Three converging forces have made Oracle's co-location model the default enterprise architecture — regulatory pressure, commercial leverage, and the evolution of the DBA role.
Two years ago, "multi-cloud" was a PowerPoint aspiration. In 2026, it is a regulatory requirement, a procurement weapon, and increasingly, a career-defining skill for infrastructure engineers and DBAs.
Oracle's answer — physically placing Exadata X10M hardware inside Azure and AWS datacenters — is an architectural pivot that eliminates the primary objection enterprise auditors had: cross-internet replication. When the Oracle DB node is inside the same datacenter building as your Azure App Service, the latency profile changes from "50–80ms internet hop" to "sub-2ms private fabric." That changes everything from failover RTO to real-time analytics feasibility.
DORA (EU Digital Operational Resilience Act), BCBS 239, and sector-specific mandates (PRA SS1/21, APRA CPS 230) now require demonstrable multi-provider resilience. Oracle's physically co-located model is the first architecture that satisfies these requirements without crossing the public internet — a requirement previously impossible to meet with traditional cross-cloud replication.
🔵 Regulatory Pressure
- DORA mandates multi-provider resilience for EU financial entities by 2025
- BCBS 239 requires data lineage across environments
- Auditors now accept Oracle co-lo as "independent provider"
- No cross-internet data movement required
🟠Vendor Leverage
- Oracle needs Azure/AWS distribution to expand TAM
- Hyperscalers need Oracle's 40,000+ enterprise database customers
- Enterprises negotiate discounts against both simultaneously
- Single Azure/AWS bill for Oracle workloads improves FinOps
🔴 DBA Role Evolution
- VCN peering and ExpressRoute are now DBA competencies
- AWS Direct Connect topology knowledge required
- Data Guard across cloud boundaries is now standard
- GoldenGate CDC replaces ETL in multi-cloud patterns
🟡 Commercial Reality
- Azure Unified Support covers Oracle DB @ Azure incidents
- Azure Marketplace billing consolidates Oracle licensing
- AWS co-location launched late 2024, GA across us-east-1 / eu-west-1
- OCI credits portable across co-location deployments
Multi-Cloud Reference Architecture
Three-region topology: OCI as the control plane and source-of-truth database, with Oracle DB @ Azure serving the Azure application tier and Oracle DB @ AWS handling AWS workloads — all connected via private, sub-millisecond interconnects.
Latency Profiles & Connectivity
Understanding the latency characteristics of each path is critical for architecture decisions — particularly for synchronous Data Guard and real-time analytics.
Azure uses ExpressRoute for the private OCI–Azure link. AWS uses Direct Connect for the OCI–AWS link. Both require dedicated circuits provisioned at Oracle partner locations. Bandwidth tiers available: 1Gbps, 10Gbps, 100Gbps. For Data Guard SYNC mode, a minimum 10Gbps dedicated circuit is recommended to keep redo transport under 2ms.
The key architectural decision is choosing between Data Guard SYNC and ASYNC modes across the interconnect. SYNC guarantees zero data loss but introduces latency into every commit. At sub-2ms interconnect latency, SYNC is viable for most OLTP workloads — a significant departure from traditional cross-cloud architectures where ASYNC was the only practical option.
04 — DBA Playbook
Production SQL Playbook for Multi-Cloud DBAs
Battle-tested queries for monitoring Data Guard health, latency, failover readiness, and interconnect performance across all three clouds.
Data Guard Health — Comprehensive Lag & Status
Standby Redo Apply — Detailed Gap Analysis
Real-Time Redo Transport Throughput
Failover Readiness Scorecard
GoldenGate CDC — Multi-Cloud Replication Health
GoldenGate is the CDC backbone connecting OCI primary to both Oracle DB @ Azure and Oracle DB @ AWS. These queries give real-time visibility into replication health, lag, and conflict resolution.
