Administering Oracle Goldengate for HP Nonstop (Guardian)

Total Page:16

File Type:pdf, Size:1020Kb

Administering Oracle Goldengate for HP Nonstop (Guardian) Oracle® Fusion Middleware Administering Oracle GoldenGate for HP NonStop (Guardian) 12c (12.2.0.1) E57712-04 June 2018 Oracle Fusion Middleware Administering Oracle GoldenGate for HP NonStop (Guardian), 12c (12.2.0.1) E57712-04 Copyright © 2014, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency- specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government. This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group. This software or hardware and documentation may provide access to or information about content, products, and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services unless otherwise set forth in an applicable agreement between you and Oracle. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services, except as set forth in an applicable agreement between you and Oracle. Contents Preface Audience xii Documentation Accessibility xii Related Information xii Conventions xiii 1 Understanding Oracle GoldenGate for HP NonStop Oracle GoldenGate Overview 1-1 Oracle GoldenGate Configuration 1-1 Oracle GoldenGate Features 1-2 Oracle GoldenGate Architecture 1-3 Oracle GoldenGate Components 1-3 Extract 1-4 Logger 1-4 Collector 1-5 Trails 1-5 Replicat 1-6 Manager 1-6 Syncfile 1-6 Processing Groups 1-6 Checkpoints 1-7 Parameters 1-7 Reader 1-7 Coordinator 1-8 Oracle GoldenGate Processing 1-8 Initial Data Synchronization 1-8 File to Replicat 1-8 Direct Load 1-9 Direct Bulk Load 1-9 Capturing Data Changes from TMF Applications 1-9 Capturing Changes for Distributed Network Transactions 1-10 Capturing Data Changes from Non-TMF applications 1-11 iii Using Extract for Data Distribution 1-12 Batch Processing 1-12 Capturing Directly from Files 1-13 Custom Event Processing 1-13 Oracle GoldenGate Commands 1-13 To Start GGSCI 1-13 2 Planning the Configuration Planning Overview 2-1 Configuring TMF-Enabled Processing 2-2 Adding Columns to a Source Table 2-2 Ensuring All Audit is Processed 2-2 Keeping Necessary Audit Available for Extract 2-3 Ensuring TMF Cannot Purge Audit 2-3 Copying the Audit to an Alternative Location 2-3 Using Tape Dumps as an Alternative Location 2-3 Minimizing Vulnerability to Outages 2-4 Configuring FUP RELOAD Activity 2-4 Data Compression 2-4 Compressed Enscribe Records 2-5 Compressed SQL Records 2-5 DCOMPRESS File Attribute Not Supported 2-6 AUDITCOMPRESS File Attribute Considerations 2-6 Configuring for Distributed Network Transactions 2-6 Re-configuring TMF 2-9 Configuring Non-TMF-Enabled Processing 2-9 Maintaining Data Integrity 2-9 Supported File Types and Operations 2-10 Authentication for Bound Programs 2-11 System Utilities That Update Databases 2-11 Private Memory and Stack Space 2-11 Impact on Existing Application Performance 2-11 Configuring Oracle Goldengate Global Operations 2-12 GLOBALS Parameter File 2-12 Changing the Default Location of AUDCFG 2-12 Configuring Replication 2-12 Replicating SQL Tables with System Keys 2-13 Replicating Primary Key Updates 2-13 Missing Row Errors 2-13 Non-Audited Target 2-14 iv Compressed Updates to Enscribe Targets 2-14 Files and Tables Other Than Key-Sequenced 2-14 Load Balancing and Performance Issues 2-15 Potential Problems with Audit Compressed Files 2-15 Conflicts with Updating the Target 2-16 Many-to-One Replication 2-16 Bi-Directional Replication 2-16 Replicating Data to Non-TMF Enabled Databases 2-17 Replicating New SQL Columns 2-17 Configuring for Maximum Throughput 2-17 Extraction 2-18 TMF Extraction 2-18 Non-TMF Data Extraction 2-18 Replication 2-18 Latency Issues 2-18 Capacity Planning 2-19 TMF Data Extraction 2-19 Non-TMF Data Extraction 2-19 Data Transfer into Oracle GoldenGate Trails 2-19 Replicat Throughput 2-19 Changing Default Component Names 2-19 Using Wildcards 2-20 Support for DDL and DDL2 2-21 Specifying Internet Protocol Addresses 2-21 3 Configuring Initial Data Synchronization Initial Data Synchronization 3-1 Example Steps for Initial Data Load 3-2 Configure and Run Extract 3-2 Perform Initial Load Using the File to Replicat Method 3-2 Configure and Run Replicat 3-3 Direct Load 3-3 To run direct load: 3-3 Using Wildcards 3-5 Direct Bulk Load 3-5 To run direct bulk load: 3-5 Synchronizing Nonstop Databases Using Database Utilities Through TCP/IP 3-6 Controlling the IP Process for Replicat 3-7 Loading Oracle, Microsoft, or