Jump to content

RAC Attack - Oracle Cluster Database at Home/RAC Attack 12cR2

From Wikibooks, open books for an open world


Free Educational Content for Oracle Real Application Clusters
A Project of the Oracle Professional Community


Book Contents (e)

Overview
Events
Local Manual of Style
Bullpen (Newly Contributed Content)
Expanded Table of Contents

Part I: Setting Up RAC

[edit source]
  1. Hardware Requirements
  2. Software Components
  3. Prepare Host
  4. Install Linux
  5. Create Cluster
  6. Install Grid Infrastructure
  7. Install Database Software
  8. Create Database
    Part I still in development phase

Part II: Exploring RAC

[edit source]
  1. Part II still in development phase

Part III: Advanced Labs

[edit source]
  1. Part III still in development phase

Part IV: RAC Attack on steroids

[edit source]
  1. Part IV still in development phase

Overview

[edit | edit source]

RAC Attack is a free curriculum and platform for hands-on learning labs related to Oracle RAC (cluster database), motivated by the belief that the best way to learn RAC is through lots of hands-on experience. The original contributors were Jeremy Schneider, Dan Norris and Parto Jalili. This curriculum has been used since 2008 by organizers of events, by instructors in classes and by individuals at home. Its goal is to help students learn about Oracle RAC cluster databases through guided examples.

RAC Attack differs in depth from other tutorials currently available.

  • Every keystroke and mouse click is carefully documented here.
  • The process is covered from the very beginning to the very end - from the very first installation of the Virtual Hypervisor on your laptop to various experiments on your running cluster database... with everything in between.
  • The labs in the main workbook have been tested thoroughly and repeatedly.

To learn about upcoming RAC Attack events or to organize one yourself, visit the Events page. You can use the shortcut http://racattack.org/events to access this page at any time.

12cR2 Overview

[edit | edit source]

The 12cR2 version of RAC Attack is being written collaboratively by many authors all around the world.


Architecture

[edit | edit source]

To better understand the RAC Installation, this picture illustrates the architecture that is implemented when following the book.

RAC Attack 12c architecture

IP Addresses

[edit | edit source]

In order to install a fully functional RAC, the following IP addresses are required:

  • 2 public IPs, one for each node, for the primary OS network interface
  • 2 public IPs, one for each node, for the Virtual IP
  • 3 public IPs, one for each SCAN listener
  • 2 private IPs, one for each node, for the cluster private interconnect

In the book, the public addresses belong to the network 192.168.78.0/24, and the private addresses belong to the network 172.16.100.0/24.

Technical choices

[edit | edit source]

The book aims to provide instructions as simple as possible to get a basic RAC installation on your laptop. There are many, many advanced topologies and topics that are not covered here. If you are curious about technical possibilities, just ask a volunteer, he/she will be glad to explain you something more.