Installing Oracle Goldengate HP Nonstop
Installing Oracle Goldengate HP Nonstop
• DDLGEN
1
The install program auto-detects your Guardian operating system version and installs
the native version of Oracle GoldenGate code where applicable. You can also tell
Oracle GoldenGate to install TNS code during the installation routine.
Note:
HP NonStop Server installations use the UNPAK utility. Verify that you have a
copy of this utility before proceeding.
If patches are not available on the support site, go to the Oracle delivery site for the
release download.
1. Navigate to https://edelivery.oracle.com/.
2. Sign in with your Oracle ID and password.
3. On the Terms and Restrictions page:
• Accept the Trial License Agreement (even if you have a permanent license).
• Accept the Export Restrictions.
• Click Continue.
4. On the Media Pack Search page:
• Select the Oracle Fusion Middleware Product Pack.
• Select the platform on which you will be installing the software.
2
• Click Go.
5. In the Results List:
• Select the Oracle GoldenGate Media Pack that you want.
• Click Continue.
6. On the Download page:
• View the Readme file.
• Click Download for each component that you want. Follow the automatic
download process to transfer the mediapack.zip file to your system.
Note:
If you are using Oracle GoldenGate against a TMF-enabled (or audited)
database, then Oracle GoldenGate must be installed on a volume that is
TMF-protected because the internal Oracle GoldenGate file must be
audited.
3
Since you are installing for J06.20.00, we recommend installing Native mode obje
cts
Do you use TNS mode User Exits in Extract (Y/N)? N
Do you use TNS mode User Exits in Replicat (Y/N)? N
Note:
For the purposes of this documentation, it is assumed that Native mode
objects are installed.
6. You are asked whether to build Oracle GoldenGate intercept libraries. Oracle
GoldenGate recommends building a GGSLIB object, but it can be omitted if you
don't need to capture non-audited Enscribe files or FUP-related activities. (You
can build a GGSLIB object later.)
*************************************************
* If you need the TNS mode GGS Intercept *
* Library GGSLIB then answer Yes, *
* Otherwise you can skip this step. *
*************************************************
Build of new GGSLIB recommended. Build now (y/n)? Y
7. The BUILDMAC utility runs and searches for run-time libraries to bind with GGSLIB, and
you may be prompted that one or more libraries is missing. Enter Y to continue.
*** Running BUILDMAC to build GGSLIB ***
*******************************************************
Looking for runtime libraries to BIND with GGSLIB
*******************************************************
Adding $SYSTEM.ZCOBOLRT.CLIBOBJ (COBOL74)
Adding $SYSTEM.ZCOB85RT.C8LIB (COBOL85)
$SYSTEM.ZCRERTL.CFELIB skipped (CRE)
Adding $SYSTEM.SYSTEM.CRELIB (CRE)
Adding $SYSTEM.SYSTEM.COBOLLIB (COBOL85)
One or more libraries was missing. Continue anyway? (Y/N) Y
8. You are asked if you want to include a user library. Respond either Y or N.
Do you want to include your own User Library (y/n)? N
9. You are asked if you want to change the location of the AUDCFG.
Do you want to change the location for the AUDCFG segment (Y/N): N
If you respond with yes, it prompts you for the new default location ($vol.subvol) of
the AUDCFG segment.
Assuming you opted to build the intercept libraries, you will see the BIND steps
being performed. You may see the following Binder messages that can be safely
ignored. They are:
WARNING 60: Parameter mode mismatch on PXS_FILE_WRITE_parameter2. Parameter
mismatch between two external procedure declarations. The parameters are
declared as STRING and OTHER.
WARNING 61: Parameter type mismatch on PXFS_FILE_WRITE_parameter2. Parameter
mismatch between two external procedure declarations. The parameters are
4
declared as INT32 and OTHER.
WARNING 61 Parameter type mismatch on PXFS_FILE_WRITE_parameter3.
If you respond with yes, it prompts you for the new default location ($vol.subvol) of
the AUDCFG segment.
13. You are asked if you want to include ZCREREL. It is recommended to enter Y to
include it unless you know your applications do not use these libraries.
Do you want to include ZCREREL (Y/N) : Y
5
15. You are asked if you want to include ZCOBREL. It is recommended to enter 3 to
include it unless you know your applications do not use these libraries.