When enabling bi-directional GoldenGate replication between Oracle DB @ Azure and Oracle DB @ AWS, you must configure Automatic Conflict Detection and Resolution (CDR) rules. The most common conflict pattern is concurrent UPDATE conflicts on the same row from both regions. The recommended strategy for financial data is timestamp-wins with a Delta resolution fallback. Always monitor the CDR exceptions table daily during the first 90 days of production.
Identity Federation & Security Across Clouds
Multi-cloud security is not additive — it is multiplicative in complexity. The Oracle co-location model introduces a unique identity topology that must be designed explicitly.
The fundamental challenge of multi-cloud identity is that each cloud has its own IAM model — OCI IAM, Azure Entra ID, and AWS IAM are not inherently interoperable. Oracle's co-location model provides a pragmatic answer: Azure Entra ID becomes the human identity plane for Oracle DB @ Azure, while OCI IAM governs the database resource control plane. AWS IAM handles the AWS-side application identities, with federation back to OCI Vault for database secrets.
Use OCI Vault as the single secrets manager across all three cloud environments. Both Azure Key Vault and AWS Secrets Manager can be configured to delegate to OCI Vault via API, ensuring that database passwords, TDE wallet keys, and GoldenGate credentials have one authoritative source. This dramatically simplifies SOC 2 and ISO 27001 evidence collection — one vault audit trail covers all three clouds.
Migration Runbook — On-Prem to Multi-Cloud Oracle
A phased approach that minimizes risk by establishing the OCI primary first, then extending into co-location models on Azure and AWS.
Architecture Decision Matrix
Not every workload needs the full three-cloud topology. Use this matrix to right-size your Oracle multi-cloud investment.
| Scenario | Recommended Pattern | Data Guard Mode | GoldenGate? | Complexity |
|---|---|---|---|---|
| Azure-first enterprise, Oracle licensing concern | OCI + DB@Azure | SYNC / MAX AVAILABILITY | Optional | Medium |
| AWS-native apps, need Oracle as backend | OCI Primary + DB@AWS | ASYNC / MAX PERFORMANCE | Yes | Medium |
| DORA / BCBS 239 regulatory mandate | Full 3-Cloud Topology | SYNC (Azure) + ASYNC (AWS) | Yes — CDR required | High |
| Analytics / reporting offload | OCI + ADB Shared | ADG — read-only standby | Optional | Low |
| DR-only (not primary active) | DB@Azure or DB@AWS as DR | ASYNC — MAX PERFORMANCE | No | Low |
| Global active-active (bi-directional writes) | GoldenGate Bidirectional | N/A (GoldenGate replaces) | Yes — mandatory | Very High |
DBA & Infra Team Skill Checklist
- Oracle Data Guard administration (switchover, failover, gap resolution)
- GoldenGate Extract / Replicat configuration and CDC monitoring
- OCI VCN architecture: subnets, route tables, security lists, NSGs
- Azure ExpressRoute provisioning and BGP routing basics
- AWS Direct Connect setup, virtual interfaces, and route propagation
- OCI Vault for secrets management across multi-cloud
- Azure Entra ID RBAC for Oracle DB @ Azure authentication
- Bi-directional CDR conflict resolution (requires specialist engagement)
- Cross-cloud FinOps — Azure + OCI + AWS cost attribution is not automatic
The Exadata X10M hardware in Azure and AWS datacenters, the sub-millisecond FastConnect/Direct Connect links, and the GoldenGate CDC hub in OCI combine into a topology that satisfies both operational and regulatory requirements simultaneously. The only architectures that fail are those designed on PowerPoint rather than tested network topologies. Build the interconnect, measure the latency, then make the Data Guard mode decision. Everything else follows from those two numbers.
Referemces:
https://docs.oracle.com/en-us/iaas/Content/multicloud/Oraclemulticloud.htm
https://docs.oracle.com/en-us/iaas/Content/database-at-aws/oaaws.htm
https://docs.oracle.com/en-us/iaas/Content/database-at-azure/oaa.htm
https://docs.oracle.com/en-us/iaas/Content/database-at-gcp/home.htm