Add Target-Initiated Distribution Paths
Target-initiated paths for Microservices enable the Receiver Service on the target to initiate a path connecting to the Distribution Service on the source deployment and pull trail files from the source.
To create a target-initiated distribution path:
-
Log in to the Receiver Service.
-
Click the plus (+) sign on the Receiver Service home page to start adding a receiver path.
-
The following table lists the options to set up the path:
Table 8-1 Add a Target-Initiated Distribution Path
Screen and Options Description Path Information Screen
Provide a name and description for the target-initiated path on this screen
Path Name
Name of the target-initiated distribution path
Description
Provide a description of the path.
Source Options Screen
Specify the options for the source deployment which will be connected by the target-initiated path.
Reverse Proxy Enabled
Select to use reverse proxy. To know more about configuring your reverse proxy servers, see Reverse Proxy Support.
Source Authentication Method
Select the authentication method for the source URI. Authentication options are OAuth 2.0, Certificate, UserID Alias.
Source Protocol
From the drop-down list, select your data transfer protocol. The default option is Secure Web Socket Proctocl (wss). Other option is ws.
Source Host:
-
Domain: Enter the domain for the host.
-
Alias: Provide an alias for this host.
Specify the URL of the source host. For example, localhost, if the source is on the same system. Port Number
Enter the port number of the Distribution Service.
Trail Name
Enter the trail name you want to read on your source.
NOTE: The Distribution Service doesn't not create any trail on source. It can only read the provided trail name.
Trail Subdirectory
Specify the trail subdirectory (if any).
Trail Size
Maximum size of the trail file that can be received from the source.
Generated Source URI
A URI is automatically generated for the trail based on the source information you provided.
Encryption Profile
Select the name of the encryption profile for receiving trail data. Also see Encrypting Trail Files.
Source Authentication Method
The source authentication method is preselected based on the selection made on the source deployment.
Domain
This option is preset to Network.
Alias
Provide an alias for the source host.
Begin
This option allows configuring the position from where the log data is received. The options are:-
Now: The current position to begin received trail data.
-
Custom Time: Receive trail data between the specified time period.
-
Position in Log (default): Receive trail data based on the position in log.
-
CSN (at or after): Specify a CSN value at which or after which the trail data would be received.
Source Log: Sequence Number
Specify a sequence number value for the source log.
Source Log: RBA Offset
Specify RBA offset value for the source log.
Target Options
Specify the Trail file and directory for the target deployment.
Trail Name
Name of the target trail of the Replicat you created earlier.
Subdirectory
Name of the trail subdirectory.
Target Encryption Algorithm
Select the encryption algorithm for the target trail. Options include AES128, AES192, AES256.
Generated Target URI
A Target URI is automatically generated for the trail based on target trail information you provided. Click the pencil icon, if you want to edit it.
Change Encryption
To allow changing the encryption algorithm after the path is created, enable this toggle switch.
Target Type
Select one of these types of trail file formats:-
GGFormat
-
Plain Text
-
XML
-
SQL
Advanced Options
Specify advanced network options.
Enable Network Compression
Enable this toggle switch to specify a compression threshold value.
Compression Threshold
Set the compression threshold value if you decide enable this option.
Sequence Length
The length of the trail sequence number.
Eof Delay (centiseconds)
You can specify the Eof Delay in centiseconds. On Linux platforms, the default settings can be retained. However, on non-Linux platforms, you may need to adjust this setting for high bandwidth, high latency networks, or for networks that have Quality of Service (QoS) settings (DSCP and Time of Service (ToS) ).
Checkpoint Frequency
Frequency of the path that is taking the checkpoint (in seconds).
TCP Flush Bytes
Enter the TCP flush size in bytes.
TCP Flush Seconds
Enter the TCP flush interval in seconds.
DSCP
Select the Differentiated Services Code Point (DSCP) value from the drop-down list, or search for it from the list.
TOS
Select the Type of service (TOS) value from the drop-down list.
TCP_NODELAY
Enable this option to prevent delay when using the Nagle’s option.
Quick ACK
Enable this option to send quick acknowledgment after receiving data.
TCP_CORK
Enable this option to allow using the Nagle’s algorithm cork option.
System Send Buffer Size
You can set the value for the send buffer size for flow control.
System Receive Buffer Size
You can set the value for the receive buffer size for flow control.
Keep Alive
Timeout for keep-alive.
Filtering Options
Specify rules for filtering within the trail.
Rule Name
Name of the rule you need to create.
Rule Action
Select from the Exclude or Include rules. Exclude would filter out based on the selected options, while Include would include data based on the specified options.
Filter Type
Select from the following list of options:
-
Object Type: Select from three object types: DML, DDL, and Procedure
-
Object Names: Select this option to provide an existing object name. A 3–part naming convention depends on whether you are using CDB. With CDB, you need to use a 3–part naming convention, otherwise a 2–part convention is mandatory. 3–part convention includes container,
schema
,object
. 2–part convention includesschema
,object name
. -
Procedure Feature Name: Select this option to filter, based on existing procedure feature name.
-
Column Based: If you select this option, you are presented with the option to enter the table and column name to which the rule applies. You can filter out using column value with LT, GT, EQ, LE, GE, NE conditions. You can also specify if you want to have before image or after image in filtered data.
-
Tag: Select this option to set the filter based on tags.
-
Chunk ID: Displays the configuration details of database shards, however, the details can’t be edited.
Object Names
Name of the object being filtered.
Negate
Select this check box if you need to negate any existing rule.
Managed Options
Additional options to configure auto restart.
Critical
Enable this toggle switch if configuring auto restart options based on high availability requirements.
Auto Restart
By default this toggle switch is enabled. If disabled, the path is not restarted automatically when killed.
Autorestart Retries
The number of times to try an restart the task (path process).
Autorestart Delay
The duration interval to wait between retries.
-
-
Click Create and Run to start the path.
Deployment Type | Target Deployment (Non Secure) | Target Deployment (Secure) |
---|---|---|
Source Deployment (Non-secure) |
|
|
Source Deployment (Secure) |
|
|
The wss
protocol must be specified whenever the
source deployment (Distribution Service host) has been configured with security
enabled. The secured communication channel can be created using an SSL certificate
in a client Wallet, even if the target deployment (Receiver Service host) has
disabled security.
Features and Limitations for Using Target-initiated Distrbution Paths
Here are the limitations when working with target-initiated distribution paths:
-
There is no support for interaction between legacy and secure deployments using this mode of operation for target-initiated distribution paths.
-
No support for ogg protocol. Only
ws
andwss
protocols are supported. -
It is possible to only get information and stop a target-initiated distribution path on Distribution Service and after the path stops, it is not be visible on the Distribution Service.
You can also set up target-initiated distribution paths using the Admin Client.
For command options, see the Admin Client commands
ADD RECVPATH
, ALTER RECVPATH
, INFO
RECVPATH
, DELETE RECVPATH
, START
RECVPATH
.