Table of Contents
- Title and Copyright Information
- Preface
- 1 Concepts
-
2
Install and Patch
- Overview
- Operating System Requirements
- Installing Oracle GoldenGate
- Software Installation Directories and Programs for Oracle GoldenGate
- Post-installation Tasks
- Installing Patches for Oracle GoldenGate Microservices Architecture
- Uninstalling Oracle GoldenGate Microservices Architecture
-
3
Deploy
- About Deployments
-
Add a Deployment
- Before Adding a Deployment
-
Using OGGCA Wizard for
Deployment
- Start the OGGCA Wizard
- Select Service Manager Options
- Configuration Options
- Deployment Details
- Select Deployment Directories
- Specify Environment Variables
- Administrator Account
- Specify Security Options
- Advanced Security Settings
- Sharding Options
- Port Settings
- Replication Settings
- Summary
- Configure Deployment
- Finish
- Using Silent Deployment
- Add a Deployment in Silent Mode using OGGCA
-
Manage Deployments from the Service Manager
- Add Users to a Deployment
- Delegate User Authentication and Authorization to an External ID Provider
- Manage Certificates for Deployments
- Modify Configuration for the Service Manager
- Modify Configuration for the Deployment
- Manage the Status of Deployment and Microservices
- Manage the Microservices Configuration Details
- Monitor Oracle GoldenGate Processes, Trails, and Paths
- Manage the Debug Log
- Remove a Deployment
- Remove the Service Manager
- Configure Reverse Proxy with NGINX to Access Oracle GoldenGate Microservices
-
4
Configure
- Db2 z/OS
-
MySQL
- Prepare Database Users and Privileges
- Prepare Database Connection, System, and Parameter Settings
- Transaction Log Settings and Requirements
- MySQL: Supported Data Types, Objects, and Operations
-
Oracle
- Prepare Database Users and Privileges
- Prepare Database Connection, System, and Parameter Settings
- Configure Secure Connections to Oracle Database from Oracle GoldenGate
- Configure Logging Properties
-
Oracle: Supported Data Types,
Objects, and Operations for DDL and DML
- Details of Support for Oracle Data Types and Objects
- Details of Support for Oracle Database Editions
- Details of Support for Objects and Operations in Oracle DML
- Details of Support for Objects and Operations in Oracle DDL
- PostgreSQL
-
SQL Server
- Prepare Database Users and Privileges
-
Prepare Database Connection,
System, and Parameter Settings
- Configuring a Database Connection
-
Configuring a Database
- SQL Server Supported Versions
-
Preparing Tables for Processing
- Disabling Triggers and Cascade Constraints on the Target
- Replicat Consideration for Target Identity Columns, Triggers, and Constraints
- Setting the NOT FOR REPLICATION flag for Target Identity Columns, Triggers, and Constraints
- Ensuring Row Uniqueness in Source and Target Table
- Improving IDENTITY Replication with Array Processing
- Transaction Log Settings and Requirements
- Requirements Summary for Capture and Delivery of Databases in an Always On Availability Group
- SQL Server: Supported Data Types, Objects, and Operations
-
5
Quickstarts
- Set Up Data Replication with Oracle GoldenGate Microservices Architecture
- Set Up Bidirectional Replication for Oracle GoldenGate Microservices Architecture
- Switching from Nonintegrated Replicat to Parallel Nonintegrated Replicat
- Connecting Two Deployments Using a Common RootCA Certificate
- Connecting Two Deployments Using External RootCA Certificate
-
6
Extract
- About Extract
- Before Adding an Extract
- Add Extracts
-
Downstream Extract for Downstream Database
Mining
-
Configure Extract for a Downstream
Deployment
- Evaluate Extract Options for a Downstream Deployment
- Prepare the Source Database for the Downstream Deployment
- Prepare the Downstream Mining Database to Receive Online Redo Logs
- Enable Downstream Extract to Work with ADG
-
Use Cases for Downstream Mining
Configuration
- Case 1: Capture from One Source Database in Real-time Mode
- Case 2: Capture from Multiple Sources in Archive-log-only Mode
-
Case 3: Capturing from Multiple Sources
with Mixed Real-time and Archive-log-only Mode
- Prepare the Mining Database to Archive its Local Redo
- Prepare the Mining Database to Accept Redo from the Source Databases
- Prepare the First Source Database to Send Redo to the Mining Database
- Prepare the Second Source Database to Send Redo to the Mining Database
- Prepare the Second Source Database to Send Redo to the Mining Database
- Prepare the Third Source Database to Send Redo to the Mining Database
-
Configure Extract for a Downstream
Deployment
- MySQL: DDL Replication
-
Oracle: DDL Replication
- Prerequisites for Configuring DDL
- Overview of DDL Synchronization
- Limitations of Oracle GoldenGate DDL Support
- Configuration Guidelines for DDL Support
- Understanding DDL Scopes
- Correctly Identifying Unqualified Object Names in DDL
- Enabling DDL Support
- Filtering DDL Replication
- Special Filter Cases
- How Oracle GoldenGate Handles Derived Object Names
- Using DDL String Substitution
- Controlling the Propagation of DDL to Support Different Topologies
- Add Supplemental Log Groups Automatically
- Removing Comments from Replicated DDL
- Replicating an IDENTIFIED BY Password
- How DDL is Evaluated for Processing
- Viewing DDL Report Information
- Tracing DDL Processing
- Using Edition-Based Redefinition
- Manage Trail Files
- Configure Managed Processes
- Positioning Extract to a Specific Start Point