Sybase SQL Server Tables 3-7 Loading to Oracle or SQL Server 3-8 v Initial Sync Parameter File Examples 3-8 Sample NonStop to Oracle Parameter Files 3-9 Sample SQL Server Parameter Files 3-9 Limiting the Enscribe Source Key Range for Initial Load 3-10 Restarting an Initial Load 3-10 Loading Initial Data from Windows and Unix 3-11 Integrating Source and Target Data 3-11 Distributing Extracted Data 3-12 Direct File Extraction 3-12 Batch Processing 3-13 One-Time Database Extraction 3-13 Trickle Batch Processing 3-13 Determining the Next File 3-14 When the Next File is Processed 3-14 4 Configuring Oracle GoldenGate Security Using Encryption 4-1 How Data is Encrypted 4-1 Encrypting Trail or Extract Files 4-2 Encrypting a Database Password 4-2 Encrypting Data Sent Across TCP/IP 4-3 Generating Encryption Keys 4-4 Using Command Security 4-5 Securing the CMDSEC File 4-7 5 Configuring the Manager and Collector Introducing Manager 5-1 Configuring and Starting Manager 5-1 Creating and Configuring the Manager Parameter File 5-2 A Sample Manager Parameter File 5-2 Starting and Stopping Manager 5-3 Configuring and Running the Collector 5-3 Maintaining Ports for Remote Connections through Firewalls 5-4 Configuring Collector 5-4 Configuration Examples 5-5 The TCP/IP Port 5-6 Dynamic Method 5-6 Explicit Method 5-6 Monitoring Collector 5-7 vi Security Considerations 5-7 Collecting Between Open Systems and NonStop 5-7 6 Configuring Change Synchronization Introduction 6-1 Change Synchronization for TMF Applications 6-1 Configuring Extract 6-1 Configuring Trails 6-2 Configuring Replicat 6-2 Change Synchronization for Non-TMF Applications 6-3 Creating the LOGPARM File 6-4 Sample LOGPARM File 6-4 Configuring Logger and GGSLIB 6-6 Starting Logger 6-6 Using Macros to Bind GGSLIB to a Non-TMF Application 6-6 Building GGSLIB 6-6 Private Memory and Stack Space 6-7 Alternate Methods of Binding GGSLIB to an Application 6-7 Using the ?Search Directive 6-8 Non-Native Environments 6-8 Native Mode Itanium Systems 6-8 Libraries for Native Applications 6-8 Running NLDLIB 6-9 Removing a Library 6-9 Activating Authorization of Bound Libraries 6-10 Managing the Authorization Event 6-11 Adding and Verifying the Authorization Event 6-11 Using Different PARAM-TEXT Options 6-12 Getting the Current Status of the Authorization Event 6-12 Working with Parameter Files 6-13 Creating a Parameter File 6-14 Storing Parameter Files 6-16 Viewing a Parameter File 6-16 Changing a Parameter File 6-17 Using
Recommended publications
  • Big Data Velocity in Plain English
    Big Data Velocity in Plain English John Ryan Data Warehouse Solution Architect Table of Contents The Requirement . 1 What’s the Problem? . .. 2 Components Needed . 3 Data Capture . 3 Transformation . 3 Storage and Analytics . 4 The Traditional Solution . 6 The NewSQL Based Solution . 7 NewSQL Advantage . 9 Thank You. 10 About the Author . 10 ii The Requirement The assumed requirement is the ability to capture, transform and analyse data at potentially massive velocity in real time. This involves capturing data from millions of customers or electronic sensors, and transforming and storing the results for real time analysis on dashboards. The solution must minimise latency — the delay between a real world event and it’s impact upon a dashboard, to under a second. Typical applications include: • Monitoring Machine Sensors: Using embedded sensors in industrial machines or vehicles — typically referred to as The Internet of Things (IoT) . For example Progressive Insurance use real time speed and vehicle braking data to help classify accident risk and deliver appropriate discounts. Similar technology is used by logistics giant FedEx which uses SenseAware technology to provide near real-time parcel tracking. • Fraud Detection: To assess the risk of credit card fraud prior to authorising or declining the transaction. This can be based upon a simple report of a lost or stolen card, or more likely, an analysis of aggregate spending behaviour, aligned with machine learning techniques. • Clickstream Analysis: Producing real time analysis of user web site clicks to dynamically deliver pages, recommended products or services, or deliver individually targeted advertising. Big Data: Velocity in Plain English eBook 1 What’s the Problem? The primary challenge for real time systems architects is the potentially massive throughput required which could exceed a million transactions per second.
