-
Attunity Replicate Setup andUser Guide
Version 6.4
October 30, 2019
-
Attunity Replicate Setup and User Guide, 6.4
Copyright © 2019 Qlik Analytics (ISR) Ltd. All rights reserved.
Primary Author: Charlton Book
The Programs (which include both the software and documentation) contain proprietary information;they are provided under a license agreement containing restrictions on use and disclosure and are alsoprotected by copyright, patent, and other intellectual and industrial property laws. Reverseengineering, disassembly, or decompilation of the Programs, except to the extent required to obtaininteroperability with other independently created software or as specified by law, is prohibited.
The information contained in this document is subject to change without notice. If you find anyproblems in the documentation, please report them to us in writing. This document is not warranted tobe error-free. Except as may be expressly permitted in your license agreement for these Programs, nopart of these Programsmay be reproduced or transmitted in any form or by any means, electronic ormechanical, for any purpose.
If the Programs are delivered to the United States Government or anyone licensing or using thePrograms on behalf of the United States Government, the following notice is applicable:
U.S. GOVERNMENT RIGHTS Programs, software, endpoints, and related documentation and technicaldata delivered to U.S. Government customers are "commercial computer software" or "commercialtechnical data" pursuant to the applicable Federal Acquisition Regulation and agency-specificsupplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of thePrograms, including documentation and technical data, shall be subject to the licensing restrictions setforth in the applicable Attunity license agreement, and, to the extent applicable, the additional rightsset forth in FAR 52.227-19, Commercial Computer Software—Restricted Rights (June 1987). QlikAnalytics (ISR) Ltd., 70 Blanchard Road, Burlington, MA 01803
The Programs are not intended for use in any nuclear, aviation, mass transit, medical, or otherinherently dangerous applications. It shall be the licensee's responsibility to take all appropriate fail-safe, backup, redundancy and other measures to ensure the safe use of such applications if thePrograms are used for such purposes, andwe disclaim liability for any damages caused by such use ofthe Programs.
Attunity is a registered trademark of Qlik Analytics (ISR) Ltd. and/or its affiliates. Other namesmay betrademarks of their respective owners.
The Programsmay provide links toWeb sites and access to content, products, and services from thirdparties. Qlik Analytics (ISR) Ltd. is not responsible for the availability of, or any content provided on,third-party Web sites. You bear all risks associated with the use of such content. If you choose topurchase any products or services from a third party, the relationship is directly between you and thethird party. Attunity is not responsible for: (a) the quality of third-party products or services; or (b)fulfilling any of the terms of the agreement with the third party, including delivery of products orservices andwarranty obligations related to purchased products or services. Qlik Analytics (ISR) Ltd. isnot responsible for any loss or damage of any sort that you may incur from dealing with any third party.
-
Contents1 | Introduction 47Replication Explained 47
Attunity Replicate 48
Limitations and Considerations 49
System Architecture 51
Replication Tasks 52Using Multiple Tasks 52
Full Load and CDC Processes 53
Replication Topologies 53One to One 54
Logical Independence 54
Hub and Spoke 54
2 | Installing Attunity Replicate 55Installation Prerequisites 55Software Requirements 55
Windows Software Requirements 56
Linux Software Requirements 56
Windows Permissions 56
Recommended Hardware Configuration 57
Supported Endpoints 59
Installing or Upgrading Attunity Replicate on Windows 59Installation Instructions 60
Upgrade Instructions 60
Starting and Stopping the Attunity Replicate Server on Windows 62
Silently Installing Attunity Replicate 62
Creating a Response File 62
Running the Silent Install 63
Silently Upgrading Attunity Replicate 63
Creating a Response File 63
Attunity Replicate Setup and User Guide | Page 3Qlik Analytics (ISR) Ltd.
-
Running a Silent Upgrade 63
Silently Uninstalling Attunity Replicate 64
Creating a Response File 64
Running a Silent Uninstall 65
Changing the Data Directory Location on Windows 65
Installing Attunity Replicate on Linux 67Replicate Instances and Services on Linux 68
Installation Prerequisites and Procedures 69
Prerequisites 69
Installing Attunity Replicate on Linux 69
Attunity Replicate Server Procedures 72
Verifying that an Attunity Replicate Instance is Running 72
Starting and Stopping an Attunity Replicate Instance 72
Upgrading Attunity Replicate 73
Resolving Configuration File Conflicts 74
Uninstalling Attunity Replicate 75
Working with Additional Replicate Instances 76
Installing an Instance of Replicate as a Service 77
Uninstalling an Instance of a Replicate Service 77
Changing the Data Directory Location on Linux 78
3 | Security Considerations 79Securing Access to the Attunity Replicate Web UI 79
Setting Up Replicate Console HTTPS Support 80Checking if an SSL Certificate is Installed 80
Using the Self-Signed Certificate 80
Setting Up Attunity Replicate Server HTTPS Support 81Replacing the Self-Signed SSL Certificates on Linux 81
Examples of the Scrambled Private Key Password 82
Replacing the Self-Signed Certificate on Windows 83
Changing the Server Password 84
Protecting Replicate Passwords 86
Attunity Replicate Setup and User Guide | Page 4Qlik Analytics (ISR) Ltd.
-
The Master Key File 87
Changing and Protecting the Master Key 87
Changing the Master Key Replacement 88
Protecting the Master Key File from Misuse 89
Master Key Considerations when Exporting and Importing Tasks 89
Encrypting the User Permissions File 90
Securing Connections to Endpoints 91
Application Security 92
Using External Credentials 92Limitations and Considerations 92
Changing the Default Addon Name 93
Step 1: Edit the MyPasswordProvider.c File 93
Step 2: Compile the Code 93
Step 3: Edit the addons_def.json.sample File 93
Step 4: Configure the Endpoints 94
4 | Overview of Attunity Replicate Endpoints 95Supported Replicate Endpoints 95
Using ARC CDC Agents as Endpoints 95
Replicate Data Types 96
Supported DDL Statements 98How Replicate Handles DDL Changes 98
Limitations when Capturing DDL Changes 98
Configuring Replicate to Automatically Replace the User-Entered Pass-word 99Defining Multiple Endpoints to use the same Automatically Changed Password 101
5 | Using the Attunity Replicate Console 102Accessing the Attunity Replicate Console 102Accessing Attunity Replicate from a Remote Computer 103
Attunity Replicate UI Server Configurations 104
Configuration 1: Replicate Server Running on Windows 104
Attunity Replicate Setup and User Guide | Page 5Qlik Analytics (ISR) Ltd.
-
Configuration 2: Replicate Server Running on Linux 104
Configuration 3: Replicate UI Console and Replicate Server Running on Linux 105
Multiple Users Connecting to a Single Console 106
Tasks View 106Viewing Specific Tasks 109
Designer Mode 109
Monitor Mode 111
Server View 112
List Actions 112
6 | Getting Started: An Attunity Replicate Tutorial 114What You Need 114
Open the Attunity Replicate Console 115
Add an Oracle Endpoint as a Source 115
Add a Microsoft SQL Server database as a Target 117
Add a Replication Task 119Add a Replication Task to the Attunity Replicate Console 119
Add the Source and Target Endpoints to the Task 121
Select Tables for the Replication Task 123
Run and Monitor the Replication Task 124
View the Replicated Tables in Microsoft SQL Server 125
7 | Defining Tasks 127Adding Tasks 128Bidirectional Replication 132
Limitations 132
Supported Endpoints 133
Setting up Bidirectional Replication 133
Using Bidirectional Replication with the File Channel Endpoint 134
Editing and Viewing a Task Description 135
Working with Endpoints 135Adding an Endpoint 136
Attunity Replicate Setup and User Guide | Page 6Qlik Analytics (ISR) Ltd.
-
Editing Endpoint Configuration Information 136
Viewing Endpoint Configuration Information 137
Testing an Endpoint Connection 137
Duplicating Endpoints 138
Searching for Endpoints 138
Deleting Endpoints 138
Adding a Source and Target Endpoint to a Task 138
Adding Tables and/or Views to a Task 140Searching for Tables/Views to use in a Replication Task 142
Selecting Specific Tables/Views for Replication 143
Removing Specific Tables/Views from a Replication Task 144
Creating Table/View Selection Patterns 144
Setting Load Order 145
Editing a Replication Task 146
Searching for Tasks 147
Deleting a Replication Task 147
Exporting and Importing Tasks 147Exporting Tasks 148
Importing Tasks 150
Editing an Exported (json) File 151
Making Changes to the Endpoint Connection Information 152
8 | Adding and Managing Source Endpoints 154Using Amazon RDS for SQL Server as a Source 155Prerequisites 156
Limitations 158
Non-Supported Amazon RDS for SQL Server Security Features 160
Required Permissions 160
Supported Compression Methods 160
Amazon RDS for SQL Server Source Data Types 160
Non-Supported Data Types 164
Homogeneous Replication 164
Attunity Replicate Setup and User Guide | Page 7Qlik Analytics (ISR) Ltd.
-
Data Type Exceptions 164
Column and Table Collation 165
Preparing the Amazon RDS for SQL Server Database for Replication 166
Setting up Amazon RDS for SQL Server for CDC (Change Data Capture) 166
Preparing Amazon RDS for SQL Server Backup and Recovery 167
Defining Amazon RDS for SQL Server Database Settings 168
Working with Windows Authentication 168
Setting Connection Properties 168
Artifacts Created by Replicate in the Database 171
Using Amazon RDS for MySQL as a Source 172Prerequisites 172
Attunity Replicate Server for Windows 173
Attunity Replicate Server for Linux 173
Amazon RDS for MySQL Replication 173
Setting up Amazon RDS for MySQL for CDC (Change Data Capture) 174
Replicating 4-byte UTF8 Emojis 174
Limitations 174
Security Requirements 175
Data Types 175
Homogeneous Replication 178
Setting General Connection Properties 179
SSL Authentication Options 181
Selecting a Schema 181
Setting Advanced Connection Properties 182
Internal Parameters 182
Settings Summary 182
Using Amazon RDS for PostregSQL as a Source 183Source Prerequisites 183
Client Side 183
Required Permissions 185
Setting up Amazon RDS for PostgreSQL for CDC (Change Data Capture) 185
Using an Account without the "rds_superuser" Role 185
Attunity Replicate Setup and User Guide | Page 8Qlik Analytics (ISR) Ltd.
