ebook img

Oracle GoldenGate Administering Oracle GoldenGate for Windows PDF

388 Pages·2014·4.84 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Oracle GoldenGate Administering Oracle GoldenGate for Windows

Oracle® GoldenGate Administering Oracle GoldenGate for Windows and UNIX 12c (12.1.2) E29388-06 November 2014 Documentation for system administrators and database administrators that describes how to work with the interface components that control Oracle GoldenGate, monitor and troubleshoot Oracle GoldenGate performance, and perform other administrative operations. Oracle GoldenGate Administering Oracle GoldenGate for Windows and UNIX, 12c (12.1.2) E29388-06 Copyright © 2013, 2014, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government. This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group. This software or hardware and documentation may provide access to or information on content, products, and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services. Contents Preface.............................................................................................................................................................. xvii Audience.................................................................................................................................................... xvii Documentation Accessibility.................................................................................................................. xvii Related Documents.................................................................................................................................. xvii Conventions............................................................................................................................................. xviii 1 Introduction to Oracle GoldenGate 1.1 Oracle GoldenGate Supported Processing Methods and Databases ................................1-1 1.2 Overview of the Oracle GoldenGate Architecture............................................................1-3 1.2.1 Overview of Extract ...................................................................................................1-4 1.2.2 Overview of Data Pumps ...........................................................................................1-4 1.2.3 Overview of Replicat .................................................................................................1-5 1.2.4 Overview of Trails .....................................................................................................1-6 1.2.4.1 Processes that Write to, and Read, a Trail............................................................1-6 1.2.4.2 Trail Creation and Maintenance ..........................................................................1-7 1.2.5 Overview of Extract Files ...........................................................................................1-7 1.2.6 Overview of Checkpoints ..........................................................................................1-7 1.2.7 Overview of Manager ................................................................................................1-8 1.2.8 Overview of Collector ................................................................................................1-9 1.3 Overview of Process Types ..............................................................................................1-9 1.4 Overview of Groups .......................................................................................................1-10 1.5 Overview of the Commit Sequence Number (CSN) .......................................................1-10 2 Oracle GoldenGate Globalization Support 2.1 Preserving the Character Set ............................................................................................2-1 2.1.1 Character Set of Database Structural Metadata..........................................................2-1 2.1.2 Character Set of Character-type Data.........................................................................2-1 2.1.3 Character Set of Database Connection .......................................................................2-1 2.1.4 Character Set of Text Input and Output .....................................................................2-2 2.2 Using Unicode and Native Characters .............................................................................2-2 3 Configuring Manager and Network Communications 3.1 Overview of the Manager Process ....................................................................................3-1 3.2 Assigning Manager a Port for Local Communication ......................................................3-2 3.3 Maintaining Ports for Remote Connections through Firewalls ........................................3-2 iii 3.4 Choosing an Internet Protocol..........................................................................................3-3 3.5 Recommended Manager Parameters ...............................................................................3-3 3.6 Creating the Manager Parameter File...............................................................................3-4 3.7 Starting Manager ..............................................................................................................3-4 3.7.1 Starting Manager from the Command Shell of the Operating System.......................3-5 3.7.2 Starting Manager from GGSCI...................................................................................3-5 3.8 Stopping Manager ............................................................................................................3-5 3.8.1 Stopping Manager on UNIX and Linux .....................................................................3-5 3.8.2 Stopping Manager on Windows ................................................................................3-5 4 Getting Started with the Oracle GoldenGate Process Interfaces 4.1 Using the GGSCI Command-line Interface ......................................................................4-1 4.1.1 Using Wildcards in Command Arguments ...............................................................4-1 4.1.2 Globalization Support for the Command Interface....................................................4-1 4.1.3 Using Command History...........................................................................................4-2 4.1.4 Storing and Calling Frequently Used Command Sequences .....................................4-2 4.2 Controlling Oracle GoldenGate Processes........................................................................4-3 4.2.1 Controlling Manager .................................................................................................4-3 4.2.2 Controlling Extract and Replicat................................................................................4-3 