DataPrivacyManagment en
DataPrivacyManagment en
10.5.2
This software and documentation are provided only under a separate license agreement containing restrictions on use and disclosure. No part of this document may be
reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise) without prior consent of Informatica LLC.
Informatica, the Informatica logo, PowerCenter, and PowerExchange are trademarks or registered trademarks of Informatica LLC in the United States and many
jurisdictions throughout the world. A current list of Informatica trademarks is available on the web at https://www.informatica.com/trademarks.html. Other company
and product names may be trade names or trademarks of their respective owners.
Subject to your opt-out rights, the software will automatically transmit to Informatica in the USA information about the computing and network environment in which the
Software is deployed and the data usage and system statistics of the deployment. This transmission is deemed part of the Services under the Informatica privacy policy
and Informatica will use and otherwise process this information in accordance with the Informatica privacy policy available at https://www.informatica.com/in/
privacy-policy.html. You may disable usage collection in Administrator tool.
U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial
computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such,
the use, duplication, disclosure, modification, and adaptation is subject to the restrictions and license terms set forth in the applicable Government contract, and, to the
extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License.
The product includes ACE(TM) and TAO(TM) software copyrighted by Douglas C. Schmidt and his research group at Washington University, University of California,
Irvine, and Vanderbilt University, Copyright (©) 1993-2006, all rights reserved.
This product includes Curl software which is Copyright 1996-2013, Daniel Stenberg, <[email protected]>. All Rights Reserved. Permissions and limitations regarding this
software are subject to terms available at http://curl.haxx.se/docs/copyright.html. Permission to use, copy, modify, and distribute this software for any purpose with or
without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies.
This product includes ICU software which is copyright International Business Machines Corporation and others. All rights reserved. Permissions and limitations
regarding this software are subject to terms available at http://source.icu-project.org/repos/icu/icu/trunk/license.html.
This product includes OSSP UUID software which is Copyright © 2002 Ralf S. Engelschall, Copyright © 2002 The OSSP Project Copyright © 2002 Cable & Wireless
Deutschland. Permissions and limitations regarding this software are subject to terms available at http://www.opensource.org/licenses/mit-license.php.
This software and documentation contain proprietary information of Informatica LLC and are provided under a license agreement containing restrictions on use and
disclosure and are also protected by copyright law. Reverse engineering of the software is prohibited. No part of this document may be reproduced or transmitted in any
form, by any means (electronic, photocopying, recording or otherwise) without prior consent of Informatica LLC. This Software may be protected by U.S. and/or
international Patents and other Patents Pending.
The information in this documentation is subject to change without notice. If you find any problems in this documentation, report them to us at
[email protected].
Informatica products are warranted according to the terms and conditions of the agreements under which they are provided. INFORMATICA PROVIDES THE
INFORMATION IN THIS DOCUMENT "AS IS" WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT.
Portions of this software and/or documentation are subject to copyright held by third parties. Required third party notices are included with the product.
Table of Contents 3
Create a System User Account. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Set Up a Keystore File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Extract the Installer Files. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Installer Code Signing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Verify Installer Package Checksum on UNIX and Linux. . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Prepare to Install Binaries for Informatica Platform Resources. . . . . . . . . . . . . . . . . . . . . . . . . 32
Verify the License Key. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Prepare for Cluster Import. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
4 Table of Contents
Chapter 4: Prepare for Enterprise Data Catalog Deployment. . . . . . . . . . . . . . . 62
Checklist to Prepare for Enterprise Data Catalog Deployment. . . . . . . . . . . . . . . . . . . . . . . . . 62
Deployment Planning. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Informatica Cluster Service and Associated Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Common Operating System Prerequisites. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 63
Operating System Prerequisites for Red Hat Enterprise Linux. . . . . . . . . . . . . . . . . . . . . . . . . . 68
Operating System Prerequisites for SUSE Linux Enterprise Server . . . . . . . . . . . . . . . . . . . . . . 68
Node Prerequisites. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Host Node Prerequisites. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Cluster Node Prerequisites. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69
Table of Contents 5
Product Installation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Tune the Application Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Specify the Installation Directory. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Prepare the Pre-validation Utility. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Configure the Domain. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Configure the Domain Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Domain Security - Secure Communication. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
Domain Configuration Repository. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 104
Domain Security - Encryption Key. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
Domain and Node Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Model Repository Database. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Model Repository Database for Monitoring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
Data Integration Service. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Content Management Service Parameters and Database. . . . . . . . . . . . . . . . . . . . . . . . 117
Profiling Warehouse Connection Database. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Create and Configure the Informatica Cluster Service. . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Catalog Service Parameters. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 124
Data Privacy Management Service Configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
6 Table of Contents
Chapter 11: Run the Silent Installer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Installing in Silent Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Configure the Properties File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Run the Installer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Encrypting Passwords in the Properties File. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Table of Contents 7
Chapter 15: Prepare to Create the Application Services. . . . . . . . . . . . . . . . . 168
Checklist for Preparing to Create Application Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 168
Create a Keystore for a Secure Connection to a Web Application Service. . . . . . . . . . . . . . . . . 169
Log In to Informatica Administrator. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
Create Connections. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
IBM DB2 Connection Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
Microsoft Azure SQL Database Connection Properties. . . . . . . . . . . . . . . . . . . . . . . . . . 171
Microsoft SQL Server Connection Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
Oracle Connection Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
PostgreSQL Connection Properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
Creating a Connection. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
8 Table of Contents
Starting the Developer Tool. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
Table of Contents 9
Preface
Follow the instructions in Installation for Data Privacy Management to install Data Privacy Management. You
can install Data Privacy Management and Informatica clients on one or more machines. The guide includes
pre- and post-requisite tasks and steps to install Data Privacy Management and Informatica clients for the
Informatica domain. Prerequisite tasks include planning the environment, setting up databases, and verifying
system requirements. Post-requisite tasks include additional application services and configuring
environment variables.
