5 Working with Paths
The path between a source and target deployment can be set using the Distribution Server. You can also create target-initiated distribution paths from the Receiver Server.
This section discusses the steps to create a path once the Extracts and Replicats are configured in the Administration Server.
Topics:
- Quick Tour of the Distribution Server Home Page
The Distribution Server is accessible from the Service Manager home page. - How to Add a Distribution Path
A path is created to send the transaction of data from the Extract to the Replicat. You can create a new path from the Distribution Service. - How to Add a Target-Initiated Distribution Path
A target-initiated distribution path is created from the Receiver Server. - Using the Path Actions
Once a new path is added, you can perform actions such as stop or pause a path, view reports and statistics, reposition the path, change its filtering, and delete a path, if required. - Repositioning a Path
You can reposition a path whenever it’s necessary. - Changing Path Filtering
If you want to change the filter settings for an existing path, the steps are mostly the same as those for creating the filtering for a new path. - Reviewing the Distribution Server Path Information
5.1 Quick Tour of the Distribution Server Home Page
The Distribution Server is accessible from the Service Manager home page.
From the Service Manager home page, click the Distribution Server. The Distribution Server Overview page is displayed where you can view the path that connects the extract and replicat.
You can add paths from the Distribution Server home page. It also offers a dashboard view of the paths, where you can perform various actions.
Action | Task |
---|---|
Add paths |
See Adding New Paths |
View path details |
|
Start or Stop the path |
|
Reposition the path |
|
Enable sharding using filters |
See Using the Path Actions and also Adding New Paths |
Set or customize the DML filtering |
See Using the Path Actions and also Adding New Paths |
Set the DDL filtering |
See Using the Path Actions and also Adding New Paths |
Set or customize Procedure filtering |
See Using the Path Actions and also Adding New Paths |
Customize Tag filtering |
See Adding New Paths |
Delete a Path |
Parent topic: Working with Paths
5.2 How to Add a Distribution Path
A path is created to send the transaction of data from the Extract to the Replicat. You can create a new path from the Distribution Service.
Parent topic: Working with Paths
5.3 How to Add a Target-Initiated Distribution Path
A target-initiated distribution path is created from the Receiver Server.
To know more about target-initiated distribution paths, see Using Target-Initiated Distribution Paths in MA.
To create a target-initiated distribution path, perform the following steps:
-
Log in to the Receiver Server.
-
Click the + sign on the home page to start adding a path.
-
The following table lists the options to set up the path:
Options | Description |
---|---|
Path Name |
Select a name for the path. |
Description |
Provide a description. For example, the name of the Extract and Replicat names. |
Reverse proxy enabled? |
Select to use reverse proxy. To know more about configuring you reverser proxy servers, see Reverse Proxy Support in Securing the Oracle GoldenGate Environment |
Use Basic Authentication |
Select to add a credential to the target URI creating basic MA authentication. |
Use Digest Authorization |
Select this option to set
the Distribution Service to use digest authorization to
communicate with the Receiver Service.
