Table of Contents

Search

  1. Preface
  2. Command Line Programs and Utilities
  3. Installing and Configuring Command Line Utilities
  4. Using the Command Line Programs
  5. Environment Variables for Command Line Programs
  6. Using infacmd
  7. infacmd as Command Reference
  8. infacmd aud Command Reference
  9. infacmd autotune Command Reference
  10. Infacmd bg Command Reference
  11. infacmd ccps Command Reference
  12. infacmd cluster Command Reference
  13. infacmd cms Command Reference
  14. infacmd dis Command Reference
  15. infacmd dp Command Reference
  16. infacmd idp Command Reference
  17. infacmd edp Command Reference
  18. Infacmd es Command Reference
  19. infacmd ihs Command Reference
  20. infacmd ipc Command Reference
  21. infacmd isp Command Reference
  22. infacmd ldm Command Reference
  23. infacmd mas Command Reference
  24. infacmd mi Command Reference
  25. infacmd mrs Command Reference
  26. infacmd ms Command Reference
  27. infacmd oie Command Reference
  28. infacmd ps Command Reference
  29. infacmd pwx Command Reference
  30. infacmd roh Command Reference
  31. infacmd rms Command Reference
  32. infacmd rtm Command Reference
  33. infacmd sch Command Reference
  34. infacmd search Command Reference
  35. infacmd sql Command Reference
  36. infacmd tdm Command Reference
  37. infacmd tools Command Reference
  38. infacmd wfs Command Reference
  39. infacmd ws Command Reference
  40. infacmd xrf Command Reference
  41. infacmd Control Files
  42. infasetup Command Reference
  43. pmcmd Command Reference
  44. pmrep Command Reference
  45. Working with pmrep Files