Informatica Resources
Informatica provides you with a range of product resources through the Informatica Network and other online
portals. Use the resources to get the most from your Informatica products and solutions and to learn from
other Informatica users and subject matter experts.
Informatica Network
The Informatica Network is the gateway to many resources, including the Informatica Knowledge Base and
Informatica Global Customer Support. To enter the Informatica Network, visit
https://network.informatica.com.
To search the Knowledge Base, visit https://search.informatica.com. If you have questions, comments, or
ideas about the Knowledge Base, contact the Informatica Knowledge Base team at
[email protected].
10
Informatica Documentation
Use the Informatica Documentation Portal to explore an extensive library of documentation for current and
recent product releases. To explore the Documentation Portal, visit https://docs.informatica.com.
If you have questions, comments, or ideas about the product documentation, contact the Informatica
Documentation team at [email protected].
Informatica Velocity
Informatica Velocity is a collection of tips and best practices developed by Informatica Professional Services
and based on real-world experiences from hundreds of data management projects. Informatica Velocity
represents the collective knowledge of Informatica consultants who work with organizations around the
world to plan, develop, deploy, and maintain successful data management solutions.
You can find Informatica Velocity resources at http://velocity.informatica.com. If you have questions,
comments, or ideas about Informatica Velocity, contact Informatica Professional Services at
[email protected].
Informatica Marketplace
The Informatica Marketplace is a forum where you can find solutions that extend and enhance your
Informatica implementations. Leverage any of the hundreds of solutions from Informatica developers and
partners on the Marketplace to improve your productivity and speed up time to implementation on your
projects. You can find the Informatica Marketplace at https://marketplace.informatica.com.
To find your local Informatica Global Customer Support telephone number, visit the Informatica website at
the following link:
https://www.informatica.com/services-and-training/customer-success-services/contact-us.html.
To find online support resources on the Informatica Network, visit https://network.informatica.com and
select the eSupport option.
Preface 11
Part I: Installation Getting Started
This part contains the following chapter:
12
Chapter 1
Installation Overview
Welcome to the Informatica installer Informatica domain services and clients. The Informatica domain
services consist of core services to support the domain and application services. The Informatica clients
consist of thick and web client applications.
When you install the Informatica domain services, you are prompted to create a domain or to join a domain.
The domain is a collection of nodes that represent the machines on which the application services run. The
first time you run the installer, you must create the domain. If you install on a single machine, you create the
Informatica domain and a gateway node on the machine. If you install on multiple machines, you create an
Informatica domain and a gateway node during the first installation. During the installation on the additional
machines, you create gateway or worker nodes that you join to the domain.
13
If you have other Informatica products installed, verify that the installed version is compatible with the
version of the product that you are installing.
If you already installed Data Engineering and Enterprise Data Catalog, you can run the installer to install Data
Privacy Management on a node in the domain.
Installation Process
The installation of the Informatica domain services and Informatica clients consists of multiple phases.
The installation process varies based on the products that you install. Consider the following high-level tasks
of the installation process:
1. Plan the Informatica installation. Determine the products that you want to run in your environment.
If you are creating a domain, consider the number of nodes in the domain, the application services
that will run on each node, the system requirements, and the type of user authentication that the
domain will use.
2. Prepare the databases required for repositories, warehouses, and catalogs. Verify the database
requirements and set up the databases.
3. Set up the machines to meet system requirements to ensure that you can successfully install and
run the Informatica services.
4. Determine security requirements for the domain, services, and databases.
When you run the installer, you can choose from different options based on your requirements.
1. Verify the installation and third-party software requirements for the clients.
2. Use the client installer to install on Windows machines.
3. Configure required environment variables, and optionally install additional languages.
When you run the installer, you can choose from options in the Welcome panel based on the product or
products that you want to install. The Components panel appears based on your product selection so you can
choose product components.
The following image shows the products that you can install based on the installation options:
Consider the different options available when you run the installer:
Informatica domain services
To install the Informatica domain services, you can select the installation option 1 in the Components
panel to install and configure Informatica domain services.
With the Informatica domain services installation, install from one of the following product options:
• Only the Data Engineering products for Integration, Quality, and Streaming
• Traditional products and the aforementioned Data Engineering products
• Only traditional products such as PowerCenter and Informatica Data Quality
When you install Informatica domain services, you can choose to create a domain or join a domain. Test
Data Management is installed with both traditional and Data Engineering products.
To install Enterprise Data Catalog, you can select the installation option 2 in the Components panel to
install and configure Enterprise Data Catalog.
When you install Enterprise Data Catalog, choose from one of the follow options:
To install Enterprise Data Preparation, you can select the following installation option 3 in the
Components panel to install and configure Enterprise Data Preparation.
• Data Engineering products, Enterprise Data Catalog, and Enterprise Data Preparation.
• Enterprise Data Catalog and Enterprise Data Preparation binaries in an existing domain. After you
install the binaries, you can run the installer again to configure the services.
