When implementing a bi-directional configuration, you must consider the following areas to avoid data integrity issues. These are as follows:
Let's take a look at the first potential problem, data looping, and how to detect it.
GoldenGate has built-in loop detection, which is configured through the
GETAPPLOPS parameters to prevent local transactions from being replicated and causing endless loops. Another solution would be the
TRANLOGOPTIONS EXCLUDEUSER parameters in the Extract process configuration, effectively blocking the
GGS_ADMIN user on the target system (the user associated ...