Table of Contents

Search

  1. Preface
  2. Command Line Programs and Utilities
  3. Installing and Configuring Command Line Utilities
  4. Using the Command Line Programs
  5. Environment Variables for Command Line Programs
  6. Using infacmd
  7. infacmd as Command Reference
  8. infacmd aud Command Reference
  9. infacmd autotune Command Reference
  10. Infacmd bg Command Reference
  11. infacmd ccps Command Reference
  12. infacmd cluster Command Reference
  13. infacmd cms Command Reference
  14. infacmd dis Command Reference
  15. Infacmd dis Queries
  16. infacmd dp Command Reference
  17. infacmd idp Command Reference
  18. infacmd edp Command Reference
  19. Infacmd es Command Reference
  20. infacmd ics Command Reference
  21. infacmd ipc Command Reference
  22. infacmd isp Command Reference
  23. infacmd ldm Command Reference
  24. infacmd mas Command Reference
  25. infacmd mi Command Reference
  26. infacmd mrs Command Reference
  27. infacmd ms Command Reference
  28. infacmd oie Command Reference
  29. infacmd ps Command Reference
  30. infacmd pwx Command Reference
  31. infacmd roh Command Reference
  32. infacmd rms Command Reference
  33. infacmd rtm Command Reference
  34. infacmd sch Command Reference
  35. infacmd search Command Reference
  36. infacmd sql Command Reference
  37. infacmd tdm Command Reference
  38. infacmd tools Command Reference
  39. infacmd wfs Command Reference
  40. infacmd ws Command Reference
  41. infacmd xrf Command Reference
  42. infacmd Control Files
  43. infasetup Command Reference
  44. pmcmd Command Reference
  45. pmrep Command Reference
  46. Working with filemanager
  47. Working with pmrep Files

