Use the troubleshooting and diagnostic tool in the Console to identify and resolve issues with an instance. The tool observes the instance for some common potential issues and provides suggested troubleshooting steps. Troubleshooting the SSH Connection If you’re unable to connect to a compute instance using SSH, review the following troubleshooting error messages and suggestions…
Read More →Tag: oraclecloud
When you create an instance, you specify whether the instance is an extended memory VM instance. You can also edit an existing, regular instance to make it an extended memory VM instance. Using the Console:
Read More →Oracle Database Service for Azure Oracle Database Service for Azure is an Oracle-managed multicloud service that enables customers to easily set up and use high performance, scalable Oracle databases running on OCI for their Azure applications. Azure customers can easily deploy Oracle Database running on OCI through the Oracle Database Service for Azure portal using a…
Read More →Oracle Cloud Infrastructure (OCI) Cloud Shell is a web browser-based terminal available from the Oracle Cloud Console. OCI Cloud Shell provides access to a Linux shell with a preauthenticated OCI CLI and several useful development tools and utilities preinstalled. Cloud Shell is a feature available to all OCI users, accessible from the Console. Cloud Shell includes 5…
Read More →Users of Ubuntu and Linux operating systems can use the command line to connect to a file system and write files. Mount targets serve as network access points for file systems. After your mount target is assigned an IP address, you can use it together with the export path to mount the file system. On the instance from which…
Read More →Oracle Identity Cloud service (IDCS) provides an innovative, fully integrated service that delivers all the core Identity and Access Management (IAM) capabilities through a multitenant cloud platform. Identity Cloud service manages user access and entitlements across a wide range of cloud and on-premises applications and services using a cloud native identity-as-a-service (IDaaS) platform. Organizations can…
Read More →Shielded instances harden the firmware security on bare metal hosts and virtual machines (VMs) to defend against malicious boot level software. How Shielded Instances Work Shielded instances use the combination of Secure Boot, Measured Boot, and the Trusted Platform Module (TPM) to harden the firmware security on your instances. Secure Boot and the Trusted Platform Module (TPM) are available on…
Read More →