-
Limitations 187
Amazon RDS for PostregSQL Source Data Types 188
Homogeneous Replication 192
Replication of Partitioned Tables 192
Data Type Considerations and Exceptions 192
Column and Table Collation 193
Setting General Connection Properties 193
SSL Authentication Options 195
Setting Advanced Connection Properties 195
Internal Parameters 196
Settings Summary 197
Removing Replicate Artifacts from the Amazon RDS for PostregSQL Database 197
Using ARC CDC Solutions in Attunity Replicate 199Prerequisites for Using ARC CDC Solutions 199
Additional Prerequisites when Using ARC Non-Relational Sources 200
ARC CDC Solution Security Considerations 201
Encrypting Communications Between Replicate and ARC Data Sources 201
Limitations 203
ARC Source Data Type Mapping 203
Working with ARC CDC Solutions 205
Create an ARC CDC Solution in Attunity Replicate Connect Studio 205
Add the ARC Data Source to Attunity Replicate 205
Add the ARC CDC Solution Endpoint to a Task 209
Setting Advanced Connection Properties 209
Internal Parameters 210
Settings Summary 210
Using a File as a Source 212General Overview 212
File Source Overview 213
Reference Files 213
Full Load Files 214
Change Files 215
Attunity Replicate Setup and User Guide | Page 9Qlik Analytics (ISR) Ltd.
-
Prerequisites 216
Limitations 216
Setting General Connection Properties 216
Defining Tables and Full Load Data 223
Setting Advanced Options 225
Internal Parameters 227
Settings Summary 227
Using Google Cloud SQL for MySQL as a Source 229Prerequisites 229
Attunity Replicate Server for Windows 230
Attunity Replicate Server for Linux 230
Google Cloud SQL for MySQL Replication 230
Verifying that Google Cloud SQL for MySQL is Set Up for CDC (Change Data Cap-ture) 231
Replicating 4-byte UTF8 Emojis 231
Limitations 231
Security Requirements 232
Data Types 232
Homogeneous Replication 235
Setting General Connection Properties 236
SSL Authentication Options 238
Selecting a Schema 238
Setting Advanced Connection Properties 239
Internal Parameters 239
Settings Summary 239
Using Google Cloud SQL for PostgreSQL as a Source 240Prerequisites 240
Required Permissions 241
Limitations 241
Supported Data Types 242
Homogeneous Replication 246
Replication of Partitioned Tables 246
Data Type Considerations and Exceptions 247
Attunity Replicate Setup and User Guide | Page 10Qlik Analytics (ISR) Ltd.
-
Column and Table Collation 247
Setting General Connection Properties 247
Setting Advanced Connection Properties 249
Internal Parameters 249
Settings Summary 249
Using Hadoop as a Source 250Prerequisites 250
Limitations 251
Required Permissions 251
Hadoop Endpoint Source Data Types 251
Unsupported Data Types 252
Setting General Connection Properties 252
Setting Advanced Connection Properties 258
Internal Parameters 259
Settings Summary 260
Using IBMDB2 for iSeries as a Source 261Prerequisites 261
Client 261
Change Processing 262
Required Permissions 263
Limitations 264
IBM DB2 for iSeries Database Source Data Types 265
Setting General Connection Properties 266
Setting Advanced Connection Properties 267
Overriding CCSID to Character Set Mapping 268
Adding the RRN Column to Target Tables 269
Replicating System Names 270
Skipping Journal Validation 270
Internal Parameters 270
Settings Summary 271
Using IBMDB2 for LUW as a Source 272Prerequisites 272
Attunity Replicate Setup and User Guide | Page 11Qlik Analytics (ISR) Ltd.
-
Client Prerequisites 272
IBM DB2 for LUW Server Prerequisites 274
Replicating 4-byte UTF8 Emojis 274
Limitations 275
IBM DB2 for LUW Database Source Data Types 276
Setting General Connection Properties 277
Setting Advanced Connection Properties 278
Internal Parameters 279
Settings Summary 279
Using IBMDB2 for z/OS as a Source 281Prerequisites 281
Install the R4Z Product on z/OS 282
ODBC Requirements 282
Required Permissions 283
Change Data Capture Requirements 283
Limitations 283
Handling Actions Resulting in Subtype 83 284
Controlling the CDC Process 285
Control Program Invocation Syntax 286
Control Program Completion Codes 287
Sample Jobs (in the INSTALL library) 288
Enabling the CDC Process (auto-activation) 288
Establishing R4Z CDC Services 289
IBM DB2 for z/OS Database Source Data Types 290
Setting General Connection Properties 292
Setting Advanced Connection Properties 294
Overriding CCSID to Character Set Mapping 294
Change Data Capture Properties 295
Setting Internal Parameters 297
R4Z Configuration Dependency on Host 298
Settings Summary 298
Sample XMIT Files “Receive” Job 299
Attunity Replicate Setup and User Guide | Page 12Qlik Analytics (ISR) Ltd.
-
Using IBM Informix as a Source 300Prerequisites 300
Limitations 301
Required Permissions 302
IBM Informix Database Source Data Types 302
Unsupported Data Types 303
Setting General Connection Properties 303
Setting Advanced Connection Properties 305
Internal Parameters 306
Settings Summary 306
Using IBM Netezza as a Source 307Prerequisites 307
IBM Netezza Data Types 307
Setting General Connection Properties 308
Setting Internal Parameters 310
Settings Summary 310
Setting Change Processing Parameters 310
Prerequisites 310
Limitations 311
Configuring Change Processing Settings 312
Using a Microsoft Azure SQL Managed Instance as a Source 313Prerequisites 314
Preparing the Microsoft Azure SQL Managed Instance Database for Replication 316
Limitations 319
Non-Supported Microsoft Azure SQL Managed Instance Security Features 320
Required Permissions 321
Supported Compression Methods 321
Microsoft Azure SQL Managed Instance Source Data Types 321
Non-Supported Data Types 325
Homogeneous Replication 325
Data Type Exceptions 326
Column and Table Collation 327
Attunity Replicate Setup and User Guide | Page 13Qlik Analytics (ISR) Ltd.
-
Setting General Connection Properties 328
Artifacts Created by Replicate in the Database 330
Using Microsoft SQL Server as a Source 330Supported Editions 331
Prerequisites 331
Limitations 334
Non-Supported Microsoft SQL Server Security Features 336
Working with Microsoft SQL Server AlwaysOn Availability Groups 336
Prerequisites 336
Configuring Replicate to Access the AlwaysOn Listener 337
Limitations 337
Accessing Backup Logs in AlwaysOn Availability Groups 338
Setting up a Non-Sysadmin User when Working with AlwaysOn AvailabilityGroups 338
Required Permissions 339
Setting up a Non-Sysadmin User 339
Supported Compression Methods 339
Microsoft SQL Server Source Data Types 340
Non-Supported Data Types 343
Homogeneous Replication 344
Data Type Exceptions 344
Column and Table Collation 345
Preparing the Microsoft SQL Server Database for Replication 346
Preparing Microsoft SQL Server Backup and Recovery 346
Setting up Microsoft SQL Server for Replication 347
Replicating Tables that do not have a Primary Key 347
Defining Microsoft SQL Server Database Settings 348
Working with Windows Authentication 349
Setting General Connection Properties 349
Setting Advanced Connection Properties 351
Internal Parameters 355
Settings Summary 355
Artifacts Created by Replicate in the Database 356
Attunity Replicate Setup and User Guide | Page 14Qlik Analytics (ISR) Ltd.
-
Using a MySQL-Based Database as a Source 357Prerequisites 358
General Prerequisites 358
Attunity Replicate Server for Windows 358
Attunity Replicate Server for Linux 359
Enable Binary Logging 359
Cluster Prerequisites 360
Replicating 4-byte UTF8 Emojis 361
Limitations 361
Security Requirements 362
MySQL Database Source Data Types 363
Homogeneous Replication 366
Setting General Connection Properties 367
SSL Authentication Options 368
Selecting a Schema 369
Setting Advanced Connection Properties 369
Internal Parameters 369
Settings Summary 370
Using ODBC to Connect to a Source 371Prerequisites 371
Attunity Replicate Server for Windows 371
Attunity Replicate Server for Linux 372
Limitations 373
ODBC Source Data Types 373
Setting General Connection Properties 378
Setting Advanced Connection Properties 380
Internal Parameters 380
Settings Summary 381
Using ODBC with CDC as a Source 382Prerequisites 382
Replicate Server for Windows 382
Replicate Server for Linux 383
Attunity Replicate Setup and User Guide | Page 15Qlik Analytics (ISR) Ltd.
