Claude-code-plugins-plus-skills oraclecloud-migration-deep-dive

install
source · Clone the upstream repo
git clone https://github.com/jeremylongshore/claude-code-plugins-plus-skills
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/jeremylongshore/claude-code-plugins-plus-skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/plugins/saas-packs/oraclecloud-pack/skills/oraclecloud-migration-deep-dive" ~/.claude/skills/jeremylongshore-claude-code-plugins-plus-skills-oraclecloud-migration-deep-dive && rm -rf "$T"
manifest: plugins/saas-packs/oraclecloud-pack/skills/oraclecloud-migration-deep-dive/SKILL.md
source content

Oracle Cloud Migration Deep Dive

Overview

Migrating to OCI from AWS or Azure requires translating IAM concepts (roles to policies, accounts to compartments), networking (VPC to VCN, Security Groups to NSGs), and compute (AMI to custom image). OCI's migration tooling is underdocumented compared to AWS Migration Hub or Azure Migrate. This skill provides comprehensive concept mapping tables, custom image import procedures, network topology translation, IAM policy translation, and data migration patterns — everything needed for a controlled cloud migration.

Purpose: Translate AWS/Azure architecture into OCI equivalents and execute the migration using OCI CLI and Python SDK, with verification at each step.

Prerequisites

  • OCI account with an active tenancy — https://cloud.oracle.com
  • OCI CLI installed and configured
    ~/.oci/config
    validated (see
    oraclecloud-install-auth
    )
  • Python 3.8+ with the OCI SDK —
    pip install oci
  • Source cloud CLI
    aws
    CLI or
    az
    CLI for exporting resources
  • Object Storage bucket in OCI for staging image imports
  • IAM policies:
    manage objects in compartment
    ,
    manage custom-images in compartment
    ,
    manage virtual-network-family in compartment

Instructions

Step 1: AWS-to-OCI Concept Mapping

AWS ConceptOCI EquivalentKey Differences
AccountTenancyOne tenancy = one billing entity, use compartments for isolation
Organization OUCompartmentCompartments are hierarchical, up to 6 levels deep
IAM RoleIAM PolicyOCI policies use
allow group X to verb resource in compartment Y
syntax
IAM UserIAM UserSame concept, but OCI uses API key auth (not access keys)
VPCVCNVCN subnets are regional (not AZ-scoped like AWS)
Security GroupNetwork Security Group (NSG)NSGs attach to VNICs, not instances. Also have Security Lists (subnet-level)
Route TableRoute TableSimilar, but OCI route rules target gateway OCIDs
Internet GatewayInternet GatewayIdentical concept
NAT GatewayNAT GatewayIdentical concept
VPC EndpointService GatewayService Gateway routes to OCI services without internet
VPC PeeringLPG / DRGLPG for same-region, DRG for cross-region or on-premises
AMICustom ImageExport as VMDK/QCOW2, import via Object Storage
EBSBlock VolumeAttachable block storage, similar performance tiers
S3Object StorageCompatible API (S3 compatibility mode available)
RDSAutonomous DatabaseFully managed, but different administration model
EC2 Instance TypeShapeFlex shapes allow fractional OCPU allocation
Availability ZoneAvailability Domain (AD)Same concept, 1-3 ADs per region
CloudWatchMonitoring ServiceUses MQL (Monitoring Query Language) instead of CloudWatch metrics
CloudTrailAudit ServiceAutomatic, no setup required

Step 2: Azure-to-OCI Concept Mapping

Azure ConceptOCI EquivalentKey Differences
SubscriptionCompartmentOCI uses compartments for billing isolation (not separate subscriptions)
Resource GroupCompartmentCompartments are hierarchical; resource groups are flat
Azure ADOCI IAM / IDCSOCI Identity Domains replaces IDCS for SSO/federation
VNetVCNOCI subnets are regional, not tied to a zone
NSGNSGNearly identical concept
Azure SQLAutonomous DatabaseDifferent scaling model (OCPU-based)
Managed DiskBlock VolumeSimilar, but OCI uses volume groups for snapshots
Blob StorageObject StorageDifferent API, but S3-compatible mode available
Azure MonitorMonitoring ServiceMQL query language instead of Kusto
Azure PolicyCloud GuardDetective controls, not preventive like Azure Policy

Step 3: Custom Image Import (AWS AMI to OCI)

Export the AMI from AWS, then import to OCI via Object Storage:

# Step 3a: Export AMI from AWS as VMDK
aws ec2 create-store-image-task \
  --image-id ami-0123456789abcdef0 \
  --bucket my-export-bucket

# Step 3b: Download and upload to OCI Object Storage
aws s3 cp s3://my-export-bucket/ami-0123456789abcdef0.vmdk ./image.vmdk

oci os object put \
  --bucket-name migration-staging \
  --file ./image.vmdk \
  --name "imported-image.vmdk" \
  --namespace "$NAMESPACE"
import oci

config = oci.config.from_file("~/.oci/config")
compute = oci.core.ComputeClient(config)

# Step 3c: Import as OCI custom image
image = compute.create_image(
    oci.core.models.CreateImageDetails(
        compartment_id="COMPARTMENT_OCID",
        display_name="migrated-from-aws",
        image_source_details=oci.core.models.ImageSourceViaObjectStorageTupleDetails(
            source_type="objectStorageTuple",
            bucket_name="migration-staging",
            namespace_name="NAMESPACE",
            object_name="imported-image.vmdk",
            source_image_type="VMDK",
        ),
    )
).data

print(f"Image import started: {image.id}")
print(f"State: {image.lifecycle_state}")  # IMPORTING → AVAILABLE

