OEM Management Repository Views

Enterprise Manager Cloud Control Management Repository Views Reference
https://docs.oracle.com/cd/cloud-control-13.3/EMVWS/toc.htm

How To Query Target Status From The OEM Repository DB ? (Doc ID 2669538.1)

 


SET MARKUP CSV ON


-- 2 Blackout Views

select * from sysman.MGMT$BLACKOUT_HISTORY;
select * from sysman.MGMT$BLACKOUTS;


-- 4 Compliance Views

select * from sysman.MGMT$COMPLIANCE_STANDARD_RULE;
select * from sysman.MGMT$COMPLIANCE_STANDARD;
select * from sysman.MGMT$COMPLIANCE_STANDARD_GROUP;
select * from sysman.MGMT$CS_EVAL_SUMMARY;
select * from sysman.MGMT$COMPOSITE_CS_EVAL_SUMMARY;
select * from sysman.MGMT$CS_RULE_EVAL_SUMMARY;
select * from sysman.MGMT$CS_GROUP_EVAL_SUMMARY;
select * from sysman.MGMT$CS_TARGET_ASSOC;
select * from sysman.MGMT$CSR_CURRENT_VIOLATION;
select * from sysman.MGMT$CSR_VIOLATION_CONTEXT;
select * from sysman.MGMT$EM_RULE_VIOL_CTXT_DEF;
select * from sysman.MGMT$RULE_KEYWORD;
select * from sysman.MGMT$CS_KEYWORD;
select * from sysman.MGMT$CS_GROUP_KEYWORD;
select * from sysman.MGMT$CS_RULE_ATTRS;
select * from sysman.MGMT$CS_HIERARCHY;
select * from sysman.MGMT$CS_RQS_HIERARCHY;
select * from sysman.MGMT$CS_RULEFOLDER;
select * from sysman.MGMT$CSG_HIERARCHY;
select * from sysman.MGMT$CSG_SUBGROUP;
select * from sysman.MGMT$CSR_TARGET_ASSOC;
select * from sysman.MGMT$CSRF_TARGET_ASSOC;
select * from sysman.MGMT$REPO_RULE_CHK_DETAILS;
select * from sysman.MGMT$REPOSITORY_RULE_BIND_VARS;
select * from sysman.MGMT$REPOSITORY_RULE_PARAMS;
select * from sysman.MGMT$CS_TGT_ASSOC_TXF_REQ;
select * from sysman.MGMT$EM_CS_RULE_EVENT_ERROR;
select * from sysman.MGMT$CCC_ALL_OBS_BUNDLES;
select * from sysman.MGMT$CCC_ALL_OBSERVATIONS;
select * from sysman.MGMT$CCC_ALL_VIOLATIONS;
select * from sysman.MGMT$CCC_ALL_AGENT_WARNINGS;
select * from sysman.MGMT$CCC_ALL_WATCHDOG_ALERTS;
select * from sysman.MGMT$COMPLIANT_TARGETS;
select * from sysman.MGMT$COMPLIANCE_SUMMARY;
select * from sysman.MGMT$COMPLIANCE_TREND;
select * from sysman.MGMT$CCC_DIAG_ANALYTICS;
select * from sysman.MGMT$CCC_DIAG_QUEUEBACKLOG;

-- 5 Configuration Management Views

-- 5.1 Custom Configuration Specification Views

select * from sysman.MGMT$CCS_DATA;
select * from sysman.MGMT$CCS_DATA_SOURCE;
select * from sysman.MGMT$CCS_DATA_VISIBLE;


-- 5.2  Database Configuration Views

select * from sysman.MGMT$DB_TABLESPACES;
select * from sysman.MGMT$DB_DATAFILES;
select * from sysman.MGMT$DB_CONTROLFILES;
select * from sysman.MGMT$DB_DBNINSTANCEINFO;
select * from sysman.MGMT$DB_FEATUREUSAGE;
select * from sysman.MGMT$DB_INIT_PARAMS;
select * from sysman.MGMT$DB_LICENSE;
select * from sysman.MGMT$DB_REDOLOGS;
select * from sysman.MGMT$DB_ROLLBACK_SEGS;
select * from sysman.MGMT$DB_SGA;
select * from sysman.MGMT$DB_TABLESPACES_ALL;
select * from sysman.MGMT$DB_OPTIONS;


-- 5.3  Enterprise Configuration Management Views

select * from sysman.MGMT$ECM_CMP_JOBS;
select * from sysman.MGMT$ECM_CMP_JOB_LAST_RESULTS;
select * from sysman.MGMT$ECM_CMP_RPT_CCS_DS;
select * from sysman.MGMT$ECM_CMP_RPT_CCS_DS_DTLS;
select * from sysman.MGMT$ECM_CMP_RPT_CCS_PD_ALL;
select * from sysman.MGMT$ECM_CMP_RPT_CCS_PD_DIFFS;
select * from sysman.MGMT$ECM_CMP_RPT_CI_DIFFS;
select * from sysman.MGMT$ECM_CMP_VISIBLE_CONFIGS;
select * from sysman.MGMT$ECM_CURRENT_SNAPSHOTS;
select * from sysman.MGMT$ECM_VISIBLE_SNAPSHOTS;

 

-- 6 Events Views

select * from sysman.MGMT$INCIDENTS;
select * from sysman.MGMT$INCIDENT_CATEGORY;
select * from sysman.MGMT$INCIDENT_TARGET;
select * from sysman.MGMT$INCIDENT_ANNOTATION;
select * from sysman.MGMT$EVENTS_LATEST;
select * from sysman.MGMT$EVENTS;
select * from sysman.MGMT$EVENT_ANNOTATION;
select * from sysman.MGMT$PROBLEMS;
select * from sysman.MGMT$PROBLEM_ANNOTATION;