-
Limitations 383
ODBC with CDC Source Data Types 384
Setting General Connection Properties 388
Setting Change Processing Parameters 390
Prerequisites 390
Limitations 392
Configuring Change Processing Settings 392
Using Oracle as a Source 394Supported Oracle Database Editions 395
Prerequisites 395
Limitations 396
Required Permissions 398
General Permissions 398
Access Privileges when using Oracle LogMiner to Access the Redo Logs 399
Access Privileges when using Attunity Log Reader to Access the Redo Logs 400
Required ASM Privileges 401
Supported Encryption Methods 402
Supported Compression Methods 402
Supported Standby Configurations 403
Redo Log Files - Access Method Guidelines 405
Handling Shrink Space Operations 405
Replicating Nested Tables 406
Prerequisites 406
Supported Nested Table Types 406
Limitations 407
How Nested Tables are Replicated 407
JOIN Statement Example 407
Oracle Source Data Types 408
Non-Supported Data Types 411
Homogeneous Replication 411
Preparing the Oracle Database for Replication 412
Provide Oracle Account Access 412
Ensure that ARCHIVELOG Mode is On 412
Attunity Replicate Setup and User Guide | Page 16Qlik Analytics (ISR) Ltd.
-
Setting up Supplemental Logging 412
Working with Oracle on Amazon RDS 415
Setting General Connection Properties 416
Setting Advanced Connection Properties 418
Setting Advanced Connection Properties Using Oracle LogMiner 418
Setting Advanced Connection Properties Using Attunity Log Reader 421
Finding the Wallet Entries used for TDE Encryption 429
Using PostgreSQL as a Source 431Source Prerequisites 431
Client Side 431
Server Side 433
Required Permissions 433
Using an Account without the "superuser" Role 434
Limitations 435
PostgreSQL Source Data Types 436
Homogeneous Replication 440
Replication of Partitioned Tables 440
Data Type Considerations and Exceptions 441
Column and Table Collation 441
Setting General Connection Properties 441
SSL Authentication Options 443
Setting Advanced Connection Properties 444
Internal Parameters 444
Settings Summary 445
Artifacts Created by Replicate in the Database 445
Using SAP Application as a Source 446Prerequisites 446
Supported SAP Packages 446
Set up a Source Endpoint for your SAP Application 447
Install the SAP NetWeaver RFC Client 447
Install the Attunity Replicate for SAP Client on the SAP Machine 447
The Installation Procedure 448
Attunity Replicate Setup and User Guide | Page 17Qlik Analytics (ISR) Ltd.
-
SAP Users for Replicate 448
Authorizations for Replicate 449
Importing the Data-file 450
Importing the Co-file 450
Managing Business Groups and Tables 453
Target Collation 455
Limitations 455
SAP Application Source Data Types 455
Setting General Connection Properties 457
Setting Advanced Properties 459
Internal Parameters 459
Settings Summary 459
Using SAP Application (DB) as a Source 461Prerequisites 461
Set up a Source Endpoint for your SAP Application (DB) 461
Install the Attunity Replicate for SAP Client on the SAP Machine 462
The Installation Procedure 462
SAP Users for Replicate 463
Authorizations for Replicate 463
Importing the Data-file 464
Importing the Co-file 465
Managing Business Groups and Tables 468
Target Collation 470
Limitations 470
SAP Application (DB) Source Data Types 470
Setting General Connection Properties 472
Setting Advanced Properties 473
Internal Parameters 473
Settings Summary 473
Using SAP HANA as a Source 474Prerequisites 475
Port 475
Attunity Replicate Setup and User Guide | Page 18Qlik Analytics (ISR) Ltd.
-
Required Clients 475
Change Processing 475
Limitations 476
Permissions 477
Supported Data Types 477
Unsupported Data Types 478
Setting General Connection Properties 478
Setting Advanced Properties 480
Trigger-based CDC 480
Log-based CDC 480
Internal Parameters 481
Settings Summary 481
Using SAP Sybase ASE as a Source 482Prerequisites 482
General Prerequisites 482
Replicate on Windows 483
Replicate on Linux 483
Limitations 483
Required Permissions 484
SAP Sybase ASE database Source Data Types 484
Non-Supported Data Types 486
Setting General Connection Properties 486
Setting Advanced Connection Properties 488
Internal Parameters 488
Settings Summary 489
Handling the Secondary Truncation Point 489
Using Teradata Database as a Source 490Prerequisites 490
Replicate Server for Windows 490
Replicate Server for Linux 490
Required Permissions 491
Teradata Source Data Types 492
Attunity Replicate Setup and User Guide | Page 19Qlik Analytics (ISR) Ltd.
-
Setting General Connection Properties 493
Setting Change Processing Parameters 494
Prerequisites 495
Limitations 496
Configuring Change Processing Settings 497
9 | Adding and Managing Target Endpoints 499Using Actian Vector as a Target 501Prerequisites 501
Actian Vector Windows Environment Prerequisites 502
Actian Vector Linux Environment Prerequisites 502
Limitations 502
Permissions 503
Actian Vector Data Types 503
Setting General Connection Properties 505
Setting Advanced Connection Properties 507
Internal Parameters 507
Settings Summary 507
Using Amazon EMR as a Target 507Prerequisites 508
Limitations 509
Change Data Partitioning on Amazon EMR 509
Amazon EMR Endpoint Target Data Types 510
Setting General Connection Properties 512
Setting Advanced Connection Properties 513
Internal Parameters 516
Settings Summary 516
Using Amazon Kinesis Data Streams as a Target 517Prerequisites 517
Transaction Processing by the Consumer 519
How it Works 520
Transaction Consistency from a Consumer Perspective 520
Limitations 521
Attunity Replicate Setup and User Guide | Page 20Qlik Analytics (ISR) Ltd.
-
Supported Data Types 521
Mapping from Attunity Replicate Data types to Avro 523
Setting General Connection Properties 524
Overriding the Default Settings 526
Setting Advanced Connection Properties 527
Internal Parameters 528
Settings Summary 528
The Attunity Envelope 528
Decoding a Self-Describing Message 530
Decoding a Message by Referenced Schema ID 530
Typical Consumer Logic 531
Metadata and Data Messages 531
Metadata Message 531
Data Message 532
Using Amazon Redshift as a Target 536Introducing the Amazon Redshift Target Endpoint for Attunity Replicate 536
Limitations 537
Amazon Redshift Database Prerequisites 537
Get Started with Amazon Redshift 537
Sign up for an Amazon S3 Bucket 538
Security 538
Amazon Redshift Data Types 539
Setting General Connection Parameters 541
Setting Advanced Connection Properties 543
Internal Parameters 544
Settings Summary 545
Using Amazon S3 as a Target 546Prerequisites 546
Amazon S3 Target Overview 548
DDL Handling 549
Limitations 549
Change Data Partitioning 549
Attunity Replicate Setup and User Guide | Page 21Qlik Analytics (ISR) Ltd.
-
Amazon S3 Target Data Types 550
Setting General Connection Properties 551
Setting Advanced Connection Properties 557
Internal Parameters 561
Settings Summary 561
Generating Reference Files 561
Content-Type and Content-Encoding Properties 562
Using a File as a Target 563File Target Overview 563
DDL Handling 565
Limitations 565
Change Data Partitioning 565
File Target Data Types 566
Setting General Properties 567
Setting Advanced Connection Properties 572
Internal Parameters 574
Settings Summary 575
Generating Reference Files 575
Using Google Cloud SQL for MySQL as a Target 577Prerequisites 577
General Prerequisites 577
Attunity Replicate Server for Windows 578
Attunity Replicate Server for Linux 578
Limitations 579
Security Requirements 579
Supported Data Types 579
Setting General Connection Properties 582
Setting Advanced Connection Properties 583
Internal Parameters 584
Settings Summary 584
Using Google Cloud SQL for PostgreSQL as a Target 585Prerequisites 585
Attunity Replicate Setup and User Guide | Page 22Qlik Analytics (ISR) Ltd.
-
Security Requirements 586
Google Cloud SQL for PostgreSQL Database Target Data Types 586
Data Types when Replicating from a PostgreSQL Source 588
Setting General Connection Properties 588
SSL Authentication Options 590
Setting Advanced Connection Properties 590
Internal Parameters 591
Settings Summary 591
Using Google Cloud Storage as a Target 592Prerequisites 592
Google Cloud Storage Target Overview 592
DDL Handling 593
Limitations 593
Data Types 593
Setting General Connection Properties 594
Setting Advanced Connection Properties 598
Internal Parameters 603
Settings Summary 603
Generating Reference Files 603
Using Google Dataproc as a Target 605Prerequisites 605
Limitations 606
Change Data Partitioning on Google Dataproc 606
Google Dataproc Endpoint Target Data Types 607
Setting General Connection Properties 608
Setting Advanced Connection Properties 609
Internal Parameters 612
Settings Summary 612
Using Hadoop as a Target 614Prerequisites 614
Prerequisites for using the Cloudera Distribution as a Hadoop Target 615
Prerequisites for using a Linux ODBC Driver 615
Attunity Replicate Setup and User Guide | Page 23Qlik Analytics (ISR) Ltd.
-
Limitations 616
Change Data Partitioning on Hadoop 617
Prerequisites 617
Security Requirements 617
Hadoop Endpoint Target Data Types 617
Setting General Connection Properties 619
Setting Advanced Connection Properties 625
Preventing ODBC Connection Timeouts 634
Internal Parameters 634
Settings Summary 635
Using Kerberos Authentication 635
Using Kerberos Authentication on Linux 635
Using Kerberos Authentication on Windows 636
Using Hortonworks Data Platform (HDP) as a Target 640Prerequisites 640
Prerequisites for using a Linux ODBC Driver 641
Limitations 641
Change Data Partitioning 642
Prerequisites 642
Security Requirements 642
HDP Endpoint Target Data Types 642
Setting General Connection Properties 644
Setting Advanced Connection Properties 652
Internal Parameters 655
Settings Summary 655
Using Kerberos Authentication 655
Using Kerberos Authentication on Linux 655
Using Kerberos Authentication on Windows 657
Using HP Vertica as a Target 660Prerequisites 660
Replicate Server for Windows 660
Replicate Server for Linux 660
Attunity Replicate Setup and User Guide | Page 24Qlik Analytics (ISR) Ltd.