    [Show full text]
  • PS Non-Standard Database Systems Overview
    PS Non-Standard Database Systems Overview Daniel Kocher March 2019 is document gives a brief overview on three categories of non-standard database systems (DBS) in the context of this class. For each category, we provide you with a motivation, a discussion about the key properties, a list of commonly used implementations (proprietary and open-source/freely-available), and recommendation(s) for your project. For your convenience, we also recap some relevant terms (e.g., ACID, OLTP, ...). Terminology OLTP Online transaction processing. OLTP systems are highly optimized to process (1) short queries (operating only on a small portion of the database) and (2) small transac- tions (inserting/updating few tuples per relation). Typically, OLTP includes insertions, updates, and deletions. e main focus of OLTP systems is on low response time and high throughput (in terms of transactions per second). Databases in OLTP systems are highly normalized [5]. OLAP Online analytical processing. OLAP systems analyze complex data (usually from a data warehouse). Typically, queries in an OLAP system may run for a long time (as opposed to queries in OLTP systems) and the number of transactions is usually low. Fur- thermore, typical OLAP queries are read-only and touch a large portion of the database (e.g., scan or join large tables). e main focus of OLAP systems is on low response time. Databases in OLAP systems are oen de-normalized intentionally [5]. ACID Traditional relational database systems guarantee ACID properties: – Atomicity All or no operation(s) of a transaction are reected in the database. – Consistency Isolated execution of a transaction preserves consistency of the database.
    [Show full text]
  • Performance Analysis of Blockchain Platforms
    UNLV Theses, Dissertations, Professional Papers, and Capstones August 2018 Performance Analysis of Blockchain Platforms Pradip Singh Maharjan Follow this and additional works at: https://digitalscholarship.unlv.edu/thesesdissertations Part of the Computer Sciences Commons Repository Citation Maharjan, Pradip Singh, "Performance Analysis of Blockchain Platforms" (2018). UNLV Theses, Dissertations, Professional Papers, and Capstones. 3367. http://dx.doi.org/10.34917/14139888 This Thesis is protected by copyright and/or related rights. It has been brought to you by Digital Scholarship@UNLV with permission from the rights-holder(s). You are free to use this Thesis in any way that is permitted by the copyright and related rights legislation that applies to your use. For other uses you need to obtain permission from the rights-holder(s) directly, unless additional rights are indicated by a Creative Commons license in the record and/ or on the work itself. This Thesis has been accepted for inclusion in UNLV Theses, Dissertations, Professional Papers, and Capstones by an authorized administrator of Digital Scholarship@UNLV. For more information, please contact [email protected]. PERFORMANCE ANALYSIS OF BLOCKCHAIN PLATFORMS By Pradip S. Maharjan Bachelor of Computer Engineering Tribhuvan University Institute of Engineering, Pulchowk Campus, Nepal 2012 A thesis submitted in partial fulfillment of the requirements for the Master of Science in Computer Science Department of Computer Science Howard R. Hughes College of Engineering The Graduate College University of Nevada, Las Vegas August 2018 c Pradip S. Maharjan, 2018 All Rights Reserved Thesis Approval The Graduate College The University of Nevada, Las Vegas May 4, 2018 This thesis prepared by Pradip S.