Note: Both the Distribution Service and Receiver Service must have Digest Authorization for the path, otherwise the path is killed. |
Source: Trail Name |
Select the Extract name from the drop-down list, which populates the trail name automatically. If it doesn’t, enter the trail name that you provided while adding the Extract. |
Generated Source URI: |
A URI is automatically generated for the trail based on the Extract information you provided. You can edit this URI by clicking the pencil, then modifying the source. Typically, you will need to edit the URI if you want to use reverse proxy. |
Target Authentication Method |
Select the authentication method for the target URI. Authentication options are OAuth, Certificate, UserID Alias. Use the OAuth if the source and target deployments are IDCS-enabled. This option uses the client credentials for authentication from the Distribution Service to the Receiver Service. |
Target |
Enter the target endpoint of the path. From the drop-down list, select your data transfer protocol. The default option is wss (secure web socket). Specify the following details when you select this option:
You can also choose ogg or ws (web socket) protocol. For the ogg protocol, you need to specify only the target host, port number, and trail file name. For the ws protocol, the options are the same as the wss protocol. |
Generated Target URI |
A target URI is automatically generated for the trail based on the target authentication method and target you provided. You can edit this URI by clicking the pencil, then modifying the target. |
Target Encryption Algorithm |
Select the encryption algorithm for the target trail. Options include NONE, AES128, AES192, AES256. |
Target Encryption Keyname |
Specify a logical name for the encryption key based on the specified type of target encryption algorithm. |
Enable Network Compression |
Set the compression threshold value if you enable this option. |
Compression Threshold |
Option appears when you enable the network compression. Specify the compresion threshold value. |
Sequence Length |
The length of the trail sequence number. |
Trail Size (MB) |
The maximum size of a file in a trail. |
Encryption Profile |
Name of the encryption profile associated with the path. |
Configure Trail Format |
Toggle this switch to enable and configure the trail file format. |
Type |
Select one of these types of trail file formats:
|
Compatible With |
Select the utility that is compatible with the trail
file. Options are:
|
Timestamp Precision |
Specify the timestamp precision value for the trail file. |
Extra Columns |
Includes placeholders for additional columns at the end of each record. Use this option when a target table has more columns than the source table. Specify a value between 1 and 9. |
Include SYSKEY |
Select this option incase your Replicat
configuration includes tables with
|
Quote Style |
Select the quote style depending on the database requirements. |
Include Column Name? |
Enable this option to include column names in the trail file. |
Null Is Space? |
Select this option to indicate that any null values in the trail file is a space. |
Include Place Holder? |
Outputs a placeholder for missing columns. |
Include Header Fields? |
Select to include header fields in the trail file. |
Delimiter |
An alternative delimiter character. |
Use Qualified Name? |
Select to use the fully qualified name of the parameter file. |
Include Transaction Info? |
Enable to to include transaction information. |
Encryption Profile |
Section |
Begin |
Select the point from where you need to log data. You can select the following options from the drop-down list:
|
Source Sequence Number |
Select the sequence number of the trail from source deployment Extract. |
Source RBA Offset |
This setting provides the Relative Byte Address (RBA) offset value which is the point in the trail file (in bytes) from where you want the process to start. |
Critical |
The default value is false. If set to true, this indicates that the distribution path is critical to the deployment. |
Auto Restart |
The default value is false. If set to true, the distribution path restarts automatically if it's terminated. |
Auto Restart Options |
Section |
Retries |
The number of times to try an restart the task (path process). |
Delay |
The duration interval to wait between retries. |
Rule Configuration | Description |
---|---|
Enable filtering |
If you enable filtering by selecting it from the toggle button and click the
You can also see the JSON script for the rule by clicking the JSON tab. |
Additional Options | Description |
---|---|
Eof Delay (cent sec) |
You can specify the Eof Delay in centiseconds. On Linux platforms, the default settings can be retained. However, on non-Linux platforms, you may need to adjust this setting for high bandwidth, high latency networks, or for networks that have Quality of Service (QoS) settings (DSCP and Time of Service (ToS) ). |
Checkpoint Frequency |
Frequency of the path that is taking the checkpoint (in seconds). |
TCP Flush Bytes |
Enter the TCP flush size in bytes. |
TCP Flush Seconds |
Enter the TCP flush interval in seconds. |
TCP Options |
Section |
DSCP |
Select the Differentiated Services Code Point (DSCP) value from the drop-down list, or search for it from the list. |
TOS |
Select the Type of service (TOS) value from the drop-down list. |
TCP_NODELAY |
Enable this option to prevent delay when using the Nagle’s option. |
Quick ACK |
Enable this option to send quick acknowledgment after receiving data. |
TCP_CORK |
Enable this option to allow using the Nagle’s algorithm cork option. |
System Send Buffer Size |
You can set the value for the send buffer size for flow control. |
System Receive Buffer Size |
You can set the value for the receive buffer size for flow control. |
Keep Alive |
Timeout for keep-alive. |
Note:
The the protocol options in Use Basic Authentication are wss and ws only for target-initiated distribution paths, unlike regular distribution paths, which provideogg
and
udt
options.