Do you want to include ZCOBREL (Y/N) : Y
Note:
If you omit a ZCOBREL location, you are prompted to confirm your choice:
Omit ZCOBREL (y/n):Y
NLDLIB builds the GGSLIBR and GGSSRL libraries, displaying a series of informational
messages and the names of the files that were created.
Note:
On systems running Guardian G06.23 or earlier, the GGSUNPAK utility
installs and accelerates Audserv and Logdump. If you are running
G06.24 or later, you will not see any acceleration messages.
17. You are asked if Oracle GoldenGate should use an existing SQL catalog or create
a new catalog. Either enter X to specify no catalog or enter the name of a catalog
to use. If you enter a catalog name and it does not exist, you are asked whether to
create it.
SQL Catalog for Compilation (X for no catalog)? $VOL GGSCAT
Catalog $VOL.CPSCAT does not exist. Create it (Y/N)? Y
The SQL compilation completes, and then libraries and programs are linked. This
happens automatically and does not require action from you.
18. You are asked if you want to migrate information from another Oracle GoldenGate
environment. If you are installing Oracle GoldenGate for the first time, enter N. A
migration requires shutting down existing Oracle GoldenGate processes and, if
Logger is being used, the user application. (The following assumes a new
installation.)
Would you like to Migrate information
from another GGS Environment (Y/N)? N
19. You are advised to license your programs as shown in the following prompt, and
then the installation utility finishes.
6
Make sure to secure files appropriately. If EXTRACT is to be executed
outside of the SUPER group, you must PROGID and LICENSE the AUDSERV
program for SUPER.SUPER authority. PRIVLIB must also be licensed
if executing Replicat outside SUPER group.
Audserv/LOGDUMP licensing only applies to TMF installations.
TMFARUL2 must be licensed
The Native Audserv must be licensed (A TMFARUL2 restriction)
The Native Logdump must be licensed if you are going to use it
to read TMF trails (A TMFARUL2 restriction)
TACL> LOGON SUPER.SUPER
TACL> FUP
-GIVE Audserv, SUPER.SUPER
-SECURE Audserv, "NUNU", PROGID
-LICENSE Audserv
-LICENSE PRIV*
-LICENSE LOGDUMP
-LICENSE TMFARUL2
Installation Complete.
Note:
If the version of your SQL catalog does not allow FUP to alter the
program, you can PROGID and license the programs by using the
following commands to license the components shown.
7
• Sizing
• CPU requirements
• Disk space requirements
• Data communications requirements
Sizing
Before you begin running Oracle GoldenGate in your production environment, you
should consider several factors regarding the size of your replication environment,
including the following statistics.
• Counts of inserts, updates and deletes generated on a per-file basis. A
common reference point is the application's transaction rate, from which these
numbers can often be estimated.
• The byte generation rate caused by inserts, updates and deletes. Use this
statistic to estimate disk space requirements and communications bandwidth. Byte
generation totals during peak periods and over an extended time frame are also
important.
• For update-intensive applications, the number of bytes in a record that
change during an update. This is probably the most difficult statistic to extract
(especially for Enscribe files) but can have a dramatic impact on bandwidth
requirements. The number of bytes that change in a record during an update
determines the compression rate for the record.
• The cache hit rate and file busy percentages of the most heavily updated
files. This has a direct bearing on the throughput possible by individual Replicat
processes on the target system.
• Which programs are causing the heaviest amount of update activity. It is
often possible to avoid replicating certain types of activity (such as FUP LOAD) by
excluding those programs from replication. Measuring individual programs is a
concern primarily for non-TMF data processing.
CPU Requirements
CPU requirements for Oracle GoldenGate components vary primarily according to
transactions rates, record sizes, and the I/O mix (numbers of updates versus inserts
and deletes).
8
Note:
The following section details system performance statistics in a variety of
situations. However, your operating environment, including operating system
versions, hardware, and network topology will affect the performance you
experience. The following figures should be taken only as guidelines, useful
for reference when you are planning your Oracle GoldenGate
implementation.
9
Intermediate Oracle GoldenGate Trails
You can improve performance by writing data to intermediate trails. An intermediate
trail is a trail written by Extract, extracted again, and transferred to Replicat. I/O to
intermediate Oracle GoldenGate trails is serial, buffered and blocked at 28K bytes
when the system is busy. This means that I/O rates upwards of three gigabytes per
hour are possible to trails on the target (Higher rates are possible when you are
running multiple instances of Extract, IP channels and controllers.)
