GoldenGate不使用数据泵完成Oracle-Oracle的双向复制
配置数据库环境、goldengate用户,安装goldengate等操作,不使用数据泵完成Oracle-Oracle的双向复制所需的配置:--我这里只配置同
配置数据库环境、goldengate用户,安装goldengate等操作,参考不使用数据泵完成Oracle-Oracle的双向复制所需的配置:--我这里只配置同步test用户的 test1表。
1.主库的配置:
#####配置Extract
按顺序执行以下操作:
add extract ext1,tranlog, begin now
add exttrail /u01/ogg/dirdat/lt, extract ext1
edit params ext1
在打开的编辑窗口写入以下:----这里使用为OGG创建的用户来登陆,同时要注意路径的对照。
extract ext1
userid ogg, password ogg
rmthost 192.168.1.213, mgrport 7809
rmttrail /u01/ogg/dirdat/lt
table test.*;
#####配置Replicat
edit params ./GLOBAL
在编辑窗口输入以下两行:
GGSCHEMA ogg
CHECKPOINTTABLE ogg.checkpoint
dblogin userid ogg,password ogg
add checkpointtable ogg.checkpoint
add replicat rep2,exttrail /u01/ogg/dirdat/at, checkpointtable ogg.checkpoint
edit params rep2
在弹出编辑窗口输入:---我这里只设置了同步test用户的test1表--这里的用户和表名在下一步的测试中再建立。
可以使用handlecollisions参数,避免主库与目标库所需要同步的表中数据不一致导致的接收进程挂起。
replicat rep2
handlecollisions
ASSUMETARGETDEFS
userid ogg,password ogg
discardfile /u01/ogg/dirdat/rep2_discard.txt,append, megabytes 10
map test.test1, target test.test1;
配置完成后的进程如下:--注意我这里的进程状态是启动后的。--建议主库及目标库都配置进程完成后再启动。
GGSCI (bys001.oel.com) 11> info all
Program Status Group Lag at Chkpt Time Since Chkpt
MANAGER RUNNING
EXTRACT RUNNING EXT1 00:00:00 00:00:00
REPLICAT RUNNING REP2 00:00:00 00:00:02
2.目标库的配置
#####配置Replicat
edit params ./GLOBAL
在编辑窗口输入以下两行:
GGSCHEMA ogg
CHECKPOINTTABLE ogg.checkpoint
逐次输入以下命令:
dblogin userid ogg,password ogg
add checkpointtable ogg.checkpoint
add replicat rep1,exttrail /u01/ogg/dirdat/lt, checkpointtable ogg.checkpoint
edit params rep1
在弹出编辑窗口输入以下:---我这里只设置了同步test用户的test1表--这里的用户和表名在下一步的测试中再建立。
replicat rep1
handlecollisions
ASSUMETARGETDEFS
userid ogg,password ogg
discardfile /u01/ogg/dirdat/rep1_discard.txt,append, megabytes 10
map test.test1, target test.test1;
#####配置Extract
按顺序执行以下命令:
add extract ext2,tranlog, begin now
add exttrail /u01/ogg/dirdat/at, extract ext2
edit params ext2
在打开的编辑窗口写入:
extract ext2
TRANLOGOPTIONS EXCLUDEUSER ogg
userid ogg, password ogg
rmthost 192.168.1.211, mgrport 7809
rmttrail /u01/ogg/dirdat/at
table test.*;
配置完成后的进程如下:--注意我这里的进程状态是启动后的。
GGSCI (bys2.oel.com) 32> info all
Program Status Group Lag at Chkpt Time Since Chkpt
MANAGER RUNNING
EXTRACT RUNNING EXT2 00:00:00 00:00:07
REPLICAT RUNNING REP1 00:00:00 00:00:01

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics

The article discusses using MySQL's ALTER TABLE statement to modify tables, including adding/dropping columns, renaming tables/columns, and changing column data types.

Article discusses configuring SSL/TLS encryption for MySQL, including certificate generation and verification. Main issue is using self-signed certificates' security implications.[Character count: 159]

Article discusses strategies for handling large datasets in MySQL, including partitioning, sharding, indexing, and query optimization.

Article discusses popular MySQL GUI tools like MySQL Workbench and phpMyAdmin, comparing their features and suitability for beginners and advanced users.[159 characters]

The article discusses dropping tables in MySQL using the DROP TABLE statement, emphasizing precautions and risks. It highlights that the action is irreversible without backups, detailing recovery methods and potential production environment hazards.

The article discusses creating indexes on JSON columns in various databases like PostgreSQL, MySQL, and MongoDB to enhance query performance. It explains the syntax and benefits of indexing specific JSON paths, and lists supported database systems.

Article discusses using foreign keys to represent relationships in databases, focusing on best practices, data integrity, and common pitfalls to avoid.

Article discusses securing MySQL against SQL injection and brute-force attacks using prepared statements, input validation, and strong password policies.(159 characters)