• Only Enterprise Data Preparation binaries in an existing domain with Enterprise Data Catalog. After
you install the binaries, you can run the installer again to configure the services.
To install Data Privacy Management, you can select the following installation option 4 in the
Components panel to install and configure Data Privacy Management.
When you install Data Privacy Management, choose from one of the follow options:
• Data Engineering products, Enterprise Data Catalog, and Data Privacy Management.
• Data Privacy Management in an existing domain with Enterprise Data Catalog.
Nodes
The first time that you install the domain services, you create the Informatica domain and a gateway node.
When you install the domain services on other machines, you create additional nodes that you join to the
domain.
• Gateway node. A gateway node is any node that you configure to serve as a gateway for the domain. A
gateway node can run application services and it can serve as a master gateway node. The master
gateway node is the entry point to the domain. You can configure more than one node as a gateway node,
but only gateway node acts as the master gateway node at any given time.
When you plan the installation: You need to plan the number and type of nodes that you need based on your
service and processing requirements. If you have high availability, you will want to create more than one
gateway node for fail-over functionality.
Service Manager
The Service Manager is a service that manages all domain operations. The Service Manager runs on each
node in the domain and performs domain functions, such as authentication, logging and application service
management. The Service Manager on a gateway node performs more tasks than the Service Manager on a
worker node.
When you plan the installation: Note that the Service Manager functionality is associated with the type of
node.
Application Services
Application services represent server-based functionality. An application service might be required or
optional, and it might require access to a database.
When you run the installer, you can choose to create some services. After you complete the installation, you
create other application services based on the license key generated for your organization.
When you plan the installation: When you plan the application services, you must account for the associated
services that connect to the application service. You also must plan the relational databases that are
required to create the application service.
Databases
Some application services require databases to store metadata and to write run-time results. You need to
create databases for the application services in the domain.
The domain configuration repository stores configuration and user information from a domain.
The data asset analytics repository stores the analytical information collected from the catalog. You can
view reports and statistical data on the Analytics tab in Enterprise Data Catalog.
The reference data warehouse stores the data values for reference table objects that you define in a
Model repository. Configure a Content Management Service to identify the reference data warehouse
and the Model repository.
The data object cache stores cached logical data objects and virtual tables for the Data Integration
Service. Data object caching enables the Data Integration Service to access pre-built logical data objects
and virtual tables.
The profiling warehouse stores profiling and scorecard results. You need a profiling warehouse to
perform profiling and data discovery.
The Data Privacy Management repository stores data and metadata, such as data stores and scans
using Data Privacy Management.
The Model repository stores data and metadata from the Informatica services and clients. Informatica
client tools, such as Analyst tool and the Developer tool stores the data into the Model repository.
The Monitoring Model repository stores statistics for ad hoc jobs, applications, logical data objects, SQL
data services, web services, and workflows created by Informatica clients and application services.
When you plan the installation: You need to create databases and database users required by application
services.
User Authentication
When you run the installer, you can choose the authentication to use for the domain.
The Informatica domain can use the following types of authentication to authenticate users in the domain:
• Native. Native user accounts are stored in the domain and can only be used within the domain. Native
authentication is default.
• LDAP. LDAP user accounts are stored in an LDAP directory service and are shared by applications within
the enterprise. You can configure LDAP authentication after you run the installer.
• SAML. You can configure Security Assertion Markup Language (SAML) authentication for the
Administrator tool, the Analyst tool, and the Monitoring tool. You can configure SAML authentication after
you run the installer.
When you plan the installation: You need to plan the type of authentication that you want to use in the
domain.
When you create a domain, you must specify the encryption key directory. The installer generates an
encryption key file named siteKey and stores it in a default directory or the directory you specify. All nodes in
a domain must use the same encryption key.
Important: The installer also generates a unique site key. If you lose the site key, you cannot generate the site
key again. Make sure that you save a copy of this key and do not share the unique site key with others.
Domain Security
When you create a domain, you can enable options to configure security in the domain.
You can configure secure communication for the following domain components:
• Administrator tool. Configure a secure HTTPS connection for the Administrator tool. During installation,
you can provide the keystore file to use for the HTTPS connection.
When you plan the installation: Determine the level of security that you want to configure for the domain
components. If you decide to configure security for the domain, you must know the location and password
for the keystore and truststore files.
The Informatica clients consist of thick client applications and thin or web client applications that you use to
access services and repositories in the domain.
The following table describes the client tools for Enterprise Data Catalog:
Informatica Developer (the Developer A thick client application to create, import, and export data domains.
tool)
Informatica Administrator (the A web application to manage the domain and application services.
Administrator tool)
Informatica Catalog Administrator A web application to administer resources, scanners, schedules, attributes,
and connections.
Enterprise Data Catalog A web application that displays a comprehensive view of metadata from
configured data assets.
When you plan the installation: Determine how many instances of the Developer tool you want to install. You
do not need to plan for the web client applications.
The following table describes the tools for Data Privacy Management:
Data Privacy Management A web application to create and work with Data Privacy Management repository
data and objects. You run scans and analyze sensitive data from the application.
Informatica Developer (the A thick client application to create and run data objects, mappings, profiles, and
Developer tool) workflows.
Informatica Administrator (the A web application to manage the domain and application services.
Administrator tool)
When you plan the installation: Determine how many instances of the Developer tool you want to install. You
do not need to plan for the web client applications.
