-access#config-domain).\n\n7. Log into a Bare Metal Solution server that hosts a RAC database as the database\n user that was configured at install time.\n\n8. If you haven't set the `ORACLE_HOME` and `PATH` environment variable in your\n shell profile, set it now so you can connect to your database.\n\n9. Request the SCAN configuration with `srvctl` to find the SCAN name:\n\n srvctl config scan\n\n You should receive a response similar to the following example: \n\n SCAN name: cluster01-scan.mycompany.internal, Network: 1\n Subnet IPv4: /192.168.1.0/255.255.255.0/bond0.118, static\n Subnet IPv6:\n SCAN 1 IPv4 VIP: 192.168.1.30\n SCAN VIP is enabled\n SCAN 2 IPv4 VIP: 192.168.1.31\n SCAN VIP is enabled\n SCAN 3 IPv4 VIP: 192.168.1.32\n SCAN VIP is enabled\n\n The SCAN name in the previous response is\n `cluster01-scan.mycompany.internal`.\n10. [Create a private zone in Cloud DNS](/dns/docs/zones#create-private-zone),\n providing the following details:\n\n - A new zone name, to identify the zone in configuration commands.\n - A description for your zone, to better define its purpose.\n - The DNS name suffix for your zone, such as `mycompany.internal`. This should match the suffix of the SCAN name returned in the previous `srvctl config scan` command.\n - The VPC network that the private DNS zone should be visible to.\n11. [Add a record](/dns/docs/records#adding_a_record) to the previous zone,\n providing the following details:\n\n - The name of the zone you created in the previous step.\n - The full DNS name. In this guide, that's `cluster01-scan.mycompany.internal`.\n - The time to live (TTL). This is how long the DNS record is cached before it's refreshed.\n - The resource record type. For SCAN, this is an `A` record.\n - The SCAN IPs returned in the previous `srvctl config scan` command.\n\n Repeat this process for any additional names that need to be resolved.\n12. On the Bare Metal Solution server, validate that SCAN resolution is working with\n `nslookup`:\n\n nslookup cluster01-scan.mycompany.internal\n\n If successful, you should receive a response similar to the following\n example: \n\n Server: 10.158.0.3\n Address: 10.158.0.3#53\n\n Name: cluster01-scan.mycompany.internal\n Address: 192.168.1.32\n Name: cluster01-scan.mycompany.internal\n Address: 192.168.1.30\n Name: cluster01-scan.mycompany.internal\n Address: 192.168.1.31\n\nYou can now access your RAC cluster using a single, highly available, resilient\nDNS name via Cloud DNS.\n\n~Oracle is a registered trademark of Oracle and/or its affiliates.~"]]