GoldenGate&ASM&Connecting to a 'BLOCKED' instance

Applies to: Oracle Net Services - Version: 10.1.0.4.0 to 10.2.0.4.0
Information in this document applies to any platform.
Symptoms Checking the listener status, ASM instance is shown as BLOCKED.
Remote connections and administration cannot be performed in this case for the ASM instance.

Example :

LSNRCTL for Linux: Version 10.2.0.1.0 - Production on 19-NOV-2007 11:31:18

Copyright (c) 1991, 2005, Oracle. All rights reserved.

Connecting to (ADDRESS=(PROTO =tcp)(HOST=)(PORT=1521))
STATUS of the LISTENER
------------------------
Alias LISTENER_PNYPERMDB01
Version TNSLSNR for Linux: Version 10.2.0.1.0 - Production
Start Date 09-AUG-2007 15:16:58
Uptime 101 days 21 hr. 14 min. 20 sec
Trace Level off
Security ON: Local OS Authentication
SNMP ON
Listener Parameter File /opt/oracle/product/10.2/network/admin/listener.ora
Listener Log File /opt/oracle/product/10.
2/network/log/listener_pnypermdb01.log
Listening Endpoints Summary...
(DESCRIPTION=(ADDRESS=(PROTOCOL=tcp)(HOST=)(PORT=1521)))
(DESCRIPTION=(ADDRESS=(PROTOCOL=tcp)(HOST=)(PORT=1521)))
Services Summary...
Service "+ASM" has 1 instance(s).
Instance "+ASM1", status BLOCKED, has 1 handler(s) for this service...
Service "+ASM_XPT" has 1 instance(s).
Instance "+ASM1", status BLOCKED, has 1 handler(s) for this service...
Service "PLSExtProc" has 1 instance(s).
Instance "PLSExtProc", status UNKNOWN, has 1 handler(s) for this service...
...................
The command completed successfully
Cause The blocked status is being set by the instance, indicating that the database is not able to accept connections. This can be caused by the instances not being mounted or mounted in a restricted state.

Since an ASM instance never mounts a database, it will always be shown in 'BLOCKED' status.
The administration of an ASM instance is intended to be done on the server itself and not remotely.
This is the default and expected behaviour for 10gR1 and newer databases.
Solution Connecting to a 'BLOCKED' instance via a listener requires creating an entry in the tnsnames.ora file on the client side with 'UR=A' under CONNECT_DATA.
Also, creating a password file for the ASM instance will be required to connect as SYS.


The steps are shown below :

1) Edit the listener.ora on ASM server to create a static SID_DESC definition for the +ASM instance:
       a) Logon to the ASM/Database server
       b) Locate your listener.ora (typically located in the $ORACLE_HOME/network/admin)
       c) Add an entry under SID_LIST_LISTENER entry for your ASM instance.
Example:

SID_LIST_LISTENER =
   (SID_LIST =
       (SID_DESC =
          (GLOBAL_DBNAME= +ASM)
          (ORACLE_HOME = c:\oracle\app\product\11.1.0\db_1)
      )
)

2. Issue a lsnrctl reload so that these changes take effect.
3. Stop the ASM instance
4. Set the REMOTE_LOGIN_PASSWORDFILE to SHARED or EXCLUSIVE in the ASM instance
5. Create a password file for the ASM instance using the ORAPWD utility
6. Start the ASM instance
7. Edit the tnsnames.ora file on the client side with the entry UR=A under CONNECT_DATA as shown :

ASM =
    (DESCRIPTION =
         (ADDRESS = (PROTOCOL = TCP)(HOST = myhost)(PORT = 1521))
          (CONNECT_DATA =
         (SERVER = DEDICATED)
         (SERVICE_NAME = +ASM)
         (UR=A)
         )
     )

8. Then connect to +ASM instance remotely using the sqlplus client using the command
"conn sys/password@alias as sysdba"

Note :

This behaviour changes in 11gR1, where the status of ASM instances is always 'UNBLOCKED' instead of
'BLOCKED' for listeners.

======================================================================================
======================================================================================

Overview

This document discusses the GoldenGate configuration for Oracle Automatic Storage Management (ASM). Oracle ASM was introduced with Oracle Database 10g and is recommended by Oracle as a best practice storage solution for database files.