-
Limitations 661
Security Requirements 661
HP Vertica Target Data Types 662
Setting General Connection Properties 663
Setting Advanced Connection Properties 664
Internal Parameters 664
Settings Summary 665
Using IBM Netezza as a Target 666Prerequisites 666
Limitations 667
Security Requirements 667
Database Privileges 667
Table Privileges 667
Schema Privileges 667
View Privileges 667
IBM Netezza Target Data Types 668
Setting General Connection Properties 669
Setting Advanced Connection Properties 670
Internal Parameters 671
Settings Summary 671
Using Kafka as a Target 672Transaction Processing by the Consumer 672
How it Works 673
Transaction Consistency from a Consumer Perspective 673
Prerequisites 674
Limitations 674
Kafka Target Data Types 675
Mapping from Attunity Replicate Data types to Avro 677
Setting General Connection Properties 678
Using Kerberos Authentication on Windows 686
Overriding the Default Settings 687
Setting Advanced Connection Properties 688
Attunity Replicate Setup and User Guide | Page 25Qlik Analytics (ISR) Ltd.
-
Internal Parameters 688
Settings Summary 689
The Attunity Envelope 689
Decoding a Self-Describing Message 690
Decoding a Message by Referenced Schema ID 691
Typical Consumer Logic 691
Metadata and Data Messages 692
Metadata Message 692
Data Message 693
Using a Log Stream Target 697
Using MapR Streams as a Target 698Transaction Processing by the Consumer 698
How it Works 699
Transaction Consistency from a Consumer Perspective 699
Prerequisites 700
Limitations 701
Supported Data Types 701
Mapping from Attunity Replicate Data types to Avro 703
Setting General Connection Properties 704
Overriding the Default Settings 706
Setting Advanced Connection Properties 707
Internal Parameters 708
Settings Summary 708
The Attunity Envelope 708
Decoding a Self-Describing Message 709
Decoding a Message by Referenced Schema ID 710
Typical Consumer Logic 710
Metadata and Data Messages 711
Metadata Message 711
Data Message 712
Using MemSQL as a Target 716Prerequisites 716
Attunity Replicate Setup and User Guide | Page 26Qlik Analytics (ISR) Ltd.
-
Attunity Replicate Server for Windows 716
Attunity Replicate Server for Linux 716
Limitations 717
Security Requirements 717
Supported Data Types 717
Setting General Connection Properties 720
Setting Advanced Connection Properties 721
Internal Parameters 722
Settings Summary 722
Using Microsoft APS PDW as a Target 723Prerequisites 723
Limitations 723
Security Requirements 724
Microsoft APS PDW Target Data Types 724
Setting General Connection Properties 725
Setting Advanced Connection Properties 726
Internal Parameters 726
Settings Summary 727
Using Microsoft Azure ADLS as a Target 728Prerequisites 728
Microsoft Azure ADLS Target Overview 729
DDL Handling 729
Limitations 729
Change Data Partitioning 730
Data Types 730
Setting General Connection Properties 732
Setting Advanced Connection Properties 737
Internal Parameters 742
Settings Summary 742
Generating Reference Files 742
Using Microsoft Azure Database for MySQL as a Target 744Prerequisites 744
Attunity Replicate Setup and User Guide | Page 27Qlik Analytics (ISR) Ltd.
-
General Prerequisites 744
Attunity Replicate Server for Windows 745
Attunity Replicate Server for Linux 745
Limitations 746
Security Requirements 747
Supported Data Types 747
Setting General Connection Properties 750
Setting Advanced Connection Properties 751
Internal Parameters 751
Settings Summary 752
Using Microsoft Azure Database for PostgreSQL as a Target 753Prerequisites 753
Security Requirements 754
Microsoft Azure Database for PostgreSQL Target Data Types 755
Data Types when Replicating from a PostgreSQL Source 756
Setting General Connection Properties 756
SSL Authentication Options 758
Setting Advanced Connection Properties 759
Internal Parameters 759
Settings Summary 759
Using Microsoft Azure Databricks as a Target 760Prerequisites 760
Limitations 761
Change Data Partitioning on Microsoft Azure Databricks 762
Supported Data Types 762
Setting General Connection Properties 763
Setting Advanced Connection Properties 765
Internal Parameters 767
Settings Summary 767
Using Microsoft Azure Event Hubs as a Target 768Prerequisites 768
Transaction Processing by the Consumer 769
Attunity Replicate Setup and User Guide | Page 28Qlik Analytics (ISR) Ltd.
-
How it Works 770
Transaction Consistency from a Consumer Perspective 770
Limitations 771
Supported Target Data Types 771
Mapping from Attunity Replicate Data types to Avro 773
Setting General Connection Properties 774
Overriding the Default Settings 776
Setting Advanced Connection Properties 777
Internal Parameters 778
Settings Summary 778
The Attunity Envelope 778
Decoding a Self-Describing Message 780
Decoding a Message by Referenced Schema ID 780
Typical Consumer Logic 781
Metadata and Data Messages 781
Metadata Message 781
Data Message 782
Using Microsoft Azure HDInsight as a Target 786Prerequisites 786
Limitations 787
Change Data Partitioning on Microsoft Azure HDInsight 788
Microsoft Azure HDInsight Endpoint Target Data Types 789
Setting General Connection Properties 791
Setting Advanced Connection Properties 792
Internal Parameters 794
Settings Summary 795
Using Microsoft Azure SQL Data Warehouse as a Target 797Overview 797
799
Limitations 799
Microsoft Azure SQL Data Warehouse Endpoint Prerequisites 799
Sign up for Microsoft Azure Blob Storage 799
Attunity Replicate Setup and User Guide | Page 29Qlik Analytics (ISR) Ltd.
-
Sign up for Microsoft Azure SQL Data Warehouse 800
Open the Required Firewall Port(s) 800
Install the Required Client 801
Microsoft Azure SQL Data Warehouse Data Types 801
Setting General Connection Properties 803
Setting Advanced Connection Properties 805
Internal Parameters 805
Settings Summary 806
Using Microsoft Azure SQL Database as a Target 807Prerequisites 807
Limitations 809
Permissions 810
Microsoft Azure SQL Database Target Data Types 810
Setting General Connection Properties 812
Setting Advanced Connection Properties 813
Internal Parameters 815
Settings Summary 815
Using Microsoft SQL Server as a Target 816Supported Editions 816
Prerequisites 817
Limitations 819
Permissions 819
Microsoft SQL Server Target Data Types 819
Setting General Connection Properties 822
Setting Advanced Connection Properties 824
Internal Parameters 826
Settings Summary 826
Using a MySQL-Based Database as a Target 827Prerequisites 827
General Prerequisites 828
Attunity Replicate Server for Windows 828
Attunity Replicate Server for Linux 828
Attunity Replicate Setup and User Guide | Page 30Qlik Analytics (ISR) Ltd.
-
Limitations 829
Security Requirements 830
Supported Data Types 830
Setting General Connection Properties 833
Setting Advanced Connection Properties 834
Internal Parameters 834
Settings Summary 834
Using ODBC to Connect to a Target 835ODBC Target Data Types 835
Setting General Connection Properties 837
Setting Advanced Connection Properties 839
Internal Parameters 839
Settings Summary 840
Using Oracle as a Target 841Prerequisites 841
Limitations 842
Security Requirements 842
Oracle Target Data Types 844
Setting General Connection Properties 847
Setting Advanced Connection Properties 849
Internal Parameters 849
Settings Summary 850
Using Pivotal Greenplum as a Target 851An Overview of the Pivotal Greenplum Target 851
Attunity Replicate Pivotal Greenplum Endpoint Architecture Overview 853
Full Load 853
CDC 853
Full Load 854
Applying Changes to the Pivotal Greenplum Target 854
Transactional Apply Mode 854
Batch-Optimized Apply Mode 855
Required Pivotal Greenplum Software, Environments 855
Attunity Replicate Setup and User Guide | Page 31Qlik Analytics (ISR) Ltd.
-
Windows Pivotal Greenplum Required Software 855
Linux Pivotal Greenplum Required Software 855
Required Pivotal Greenplum Configuration and Environment 856
Provide Pivotal Greenplum Account Access 856
Security Requirements 857
Limitations 857
Pivotal Greenplum Data Types 857
Setting up the gpfdist Program as a Service 859
Using Multiple gpfdist Programs 861
Setting General Connection Properties 861
Setting Advanced Connection Properties 863
Internal Parameters 864
Settings Summary 864
Using a PostgreSQL-Based Database as a Target 865Prerequisites 865
Security Requirements 867
PostgreSQL Database Target Data Types 867
Data Types when Replicating from a PostgreSQL Source 868
Setting General Connection Properties 868
SSL Authentication Options 870
Setting Advanced Connection Properties 871
Internal Parameters 871
Settings Summary 871
Using SAP HANA as a Target 872Prerequisites 872
Permissions 872
Supported Data Types 873
Setting General Connection Properties 874
Setting Advanced Connection Properties 875
Internal Parameters 875
Settings Summary 875
Using SAP Sybase ASE as a Target 876
Attunity Replicate Setup and User Guide | Page 32Qlik Analytics (ISR) Ltd.