20
Chapter 2
Read the Informatica Release Notes for updates to the installation and upgrade process.
21
Set up keystore and truststore files if you want to use custom SSL certificates to secure communication
for the domain.
For more information about product requirements and supported platforms, see the
Product Availability Matrix on Informatica Network.
The minimum memory requirement for the Linux operating system is 56 GB RAM. The minimum disk
space required is 185 GB. The number of CPU cores required is 24.
If the Informatica Domain, data nodes, and processing nodes are on different machines
The minimum memory requirement for the Linux operating system is 24 GB for a cluster node and 32 GB
for the machine on which Informatica domain runs. The minimum disk space required is 125 GB. The
number of CPU cores required is 8 cores for a cluster node and 16 cores for the machine on which the
Informatica domain runs.
The minimum system requirements for the machine that hosts the Data Asset Analytics repository
database is based on the number of assets in the catalog and the database type. For information about
the hardware requirements such as the number of CPU cores and the memory, see the Performance
Tuning Parameters for Data Asset Analytics section of the Enterprise Data Catalog Performance Tuning
Guide.
MetaDex Requirements
Effective in version 10.5.2, the Advanced Scanners tool is renamed to the MetaDex tool. The installer
panels and the install and upgrade guides still refer to Advanced Scanners.
The minimum memory requirement for the Linux operating system is 56 GB RAM. The minimum disk
space required is 185 GB. The number of CPU cores required is 24.
The data nodes and processing nodes are not on the Informatica Domain machine
The minimum memory requirement for the Linux operating system is 32 GB RAM. The minimum disk
space required is 125 GB. The number of CPU cores required is 16.
The installer writes temporary files to the hard disk. Verify that you have 1 GB disk space on the machine
to support the installation. When the installation completes, the installer deletes the temporary files and
releases the disk space.
Verify that you have read, write, and execute permissions on the /tmp directory.
For more information about product requirements and supported platforms, see the
Product Availability Matrix on Informatica Network.
Before you allocate resources, you need to identify the deployment type based on your requirements for the
volume of processing and the level of concurrency. Based on the deployment type, you can allocate
resources for disk space, cores, and RAM. You can also choose to tune services when you run the installer.
Basic Used for low volume processing with low levels of concurrency.
Standard Used for high volume processing with low levels of concurrency.
Advanced Used for high volume processing with high levels of concurrency.
Deployment Type Disk Space per Node Total Virtual Cores RAM per Node
Sandbox 140 GB 16 32 GB
Basic 140 GB 24 64 GB
Standard 140 GB 48 64 GB
The following table provides the minimum sizing requirements for Data Privacy Management:
Deployment Type Disk Space per Node Total Virtual Cores RAM per Node
Sandbox 140 GB 16 32 GB
Basic 140 GB 24 64 GB
Standard 140 GB 48 64 GB
The sizing numbers do not account for operational data processing and object caching requirements for
native mode of execution.
Note: For cloud deployments, choose machines with a configuration that is closest to the sizing
requirements.
You can tune services at any time after you install the services by using the infacmd autotune command.
When you run the command, you can tune properties for other services as well as the Hadoop run-time
engine properties.
Linux-x64 Red Hat Enterprise Linux All of the following packages, where <version> is any version of the
6.7 package:
- e2fsprogs-libs-<version>.el6
- keyutils-libs-<version>.el6
- libselinux-<version>.el6
- libsepol-<version>.el6
Linux-x64 Red Hat Enterprise Linux All of the following packages, where <version> is any version of the
7.3 package:
- e2fsprogs-libs-<version>.el7
- keyutils-libs-<version>.el7
- libselinux-<version>.el7
- libsepol-<version>.el7
Linux-x64 Red Hat Enterprise Linux All of the following packages, where <version> is any version of the
8 package:
- e2fsprogs-libs-<version>.el8
- keyutils-libs-<version>.el8
- libselinux-<version>.el8
- libsepol-<version>.el8
You can specify the port numbers to use for the components and a range of dynamic port numbers to use for
the application services. Or you can use the default port numbers provided by the installer. Verify that the
port numbers are available on the machines where you run the installer.
Note: Services and nodes can fail to start if there is a port conflict.
Port Description
Node port Port number for the node created during installation. Default is 6005.
Service Manager port Port number used by the Service Manager on the node. The Service Manager listens for
incoming connection requests on this port. Client applications use this port to communicate
with the services in the domain. The Informatica command line programs use this port to
communicate to the domain. This is also the port for the SQL data service JDBC/ODBC driver.
Default is 6006.
Service Manager Port number that controls server shutdown for the domain Service Manager. The Service
Shutdown port Manager listens for shutdown commands on this port. Default is 6007.
Informatica Port number that controls server shutdown for Informatica Administrator. Informatica
Administrator Administrator listens for shutdown commands on this port. Default is 6009.
shutdown port
Minimum port Lowest port number in the range of dynamic port numbers that can be assigned to the
number application service processes that run on this node. Default is 6014.
Maximum port Highest port number in the range of dynamic port numbers that can be assigned to the
number application service processes that run on this node. Default is 6114.
Range of dynamic Range of port numbers that can be dynamically assigned to application service processes as
ports for application they start up. When you start an application service that uses a dynamic port, the Service
services Manager dynamically assigns the first available port in this range to the service process. The
number of ports in the range must be at least twice the number of application service
processes that run on the node. Default is 6014 to 6114.