 

Oracle ASM was developed to optimize database performance and high availability while minimizing storage maintenance. With its real-time, transactional change data capture, transformation and delivery capabilities, Oracle GoldenGate supports Oracle ASM on all platforms directly to enable high availability and real-time data integration solutions. This document provides information on how to configure Oracle GoldenGate Change Data Capture for ASM.

 

 

Disclaimer:

 

The examples and scripts presented in this document are for demonstration purposes only and were created in a controlled laboratory environment. Before attempting to perform this procedure in a customer production situation we strongly recommend that you walkthrough the procedures and test, test, test!

 

Oracle ASM

Oracle ASM: SAME automated

Oracle ASM provides out-of-the-box striping capabilities for Oracle database files, including data files, temporary tablespace files, redo log files, flash recovery area (i.e. archive log files, backup files), and the spfile. Optionally ASM can be used to implement mirroring. ASM will stripe the database storage across all available storage devices using a stripe size of 1 MB for most database files. As opposed to other software-based RAID solutions ASM will automatically maintain the striping (and mirroring provided by ASM) in case of changes to the storage configuration. ASM supports a wide variety of storage solutions, including those that do not normally support storage RAID configurations. ASM is a cluster file system so it can also be used as storage solution for an Oracle Real Application Clusters (RAC) database.

 

ASM is a software-based solution that may be used to implement RAID-like site-level storage availability between disk arrays, which cannot be accomplished using storage-based RAID. ASM may be used to define so-called failure groups, and with ASM mirroring enabled, ASM will store every piece of data in different failure groups. With failure groups per disk array, the database could survive an entire storage array outage simply because all data would still be stored on a different disk array.

 "Unlocking" ASM

ASM is not a general purpose file system; files in ASM file systems cannot be accessed like they can on a traditional file system. The value of ASM comes from automating the restriping across storage systems thus ensuring optimum performance. When configuration changes occur, maintaining file copies outside of ASM will require manual, cumbersome intervention. In addition, the weakest performing storage system will set the performance level of the overall system. Thus, keeping some of the files outside of the ASM system may slow down the performance.

 

Oracle GoldenGate directly accesses redo and archive log files in Oracle ASM for transactional and heterogeneous replication to other environments to implement real-time data integration and high availability solutions.

 

Using Oracle GoldenGate in an Oracle ASM Environment

GoldenGate connects to the ASM instance through a database listener.

 

For Oracle Database 10gR2 versions earlier than 10.2.0.5, and Oracle Database 11gR2 versions earlier than 11.2.0.2, GoldenGate accesses the database via the ?SYS? ASM user over a SQLNET connection.

 

For Oracle Database 10gR2 versions 10.2.0.5 and above, and Oracle Database 11gR2 versions 11.2.0.2 and above, the DBLOGREADER API may be enabled to access the database directly; providing improved data capture performance.

 

For high volume Oracle 10gR2 and above databases having GoldenGate connect using the Oracle BEQ protocol, commonly referred to as ?bequeath?, has shown data capture performance improvements over a traditional Listener. However, to use the BEQ protocol, the GoldenGate Capture process must run on the database server.

Capturing Database Transactions via ASM User Access

Enabling remote access into Oracle ASM

Oracle ASM is managed by a set of processes called an Oracle ASM instance. In comparing an ASM instance to a database instance; one can see similar processes for an ASM instance, as for a database instance at the operating system level.

 

Similarly, ASM can be implemented in a cluster configuration with multiple instances accessing a single ASM storage system (compare with a RAC database in which multiple database instances access a single database).

 

An Oracle ASM instance can be accessed remotely through a database listener. Connections to an Oracle ASM instance may only be made as a user with the SYSDBA privilege. The default ASM user is SYS. A major difference with ASM, as compared to a database instance, is that users cannot be added to an ASM instance. However a different username with the SYSDBA privilege may be specified through the password file.

Using a password file

The use of a password file is mandatory to connect remotely to an instance using a SYSDBA privilege. The first step is to find out whether the ASM instance is configured to make use of a password file. Connect to the ASM instance (using SYS (or /) as SYSDBA) and run the following query:

 

select value from v$parameter where name = ?remote_login_passwordfile?;

 

There are three possible outcomes for this query:

 

  1. NONE
    1. The instance will not make use of a password file if there is one.
  2. EXCLUSIVE:
    1. The password file is only used for this ASM instance.
  3. SHARED:
    1. The password file may be used by other ASM or database instances.

