Quantcast
Channel: ATeam Chronicles
Viewing all articles
Browse latest Browse all 376

Oracle GoldenGate: How to Configure On-Premise to GoldenGate Cloud Services (GGCS) Replication with Corente VPN

$
0
0

Introduction

This document will walk you through how to configure Oracle GoldenGate replication between On-Premise to GoldenGate Cloud Service (GGCS) on Oracle Public Cloud (OPC) via Virtual Private Network (VPN) using Corente Services Gateway (CSG).

The high level steps for this replication configuration are as follows:

  • Creation of SSH Public/Private Key Files
  • Provisioning of Database Cloud Service (DBCS) which is a pre-requisite of GGCS
  • Provisioning of GoldenGate Cloud Service (GGCS)
  • On-Premise Corente Services Gateway Configuration and Setup
  • Provisioning of Compute Instance for OPC Corente Services Gateway
  • On-Premise and OPC Corente VPN Tunnel configuration
  • GGCS VPN Tunnel Configuration via Generic Routing Encapsulation (GRE) protocol
  • On-Premise and GGCS GoldenGate Sample Replication Configuration

Note: Provisioning Resources in this article requires Oracle Cloud and Corente VPN credentials. If you don’t have one, please contact your Oracle Sales Representative.

The following assumptions have been made during the writing of this article:

  • The reader has a general understanding of Windows and Unix platforms.
  • The reader has basic knowledge of Oracle GoldenGate products and concepts.
  • The reader has a general understanding of Cloud Computing Principles
  • The reader has basic knowledge of Oracle Cloud Services
  • The reader has a general understanding of Network Computing Principles

Main Article

The GoldenGate Cloud Service (GGCS), is a cloud based real-time data integration and replication service, which provides seamless and easy data movement from various On-Premises relational databases to databases in the cloud with sub-second latency while maintaining data consistency and offering fault tolerance and resiliency.

GoldenGate Cloud Service (GGCS) Architecture Diagram:

GGCS_Architecture_v2

In a typical implementation of On-Premise to GGCS, the connectivity is accomplished through the use of SSH, since this is the only port opened by default on the cloud. The On-Premise server communicates directly to the GGCS server through the use of SOCKS proxy.

However, in cases where the security policy dictates or the client doesn’t want to use SSH, as an alternative a VPN connection between On-Premise and the OPC can be used. Currently, for GGCS it has been certified with Corente Services Gateway for VPN connectivity.

Corente VPN Service Architecture Diagram:

corente_architecture_v4

GGCS Corente VPN Deployment Architecture diagram depicted in this article:

ggcs_corente_architecture_v2

GoldenGate Connectivity Flow:

  • On-Premise Network to OPC Network: GGCS Instance can be reached via GRE IP address 172.16.201.3
  • OPC Network to On-Premise Network: On-Premise OGG VM Server can be reached via IP address 192.168.201.51

The complete document can be found on the Oracle Support site under the document ID: 2198461.1

 


Viewing all articles
Browse latest Browse all 376

Trending Articles