DB2 in AS/400 to Oracle?

DB2 in AS/400 to Oracle?

Hi all,

DB2 in AS/400 to Oracle?

 

This tip provided by Experts Exchange.

 

Question:

Hi all,
My client want to migrate DB/2 for AS/400 to Oracle 8i/9i. Is there anymigration toolkit to do this?
And which file format does Oracle import utility supported?
I’m looking for your reply
Eric

 

Comment:

There isn’t one directly (yet??) —

However, you can try the ODBC Migration Utility — it should be able toconnect…

Another option might be to utilize the Oracle Transparent Gateway product toconnect the oracle database
to the db2/400 database….

Take a look at the manual: Oracle8i Distributed Database Systems
Chapter 6, Oracle Heterogeneous Services Concepts

This looks like it is more labor intensive of a conversion method — but itbeats doing everything from
scratch with csv files and sqlldr!

dBalski

 

Comment:

Thanks for your help!
What is ‘ODBC Migration Utility’? I try to find it from Oracle’s website but Icouldn’t. Is it a third
party tool?
Eric

 

Comment:

Its at http://technet.oracle.com/
Technologies –> Migration Toolkits –>  OBBC/CLIPPER/PARADOX

dBalaski

 

 

Proposed Answer:

ODBC is a neat solution but is very slow. It is good to usethe native drivers for migration.

If your migration is a one time process then no use buying the costly opengateway or migration utility
for DB2.

I’ll suggest a clean and cost effective approach.

Export the data from DB2 to ASCII text files using the export command.

create the tables in the oracle schema with the same structure as that of DB2(you can get the SQL script
from DB2 and execute at oracle)

Then use the SQL Loader tool of Oracle (it comes with Oracle) to load the ASCIItext files to the database,
for SQL Loader you will have to write the control (.CTL) files. which is notvery huge task and can be
done easily.

I can send you code to generate CTL files automatically.

write to me at [email protected]

 

Comment:

Hi —
The Migration Utility for Oracle is FREE from oracle.. In fact, the MigrationUtility is bundled with
the 8i  Server & client release CDs.

I agree the native drivers would be faster, however, ODBC migration utilitywould be far faster than
the using the SQL*Loader utility….

BTW — POST the CTL files instead of sending them — it is unfair to otherswould like to view the solution.

dBalaski

 

Written on 2/04/2001

Share the Post:
Heading photo, Metadata.

What is Metadata?

What is metadata? Well, It’s an odd concept to wrap your head around. Metadata is essentially the secondary layer of data that tracks details about the “regular” data. The regular

XDR solutions

The Benefits of Using XDR Solutions

Cybercriminals constantly adapt their strategies, developing newer, more powerful, and intelligent ways to attack your network. Since security professionals must innovate as well, more conventional endpoint detection solutions have evolved

AI is revolutionizing fraud detection

How AI is Revolutionizing Fraud Detection

Artificial intelligence – commonly known as AI – means a form of technology with multiple uses. As a result, it has become extremely valuable to a number of businesses across

AI innovation

Companies Leading AI Innovation in 2023

Artificial intelligence (AI) has been transforming industries and revolutionizing business operations. AI’s potential to enhance efficiency and productivity has become crucial to many businesses. As we move into 2023, several

data fivetran pricing

Fivetran Pricing Explained

One of the biggest trends of the 21st century is the massive surge in analytics. Analytics is the process of utilizing data to drive future decision-making. With so much of

kubernetes logging

Kubernetes Logging: What You Need to Know

Kubernetes from Google is one of the most popular open-source and free container management solutions made to make managing and deploying applications easier. It has a solid architecture that makes

ransomware cyber attack

Why Is Ransomware Such a Major Threat?

One of the most significant cyber threats faced by modern organizations is a ransomware attack. Ransomware attacks have grown in both sophistication and frequency over the past few years, forcing