- Using Oracle GoldenGate with MySQL Group Replication
- PostgreSQL: Extract Considerations for Remote Deployment
- 7 Instantiate
- 8 Distribute
-
9
Replicat
- About Replicat
- Types of Replicat
- Select a Replicat Type for your Deployment
- Add a Replicat
- Replicat Actions
- Controlling Checkpoint Retention
- Excluding Replicat Transactions in Bidirectional Replication
- Additional Parameter Options for Integrated Replicat
- DDL Notification on Target Tables
-
10
Secure
-
Oracle GoldenGate Security
Feature: Implementation
- Create Certificates for a Secure Deployments
-
Encrypting Trail Files
- Generate Master Keys and Encryption Key
- Key Management Service (KMS)
- Create and Apply Encryption Profile in a Deployment
- Using Oracle Key Vault Trail File Encryption in Oracle GoldenGate
- Using OCI KMS Trail File Encryption in Oracle GoldenGate
- Managing Identities in a Credential Store
- Configure Kerberos Authentication
-
Oracle GoldenGate Security
Feature: Implementation
-
11
Administer
-
Microservices: Command Line
Interface
- About Admin Client
- Using Wildcards in Command Arguments
- Using Command History
- Storing and Calling Frequently Used Command Sequences
- Controlling Extract and Replicat
- Deleting Extract and Replicat
-
Specifying Object Names in Oracle GoldenGate Input
- Specifying Filesystem Path Names in Parameter Files on Windows Systems
- Supported Database Object Names
- Specifying Names that Contain Slashes
- Qualifying Database Object Names
- Specifying Case-Sensitive Database Object Names
- Using Wildcards in Database Object Names
- Differentiating Case-Sensitive Column Names from Literals
- Working with Parameter Files
- Use SQLEXEC for Executing Commands, Stored Procedures, and Queries
- Simplify and Automate Work with Oracle GoldenGate Macros
-
Bi-Directional Replication
- Prerequisites for Bidirectional Replication
- MySQL: Bi-Directional Replication
- PostgreSQL: Bi-Directional Replication
- Preparing DBFS for an Active-Active Configuration
-
Using Procedural Replication
- About Procedural Replication
- Procedural Replication Process Overview
- Determining Whether Procedural Replication Is On
- Enabling and Disabling Supplemental Logging
- Filtering Features for Procedural Replication
- Handling Procedural Replication Errors
- Listing the Procedures Supported for Oracle GoldenGate Procedural Replication
- Monitoring Oracle GoldenGate Procedural Replication
-
Automatic Conflict Detection and
Resolution
-
About Automatic Conflict Detection and Resolution
- Automatic Conflict Detection and Resolution
- Requirements for Automatic Conflict Detection and Resolution
- Column Groups
- DELETE TOMBSTONE Table
- Earliest Timestamp Conflict Detection and Resolution
- Latest Timestamp Conflict Detection and Resolution
- Delete Always Wins Timestamp CDR
- Delta Conflict Detection and Resolution
- Site Priority CDR
- Track PK Updates in Delete Tombstone
- Configuring Delta Conflict Detection and Resolution
- Managing Automatic Conflict Detection and Resolution
- Monitoring Automatic Conflict Detection and Resolution
-
About Automatic Conflict Detection and Resolution
-
Manual Conflict Detection and
Resolution
- Overview of the Oracle GoldenGate CDR Feature
- Configuring the Oracle GoldenGate Parameter Files for Error Handling
- Configuring the Oracle GoldenGate Parameter Files for Conflict Resolution
- Making the Required Column Values Available to Extract
- Viewing CDR Statistics
-
CDR Example 1: All Conflict Types with USEMAX, OVERWRITE, DISCARD
- Table Used in this Example
- MAP Statement with Conflict Resolution Specifications
- Description of MAP Statement
- INSERTROWEXISTS with the USEMAX Resolution
- UPDATEROWEXISTS with the USEMAX Resolution
- UPDATEROWMISSING with OVERWRITE Resolution
- DELETEROWEXISTS with OVERWRITE Resolution
- DELETEROWMISSING with DISCARD Resolution
- CDR Example 2: UPDATEROWEXISTS with USEDELTA and USEMAX
- CDR Example 3: UPDATEROWEXISTS with USEDELTA, USEMAX, and IGNORE
-
Mapping and Manipulating Data
- Guidelines for Using Self-describing Trails
- Parameters that Control Mapping and Data Integration
- Mapping between Dissimilar Databases
- Globalization Considerations when Mapping Data
- Mapping Columns Using TABLE and MAP
- Configuring Global Column Mapping with COLMATCH
- Understanding Default Column Mapping
- Data Type Conversions
- Selecting and Filtering Rows
- Retrieving Before and After Values
- Selecting Columns
- Selecting and Converting SQL Operations
- Using Transaction History
- Testing and Transforming Data
- Using Tokens
- Handling Processing Errors
-
Microservices: Command Line
Interface
-
12
Performance
-
Monitor
- Commands Used for Monitoring
- Monitor Processes from the Performance Metrics Service
- Monitoring an Extract Recovery
- Monitor Lag
- Db2 z/OS: Interpret Statistics for Update Operations
- Monitoring Processing Volume
- Using the Error Log
- Using the Process Report
- Use the Discard File
- Maintain the Discard and Report Files
- Reconcile the Time Differences
- Tuning
-
Monitor
- 13 Autonomous Database
- 14 Upgrade
-
15
Reference
-
About Oracle GoldenGate Trails
- Trail Recovery Mode
-
Trail Record Format
- Trail File Header Record
- Tokens Area
- Oracle GoldenGate Operation Types
- Oracle GoldenGate Checkpoint Tables
- Supported Character Sets
- Supported Locales
- Commit Sequence Number (CSN)
- Connecting Microservices and Classic Architectures
-
About Oracle GoldenGate Trails