-
Prerequisites 876
Limitations 877
Security Requirements 877
SAP Sybase ASE Database Target Data Types 877
Non-Supported Data Types 879
Setting General Connection Properties 879
Setting Advanced Connection Properties 880
Internal Parameters 881
Settings Summary 881
Using SAP Sybase IQ as a Target 882Prerequisites 882
Limitations 882
Security Requirements 882
SAP Sybase IQ Target Data Types 883
Setting General Connection Properties 884
Setting Advanced Connection Properties 885
Internal Parameters 885
Settings Summary 886
Using Snowflake on AWS as a Target 887Prerequisites 888
Amazon Web Services Account Prerequisites 888
Amazon S3 Staging Prerequisites 888
Client Prerequisites 888
General Prerequisites 889
Firewall Prerequisites 889
Snowflake on AWS Data Types 889
Setting General Connection Parameters 891
Setting Advanced Connection Properties 894
Internal Parameters 895
Settings Summary 895
Using Snowflake on Azure as a Target 896Prerequisites 896
Attunity Replicate Setup and User Guide | Page 33Qlik Analytics (ISR) Ltd.
-
Microsoft Azure Blob Storage Account 897
Client Prerequisites 897
Permissions 897
Firewall Prerequisites 897
Snowflake on Azure Data Types 897
Setting General Connection Parameters 900
Setting Advanced Connection Properties 901
Internal Parameters 901
Settings Summary 902
Using Teradata Database as a Target 903An Overview of the Teradata Database Target 903
Teradata Database Target Load Options 904
TPT Stream Mode 904
TPT Load Mode 904
Database Availability 904
Required Teradata Database Software, Environments 904
Replicate Server for Windows 905
Replicate Server for Linux 905
Providing Access to the Teradata Database 906
Editing the Hosts File 907
Security Requirements 907
Teradata Database Data Types 908
Setting General Connection Properties 911
Setting Advanced Connection Properties 913
Internal Parameters 914
Settings Summary 914
10 | Using the Attunity Replicate File Channel 915Setting Up Attunity Replicate File Channel Tasks 915Local Task 915
Remote Task 916
Replicating to Multiple Targets (Distribution) 916
Adding Tables to a Running Remote Task 917
Attunity Replicate Setup and User Guide | Page 34Qlik Analytics (ISR) Ltd.
-
Working with the File Channel Data Files 918File-Channel Directory Structure 918
Attunity Replicate Installation Requirements for the File Channel 920
Security 920
Limitations 921
Using the File Channel as a Source 921Setting General Connection Properties 921
Using Advanced Properties for a File-Channel Source 923
Internal Parameters 924
Settings Summary 924
Using the File Channel as a Target 924Setting General Connection Properties 924
Setting Advanced Connection Properties 926
Internal Parameters 927
Settings Summary 927
11 | Using the Log Stream 928Terminology 928
Overview 928The Flow 930
Step 1: Create a Log Stream Target Endpoint 930
Step 2: Create and Run a Log Stream Staging Task 932Log Stream Staging Limitations and Considerations 934
Step 3: Create a Replication Task to Transfer the Staged Data to theTarget 935Duplicate the Source Endpoint and Add it to the Log Stream Staging Task 936
Create the Replication Task using the Duplicated Source Endpoint 937
Replication Task Limitations and Considerations 939
12 | Customizing Tasks 940Table Settings 940Performing General Tasks for a Single Table/View 941
Attunity Replicate Setup and User Guide | Page 35Qlik Analytics (ISR) Ltd.
-
Defining Transformations for a Single Table/View 943
Limitations 943
Using the Transform Tab 945
Creating an Expression for Transformations 951
Using SQLite Syntax with Transformations 952
Using Filters 953
Filter Limitations 953
Opening the Filter Tab 954
Creating a Filter Condition for a Specified Column 955
Creating a Record Selection Condition for One or More Columns 956
Adding or Removing Filter Ranges 958
Using SQLite Syntax with Filtering 960
Parallel Load 961
Supported Endpoints 961
Setting Up Parallel Load 962
Usage Example 963
Adjusting the Number of Segments that can be Loaded in Parallel 965
Handling LOB Columns 966
Message Format 970
Defining Global Transformations 971Limitations for Global Transformations 972
Starting the New Transformation Rule Wizard 972
Selecting the Transformation Type 972
Under what Conditions to Transform 975
Defining the Transformation Rule 978
Limitations for Transformation Rules 979
Rename Schema 979
Rename schema to (string) 979
Add a Prefix or Suffix 980
Remove a Prefix or Suffix 980
Replace a Prefix or Suffix with Different Characters 981
Convert Schema Name to Uppercase 982
Convert Schema Name to Lowercase 982
Attunity Replicate Setup and User Guide | Page 36Qlik Analytics (ISR) Ltd.
-
Rename Schema (Expression) 983
Change Table Tablespace 984
Change Index Tablespace 984
Rename Table 984
Rename table to (string) 984
Add a Prefix or Suffix 985
Remove a Prefix or Suffix 985
Replace a Prefix or Suffix with Different Characters 986
Convert table name to uppercase 986
Convert table name to lowercase 987
Rename table (expression) 987
Rename Column 988
Rename column to (string) 988
Add a Prefix or Suffix 988
Remove a Prefix or Suffix 989
Replace a Prefix or Suffix with Different Characters 989
Convert column name to uppercase 990
Convert column name to lowercase 990
Rename Column (expression) 990
Add Column 991
Drop Column 992
Convert Data Type 992
Rename Change Table 992
Rename Change Table to (string) 993
Add a Prefix or Suffix 993
Remove a Prefix or Suffix 993
Replace a Prefix or Suffix with Different Characters 994
Convert Change Table Name to Uppercase 995
Convert Change Table Name to Lowercase 995
Rename Change Table (expression) 995
Rename Change Table Schema 996
Rename Change Table Schema to (string) 996
Add a Prefix or Suffix 996
Attunity Replicate Setup and User Guide | Page 37Qlik Analytics (ISR) Ltd.
-
Remove a Prefix or Suffix 997
Replace a Prefix or Suffix with Different Characters 998
Convert Change Table Schema Name to Uppercase 998
Convert Change Table Schema Name to Lowercase 999
Rename Change Table schema (expression) 999
Viewing all Global Transformation Rules 1000
Edit a Global Transformation Rule 1000
Delete a Global transformation Rule 1000
Using the Expression Builder (for Filters, Transformations, and GlobalTransformations) 1001Overview of the Expression Builder 1001
Build an Expression 1003
Operator toolbar 1004
Parse an Expression 1004
Test an Expression 1005
Using Elements in the Expression Builder 1007
Columns (Transformations and Filters only) 1007
Metadata (Global Transformations Only) 1007
Headers 1008
Variables 1009
Operators 1009
Functions 1015
Data Enrichment Functions 1020
Data Enrichment Example 1023
User-Defined Transformations 1027
Task Settings 1030Metadata 1031
Target Metadata 1031
Control Tables 1035
Bidirectional 1037
Full Load 1037
Full Load Settings 1037
Full Load Tuning 1040
Attunity Replicate Setup and User Guide | Page 38Qlik Analytics (ISR) Ltd.
-
Change Processing 1041
Apply Changes Settings 1041
Store Changes Settings 1042
Change Processing Tuning 1047
Error Handling 1051
Error Handling Settings 1052
Environmental Errors 1052
Data Errors 1053
Table Errors 1054
Apply Conflicts 1055
Logging 1057
Storing Trace and Verbose Logging in Memory 1057
Character Substitution 1058
File Uploads 1060
Message Format 1062
General Rules and Usage Guidelines 1062
Defining a Custom Message Format 1064
13 | Working with Tasks at Runtime 1067Running a Task 1067How to Run a Task 1067
Using the Run Button Options 1068
Start Processing 1069
Reload Target 1069
Using Advanced Run Options 1070
Recovering from Data Folder Loss or Corruption 1074
Setting Up and Initiating Task Recovery 1074
Viewing the Task Status 1075
Reading Messages about a Task 1076Viewing Notifications 1077
Using the Notifications List 1077
View Log Messages for a Task 1078
Using the Log Messages List 1078
Attunity Replicate Setup and User Guide | Page 39Qlik Analytics (ISR) Ltd.
-
Viewing the Log file in the Log Viewer 1079
14 | Monitoring and Controlling Replication Tasks 1080Viewing Information in the Monitor 1080
Monitoring Full-Load Operations 1080General Information for a Full Load 1081
Detailed Information for the Full Load 1082
General Information for a Completed Task 1082
Information for Each Table in the Task 1083
Information for Tables that have Completed Loading 1084
Information for Tables that are Currently Loading 1085
Information for Tables that are in the Loading Queue 1087
Information for Tables with Errors 1087
Monitoring Throughput in a Full Load Operation 1088
Monitoring Change Processing Operations 1089General Change Processing Information 1089
Detailed Change Processing Information 1091
Information about Incoming Changes 1092
Information about Applied Changes 1093
Information about Change Processing Throughput 1095
Information about Apply Latency 1097
Viewing Messages 1099
Using the Monitor Tools 1099Viewing History Information 1100
Setting the Task Logging Level 1101
Storing Trace and Verbose Logging in Memory 1102
Viewing the Task Log Files and Manually Rolling them Over 1102
Viewing and Downloading the Task Log Files 1102
Manually Rolling Over Task Log Files 1103
Deleting Log Files 1104
Downloading a Memory Report 1104
Downloading a Diagnostics Package 1105
Attunity Replicate Setup and User Guide | Page 40Qlik Analytics (ISR) Ltd.