The Service Manager dynamically assigns port numbers from this range to the Model
Repository Service.
Static ports for Static ports have dedicated port numbers assigned that do not change. When you create the
application services application service, you can accept the default port number, or you can manually assign the
port number.
The following services use static port numbers:
- Data Privacy Management Service. Default is 18295 for HTTPS.
- Catalog Service. Default is 9085 for HTTP.
- Content Management Service. Default is 8105 for HTTP.
- Data Integration Service. Default is 8095 for HTTP.
- Informatica Cluster Service. Default is 9075 for HTTP.
• The port number you specify for the domain and for each component in the domain must be unique.
• The port number for the domain and domain components cannot be within the range of the port numbers
that you specify for the application service processes.
• The highest number in the range of port numbers that you specify for the application service processes
must be at least three numbers higher than the lowest port number. For example, if the minimum port
number in the range is 6400, the maximum port number must be at least 6403.
• The port numbers that you specify cannot be lower than 1025 or higher than 65535.
Informatica service processes can use a large number of files. To prevent errors that result from the large
number of files and processes, you can change system settings with the limit command if you use a C shell,
or the ulimit command if you use a Bash shell.
To change system settings, run the limit or ulimit command with the pertinent flag and value. For example, to
set the file descriptor limit, run the following command:
To set the max user processes, run the following command: Run the following command to set the max user
processes setting:
If you are an operating system user, set the following NOPASSWD entry:
If you belong to the wheel group, set the following NOPASSWD entry:
Variable Description
IATEMPDIR Location of the temporary files created during installation. Informatica requires 1 GB disk space for
temporary files.
Configure the environment variable if you do not want to create temporary files in the /tmp directory.
If you want to change the default /tmp directory, you must set IATEMPDIR and _JAVA_OPTIONS
environment variables to the new directory.
For example, set the variable to export IATEMPDIR=/home/user.
Note: Unset the IATEMPDIR variable after the installation.
LANG and Change the locale to set the appropriate character encoding for the terminal session. For example,
LC_ALL set the encoding to Latin1 or ISO-8859-1 for French, EUC-JP or Shift JIS for Japanese, or
UTF-8 for Chinese or Korean. The character encoding determines the types of characters that
appear in the UNIX terminal.
DISPLAY Unset the DISPLAY environment before you run the installer. Installation might fail if the DISPLAY
environment variable has some value.
Note: Make sure that the NOEXEC flag is not set for the file system mounted on the /tmp directory.
Verify that the user account you use to install Informatica has write permission on the installation directory.
Verify that the user account that installs the Informatica service does not have any privileges and
permissions to access sensitive files on the machine where you install the Informatica services.
Before you install the Informatica services, set up the files for secure communication within the Informatica
domain or for a secure connection to the Administrator tool. To create the required files, you can use the
following programs:
You can use keytool to create an SSL certificate or a Certificate Signing Request (CSR) as well as
keystores and truststores in JKS format.
OpenSSL
You can use OpenSSL to create an SSL certificate or CSR as well as convert a keystore in JKS format to
PEM format.
For more information about OpenSSL, see the documentation on the following website:
https://www.openssl.org/docs/
For a higher level of security, send your CSR to a Certificate Authority (CA) to get a signed certificate.
The software available for download at the referenced links belongs to a third party or third parties, not
Informatica. The download links are subject to the possibility of errors, omissions or change. Informatica
assumes no responsibility for such links and/or such software, disclaims all warranties, either express or
implied, including but not limited to, implied warranties of merchantability, fitness for a particular purpose,
title and non-infringement, and disclaims all liability relating thereto.
You can use keytool or OpenSSL to create the CSR and private key.
If you use RSA encryption, you must use more than 512 bits.
You must have a keystore in PEM format named infa_keystore.pem and a keystore in JKS format
named infa_keystore.jks.
The keystore files must contain the root and intermediate SSL certificates.
Note: The password for the keystore in JKS format must be the same as the private key pass phrase
used to generate the SSL certificate.
You must have a truststore in PEM format named infa_truststore.pem and a truststore in JKS format
named infa_truststore.jks.
The truststore files must contain the root, intermediate, and end user SSL certificates.
The keystore type used for the domain determines the keystore types for the Content Management Service.
If you used the default keystore certificate for the domain, you can use either the default or a custom
keystore certificate for the Content Management Service.
If you used a custom keystore certificate for the domain, you must use a custom keystore certificate for
the Content Management Service.
You can use keytool or OpenSSL to create the CSR and private key.
If you use RSA encryption, you must use more than 512 bits.
A keystore must contain only one certificate. If you use a unique certificate for each web application
service, create a separate keystore for each certificate. Alternatively, you can use a shared certificate
and keystore.
If you use the installer-generated SSL certificate for the Administrator tool, you do not need to import the
certificate into a keystore in JKS format.
You can get the installation file from the FTP link contained in your fulfillment email. Download the
Informatica installation tar file from the Informatica Electronic Software Download site to a directory on your
machine and then extract the installer files.
Extract the installer files to a directory on your machine. The user that runs the installer must have read and
write permissions on the installer files directory and execute permissions on the executable file.
Note: Make sure that you download the file to a local directory or a shared network drive that is mapped on
your machine. You can then extract the installer files. However, you cannot run the installer from a mapped
file. Copy the extracted files to a local drive and then run the installer.
