32 Preparing the System for Oracle GoldenGate
Topics:
- Preparing Tables for Processing
- ODBC Configuration for Teradata
- Database User for Oracle GoldenGate Processes for Teradata
Parent topic: Using Oracle GoldenGate for Teradata
Preparing Tables for Processing
The following table attributes must be addressed in an Oracle GoldenGate environment.
Parent topic: Preparing the System for Oracle GoldenGate
Disabling Triggers and Cascade Constraints
Disable triggers, cascade delete constraints, and cascade update constraints on target Teradata tables. Oracle GoldenGate replicates DML that results from a trigger or cascade constraint. If the same trigger or constraint gets activated on the target table, it becomes redundant because of the replicated version, and the database returns an error. Consider the following example, where the source tables are emp_src
and salary_src
and the target tables are emp_targ
and salary_targ
.
- A delete is issued for
emp_src
. - It cascades a delete to
salary_src
. - Oracle GoldenGate sends both deletes to the target.
- The parent delete arrives first and is applied to
emp_targ
. - The parent delete cascades a delete to
salary_targ
. - The cascaded delete from
salary_src
is applied tosalary_targ
. - The row cannot be located because it was already deleted in step 5.
Parent topic: Preparing Tables for Processing
Ensuring Row Uniqueness for Tables
Oracle GoldenGate requires some form of unique row identifier on the source and target tables to locate the correct target rows for replicated updates and deletes.
KEYCOLS
clause is used in the
TABLE
or MAP
statement, Oracle GoldenGate selects a row identifier to use in
the following order of priority:
-
Primary key
-
First unique key alphanumerically that does not contain a timestamp or non-materialized computed column.
-
If none of the preceding key types exist (even though there might be other types of keys defined on the table) Oracle GoldenGate constructs a pseudo key of all columns that the database allows to be used in a unique key, excluding those that are not supported by Oracle GoldenGate in a key or those that are excluded from the Oracle GoldenGate configuration.
Note:
If there are other, non-usable keys on a table or if there are no keys at all on the table, Oracle GoldenGate logs an appropriate message to the report file. Constructing a key from all of the columns impedes the performance of Oracle GoldenGate on the source system. On the target, this key causes Replicat to use a larger, less efficientWHERE
clause. -
If a table does not have an appropriate key, or if you prefer that the existing key(s) are not used, you can define a substitute key, if the table has columns that always contain unique values. You define this substitute key by including a KEYCOLS clause within the Extract
TABLE
parameter and the ReplicatMAP
parameter. The specified key will override any existing primary or unique key that Oracle GoldenGate finds. See TABLE | MAP in Reference for Oracle GoldenGate.
Using KEYCOLS to Specify a Custom Key
If a table does not have an applicable row identifier, or if you prefer that
identifiers are not used, you can define a substitute key, providing that the table has
columns that always contain unique values. You define this substitute key by including a
KEYCOLS
clause within the Extract TABLE
parameter
and the Replicat MAP
parameter. The specified key overrides any
existing primary or unique key that Oracle GoldenGate finds.
Parent topic: Ensuring Row Uniqueness for Tables
ODBC Configuration for Teradata
Configure ODBC on each target system including the creation of a data source name (DSN). A DSN stores information about how to connect to the database. See the ODBC Driver for Teradata User Guide for complete information and setup steps:
Parent topic: Preparing the System for Oracle GoldenGate
Database User for Oracle GoldenGate Processes for Teradata
Follow these requirements for the database user for Oracle GoldenGate processes:
-
Create a database user that is dedicated to Oracle GoldenGate. It can be the same user for all of the Oracle GoldenGate processes that must connect to a database:
-
Replicat (target database)
-
The
DEFGEN
utility (target database)
-
-
To preserve the security of your data, and to monitor Oracle GoldenGate processing accurately, do not permit other users, applications, or processes to log on as, or operate as, the Oracle GoldenGate database user.
-
For Oracle GoldenGate to replicate to a target Teradata database, grant
SELECT
,INSERT
,UPDATE
, andDELETE
on all of the target tables to the Replicat database user.
Parent topic: Preparing the System for Oracle GoldenGate