Command Reference

Command Reference

UpdateGatewayNode

UpdateGatewayNode

Updates connectivity information for a gateway node on the current machine. Before you update the gateway node, run the infacmd isp ShutDownNode command to shut down the node.
The UpdateGatewayNode command uses the following syntax:
UpdateGatewayNode [<-DatabaseAddress|-da> database_hostname:database_port|<-DatabaseConnectionString|-cs> database_connection_string] [<-DatabaseUserName|-du> database_user_name] [<-DatabasePassword|-dp> database_password] [<-DatabaseType|-dt> database_type ORACLE|DB2|MSSQLSERVER|SYBASE|POSTGRESQL] [<-DatabaseServiceName|-ds> database_service_name] [<-DomainName|-dn> domain_name] [<-NodeName|-nn> node_name] [<-NodeAddress|-na> node_host:port] [<-ServiceManagerPort|-sp> service_manager_port] [<-EnableTLS|-tls> enable_tls] [<-NodeKeystore|-nk> node_keystore_directory] [<-NodeKeystorePass|-nkp> node_keystore_password] [<-NodeTruststore|-nt> node_truststore_directory] [<-NodeTruststorePass|-ntp> node_truststore_password] [<-CipherWhiteList|-cwl> comma_separated_white_list_jsse_cipher_names] [<-CipherBlackList|-cbl> comma_separated_black_list_jsse_cipher_names] [<-CipherWhiteListFile|-cwlf> absolute_filename_containing_comma_separated_white_list_jsse_cipher_names] [<-CipherBlackListFile|-cblf> absolute_filename_containing_comma_separated_black_list_jsse_cipher_names] [<-EnableKerberos|-krb> enable_kerberos] [<-ServiceRealmName|-srn> realm_name_of_node_spn] [<-UserRealmName|-urn> realm_name_of_user_spn] [<-KeysDirectory|-kd> Infa_keys_directory_location] [<-EnableSaml|-saml> enable_saml] [<-AssertionSigningCertificateAlias|-asca> idp_assertion_signing_certificate_alias] [<-SamlTrustStoreDir|-std> saml_truststore_directory] [<-SamlTrustStorePassword|-stp> saml_truststore_password] [<-AdminconsolePort|-ap> admin_tool_port] [<-HttpsPort|-hs> admin_tool_https_port] [<-KeystoreFile|-kf> admin_tool_keystore_file_location] [<-KeystorePass|-kp> admin_tool_keystore_password] [<-LogServiceDirectory|-ld> log_service_directory] [<-SystemLogDirectory|-sld> system_log_directory] [<-ServerPort|-sv> server_shutdown_port] [<-AdminconsoleShutdownPort|-asp> admin_tool_shutdown_port] [<-Tablespace|-ts> tablespace_name] [<-SchemaName|-sc> schema_name (used for MSSQLServer only)] [<-DatabaseTlsEnabled|-dbtls> database_tls_enabled] [<-DatabaseTruststorePassword|-dbtp> database_truststore_password] [<-DatabaseTruststoreLocation|-dbtl> database_truststore_location] [<-TrustedConnection|-tc> trusted_connection (used for MSSQLServer only)] [<-resetHostPort|-rst> resetHostPort]
The following table describes
infasetup
UpdateGatewayNode options and arguments:
Option
Argument
Description
-DatabaseAddress
-da
database_hostname:database_port
Required if you do not use -DatabaseConnectionString (-cs) option. Name and port number of the machine hosting the domain configuration database.
-DatabaseConnectionString
-cs
database_connection_string
Required if you do not use -DatabaseAddress (-da) and -DatabaseServiceName (-ds) options. Connection string used to connect to the domain configuration database. Specify the database host, database port, and the database service name as part of the connection string. Enclose the connection string in quotes.
-DatabaseUserName
-du
database_user_name
Required if you do not use -TrustedConnection (-tc) option. Account for the database containing the domain configuration information.
-DatabasePassword
-dp
database_password
Domain configuration database password corresponding to the database user. If you omit this option,
infasetup
uses the password specified in the INFA_DEFAULT_DATABASE_PASSWORD environment variable. If no value is specified in the environment variable, you must enter a password using this option.
-DatabaseType
-dt
database_type ORACLE|DB2|MSSQLSERVER|SYBASE|POSTGRESQL
Required. Type of database that stores the domain configuration metadata. Database types include:
  • db2
  • oracle
  • mssqlserver
  • sybase
  • postgresql
-DatabaseServiceName
-ds
database_service_name
Required if you do not use -DatabaseConnectionString (-cs) option. The database service name. Required for Oracle, IBM DB2, and Microsoft SQL Server databases. Enter the SID for Oracle, the service name for IBM DB2, or the database name for Microsoft SQL Server.
-DomainName
-dn
domain_name
Optional. Name of the domain.
-NodeName
-nn
node_name
Optional. Name of the node. Node names must be between 1 and 79 characters and cannot contain spaces or the following characters: \ / * ? < > " |
-NodeAddress
-na
node_host:port
Optional. Host name and port number for the machine hosting the node. Choose an available port number.
-ServiceManagerPort
-sp
service_manager_port
Optional. Port number used by the Service Manager to listen for incoming connection requests.
-EnableTLS
-tls
enable_tls
