Goldengate/Veridata Traing With Microservices

  • Introduction to Oracle GoldenGate

  • Oracle GoldenGate Architecture

  • Understanding Oracle GoldenGate Replication Solutions for Live Reporting, Real-Time Data Warehousing, Live Standby Database, and High Availability.

  • Supported databases and platforms

  • Advantages of Oracle GoldenGate

  • Downloading the software

  • Installing Oracle GoldenGate

  • Explaining Subdirectories

  • Enabling supplemental logging

  • Understanding GoldenGate Components: Processes and Files

  • Process Data Flow

  • GoldenGate Architecture

  • Design Considerations

  • Configuring the Manager process

  • Describing the Manager Parameters

  • Starting the Manager process

  • Configuring GLOBALS file

  • Configure Initial Load

  • Overview of Data Definitions File

  • When to use Data Definitions Files

  • Types of Data Definitions File

  • Configuring Data Definitions File

  • Preparing a source database for transaction capture

  • Describing the high-level configuration steps

  • Explaining change capture and delivery with a data pump

  • Explaining change capture and delivery without a data pump

  • Comparing batch and online operation

  • Explaining Oracle GoldenGate Checkpoints

  • Describing the Extract process

  • Configuring and starting an Extract process

  • Adding local and remote trails

  • Configuring and starting a data pump

  • Explaining the Replicate process

  • Configuring a Replicate process

  • Starting a Replicate process

  • Describing GGSCI commands

  • Describing Extract trails and files

  • Overview of DDL synchronization

  • Preparing a source database for transaction capture

  • Describing the high-level configuration steps

  • Configuring Extract and Replicate for DDL replication

  • Running GoldenGate commands from the GGSCI prompt

  • Running GoldenGate commands from the obey files

  • Running GoldenGate commands from the OS shell

  • Identifying the types of GGSCI commands available

  • Managing trail files

  • Automating process startup

  • Using reporting and statistics

  • Using message, trail and password encryption

  • Controlling command permissions – CMDSEC file

  • Overview of data mapping and manipulation

  • Deciding where data mapping and conversion will take place Data Selection and Filtering

  • Data Transformation