Beruflich Dokumente
Kultur Dokumente
Who am I
Jos van den Oord
Working with Oracle products since 1998 Working at Transfer-Solutions since 2010
Interests
Databases
Right Availability Security, Performance
Agenda
Introduction Oracle GoldenGate (OGG)
GoldenGate Topologies GoldenGate Intergration solutions GoldenGate Products
Broadcast
Deliver, Active Data Guard and XStream Oracle GoldenGate for Mainframe Includes GoldenGate Capture and Deliver for HP NonStop and IBM DB2 on z/OS Add-on capability to validate data in Oracle GoldenGate Veridata replicated systems
Pre-packaged application content, such as for Flat File and Java adapters
Capture
Trail Files
LAN/WAN TCP/IP
Trail Files
Deliver
Database
Bi-directional
COPYRIGHT TRANSFER SOLUTIONS B.V.
Redolog
Capture
Trail Files Database
Data Pump
LAN/WAN TCP/IP
Ongoing Data Synchronization Initial Load
Delivery
Database
10
11
Position
---------------
---------------
Begin TX1 Insert TX1 Begin TX2 Update TX1 Insert TX2 Commit TX2 Begin TX3 Insert TX3 Begin TX4 Commit TX3 Delete TX4
Checkpoint
PUMP Checkpoint
Delivery Checkpoint
Begin TX2 Insert TX2 Commit TX2 Begin TX3 Insert TX3 Current Commit TX3 Read
Database Database
12
DELIVERY
Native database API ODBC Batch Operations Filtering Transaction/Operations Grouping Parrallel Coodination Local/Remote
PUMP
Filtering Local/Remote TCP/IP Compression Encryption
MANAGER
Queue (Trail) Management Process Management (Dynamic) Monitoring and Administration (Lag report) Reporting (Events, Error, Tresholds) Receive/Route request from UI
On disk Components
Trail Files Checkpoint files (Capture, Pump, Delivery) Configuration Files Discard files Report/Log files Binaries
COPYRIGHT TRANSFER SOLUTIONS B.V. 13
Demo GoldenGate
Manager process Extract process DataPump Process Replicat Process Bi-Directional Replication DDL Bi-Directional Replication Extract /Replicat Filtering Logdump SQL statements van replicat
14
Understanding of the business objectives Approved by your stakeholders? Understanding of the requirements? Appropriate replication topology
16
Creating Dedicated Users Encrypting Passwords Creating a Dedicated Installation Directory Using a Checkpoint Table Verifying the Character Sets Developing Naming Standards Using a Data Pump
17
Using GGSCI Command Shortcuts Using OBEY Files Generating Interim Statistics Using a Discard File Reporting Regularly on Process Health Purging Old Trail Files Regularly Automatically Starting Processes
18
Performance
Running Performance Tests Limiting the Number of Extracts Using Passthru Mode for Data Pumps Using Parallel Replicats Using the Fastest Available Storage Tuning the Database
19
Questions Answers
WWW.TRANSFER-SOLUTIONS.COM
COPYRIGHT TRANSFER SOLUTIONS B.V. 20