4.2.3 Deleting Extract and Replicat ....................................................................................4-4 4.3 Automating Commands...................................................................................................4-5 4.3.1 Issuing Commands Through the IBM i CLI ..............................................................4-6 4.4 Using Oracle GoldenGate Parameter Files .......................................................................4-6 4.4.1 Globalization Support for Parameter Files.................................................................4-6 4.4.2 Working with the GLOBALS File ..............................................................................4-7 4.4.3 Working with Runtime Parameters ...........................................................................4-7 4.4.4 Creating a Parameter File ..........................................................................................4-9 4.4.4.1 Creating a Parameter File in GGSCI ....................................................................4-9 4.4.4.2 Creating a Parameter File with a Text Editor ....................................................4-11 4.4.5 Verifying a Parameter File .......................................................................................4-11 4.4.6 Viewing a Parameter File .........................................................................................4-11 4.4.7 Changing a Parameter File.......................................................................................4-12 4.4.8 Simplifying the Creation of Parameter Files ............................................................4-12 4.4.8.1 Using Wildcards................................................................................................4-13 4.4.8.2 Using OBEY ......................................................................................................4-13 4.4.8.3 Using Macros ....................................................................................................4-13 4.4.8.4 Using Parameter Substitution ...........................................................................4-13 4.4.9 Getting Information about Oracle GoldenGate Parameters.....................................4-14 4.5 Specifying Object Names in Oracle GoldenGate Input ..................................................4-14 4.5.1 Specifying Filesystem Path Names in Parameter Files on Windows Systems .........4-14 4.5.2 Supported Database Object Names .........................................................................4-15 4.5.2.1 Supported Special Characters ...........................................................................4-15 4.5.2.2 Non-supported Special Characters....................................................................4-15 4.5.3 Specifying Names that Contain Slashes ...................................................................4-16 4.5.4 Qualifying Database Object Names .........................................................................4-16 4.5.4.1 Two-part Names ...............................................................................................4-16 4.5.4.2 Three-part Names .............................................................................................4-17 iv 4.5.4.3 Applying Data from Multiple Containers or Catalogs ......................................4-18 4.5.4.4 Specifying a Default Container or Catalog ........................................................4-18 4.5.5 Specifying Case-Sensitive Database Object Names ..................................................4-18 4.5.6 Using Wildcards in Database Object Names............................................................4-19 4.5.6.1 Rules for Using Wildcards for Source Objects ...................................................4-20 4.5.6.2 Rules for Using Wildcards for Target Objects ...................................................4-21 4.5.6.3 Fallback Name Mapping ...................................................................................4-21 4.5.6.4 Wildcard Mapping from Pre-11.2.1 Trail Version .............................................4-22 4.5.6.5 Asterisks or Question Marks as Literals in Object Names .................................4-22 4.5.6.6 How Wildcards are Resolved ............................................................................4-22 4.5.6.7 Excluding Objects from a Wildcard Specification .............................................4-22 4.5.7 Differentiating Case-sensitive Column Names from Literals...................................4-22 5 Using Oracle GoldenGate for Live Reporting 5.1 Overview of the Reporting Configuration........................................................................5-1 5.1.1 Filtering and Conversion ...........................................................................................5-1 5.1.2 Read-only vs. High Availability.................................................................................5-2 5.1.3 Additional Information ..............................................................................................5-2 5.2 Creating a Standard Reporting Configuration .................................................................5-2 5.2.1 Source System ............................................................................................................5-3 5.2.2 Target System ............................................................................................................5-4 5.3 Creating a Reporting Configuration with a Data Pump on the Source System ................5-5 5.3.1 Source System ............................................................................................................5-5 5.3.2 Target System ............................................................................................................5-7 5.4 Creating a Reporting Configuration with a Data Pump on an Intermediary System .......5-8 5.4.1 Source System ............................................................................................................5-9 5.4.2 Intermediary System ................................................................................................5-11 5.4.3 Target System ..........................................................................................................5-12 5.5 Creating a Cascading Reporting Configuration .............................................................5-13 5.5.1 Source System ..........................................................................................................5-14 5.5.2 Second System in the Cascade .................................................................................5-16 5.5.3 Third System in the Cascade ....................................................................................5-18 