-- 7 Hardware Views

-- 7.1  Hardware Views

select * from sysman.MGMT$HW_CPU_DETAILS;
select * from sysman.MGMT$HW_NIC;
select * from sysman.MGMT$HW_NIC_BONDS;
select * from sysman.MGMT$HW_IO_DEVICES;
select * from sysman.MGMT$EM_ECM_HOST_VIRTUAL;
select * from sysman.MGMT$HW_HOSTS_FILE;


-- 7.2 Service Tag Views

select * from sysman.MGMT$SERVICETAG_INSTANCES;
select * from sysman.MGMT$SERVICETAG_REGISTRY;

 

-- 8 Inventory Views

-- 8.1 Inventory Views

select * from sysman.MGMT$TARGET;
select * from sysman.MGMT$TARGET_TYPE;
select * from sysman.MGMT$TARGET_TYPE_DEF;
select * from sysman.MGMT$TARGET_ASSOCIATIONS;
select * from sysman.MGMT$TARGET_MEMBERS;
select * from sysman.MGMT$TARGET_FLAT_MEMBERS;
select * from sysman.MGMT$TARGET_TYPE_PROPERTIES;
select * from sysman.MGMT$TARGET_PROPERTIES;


-- 8.2 Oracle Home Directory Patching Views

select * from sysman.MGMT$EM_HOMES_PLATFORM;
select * from sysman.MGMT$APPL_PATCH_AND_PATCHSET;
select * from sysman.MGMT$HOMES_AFFECTED;
select * from sysman.MGMT$APPLIED_PATCHES;
select * from sysman.MGMT$APPLIED_PATCHSETS;


-- 8.3 Oracle Home Directory Views

select * from sysman.MGMT$OH_HOME_INFO;
select * from sysman.MGMT$OH_DEP_HOMES;
select * from sysman.MGMT$OH_CRS_NODES;
select * from sysman.MGMT$OH_CLONE_PROPERTIES;
select * from sysman.MGMT$OH_COMPONENT;
select * from sysman.MGMT$OH_COMP_INST_TYPE;
select * from sysman.MGMT$OH_COMP_DEP_RULE;
select * from sysman.MGMT$OH_PATCHSET;
select * from sysman.MGMT$OH_VERSIONED_PATCH;
select * from sysman.MGMT$OH_PATCH;
select * from sysman.MGMT$OH_PATCHED_COMPONENT;
select * from sysman.MGMT$OH_PATCH_FIXED_BUG;
select * from sysman.MGMT$OH_PATCHED_FILE;
select * from sysman.MGMT$OH_FILE;
select * from sysman.MGMT$PA_RECOM_METRIC_SOURCE;
select * from sysman.MGMT$OH_INV_SUMMARY;
select * from sysman.MGMT$OH_INSTALLED_TARGETS;

 

-- 9 Job Views

select * from sysman.MGMT$CA_TARGETS;
select * from sysman.MGMT$CA_EXECUTIONS;
select * from sysman.MGMT$JOBS;
select * from sysman.MGMT$JOB_TARGETS;
select * from sysman.MGMT$JOB_EXECUTION_HISTORY;
select * from sysman.MGMT$JOB_STEP_HISTORY;
select * from sysman.MGMT$JOB_ANNOTATIONS;
select * from sysman.MGMT$JOB_NOTIFICATION_LOG;

-- 10 Linux Patching Views

select * from sysman.MGMT$HOSTPATCH_HOSTS;
select * from sysman.MGMT$HOSTPATCH_GROUPS;
select * from sysman.MGMT$HOSTPATCH_GRP_COMPL_HIST;
select * from sysman.MGMT$HOSTPATCH_HOST_COMPL;

-- 11 Management Template Views

select * from sysman.MGMT$TEMPLATES;
select * from sysman.MGMT$TEMPLATE_POLICY_SETTINGS;
select * from sysman.MGMT$TEMPLATE_METRICCOLLECTION;
select * from sysman.MGMT$TEMPLATE_METRIC_SETTINGS;

-- 12 Metric Views

select * from sysman.MGMT$METRIC_CATEGORIES;
select * from sysman.MGMT$METRIC_COLLECTION;
select * from sysman.MGMT$METRIC_ERROR_CURRENT;
select * from sysman.MGMT$METRIC_ERROR_HISTORY;

-- 13 Middleware Management Views

-- 13.1 Application Deployment Views

select * from sysman.MGMT$J2EE_APPLICATION;
select * from sysman.MGMT$J2EEAPP_EJBCOMPONENT;
select * from sysman.MGMT$J2EEAPP_JRFWS;
select * from sysman.MGMT$J2EEAPP_JRFWSOPER;
select * from sysman.MGMT$J2EEAPP_JRFWSPOLICY;
select * from sysman.MGMT$J2EEAPP_JRFWSPORT;
select * from sysman.MGMT$J2EEAPP_WEBAPPCOMPONENT;
select * from sysman.MGMT$J2EEAPP_WSCONFIG;
select * from sysman.MGMT$J2EEAPP_WSPORTCONFIG;


-- 13.2 Glassfish Views

select * from sysman.MGMT$EMAS_GLASSFISH_DOMAIN;
select * from sysman.MGMT$EMAS_GLASSFISH_NODES;
select * from sysman.MGMT$EMAS_GLASSFISH_SERVER;
select * from sysman.MGMT$EMAS_GLASSFISH_SVR_PROP;
select * from sysman.MGMT$EMAS_GLASSFISH_NW_LSTNR;
select * from sysman.MGMT$EMAS_GLASSFISH_DATASOURCE;
select * from sysman.MGMT$EMAS_GLASSFISH_DS_PROP;


