Menu Close Log in Get started
v0.41 / Administration Guide / Oracle

Working with Oracle in Metabase

Starting in v0.20.0, Metabase provides a driver for connecting to Oracle databases. Under the hood, Metabase uses Oracle’s JDBC driver; due to licensing restrictions, we can’t include it as part of Metabase. Luckily, downloading it yourself and making it available to Metabase is straightforward and only takes a few minutes.

Downloading the Oracle JDBC Driver JAR

You can download the JDBC driver from Oracle’s JDBC driver downloads page. Head to this page, accept the license agreement, and download ojdbc8.jar:

Oracle JDBC Download

Before downloading this JAR you may need to sign up for a free account with Oracle. We have had success with the latest version at the time of this writing, 19.3 (even with older Oracle 12c databases), but any version should work.

Adding the Oracle JDBC Driver JAR to the Metabase Plugins Directory

Metabase will automatically make the Oracle driver available if it finds the Oracle JDBC driver JAR in the Metabase plugins directory when it starts up. All you need to do is create the directory, move the JAR you just downloaded into it, and restart Metabase.

Connecting with SSL

To connect to Oracle via SSL and enable encryption, check the Use a secure connection (SSL)? option on the connection setup page. You can add other SSL features (including client and/or server authentication) as explained below. You can use both client and server authentication (known as mutual authentication).

Server authentication

To configure the client (Metabase) to authenticate the identity of the server (the Oracle server), you may need to configure a truststore file that includes the server’s root CA, so that the JVM running Metabase trusts its certificate chain. Refer to the Oracle documentation on using keytool to manage key and truststore files, importing certificates, etc. Once you have a truststore file ready, add the following JVM options for Metabase: \<trustStorePassword>

With this done, the SSL connection to Oracle will authenticate the server.

For more information on setting up a truststore for AWS RDS Oracle instances, see the instructions provided by Amazon. Note that if you require connecting to other databases using SSL, instead of creating a new truststore, as shown in those examples, you’ll probably want to add the RDS CA to your existing truststore file (likely called cacerts),

Client authentication

To configure the server (the Oracle server) to authenticate the identity of the client (Metabase), you need to configure a keystore file that includes the client’s private key. The steps are almost identical to those above, except that you will import the client’s private key into the keystore rather than a root CA into a truststore file. \<keyStorePassword>

With this done, the Oracle server will authenticate Metabase using the private key when Metabase tries to connect over SSL.

When running from a JAR

By default, the plugins directory is called plugins, and lives in the same directory as the Metabase JAR.

For example, if you’re running Metabase from a directory called /app/, you should move the Oracle JDBC driver JAR to /app/plugins/:

# example directory structure for running Metabase with Oracle support

When running the Mac App

If you’re running Metabase from the Mac App, the plugins directory defaults to ~/Library/Application Support/Metabase/Plugins/:

# example directory structure for running Metabase Mac App with Oracle support
/Users/camsaul/Library/Application Support/Metabase/Plugins/ojdbc8.jar

Finally, you can choose a custom plugins directory if the default doesn’t suit your needs by setting the environment variable MB_PLUGINS_DIR.

When running from Docker

The process for adding plugins when running via Docker is similar, but you’ll need to mount the plugins directory. Refer to instructions here for more details.