If there is no password file, then the ASM instance will behave as if the setting for remote_login_passwordfile is NONE. If remote_login_passwordfile is set to NONE, set it to EXCLUSIVE or SHARED using an alter system command or by editing the init+ASM.ora file (followed by a restart of the ASM instance).

 

Next make sure a password file was generated for the ASM instance, and if it wasn?t, generate one. More information on how to configure and generate a password file is in the Oracle Database documentation.

 

For GoldenGate to connect to the ASM instance with a username other than the SYS username and password a SHARED password file is required.

Configuring the listener

The ASM instance must be explicitly added to the listener configuration file to enable connections. For example, in order to be able to connect to the ASM instance5. In the SID descriptions add a SID for ASM as shown below:

 

SID_LIST_LISTENER =

(SID_LIST =

(SID_DESC =

(SID_NAME = PLSExtProc)

(ORACLE_HOME = /app/oracle/ora102)

(PROGRAM = extproc)

)

(SID_DESC =

(ORACLE_HOME = /app/oracle/ora102)

(SID_NAME = +ASM)

)

)

LISTENER =

(DESCRIPTION_LIST =

(DESCRIPTION =

(ADDRESS = (PROTOCOL = TCP)

(HOST = MVDW-LT01)

(PORT = 1521)

)

(ADDRESS = (PROTOCOL = IPC)(KEY = EXTPROC0))

)

)

 

The listener must be restarted to enable this change.

 

As an option to adding the ASM instance to the regular listener configuration, a separate listener may be created for the ASM instance.

 

Adding the ASM instance to the tnsnames.ora file

Finally in order to enable remote connections add the ASM instance to the tnsnames.ora file (or LDAP directory). For example:

 

ASM =

(DESCRIPTION =

(ADDRESS = (PROTOCOL = TCP)

(HOST = MVDW-LT-01)

(PORT = 1521)

)

(CONNECT_DATA =

(SERVER = DEDICATED)

(SID = +ASM)

                                    )

                        )

Additional parameters for the GoldenGate Capture Process

The GoldenGate Change Data Capture parameter file has to include one extra line to connect to the ASM instance. All other parameters, including the database connection, remain the same. Include the connection to the ASM instance in the beginning of the Capture parameter file (all on a single line):

 

TRANLOGOPTIONS ASMUSER @<ASM_instance>, ASMPASSWORD

 

Replace the portions with the angle brackets with the relevant settings for the ASM environment. The ASM password may be encrypted via the GGSCI command ?encrypt password ?. Refer to the GoldenGate Administrator Guide for details on how to use encryption.

 

With this parameter option enabled, the Change Data Capture (Extract) parameter file will look similar to this:

 

EXTRACT EASM

EXTTRAIL ./dirdat/ea

USERID gguser, PASSWORD Oracle1

TRANLOGOPTIONS ASMUSER SYS@ASM, ASMPASSWORD Oracle1

TABLE amer.*;

 

Items to consider when using this configuration:

 

  • The Change Data Capture process uses a read buffer with a maximum size of 28,672 bytes. This may be problematic for high volume environments with large database transactions due to the limited memory buffer allocated for reading from the ASM storage.

 

  • This connection method may also be used when Oracle GoldenGate Change Data Capture is running on a server remote from the database; however, data capture performance will be reduced significantly.

BEQ Protocol Connections

BEQ protocol, or bequeath, connections are dedicated links into the database. Since our Change Data Capture process runs directly on the database server, using a bequeath connection in high volume environments will improve overall data capture rates because the overhead associated with the TCP/IP Listener connection is eliminated.

Adding the BEQ ASM instance to the tnsnames.ora file

To enable bequeath connections add the ASM instance to the tnsnames.ora file. For example:

 

ASM_BEQ =

            (DESCRIPTION =

                (ADDRESS = (PROTOCOL = BEQ)

                (PROGRAM = /u01/app/oracle/product/11.2.0/asm/bin/oracle)

                (ARGV0 = oracle+ASM1)

                (ARGS = '(DESCRIPTION=(LOCAL=YES)(ADDRESS=(PROTOCOL=BEQ)))')

                (ENVS = 'ORACLE_HOME=/u01/app/oracle/product/11.2.0/asm,ORACLE_SID=+ASM1')

            )

            (CONNECT_DATA =

                        (SERVICE_NAME = +ASM)

                        (INSTANCE_NAME = +ASM1)

             )

