Professional Documents
Culture Documents
Hamad Medical
Cristina Ioan
March 2022
The following is intended to outline our general product direction. It is intended for information purposes only, and
may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality,
and should not be relied upon in making purchasing decisions. The development, release, timing, and pricing of any
features or functionality described for Oracle’s products may change and remains at the sole discretion of Oracle
Corporation.
• Assurance Team
• Autonomous Health Framework
• Roles and Responsibilities
• Infrastructure Patching
• Working Effectively with Support
Go-Live Assurance
followUp
It is a structured time-boxed assistance provided to critical Milestone can be:
Acceptance
Provisioning the environment,
Go-Live Readiness,
Post Go-Live Stabilization
Proactive SR
Monitoring
Technical Assurance and Remedies CoE Engagement at
Engagement on Critical Scenario with as Due Time of the
Incident Managers Milestone
C@C Gen2
Taskforce
Experience Base
Copyright © 2021, Oracle and/or its affiliates | Confidential: Internal/Restricted/Highly Restricted
Cloud Assurance
• Technical Assurance & Remedies
• Go-Live Assurance
• Operations Monitoring and Optimization Advisory
• C@C Proactive Services
• Cost: Free
• AHF Overview
• System Compliance Checking
• Event Monitoring / Fault Detection
• Diagnostic Collection
• Event/Fault Notification
• Upload of Collected Diagnostics to Service Requests
• Integrated Tools for Administrators
• Maintaining AHF
• All major Operating Systems are supported • All Oracle Database & Grid versions 10.2+ are
• Linux (OEL, RedHat, SUSE, Itanium & supported
zLinux) • TFA and EXAchk shipped with:
• Oracle Solaris (SPARC & x86-64)
• AIX
• HPUX (Legacy Installer) Oracle Grid Oracle Database
• Windows Infrastructure
• OS versions supported are the same as those 11.2.0.4+
supported by the Database 12.2.0.1+
12.1.0.2+
12.2.0.1+
18.0.0.0+
18.0.0.0+
19.0.0.0+ 19.0.0.0+
EXAchk is for Engineered Systems, ORAchk is for ODA & Everything Else
Automated Proactive self-service method for customers to perform Health
Checks on their Engineered, RAC and Single Instance systems
Critical Checks Run daily at 2AM
Full Checks Run Weekly at 3AM on Sundays
Automated Runs are only supported on Linux, Solaris and Engineered
Systems (Dom-U and Bare Metal)
Over 250 Checks Driven by Best Practices and Success Factors generated from
Real-World Customer Experiences
Repair Functionality for discovered Compliance Drifts (where possible)
Integration with Cluster Verification Utility (CVU)
Pre-Upgrade Validation for GI and Database upgrades
Integrated with CVU Pre/Post Validation and DB AutoUpgrade
Remote Checks in Cluster Environments performed via TFA SSL
Ability to Create User Defined Checks
Copyright © 2020 Oracle and/or its affiliates.
Installation and Update
1. Download latest version: Doc 2550798.1 Execution times vary based on size of
the cluster, installed products being
2. Transfer zip to required machine checked and number of resources!
3. Unzip
• For Continuous Service Mode (Highly Recommended) ahf_setup will be executed as the root user
• For Standalone Mode (generally used in single instance DB environments) ahf_setup will be
executed as the user who owns the database software
You can obtain new version on-demand from My Oracle support and also from the above locations using
ahfctl upgrade
AHF will also prompt you to upgrade when it detects it’s older than 180 days.
Download the appropriate installer from above, copy to a target machine and unzip
Run the TFA & ORAchk/EXAchk install command ./ahf_setup [-ahf_loc install_dir] [-data_dir data_dir]
Compliance Checking
EXAchk is for Engineered Systems, ORAchk is for ODA & Everything Else
Automated Proactive self-service method for customers to perform Health
Checks on their Engineered, RAC and Single Instance systems
Critical Checks Run daily at 2AM
Full Checks Run Weekly at 3AM on Sundays
Automated Runs are only supported on Linux, Solaris and Engineered
Systems (Dom-U and Bare Metal)
Over 250 Checks Driven by Best Practices and Success Factors generated from
Real-World Customer Experiences
Repair Functionality for discovered Compliance Drifts (where possible)
Integration with Cluster Verification Utility (CVU)
Pre-Upgrade Validation for GI and Database upgrades
Integrated with CVU Pre/Post Validation and DB AutoUpgrade
Remote Checks in Cluster Environments performed via TFA SSL
Ability to Create User Defined Checks
Copyright © 2020 Oracle and/or its affiliates.
Compliance Results…
TFA
Oracle Grid Infrastructure Oracle Support
& Databases
1 Request desired
action on-demand
Cluster Health Advisor (CHA) Events Clusterware Event Monitoring Daemon (EVMD)
Fault Detection
ORA-031(13|37) CRS-1602
ORA-00600 CRS-1607
ORA-00603 CRS-1608
CRS-1609
ORA-040(30|31)
CRS-1610
ORA-07445 CRS-1611
ORA-01578 CRS-1612
ORA-297(01|02|03|08|10|40|70|71) CRS-1632
Instance Terminated CRS-1606
Note: The above lists are NOT all inclusive. For the purposes of this presentation we
only covers the most common Auto Collection Faults.
Automatic Diagnostic Collections
Tool Description
OSWatcher Oswatcher Collects and archives OS metrics. These are useful for instance or node evictions
& performance Issues. See document 301137.1 for more details
oratop Provides near real-time database monitoring. See document 1500864.1 for more details.
alertsummary Provides summary of events for one or more database or ASM alert files from all nodes
ls Lists all files TFA knows about for a given file name pattern across all nodes
pstack Generate process stack for specified processes across all nodes
grep Search alert or trace files with a given database and file name pattern, for a search string.
vi Opens alert or trace files for viewing a given database and file name pattern in the vi editor
tail Runs a tail on an alert or trace files for a given database and file name pattern
Tool Description
param Shows all database and OS parameters that match a specified pattern
dbglevel Sets and unsets multiple CRS trace levels with one command
history Shows the shell history for the tfactl shell
changes Reports changes in the system setup over a given time period. This includes database
parameters, OS parameters and patches applied
1. Where necessary set context with database <dbname> tfactl > database MyDB
Questions?