-- 13.3 Oracle WebLogic Server Views

select * from sysman.MGMT$WEBLOGIC_APPLICATIONS;
select * from sysman.MGMT$WEBLOGIC_EJBCOMPONENT;
select * from sysman.MGMT$WEBLOGIC_FILESTORE;
select * from sysman.MGMT$WEBLOGIC_JDBCDATASOURCE;
select * from sysman.MGMT$WEBLOGIC_JDBCMULTIDS;
select * from sysman.MGMT$WEBLOGIC_JMSCONNFACTORY;
select * from sysman.MGMT$WEBLOGIC_JMSQUEUE;
select * from sysman.MGMT$WEBLOGIC_JMSSERVER;
select * from sysman.MGMT$WEBLOGIC_JMSTOPIC;
select * from sysman.MGMT$WEBLOGIC_JOLTCONNPOOL;
select * from sysman.MGMT$WEBLOGIC_JVMSYSPROPS;
select * from sysman.MGMT$WEBLOGIC_MACHINE;
select * from sysman.MGMT$WEBLOGIC_NETWORK_CHANNELS;
select * from sysman.MGMT$WEBLOGIC_NODEMANAGER;
select * from sysman.MGMT$WEBLOGIC_RACONFIG;
select * from sysman.MGMT$WEBLOGIC_RAOUTBOUNDCONFIG;
select * from sysman.MGMT$WEBLOGIC_RESOURCECONFIG;
select * from sysman.MGMT$WEBLOGIC_SERVER;
select * from sysman.MGMT$WEBLOGIC_STARTSHUTCLASSES;
select * from sysman.MGMT$WEBLOGIC_VIRTUALHOST;
select * from sysman.MGMT$WEBLOGIC_WEBAPPCOMPONENT;
select * from sysman.MGMT$WEBLOGIC_WORKMANAGER;
select * from sysman.MGMT$WEBLOGIC_WSCONFIG;
select * from sysman.MGMT$WEBLOGIC_WSPORTCONFIG;


-- 13.4 Oracle WebLogic Domain Views

select * from sysman.MGMT$WEBLOGIC_DOMAIN;
select * from sysman.MGMT$WEBLOGIC_OPSSSYSPROP;
select * from sysman.MGMT$WEBLOGIC_OAMCONFIG;


-- 13.5 Oracle WebLogic Cluster View

select * from sysman.MGMT$WEBLOGIC_CLUSTER;

 

-- 14 Monitoring Views

select * from sysman.MGMT$ALERT_CURRENT;
select * from sysman.MGMT$TARGET_METRIC_COLLECTIONS;
select * from sysman.MGMT$TARGET_METRIC_SETTINGS;
select * from sysman.MGMT$AVAILABILITY_CURRENT;
select * from sysman.MGMT$AVAILABILITY_HISTORY;
select * from sysman.MGMT$ALERT_HISTORY;
select * from sysman.MGMT$AVAIL_ALERT_HISTORY;
select * from sysman.MGMT$METRIC_DETAILS;
select * from sysman.MGMT$METRIC_CURRENT;
select * from sysman.MGMT$METRIC_HOURLY;
select * from sysman.MGMT$METRIC_DAILY;

-- 15 Operating System Views

select * from sysman.MGMT$OS_SUMMARY;
select * from sysman.MGMT$OS_COMPONENTS;
select * from sysman.MGMT$OS_HW_SUMMARY;
select * from sysman.MGMT$OS_PATCH_SUMMARY;
select * from sysman.MGMT$OS_FS_MOUNT;
select * from sysman.MGMT$OS_KERNEL_PARAMS;
select * from sysman.MGMT$OS_PATCHES;
select * from sysman.MGMT$OS_PROPERTIES;
select * from sysman.MGMT$OS_MODULES;
select * from sysman.MGMT$OS_LIMITS;
select * from sysman.MGMT$OS_INIT_SERVICES;

-- 16 Security Views

select * from sysman.MGMT$ESA_ALL_PRIVS_REPORT;
select * from sysman.MGMT$ESA_ANY_DICT_REPORT;
select * from sysman.MGMT$ESA_ANY_PRIV_REPORT;
select * from sysman.MGMT$ESA_AUDIT_SYSTEM_REPORT;
select * from sysman.MGMT$ESA_BECOME_USER_REPORT;
select * from sysman.MGMT$ESA_CATALOG_REPORT;
select * from sysman.MGMT$ESA_CONN_PRIV_REPORT;
select * from sysman.MGMT$ESA_CREATE_PRIV_REPORT;
select * from sysman.MGMT$ESA_DBA_GROUP_REPORT;
select * from sysman.MGMT$ESA_DBA_ROLE_REPORT;
select * from sysman.MGMT$ESA_DIRECT_PRIV_REPORT;
select * from sysman.MGMT$ESA_EXMPT_ACCESS_REPORT;
select * from sysman.MGMT$ESA_KEY_OBJECTS_REPORT;
select * from sysman.MGMT$ESA_OH_OWNERSHIP_REPORT;
select * from sysman.MGMT$ESA_OH_PERMISSION_REPORT;
select * from sysman.MGMT$ESA_POWER_PRIV_REPORT;
select * from sysman.MGMT$ESA_PUB_PRIV_REPORT;
select * from sysman.MGMT$ESA_SYS_PUB_PKG_REPORT;
select * from sysman.MGMT$ESA_TABSP_OWNERS_REPORT;
select * from sysman.MGMT$ESA_TRC_AUD_PERM_REPORT;
select * from sysman.MGMT$ESA_WITH_ADMIN_REPORT;
select * from sysman.MGMT$ESA_WITH_GRANT_REPORT;
select * from sysman.MGMT$ESM_COLLECTION_LATEST;
select * from sysman.MGMT$ESM_FILE_SYSTEM_LATEST;
select * from sysman.MGMT$ESM_PORTS_LATEST;
select * from sysman.MGMT$ESM_SERVICE_LATEST;
select * from sysman.MGMT$ESM_STACK_LATEST;

-- 17 Storage Reporting Views

select * from sysman.MGMT$STORAGE_REPORT_DATA;
select * from sysman.MGMT$STORAGE_REPORT_KEYS;
select * from sysman.MGMT$STORAGE_REPORT_PATHS;
select * from sysman.MGMT$STORAGE_REPORT_ISSUES;
select * from sysman.MGMT$STORAGE_REPORT_DISK;
select * from sysman.MGMT$STORAGE_REPORT_VOLUME;
select * from sysman.MGMT$STORAGE_REPORT_LOCALFS;
select * from sysman.MGMT$STORAGE_REPORT_NFS;