6 Using Oracle GoldenGate for Real-time Data Distribution 6.1 Overview of the Data-distribution Configuration ............................................................6-1 6.2 Considerations for a Data-distribution Configuration .....................................................6-1 6.2.1 Fault Tolerance ..........................................................................................................6-1 6.2.2 Filtering and Conversion ...........................................................................................6-2 6.2.3 Read-only vs. High Availability.................................................................................6-2 6.2.4 Additional Information ..............................................................................................6-2 6.3 Creating a Data Distribution Configuration .....................................................................6-2 6.3.1 Source System ............................................................................................................6-3 6.3.2 Target Systems ...........................................................................................................6-5 7 Configuring Oracle GoldenGate for Real-time Data Warehousing 7.1 Overview of the Data Warehousing Configuration..........................................................7-1 v 7.2 Considerations for a Data Warehousing Configuration ...................................................7-1 7.2.1 Isolation of Data Records ...........................................................................................7-1 7.2.2 Data Storage...............................................................................................................7-2 7.2.3 Filtering and Conversion ...........................................................................................7-2 7.2.4 Additional Information..............................................................................................7-2 7.3 Creating a Data Warehousing Configuration ...................................................................7-2 7.3.1 Source Systems ..........................................................................................................7-3 7.3.2 Target System ............................................................................................................7-6 8 Configuring Oracle GoldenGate to Maintain a Live Standby Database 8.1 Overview of a Live Standby Configuration .....................................................................8-1 8.2 Considerations for a Live Standby Configuration ............................................................8-2 8.2.1 Trusted Source ...........................................................................................................8-2 8.2.2 Duplicate Standby .....................................................................................................8-2 8.2.3 DML on the Standby System .....................................................................................8-2 8.2.4 Oracle GoldenGate Processes ....................................................................................8-2 8.2.5 Backup Files ...............................................................................................................8-2 8.2.6 Failover Preparedness................................................................................................8-3 8.2.7 Sequential Values that are Generated by the Database ..............................................8-3 8.2.8 Additional Information..............................................................................................8-3 8.3 Creating a Live Standby Configuration............................................................................8-3 8.3.1 Prerequisites on Both Systems ...................................................................................8-4 8.3.2 Configuration from Active Source to Standby ...........................................................8-4 8.4 Configuration from Standby to Active Source .................................................................8-6 8.5 Moving User Activity in a Planned Switchover ...............................................................8-8 8.5.1 Moving User Activity to the Live Standby ................................................................8-8 8.5.2 Moving User Activity Back to the Primary System..................................................8-10 8.6 Moving User Activity in an Unplanned Failover ...........................................................8-11 8.6.1 Moving User Activity to the Live Standby ..............................................................8-11 8.6.2 Moving User Activity Back to the Primary System..................................................8-12 9 Configuring Oracle GoldenGate for Active-Active High Availability 9.1 Overview of an Active-active Configuration ...................................................................9-1 9.2 Considerations for an Active-Active Configuration .........................................................9-2 9.2.1 TRUNCATES .............................................................................................................9-2 9.2.2 Application Design ....................................................................................................9-2 9.2.3 Keys ...........................................................................................................................9-3 9.2.4 Triggers and Cascaded Deletes ..................................................................................9-3 9.2.5 Database-Generated Values .......................................................................................9-3 9.2.6 Database Configuration .............................................................................................9-3 9.3 Preventing Data Looping .................................................................................................9-4 9.3.1 Preventing the Capture of Replicat Operations .........................................................9-4 9.3.1.1 Preventing the Capture of Replicat Transactions (Oracle) ..................................9-4 9.3.1.2 Preventing Capture of Replicat Transactions (Teradata).....................................9-4 9.3.1.3 Preventing Capture of Replicat Transactions (Other Databases) ........................9-5 9.3.2 Identifying Replicat Transactions ..............................................................................9-5 9.3.2.1 DB2 on z/OS, LUW, IBM i, and Informix ...........................................................9-5 vi 9.3.2.2 MySQL and NonStop SQL/MX ..........................................................................9-5 9.3.2.3 Oracle ..................................................................................................................9-5 9.3.2.4 SQL Server...........................................................................................................9-6 9.3.2.5 Sybase ..................................................................................................................9-6 9.3.2.6 Teradata...............................................................................................................9-6 9.3.3 Replicating DDL in a Bi-directional Configuration ....................................................9-7 9.4 Managing Conflicts ..........................................................................................................9-7 9.5 Additional Information ....................................................................................................9-8 9.6 Creating an Active-Active Configuration .........................................................................9-8 9.6.1 Prerequisites on Both Systems ...................................................................................9-9 9.6.2 Configuration from Primary System to Secondary System........................................9-9 9.6.3 Configuration from Secondary System to Primary System......................................9-11 10 Configuring Conflict Detection and Resolution 10.1 Overview of the Oracle GoldenGate CDR Feature .........................................................10-1 10.2 Configuring Oracle GoldenGate CDR ............................................................................10-2 10.2.1 Making the Required Column Values Available to Extract .....................................10-2 10.2.2 Configuring the Oracle GoldenGate Parameter Files for Conflict Resolution..........10-2 10.2.3 Configuring the Oracle GoldenGate Parameter Files for Error Handling ................10-3 10.2.3.1 Tools for Mapping Extra Data to the Exceptions Table .....................................10-4 10.2.3.2 Sample Exceptions Mapping with Source and Target Columns Only ...............10-5 10.2.3.3 Sample Exceptions Mapping with Additional Columns in the Exceptions Table...... 10-6 10.2.4 Viewing CDR Statistics ............................................................................................10-7 10.2.4.1 Report File .........................................................................................................10-7 10.2.4.2 GGSCI................................................................................................................10-8 10.2.4.3 Column-conversion Functions ..........................................................................10-8 10.3 CDR Example 1: All Conflict Types with USEMAX, OVERWRITE, DISCARD .............10-8 10.3.1 Table Used in this Example......................................................................................10-8 10.3.2 MAP Statement with Conflict Resolution Specifications .........................................10-9 10.3.3 Description of MAP Statement ................................................................................10-9 10.3.4 Error Handling.........................................................................................................10-9 10.3.5 INSERTROWEXISTS with the USEMAX Resolution ...............................................10-9 10.3.6 UPDATEROWEXISTS with the USEMAX Resolution ...........................................10-10 10.3.7 UPDATEROWMISSING with OVERWRITE Resolution .......................................10-11 10.3.8 DELETEROWMISSING with DISCARD Resolution..............................................10-12 10.3.9 DELETEROWEXISTS with OVERWRITE Resolution ............................................10-13 10.4 CDR Example 2: UPDATEROWEXISTS with USEDELTA and USEMAX ...................10-14 10.4.1 Table Used in this Example....................................................................................10-14 10.4.2 MAP Statement ......................................................................................................10-14 10.4.3 Description of MAP Statement ..............................................................................10-14 10.4.4 Error Handling.......................................................................................................10-15 10.5 CDR Example 3: UPDATEROWEXISTS with USEDELTA, USEMAX, and IGNORE ..10-16 10.5.1 Table Used in this Example....................................................................................10-16 10.5.2 MAP Statement ......................................................................................................10-17 10.5.3 Description of MAP Statement ..............................................................................10-17 10.5.4 Error Handling.......................................................................................................10-17 vii 11 Configuring Oracle GoldenGate Security 11.1 Overview of Oracle GoldenGate Security Options.........................................................11-1 11.2 Encrypting Data with the Master Key and Wallet Method ............................................11-2 11.2.1 Creating the Wallet and Adding a Master Key ........................................................11-3 11.2.2 Specifying Encryption Parameters in the Parameter File .........................................11-3 11.2.3 Renewing the Master Key ........................................................................................11-4 11.2.4 Deleting Stale Master Keys ......................................................................................11-6 11.3 Encrypting Data with the ENCKEYS Method ................................................................11-8 11.3.1 Encrypting the Data with the ENCKEYS Method....................................................11-8 11.3.2 Decrypting the Data with the ENCKEYS Method ...................................................11-9 11.3.3 Examples of Data Encryption using the ENCKEYS Method .................................11-10 11.4 Managing Identities in a Credential Store ....................................................................11-11 11.4.1 Creating and Populating the Credential Store .......................................................11-12 11.4.2 Specifying the Alias in a Parameter File or Command ..........................................11-13 11.5 Encrypting a Password in a Command or Parameter File............................................11-13 11.5.1 Encrypting the Password .......................................................................................11-13 11.5.2 Specifying the Encrypted Password in a Parameter File or Command .................11-14 11.6 Populating an ENCKEYS File with Encryption Keys ...................................................11-16 11.6.1 