DefineWorkerNode

DefineWorkerNode

Defines a worker node on the current machine. infasetup creates the nodemeta.xml file that stores the configuration metadata for the node. If you run this command on an existing node, it overwrites the node configuration metadata. After you define the node, run infacmd isp AddDomainNode to add it to the domain.
The DefineWorkerNode command uses the following syntax:
DefineWorkerNode <-DomainName|-dn> domain_name <-NodeName|-nn> node_name <-NodeAddress|-na> node_host:port [<-ServiceManagerPort|-sp> service_manager_port] [<-EnableTLS|-tls> enable_tls] [<-NodeKeystore|-nk> node_keystore_directory] [<-NodeKeystorePass|-nkp> node_keystore_password] [<-NodeTruststore|-nt> node_truststore_directory] [<-NodeTruststorePass|-ntp> node_truststore_password] [<-EnableKerberos|-krb> enable_kerberos] [<-ServiceRealmName|-srn> realm_name_of_node_spn] [<-UserRealmName|-urn> realm_name_of_user_spn] [<-KeysDirectory|-kd> Infa_keys_directory_location] [<-HttpsPort|-hs> admin_tool_https_port] [<-NodeKeystoreFile|-kf> admin_tool_keystore_file_location] [<-KeystorePass|-kp> admin_tool_keystore_password] <-GatewayAddress|-dg> domain_gateway_host:port [<-UserName|-un> user_name] [<-SecurityDomain|-sdn> security domain] [<-Password|-pd> password] [<-MinProcessPort|-mi> minimum_port] [<-MaxProcessPort|-ma> maximum_port] [<-ServerPort|-sv> server_shutdown_port] [<-BackupDirectory|-bd> backup_directory] [<-ErrorLogLevel|-el> FATAL_ERROR_WARNING_INFO_TRACE_DEBUG] <-ResourceFile|-rf> resource_file [<-SystemLogDirectory|-sld> system_log_directory] [<-EnableSaml|-saml> enable_saml] [<-SamlTrustStoreDir|-std> saml_truststore_directory] [<-SamlTrustStorePassword|-stp> saml_truststore_password] [<-SamlKeyStoreDir|-skd> saml_keystore_directory] [<-SamlKeyStorePassword|-skp> saml_keystore_password]
The following table describes
infasetup
DefineWorkerNode options and arguments:
Option
Description
-DomainName
-dn
Required. Name of the domain the worker node links to.
-NodeName
-nn
Required. Name of the node. Node names must be between 1 and 79 characters and cannot contain spaces or the following characters: \ / * ? < > " |
-NodeAddress
-na
Required. Host name and port number for the machine hosting the node. Choose an available port number.
-ServiceManagerPort
-sp
Optional. Port number used by the Service Manager to listen for incoming connection requests.
-EnableTLS
-tls
Optional. Configures secure communication among the services in the Informatica domain.
If you use the default SSL certificates provided by Informatica, you do not need to specify the keystore and truststore options. If you do not use the default SSL certificate, you must specify the keystore and truststore options. Valid values are true or false. Default is false. If you specify the -tls option without a value, the Informatica domain uses secure communication among the services.
To enable secure communication for the associated services or web applications, such as Administrator tool, Analyst tool, or Web Services Hub, configure the secure communication separately within the applications.
-NodeKeystore
-nk
Optional if you use the default SSL certificates from Informatica. Required if you use your SSL certificates. Directory that contains the keystore files. The Informatica domain requires the SSL certificates in PEM format and in Java Keystore (JKS) files. The directory must contain keystore files in PEM and JKS formats.
The keystore files must be named infa_keystore.jks and infa_keystore.pem. If the keystore file that you receive from the certificate authority (CA) has a different name, you must rename it to infa_keystore.jks and infa_keystore.pem.
You must use the same keystore file for all the nodes in the domain.
-NodeKeystorePass
-nkp
Optional if you use the default SSL certificates from Informatica. Required if you use your SSL certificates. Password for the keystore infa_keystore.jks file.
-NodeTruststore
-nt
Optional if you use the default SSL certificates from Informatica. Directory that contains the truststore files. The Informatica domain requires the SSL certificates in PEM format and in Java Keystore (JKS) files. The directory must contain truststore files in PEM and JKS formats.
The truststore files must be named infa_truststore.jks and infa_truststore.pem. If the truststore file that you receive from the certificate authority (CA) has a different name, you must rename it to infa_truststore.jks and infa_truststore.pem.
-NodeTruststorePass
-ntp
Optional if you use the default SSL certificates from Informatica. Required if you use your SSL certificates. Password for the infa_truststore.jks file.
-CipherWhiteList
-cwl
Optional. Comma-separated list of JSSE cipher suites that you want to add to the effective list.
The list must contain at least one valid JRE or OpenSSL cipher suite.
-CipherBlackList
-cbl
Optional. Comma-separated list of JSSE cipher suites that you want to remove from the effective list.
The effective list must contain at least one valid JRE or OpenSSL cipher suite.
-CipherWhiteListFile
-cwlf
Optional. Absolute file name of the plain text file that contains a comma-separated list of cipher suites that you want to add to the effective list.
The list must contain at least one valid JRE or OpenSSL cipher suite.
-CipherBlackListFile
-cblf
Optional. Absolute file name of the plain text file that contains a comma-separated list of cipher suites that you want to remove from the effective list.
The effective list must contain at least one valid JRE or OpenSSL cipher suite.
-EnableKerberos
-krb
Optional. Configures the Informatica domain to use Kerberos authentication. Valid values are true or false. If true, the domain uses Kerberos authentication, and you cannot later change the authentication mode. After you enable Kerberos authentication, you cannot disable it. Default is false. If you specify the -krb option without a value, the Informatica domain uses Kerberos authentication.
-ServiceRealmName
-srn