-- 18 Target Views

select * from sysman.MGMT$AGENTS_MONITORING_TARGETS;
select * from sysman.MGMT$EM_ECM_MOS_PROPERTIES;
select * from sysman.MGMT$EM_ECM_TARGET_FRESHNESS;
select * from sysman.MGMT$MANAGEABLE_ENTITIES;

 

{Alibaba ApsaraDB for MongoDB} Getting Started

https://www.alibabacloud.com/help/en/mongodb/

https://dev.classmethod.jp/articles/how-to-sign-up-alibaba-cloud-international-account/


東京リージョンは価格が高いため杭州市を使用する
杭州市を使用する場合、実名登録が必要
実名登録は完了しても連絡はこないので定期的に確認必要


Japna(Tokyo) -> $0.740/時間
ap-northeast-1
ap-northeast-1a


China(Hangzhou) 杭州市 -> $0.404/時間
cn-hangzhou
cn-hangzhou-h


aliyun ecs DescribeRegions 
aliyun ecs DescribeZones --RegionId cn-hangzhou

--China(Hangzhou) 杭州
export ALIBABACLOUD_REGION_ID=cn-hangzhou

 

-- 1. VPCとECSの作成

 

cat <<-'EOF' > variables.tf

locals {
  availability_zone = "cn-hangzhou-h"
}


variable "instance_type" {
  description = "instance_type"
  type = string
  default = "ecs.n1.tiny"
}

variable "image_id" {
  description = "image_id"
  type = string
  default = "aliyun_2_1903_x64_20G_alibase_20231221.vhd"
}

EOF

 

cat <<-'EOF' > main.tf

terraform {
  required_version = ">= 1.0.0, < 2.0.0"
  required_providers {
    alicloud = {
       source  = "aliyun/alicloud"
       version = "= 1.217.0"
    }
  }
}

provider "alicloud" {
    region  = "cn-hangzhou"
}


resource "alicloud_vpc" "vpc01" {
  vpc_name          = "vpc01"
  description       = "vpc01"
  cidr_block        = "10.2.0.0/16"
}

 

resource "alicloud_vswitch" "sw01" {
  vswitch_name      = "sw01"
  description       = "sw01"
  vpc_id            = alicloud_vpc.vpc01.id
  cidr_block        = "10.2.1.0/24"
  zone_id           = local.availability_zone
}

resource "alicloud_security_group" "sg01" {
  name                = "sg01"
  description         = "sg01"
  vpc_id              = alicloud_vpc.vpc01.id
  security_group_type = "normal"
}


resource "alicloud_security_group_rule" "sg0101" {
  type              = "ingress"
  ip_protocol       = "tcp"
  port_range        = "22/22"
  security_group_id = alicloud_security_group.sg01.id
  nic_type          = "intranet"
  policy            = "accept"
  priority          = 10
  cidr_ip           = "0.0.0.0/0"
  description       = "sg0101"
}


resource "alicloud_vpc_ipv4_gateway" "gw01" {
  ipv4_gateway_name        = "gw01"
  ipv4_gateway_description = "gw01"
  vpc_id                   = alicloud_vpc.vpc01.id
  enabled                  = true
}

 

 

# ルートテーブルへvSwitchの関連付け
resource "alicloud_route_table_attachment" "sw01_rt01" {
  vswitch_id     = alicloud_vswitch.sw01.id
  route_table_id = alicloud_vpc.vpc01.route_table_id
}


# ルートテーブルへカスタムルート追加
resource "alicloud_route_entry" "rt0101" {
  name                  = "rt0101"
  route_table_id        = alicloud_vpc.vpc01.route_table_id
  destination_cidrblock = "0.0.0.0/0"
  nexthop_type          = "Ipv4Gateway"
  nexthop_id            = alicloud_vpc_ipv4_gateway.gw01.id
}


resource "alicloud_instance" "instance01" {

  image_id                   = var.image_id
  instance_type              = var.instance_type
  security_groups            = [alicloud_security_group.sg01.id]
  instance_name              = "instance01"
  system_disk_category       = "cloud_ssd"
  system_disk_name           = "instance01"
  system_disk_size           = 20
  description                = "instance01"
  internet_charge_type       = "PayByBandwidth"
  internet_max_bandwidth_out = 0
  host_name                  = "instance01"
  vswitch_id                 = alicloud_vswitch.sw01.id
  instance_charge_type       = "PostPaid"
  key_name                   = "alibabakey02"
  deletion_protection        = false
  credit_specification       = "Standard"

}


resource "alicloud_eip_address" "eip01" {
  address_name              = "eip01"
  bandwidth                 = 1
  deletion_protection       = false
  description               = "eip01"
  internet_charge_type      = "PayByTraffic"
  isp                       = "BGP"
  payment_type              = "PayAsYouGo"
  netmode                   = "public"
}

# インスタンスとEIPの関連付け
resource "alicloud_eip_association" "instance01_eip01" {
  instance_id              = alicloud_instance.instance01.id
  allocation_id            = alicloud_eip_address.eip01.id
}

 

EOF

 

cat <<-'EOF' > outputs.tf

 

output "vpc01_id" {
  value = alicloud_vpc.vpc01.id
  description = "vpc01.id"
}

output "vpc01_route_table_id" {
  value = alicloud_vpc.vpc01.route_table_id
  description = "vpc01.route_table_id"
}

output "sw01_id" {
  value = alicloud_vswitch.sw01.id
  description = "sw01.id"
}

output "sg01_id" {
  value = alicloud_security_group.sg01.id
  description = "sg01.id"
}

output "gw01_id" {
  value = alicloud_vpc_ipv4_gateway.gw01.id
  description = "gw01.id"
}


output "instance01_id" {
  value = alicloud_instance.instance01.id
  description = "instance01.id"
}


output "eip01_id" {
  value = alicloud_eip_address.eip01.id
  description = "eip01.id"
}

