Introduction
There are various steps in configuring a GoldenGate environment. Some of the steps of this setup can be different for different database environments and requirements. In this chapter, we will go through the steps that should be performed for a simple replication and a complex one. We will also look into how to divide the load into multiple process groups for a busy system. Further, we will cover the set up required for ASM and RAC environments, and also how to encrypt the password and trail files. We will also look into the steps required for replication between tables with different structures.