Skip to content

Commit

Permalink
Merge pull request #5892 from MicrosoftDocs/repo_sync_working_branch
Browse files Browse the repository at this point in the history
Confirm merge from repo_sync_working_branch to main to sync with https://github.com/MicrosoftDocs/cloud-adoption-framework (branch main)
  • Loading branch information
Taojunshen authored Oct 15, 2024
2 parents 620f825 + e8566a9 commit faacbc0
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 5 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -25,6 +25,7 @@ Learn more about the [network topology and connectivity](../../../ready/landing-
- Decide whether connectivity to on-premises or multi-cloud environments is required.
- Decide if [multi-region deployment](/azure/api-management/api-management-howto-deploy-multi-region) is required to service geographically distributed API consumers.
- Consider using a load balancing solution such as [Application Gateway](/azure/application-gateway/overview) or [Azure Front Door](/azure/frontdoor/front-door-overview).
- If you are using Azure ExpressRoute for hybrid connectivity, consider designing for high availability. For more information, see [Designing for high availability with ExpressRoute](/azure/expressroute/designing-for-high-availability-with-expressroute). To ensure ExpressRoute resiliency, see [Azure Proactive Resiliency Library](https://azure.github.io/Azure-Proactive-Resiliency-Library/services/networking/expressroute-gateway/).

## Design recommendations

Expand Down
6 changes: 1 addition & 5 deletions docs/scenarios/oracle-iaas/oracle-network-topology-odaa.md
Original file line number Diff line number Diff line change
Expand Up @@ -40,11 +40,7 @@ Consider the following recommendations when you design your network topology for

- Ensure that you place application and database components in the same region and availability zone to reduce latency between your application and database. If your application components are in different subscriptions from your database components, see [Physical and logical availability zones](/azure/reliability/availability-zones-overview#physical-and-logical-availability-zones). Use the `AvailabilityZoneMappings` property to identify the specific physical availability zone for colocating the services.

- Oracle Database@Azure subnets don't support network security groups (NSGs). Follow these recommendations for security:

- Use NSGs on the application subnets to control traffic to and from the application subnets.

- Use on-platform firewall products, such as SELinux and cellwall, on the Oracle Database@Azure VM clusters to control traffic to the service.
- Oracle Database@Azure subnets don't support Azure network security groups (NSGs). Instead, use the [Oracle Cloud NSG](https://docs.oracle.com/iaas/Content/Network/Concepts/networksecuritygroups.htm) that gets created in the Oracle Database@Azure OCI Virtual Cloud Network (VCN) to control traffic to and from the Exadata/ADBS system.

- Use Azure private DNS zones for name resolution between application and database subnets. For more information, see [Private DNS](/azure/dns/private-dns-overview).

Expand Down

0 comments on commit faacbc0

Please sign in to comment.