 

EOF

 


terraform init
terraform fmt
terraform -version

 

terraform plan

terraform apply -auto-approve


-- 2. MongoDB作成

aliyun dds DescribeAvailableResource \
--ZoneId cn-hangzhou-h 


2コア、8GB

 

aliyun dds CreateDBInstance \
--DBInstanceClass mdb.shard.4x.large.d \
--DBInstanceStorage 20 \
--Engine MongoDB \
--EngineVersion 6.0 \
--AccountPassword 'password' \
--ChargeType PostPaid \
--NetworkType VPC \
--ReadonlyReplicas 0 \
--ReplicationFactor 3 \
--SecurityIPList '10.2.0.0/16' \
--StorageEngine WiredTiger \
--StorageType cloud_essd1 \
--VSwitchId vsw-111111111111111111111 \
--VpcId vpc-111111111111111111111 \
--ZoneId cn-hangzhou-h

 

aliyun dds DescribeDBInstances 

 

 

 

-- 3. ホワイトリストの設定


aliyun dds DescribeSecurityIps \
--DBInstanceId dds-1111111111111111 

aliyun dds ModifySecurityIps \
--DBInstanceId dds-1111111111111111 \
--SecurityIps 10.2.1.111 \
--ModifyMode Append 


aliyun dds DescribeSecurityIps \
--DBInstanceId dds-1111111111111111 

 

 


-- 4. ECSから動作確認


tar xvzf mongosh-2.2.3-linux-x64.tgz

cd mongosh-2.2.3-linux-x64
cd bin

 

./mongosh mongodb://root:'password'@dds-11111111111111112.mongodb.rds.aliyuncs.com:3717,dds-11111111111111111.mongodb.rds.aliyuncs.com:3717/admin?replicaSet=mgset-11111111


show dbs;


rs.conf()
rs.status();


use test


db.tab1.insertOne( { col1: "val1"} )
db.tab1.find()

exit

 


-- 5. クリーンアップ


aliyun dds DescribeDBInstances 


aliyun dds DeleteDBInstance \
--DBInstanceId dds-1111111111111111 

 


terraform destroy -auto-approve

 

 

 

{Alibaba VPC} VPCピアリング接続の作成と管理

 

https://www.alibabacloud.com/help/ja/vpc/user-guide/create-and-manage-vpc-peering-connection
https://www.alibabacloud.com/help/ja/vpc/user-guide/examples-of-vpc-peering-connections
https://www.softbank.jp/biz/blog/cloud-technology/articles/202211/alibabacloud-vpc/


同一アカウント
クロスリージョン

Terraform で異なる2リージョンにVPCとECSインスタンスを作成する
VPCのアドレス範囲は重複しないようにする


前提: 
コンソールより「CDTサービスの有効化」実施済
ECS-KeyPairをTokyoとSeoulで作成済

 


tfファイル相違点: 


Japna(Tokyo)
ap-northeast-1
ap-northeast-1a
ecs.t5-lc2m1.nano
alibabakey01
cloud_ssd
10.11.1.0/24

South Korea (Seoul)
ap-northeast-2
ap-northeast-2a
ecs.t6-c4m1.large
alibabakey03
cloud_essd
10.2.1.0/24


-- 1. VPCとECSの作成(Tokyo)
-- セキュリティグループにSeoulからのICMP許可追加必要

cd ${BASE_DIR}/tokyo

cat <<-'EOF' > variables.tf

locals {
  availability_zone = "ap-northeast-1a"
}


variable "instance_type" {
  description = "instance_type"
  type = string
  default = "ecs.t5-lc2m1.nano"
}

variable "image_id" {
  description = "image_id"
  type = string
  default = "aliyun_2_1903_x64_20G_alibase_20231221.vhd"
}

EOF

 

cat <<-'EOF' > main.tf

terraform {
  required_version = ">= 1.0.0, < 2.0.0"
  required_providers {
    alicloud = {
       source  = "aliyun/alicloud"
       version = "= 1.217.0"
    }
  }
}

provider "alicloud" {
    region  = "ap-northeast-1"
}


resource "alicloud_vpc" "vpc01" {
  vpc_name          = "vpc01"
  description       = "vpc01"
  cidr_block        = "10.11.0.0/16"
}

 

resource "alicloud_vswitch" "sw01" {
  vswitch_name      = "sw01"
  description       = "sw01"
  vpc_id            = alicloud_vpc.vpc01.id
  cidr_block        = "10.11.1.0/24"
  zone_id           = local.availability_zone
}

resource "alicloud_security_group" "sg01" {
  name                = "sg01"
  description         = "sg01"
  vpc_id              = alicloud_vpc.vpc01.id
  security_group_type = "normal"
}


resource "alicloud_security_group_rule" "sg0101" {
  type              = "ingress"
  ip_protocol       = "tcp"
  port_range        = "22/22"
  security_group_id = alicloud_security_group.sg01.id
  nic_type          = "intranet"
  policy            = "accept"
  priority          = 10
  cidr_ip           = "0.0.0.0/0"
  description       = "sg0101"
}

resource "alicloud_security_group_rule" "sg0102" {
  type              = "ingress"
  ip_protocol       = "icmp"
  port_range        = "-1/-1"
  security_group_id = alicloud_security_group.sg01.id
  nic_type          = "intranet"
  policy            = "accept"
  priority          = 10
  cidr_ip           = "10.2.1.0/24"
  description       = "sg0102"
}

resource "alicloud_vpc_ipv4_gateway" "gw01" {
  ipv4_gateway_name        = "gw01"
  ipv4_gateway_description = "gw01"
  vpc_id                   = alicloud_vpc.vpc01.id
  enabled                  = true
}

 

 

# ルートテーブルへvSwitchの関連付け
resource "alicloud_route_table_attachment" "sw01_rt01" {
  vswitch_id     = alicloud_vswitch.sw01.id
  route_table_id = alicloud_vpc.vpc01.route_table_id
}