Optional. Name of the Kerberos realm that the domain uses to authenticate users. The realm name must be in uppercase and is case-sensitive.
To configure Kerberos cross realm authentication, specify the name of each Kerberos realm that the domain uses to authenticate users, separated by a comma. For example:
COMPANY.COM,EAST.COMPANY.COM,WEST.COMPANY.COM
Use an asterisk as a wildcard character before a realm name to include all realms that include the name. For example, specify the following value to include all realms that include the EAST.COMPANY.COM name:
*EAST.COMPANY.COM
-UserRealmName
-urn
Optional. Name of the Kerberos realm that the domain uses to authenticate users. The realm name must be in uppercase and is case-sensitive.
To configure Kerberos cross realm authentication, specify the name of each Kerberos realm that the domain uses to authenticate users, separated by a comma. For example:
COMPANY.COM,EAST.COMPANY.COM,WEST.COMPANY.COM
Use an asterisk as a wildcard character before a realm name to include all realms that include the name. For example, specify the following value to include all realms that include the EAST.COMPANY.COM name:
*EAST.COMPANY.COM
-KeysDirectory
-kd
Optional. Directory where all keytab files and the encryption key for the Informatica domain are stored. Default is
<InformaticaInstallationDir>/isp/config/keys
.
-HttpsPort
-hs
Optional. Port number that the node uses for communication between the Administrator tool and the Service Manager. Set this port number if you want to configure HTTPS for a node.
To disable HTTPS support for a node, set this port number to zero.
-NodeKeystoreFile
-kf
Optional. Keystore file that contains the keys and certificates required if you use the SSL security protocol.
-KeystorePass
-kp
Optional. A plain-text password for the keystore file. You can set a password with the -kp option or the environment variable INFA_PASSWORD. If you set a password with both methods, the password set with the -kp option takes precedence.
-GatewayAddress
-dg
Required. Gateway host machine name and port number.
-UserName
-un
Required if the domain uses Native or LDAP authentication. User name to connect to the domain. You can set the user name with the -un option or the environment variable INFA_DEFAULT_DOMAIN_USER. If you set a user name with both methods, the -un option takes precedence.
Optional if the domain uses Kerberos authentication. To run the command with single sign-on, do not set the user name. If you set the user name, the command runs without single sign-on.
-SecurityDomain
-sdn
Name of the security domain that you want to create to which the domain user belongs. You can set a security domain with the -sdn option or the environment variable INFA_DEFAULT_SECURITY_DOMAIN. If you set a security domain name with both methods, the -sdn option takes precedence. The security domain name is case sensitive.
You can specify a value for ‑sdn or use the default based on the authentication mode:
  • Required if the domain uses LDAP authentication. Default is Native. To work with LDAP authentication, you need to specify the value for -sdn.
  • Optional if the domain uses native authentication or Kerberos authentication. Default is native for native authentication. If the domain uses Kerberos authentication, the default is the LDAP security domain created during installation. The name of the security domain is the same as the user realm specified during installation.
-Password
-pd
Required if you specify the user name. Password for the user name. The password is case sensitive. You can set a password with the -pd option or the environment variable INFA_DEFAULT_DOMAIN_PASSWORD. If you set a password with both methods, the password set with the -pd option takes precedence.
-MinProcessPort
-mi
Optional. Minimum port number for application service processes that run on the node. Default is 11000.
-MaxProcessPort
-ma
Optional. Maximum port number for application service processes that run on the node. Default is 11999.
-ServerPort
-sv
Optional. TCP/IP port number used by the Service Manager. The Service Manager listens for shutdown commands from PowerCenter components on this port. Set this port number if you have multiple nodes on one machine or if the default port number is in use. Default is 8005.
-BackupDirectory
-bd
Optional. Directory to store repository backup files. The directory must be accessible by the node.
-ErrorLogLevel
-el
Optional. Severity level for log events in the domain log. One of the following:
  • fatal
  • error
  • warning
  • info
  • trace
  • debug
Default is info.
-ResourceFile
-rf
Required. File that contains the list of available resources for the node. Use the file nodeoptions.xml, located in the following directory:
<INFA_HOME>\isp\bin
.
-SystemLogDirectory
-sld
Optional. Directory path to store system log files. Default is <INFA_home>/logs.
-EnableSaml
-saml
Optional. Enables or disables SAML authentication in the Informatica domain.
Set this value to true to enable SAML authentication in the Informatica domain. Default is false.
-SamlTrustStoreDir
-std
Optional. The directory containing the custom truststore file required to use SAML authentication on the gateway node. Specify the directory only, not the full path to the file.
The default Informatica truststore is used if no truststore is specified.
-SamlTrustStorePassword
-stp
Required if you use a custom truststore for SAML authentication. The password for the custom truststore.
-SamlKeyStoreDir
-skd
Optional. The directory containing the custom keystore file required to use SAML authentication on the gateway node. Specify the directory only, not the full path to the file.
-SamlKeyStorePassword
-skp
Required if you use a custom keystore for SAML authentication. Password to the SAML keystore. *
* Note: If you currently run scripts that use this command to enable a custom keystore for SAML authentication, you must update them to include this option.

0 COMMENTS

We’d like to hear from you!