Skip to content

Commit

Permalink
Update docs/scenarios/oracle-iaas/oracle-network-topology-odaa.md
Browse files Browse the repository at this point in the history
  • Loading branch information
Jak-MS authored Oct 15, 2024
1 parent 499234b commit f47be75
Showing 1 changed file with 1 addition and 1 deletion.
2 changes: 1 addition & 1 deletion docs/scenarios/oracle-iaas/oracle-network-topology-odaa.md
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,7 @@ Consider the following recommendations when you design your network topology for

- Ensure that you place application and database components in the same region and availability zone to reduce latency between your application and database. If your application components are in different subscriptions from your database components, see [Physical and logical availability zones](/azure/reliability/availability-zones-overview#physical-and-logical-availability-zones). Use the `AvailabilityZoneMappings` property to identify the specific physical availability zone for colocating the services.

- Oracle Database@Azure subnets don't support Azure network security groups (NSGs). Instead, use the [Oracle Cloud NSG](https://docs.oracle.com/iaas/Content/Network/Concepts/networksecuritygroups.htm) that gets created in the Oracle Database@Azure OCI Virtual Cloud Network (VCN) to control traffic to and from the Exadata/ADBS system
- Oracle Database@Azure subnets don't support Azure network security groups (NSGs). Instead, use the [Oracle Cloud NSG](https://docs.oracle.com/iaas/Content/Network/Concepts/networksecuritygroups.htm) that gets created in the Oracle Database@Azure OCI Virtual Cloud Network (VCN) to control traffic to and from the Exadata/ADBS system.

- Use Azure private DNS zones for name resolution between application and database subnets. For more information, see [Private DNS](/azure/dns/private-dns-overview).

Expand Down

0 comments on commit f47be75

Please sign in to comment.