Informatica uses a certificate based digital signature to sign the Informatica software code. The code signing
helps to validate the authenticity of the code and ensures that there has been no changes or corruptions to
the code after Informatica signs the code. You can determine whether to trust the software based on whether
the code sign is present or not.
You can request a code signing certificate that contains information that fully identifies Informatica LLC and
a Certificate Authority (CA) that issues the certificate. The digital certificate binds the identity of Informatica
to a public key and to a private key.
For instance, if you have to verify the package authentication and confirm the code security, enter the
following OpenSSL commands:
openssl base64 -d -in $signature -out /tmp/sign.sha256
openssl dgst -sha256 -verify <(openssl x509 -in <cert> -pubkey -noout) -signature /tmp/
sign.sha256 <file>
Where <signature> is the file containing the signature in Base64, <cert> is the code signing certificate, and
<file> is the file to verify.
Based on verification process, OpenSSL displays a success or error message to validate if the installer code
is genuine or not. Note that the verification for the installer might take around two minutes.
Verify the checksum for the specific installer files against the checksum of the installation files downloaded
from Akamai.
The following table lists the checksum and file size for the Informatica services installer for UNIX and Linux:
A checksum mismatch can occur when there are data errors during download due to network issues or when
data corruption occurs in the file on disk. For more information about the checksum errors, see
HOW TO: Identify file errors after downloading Informatica installation files.
Informatica provides ZIP files containing the scanner binaries and extended scanner binaries. The scanner
binaries ZIP file includes the Informatica Platform resource binary files for version 10.5.2. The extended
scanner binaries ZIP file includes the Informatica Platform resource binary files from version 10.2 through
10.5.1.
1. Download the ScannerBinaries.zip file or the ExtendedScannerBinaries.zip file from Akamai Download
Manager.
2. Copy the ZIP file to the following location: <Installer directory>/source
When you download the installation files from the Informatica Electronic Software Download (ESD) site, the
license key is in an email message from Informatica. Copy the license key file to a directory accessible to the
user account that installs the product.
Contact Informatica Global Customer Support if you do not have a license key or if you have an incremental
license key and you want to create a domain.
You can import cluster information from an archive file of any supported cluster into the domain. Your
administrator might prefer to provide you with the archive file to protect sensitive connection information to
the cluster. The archive file can be in a .zip or .tar format. Ensure that you store the archive file locally.
• core-site.xml
• hbase-site.xml. hbase-site.xml is required only if you access HBase sources and targets.
• hdfs-site.xml
• hive-site.xml
• mapred-site.xml or tez-site.xml. Include the mapred-site.xml file or the tez-site.xml file based on the Hive
execution type used on the Hadoop cluster.
• yarn-site.xml
Note: When you configure a CDP Public Cloud cluster, the hbase-site.xml file is on the Data Lake cluster. The
other files are on the Data Hub cluster.
Optionally, you can include other properties specific to the Databricks environment. When you complete
the .xml file, compress it into a .zip or .tar file for import.
Identify the application services that you want the installer to create.
35
Prepare for Application Services and Databases
Overview
When you plan the application services, you must account for the associated services that connect to the
application service. You also must plan the relational databases that the application service requires.
The installer prompts you to optionally create some services during the installation. Some service properties
require database information. If you want the installer to create a service that requires a database, you must
prepare the database before you run the installer. To prepare the databases, verify the data base
requirements, set up the database, and set up a user account. The database requirements depend on the
application services that you create.
If you do not create services during installation, you can create them manually after you install.
Use the following rules and guidelines when you set up the user accounts:
• The database user account must have permissions to create and drop tables, indexes, and views, and to
select, insert, update, and delete data from tables.
• Use 7-bit ASCII to create the password for the account.
• To prevent database errors in one repository from affecting any other repository, create each repository in
a separate database schema with a different database user account. Do not create a repository in the
same database schema as the domain configuration repository or any other repository in the domain.
* You can create these services when you install the product.
You must set up a database and user account for the domain configuration repository before you run the
installation. The database must be accessible to all gateway nodes in the Informatica domain.
When you install Informatica, you provide the database and user account information for the domain
configuration repository. The Informatica installer uses JDBC to communicate with the domain configuration
repository.
• If the repository is in an IBM DB2 database, verify that IBM DB2 Version 10.5 is installed.
• On the IBM DB2 instance where you create the database, set the following parameters to ON:
- DB2_SKIPINSERTED
- DB2_EVALUNCOMMITTED
- DB2_SKIPDELETED
- AUTO_RUNSTATS
• On the database, set the configuration parameters.
The following table lists the configuration parameters that you must set:
Parameter Value
logfilsiz 8000
maxlocks 98
locklist 50000
auto_stmt_stats ON
• Set the allow snapshot isolation and read committed isolation level to ALLOW_SNAPSHOT_ISOLATION
and READ_COMMITTED_SNAPSHOT to minimize locking contention.
To set the isolation level for the database, run the following commands:
ALTER DATABASE DatabaseName SET ALLOW_SNAPSHOT_ISOLATION ON
ALTER DATABASE DatabaseName SET READ_COMMITTED_SNAPSHOT ON
To verify that the isolation level for the database is correct, run the following commands:
SELECT snapshot_isolation_state FROM sys.databases WHERE name=[DatabaseName]
SELECT is_read_committed_snapshot_on FROM sys.databases WHERE name = DatabaseName
• The database user account must have the CONNECT, CREATE TABLE, and CREATE VIEW privileges.
