If you are the administrator, set up an organization from the
Organization
page in
Administrator
. An organization is a secure area within the
Informatica Intelligent Cloud Services
repository that stores your licenses, user accounts, ingestion tasks, and information about jobs and security.
Then, configure users, user groups, and user role permissions for the organization.
If your organization has the Organization Hierarchy license, you can also create one or more sub-organizations within your organization. You can create sub-organizations to represent different business environments in your company. For example, you might create separate sub-organizations to represent your development, testing, and production environments.
For more information, see "Organizations" in the
Administrator
help.
Step 3. Download and install a Secure Agent
On the
Runtime Environments
page in
Administrator
, download a local Secure Agent and install it. A Secure Agent is a lightweight program that runs tasks and enables secure communication across the firewall between your organization and
Informatica Intelligent Cloud Services
.
You can use a single Secure Agent or a Secure Agent group with multiple agents.
Alternatively, you can use serverless runtime environments hosted on Microsoft Azure
for
application ingestion and replication
initial load jobs and
database ingestion and replication
jobs that
have a supported source type. For more information, see
Data Ingestion and Replication
Connectors and Connections
docurmentation for your connector.
Data Ingestion and Replication
does
not support the Informatica Cloud Hosted Agent.
When you download and install a Secure Agent, a
Secure Agent group
, also called a runtime environment, is created. A Secure Agent group can contain one Secure Agent or multiple agents if your licensing allows it.
To achieve the best performance in high-volume or performance-critical environments, run
Data Ingestion and Replication
tasks
on a Secure Agent or Secure Agent group that's dedicated to
Data Ingestion and Replication
, that
is, not shared with any other products or processes.
After you enable services and connectors for the Secure Agent group, the components and packages based on your selections are downloaded and an associated runtime environment is created. For more information, see "Secure Agent Groups" in the
Administrator
help.
If you use a Secure Agent group with multiple agents, an available agent will be picked from
the active agent list to run your jobs.The use of multiple agents is supported for
application and database ingestion and replication initial load jobs with any source
type and for database ingestion and replication incremental load and combined
initial and incremental load jobs with a Db2 for i, Db2 for z/OS, Oracle, or SQL
Server source subject to some limitations. For information about automatic agent
switchovers, see Agent failover in a Secure Agent group.
If you are an administrator of a parent organization, you can share the parent organization's Secure Agent group with sub-organizations. However, a sub-organization user cannot share a Secure Agent group. When a Secure Agent group is shared, users in the sub-organizations can create application or database ingestion and replication tasks of any load type and run the associated jobs on the Secure Agents in the group. Sharing a Secure Agent group can help optimize the use of available Secure Agent resources. For more information, see "Shared Secure Agent groups" in the Administrator help.
Guidelines:
If you remove a Secure Agent from
a Secure Agent group and add it to another Secure Agent group, wait at least 60
minutes before trying to use it to run application or database ingestion and
replication jobs.
Application Ingestion and
Replication
and
Database Ingestion and
Replication
refresh the internal cache of Secure Agent runtime
information every hour by default.
If you use Secure Agent
sub-organizations, you cannot unlink a sub-organization from a parent
organization and then relink it to another parent organization. If you do,
problems such as duplicate run IDs can occur for your jobs.
If you create a connection using
a shared Secure Agent group as the runtime environment and create an application
or database ingestion and replication task with that connection under a
sub-organization that uses a non-shared Secure Agent group, the task wizard
can't fetch the list of schemas for the target. The connection and task must
both use a shared Secure Agent group, either the same shared group or different
shared groups.
Step 4. Configure the runtime environment
On the
Runtime Environments
page in
Administrator
, create a new runtime environment with one or more Secure Agents, or select the runtime environment you want to use and make sure it's running. Alternatively, in the
Runtime environments
panel on the Home page, click
Manage runtime environments
to go to the
Runtime Environments
page in Administrator.
A runtime environment is the execution platform for running tasks. You must have at least one runtime environment in your organization for users to be able to run tasks. If you create another runtime environment, you must add an unassigned Secure Agent to it.
Under
System Configuration Details
, configure properties for the CMI Streaming Agent, Database Ingestion, or Mass Ingestion (file ingestion) service. For more information, see
Secure Agent services.
If your cloud environment is Azure, you can configure a serverless runtime
environment. This environment is hosted by Informatica, so you don't need to
configure a Secure Agent or Secure Agent group. For more information about
serverless runtime environments, see
Administrator
>
Runtime
environments
>
Serverless runtime environments
.
Step 5. Configure connections
From the
Connections
page in
Administrator
, configure connection properties for the source and target connectors that you want to use in
Data Ingestion and Replication
tasks. To quickly get to the
New Connection
page, you can click the
Let's get connected!
pane on the Home page.
For more information, see
Connectors and Connections
>
Data Ingestion and Replication connectors
and
Data Ingestion and Replication connection properties
.
Step 6. Create your project
On the
Explore
page , you can create projects and project folders to organize your