Defining Your Own Key ........................................................................................11-16 11.6.2 Using KEYGEN to Generate a Key ........................................................................11-16 11.6.3 Creating and Populating the ENCKEYS Lookup File ............................................11-16 11.7 Configuring GGSCI Command Security ......................................................................11-17 11.7.1 Setting Up Command Security ..............................................................................11-17 11.7.2 Securing the CMDSEC File ....................................................................................11-19 11.8 Using Target System Connection Initiation..................................................................11-19 11.8.1 Configuring the Passive Extract Group .................................................................11-20 11.8.2 Configuring the Alias Extract Group .....................................................................11-20 11.8.3 Starting and Stopping the Passive and Alias Processes .........................................11-21 11.8.4 Managing Extraction Activities .............................................................................11-21 11.8.5 Other Considerations when using Passive-Alias Extract .......................................11-21 12 Mapping and Manipulating Data 12.1 Limitations of Support ...................................................................................................12-1 12.2 Parameters that Control Mapping and Data Integration................................................12-1 12.3 Mapping between Dissimilar Databases ........................................................................12-2 12.4 Deciding Where Data Mapping and Conversion Will Take Place..................................12-2 12.4.1 Mapping and Conversion on Windows and UNIX Systems ...................................12-2 12.4.2 Mapping and Conversion on NonStop Systems ......................................................12-2 12.5 Globalization Considerations when Mapping Data .......................................................12-2 12.5.1 Conversion between Character Sets.........................................................................12-3 12.5.1.1 Database Object Names .....................................................................................12-3 12.5.1.2 Column Data .....................................................................................................12-3 12.5.2 Preservation of Locale..............................................................................................12-4 12.5.3 Support for Escape Sequences .................................................................................12-4 12.6 Mapping Columns .........................................................................................................12-5 12.6.1 Supporting Case and Special Characters in Column Names ...................................12-6 12.6.2 Configuring Table-level Column Mapping with COLMAP ....................................12-6 viii 12.6.2.1 Specifying the Columns to be Mapped in the COLMAP Clause .......................12-6 12.6.2.2 Using USEDEFAULTS to Enable Default Column Mapping ............................12-7 12.6.2.3 Determining Whether COLMAP Requires a Data-definitions File ....................12-8 12.6.3 Configuring Global Column Mapping with COLMATCH ......................................12-9 12.6.4 Understanding Default Column Mapping .............................................................12-11 12.6.5 Mapping Data Types from Column to Column .....................................................12-12 12.6.5.1 Numeric Columns ...........................................................................................12-12 12.6.5.2 Character-type Columns .................................................................................12-12 12.6.5.3 Datetime Columns...........................................................................................12-12 12.7 Selecting and Filtering Rows ........................................................................................12-13 12.7.1 Selecting Rows with a FILTER Clause ...................................................................12-13 12.7.2 Selecting Rows with a WHERE Clause ..................................................................12-15 12.7.3 Considerations for Selecting Rows with FILTER and WHERE ..............................12-16 12.7.3.1 Ensuring Data Availability for Filters..............................................................12-16 12.7.3.2 Comparing Column Values .............................................................................12-17 12.7.3.3 Testing for NULL Values.................................................................................12-17 12.8 Retrieving Before and After Values ..............................................................................12-17 12.9 Selecting Columns ........................................................................................................12-18 12.10 Selecting and Converting SQL Operations ...................................................................12-18 12.11 Using Transaction History............................................................................................12-19 12.12 Testing and Transforming Data....................................................................................12-20 12.12.1 Handling Column Names and Literals in Functions .............................................12-21 12.12.2 Using the Appropriate Function ............................................................................12-21 12.12.3 Transforming Dates ...............................................................................................12-21 12.12.4 Performing Arithmetic Operations ........................................................................12-22 12.12.4.1 Omitting @COMPUTE ....................................................................................12-22 12.12.5 Manipulating Numbers and Character Strings ......................................................12-23 12.12.6 Handling Null, Invalid, and Missing Data.............................................................12-23 12.12.6.1 Using @COLSTAT ...........................................................................................12-23 12.12.6.2 Using @COLTEST............................................................................................12-24 12.12.6.3 Using @IF ........................................................................................................12-24 12.12.7 Performing Tests ....................................................................................................12-24 