• Set the allow snapshot isolation and read committed isolation level to ALLOW_SNAPSHOT_ISOLATION
and READ_COMMITTED_SNAPSHOT to minimize locking contention.
To set the isolation level for the database, run the following commands:
ALTER DATABASE DatabaseName SET ALLOW_SNAPSHOT_ISOLATION ON
ALTER DATABASE DatabaseName SET READ_COMMITTED_SNAPSHOT ON
To verify that the isolation level for the database is correct, run the following commands:
SELECT snapshot_isolation_state FROM sys.databases WHERE name=[DatabaseName]
SELECT is_read_committed_snapshot_on FROM sys.databases WHERE name = DatabaseName
• The database user account must have the CONNECT, CREATE TABLE, and CREATE VIEW privileges.
CREATE SEQUENCE
CREATE SESSION
CREATE SYNONYM
CREATE TABLE
CREATE VIEW
• Informatica does not support Oracle public synonyms for repository tables. Verify that public synonyms
have not been created for any tables in the database.
• Verify that the database user account has CONNECT, CREATE TABLE, and CREATE VIEW privileges.
• Specify the database schema name when you use PostgreSQL as the database.
shared_buffers 2 GB 16 GB
max_wal_size 1 GB 8 GB
Catalog Service
The Catalog Service is an application service that runs Enterprise Data Catalog in the Informatica domain. It
manages the connections between service components and the users that have access to Enterprise Data
Catalog search interface and Catalog Administrator.
The catalog represents an indexed inventory of all the configured data assets in an enterprise. You can find
metadata and statistical information, such as profile statistics, data asset ratings, data domains, and data
relationships, in the catalog.
The following table summarizes the dependencies for products, services, and databases that are associated
with the Catalog Service:
Dependency Summary
Databases If you want to enable Data Asset Analytics for the Catalog Service, you can select from one of the
following databases for the Data Asset Analytics repository:
- Oracle
- SQL Server
- PostgreSQL
Configure Data Asset Analytics for the Catalog Service if you want to enable Data Flow Analytics. To
enable Data Flow Analytics for a PowerCenter resource, create a read-only database user on the
PowerCenter repository database.
Installer You can create the Catalog Service when you install Enterprise Data Catalog.
You can configure any of the following databases as the repository database for Data Asset Analytics:
• Oracle
• SQL Server
• PostgreSQL
1. Create a user name and password to access the Oracle database using the following command: CREATE
USER <Database schema>
2. Run the following commands to provide the required user privileges:
GRANT CONNECT TO <Database schema>;
GRANT RESOURCE TO <Database schema>;
GRANT CREATE VIEW TO <Database schema>;
GRANT CREATE MATERIALIZED VIEW TO <Database schema>;
GRANT UNLIMITED TABLESPACE TO <Database schema>. Alternatively, use the command
ALTER USER <Database schema> QUOTA <SIZE> ON <Tablespace name>;
Catalog Service 41
PostgreSQL Database Requirements
Perform the following steps before you configure PostgreSQL as the repository database:
Use the following guidelines when you set up the database user account for the PowerCenter repository.
1. Create a user name and password to access the database using the CREATE USER <Database schema>
IDENTIFIED BY <database schema> command.
2. Run the following commands to provide the required privileges to the database user:
GRANT CONNECT TO <Database schema>;
GRANT SELECT ON <PowerCenter repository schema>.OPB_WFLOW_RUN TO <Database schema>;
GRANT SELECT ON <PowerCenter repository schema>.OPB_SUBJECT TO <Database schema>;
3. Run the following commands to create synonyms for the tables to query the workflow execution details:
CREATE synonym <Database schema>.OPB_WFLOW_RUN FOR <PCRS schema>.OPB_WFLOW_RUN;
CREATE synonym <Database schema>.OPB_SUBJECT FOR <PCRS schema>.OPB_SUBJECT;
1. Run the following commands to create a user name and password to access the database:
USE <PowerCenter repository name>
CREATE LOGIN <New login name> WITH PASSWORD='<Password>';
CREATE USER <New user name> FOR LOGIN <New login name>;
2. Run the following commands to provide the required privileges to the database user:
GRANT SELECT ON OPB_SUBJECT TO <New user name>;
GRANT SELECT ON OPB_WFLOW_RUN TO <New user name>
1. Log in to the machine that hosts the IBM DB2 database as a root user and create a new user account on
the machine.
2. Run the following commands to provide the required privileges to the database user:
GRANT CONNECT ON <PowerCenter repository name> TO USER <Database user name>;
GRANT SELECT ON TABLE <PowerCenter repository name>."OPB_WFLOW_RUN" TO USER
<Database user name>;
GRANT SELECT ON TABLE <PowerCenter repository name>."OPB_SUBJECT" TO USER <Database
user name>;
3. Run the following commands to create aliases for the tables to query the workflow execution details:
CREATE ALIAS <Database user name>.OPB_WFLOW_RUN FOR <PowerCenter repository
name>.OPB_WFLOW_RUN;
CREATE ALIAS <Database user name>.OPB_SUBJECT FOR <PowerCenter repository
name>.OPB_SUBJECT;
Sybase
Perform the following steps before you configure Sybase as the PowerCenter data source for Data Flow
Analytics:
1. Log in to a Sybase client as an administrator and run the following commands to create a user name and
password to access the database:
sp_addlogin <New login name>, <Password>
use <PowerCenter repository name>
sp_adduser <New login name>, <New user name>
2. Run the following commands to provide the required privileges to the database user:
GRANT SELECT TO <New user name>
GRANT CREATE VIEW TO <New user name>
3. Run the following commands to create views for the tables to query the workflow execution details:
CREATE VIEW <Database user name>.OPB_WFLOW_RUN as select * from <PowerCenter
repository schema>.OPB_WFLOW_RUN
CREATE VIEW <Database user name>.OPB_SUBJECT as select * from <PowerCenter
repository schema>.OPB_SUBJECT
PostgreSQL
Perform the following steps before you configure PostgreSQL as the PowerCenter data source for Data Flow
Analytics:
1. Create a user name and password to access the database using the following command: CREATE USER
<Database user name> WITH PASSWORD '<Database user name>'