Optional. Configures secure communication among the services in the Informatica domain.
If you use the default SSL certificates provided by Informatica, you do not need to specify the keystore and truststore options. If you do not use the default SSL certificate, you must specify the keystore and truststore options. Valid values are true or false. Default is false. If you specify the -tls option without a value, the Informatica domain uses secure communication among the services.
To enable secure communication for the associated services or web applications, such as Administrator tool, Analyst tool, or Web Services Hub, configure the secure communication separately within the applications.
-NodeKeystore
-nk
node_keystore_directory
Optional if you use the default SSL certificates from Informatica. Required if you use your SSL certificates. Directory that contains the keystore files. The Informatica domain requires the SSL certificates in PEM format and in Java Keystore (JKS) files. The directory must contain keystore files in PEM and JKS formats.
The keystore files must be named infa_keystore.jks and infa_keystore.pem. If the keystore file that you receive from the certificate authority (CA) has a different name, you must rename it to infa_keystore.jks and infa_keystore.pem.
You must use the same keystore file for all the nodes in the domain.
-NodeKeystorePass
-nkp
node_keystore_password
Optional if you use the default SSL certificates from Informatica. Required if you use your SSL certificates. Password for the keystore infa_keystore.jks file.
-NodeTruststore
-nt
node_truststore_directory
Optional if you use the default SSL certificates from Informatica. Required if you use your SSL certificates. Directory that contains the truststore files. The Informatica domain requires the SSL certificates in PEM format and in Java Keystore (JKS) files. The directory must contain truststore files in PEM and JKS formats.
The truststore files must be named infa_truststore.jks and infa_truststore.pem. If the truststore file that you receive from the certificate authority (CA) has a different name, you must rename it to infa_truststore.jks and infa_truststore.pem.
-NodeTruststorePass
-ntp
node_truststore_password
Optional if you use the default SSL certificates from Informatica. Required if you use your SSL certificates. Password for the infa_truststore.jks file.
-CipherWhiteList
-cwl
cipher_whitelist_ comma_separated_white_list_jsse_cipher_names
Optional. Comma-separated list of JSSE cipher suites that you want to add to the effective list.
This list overwrites the previous whitelist.
The list must contain at least one valid JRE or OpenSSL cipher suite.
-CipherBlackList
-cbl
cipher_blacklist_ comma_separated_black_list_jsse_cipher_names
Optional. Comma-separated list of JSSE cipher suites that you want to remove from the effective list.
This list overwrites the previous blacklist.
The effective list must contain at least one valid JRE or OpenSSL cipher suite.
-CipherWhiteListFile
-cwlf
cipher_whitelist_file_ absolute_filename_containing_comma_separated_white_list_jsse_cipher_namespo
Optional. Absolute file name of the plain text file that contains a comma-separated list of cipher suites that you want to add to the effective list.
This list overwrites the previous whitelist.
The list must contain at least one valid JRE or OpenSSL cipher suite.
-CipherBlackListFile
-cblf
cipher_blacklist_file_ absolute_filename_containing_comma_separated_black_list_jsse_cipher_names
Optional. Absolute file name of the plain text file that contains a comma-separated list of cipher suites that you want to remove from the effective list.
This list overwrites the previous blacklist.
The effective list must contain at least one valid JRE or OpenSSL cipher suite.
-EnableKerberos
-krb
true|false
Optional. Configures the Informatica domain to use Kerberos authentication. Valid values are true or false. If true, the domain uses Kerberos authentication, and you cannot later change the authentication mode. After you enable Kerberos authentication, you cannot disable it. Default is false. If you specify the -krb option without a value, the Informatica domain uses Kerberos authentication.
-ServiceRealmName
-srn
realm_name_of_node_spn
Optional. Name of the Kerberos realm that the domain uses to authenticate users. The realm name must be in uppercase and is case-sensitive.
To configure Kerberos cross realm authentication, specify the name of each Kerberos realm that the domain uses to authenticate users, separated by a comma. For example:
COMPANY.COM,EAST.COMPANY.COM,WEST.COMPANY.COM
Use an asterisk as a wildcard character before a realm name to include all realms that include the name. For example, specify the following value to include all realms that include the EAST.COMPANY.COM name:
*EAST.COMPANY.COM
