Book Image

Oracle Goldengate 11g Complete Cookbook

By : Ankur Gupta
Book Image

Oracle Goldengate 11g Complete Cookbook

By: Ankur Gupta

Overview of this book

Oracle Goldengate 11g Complete Cookbook is your complete guide to all aspects of Goldengate administration. The recipes in this book will teach you how to setup Goldengate configurations for simple and complex environments requiring various filtering and transformations. It also covers various aspects of tuning and troubleshooting the replication setups using exception handling, custom fields, and logdump utility.The book begins by explaining some basic tasks like Installation and Process groups setup. You will then be introduced to some further topics including DDL replication and various options to perform Initial Loads. You will then learn some advanced administration tasks such as Multi Master replication setup and conflict resolution. Further recipes, contain the cross platform replication and high availability options for Goldengate.
Table of Contents (16 chapters)
Oracle GoldenGate 11g Complete Cookbook
Credits
About the Author
About the Reviewers
www.PacktPub.com
Preface
Index

Performing a healthcheck of a live GoldenGate configuration


Like any technology, once implemented, GoldenGate forms a key part of enterprise infrastructure. It is responsible for synchronizing the state of some data between two or more systems. For a GoldenGate administrator, it is quite important to know the status of replication configuration. This can have an impact on the state of data in the destination system to some extent. In case the administrator finds any issue with the replication, he can then follow corrective measures to fix it and bring the systems back into synchronization. In this recipe, we will look into various steps that you can follow to ensure that a GoldenGate configuration is running fine. This recipe does not cover the steps required to check the performance of a GoldenGate configuration.

How to do it...

The state of a GoldenGate replication can be checked by performing the following steps on both source and target systems:

  1. Check the GoldenGate event logger file ggserr...