Book Image

Oracle GoldenGate 11g Implementer's guide

By : John P Jeffries, John P Jeffries
Book Image

Oracle GoldenGate 11g Implementer's guide

By: John P Jeffries, John P Jeffries

Overview of this book

Data replication is an important part of any database system that is growing due to today's demand for real-time reporting and regulatory requirements. GoldenGate has recently become Oracle's strategic real-time data replication solution. Until now, very little has been written about how to implement GoldenGate in a production enterprise environment where performance, scalability, and data integrity are paramount. Your days of dismay over the lack of documentation over Oracle GoldenGate are over. Welcome to Oracle GoldenGate 11g Implementer's guide – a comprehensive practical book, which will deliver answers to your questions in a clear, concise style, allowing you to progress effectively in a timeline-driven environment. Based on the author's own experience, this long awaited GoldenGate administration book has all that is required to install, design, configure, and tune data replication solutions suited to every environment. Be the first to master GoldenGate's power and flexibility by reading this unique hands-on implementation companion. Systems need to send data from one system to another in a timely manner to satisfy the ever-increasing need for speed. Regardless of whether you are a novice or an expert – or someone in between – this book will guide you through all the steps necessary to build a high-performance GoldenGate solution on Oracle11gR1. Expert users can dive into key topic areas such as performance tuning or troubleshooting, while novice users can step through the early installation and configuration chapters, later progressing to the advanced chapters. This book is more than an implementation guide. It offers detailed real-life examples, encouraging additional thought and discussion by going beyond the manual. With Oracle GoldenGate 11g Implementer's guide in hand, you'll be designing, installing, and configuring high-performance solutions using GoldenGate in less time than you can say "replicate"
Table of Contents (21 chapters)
Oracle GoldenGate 11 Implementer's guide
Credits
Foreword
About the Author
About the Reviewers
www.PacktPub.com
Preface
GGSCI Commands
GoldenGate Installed Components
The Future of Oracle GoldenGate
Index

Security features


GoldenGate offers the following security features to protect both data and passwords:

  • Data encryption

  • Password encryption

In this section, you will learn what these encryption methods are and how to configure them.

Data encryption

GoldenGate offers two data encryption options: Message encryption and Trail file encryption.

Message encryption uses Blowfish, a symmetric 64-bit block cipher that encrypts the individual messages sent over TCP/IP. The data is automatically decrypted by the Server Collector process running on the target machine. The Server Collector process is normally started automatically with default parameters on the remote system, so on this occasion, we need to start this manually. Once configured, the Server Collector process will start automatically in encrypted mode when you start the Extract and Replicat. It dynamically chooses a port in the available range specified by the Manager process parameters.

Trail file encryption uses 256 key byte substitution. The...