# ルートテーブルへカスタムルート追加
resource "alicloud_route_entry" "rt0101" {
  name                  = "rt0101"
  route_table_id        = alicloud_vpc.vpc01.route_table_id
  destination_cidrblock = "0.0.0.0/0"
  nexthop_type          = "Ipv4Gateway"
  nexthop_id            = alicloud_vpc_ipv4_gateway.gw01.id
}


resource "alicloud_instance" "instance01" {

  image_id                   = var.image_id
  instance_type              = var.instance_type
  security_groups            = [alicloud_security_group.sg01.id]
  instance_name              = "instance01"
  system_disk_category       = "cloud_ssd"
  system_disk_name           = "instance01"
  system_disk_size           = 20
  description                = "instance01"
  internet_charge_type       = "PayByBandwidth"
  internet_max_bandwidth_out = 0
  host_name                  = "instance01"
  vswitch_id                 = alicloud_vswitch.sw01.id
  instance_charge_type       = "PostPaid"
  key_name                   = "alibabakey01"
  deletion_protection        = false
  credit_specification       = "Standard"

}


resource "alicloud_eip_address" "eip01" {
  address_name              = "eip01"
  bandwidth                 = 1
  deletion_protection       = false
  description               = "eip01"
  internet_charge_type      = "PayByTraffic"
  isp                       = "BGP"
  payment_type              = "PayAsYouGo"
  netmode                   = "public"
}

# インスタンスとEIPの関連付け
resource "alicloud_eip_association" "instance01_eip01" {
  instance_id              = alicloud_instance.instance01.id
  allocation_id            = alicloud_eip_address.eip01.id
}

 

EOF

 

cat <<-'EOF' > outputs.tf

 

output "vpc01_id" {
  value = alicloud_vpc.vpc01.id
  description = "vpc01.id"
}

output "vpc01_route_table_id" {
  value = alicloud_vpc.vpc01.route_table_id
  description = "vpc01.route_table_id"
}

output "sw01_id" {
  value = alicloud_vswitch.sw01.id
  description = "sw01.id"
}

output "sg01_id" {
  value = alicloud_security_group.sg01.id
  description = "sg01.id"
}

output "gw01_id" {
  value = alicloud_vpc_ipv4_gateway.gw01.id
  description = "gw01.id"
}


output "instance01_id" {
  value = alicloud_instance.instance01.id
  description = "instance01.id"
}


output "eip01_id" {
  value = alicloud_eip_address.eip01.id
  description = "eip01.id"
}

 

EOF

 


terraform init
terraform fmt
terraform -version

 

terraform plan

 

terraform apply -auto-approve


-- 2. VPCとECSの作成(Seoul)
-- セキュリティグループにTokyoからのICMP許可追加必要

cd ${BASE_DIR}/seoul


cat <<-'EOF' > variables.tf

locals {
  availability_zone = "ap-northeast-2a"
}


variable "instance_type" {
  description = "instance_type"
  type = string
  default = "ecs.t6-c4m1.large"
}

variable "image_id" {
  description = "image_id"
  type = string
  default = "aliyun_2_1903_x64_20G_alibase_20231221.vhd"
}

EOF

 

cat <<-'EOF' > main.tf

terraform {
  required_version = ">= 1.0.0, < 2.0.0"
  required_providers {
    alicloud = {
       source  = "aliyun/alicloud"
       version = "= 1.217.0"
    }
  }
}

provider "alicloud" {
    region  = "ap-northeast-2"
}


resource "alicloud_vpc" "vpc01" {
  vpc_name          = "vpc01"
  description       = "vpc01"
  cidr_block        = "10.2.0.0/16"
}

 

resource "alicloud_vswitch" "sw01" {
  vswitch_name      = "sw01"
  description       = "sw01"
  vpc_id            = alicloud_vpc.vpc01.id
  cidr_block        = "10.2.1.0/24"
  zone_id           = local.availability_zone
}

resource "alicloud_security_group" "sg01" {
  name                = "sg01"
  description         = "sg01"
  vpc_id              = alicloud_vpc.vpc01.id
  security_group_type = "normal"
}


resource "alicloud_security_group_rule" "sg0101" {
  type              = "ingress"
  ip_protocol       = "tcp"
  port_range        = "22/22"
  security_group_id = alicloud_security_group.sg01.id
  nic_type          = "intranet"
  policy            = "accept"
  priority          = 10
  cidr_ip           = "0.0.0.0/0"
  description       = "sg0101"
}

resource "alicloud_security_group_rule" "sg0102" {
  type              = "ingress"
  ip_protocol       = "icmp"
  port_range        = "-1/-1"
  security_group_id = alicloud_security_group.sg01.id
  nic_type          = "intranet"
  policy            = "accept"
  priority          = 10
  cidr_ip           = "10.11.1.0/24"
  description       = "sg0102"
}


resource "alicloud_vpc_ipv4_gateway" "gw01" {
  ipv4_gateway_name        = "gw01"
  ipv4_gateway_description = "gw01"
  vpc_id                   = alicloud_vpc.vpc01.id
  enabled                  = true
}

 

 

# ルートテーブルへvSwitchの関連付け
resource "alicloud_route_table_attachment" "sw01_rt01" {
  vswitch_id     = alicloud_vswitch.sw01.id
  route_table_id = alicloud_vpc.vpc01.route_table_id
}


# ルートテーブルへカスタムルート追加
resource "alicloud_route_entry" "rt0101" {
  name                  = "rt0101"
  route_table_id        = alicloud_vpc.vpc01.route_table_id
  destination_cidrblock = "0.0.0.0/0"
  nexthop_type          = "Ipv4Gateway"
  nexthop_id            = alicloud_vpc_ipv4_gateway.gw01.id
}


resource "alicloud_instance" "instance01" {

  image_id                   = var.image_id
  instance_type              = var.instance_type
  security_groups            = [alicloud_security_group.sg01.id]
  instance_name              = "instance01"
  system_disk_category       = "cloud_essd"
  system_disk_name           = "instance01"
  system_disk_size           = 20
  description                = "instance01"
  internet_charge_type       = "PayByBandwidth"
  internet_max_bandwidth_out = 0
  host_name                  = "instance01"
  vswitch_id                 = alicloud_vswitch.sw01.id
  instance_charge_type       = "PostPaid"
  key_name                   = "alibabakey03"
  deletion_protection        = false
  credit_specification       = "Standard"

