Book Image

Oracle Goldengate 11g Complete Cookbook

By : Ankur Gupta
Book Image

Oracle Goldengate 11g Complete Cookbook

By: Ankur Gupta

Overview of this book

Oracle Goldengate 11g Complete Cookbook is your complete guide to all aspects of Goldengate administration. The recipes in this book will teach you how to setup Goldengate configurations for simple and complex environments requiring various filtering and transformations. It also covers various aspects of tuning and troubleshooting the replication setups using exception handling, custom fields, and logdump utility.The book begins by explaining some basic tasks like Installation and Process groups setup. You will then be introduced to some further topics including DDL replication and various options to perform Initial Loads. You will then learn some advanced administration tasks such as Multi Master replication setup and conflict resolution. Further recipes, contain the cross platform replication and high availability options for Goldengate.
Table of Contents (16 chapters)
Oracle GoldenGate 11g Complete Cookbook
About the Author
About the Reviewers


The availability, performance, and accessibility demands of the business IT systems are increasing day-by-day. The amount of data stored by the business has grown manifolds over the years. Companies want their management information systems to be up to date with the live data in order to analyze the latest trends in customer behavior. The data replication technologies that are used to replicate the data between the systems need to be robust, high-performing, resilient, and must have minimal impact on the production systems. Oracle GoldenGate is one of the key products in the data replication industry. Oracle recently declared shifting its focus on enhancing Oracle GoldenGate as its key data replication product. Ever since this announcement was made, there has been a lot of focus on Oracle GoldenGate and companies are using it for various purposes.

There is no dearth of the material explaining the architecture and concepts of Oracle GoldenGate replication. This cookbook is a practical guide, which provides you with the steps to perform various activities in a GoldenGate environment.

The book is designed to cover the GoldenGate tasks of various complexity levels. Whether you are looking to know the process of setting up a simple GoldenGate replication, implement it in a clustered environment or planning to just perform a one-time data migration from one database environment to another, you can follow the detailed steps in the recipes in this book for that.

The purpose of this book is to provide the reader with a ready, step-by-step approach to perform various GoldenGate Administration tasks. With these recipes in hand, you will easily be able to implement and manage Oracle GoldenGate in an efficient way.

What this book covers

Chapter 1, Installation and Initial Setup, introduces Oracle GoldenGate and covers the steps in installing GoldenGate binaries. It also goes through the steps in setting up a simple GoldenGate replication.

Chapter 2, Setting up GoldenGate Replication, explains the GoldenGate setup in a more complex environment and also goes through some of the options which one would use in a production environment.

Chapter 3, DDL Replication and Initial Load, goes through the various options that are available to instantiate a target environment and also goes through the steps that one needs to follow to set up DDL replication through Oracle GoldenGate.

Chapter 4, Mapping and Manipulating Data, describes various options that one can use for performing a variety of transformations in a GoldenGate replication. It also explains how to capture errors and how to perform various mappings between different table columns in the source and target environments.

Chapter 5, Oracle GoldenGate High Availability, covers various recipes to implement GoldenGate in high availability configurations. It also includes some failover scenarios that should be followed in those configurations.

Chapter 6, Monitoring, Tuning, and Troubleshooting GoldenGate, focuses on the management of GoldenGate environments. It contains the recipes to perform a health check, measure throughput, and monitor a GoldenGate environment. It also includes a few options to enhance the performance of GoldenGate replication.

Chapter 7, Advanced Administration Tasks – I, covers some advanced maintenance tasks such as patching and upgrading GoldenGate binaries that a GoldenGate administrator would need to do at some point. It also covers how to propagate table structure changes in GoldenGate environments. We also discuss some utilities that are available in GoldenGate binaries using which you can view the contents of the extracted records and also undo the applied changes.

Chapter 8, Advanced Administration Tasks – Part II, focuses on additional advanced tasks around the setup and migration of replication to GoldenGate. It explains a few options to set up replication from the production environment without impacting the performance or jeopardizing the risk of replicating erroneous transactions to the target environment. We also cover the process of migrating an Oracle Streams replication environment to Oracle GoldenGate. It also explains the process of replicating data from MS SQL Server environments to Oracle databases using GoldenGate.