-UserRealmName
-urn
realm_name_of_user_spn
Optional. Name of the Kerberos realm that the domain uses to authenticate users. The realm name must be in uppercase and is case-sensitive.
To configure Kerberos cross realm authentication, specify the name of each Kerberos realm that the domain uses to authenticate users, separated by a comma. For example:
COMPANY.COM,EAST.COMPANY.COM,WEST.COMPANY.COM
Use an asterisk as a wildcard character before a realm name to include all realms that include the name. For example, specify the following value to include all realms that include the EAST.COMPANY.COM name:
*EAST.COMPANY.COM
-KeysDirectory
-kd
Infa_keys_directory_location
Optional. Directory where all keytab files and the encryption key for the Informatica domain are stored. Default is
<InformaticaInstallationDir>/isp/config/keys
.
-EnableSaml
-saml
true|false
Optional. Enables or disables SAML authentication in the Informatica domain.
Set this value to true to enable SAML authentication in the Informatica domain.
Set this value to false to disable SAML authentication in the Informatica domain.
-AssertionSigningCertificateAlias
-asca
idp_assertion_signing_certificate_aliaseAlias
Required if SAML authentication is enabled on the gateway node. The alias name specified when importing the identity provider assertion signing certificate into the truststore file used for SAML authentication.
-SamlTrustStoreDir
-std
saml_truststore_directory
Optional. The directory containing the custom truststore file required to use SAML authentication on the gateway node. Specify the directory only, not the full path to the file.
The default Informatica truststore is used if no truststore is specified.
-SamlTrustStorePassword
-stp
saml_truststore_password
Required if you use a custom truststore for SAML authentication. The password for the custom truststore.
-AdminconsolePort
-ap
admin_tool_port
Optional. Port to access Informatica Administrator.
-HttpsPort
-hs
admin_tool_https_port
Optional. Port number to secure the connection to the Administrator tool. Set this port number if you want to configure HTTPS for a node.
To disable HTTPS support for a node, set this port number to zero.
-KeystoreFile
-kf
admin_tool_keystore_file_location
Optional. Keystore file that contains the keys and certificates required if you use the SSL security protocol.
-KeystorePass
-kp
admin_tool_keystore_password
Optional. A plain-text password for the keystore file. You can set a password with the -kp option or the environment variable INFA_PASSWORD. If you set a password with both methods, the password set with the -kp option takes precedence.
-LogServiceDirectory
-ld
log_service_directory
Optional. Shared directory path used by the Log Manager to store log event files. Verify that -ld does not match or contain the specified -sld value.
-SystemLogDirectory
-sld
system_log_directory
Optional. Directory path to store system log files. Verify that -ld does not match or contain the specified -sld value. Default is <INFA_home>/logs.
-ServerPort
-sv
server_shutdown_port
Optional. TCP/IP port number used by the Service Manager. The Service Manager listens for shutdown commands from PowerCenter components on this port. Set this port number if you have multiple nodes on one machine or if the default port -number is in use. Default is 8005.
-AdminconsoleShutdownPort
-asp
admin_tool_shutdown_port
Optional. Port number that controls shutdown for Informatica Administrator.
-Tablespace
-ts
tablespace_name
Required for an IBM DB2 database. Name of the tablespace where the domain configuration database tables reside.
-SchemaName
-sc
schema_name <used for MSSQLServer only>
Optional. Name of the Microsoft SQL Server schema. Enter a schema name if you are not using the default schema.
-DatabaseTlsEnabled
-dbtls
database_tls_enabled
Optional. Indicates whether the Informatica domain database is secure with TLS or SSL. Set this option to True for the secure database. Default is false. If you specify the ‑dbtls option without a value, the Informatica domain uses secure communication to the Informatica domain database.
-DatabaseTruststorePassword
-dbtp
database_truststore_password
Optional. Password for the database truststore file for the secure database.
-TrustedConnection
-tc
trusted_connection <used for MSSQLServer only>
Optional. Connect to the Microsoft SQL Server database through a trusted connection. Trusted authentication uses the Windows security credentials of the current user to connect to Microsoft SQL Server.
-resetHostPort
-rst
resetHostPort
Required if you specify the NodeAddress or ServiceManager option. Resets the host port number.
-DatabaseTruststoreLocation
-dbtl
database_truststore_location
Optional. Path and file name of the truststore file for the gateway node.

0 COMMENTS

We’d like to hear from you!