The availability, performance, and accessibility demands of the business IT systems are increasing day-by-day. The amount of data stored by the business has grown manifolds over the years. Companies want their management information systems to be up to date with the live data in order to analyze the latest trends in customer behavior. The data replication technologies that are used to replicate the data between the systems need to be robust, high-performing, resilient, and must have minimal impact on the production systems. Oracle GoldenGate is one of the key products in the data replication industry. Oracle recently declared shifting its focus on enhancing Oracle GoldenGate as its key data replication product. Ever since this announcement was made, there has been a lot of focus on Oracle GoldenGate and companies are using it for various purposes.
There is no dearth of the material explaining the architecture and concepts of Oracle GoldenGate replication. This cookbook is a practical guide, which provides you with the steps to perform various activities in a GoldenGate environment.
The book is designed to cover the GoldenGate tasks of various complexity levels. Whether you are looking to know the process of setting up a simple GoldenGate replication, implement it in a clustered environment or planning to just perform a one-time data migration from one database environment to another, you can follow the detailed steps in the recipes in this book for that.
The purpose of this book is to provide the reader with a ready, step-by-step approach to perform various GoldenGate Administration tasks. With these recipes in hand, you will easily be able to implement and manage Oracle GoldenGate in an efficient way.
Chapter 1, Installation and Initial Setup, introduces Oracle GoldenGate and covers the steps in installing GoldenGate binaries. It also goes through the steps in setting up a simple GoldenGate replication.
Chapter 2, Setting up GoldenGate Replication, explains the GoldenGate setup in a more complex environment and also goes through some of the options which one would use in a production environment.
Chapter 3, DDL Replication and Initial Load, goes through the various options that are available to instantiate a target environment and also goes through the steps that one needs to follow to set up DDL replication through Oracle GoldenGate.
Chapter 4, Mapping and Manipulating Data, describes various options that one can use for performing a variety of transformations in a GoldenGate replication. It also explains how to capture errors and how to perform various mappings between different table columns in the source and target environments.
Chapter 5, Oracle GoldenGate High Availability, covers various recipes to implement GoldenGate in high availability configurations. It also includes some failover scenarios that should be followed in those configurations.
Chapter 6, Monitoring, Tuning, and Troubleshooting GoldenGate, focuses on the management of GoldenGate environments. It contains the recipes to perform a health check, measure throughput, and monitor a GoldenGate environment. It also includes a few options to enhance the performance of GoldenGate replication.
Chapter 7, Advanced Administration Tasks – I, covers some advanced maintenance tasks such as patching and upgrading GoldenGate binaries that a GoldenGate administrator would need to do at some point. It also covers how to propagate table structure changes in GoldenGate environments. We also discuss some utilities that are available in GoldenGate binaries using which you can view the contents of the extracted records and also undo the applied changes.
Chapter 8, Advanced Administration Tasks – Part II, focuses on additional advanced tasks around the setup and migration of replication to GoldenGate. It explains a few options to set up replication from the production environment without impacting the performance or jeopardizing the risk of replicating erroneous transactions to the target environment. We also cover the process of migrating an Oracle Streams replication environment to Oracle GoldenGate. It also explains the process of replicating data from MS SQL Server environments to Oracle databases using GoldenGate.
Chapter 9, GoldenGate Veridata, Director, and Monitor, focuses on the installation and configuration of some additional tools that one can buy to manage the GoldenGate environments.