    [Show full text]
  • Evaluating and Comparing Oracle Database Appliance Performance Updated for Oracle Database Appliance X8-2-HA
    Evaluating and Comparing Oracle Database Appliance Performance Updated for Oracle Database Appliance X8-2-HA ORACLE WHITE PAPER | JANUARY 2020 DISCLAIMER The performance results in this paper are intended to give an estimate of the overall performance of the Oracle Database Appliance X8-2-HA system. The results are not a benchmark, and cannot be used to characterize the relative performance of Oracle Database Appliance systems from one generation to another, as the workload characteristics and other environmental factors including firmware, OS, and database patches, which includes Spectre/Meltdown fixes, will vary over time. For an accurate comparison to another platform, you should run the same tests, with the same OS (if applicable) and database versions, patch levels, etc. Do not rely on older tests or benchmark runs, as changes made to the underlying platform in the interim may substantially impact results. EVALUATING AND COMPARING ORACLE DATABASE APPLIANCE PERFORMANCE Table of Contents Introduction and Executive Summary 1 Audience 2 Objective 2 Oracle Database Appliance Deployment Architecture 3 Oracle Database Appliance Configuration Templates 3 What is Swingbench? 4 Swingbench Download and Setup 4 Configuring Oracle Database Appliance for Testing 5 Configuring Oracle Database Appliance System for Testing 5 Benchmark Setup 5 Database Setup 6 Schema Setup 6 Workload Setup and Execution 10 Benchmark Results 11 Workload Performance 11 Database and Operating System Statistics 12 Average CPU Busy 12 REDO Writes 13 Transaction Rate 13 Important Considerations for Performing the Benchmark 14 Conclusion 15 Appendix A Swingbench configuration files 16 Appendix B The loadgen.pl file 19 Appendix C The generate_awr.sh script 24 References 25 EVALUATING AND COMPARING ORACLE DATABASE APPLIANCE PERFORMANCE Introduction and Executive Summary Oracle Database Appliance X8-2-HA is a highly available Oracle database system.
    [Show full text]
  • 60-539: Emerging Non-Traditional Database Systems (Data Warehousing and Mining)
    60-539: Emerging non-traditional database systems (Data Warehousing and Mining): sdb1 warehouse sdb2 sdb3 Dr. C.I. Ezeife School of Computer Science, University of Windsor, Canada. Email: [email protected] 60-539 Dr. C.I. Ezeife @c 2021 1 PART I (DATABASE MANAGEMENT SYSTEM OVERVIEW) DBMS (PART 1) OVERVIEW Components of a DBMS DBMS Data model Data Definition and Manipulation Language File Organization Techniques Query Optimization and Evaluation Facility Database Design and Tuning Transaction Processing Concurrency Control Database Security and Integrity Issues 60-539 Dr. C.I. Ezeife © 2021 2 DBMS OVERVIEW(What are?) What is a database? : It is a collection of data, typically describing the activities of one or more related organizations, e.g., a University, an airline reservation or a banking database. What is a DBMS?: A DBMS is a set of software for creating, querying, managing and keeping databases. Examples of DBMS’s are DB2, Informix, Sybase, Oracle, MYSQL, Microsoft Access (relational). Alternative to Databases: Storing all data for university, airline and banking information in separate files and writing separate program for each data file. What is a Data Warehouse?:A subject-oriented, historical, non- volatile database integrating a number of data sources. What is Data Mining?:Is data analysis for finding interesting trends or patterns in large dataset to guide decisions about future activities. 60-539 Dr. C.I. Ezeife © 2021 3 DBMS OVERVIEW(Evolution of Information Technology) 1960s and earlier: Primitive file processing: data are collected in files and manipulated with programs in Cobol and other languages. Disadv.: any change in storage structure of data requires changing the program (i.e., no logical or physical data independence).
    [Show full text]
  • A Survey of Ledger Technology-Based Databases
    future internet Article A Survey of Ledger Technology-Based Databases Dénes László Fekete 1 and Attila Kiss 1,2,* 1 Department of Information Systems, ELTE Eötvös Loránd University, 1117 Budapest, Hungary; [email protected] 2 Department of Informatics, J. Selye University, 945 01 Komárno, Slovakia * Correspondence: [email protected] Abstract: The spread of crypto-currencies globally has led to blockchain technology receiving greater attention in recent times. This paper focuses more broadly on the uses of ledger databases as a traditional database manager. Ledger databases will be examined within the parameters of two categories. The first of these are Centralized Ledger Databases (CLD)-based Centralised Ledger Technology (CLT), of which LedgerDB will be discussed. The second of these are Permissioned Blockchain Technology-based Decentralised Ledger Technology (DLT) where Hyperledger Fabric, FalconDB, BlockchainDB, ChainifyDB, BigchainDB, and Blockchain Relational Database will be examined. The strengths and weaknesses of the reviewed technologies will be discussed, alongside a comparison of the mentioned technologies. Keywords: ledger technology; permissioned blockchain; centralised ledger database 1. Introduction Citation: Fekete, D.L.; Kiss, A. A In recent years, we have been witness to the rise of multiple new ledger technologies. Survey of Ledger Technology-Based Since Satosi Nakamoto wrote the Bitcoin white paper [1] in 2009, many different systems Databases. Future Internet 2021, 13, that endeavour to provide decentralization and trustless collaboration have been developed 197. https://doi.org/10.3390/ based on blockchain technology. Of late, a great amount of research and academia has been fi13080197 focused on the further development and reformation of the basis of blockchain in an attempt to solve the issues that continue to arise [2–4].