For target-initiated distribution paths, the use case for the ws and wss protocols is explained in the following table:
X | Target Deployment (Non-Secure) | Target Deployment (Secure) |
---|---|---|
Source Deployment (Non-secure) |
|
|
Source Deployment (Secure) |
|
|
The wss
protocol must be specified whenever the source
deployment (Distribution Server host) has been configured with security enabled. The
secured communication channel can be created using an SSL certificate in a client
Wallet, even if the target deployment (Receiver Server host) has disabled
security.
Limitations
-
There is no support for interaction between legacy and secure deployments using this mode of operation.
-
No support for
ogg
norudt
protocols. Onlyws
andwss
protocols are supported. -
It is possible to only get information and stop a target-initiated distribution path on Distribution Server and after the path stops, it is not be visible on the Distribution Server.
You can also set up target-initiated distribution paths using the Admin
Client. For command options, see the Admin Client commands ADD
RECVPATH
, ALTER RECVPATH
, INFO RECVPATH
,
DELETE RECVPATH
, START RECVPATH
in Admin Client Command Line Interface Commands.
Parent topic: Working with Paths
5.4 Using the Path Actions
Once a new path is added, you can perform actions such as stop or pause a path, view reports and statistics, reposition the path, change its filtering, and delete a path, if required.
On the Overview page of the Distribution Server, click the Action button adjacent to the path. From the drop-down list, use the following path actions:
-
Details: Use this option to view details of the path. You can view the path information including the source and target. You can also edit the description of the path. Statistical data is also displayed including LCR Read from Trails, LCR Sent, LCR Filtered, DDL, Procedure, DML inserts, updates, and deletes, and so on. You can also update the App Options and TCP Options.
-
Stop: Use this option to stop a path. If the path isn’t started, the Start option is displayed rather than the Stop option. You can stop a target-initiated distribution path only from the Distribution Server. Once you stop the path, it'll not be avaiable on the Distrbution Server.
-
Stop (in the background): This option stops the path in the background, without engaging the interface. For this option also, the Start (in background) option is displayed incase the path isn’t started.
-
Delete: Use this option to delete a path. Click Yes on the confirmation screen to complete path deletion.
-
Reposition: Use this option to change the Source Sequence Number and Source RBA Offset
-
Change Filtering: Use this option to enter sharding, DML filtering, DDL filtering, Procedure filtering, and Tag filtering options.
Depending on the action you select, you can see the change in status at the bottom of the Overview page.
Parent topic: Working with Paths
5.5 Repositioning a Path
You can reposition a path whenever it’s necessary.
On the Overview page of the Distribution Server, click Action
adjacent to the path of interest. From the drop-down list, click Reposition
.
Change one or both of the source database options to reposition the path, then apply the changes.
Parent topic: Working with Paths
5.6 Changing Path Filtering
If you want to change the filter settings for an existing path, the steps are mostly the same as those for creating the filtering for a new path.
On the Overview page of the Distribution Server, click Action
adjacent to the path of interest. From the drop-down list, click Change Filtering
.
Rule Configuration | Description |
---|---|
Enable filtering |
If you enable filtering by selecting it from the toggle button and click the
You can also see the JSON script for the rule by clicking the JSON tab. |
After you add a rule, it is listed in Inclusion Rules. You can delete rules or edit them. When you edit a rule, you have the same options as adding a rule with the following added filters:
Option | Description |
---|---|
OR AND |
Select one logical operator. |
Chunk ID |
Edit or delete the database shard settings if sharding is used. |
Object Type: |
Edit or delete the type of object for the rule. |
Parent topic: Working with Paths
5.7 Reviewing the Distribution Server Path Information
You can constantly monitor the activity of the path on the Distribution Server Process Information page.
-
The path details that you configured. You can change the Description and change the trail format type. When changing the trail format, be sure to apply your changes.
-
The advanced options are the delay, flush, and TCP that you configured. You can change any or all of these options, then apply to the path.
The Statistics tab shows you detailed information about the path, such as the different path types and tables. You can use the arrows to sort the tables and the search to quickly locate a specific table. The search is case insensitive and starts searching as you type to update the table.
Parent topic: Working with Paths