Chapter 9, GoldenGate Veridata, Director, and Monitor, focuses on the installation and configuration of some additional tools that one can buy to manage the GoldenGate environments.

What you need for this book

In order to practice the recipes in this book, you would need various machines/virtual machines which should have at least the following configuration:

  • 1 * 2.0 GHZ Dual Core Intel-based CPU

  • 2 GB Physical Memory

  • 150 GB Hard Disk Drive Space

  • Ethernet Adapter

You would also need the following software to perform the setups in various recipes:

  • Oracle Enterprise Linux 6.3 – 64 Bit

  • Oracle Server for Oracle Enterprise Linux 6.0 – 64 Bit

  • Oracle GoldenGate and Oracle GoldenGate for Oracle 11g on Linux x86_64 environment

  • Oracle GoldenGate and Oracle GoldenGate for Oracle 11g on Windows x86_64 environment

  • Oracle GoldenGate Monitor Server

  • Oracle Jrockit – Latest version

  • Oracle Weblogic – 10.3.6

  • Oracle GoldenGate Director Server and Client

  • Oracle GoldenGate Management Plugin for OEM 12c

  • Oracle GoldenGate Veridata Server and Java Agent

  • SFTP Transfer Client

  • Putty

Who this book is for

Whether you are handling Oracle GoldenGate environments on a day-to-day basis or using it just for migration, this book provides the necessary information for most of the administration tasks.

The book is for Database Administrators, Architects, and Middleware Administrators who are keen to learn about various setups in Oracle GoldenGate. It also targets the Solution Architects who want to explore various high availability options in Oracle GoldenGate for Oracle RAC environments. The reader is expected to have some knowledge of Oracle databases.


In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.

Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "We can include other contexts through the use of the include directive."

A block of code is set as follows:

RMTHOST tg-oggvip1.localdomain , MGRPORT 7809
RMTTRAIL /u01/app/ggate1/dirdat/rt
TABLE scott.*;

When we wish to draw your attention to a particular part of a code block, the relevant lines or items are set in bold:

RMTHOST tg-oggvip1.localdomain , MGRPORT 7809
RMTTRAIL /u01/app/ggate1/dirdat/rt
TABLE scott.*;

Any command-line input or output is written as follows:

# cp /usr/src/asterisk-addons/configs/cdr_mysql.conf.sample

New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "clicking the Next button moves you to the next screen".


Warnings or important notes appear in a box like this.


Tips and tricks appear like this.

Reader feedback

Feedback from our readers is always welcome. Let us know what you think about this book—what you liked or may have disliked. Reader feedback is important for us to develop titles that you really get the most out of.

To send us general feedback, simply send an e-mail to , and mention the book title via the subject of your message.

If there is a topic that you have expertise in and you are interested in either writing or contributing to a book, see our author guide on

Customer support

Now that you are the proud owner of a Packt book, we have a number of things to help you to get the most from your purchase.

Downloading the example code

You can download the example code files for all Packt books you have purchased from your account at If you purchased this book elsewhere, you can visit and register to have the files e-mailed directly to you.


Although we have taken every care to ensure the accuracy of our content, mistakes do happen. If you find a mistake in one of our books—maybe a mistake in the text or the code—we would be grateful if you would report this to us. By doing so, you can save other readers from frustration and help us improve subsequent versions of this book. If you find any errata, please report them by visiting, selecting your book, clicking on the errata submission form link, and entering the details of your errata. Once your errata are verified, your submission will be accepted and the errata will be uploaded on our website, or added to any list of existing errata, under the Errata section of that title. Any existing errata can be viewed by selecting your title from


Piracy of copyright material on the Internet is an ongoing problem across all media. At Packt, we take the protection of our copyright and licenses very seriously. If you come across any illegal copies of our works, in any form, on the Internet, please provide us with the location address or website name immediately so that we can pursue a remedy.

Please contact us at with a link to the suspected pirated material.

We appreciate your help in protecting our authors, and our ability to bring you valuable content.


You can contact us at if you are having a problem with any aspect of the book, and we will do our best to address it.