Oracle RAC Scan Listener Connections Test

Oracle RAC 11g release 2 introduces the Single Client Access Name (SCAN), which provides a single name for clients to access Oracle Databases running in a cluster and simplify the database connection strings that an Oracle Client uses to connect.

The RAC components that play a crucial role in SCAN are as follows:

  • SCAN VIP: SCAN VIPs are physical IP addresses that you allocate to a SCAN listener.

  • SCAN Listener: SCAN Listener is an Oracle RAC component, which starts running a service on the port [default 1521] using IP address assigned to SCAN VIPs. The name that is given to a SCAN Listener is referred as SCAN name, which should be registered in DNS server.

  • Node VIP: Each node in the RAC cluster has its own node VIP. It is a high availability resource of RAC that enables a client to initially connect to the database service on its node or to fail over to another cluster node and advise that its node is down.

SCAN listeners can run on any node in the cluster. Typically, each cluster will have a minimum of 1 and a maximum of 3 SCAN listeners, regardless of the number of nodes in the cluster. Three SCAN listeners are recommended considering load balancing and high availability requirements. A SCAN listener can be started only when the SCAN VIPs are online. The root.sh script automatically configures the SCAN VIPs and SCAN listeners. When the root.sh is run on the first node, all 3 scan IPs are plugged on to the first node’s public interface. The SCAN/VIP combination will failover to another node in the cluster, if the current node fails. Besides performing failover, SCAN also load balances across the instances providing a service, by selecting and routing requests to the least loaded node.

To evaluate the load balancing ability of the SCAN listeners in a cluster and promptly detect inconsistencies, administrators should continuously monitor the connection traffic to each node in the cluster and quickly identify the over-utilized / under-utilized nodes. This can be achieved using the Oracle RAC Scan Listener Connection Traffic test!  This test auto-discovers the nodes in an RAC cluster and reports the rate at which each node successfully services connection requests. In the process, the test pinpoints the following:

  • Nodes handling more connections per second than the rest, and;

  • Nodes handling very few connections when compared to the other nodes

Such anomalies indicate that the SCAN listeners are not performing load balancing efficiently.

Target of the test : Oracle RAC

Agent deploying the test : An internal agent

Outputs of the test : One set of results for every node in the cluster

Configurable parameters for the test
  1. TEST PERIOD - How often should the test be executed.
  2. Host – The host for which the test is to be configured.
  3. Port - The port on which the server is listening.
  4. orasid - The variable name of the oracle instance.
  5. service name - A ServiceName exists for the entire Oracle RAC system. When clients connect to an Oracle cluster using the ServiceName, then the cluster routes the request to any available database instance in the cluster. By default, the service name is set to none. In this case, the test connects to the cluster using the orasid and pulls out the metrics from that database instance which corresponds to that orasid. If a valid service name is specified instead, then, the test will connect to the cluster using that service name, and will be able to pull out metrics from any available database instance in the cluster.

    To know the ServiceName of a cluster, execute the following query on any node in the target cluster:

    select name, value from v$parameter where name =’service_names’

  6. UserName – In order to monitor an Oracle database server, a special database user account has to be created in every Oracle database instance that requires monitoring. A Click here hyperlink is available in the test configuration page, using which a new oracle database user can be created. Alternatively, you can manually create the special database user. When doing so, ensure that this user is vested with the select_catalog_role and create session privileges.

    The sample script we recommend for user creation (in Oracle database server versions before 12c) for eG monitoring is:

    create user oraeg identified by oraeg ;

    create role oratest;

    grant create session to oratest;

    grant select_catalog_role to oratest;

    grant oratest to oraeg;

    The sample script we recommend for user creation (in Oracle database server 12c) for eG monitoring is:

    alter session set container=<Oracle_service_name>;

    create user <user_name>identified by <user_password> container=current default tablespace <name_of_default_tablespace> temporary tablespace <name_of_temporary_tablespace>;

    Grant create session to <user_name>;                                 

    Grant select_catalog_role to <user_name>;

    The name of this user has to be specified here.

  7. Password – Password of the specified database user
  8. Confirm password – Confirm the password by retyping it here.
  9. SSL- By default, this flag is set to No, as the target Oracle cluster is not SSL-enabled by default. If the target cluster is SSL-enabled, then set this flag to Yes.
  10. SSL Cipher-This parameter is applicable only if the target Oracle Cluster is SSL-enabled, if not, set this parameter to none. A cipher suite is a set of cryptographic algorithms that are used before a client application and server exchange information over an SSL/TLS connection. It consist of sets of instructions on how to secure a network through SSL (Secure Sockets Layer) or TLS (Transport Layer Security). In this text box, provide a comma-seperated list of cipher suites that are allowed for SSL/TLS connection to the target cluster. By default, this parameter is set to none.
  11. TRUSTSTORE FILE- This parameter is applicable only if the target Oracle Cluster is SSL-enabled, if not, set this parameter to none. TrustStore is used to store certificates from Certified Authorities (CA) that verify and authenticate the certificate presented by the server in an SSL connection. Therefore, the eG agent should have access to the truststore where the certificates are stored to authenticate and connect with the target cluster and collect metrics. For this, first import the certificates into the following default location <eG_INSTALL_DIR>/lib/security/mytruststore.jks. To know how to import the certificate into the truststore, refer toPre-requisites for monitoring Oracle Cluster. Then, provide the truststore file name in this text box. For example: mytruststore.jks. By default, none is specified against this text box.
  12. TRUSTSTORE TYPE-This parameter is applicable only if the target Oracle Cluster is SSL-enabled, if not, set this parameter to none.Specify the type of truststore that contains the certificates for server authentication in this text box. For eg.,JKS. By default, this parameter is set to the value none.
  13. TRUSSTORE PASSWORD-This parameter is applicable only if the target Oracle Cluster is SSL-enabled, if not, set this parameter to none. If a Truststore File name is provided, then, in this text box, provide the password that is used to obtain the associated certificate details from the Truststore File. By default, this parameter is set to none.
Measurements made by the test
Measurement Description Measurement Unit Interpretation

Successful connections

Indicates the rate at which this node services connection requests.

Connections/Sec

Compare the value of this measure across nodes to identify overloaded and poorly loaded nodes in the cluster. The presence of such nodes indicate that the SCAN listeners are not balancing the connection load on the cluster properly. This warrants an investigation.