    [Show full text]
  • CSE 344 Final Examination Name
    CSE 344 Final Examination Monday, December 10, 2018, 2:30-4:20 Name: Question Points Score 1 30 2 20 3 20 4 30 5 20 6 35 7 45 Total: 200 • This exam is CLOSED book and CLOSED devices. • You are allowed TWO, HAND-WRITTEN letter-size sheets with notes (both sides). • You have 110 minutes; • Answer the easy questions before you spend too much time on the more difficult ones. • Good luck! 1 CSE 344 Final Dec 10, 2018, 2:30-4:20 1 Relational Data Model 1. (30 points) You are now a Climate Scientist, and run simulations to predict future changes in the climate. Your job is to improve the simulator in order to improve the climate predictions. Every time you have a new version of the simulator, you run it, and it will generate a dataset where, for each year, it records the predicted temperature at each location of your simulated area. You analyze the results, improve the simulator, and repeat. As a good scientist, you keep the results of all simulations in a relation with the following schema: Sim(version, year, loc, temp) The data types of Version and year are integers; temp is a real number; and loc is a text. (a) (5 points) Write a SQL CREATE TABLE statement to create the Sim relation. Identify the key in Sim, and create the key in your SQL statement. Choose float and for the real number type and text for the text type. Page 2 CSE 344 Final Dec 10, 2018, 2:30-4:20 Sim(version, year, loc, temp) (b) (5 points) Simulation version 13 is wrong, due to a bug in the simulator.
    [Show full text]
  • Extending ACID Semantics to the File System
    Extending ACID Semantics to the File System CHARLES P. WRIGHT IBM T. J. Watson Research Center RICHARD SPILLANE, GOPALAN SIVATHANU, and EREZ ZADOK Stony Brook University An organization’s data is often its most valuable asset, but today’s file systems provide few facilities to ensure its safety. Databases, on the other hand, have long provided transactions. Transactions are useful because they provide atomicity, consistency, isolation, and durability (ACID). Many applications could make use of these semantics, but databases have a wide variety of non-standard interfaces. For example, applications like mail servers currently perform elaborate error handling to ensure atomicity and consistency, because it is easier than using a DBMS. A transaction-oriented programming model eliminates complex error-handling code, because failed operations can simply be aborted without side effects. We have designed a file system that exports ACID transactions to user-level applications, while preserving the ubiquitous and convenient POSIX interface. In our prototype ACID file system, called Amino, updated applications can protect arbitrary sequences of system calls within a transaction. Unmodified applications operate without any changes, but each system call is transaction protected. We also built a recoverable memory library with support for nested transactions to allow applications to keep their in-memory data structures consistent with the file system. Our performance evaluation shows that ACID semantics can be added to applications with acceptable overheads.
    [Show full text]
  • Chapter 17: Parallel Databases
    ChapterChapter 18:18: ParallelParallel DatabasesDatabases IntroductionIntroduction • Parallel machines are becoming quite common and affordable – Prices of microprocessors, memory and disks have dropped sharply – Recent desktop computers feature multiple processors and this trend is projected to accelerate • Databases are growing increasingly large – large volumes of transaction data are collected and stored for later analysis. – multimedia objects like images are increasingly stored in databases • Large-scale parallel database systems increasingly used for: – storing large volumes of data – processing time-consuming decision-support queries – providing high throughput for transaction processing ParallelismParallelism inin DatabasesDatabases • Data can be partitioned across multiple disks for parallel I/O. • Individual relational operations (e.g., sort, join, aggregation) can be executed in parallel – data can be partitioned and each processor can work independently on its own partition. • Queries are expressed in high level language (SQL, translated to relational algebra) – makes parallelization easier. • Different queries can be run in parallel with each other. Concurrency control takes care of conflicts. • Thus, databases naturally lend themselves to parallelism. I/OI/O ParallelismParallelism • Reduce the time required to retrieve relations from disk by partitioning • The relations on multiple disks. • Horizontal partitioning – tuples of a relation are divided among many disks such that each tuple resides on one disk. • Partitioning techniques (number of disks = n): Round-robin: Send the I th tuple inserted in the relation to disk i mod n. Hash partitioning: – Choose one or more attributes as the partitioning attributes. – Choose hash function h with range 0…n - 1 – Let i denote result of hash function h applied to the partitioning attribute value of a tuple.