-
15 | Attunity Replicate Server Settings 1106Notifications Settings 1106Defining Notifications 1107
Creating a New Notification 1108
Define the Recipients 1122
Define the Notification Message 1123
The Notifications List 1127
Editing a Notification 1128
Deleting a Notification 1129
Setting up Mail Parameters 1129
Creating a Default Recipient List 1130
Replicate Event IDs in Windows Event Log 1130
License Settings 1131Requesting a License 1132
Using the Advanced License Request Option 1134
Registering a License 1135
Viewing a License 1137
Global Error Handling 1138
Logging 1138Setting Logging Levels for the Server and File Transfer Service 1139
Storing Trace and Verbose Logging in Memory 1140
Setting Automatic Roll Over and Cleanup 1140
Automatic Rollover 1140
Automatic Cleanup 1141
Viewing and Downloading Log Files 1142
Manually Rolling Over the Log Files 1142
Deleting Server, Task and FTS Log Files 1142
File Transfer Service 1143How it Works 1143
Compression 1144
Encryption 1144
Defining a File Transfer Service 1144
Attunity Replicate Setup and User Guide | Page 41Qlik Analytics (ISR) Ltd.
-
Editing a File Transfer Service 1145
Deleting a File Transfer Service 1145
Scheduling Jobs 1146
User Permissions 1148Managing User Permissions 1150
Resource Control 1151Disk Space 1152
System Memory 1152
A | Using Change Tables 1154Working with Change Tables 1154
Reading the Change Tables 1156Change Tables 1156
Use Example 1160
B | Using an Audit Table 1162
C | Creating Dump Files 1166
D | Pivotal Greenplum Prerequisites for Attunity Replicate 1167Required Pivotal Greenplum Software Environments 1167Windows Pivotal Greenplum Required Software 1167
Linux Pivotal Greenplum Required Software 1167
Required Pivotal Greenplum Configuration and Environment 1168Collect Connection Information 1168
Create a Test Input File 1169
Create an SQL Script File 1169
Start gpfdist 1169
Run the SQL Script 1170
Troubleshooting gpfdist Issues 1171Did gpfdist start on the correct port or protocol? 1171
Can Pivotal Greenplum reach gpfdist? 1171
Attunity Replicate Setup and User Guide | Page 42Qlik Analytics (ISR) Ltd.
-
E | Setting up Attunity Replicate in a Cluster Environment 1173Setting up Attunity Replicate in a Windows Server Cluster (HA) 1173Step 1: Install Attunity Replicate in the Cluster 1173
Step 2: Add the Attunity Replicate Services 1175
Step 3: Define the Dependencies for Each Service 1175
Step 4: Enable Different Console Configurations in a High Availability Environment1176
Setting up Attunity Replicate in a Linux Cluster 1177
F | Control Tables 1178Apply Exceptions 1178
Replication Status 1179
Suspended Tables 1181
Replication History 1181
Change Data Partitions 1182
DDL History 1183
G | Using HP NonStop SQL/MP as an ODBC Target 1187Prerequisites 1187
Table Settings 1189
Task Setting Limitations 1190
H | Impact of DST Change on Attunity Replicate 1191
I | Metadata File Description 1194
J | Supported Platforms and Endpoints 1198Supported Platforms 1198
Supported Windows Platforms 1198
Supported Linux Platforms 1198
Supported Source Endpoints 1200
Supported Target Endpoints 1205
Endpoints Supported in Bidirectional Replication 1209
Attunity Replicate Setup and User Guide | Page 43Qlik Analytics (ISR) Ltd.
-
Supported Browsers 1209
K | Best Practices when Working with Oracle ASM 1211The "Copy redo logs to temporary folder" Method 1211
Oracle Permissions Required for the Attunity Log Reader and the"Copy redo logs to temporary folder" Options 1212
Permissions for Deleting the Processed Redo logs from the Tem-porary Folder 1213
Oracle ASM Access Permissions 1213
Setting up the File Share if the "Direct Access" option was chosen 1214
Configuring the "Copy to Temp Folder" Option in Replicate 1214
Additional Considerations 1215Security and Folder Location 1215
Multiple Tasks Using the Same Temporary Folder 1215
Temporary Folder Disk Usage 1216
L | Replicate Loggers 1217ADDONS 1218
ASSERTION 1218
COMMON 1218
COMMUNICATION 1218
DATA_RECORD 1218
Example 16 - Example 1218
DATA_STRUCTURE 1220
FILE_FACTORY 1220
FILE_TRANSFER (AKA CIFTA) 1220
INFRASTRUCTURE 1220
IO 1220
Example 17 - Example: 1220
METADATA_CHANGES 1220
METADATA_MANAGER 1221
PERFORMANCE 1221
REST_SERVER 1221
Attunity Replicate Setup and User Guide | Page 44Qlik Analytics (ISR) Ltd.
-
SERVER 1221
SORTER 1221
SORTER_STORAGE 1221
SOURCE_CAPTURE 1222
SOURCE_LOG_DUMP 1222
SOURCE_UNLOAD 1222
STREAM 1222
STREAM_COMPONENT 1223
Example 18 - Example 1223
TABLES_MANAGER 1223
TARGET_APPLY 1223
TARGET_LOAD 1223
TASK_MANAGER 1223
TRANSFORMATION 1224
Example 19 - Example: 1224
UTILITIES 1224
M | Replicate Add-ons API 1225Memory Management Methods 1226create_pool 1226
destroy_pool 1226
clear_pool 1227
calloc 1227
get_ctx_pool 1228
get_ctx 1228
set_ctx 1229
Log Management Methods 1230log_error 1230
log_warning 1230
log_trace 1231
Attunity Replicate Setup and User Guide | Page 45Qlik Analytics (ISR) Ltd.
-
Glossary 1232
Index 1233
Attunity Replicate Setup and User Guide | Page 46Qlik Analytics (ISR) Ltd.
-
1 | IntroductionThis section describes the main concepts of data replication and the major components ofAttunity Replicate.
Note The term "endpoint" is used generically throughout this guide to refer to a datarepository that can be used as a source and/or target in an Attunity Replicate task.Examples of such repositories include relational databases (such as Oracle) and files.
In this chapter:
▶ Replication Explained
▶ Attunity Replicate
▶ Limitations and Considerations
▶ System Architecture
▶ Replication Tasks
▶ Full Load and CDC Processes
▶ Replication Topologies
Replication ExplainedReplication is a process that keeps two or more collections of computerized informationidentically synchronized. It facilitates:
Load reduction: Keeping a complete or partial copy of a collection on a differentserver reduces the load on the main server.
Improved service: Accessing a copy of the data can provide better service to usersthan having them access the original data..
Restricted data access: If some users should only have access to a subset of data,replicating only part of a collection makes it easy to enforce security restrictions.
Geographic distribution: Making only a subset of data relevant to a specific node(or location) available is beneficial in widely distributed enterprises (such as a chain ofretail stores or warehouses). You can still make all data available at a central locationfor less frequent use.
Attunity Replicate 6.4 Setup and User Guide
Chapter 1 | Introduction | Page 47Qlik Analytics (ISR) Ltd.
-
Disaster Recovery: Keeping a copy of the main data available allows for setting uprapid fail-over clusters (the capability to switch over to a redundant or standbycomputer server in case the main system fails).
"Cloud" computing: Replicating data allows for implementing what is commonlyknown as cloud computing (the on-demand storage, management, and processing ofInternet-based data).
The information replicated is stored as files or in a database. In the case of files, thestructure and content of a file are known only to the specialized programs that use the file.Databases are managed by database management systems (DBMS) that make use ofstandardized descriptions of the structure of the information (such as tables, columns,rows, and data types). These descriptions are known collectively as metadata and allow ageneral-purpose replicator to carry out relevant operations (for example filtering and datatransformations) without the need to know anything about the contents or “meaning” of thedata. Because file systems do not contain metadata, operations available for replicationare more limited.
During replication, a collection of data is copied from system A to system B, where A isknown as the source (for this collection) and B is known as the target. A system can be asource, a target, or both (with certain restrictions). A complex replication topology has anumber of sources, targets, and data collections defined.
The replication process must account for the fact that source data may be changing whilebeing copied. It is not possible to make or maintain copies instantaneously and to stop thesource computer to “freeze” the information. Therefore, replication must account for:
Integrity: The target data must reflect the complete result of all changes made to thesource data during the replication process.
Consistency: If a change affects different tables, rows, or files, the copy must reflectthese changes consistently across all affected tables, rows, or files.
Latency: The replication process must aim at keeping latency at a minimum. Ideally,it should not exceed a few seconds.
Attunity ReplicateAttunity Replicate is a simple, powerful, easy-to-implement solution that providesreplication between various endpoints. Replicate lets you:
Load data efficiently and quickly to operational data stores/warehouses.
Create copies of production endpoints.
Distribute data across endpoints.
Chapter 1 | Introduction | Page 48Qlik Analytics (ISR) Ltd.
Attunity Replicate 6.4 Setup and User Guide
-
Replicate has high throughput, speed, and scale. It is designed to scale and support largescale enterprise data replication scenarios with a multi-server, multi-task, and multi-threaded architecture.
Replicate consists of a Web-based console and a replication server to replicate data acrossheterogeneous data sources. It provides users with instant visibility into current andhistorical exceptions, status, performance, and resource usage information.
Replicate can execute replication tasks between enterprise endpoints including Oracle,Microsoft SQL Server, and IBM DB2. It uses a "Click-2-Replicate" design that simplifies thereplication process by automating the steps required to build a replication solution.
When you run a task in Replicate, you can select between:
Full Load Replication: Creates files or tables at the target endpoint, automaticallydefines the metadata that is required at the target, and populates the tables with datafrom the source
Change Processing, also called Change Data Capture (CDC): Captures changes in thesource data or metadata as they occur and applies them to the target endpoint as soonas possible in near-real time
Replication is log based, which means that it reads only the changes. This reduces theimpact on the source endpoints.
Limitations and ConsiderationsWhen working with Attunity Replicate, the following limitations apply:
Replicate does not support replication of Primary Keys that are LOB data types.