}


resource "alicloud_eip_address" "eip01" {
  address_name              = "eip01"
  bandwidth                 = 1
  deletion_protection       = false
  description               = "eip01"
  internet_charge_type      = "PayByTraffic"
  isp                       = "BGP"
  payment_type              = "PayAsYouGo"
  netmode                   = "public"
}

# インスタンスとEIPの関連付け
resource "alicloud_eip_association" "instance01_eip01" {
  instance_id              = alicloud_instance.instance01.id
  allocation_id            = alicloud_eip_address.eip01.id
}

 

EOF

 

cat <<-'EOF' > outputs.tf

 

output "vpc01_id" {
  value = alicloud_vpc.vpc01.id
  description = "vpc01.id"
}

output "vpc01_route_table_id" {
  value = alicloud_vpc.vpc01.route_table_id
  description = "vpc01.route_table_id"
}

output "sw01_id" {
  value = alicloud_vswitch.sw01.id
  description = "sw01.id"
}

output "sg01_id" {
  value = alicloud_security_group.sg01.id
  description = "sg01.id"
}

output "gw01_id" {
  value = alicloud_vpc_ipv4_gateway.gw01.id
  description = "gw01.id"
}


output "instance01_id" {
  value = alicloud_instance.instance01.id
  description = "instance01.id"
}


output "eip01_id" {
  value = alicloud_eip_address.eip01.id
  description = "eip01.id"
}

 

EOF

 


terraform init
terraform fmt
terraform -version

 

terraform plan

 

terraform apply -auto-approve

 

-- 3. VPCピアリング接続の作成(Tokyo)
-- AcceptingAliUidパラメータ
-- はメインアカウントIDを使用する。 aliyun ram GetAccountAlias で取得可能


aliyun vpcpeer CreateVpcPeerConnection \
--AcceptingAliUid 1111111111111111 \
--AcceptingRegionId ap-northeast-2 \
--AcceptingVpcId vpc-111111111111111111111 \
--RegionId ap-northeast-1 \
--VpcId vpc-111111111111111111111 \
--Bandwidth 1 \
--Name vpcc01 

 


aliyun vpcpeer ListVpcPeerConnections 

 

-- 4. カスタムルート追加

-- 4.1 Tokyo → Seoul

aliyun vpc DescribeRouteEntryList \
--RouteTableId vtb-111111111111111111111


aliyun vpc CreateRouteEntries \
--RouteEntries.1.RouteTableId vtb-111111111111111111111 \
--RouteEntries.1.DstCidrBlock 10.2.1.0/24 \
--RouteEntries.1.NextHop pcc-111111111111111111 \
--RouteEntries.1.NextHopType VpcPeer \
--RouteEntries.1.Name rte01

-- 4.2 Seoul → Tokyo

aliyun vpc DescribeRouteEntryList \
--RouteTableId vtb-111111111111111111111 


aliyun vpc CreateRouteEntries \
--RouteEntries.1.RouteTableId vtb-111111111111111111111 \
--RouteEntries.1.DstCidrBlock 10.11.1.0/24 \
--RouteEntries.1.NextHop pcc-111111111111111111 \
--RouteEntries.1.NextHopType VpcPeer \
--RouteEntries.1.Name rte01


-- 5. 動作確認
-- 5.1 Tokyo → Seoul

ping 10.2.1.116 

-- 5.2 Seoul → Tokyo

ping 10.11.1.77 


-- 6. クリーンアップ

-- 6.1 VPCピアリング接続の削除(Tokyo)

aliyun vpcpeer ListVpcPeerConnections 


aliyun vpcpeer DeleteVpcPeerConnection \
--InstanceId pcc-111111111111111111 \
--Force true 


-- 6.2 VPCとECSの削除(Tokyo)

cd ${BASE_DIR}/tokyo
terraform destroy -auto-approve

-- 6.3 VPCとECSの削除(Seoul)

cd ${BASE_DIR}/seoul
terraform destroy -auto-approve

 

 

{Alibaba ApsaraDB for Redis} クイックスタート

https://qiita.com/wa-ta-ru/items/7cf3ee769488944dbc00

https://www.alibabacloud.com/help/ja/redis/getting-started/step-1-create-an-apsaradb-for-redis-instance


$0.009/時間

 

-- 1. VPCとECSの作成

 

cat <<-'EOF' > variables.tf

locals {
  availability_zone = "ap-northeast-1a"
}


variable "instance_type" {
  description = "instance_type"
  type = string
  default = "ecs.t5-lc2m1.nano"
}

variable "image_id" {
  description = "image_id"
  type = string
  default = "aliyun_2_1903_x64_20G_alibase_20231221.vhd"
}

EOF

 

cat <<-'EOF' > main.tf

terraform {
  required_version = ">= 1.0.0, < 2.0.0"
  required_providers {
    alicloud = {
       source  = "aliyun/alicloud"
       version = "= 1.217.0"
    }
  }
}

provider "alicloud" {
    region  = "ap-northeast-1"
}


resource "alicloud_vpc" "vpc01" {
  vpc_name          = "vpc01"
  description       = "vpc01"
  cidr_block        = "10.2.0.0/16"
}