12.12.7.1 Using @CASE ..................................................................................................12-24 12.12.7.2 Using @VALONEOF .......................................................................................12-24 12.12.7.3 Using @EVAL ..................................................................................................12-25 12.13 Using Tokens ................................................................................................................12-25 12.13.1 Defining Tokens .....................................................................................................12-25 12.13.2 Using Token Data in Target Tables ........................................................................12-26 13 Associating Replicated Data with Metadata 13.1 Overview ........................................................................................................................13-1 13.2 Configuring Oracle GoldenGate to Assume Identical Metadata ....................................13-1 13.2.1 Rules for Tables to be Considered Identical .............................................................13-2 13.3 Configuring Oracle GoldenGate to Assume Dissimilar Metadata .................................13-2 13.3.1 Contents of the Definitions File................................................................................13-3 13.3.2 Which Definitions File Type to Use, and Where ......................................................13-3 13.3.3 Understanding the Effect of Character Sets on Definitions Files..............................13-3 ix 13.3.3.1 Confining Data Mapping and Conversion to the Replicat Process ...................13-3 13.3.3.2 Avoiding File Corruptions Due to Operating System Character Sets ...............13-4 13.3.3.3 Changing the Character Set of Existing Definitions Files ..................................13-4 13.3.3.4 Downloading from a z/OS system to another platform ...................................13-4 13.3.4 Using a Definitions Template ..................................................................................13-4 13.3.5 Configuring Oracle GoldenGate to Capture Data-definitions .................................13-5 13.3.5.1 Configure DEFGEN ..........................................................................................13-5 13.3.5.2 Run DEFGEN ....................................................................................................13-7 13.3.5.3 Transfer the Definitions File to the Remote System...........................................13-8 13.3.5.4 Specify the Definitions File................................................................................13-8 13.3.6 Adding Tables that Satisfy a Definitions Template..................................................13-8 13.3.7 Examples of Using a Definitions File .......................................................................13-9 13.3.7.1 Creating a Source-definitions file for Use on a Target System ..........................13-9 13.3.7.2 Creating Target-definitions Files for Use on a Source System ...........................13-9 13.3.7.3 Creating Multiple Source-definitions Files for Use on a Target System ..........13-10 13.4 Configuring Oracle GoldenGate to Use a Combination of Similar and Dissimilar Definitions ....................................................................................................................13-11 14 Configuring Online Change Synchronization 14.1 Overview of Online Change Synchronization................................................................14-1 14.1.1 Initial Synchronization.............................................................................................14-2 14.2 Choosing Names for Processes and Files .......................................................................14-2 14.2.1 Naming Conventions for Processes .........................................................................14-2 14.2.2 Choosing File Names ...............................................................................................14-3 14.3 Creating a Checkpoint Table ..........................................................................................14-4 14.3.1 Options for Creating the Checkpoint Table .............................................................14-4 14.3.2 Adjusting for Coordinated Replicat in Oracle RAC .................................................14-5 14.4 Creating an Online Extract Group..................................................................................14-6 14.5 Creating a Trail ..............................................................................................................14-9 14.5.1 Assigning Storage for Oracle GoldenGate Trails .....................................................14-9 14.5.2 Estimating Space for the Trails ................................................................................14-9 14.5.3 Adding a Trail .......................................................................................................14-10 14.6 Creating a Parameter File for Online Extraction ..........................................................14-11 14.7 Creating an Online Replicat Group ..............................................................................14-14 14.7.1 About Classic Replicat Mode .................................................................................14-14 14.7.2 About Coordinated Replicat Mode ........................................................................14-15 14.7.2.1 About Barrier Transactions .............................................................................14-16 14.7.2.2 How Barrier Transactions are Processed .........................................................14-16 14.7.2.3 About the Global Watermark ..........................................................................14-17 14.7.3 About Integrated Replicat Mode ...........................................................................14-17 14.7.4 Understanding Replicat Processing in Relation to Parameter Changes .................14-17 14.7.5 Creating the Replicat Group ..................................................................................14-18 14.8 Creating a Parameter File for Online Replication .........................................................14-19 15 Handling Processing Errors 15.1 Overview of Oracle GoldenGate Error Handling...........................................................15-1 15.2 Handling Extract Errors .................................................................................................15-1 x

Description:
Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may UNIX is a registered trademark of The Open Group. This software or
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.