Hi, I'm Ask INFA!
What would you like to know?
ASK INFAPreview
Please to access Ask INFA.

Getting Started with Data Ingestion and Replication

Getting Started with Data Ingestion and Replication

Getting Started with Data Ingestion and Replication

Getting Started with
Data Ingestion and Replication

Before you configure a
Data Ingestion and Replication
task, verify that all prerequisite steps have been completed. Most of these steps are completed in the common Administrator service.

Step 1. Check system requirements

Check the following items:

Step 2. Set up an organization.

If you are the administrator, set up an organization from the
Organization
page in
Administrator
. An organization is a secure area within the
Informatica Intelligent Cloud Services
repository that stores your licenses, user accounts, ingestion tasks, and information about jobs and security.
Then, configure users, user groups, and user role permissions for the organization.
If your organization has the Organization Hierarchy license, you can also create one or more sub-organizations within your organization. You can create sub-organizations to represent different business environments in your company. For example, you might create separate sub-organizations to represent your development, testing, and production environments.
For more information, see "Organizations" in the
Administrator
help.

Step 3. Download and install a Secure Agent

On the
Runtime Environments
page in
Administrator
, download a local Secure Agent and install it. A Secure Agent is a lightweight program that runs tasks and enables secure communication across the firewall between your organization and
Informatica Intelligent Cloud Services
.
You can use a single Secure Agent or a Secure Agent group with multiple agents. Alternatively, you can use serverless runtime environments hosted on Microsoft Azure for
application ingestion and replication
initial load jobs and
database ingestion and replication
jobs that have a supported source type. For more information, see
Data Ingestion and Replication
Connectors and Connections
docurmentation for your connector.
Data Ingestion and Replication
does not support the Informatica Cloud Hosted Agent.
When you download and install a Secure Agent, a
Secure Agent group
, also called a runtime environment, is created. A Secure Agent group can contain one Secure Agent or multiple agents if your licensing allows it.
To achieve the best performance in high-volume or performance-critical environments, run
Data Ingestion and Replication
tasks on a Secure Agent or Secure Agent group that's dedicated to
Data Ingestion and Replication
, that is, not shared with any other products or processes.
After you enable services and connectors for the Secure Agent group, the components and packages based on your selections are downloaded and an associated runtime environment is created. For more information, see "Secure Agent Groups" in the
Administrator
help.
If you use a Secure Agent group with multiple agents, an available agent will be picked from the active agent list to run your jobs.The use of multiple agents is supported for application and database ingestion and replication initial load jobs with any source type and for database ingestion and replication incremental load and combined initial and incremental load jobs with a Db2 for i, Db2 for z/OS, Oracle, or SQL Server source subject to some limitations. For information about automatic agent switchovers, see Agent failover in a Secure Agent group.
If you are an administrator of a parent organization, you can share the parent organization's Secure Agent group with sub-organizations. However, a sub-organization user cannot share a Secure Agent group. When a Secure Agent group is shared, users in the sub-organizations can create application or database ingestion and replication tasks of any load type and run the associated jobs on the Secure Agents in the group. Sharing a Secure Agent group can help optimize the use of available Secure Agent resources. For more information, see "Shared Secure Agent groups" in the Administrator help.
Guidelines:
  • If you remove a Secure Agent from a Secure Agent group and add it to another Secure Agent group, wait at least 60 minutes before trying to use it to run application or database ingestion and replication jobs.
    Application Ingestion and Replication
    and
    Database Ingestion and Replication
    refresh the internal cache of Secure Agent runtime information every hour by default.
  • If you use Secure Agent sub-organizations, you cannot unlink a sub-organization from a parent organization and then relink it to another parent organization. If you do, problems such as duplicate run IDs can occur for your jobs.
  • If you create a connection using a shared Secure Agent group as the runtime environment and create an application or database ingestion and replication task with that connection under a sub-organization that uses a non-shared Secure Agent group, the task wizard can't fetch the list of schemas for the target. The connection and task must both use a shared Secure Agent group, either the same shared group or different shared groups.

Step 4. Configure the runtime environment

On the
Runtime Environments
page in
Administrator
, create a new runtime environment with one or more Secure Agents, or select the runtime environment you want to use and make sure it's running. Alternatively, in the
Runtime environments
panel on the Home page, click
Manage runtime environments
to go to the
Runtime Environments
page in Administrator.
A runtime environment is the execution platform for running tasks. You must have at least one runtime environment in your organization for users to be able to run tasks. If you create another runtime environment, you must add an unassigned Secure Agent to it.
Under
System Configuration Details
, configure properties for the CMI Streaming Agent, Database Ingestion, or Mass Ingestion (file ingestion) service. For more information, see Secure Agent services.
If your cloud environment is Azure, you can configure a serverless runtime environment. This environment is hosted by Informatica, so you don't need to configure a Secure Agent or Secure Agent group. For more information about serverless runtime environments, see
Administrator
>
Runtime environments
>
Serverless runtime environments
.

Step 5. Configure connections

From the
Connections
page in
Administrator
, configure connection properties for the source and target connectors that you want to use in
Data Ingestion and Replication
tasks. To quickly get to the
New Connection
page, you can click the
Let's get connected!
pane on the Home page.
For more information, see
Connectors and Connections
>
Data Ingestion and Replication connectors
and
Data Ingestion and Replication connection properties
.

Step 6. Create your project

On the
Explore
page , you can create projects and project folders to organize your
Data Ingestion and Replication
tasks. To access the Explore page, click
Explore
in the left navigation bar of the Home page. A project can contain multiple subfolders. See Creating projects and project folders.

0 COMMENTS

We’d like to hear from you!