    [Show full text]
  • Performance Benchmark Postgresql / Mongodb Performance Benchmark Postgresql / Mongodb
    PERFORMANCE BENCHMARK POSTGRESQL / MONGODB // CONTENTS // ABOUT THIS BENCHMARK 3 Introduction 3 OnGres Ethics Policy 4 Authors 4 // EXECUTIVE SUMMARY. BENCHMARKS KEY FINDINGS 5 Transactions benchmark 5 OLTP Benchmark 6 OLAP Benchmark 6 // METHODOLOGY AND BENCHMARKS 7 Introduction and objectives 7 Benchmarks performed 7 About the technologies involved 8 Automated infrastructure 9 // TRANSACTIONS BENCHMARK 12 Benchmark description 12 MongoDB transaction limitations 14 Discussion on transaction isolation levels 14 Benchmark results 17 // OLTP BENCHMARK 25 Benchmark description 25 Initial considerations 26 Benchmark results 29 // OLAP BENCHMARK 38 Benchmark description 38 Benchmark results 45 2/46 // ABOUT THIS BENCHMARK Introduction Benchmarking is hard. Benchmarking databases, harder. Benchmarking databases that follow different approaches (relational vs document) is even harder. There are many reasons why this is true, widely discussed in the industry. Notwithstanding all these difficulties, the market demands these kinds of benchmarks. Despite the different data models that MongoDB and PostgreSQL expose, many developers and organizations face a challenge when choosing between the platforms. And while they can be compared on many fronts, performance is undoubtedly one of the main differentiators — arguably the main one. How then do you leverage an informative benchmark so that decisions can be made about the choice of a given technology, while at the same time presenting a fair arena in which the technologies compete in an apples-to-apples scenario? To fulfill these goals, this benchmark has been executed based on the following criteria: • Transparency and reproducibility. The framework that has been programmed and used to run the benchmarks is fully automated and is published as open source.
    [Show full text]
  • Hyperledger Blockchain Performance Metrics
    Hyperledger Blockchain Performance Metrics ABOUT HYPERLEDGER About This Paper Hyperledger This is the first white paper from the Hyperledger Performance and Scale Working (http://hyperledger.org/) is Group (https://wiki.hyperledger.org/groups/pswg/performance-and-scale-wg). an open source effort created The purpose of this document is to define the basic terms and key metrics to advance cross-industry that should be used to evaluate the performance of a blockchain and then blockchain technologies. communicate the results. This paper also serves as a platform-agnostic resource It is a global collaboration for technical blockchain developers and managers interested in using industry- including leaders in banking, standard nomenclature. finance, Internet of Things, While we appreciate that there may be discrete definitions for the terms “blockchain” manufacturing, supply chains, and “Distributed Ledger Technology (DLT),” for the purposes of this paper we will and technology. The Linux treat both terms synonymously and use the term “blockchain” throughout. Foundation, the nonprofit organization enabling mass This document provides some guidance on selecting and evaluating workloads. innovation through open source, We expect that refinements to these definitions and new blockchain-specific hosts Hyperledger. The Linux metrics will warrant future revisions of this document. Foundation also enables a In future documents, the Working Group plans to discuss workloads in greater worldwide developer community detail and to offer additional guidance on standard procedures and emerging to work together and share best practices for evaluating blockchain performance. To provide your feedback ideas, infrastructure, and code. and stay informed about subsequent versions of this paper, please join us in the Performance and Scale Working Group (https://wiki.hyperledger.org/groups/ pswg/performance-and-scale-wg).
    [Show full text]
  • Administration Guide Version 10.0
    Oracle® GoldenGate for Mainframe Administration Guide Version 10.0 October 2009 Administration Guide, version 10.0 Copyright © 1995, 2009 Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this software or related documentation is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms set forth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007). Oracle USA, Inc., 500 Oracle Parkway, Redwood City, CA 94065.
    [Show full text]