Unrecoverable data files are those that involve nologging operations since the last successful backup took place. There are several ways to identify them. I’ll take you through them.
This is the third post in Oracle GoldenGate Extract Internals series (links to part I and part II). In this post, we’re going to take a closer look at various queries that the Extract process uses against the database. As before, we will start by examining the strace output.
I was asked, the other day, to automate the creation of a client’s weekly report, which is a pivot table of some aggregate data generated by a query. I’ve written a set of fairly simple PL/SQL code that handles this task in all versions of Oracle that supports associative nested VARRAYs (I have no clue when that started getting supported. It sure works great with 10g). Here is how my code works.
This is the 176th edition of Log Buffer, the weekly review of database blogs.
I’m so much looking forward to the next conference in my schedule — RMOUG Training Days 2010. It would be only my second time I’m presenting at the RMOUG but it was enough to go there once to understand that it’s one of the top rated Oracle User Group conferences in the world. Some of the great speakers are presenting and registration fees are very low compare to other events of comparable quality. If your conference budget is low this year — that’s the conference you don’t want to miss!
In light of the official Oracle acquisition of Sun, I dug out a presentation video I realize I never officially shared with either the MySQL or the Oracle community. It’s the presentation I did at the 2008 Oracle Open World conference called, “So, you want to be an Oracle ACE?” and is a good resource for anyone who wants to contribute to anything — not just Oracle or MySQL, though certainly it’s based on my experiences with contributing to MySQL. Have a look.
Today we continue looking at various aspects of how the Oracle GoldenGate extract process works. One of the follow up questions to part I was about the way the Extract process reads from ASM storage. I’ve provided the answer, however, today we’re going get a detailed look at how the Extract process interacts with an ASM instance and what kind of implications may result. Let’s take a look at what changes in the Extract process loop when it reads from ASM storage:
Since GoldenGate has been declared as a strategic direction for replication technology by Oracle, it sounds like it’s time to get up to speed with various aspects of how this technology works and performs. Let’s see what kind of techniques they were able to utilize in order to achieve their goals. I did a simple replication setup between two different databases with the Extract, DataPump and Replicat processes. I’m planning to take a look at all of these but today is the Extract’s process turn.
Welcome to the 175th edition of Log Buffer, the weekly review of database blogs.
Oracle has just released their January installment of their critical patch update (CPU). Vulnerability CVE-2010-0071 is particularly critical, with a CVSS score of 10, the highest possible. It’s a remotely-exploitable listener vulnerability that’s particularly severe on Windows platforms. Full details are on Oracle’s security site.