GoldenGate: How is Oracle Data Guard different?

With the economy is still faltering and unpredictable, what more could you wish for than to have a Gate made of Gold? Though Oracle GoldenGate may not be the physical Gold but the ease with which it solves the peer to peer replication problems, it’s flexibility, robustness, speed and scalability – it’s certainly worth its weight in Gold. It is an integral part of Oracle’s Maximum Availability Architecture which together with several other products allows your data center to function with zero downtime and high availability.

Oracle Maximum Availability Architecture (MAA) comprises a set of standards, best practices and tools designed to make sure that all of of the applications are up and running 99.999% of the time. The tools which are part of this MAA architecture are RAC, Dataguard, Flashback, ASM, RMAN, and the GoldenGate Replication technology. All these products serve different aspects of Oracle MAA architecture. The Oracle Dataguard and GoldenGate setup serves the purpose of data synchronization between two or more systems. Although the basic functionality for both these may seem similar but GoldenGate picks up the replication game where Dataguard leaves it off.

[title type=”h2″ class=”tfuse”]GoldenGate and Oracle Data Guard[/title]

Both Oracle Dataguard and GoldenGate involve at least two systems where transactional data from one database system is required to be moved onto another database system. The purpose of the replication of data can be disaster recovery, migration of data or preparation of a secondary system to offload production reporting. While Dataguard is best for disaster recovery and data protection problems, GoldenGate is a more flexible heterogeneous replication mechanism and is also able to transform the data while it is being replicated.

Specifically, GoldenGate excels in the following four areas and complements your existing Dataguard solution.

• Oracle Dataguard is Oracle specific technology but GoldenGate can support heterogeneous database systems including almost all the major RDBMS like DB2, MySQL, Sybase.

• Dataguard supports active-passive replication. In a Dataguard setup, one of the database is the primary database and the other one is in an inactive Dataguard mode. The Dataguard database however can be opened but only in the Read-Only mode. GoldenGate however supports an active-active replication mode and allows both systems to work simultaneously while maintaining the data integrity and keeping the synchronization intact.

• GoldenGate allows transformation of the data, with conflict management while it is being replicated between both database systems.

• GoldenGate allows replication across platform. Data can be extracted from a Unix platform and replicated to an Oracle database running on Windows.
[title type=”h3″ class=”tfuse”]Practical Scenarios[/title]

There can be numerous use cases for GoldenGate. The use of flat files for data transportation and the support of heterogeneous systems makes the technology so very adorable to many organizations, specifically for those who have different database systems. As an example, it is possible for you to replicate data from your production Oracle database to your supporting Reporting database which uses MySQL as the database engine.

Below are some sample use cases of GoldenGate replication.

Zero Downtime Upgrade/Migration: You may want to setup an exact replica of your database for upgrade or migration, keep the data in sync till the last moment.

• High Availability: Your applications cannot afford to have downtime so you want to have two databases up and running at the same time to support those applications.

• Query or Reporting: You want to offload the reporting or long query operations from your production database.

• Real Time BI: For your data warehouse requirements.

• Data Synchronization: You want to Synchronize data across different departments of the company (different databases).

Furthermore the GoldenGate software supports extraction from the legacy systems and does not have any limitation on the distance either. Additionally, the trail files generated by GoldenGate capture can also be compressed and encrypted.

Visit GGSCI commands to view commands used to manage the GoldenGate Configuration.


Leave a Reply

Your email address will not be published.