When replicating a table which has no Primary Key on the source endpoint, LOBcolumns are removed from the table at the target endpoint as no Unique Index columnis created in the source table.
When the Limit LOB size to option is enabled, replication of structured data LOBs (e.g.XML, JSON, IMAGE, etc.) may truncate (and thereby invalidate) the structured data inthe target LOB.
In Batch Optimized Apply mode, if the target table has more columns than the sourcetable, any values in the extra columns will be replaced with NULL.
The workaround is to create two tasks. One task for the target table(s) with extracolumns and the other task for the source table(s) which have the same number ofcolumns as the target tables. Then, run the task for the target table(s) with extracolumns in Transactional Apply mode and run the other task (where the target tables
Chapter 1 | Introduction | Page 49Qlik Analytics (ISR) Ltd.
Attunity Replicate 6.4 Setup and User Guide
-
do not have extra columns) in Batch Optimized Apply mode. Note, however, thatupdating large tables in Transactional Apply mode may impact performance.
When Replicate creates a new table in the target endpoint, it defines only one index onthe table. The index will either be the Primary Key or the first Unique Key (accordingto alphabetical order) of the table. No other indexes will be defined in the target. Ifadditional indexes are required, these will need to be defined manually.
If a Unique Index/Primary Key in any of the source tables contains NULL values inmultiple rows, UPDATE and DELETE operations on one of the rows will UPDATE/DELETE all of the target rows (in the Unique Index/Primary Key) that have a NULLvalue.
LOB columns are always created as nullable on the target database. If you create thetarget table(s) manually, then you must set all LOB columns to nullable.
If you stop a task after Full Load completes, perform some changes on the sourcetables, and later resume the task from timestamp (by selecting the Start processingchanges from run option), some changes may not be replicated to the target. Thisusually only happens if the transaction logs in the source database have been deleteddue to a log purge policy. In this case, Replicate will resume the task from the lastchange in the current transaction log.
When replicating tables without a Primary Key, there is no way to verify whether arecord already exists on the target. This may result in data inconsistency whenUPDATE and DELETE operations are performed on the target database.
Replication of calculated values is not supported during Change Processing.
If a task fails with a recoverable error on the target while it is starting, it will not readchanges from the source.
Cached changes may be duplicated in a target table that does not have a UniqueIndex.
A unique index consisting of several ascending and descending columns will always bereplicated to the target as ascending columns. In other words, the descending columnswill become ascending columns.
When the source table contains an identity column, Replicate does not create theidentity column on the target table. In this case, the table will need to be createdmanually on the target endpoint.
Replication of tables with the same name as any of the Replicate Control tables is notsupported. For a list of the Control Table names, see Control Tables.
Chapter 1 | Introduction | Page 50Qlik Analytics (ISR) Ltd.
Attunity Replicate 6.4 Setup and User Guide
-
CREATE TABLE operations performed on the source while a task is stopped will beapplied to the target when the task is resumed, but will not be recorded as a DDL inthe attrep_ddl_history Control Table.
System ArchitectureThe following diagram shows the basic architecture of Attunity Replicate.
Figure 1.1 | Attunity Replicate System Architecture
In this diagram, the source data and metadata are part of the source server. Thetransaction log reader can be on the source server (for efficiency) or on the AttunityReplicate server (for zero footprint on the source). Filtering and compression of the sourcerows/logs can occur on the source or Attunity Replicate servers.
In the initial load process, Attunity Replicate reads a filtered stream of rows (with relevantcolumns only) and passes them to the transformation process for further filtering andsubsequent writing to the target endpoint (in the expected output format).
The CDC process obtains a stream of filtered events or changes in data or metadata fromthe transaction log file. It then buffers all changes for a given transaction into a single unitbefore forwarding them to the target when the transaction commits. During the initial loadprocess, CDC also buffers all changes that occur within a transaction until all affectedtables have been loaded.
Chapter 1 | Introduction | Page 51Qlik Analytics (ISR) Ltd.
Attunity Replicate 6.4 Setup and User Guide
-
The Designer/Console server, which is part of the Replication server, is a Web-basedapplication that serves as the user interface for dealing with designing or modifying thereplication system and displaying and controlling its operation.
Replication TasksEach instance of a table synchronization activity comprises a task in Attunity Replicate. Youdefine a task using the browser-based Attunity Replicate Console. When defining a task,you specify:
The source and target endpoints
The source and target tables to be kept in sync
The relevant source table columns
The filtering conditions (if any) for each source table as Boolean predicates (in SQLitesyntax) on the values of one or more source columns
The target table columns (optionally), including their data types and values (asexpressions or functions over the values of one or more source or target columns,using SQL syntax). If not specified, Replicate uses the same column names and valuesas the source tables, with default mapping of the source DBMS data types onto thetarget DBMS data types. Replicate automatically takes care of the required filtering,transformations, and computations during the Load or CDC execution.
When a task is defined, you can activate it immediately. Replicate automatically createsand loads the target tables with the necessary metadata definitions and activates the CDC.Using the Attunity Replicate Console, you can then monitor, stop, or restart the replicationprocess.
Using Multiple TasksYou can define and activate several replication tasks at once. This is best if the tasks:
Have different source tables
Share some source tables but have different filtering conditions on the source rows
Update different target tables
Updating the same target table and row by two different replication tasks would not begood practice and may cause unpredictable results.
The different replication tasks work independently and run concurrently. Each has its ownInitial Load, CDC, and Log Reader processes.
Chapter 1 | Introduction | Page 52Qlik Analytics (ISR) Ltd.
Attunity Replicate 6.4 Setup and User Guide
-
Full Load and CDC ProcessesThe full load process creates files or tables at the target endpoint, automatically definesthe metadata that is required at the target, and populates the tables with data from thesource. Unlike the CDC process, the full load process loads the data one entire table or fileat a time, for maximum efficiency.
The source tables may be subject to update activity during the Load process. However,there is no need to stop processing in the source. Replicate automatically starts the CDCprocess as soon as the load process starts. It does not apply the changes to the target untilafter the load of a table completes because the data on the target might not be consistentwhile the load process is active. At the conclusion of the load process, however, Replicateguarantees consistency and integrity of the target data.
If the load process is interrupted, it continues from wherever it stopped when restarted.
You can add new tables to an existing target without reloading the existing tables.Similarly, you can add or drop columns in previously populated target tables withoutreloading.
The CDC process captures changes in the source data or metadata as they occur andapplies them to the target endpoint as soon as possible in near real time. It captures andapplies the changes as units of single committed transactions and can update severaldifferent target tables as the result of a single source commit. This guaranteestransactional integrity in the target endpoint. The CDC process for any file or table starts assoon as the data load process for the file or table begins.
CDC operates by reading the recovery log file of the source endpoint management systemand grouping together the entries for each transaction. The process employs techniquesthat ensure efficiency without seriously impacting the latency of the target data. If the CDCprocess cannot apply the changes to the target within a reasonable amount of time (forexample when the target is not accessible), it buffers the changes on the Replication serverfor as long as necessary. There is no need to re-read the source DBMS logs, which maytake a long time.
Replication TopologiesAttunity Replicate supports the following topologies for replication tasks:
One to One
Logical Independence
Hub and Spoke
Chapter 1 | Introduction | Page 53Qlik Analytics (ISR) Ltd.
Attunity Replicate 6.4 Setup and User Guide
-
One to OneIn a one-one topology, there is one source and one target endpoint. When the source andtarget endpoints are distinct, Attunity Replicate guarantees transactional integrity andconsistency. If you use two different replication tasks, the endpoints may switch roles,allowing two-way synchronization.
Caution: If the same row in a table is updated by two different replication tasks, theresult of two-way synchronization may be unpredictable. A problem can occur even iftwo different rows are referentially related, that is if some application updates a rowbased on reading a value in a different row. If the rows are updated concurrently on thesource and the target, the result may be unpredictable1 . Such occurrences are rare,but they can occur.
Logical IndependenceTwo-way replication works best when updates of a row on a source and on a target areentirely autonomous and do not affect each other. There is an assumption that any table ora horizontal or vertical segment of a partitioned table can only be updated in one source.Attunity Replicate allows updating the same row in several places, but in this case, thecolumns being updated must be distinct. Another assumption is that if a data value in onerow depends on or is derived from a value in another row, the values can be changed onlyon the same server but nowhere else (except by the Replicator). This is called logicalindependence. With logical independence, concurrent update conflicts cannot occur duringreplication.
Hub and SpokeMany-to-one and one-to-many relationships can be combined into a hub-and-spoketopology, which allows the merging of data into multiple targets and then distributing toother targets. It does not allow cycles or multiple paths for propagating changes. The hub-and-spoke topology is that of an acyclic directed graph.
1CDC has no way of knowing exactly when a row was read by an application on one system relative to its havingbeen changed on another system. Read operations are typically not logged.
Chapter 1 | Introduction | Page 54Qlik Analytics (ISR) Ltd.
Attunity Replicate 6.4 Setup and User Guide
-
2 | Installing Attunity ReplicateThis section describes how to prepare your system for Attunity Replicate, how to installAttunity Replicate, and how to access the Attunity Replicate Console.
Important: To work, Attunity Replicate needs to be set up with the proper securityconfiguration. It is therefore strongly recommended to review Security Considerationsbefore using the product for the first time.
In this chapter:
▶ Installation Prerequisites
▶ Installing or Upgrading Attunity Replicate on Windows
▶ Installing Attunity Replicate on Linux
Installation PrerequisitesThis section describes how to prepare your system to use Attunity Replicate. Therequirements differ according to the platform on which you want to install AttunityReplicate and according to the desired Attunity Replicate UI Server configuration. For moreinformation on the available UI Server configurations, see Attunity Replicate UI ServerConfigurations.
