Table of Contents

Search

  1. Preface
  2. Transformations
  3. Source transformation
  4. Target transformation
  5. Access Policy transformation
  6. Aggregator transformation
  7. B2B transformation
  8. Chunking transformation
  9. Cleanse transformation
  10. Data Masking transformation
  11. Data Services transformation
  12. Deduplicate transformation
  13. Expression transformation
  14. Filter transformation
  15. Hierarchy Builder transformation
  16. Hierarchy Parser transformation
  17. Hierarchy Processor transformation
  18. Input transformation
  19. Java transformation
  20. Java transformation API reference
  21. Joiner transformation
  22. Labeler transformation
  23. Lookup transformation
  24. Machine Learning transformation
  25. Mapplet transformation
  26. Normalizer transformation
  27. Output transformation
  28. Parse transformation
  29. Python transformation
  30. Rank transformation
  31. Router transformation
  32. Rule Specification transformation
  33. Sequence transformation
  34. Sorter transformation
  35. SQL transformation
  36. Structure Parser transformation
  37. Transaction Control transformation
  38. Union transformation
  39. Vector Embedding transformation
  40. Velocity transformation
  41. Verifier transformation
  42. Web Services transformation

Transformations

Transformations

Install and configure Python

Install and configure Python

Install and configure your Python code to run on a Secure Agent machine. Configure tasks such as setting the advanced session property and installing the Python packages.
You can't create a custom Python installation when you use a serverless runtime environment, so these steps don't apply.
To install and configure Python, complete the following tasks:
  1. To allow the Python transformation to use third-party libraries, make sure that the runtime environment has access to an installation of Python and the referenced resource files.
  2. Install the prerequisite packages on the Secure Agent machine.
  3. Download the version of Python that you want to install on the Secure Agent machine and extract the files.
  4. Prepare the installation directory.
  5. Compile and build the installation directory.
  6. Set environment variables to allow the Secure Agent machine access to the installation.
  7. Verify the installation contains the correct folders.
  8. For custom installations, install the str2bool library.
  9. If your installation uses third-party libraries, install them.
  10. Copy the installation to the Secure Agent machine.
  11. If your installation uses third-party libraries, verify their installation.

0 COMMENTS

We’d like to hear from you!