 

resource "alicloud_vswitch" "sw01" {
  vswitch_name      = "sw01"
  description       = "sw01"
  vpc_id            = alicloud_vpc.vpc01.id
  cidr_block        = "10.2.1.0/24"
  zone_id           = local.availability_zone
}

resource "alicloud_security_group" "sg01" {
  name                = "sg01"
  description         = "sg01"
  vpc_id              = alicloud_vpc.vpc01.id
  security_group_type = "normal"
}


resource "alicloud_security_group_rule" "sg0101" {
  type              = "ingress"
  ip_protocol       = "tcp"
  port_range        = "22/22"
  security_group_id = alicloud_security_group.sg01.id
  nic_type          = "intranet"
  policy            = "accept"
  priority          = 10
  cidr_ip           = "0.0.0.0/0"
  description       = "sg0101"
}


resource "alicloud_vpc_ipv4_gateway" "gw01" {
  ipv4_gateway_name        = "gw01"
  ipv4_gateway_description = "gw01"
  vpc_id                   = alicloud_vpc.vpc01.id
  enabled                  = true
}

 

 

# ルートテーブルへvSwitchの関連付け
resource "alicloud_route_table_attachment" "sw01_rt01" {
  vswitch_id     = alicloud_vswitch.sw01.id
  route_table_id = alicloud_vpc.vpc01.route_table_id
}


# ルートテーブルへカスタムルート追加
resource "alicloud_route_entry" "rt0101" {
  name                  = "rt0101"
  route_table_id        = alicloud_vpc.vpc01.route_table_id
  destination_cidrblock = "0.0.0.0/0"
  nexthop_type          = "Ipv4Gateway"
  nexthop_id            = alicloud_vpc_ipv4_gateway.gw01.id
}


resource "alicloud_instance" "instance01" {

  image_id                   = var.image_id
  instance_type              = var.instance_type
  security_groups            = [alicloud_security_group.sg01.id]
  instance_name              = "instance01"
  system_disk_category       = "cloud_ssd"
  system_disk_name           = "instance01"
  system_disk_size           = 20
  description                = "instance01"
  internet_charge_type       = "PayByBandwidth"
  internet_max_bandwidth_out = 0
  host_name                  = "instance01"
  vswitch_id                 = alicloud_vswitch.sw01.id
  instance_charge_type       = "PostPaid"
  key_name                   = "alibabakey01"
  deletion_protection        = false
  credit_specification       = "Standard"

}


resource "alicloud_eip_address" "eip01" {
  address_name              = "eip01"
  bandwidth                 = 1
  deletion_protection       = false
  description               = "eip01"
  internet_charge_type      = "PayByTraffic"
  isp                       = "BGP"
  payment_type              = "PayAsYouGo"
  netmode                   = "public"
}

# インスタンスとEIPの関連付け
resource "alicloud_eip_association" "instance01_eip01" {
  instance_id              = alicloud_instance.instance01.id
  allocation_id            = alicloud_eip_address.eip01.id
}

 

EOF

 

cat <<-'EOF' > outputs.tf

 

output "vpc01_id" {
  value = alicloud_vpc.vpc01.id
  description = "vpc01.id"
}

output "vpc01_route_table_id" {
  value = alicloud_vpc.vpc01.route_table_id
  description = "vpc01.route_table_id"
}

output "sw01_id" {
  value = alicloud_vswitch.sw01.id
  description = "sw01.id"
}

output "sg01_id" {
  value = alicloud_security_group.sg01.id
  description = "sg01.id"
}

output "gw01_id" {
  value = alicloud_vpc_ipv4_gateway.gw01.id
  description = "gw01.id"
}


output "instance01_id" {
  value = alicloud_instance.instance01.id
  description = "instance01.id"
}


output "eip01_id" {
  value = alicloud_eip_address.eip01.id
  description = "eip01.id"
}

 

EOF

 


terraform init
terraform fmt
terraform -version

 

terraform plan

 

terraform apply -auto-approve

 


-- 2. Redis作成


aliyun r-kvstore CreateInstance \
--Appendonly no \
--Capacity 256 \
--ChargeType PostPaid \
--EngineVersion 5.0 \
--InstanceClass redis.master.micro.default \
--InstanceName redis01 \
--InstanceType Redis \
--NetworkType VPC \
--NodeType STAND_ALONE \
--Password 'password' \
--Port 6379 \
--VSwitchId vsw-111111111111111111111 \
--VpcId vpc-111111111111111111111 \
--ZoneId ap-northeast-1a 


aliyun r-kvstore DescribeInstances 


-- 3. ホワイトリストの設定

 

aliyun r-kvstore DescribeSecurityIps \
--InstanceId r-1111111111111111 


aliyun r-kvstore ModifySecurityIps \
--InstanceId r-1111111111111111 \
--SecurityIps 10.2.1.215 \
--ModifyMode Append 


aliyun r-kvstore DescribeSecurityIps \
--InstanceId r-1111111111111111 


-- 4. ECSから動作確認

yum -y install redis

redis-cli -h r-1111111111111111.redis.japan.rds.aliyuncs.com -p 6379 -a 'password' 

ping
set hello world
get hello

 


-- 5. クリーンアップ


aliyun r-kvstore DescribeInstances 


aliyun r-kvstore DeleteInstance \
--InstanceId r-1111111111111111 

 


terraform destroy -auto-approve

 

 

 

 

シェルで数値を3桁ごとにカンマ区切り

(22)
https://genzouw.com/entry/2020/02/04/140039/1912/
https://dampgblog.hinohikari291.com/SedTestCommand/


echo 1234567890 | sed -E ':loop; s/^([0-9]+)([0-9]{3})/\1,\2/; t loop;';

(12)
https://genzouw.com/entry/2020/02/04/140039/1912/
https://dampgblog.hinohikari291.com/SedTestCommand/


echo 1234567890 | sed -E ':loop; s/^([0-9]+)([0-9]{3})/\1,\2/; t loop;';

(RL9)
https://genzouw.com/entry/2020/02/04/140039/1912/
https://dampgblog.hinohikari291.com/SedTestCommand/


echo 1234567890 | sed -E ':loop; s/^([0-9]+)([0-9]{3})/\1,\2/; t loop;';

 

 

(2022)
https://blog.powershell-from.jp/?p=214

 

(1234567890).ToString("#,#")