Table of Contents

Search

  1. Abstract
  2. Supported Versions
  3. Install PowerCenter on Kubernetes
  4. Manage Existing PowerCenter Deployments
  5. Troubleshooting
  6. Appendix: Sample Silent Properties for Build Image

Install PowerCenter 10.5 on Kubernetes with Informatica Deployment Manager

Install PowerCenter 10.5 on Kubernetes with Informatica Deployment Manager

Step 1. Choose the Deployment Type

Step 1. Choose the Deployment Type

On the
Deployment type
page, you must select the Informatica product and version to deploy. Additionally, you can choose to configure secure authentication to run the Docker image and deploy the product on a remote host.
  1. Launch Informatica Deployment Manager. You can choose to launch Informatica Deployment Manager in a secure way using SSL. If you choose to use SSL, you can use the default Informatica SSL certificate or your SSL certificate.
    • To launch without SSL, run
      sh startup.sh nonssl
      .
    • To launch with the default SSL certificate, run
      sh startup.sh
      .
    • To launch with your SSL certificate, run
      sh startup.sh SSL <certificate location> <certificate password>
      . The password must be in single quotes.
    By default, Informatica Deployment Manager uses four ports that are available within the port range of 12100 to 12200. However, you can configure Informatica Deployment Manager to use the available ports from a custom port range. To specify a custom port range, you must replace the port numbers of the default port range in the
    startup.sh
    file with the port numbers of the custom port range. If you are using Informatica Deployment Manager on Windows platform, you must run the
    dos2unix
    command to convert the modified
    startup.sh
    file to Unix format.
  2. To run the Informatica Docker image, select
    Run image
    .
    The
    Deployment type
    page appears.
  3. On the
    Deployment type
    page, select
    PowerCenter
    for the product.
  4. Optionally, you can choose to configure Secure Shell (SSH) protocol for secure authentication to deploy the containers on a remote host. If you do not want to set the secure authentication, go to step 6.
  5. If you enable secure authentication, set the authentication type to
    Password
    or
    Key
    .
    • For password type authentication, enter the machine IP address or host name, user name, password, and port to connect to the host machine.
      By default, the SSH connection uses port 22.
    • For key type authentication, enter the machine IP address or host name, user name, path of the host authentication key, and port number.
  6. Click
    Next
    .
    The
    Domain details
    page appears.

0 COMMENTS

We’d like to hear from you!