)

 

The Change Data Capture configuration for the BEQ connection will look similar to this:

 

EXTRACT EASM

EXTTRAIL ./dirdat/ea

USERID gguser, PASSWORD Oracle1

TRANLOGOPTIONS ASMUSER SYS@ASM_BEQ, ASMPASSWORD Oracle1

TABLE amer.*;

 

Capturing Database Transactions via the DBLOGREADER API

For Oracle Database 10gR2 versions 10.2.0.5 and above, and Oracle Database 11gR2 versions 11.2.0.2 and above, with Oracle GoldenGate version 11 and above, the DBLOGREADER API may be enabled to access the redo and archive logs via the database server.

 

It is very important that the Oracle Database patch levels be verified prior to enabling DBLOGREADER. Enabling DBLOGREADER on an incorrectly patched database will result in Change Data Capture failure and possible data loss.

 

When capturing from an ASM instance via the ASMUSER option, the maximum amount of data read by Capture is 28,672 bytes. With a default read and write buffer size of 1,024,000 bytes DBLOGREADER provides the capability to capture large database transactions more efficiently.

 

To enable the DBLOGREADER API, grant the GoldenGate Oracle Database user ?select any transaction? permission, remove the ASMUSER login information from the Change Data Capture parameter file, and add the following:

 

TRANLOGOPTIONS DBLOGREADER

 

With this parameter option enabled, the Change Data Capture parameter file will look similar to this:

 

EXTRACT EASM

EXTTRAIL ./dirdat/ea

USERID gguser, PASSWORD Oracle1

TRANLOGOPTIONS DBLOGREADER

TABLE amer.*;

 

DBLOGREADER provides options for ?tuning? the change data capture process in high volume, large transaction database environments.

 

TRANLOGOPTIONS BUFSIZE

 

Controls the size of the Change Data capture internal buffer that holds the results of each redo/archive read. The value of this buffer may be between 8,192 and 10,000,000 bytes; with a default value of 1,024,000.

 

TRANLOGOPTIONS DBLOGREADERBUFSIZE

 

Controls the size of the buffer used by DBLOGREADER to hold data captured from the ASM instance. The value of this buffer may be between 8,192 and 4,096,000 bytes; with a default value of 1,024,000 bytes.

 

The value of BUFSIZE must be equal to, or greater than the DBLOGREADERBUFSIZE setting.

 

With these parameter options enabled, the Change Data Capture parameter file will look similar to this:


 

EXTRACT EASM

EXTTRAIL ./dirdat/ea

USERID gguser, PASSWORD Oracle1

TRANLOGOPTIONS BUFSIZE 2048000

TRANLOGOPTIONS DBLOGREADER, DBLOGREADERBUFSIZE 2048000

TABLE amer.*;

 

BEQ Protocol Connections

BEQ protocol, or bequeath, connections are dedicated links into the database. Since our Change Data Capture process runs directly on the database server, using a bequeath connection in high volume environments will improve overall data capture rates because the overhead associated with the TCP/IP Listener connection is eliminated.

Adding the BEQ ORCL instance to the tnsnames.ora file

To enable bequeath connections for DBLOGREADER add the ORCL instance to the tnsnames.ora file. For example:

 

ORCL_BEQ =

            (DESCRIPTION =

                 (ADDRESS = (PROTOCOL = BEQ)

     (PROGRAM=oracle)

     (ARGV0 = oracleORCL)

     (ARGS=?(DESCRIPTION=(LOCAL=YES)(ADDRESS =(PROTOCOL=BEQ)))?)

)

(CONNECT_DATA = (SERVICE_NAME = ORCL))

            )

 

The Change Data Capture configuration for the BEQ connection will look similar to this:

 

EXTRACT EASM

EXTTRAIL ./dirdat/ea

USERID gguser@ORCL_BEQ, PASSWORD Oracle1

TRANLOGOPTIONS BUFSIZE 4096000

TRANLOGOPTIONS DBLOGREADER, DBLOGREADERBUFSIZE 4096000

TABLE amer.*;

 

来自 “ ITPUB博客 ” ,链接:http://blog.itpub.net/13750068/viewspace-1394157/,如需转载,请注明出处,否则将追究法律责任。

转载于:http://blog.itpub.net/13750068/viewspace-1394157/

你可能感兴趣的:(GoldenGate&ASM&Connecting to a 'BLOCKED' instance)