In order to practice the recipes in this book, you would need various machines/virtual machines which should have at least the following configuration:
1 * 2.0 GHZ Dual Core Intel-based CPU
2 GB Physical Memory
150 GB Hard Disk Drive Space
You would also need the following software to perform the setups in various recipes:
Oracle Enterprise Linux 6.3 – 64 Bit
Oracle Server 220.127.116.11 for Oracle Enterprise Linux 6.0 – 64 Bit
Oracle GoldenGate 18.104.22.168.1 and Oracle GoldenGate 22.214.171.124.3 for Oracle 11g on Linux x86_64 environment
Oracle GoldenGate 126.96.36.199.1 and Oracle GoldenGate 188.8.131.52.3 for Oracle 11g on Windows x86_64 environment
Oracle GoldenGate Monitor Server 184.108.40.206.0
Oracle Jrockit – Latest version
Oracle Weblogic – 10.3.6
Oracle GoldenGate Director Server and Client 220.127.116.11.0
Oracle GoldenGate Management Plugin for OEM 12c
Oracle GoldenGate Veridata Server and Java Agent 18.104.22.168.0
SFTP Transfer Client
Whether you are handling Oracle GoldenGate environments on a day-to-day basis or using it just for migration, this book provides the necessary information for most of the administration tasks.
The book is for Database Administrators, Architects, and Middleware Administrators who are keen to learn about various setups in Oracle GoldenGate. It also targets the Solution Architects who want to explore various high availability options in Oracle GoldenGate for Oracle RAC environments. The reader is expected to have some knowledge of Oracle databases.
In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.
Code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles are shown as follows: "We can include other contexts through the use of the
A block of code is set as follows:
EDIT PARAMS PGGTEST11 EXTRACT PGGTEST11 USERID GGATE_ADMIN@RACDB, PASSWORD GGATE_ADMIN RMTHOST tg-oggvip1.localdomain , MGRPORT 7809 RMTTRAIL /u01/app/ggate1/dirdat/rt TABLE scott.*;
When we wish to draw your attention to a particular part of a code block, the relevant lines or items are set in bold:
EDIT PARAMS PGGTEST11
USERID GGATE_ADMIN@RACDB, PASSWORD GGATE_ADMIN
RMTHOST tg-oggvip1.localdomain , MGRPORT 7809
Any command-line input or output is written as follows:
# cp /usr/src/asterisk-addons/configs/cdr_mysql.conf.sample /etc/asterisk/cdr_mysql.conf
New terms and important words are shown in bold. Words that you see on the screen, in menus or dialog boxes for example, appear in the text like this: "clicking the Next button moves you to the next screen".
Feedback from our readers is always welcome. Let us know what you think about this book—what you liked or may have disliked. Reader feedback is important for us to develop titles that you really get the most out of.
To send us general feedback, simply send an e-mail to
<[email protected]>, and mention the book title via the subject of your message.
If there is a topic that you have expertise in and you are interested in either writing or contributing to a book, see our author guide on www.packtpub.com/authors.
Now that you are the proud owner of a Packt book, we have a number of things to help you to get the most from your purchase.
You can download the example code files for all Packt books you have purchased from your account at http://www.packtpub.com. If you purchased this book elsewhere, you can visit http://www.packtpub.com/support and register to have the files e-mailed directly to you.
Although we have taken every care to ensure the accuracy of our content, mistakes do happen. If you find a mistake in one of our books—maybe a mistake in the text or the code—we would be grateful if you would report this to us. By doing so, you can save other readers from frustration and help us improve subsequent versions of this book. If you find any errata, please report them by visiting http://www.packtpub.com/submit-errata, selecting your book, clicking on the errata submission form link, and entering the details of your errata. Once your errata are verified, your submission will be accepted and the errata will be uploaded on our website, or added to any list of existing errata, under the Errata section of that title. Any existing errata can be viewed by selecting your title from http://www.packtpub.com/support.
Piracy of copyright material on the Internet is an ongoing problem across all media. At Packt, we take the protection of our copyright and licenses very seriously. If you come across any illegal copies of our works, in any form, on the Internet, please provide us with the location address or website name immediately so that we can pursue a remedy.
Please contact us at
<[email protected]> with a link to the suspected pirated material.
We appreciate your help in protecting our authors, and our ability to bring you valuable content.
You can contact us at
<[email protected]> if you are having a problem with any aspect of the book, and we will do our best to address it.