Software Requirements
Supported Endpoints
Software RequirementsThis section describes what software is required to work with Attunity Replicate.
Windows Software Requirements
Linux Software Requirements
Attunity Replicate 6.4 Setup and User Guide
Chapter 2 | Installing Attunity Replicate | Page 55Qlik Analytics (ISR) Ltd.
-
Windows Software RequirementsTo install the Attunity Replicate Server and Console on a Windows computer, you musthave the following installed on your system:
.NET Framework 4.5.2 or above
Visual C++ Redistributable for Visual Studio 2015. If it is not installed or if an olderversion is installed, it will be installed automatically during installation.
TLS v1.2 needs to be fully installed and configured prior to installing Replicate on aWindows 2016 Server.
For a list of supported browsers, see Supported Browsers.
For a list of supported operating systems, see Supported Platforms.
Linux Software RequirementsFor a list of supported Linux operating systems, see Supported Linux Platforms.
Windows PermissionsAttunity Replicate needs to be installed as an Administrator.
The following privileges are required to start the Attunity Replicate UI Server service(which is run as a local system service), but are dropped as soon as the service is started:
SE_CREATE_GLOBAL_NAME
SE_CREATE_PAGEFILE_NAME
SE_CREATE_PERMANENT_NAME
SE_CREATE_SYMBOLIC_LINK_NAME
SE_CREATE_TOKEN_NAME
SE_DEBUG_NAME
SE_ENABLE_DELEGATION_NAME
SE_IMPERSONATE_NAME
SE_INC_BASE_PRIORITY_NAME
SE_INCREASE_QUOTA_NAME
SE_INC_WORKING_SET_NAME
SE_LOAD_DRIVER_NAME
SE_LOCK_MEMORY_NAME
SE_MACHINE_ACCOUNT_NAME
SE_MANAGE_VOLUME_NAME
SE_PROF_SINGLE_PROCESS_NAME
Chapter 2 | Installing Attunity Replicate | Page 56Qlik Analytics (ISR) Ltd.
Attunity Replicate 6.4 Setup and User Guide
-
SE_RELABEL_NAME
SE_REMOTE_SHUTDOWN_NAME
SE_RESTORE_NAME
SE_SECURITY_NAME
SE_SHUTDOWN_NAME
SE_SYNC_AGENT_NAME
SE_SYSTEM_ENVIRONMENT_NAME
SE_SYSTEM_PROFILE_NAME
SE_SYSTEMTIME_NAME
SE_TAKE_OWNERSHIP_NAME
SE_TCB_NAME
SE_TIME_ZONE_NAME
SE_TRUSTED_CREDMAN_ACCESS_NAME
SE_UNDOCK_NAME
In addition, the account that runs Replicate needs to be granted access to the Datadirectory (~\Attunity\Replicate\Data) as well as any directory containing files (such as CSVfiles) that need to be used in a replication task.
Recommended Hardware ConfigurationThis section describes the recommended hardware configurations for using AttunityReplicate. For information on the software requirements for using Attunity Replicate, seeSoftware Requirements.
The following table describes the recommended hardware configuration for installingAttunity Replicate on Windows and Linux operating systems. Note that therecommendations apply to mid-scale systems (i.e. hundreds of tasks) rather than large-scale systems (i.e. thousands of tasks).
Chapter 2 | Installing Attunity Replicate | Page 57Qlik Analytics (ISR) Ltd.
Attunity Replicate 6.4 Setup and User Guide
-
BasicSystem
LargeSystem
Extra-LargeSystem
Notes:
Processor Quadcore
Quadcorebase
Dual-core pertask
8-corebase
Quadcore pertask
Additional cores are useful in any of thefollowing situations:
Many tasks running in parallel
Full-load performance priority
Multiple full-load processes running inparallel
Memory 8 GB 32 GB 64 GB More memory is useful in any of thefollowing situations:
Many tasks running in parallel
Long-running transactions on thesource endpoint (for example,monthly batch processing)
Many active users on the sourcesystem
Table 2.1 | Recommended Hardware Configuration
Chapter 2 | Installing Attunity Replicate | Page 58Qlik Analytics (ISR) Ltd.
Attunity Replicate 6.4 Setup and User Guide
-
BasicSystem
LargeSystem
Extra-LargeSystem
Notes:
Diskrequirements
320 GB
7200RPM
500 GB
10,000RPM
RAID
500 GB
15,000RPM
RAID
A faster disk is useful in any of thefollowing situations:
Using a file-based target, such asGreenplum or Actian Vector
Long-running source transactions thatmay not fit into memory
Using tasks that are set up to continueprocessing during target outage
A larger disk is required in any of thefollowing situations:
Using tasks that are set up to continueprocessing during target outage
Very large source transactions that donot fit into memory
RAID is recommended for systemrecoverability in case of disk failure for allconfigurations.
Network 1 Gb 10 Gb Two 10Gb
Table 2.1 | Recommended Hardware Configuration (Cont.)
Supported EndpointsTo replicate data using Attunity Replicate, you must be sure to have a supported version ofthe endpoint you are working with available. For information about the endpoints you canuse with Attunity Replicate, see Supported Platforms and Endpoints.
Installing or Upgrading Attunity Replicate on WindowsThe following topic describes how to install and upgrade Replicate on Windows using thesetup wizard.
Chapter 2 | Installing Attunity Replicate | Page 59Qlik Analytics (ISR) Ltd.
Attunity Replicate 6.4 Setup and User Guide
-
Installation InstructionsInstall Attunity Replicate using the AttunityReplicate__X64.exeinstallation kit. This kit runs on Windows 64-bit (x64) environments. For a list of theWindows versions supported by Attunity Replicate, see Windows Software Requirements.
Follow the instructions in the Setup wizard to install Attunity Replicate.
Later, if you need to start or stop the Attunity Replicate Server, see the following section:Starting and Stopping the Attunity Replicate Server on Windows
Note In the setup wizard’s Replication Server Location screen, one of the optionsis Connect to a remote Linux Attunity Replicate Server. You should only selectthis option if you have already installed Attunity Replicate Server on a Linux machine. Ifyou select this option, you will be prompted for the IP address and port number of theLinux machine in the following screen.
For more information on installing Attunity Replicate Server on Linux, see Installing
Attunity Replicate on Linux.
For information on the possible deployment configurations, see Attunity Replicate UI
Server Configurations.
All of the data that is created when you use Attunity Replicate is stored in a directory calleddata. By default, this directory is located in the installation directory where you installAttunity Replicate. If you want to create the data directory in a different location, selectthis option in the installation wizard.
If you elect to create the data directory in a different location, all command line actionsmust include the -d your_data_directory_path parameter where your_data_directory_path is the location of the "data" directory.
Upgrade Instructions
1. Choose one of the backup methods below.
Method 1:
Stop all Replicate tasks and services.
Back up the Replicate "data" directory to a location outside the product folder. Thismethod is recommended in most cases. However, if your "data" folder is very largeand there is not enough space to back it up, then use Method 2 below.
Chapter 2 | Installing Attunity Replicate | Page 60Qlik Analytics (ISR) Ltd.
Attunity Replicate 6.4 Setup and User Guide
-
Method 2:
Open a Windows command prompt and change the path to \bin. Thenissue the following command:
repctl [-d alternate_data_directory_path] exportrepository
where [-d alternate_data_directory_path] is required when the Replicate "data"directory is in a non-default location.
2. Run the Attunity Replicate setup wizard (AttunityReplicate__X64.exe).
3. If you notice an issue with the upgrade, you can either revert to the previous versionas described below or do one of the following depending on which backup method youchose above.
If you chose Method 1:
a. Stop all Replicate services.
b. Overwrite the "data" directory with the "data" directory that you backed upearlier.
c. Start all Replicate services.
If you chose Method 2:
Issue the following command:
repctl [-d data-directory] importrepository json_file=Full path to the
exported *.json file
where [-d data-directory] is only required if you installed the Replicate "data"directory to a non-default location.
Example:
repctl -d f:/data importrepository json_file=C:\Temp\many_tables.json
To revert to a previous version:
1. Back up the Replicate "data" directory to a location outside the product folder.
2. Uninstall the product and then reinstall to the same directory.
3. Once the installation is complete, stop all Replicate services.
4. Overwrite the "data" directory with the "data" directory that you backed up earlier.
5. Start all Replicate services.
Chapter 2 | Installing Attunity Replicate | Page 61Qlik Analytics (ISR) Ltd.
Attunity Replicate 6.4 Setup and User Guide
-
Starting and Stopping the Attunity Replicate Server onWindowsIn some cases you may need to stop and start the Attunity Replicate Server. You must dothis from the Windows computer where Attunity Replicate is installed.
To stop and start the Attunity Replicate Server on Windows
From the Start menu on the Windows computer where Attunity Replicate is installed,find Attunity Replicate; then select either Stop Attunity Replicate Server orStart Attunity Replicate Server.
Silently Installing Attunity ReplicateAttunity Replicate can be installed silently (i.e. without requiring user interaction). Thisoption is useful, for example, if you need to install Attunity Replicate on several machinesthroughout your organization.
Note Before commencing the installation, make sure that the prerequisites have beenmet.
The installation process consists of two stages:
1. Creating a Response File
2. Running the Silent Install
Creating a Response FileBefore starting the installation, you need to create a response file.
To create the response file
1. From the directory containing the Attunity Replicate setup file, run the followingcommand (note that this will also install Attunity Replicate):
AttunityReplicate__X64.exe /r /f1
where:
is the full path to the generated response file.
Example:
AttunityReplicate__X64.exe /r /f1C:\Replicate_
install.iss
Chapter 2 | Installing Attunit