Table of Contents

Search

  1. Preface
  2. Introduction to Informatica Data Engineering Integration
  3. Mappings
  4. Mapping Optimization
  5. Sources
  6. Targets
  7. Transformations
  8. Python Transformation
  9. Data Preview
  10. Cluster Workflows
  11. Profiles
  12. Monitoring
  13. Hierarchical Data Processing
  14. Hierarchical Data Processing Configuration
  15. Hierarchical Data Processing with Schema Changes
  16. Intelligent Structure Models
  17. Blockchain
  18. Stateful Computing
  19. Appendix A: Connections Reference
  20. Appendix B: Data Type Reference
  21. Appendix C: Function Reference

Mapping Overview

Mapping Overview

Create a mapping that reads data from a blockchain and uses the data to generate an alert message for vehicles that have a suspicious message.
For example, a vehicle has the following suspicious message:
Vehicle registration expired
You want to generate the following alert message:
Dear Arianne Fitzgerald, Vehicle # 1B3HB48B67D562726 in your possession has the issue: Vehicle registration expired. Please resolve the issue in 10 days.
The mapping performs the following steps:
  1. Takes a list of vehicle identification numbers as input.
  2. Uses the list of vehicle identification numbers to look up vehicles on the blockchain.
  3. Extracts the suspicious message and owner name for the vehicle.
  4. Filters out vehicles that do not have a suspicious message.
  5. Generates an alert message.
  6. Writes the vehicle identification number, owner name, suspicious message, and alert message to a target.
The following image shows the mapping:
The mapping contains a Read transformation, a Lookup transformation, an Expression transformation, a Filter transformation, an Expression transformation, and a Write transformation.

Step 1. Read Vehicle Numbers

Add a Read transformation to get vehicle identification numbers and pass the numbers to downstream transformations in the mapping.

Step 2. Look Up Vehicles

To look up vehicles on the blockchain, complete the following tasks:
  1. Add a blockchain data object to the mapping as a Lookup transformation and select a read operation that uses an HTTP GET request to get vehicles by ID. For example, the read operation might send an HTTP GET request to the following resource URI:
    /org.company/vehicles/{id}
  2. Configure the following lookup condition:
    id = vin

Step 3. Extract Vehicle Information

To extract the suspicious message and the name of the vehicle owner, complete the following tasks:
  1. Add an Expression transformation to the mapping.
  2. Create the following output ports:
    • owner
    • suspiciousMessage
  3. In the output port
    owner
    , configure the following port expression:
    Response_200.owner
  4. In the output port
    suspiciousMessage
    , configure the following port expression:
    Response_200.suspiciousMessage

Step 4. Filter Out Vehicles

To filter out vehicles that do not have a suspicious message, complete the following tasks:
  1. Add a Filter transformation to the mapping.
  2. Configure the following filter condition:
    suspiciousMessage != NULL

Step 5. Generate an Alert Message

To generate an alert message, complete the following tasks:
  1. Add an Expression transformation to the mapping.
  2. Create the output port
    alertMessage
    .
  3. In the output port
    alertMessage
    , configure the following port expression:
    'Dear ' || owner || ', Vehicle # ' || vin || ' in your possession has the issue: ' || suspiciousMessage || '. Please resolve the issue in 10 days.'

Step 6. Write the Data

To write the data to a target, add a Write transformation to the mapping. When the mapping runs, the Write transformation populates the target with the vehicle identification number, owner name, suspicious message, and alert message.
A third-party tool can use the data in the target to perform the following tasks:
  1. Use the owner name to look up the owner's e-mail address.
  2. Use the e-mail address and alert message to populate an e-mail.
  3. Send the e-mail immediately or on a schedule.
  4. Archive the data in the target for future reference.

0 COMMENTS

We’d like to hear from you!