Administering-Oracle-Goldengate.Pdf

Administering-Oracle-Goldengate.Pdf

Oracle® Fusion Middleware Administering Oracle GoldenGate 19c (19.1.0) E98073-03 October 2019 Oracle Fusion Middleware Administering Oracle GoldenGate, 19c (19.1.0) E98073-03 Copyright © 2013, 2019, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency- specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government. This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group. This software or hardware and documentation may provide access to or information about content, products, and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services unless otherwise set forth in an applicable agreement between you and Oracle. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services, except as set forth in an applicable agreement between you and Oracle. Contents Preface Audience xvi Documentation Accessibility xvi Related Information xvi Conventions xvii 1 Oracle GoldenGate Administration Overview Part I Oracle GoldenGate Administration: Common Components and Operations 2 Oracle GoldenGate Globalization Support 2.1 Preserving the Character Set 2-1 2.1.1 Character Set of Database Structural Metadata 2-1 2.1.2 Character Set of Character-type Data 2-1 2.1.3 Character Set of Database Connection 2-1 2.1.4 Character Set of Text Input and Output 2-2 2.2 Using Unicode and Native Characters 2-2 3 Using Oracle GoldenGate for Live Reporting 3.1 Overview of the Reporting Configuration 3-1 3.1.1 Filtering and Conversion 3-1 3.1.2 Read-only vs. High Availability 3-2 3.1.3 Additional Information 3-2 3.2 Creating a Standard Reporting Configuration 3-2 3.2.1 Source System 3-3 3.2.2 Target System 3-4 3.3 Creating a Reporting Configuration with a Data Pump on the Source System 3-5 3.3.1 Source System 3-5 iii 3.3.2 Target System 3-7 3.4 Creating a Reporting Configuration with a Data Pump on an Intermediary System 3-8 3.4.1 Source System 3-10 3.4.2 Intermediary System 3-11 3.4.3 Target System 3-12 3.5 Creating a Cascading Reporting Configuration 3-13 3.5.1 Source System 3-15 3.5.2 Second System in the Cascade 3-16 3.5.3 Third System in the Cascade 3-19 4 Using Oracle GoldenGate for Real-time Data Distribution 4.1 Overview of the Data-distribution Configuration 4-1 4.2 Considerations for a Data-distribution Configuration 4-1 4.2.1 Fault Tolerance 4-2 4.2.2 Filtering and Conversion 4-2 4.2.3 Read-only vs. High Availability 4-2 4.2.4 Additional Information 4-2 4.3 Creating a Data Distribution Configuration 4-2 4.3.1 Source System 4-3 4.3.2 Target Systems 4-5 5 Configuring Oracle GoldenGate for Real-time Data Warehousing 5.1 Overview of the Data Warehousing Configuration 5-1 5.2 Considerations for a Data Warehousing Configuration 5-1 5.2.1 Isolation of Data Records 5-2 5.2.2 Data Storage 5-2 5.2.3 Filtering and Conversion 5-2 5.2.4 Additional Information 5-2 5.3 Creating a Data Warehousing Configuration 5-2 5.3.1 Source Systems 5-3 5.3.2 Target System 5-6 6 Configuring Oracle GoldenGate to Maintain a Live Standby Database 6.1 Overview of a Live Standby Configuration 6-1 6.2 Considerations for a Live Standby Configuration 6-2 6.2.1 Trusted Source 6-2 6.2.2 Duplicate Standby 6-2 iv 6.2.3 DML on the Standby System 6-2 6.2.4 Oracle GoldenGate Processes 6-2 6.2.5 Backup Files 6-3 6.2.6 Failover Preparedness 6-3 6.2.7 Sequential Values that are Generated by the Database 6-3 6.2.8 Additional Information 6-3 6.3 Creating a Live Standby Configuration 6-4 6.3.1 Prerequisites on Both Systems 