IBM Books

Replication Guide and Reference


Setting Up the Capture and Apply Programs

Setting up consists of configuring the source, target, and control servers. The following sections provide instructions for configuring each server as well as information about providing end-user authentication at the source server.

Configuring the Capture Program for UNIX Platforms

  1. Ensure that the user ID under which the Capture program is running has the required privileges:

  2. Log on with the user ID from the source server system.

  3. Connect to the source server database by entering:
    db2 connect to database
    

    where database is the source server database.

  4. Prepare the source server database (source database) for roll-forward recovery by issuing the update database configuration command and the backup database command. For example:
    db2 update database configuration for database_alias using logretain on
    db2 backup database database_alias
    

  5. Change to the directory where the Capture program bind files are located, which is usually drive:\sqllib\bnd.

  6. Create and bind the Capture program package to the source server database by entering the following command:
    db2 bind @capture.lst isolation ur blocking all
    

    where ur specifies the list in uncommitted read format for greater performance.

    If your system does not support UR, substitute CS (cursor stability format) instead. These commands create a list of packages, the names of which can be found in the capture.lst file for your particular platform.

Configuring the Apply Program for UNIX Platforms

  1. Ensure that the user ID under which Apply is running has the required privileges:

  2. Log on with the user ID from the target server system.

  3. Change to the directory where the Apply program bind files are located, which is usually in drive:\sqllib\bnd.

  4. Connect to the source server database by entering:
    DB2 CONNECT TO database
    
    where database is the source server database.

  5. Create and bind the Apply package to the source server database by entering both of the following commands:
    db2 bind @applycs.lst isolation cs blocking all
    
    db2 bind @applyur.lst isolation ur blocking all
    

    Where:

    CS

    The list in cursor stability format.

    UR

    The list in uncommitted read format.

    These commands create a list of packages, the names of which can be found in the applycs.lst and applyur.lst files.

  6. Connect to the target server database by entering:
    db2 connect to database
    
    where database is the target server database.

  7. Create and bind the Apply package to the target server database by entering both of the following commands:
    db2 bind @applycs.lst isolation cs blocking all grant public
    
    db2 bind @applyur.lst isolation ur blocking all grant public
    
    Note:Because the Apply control tables use static SQL calls, the Apply bind process searches for nearly all of the control tables at each server that it is bound to, regardless of whether these control tables have any use or meaning at each server.

  8. Repeat the connect and bind steps for each server that the Apply program connects to. You must bind the Apply program to the source, target and control servers.

Other Configuration Considerations for UNIX-Based Components

Ensure that the user ID from which the Capture and Apply programs are running have write privilege on the directories from where you invoke the programs. For all other issues pertaining to configuration of UNIX-based components, see IBM DB2 Universal Database for UNIX Quick Beginnings.

Providing End-User Authentication at the Source Server

For end-user authentication to occur at the source server, in some cases you need to provide a password file for Apply to use when connecting to the source server. Following are environment-specific changes:

For more information about authentication and security, refer to the IBM DB2 Universal Database Administration Guide.

If you create a password file:

The password file must meet the following criteria:

It is advisable to limit read access of this file to the user ID that will run Apply.

If you do not create a password file:

Apply for UNIX-based platforms must be able to issue an SQL CONNECT statement without specifying the user ID and password. To do so, ensure that:

When copying from DB2 for MVS sources, ensure that:


[ Top of Page | Previous Page | Next Page | Table of Contents | Index ]

[ DB2 List of Books | Search the DB2 Books ]