Step 4: IAM Policy Translation

AWS IAM roles use JSON policies attached to entities. OCI uses human-readable policy statements attached to compartments:

# AWS: Allow EC2 instances to read S3
{
  "Effect": "Allow",
  "Action": ["s3:GetObject", "s3:ListBucket"],
  "Resource": "arn:aws:s3:::my-bucket/*"
}

# OCI equivalent:
allow dynamic-group app-instances to read objects in compartment prod where target.bucket.name='my-bucket'

Common IAM translations:

AWS PolicyOCI Policy Statement
AdministratorAccess
allow group admins to manage all-resources in tenancy
ReadOnlyAccess
allow group readers to inspect all-resources in tenancy
AmazonEC2FullAccess
allow group compute-admins to manage instances in compartment prod
AmazonS3ReadOnlyAccess
allow group readers to read objects in compartment prod
AmazonVPCFullAccess
allow group net-admins to manage virtual-network-family in compartment prod
# Create an OCI IAM policy
oci iam policy create \
  --compartment-id "$COMPARTMENT_OCID" \
  --name "app-compute-policy" \
  --description "Allow app team to manage compute in prod" \
  --statements '["allow group app-team to manage instances in compartment prod","allow group app-team to use volumes in compartment prod"]'

Step 5: Network Topology Translation

Translate an AWS VPC with public/private subnets into an OCI VCN:

# Export AWS VPC configuration
aws ec2 describe-vpcs --vpc-ids vpc-0123456789abcdef0 --output json > aws-vpc.json
aws ec2 describe-subnets --filters "Name=vpc-id,Values=vpc-0123456789abcdef0" --output json > aws-subnets.json
aws ec2 describe-route-tables --filters "Name=vpc-id,Values=vpc-0123456789abcdef0" --output json > aws-routes.json

# Create equivalent OCI VCN
oci network vcn create \
  --compartment-id "$COMPARTMENT_OCID" \
  --display-name "migrated-vcn" \
  --cidr-blocks '["10.0.0.0/16"]' \
  --dns-label "migratedvcn"

Step 6: Data Migration (S3 to Object Storage)

OCI Object Storage supports S3-compatible API, enabling direct migration:

import oci

config = oci.config.from_file("~/.oci/config")
os_client = oci.object_storage.ObjectStorageClient(config)
namespace = os_client.get_namespace().data

# Create destination bucket
os_client.create_bucket(
    namespace_name=namespace,
    create_bucket_details=oci.object_storage.models.CreateBucketDetails(
        compartment_id="COMPARTMENT_OCID",
        name="migrated-data",
        storage_tier="Standard",
    ),
)

# Upload objects (for large migrations, use OCI Data Transfer Service)
with open("data-export.csv", "rb") as f:
    os_client.put_object(
        namespace_name=namespace,
        bucket_name="migrated-data",
        object_name="data-export.csv",
        put_object_body=f,
    )

print(f"Uploaded to: https://objectstorage.{config['region']}.oraclecloud.com/n/{namespace}/b/migrated-data/o/data-export.csv")

S3 Compatibility mode for tools that speak S3 natively:

# OCI Object Storage S3-compatible endpoint
# https://<namespace>.compat.objectstorage.<region>.oraclecloud.com

# Use with aws cli (after configuring OCI customer secret keys)
aws s3 sync s3://source-bucket/ s3://migrated-data/ \
  --endpoint-url "https://NAMESPACE.compat.objectstorage.us-ashburn-1.oraclecloud.com"

Output

Successful completion produces:

  • AWS-to-OCI and Azure-to-OCI concept mapping tables for architecture translation
  • Custom image imported from VMDK into OCI compute (ready to launch instances)
  • IAM policies translated from AWS JSON format to OCI policy statements
  • Network topology (VCN, subnets, gateways) matching the source VPC/VNet configuration
  • Data migrated from S3 to OCI Object Storage via direct upload or S3-compatible API

Error Handling

ErrorCodeCauseSolution
NotAuthorizedOrNotFound404Missing IAM policy for image importAdd
allow group migrators to manage custom-images in compartment prod
InvalidParameter400Unsupported image formatOCI accepts VMDK and QCOW2 only — convert other formats first
NotAuthenticated401API key misconfiguredRe-validate:
oci iam user get --user-id $(grep ^user ~/.oci/config | cut -d= -f2)
TooManyRequests429Rate limited during bulk uploadAdd delays between Object Storage uploads — no Retry-After header
InternalError500OCI service issueRetry after 60 seconds; check https://ocistatus.oraclecloud.com
Image import stuck in IMPORTINGLarge image or Object Storage throttlingCheck work request:
oci work-requests work-request get --work-request-id <id>

Examples

Quick migration pre-flight check:

# Verify OCI compartment is ready
oci iam compartment get --compartment-id "$COMPARTMENT_OCID" \
  --query 'data.{name:name, state:"lifecycle-state"}' --output table

# Verify Object Storage bucket exists
oci os bucket get --bucket-name migration-staging --namespace "$NAMESPACE" \
  --query 'data.name' --raw-output

# Check image import status
oci compute image list --compartment-id "$COMPARTMENT_OCID" \
  --query 'data[?contains("display-name",`migrated`)].{name:"display-name",state:"lifecycle-state"}' \
  --output table

Resources

Next Steps

After migration, review

oraclecloud-reference-architecture
to validate the OCI topology, then run
oraclecloud-prod-checklist
to ensure the migrated environment meets production standards.