6-4 6.3.2 Configuration from Active Source to Standby 6-4 6.4 Configuration from Standby to Active Source 6-6 6.5 Moving User Activity in a Planned Switchover 6-9 6.5.1 Moving User Activity to the Live Standby 6-9 6.5.2 Moving User Activity Back to the Primary System 6-10 6.6 Moving User Activity in an Unplanned Failover 6-12 6.6.1 Moving User Activity to the Live Standby 6-12 6.6.2 Moving User Activity Back to the Primary System 6-12 7 Configuring Oracle GoldenGate for Active-Active Configuration 7.1 Overview of an Active-Active Configuration 7-1 7.2 Considerations for an Active-Active Configuration 7-2 7.2.1 TRUNCATES 7-2 7.2.2 Application Design 7-2 7.2.3 Keys 7-3 7.2.4 Triggers and Cascaded Deletes 7-3 7.2.5 Database-Generated Values 7-3 7.2.6 Database Configuration 7-4 7.3 Preventing Data Looping 7-4 7.3.1 Identifying Replicat Transactions 7-4 7.3.1.1 DB2 z/OS, DB2 LUW, and DB2 for i 7-5 7.3.1.2 MySQL 7-5 7.3.1.3 SQL Server 7-5 7.3.1.4 Oracle 7-6 7.3.2 Preventing the Capture of Replicat Operations 7-6 7.3.2.1 Preventing the Capture of Replicat Transactions (Oracle) 7-6 7.3.2.2 Preventing Capture of Replicat Transactions (Other Databases) 7-7 7.3.3 Replicating DDL in a Bi-directional Configuration 7-7 7.4 Managing Conflicts 7-7 7.5 Additional Information 7-8 7.6 Creating an Active-Active Configuration 7-9 7.6.1 Prerequisites on Both Systems 7-9 v 7.6.2 Configuration from Primary System to Secondary System 7-9 7.6.3 Configuration from Secondary System to Primary System 7-12 7.7 Configuring Conflict Detection and Resolution 7-15 7.7.1 Overview of the Oracle GoldenGate CDR Feature 7-15 7.7.2 Configuring the Oracle GoldenGate Parameter Files for Error Handling 7-16 7.7.2.1 Tools for Mapping Extra Data to the Exceptions Table 7-17 7.7.2.2 Sample Exceptions Mapping with Source and Target Columns Only 7-18 7.7.2.3 Sample Exceptions Mapping with Additional Columns in the Exceptions Table 7-18 7.7.3 Configuring the Oracle GoldenGate Parameter Files for Conflict Resolution 7-20 7.7.4 Making the Required Column Values Available to Extract 7-21 7.7.5 Configuring Oracle GoldenGate CDR 7-21 7.7.5.1 Viewing CDR Statistics 7-22 7.7.6 CDR Example 1: All Conflict Types with USEMAX, OVERWRITE, DISCARD 7-23 7.7.6.1 Table Used in this Example 7-23 7.7.6.2 MAP Statement with Conflict Resolution Specifications 7-23 7.7.6.3 Description of MAP Statement 7-24 7.7.6.4 Error Handling 7-24 7.7.6.5 INSERTROWEXISTS with the USEMAX Resolution 7-24 7.7.6.6 UPDATEROWEXISTS with the USEMAX Resolution 7-25 7.7.6.7 UPDATEROWMISSING with OVERWRITE Resolution 7-26 7.7.6.8 DELETEROWMISSING with DISCARD Resolution 7-27 7.7.6.9 DELETEROWEXISTS with OVERWRITE Resolution 7-28 7.7.7 CDR Example 2: UPDATEROWEXISTS with USEDELTA and USEMAX 7-29 7.7.7.1 Table Used in this Example 7-29 7.7.7.2 MAP Statement 7-30 7.7.7.3 Description of MAP Statement 7-30 7.7.7.4 Error Handling 7-30 7.7.8 CDR Example 3: UPDATEROWEXISTS with USEDELTA, USEMAX, and IGNORE 7-32 7.7.8.1 Table Used in this Example 7-32 7.7.8.2 MAP Statement 7-32 7.7.8.3 Description of MAP Statement 7-32 7.7.8.4 Error Handling 7-33 8 Mapping and Manipulating Data 8.1 Guidelines for Using Self-describing Trails 8-1 8.2 Parameters that Control Mapping and Data Integration 8-1 vi 8.3 Mapping between Dissimilar Databases 8-2 8.4 Deciding Where Data Mapping and Conversion Will Take Place 8-2 8.4.1 Mapping and

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    368 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us