Introduction If a table has a PK constraint or a Unique Constraint that is Non-Validated or Invalid, Oracle GoldenGate will by default not use those keys to...
Introduction If a table has a PK constraint or a Unique Constraint that is Non-Validated or Invalid, Oracle GoldenGate will by default not use those keys to uniquely identify a row. It will use all columns to uniquely identify a row. This may become an issue due to the increased space required for both trails and redo logs. It will also force all updates to become PK Updates. This could become a performance issue on the target because it may not use an index to apply the...
Introduction If a table has a PK constraint or a Unique Constraint that is Non-Validated or Invalid, Oracle GoldenGate will by default not use those keys to uniquely identify a row. It will use all...
This blog has been retired Introduction In 11g, the mediator executes routing rules either sequentially or in parallel. If you are planning to use parallel...
This blog has been retired Introduction In 11g, the mediator executes routing rules either sequentially or in parallel. If you are planning to use parallel routing rules, you would need to understand how the mediator queues and evaluates routings in parallel in different threads. This article describes 2 different threads used in the parallel routing rules and the design consideration if you are planning to use parallel routing rules in your implementation. Main Article By...
This blog has been retired Introduction In 11g, the mediator executes routing rules either sequentially or in parallel. If you are planning to use parallel routing rules, you would need...
11g Resequencer Health Check In this Blog we will see a few useful queries to monitor and diagnose the health of resequencer components running in a typical...
11g Resequencer Health Check In this Blog we will see a few useful queries to monitor and diagnose the health of resequencer components running in a typical SOA/AIA Environment. The first query is a snapshot of the current count of Resequencer messages in their various states and group_statuses. Query1: Check current health of resequencers select to_char(sysdate,'YYYY-MM-DD HH24:MI:SS') time, gs.status group_status, m.status msg_status, count(1), gs.component_dn from...
11g Resequencer Health Check In this Blog we will see a few useful queries to monitor and diagnose the health of resequencer components running in a typical SOA/AIA Environment. The first query is a...
This blog is no longer relevant and has been retired.
Introduction In 10g, there was a mechanism for suppressing consumption of messages at the Adapter level. That mechanism can not be used in 11g. But there is a...
Introduction In 10g, there was a mechanism for suppressing consumption of messages at the Adapter level. That mechanism can not be used in 11g. But there is a way... Main Article The way to do this is to set the InboundThreadCount in the appropriate MBean to zero. This will effectively suppress consumption of messages - e.g. from MQ or JMS or whatever. Setting this value to something greater than zero will cause consumption to resume. Making such a change is dynamic – i.e....
Introduction In 10g, there was a mechanism for suppressing consumption of messages at the Adapter level. That mechanism can not be used in 11g. But there is a way... Main Article The way to do this is...
Introduction This 5th article in the "Going Mobile with ADF" series explains how you programmatically invoke a SOAP web service from an ADF Mobile application....
Introduction This 5th article in the "Going Mobile with ADF" series explains how you programmatically invoke a SOAP web service from an ADF Mobile application. It illustrates how to handle in Java the complex type that might be returned by the web service, as well as how to set up the complex types that might be needed as a parameter for a web service call. The techniques are illustrated by building an ADF Mobile CRUD application against an ADF Business Components SDO service...
Introduction This 5th article in the "Going Mobile with ADF" series explains how you programmatically invoke a SOAP web service from an ADF Mobile application. It illustrates how to handle in Java...
Introduction This article is applicable to Oracle GoldenGate Classic installations, version 19c and prior. Many times when working with customers, we hear "We...
Introduction This article is applicable to Oracle GoldenGate Classic installations, version 19c and prior. Many times when working with customers, we hear "We were told never to use Oracle GoldenGate (OGG) to do initial loads, so how do we load our non-Oracle data to Oracle?" It is true that native database utilities can be used to make copies of large databases faster than OGG in a homogeneous (like-to-like) implementation. However, when loading data of dissimilar structure...
Introduction This article is applicable to Oracle GoldenGate Classic installations, version 19c and prior. Many times when working with customers, we hear "We were told never to use Oracle GoldenGate...
Introduction This blog is intended to share some knowledge about the effects of Queue Level Redelivery Settings and Adapter level Retry Settings on message...
Introduction This blog is intended to share some knowledge about the effects of Queue Level Redelivery Settings and Adapter level Retry Settings on message processing by JMS Adapter. It is also intended to provide some useful insights that help in designing retry mechanisms into an integration system. Specifically, this blog illustrates the Retry behavior of JMS Adapter and how it is impacted by these settings. Detail Consider an Integration system that uses JMS Adapter to...
Introduction This blog is intended to share some knowledge about the effects of Queue Level Redelivery Settings and Adapter level Retry Settings on message processing by JMS Adapter. It is also...
Introduction ODI processes are typically at the mercy of the entire IT infrastructure’s health. If source or target systems become unavailable, if network...
Introduction ODI processes are typically at the mercy of the entire IT infrastructure’s health. If source or target systems become unavailable, if network incidents occur, ODI processes will be impacted. When this is the case, it is important to make sure that ODI can notify the proper individuals. This post will review the techniques that are available in ODI to guarantee that such notifications occur reliably. Exceptions Handling and Notifications in ODI When you create an...
Introduction ODI processes are typically at the mercy of the entire IT infrastructure’s health. If source or target systems become unavailable, if network incidents occur, ODI processes will...