Any impact resulting from intermediate trails is absorbed by the target system. The
volume of data written to the target is likely to be far less than the corresponding audit
generated on the source system for TMF applications.
To minimize contention with other disk activity, isolate trails on separate disk drives
when possible.
Replicat Performance
Replicat performance on the target system is related closely to the I/O performance on
the source system, as I/O is essentially the same on both. This means you can
estimate the impact of I/O on the target system by determining the File Busy
percentage of application files and tables on the source system.
Non-TMF Requirements
10
Non-TMF database changes are stored in a log trail, which must be a local trail.
Logged data is subsequently moved to the target system and replicated.
During typical activity, records in the log trail are replicated almost as soon as they
become available, making the amount of disk required quite low. However, you must
consider more extreme conditions when sizing disk space. For example, replication
activity can fall behind due to:
• Target system maintenance (which might require suspension of Replicat
processing)
• Slow data replication on the target due to other activity on the system
• Slow or downed communications links between the source and target
When any of these conditions arise, you must store backlog locally. Many
organizations use the general rule of accommodating one full day's worth of database
updates. Allocate the number of bytes generated during this period for log trails on the
source system.
In addition, you can move data to trails on the target system to minimize data loss
caused by potential delays in Replicat processing. Size these trails for potential delays
in replication.
When sizing for longer outages (for example, more than one day), you can use tape
backups to reduce the amount of disk required.
For Enscribe files, the size of insert and delete records can vary and may not be the
same as the record size for the file (which represents the maximum size of each
record). For inserts and deletes, all bytes in the record are transferred, along with a
header.
For SQL tables, all bytes are transferred for insert and delete records as well.
With Oracle GoldenGate, the following data is not transferred to the target system:
• Images of updates before the update occurs (Only after-images are sent for hot
site backup.)
• Alternate key data
• SQL indexes
11
• Data generated by FUP RELOAD
• Assorted other TMF records
When sizing data communications bandwidth, peak byte generation is important.
Bandwidth that can accommodate peak volumes helps guarantee low latency between
the source and target databases at all times.
When moving data, Extract accumulates and sends records in 28K blocks across the
network whenever database activity is high. Therefore the amount of data moved
through Extract over a communication channel can be approximately 75-80% of
channel capacity. For example, on a 10-megabit Ethernet network with approximately
4-megabits per second of true throughput, Extract can move approximately 3.5M bits
per second (430KB/sec).
Note:
All network performance statistics are suggestions. Your own network
configuration, bandwidth demand, and operating environment will determine
the kind of performance you can expect. You can boost actual throughput
considerably by using router-based compression between the source and
target systems (a 4 to 1 ratio is fairly typical). This is in addition to update
compression used by Oracle GoldenGate modules. For more information,
contact your network vendor or NonStop representative.
When sizing communications requirements, note that Oracle GoldenGate can send
data over multiple TCP/IP channels simultaneously. You can achieve total bandwidth
requirements over multiple lines or networks as an alternative to a single path.
12
Before running online synchronization for the first time, run an initial-load process to
synchronize the source and target. This applies a copy of the source to the target. If
Extract or Replicat stops running for any reason, you may need to re-synchronize the
source and target and restart the Extract and Replicat groups to reset the checkpoints.
For further assistance with your initial load, see the Oracle GoldenGate for Mainframe
Administering for HP NonStop (Guardian) guide.
Documentation Accessibility
For information about Oracle's commitment to accessibility, visit the Oracle
Accessibility Program website at http://www.oracle.com/pls/topic/lookup?
ctx=acc&id=docacc.
Oracle® Fusion Middleware Installing Oracle GoldenGate for HP NonStop (Guardian), 12c (12.3.0.1.0)
E99940-01
Copyright © 2014, 2018, Oracle and/or its affiliates. All rights reserved.
This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws.
Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit,
perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for
interoperability, is prohibited.
The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing.
If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is
applicable:
U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation,
delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental
regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on
the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government.
This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous
applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take
all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by
use of this software or hardware in dangerous applications.
Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.
Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of
SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered
trademark of The Open Group.
This software or hardware and documentation may provide access to or information about content, products, and services from third parties. Oracle Corporation and its affiliates
are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services unless otherwise set forth in an applicable
agreement between you and Oracle. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-
party content, products, or services, except as set forth in an applicable agreement between you and Oracle.
13