IBM Books

DB2 Replication Guide and Reference


Setting Up the Capture and Apply Programs

Setting up consists of configuring the source, target, and control servers. The following sections provide instructions for configuring each server as well as information about providing end-user authentication at the source server.

Configuring the Capture Program for UNIX Platforms

  1. Ensure that the user ID under which the Capture program is running has the required privileges:

  2. Log on with the user ID that has sufficient privileges.

  3. Connect to the source server database by entering:
    db2 connect to database
    

    where database is the source server database.

  4. Prepare the source server database (source database) for roll-forward recovery by issuing the update database configuration command and the backup database command. For example:
    db2 update database configuration for database_alias using logretain on
    db2 update database configuration for database_alias using userexit on
    db2 backup database database_alias
    
    Note:You might need to increase DBHEAP, APPLHEAPSZ, and LOGBUFSZ based on your installation requirements.

  5. Change to the directory where the Capture program bind files are located, which is usually $HOME/sqllib/bnd.

  6. Create and bind the Capture program package to the source server database by entering the following command:
    db2 bind @capture.lst isolation ur blocking all
    

    where ur specifies the list in uncommitted read format for greater performance.

Configuring the Apply Program for UNIX Platforms

  1. Ensure that the user ID under which Apply is running has the required privileges:

  2. Log on with the user ID that has sufficient privileges.

  3. Change to the directory where the Apply program bind files are located, which is usually $HOME/sqllib/bnd.

  4. Connect to the source server database by entering:
    DB2 CONNECT TO database
    
    where database is the source server database.

  5. Create and bind the Apply package to the source server database by entering both of the following commands:
    db2 bind @applycs.lst isolation cs blocking all
    
    db2 bind @applyur.lst isolation ur blocking all
    

    Where:

    CS
    The list in cursor stability format.

    UR
    The list in uncommitted read format.

    These commands create a list of packages, the names of which can be found in the applycs.lst and applyur.lst files.

  6. Connect to the target server database by entering:
    db2 connect to database
    
    where database is the target server database.

  7. Create and bind the Apply package to the target server database by entering both of the following commands:
    db2 bind @applycs.lst isolation cs blocking all grant public
    
    db2 bind @applyur.lst isolation ur blocking all grant public
    
    Note:Because the Apply control tables use static SQL calls, the Apply bind process searches for nearly all of the control tables at each server that it is bound to, regardless of whether these control tables have any use or meaning at each server.

  8. Repeat the connect and bind steps for each server that the Apply program connects to. You must bind the Apply program to the source, target, and control servers.

Other Configuration Considerations for UNIX-Based Components

Ensure that the user ID from which the Capture and Apply programs are running has write privilege on the directories where you invoke the programs. Write privilege is necessary because both the Capture and Apply programs create files in the invocation directory.

The Capture program creates the following files:

The Apply program creates the following files:

For all other issues pertaining to configuration of UNIX-based components, see IBM DB2 Universal Database for UNIX Quick Beginnings.

Providing End-User Authentication at the Source Server

For end-user authentication to occur at the source server, in some cases you need to provide a password file for Apply to use when connecting to the source server. Following are environment-specific changes:

For more information about authentication and security, refer to the IBM DB2 Universal Database Administration Guide.

If you create a password file:

The password file must meet the following criteria:

It is advisable to limit read access of this file to the user ID that will run Apply.

If you do not create a password file:

Apply for UNIX-based platforms must be able to issue an SQL CONNECT statement without specifying the user ID and password. To do so, ensure that:

When copying from DB2 for MVS sources, ensure that:


[ Top of Page | Previous Page | Next Page | Table of Contents | Index ]

[ DB2 List of Books | Search the DB2 Books ]