Common Content for Data Engineering
- Common Content for Data Engineering 10.5.1
- All Products
Property
| Description
|
---|---|
Name
| Name of the service. The name is not case sensitive and must be unique within the domain. It cannot exceed 128 characters or begin with @. It also cannot contain spaces or the following special characters:
` ~ % ^ * + = { } \ ; : ' " / ? . , < > | ! ( ) ] [
|
Description
| Description of the service. The description cannot exceed 765 characters.
|
Location
| Domain and folder where the service is created. Click
Browse to choose a different folder. You can move the service after you create it.
|
License
| License object that allows use of the service.
|
Node
| Node on which the service runs.
|
Backup Nodes
| If your license includes high availability, nodes on which the service can run if the primary node is unavailable.
|
Property
| Description
|
---|---|
Database Type
| The type of the repository database.
|
Username
| The database user name for the repository.
|
Password
| Repository database password for the database user.
|
Schema
| Available for Microsoft SQL Server. Name of the schema that will contain
Data Privacy Management repository tables.
|
Tablespace
| Available for IBM DB2. Name of the tablespace in which to create the tables. For a multi-partition IBM DB2 database, the tablespace must span a single node and a single partition.
|
Database Type
| Connection String Syntax
|
---|---|
IBM DB2
| jdbc:informatica:db2://<host name>:<port number>;DatabaseName=<database name>;BatchPerformanceWorkaround=true;DynamicSections=3000
|
Microsoft SQL Server
|
|
Oracle
| jdbc:informatica:oracle://<host name>:<port number>;SID=<database name>;MaxPooledStatements=20;CatalogOptions=0;BatchPerformanceWorkaround=true
|
PostgreSQL
| jdbc:informatica:postgresql://<host name>:<port number>;DatabaseName=
|
param1=value1;param2=value2
Secure Database Parameter
| Description
|
---|---|
EncryptionMethod
| Required. Indicates whether data is encrypted when transmitted over the network. This parameter must be set to
SSL .
|
ValidateServerCertificate
| Optional. Indicates whether Informatica validates the certificate that the database server sends.
If this parameter is set to True, Informatica validates the certificate that the database server sends. If you specify the HostNameInCertificate parameter, Informatica also validates the host name in the certificate.
If this parameter is set to False, Informatica does not validate the certificate that the database server sends. Informatica ignores any truststore information that you specify.
|
HostNameInCertificate
| Optional. Host name of the machine that hosts the secure database. If you specify a host name, Informatica validates the host name included in the connection string against the host name in the SSL certificate.
|
cryptoProtocolVersion
| Required. Specifies the cryptographic protocol to use to connect to a secure database. You can set the parameter to
cryptoProtocolVersion=TLSv1.1 or
cryptoProtocolVersion=TLSv1.2 based on the cryptographic protocol used by the database server.
|
TrustStore
| Required. Path and file name of the truststore file that contains the SSL certificate for the database.
If you do not include the path for the truststore file, Informatica looks for the file in the following default directory:
<Informatica installation directory>/tomcat/bin
|
TrustStorePassword
| Required. Password for the truststore file for the secure database.
|
Property
| Description
|
---|---|
HTTP Port
| A unique HTTP port number used for each service process. The defaults is 6200.
|
Enable Secure Communication
| Use a secure connection to connect to the
Data Privacy Management Service . If you enable secure communication, you must set all required HTTPS properties, including the keystore and truststore properties.
|
HTTPS Port
| Port number for the HTTPS connection.
|
Keystore File
| Path and file name of the keystore file. The keystore file contains the keys and certificates required if you use the SSL security protocol with
Data Privacy Management .
When the domain creates the
Data Privacy Management Service ,
Data Privacy Management exports the keystore to a certificate and stores the certificate in the keystore directory. Ensure that you configure the read and write permissions on the directory for
Data Privacy Management to successfully store the certificate.
|
Keystore Password
| Password for the keystore file. Required if you select Enable Transport layer Security.
|
Property
| Description
|
---|---|
Enable User Activity
| When enabled, starts the system jobs required for user activity data streaming to
Data Privacy Management . Default is False.
If you enable User Activity during installation and then update the field to False, the
Data Privacy Management system jobs stop.
|
Event Details Retention Period (In Days)
| Required. Determines the number of days to retain user activity details and anomalies in the user activity store. The
Data Privacy Management Service runs a daily retention job that purges expired data from the user activity store.
|
Event File Shared Location
| The mount location where you want to store streamed user activity event messages.
The mount location must be accessible to the domain machine and all cluster machines. The path to the mount location must be the same on all machines with Read, Write, and Execute permissions for the domain user on all machines.
ElasticSearch with TLS enabled takes more time to persist events compared to ElasticSearch without TLS. You might notice a difference in performance.
|