2. Create a role using the CREATE ROLE <Role name> command.
3. Run the following commands to provide the required privileges to the user:
GRANT <role name> TO <Database user name>;
GRANT CONNECT ON DATABASE "<PowerCenter repository name>" to <Role name>;
GRANT USAGE ON SCHEMA <PowerCenter repository schema> TO <Role name>;
GRANT SELECT ON OPB_WFLOW_RUN TO <Role name>;
GRANT SELECT ON OPB_SUBJECT TO <Role name>;
Catalog Service 43
Content Management Service
The Content Management Service manages reference data for data domains that use reference tables. It
uses the Data Integration Service to run mappings to transfer data between reference tables and external
data sources. When you create the service, you need to associate other application services with it.
The following table summarizes the dependencies for products, services, and databases that are associated
with the Content Management Service:
Dependency Summary
Services The Content Management Service requires a direct association with the following services:
- Model Repository Service
- Data Integration Service
Installer You can create the Content Management Service when you run the installer.
Note: You must create the Content Management Service on the same node as the Data Integration
Service.
You associate a reference data warehouse with a single Model repository. You can select a common
reference data warehouse on multiple Content Management Services if the Content Management Services
identify a common Model repository. The reference data warehouse must support mixed-case column
names.
Note: Ensure that you install the database client on the machine on which you want to run the Content
Management Service.
• Verify that the database user account has CREATETAB and CONNECT privileges.
• Verify that the database user has SELECT privileges on the SYSCAT.DBAUTH and SYSCAT.DBTABAUTH
tables.
• Informatica does not support IBM DB2 table aliases for repository tables. Verify that table aliases have
not been created for any tables in the database.
• Set the tablespace pageSize parameter to 32768 bytes.
• Set the NPAGES parameter to at least 5000. The NPAGES parameter determines the number of pages in
the tablespace.
• Set the allow snapshot isolation and read committed isolation level to ALLOW_SNAPSHOT_ISOLATION
and READ_COMMITTED_SNAPSHOT to minimize locking contention.
To set the isolation level for the database, run the following commands:
ALTER DATABASE DatabaseName SET ALLOW_SNAPSHOT_ISOLATION ON
ALTER DATABASE DatabaseName SET READ_COMMITTED_SNAPSHOT ON
To verify that the isolation level for the database is correct, run the following commands:
SELECT snapshot_isolation_state FROM sys.databases WHERE name=[DatabaseName]
SELECT is_read_committed_snapshot_on FROM sys.databases WHERE name = DatabaseName
• The database user account must have the CONNECT, CREATE TABLE, and CREATE VIEW privileges.
• Verify that the database user account has CONNECT and CREATE TABLE privileges.
ALTER SEQUENCE
ALTER TABLE
CREATE SEQUENCE
CREATE SESSION
CREATE TABLE
CREATE VIEW
DROP SEQUENCE
DROP TABLE
• Informatica does not support Oracle public synonyms for repository tables. Verify that public synonyms
have not been created for any tables in the database.
The following table lists the dependencies for products, services, and databases that are associated with the
Data Integration Service.
Dependency Summary
Services The Data Integration Service requires a direct association with the following service:
- Model Repository Service
Installer You can create the Data Integration Service when you run the installer.
The data object cache database supports the following database types:
Note: Ensure that you install the database client on the machine on which you want to run the Data
Integration Service.
• Verify that the database user account has CREATETAB and CONNECT privileges.
• Informatica does not support IBM DB2 table aliases for repository tables. Verify that table aliases have
not been created for any tables in the database.
• Set the tablespace pageSize parameter to 32768 bytes.
• Set the NPAGES parameter to at least 5000. The NPAGES parameter determines the number of pages in
the tablespace.
• Verify that the database user account has CONNECT and CREATE TABLE privileges.
• Verify that the database user account has CONNECT and CREATE TABLE privileges.
CREATE INDEX
CREATE SESSION
CREATE SYNONYM
CREATE TABLE
CREATE VIEW
DROP TABLE
INSERT INTO TABLE
UPDATE TABLE
• Informatica does not support Oracle public synonyms for repository tables. Verify that public synonyms
have not been created for any tables in the database.
Note: Ensure that you install the database client on the machine on which you want to run the Data
Integration Service. You can specify a JDBC connection as the profiling warehouse connection for IBM DB2
UDB, Microsoft SQL Server, and Oracle database types.
For more information about configuring the database, see the documentation for your database system.
• The database user account must have the CREATETAB, CONNECT, CREATE VIEW, and CREATE FUNCTION
privileges.
• Informatica does not support IBM DB2 table aliases for repository tables. Verify that table aliases have
not been created for any tables in the database.
• Set the tablespace pageSize parameter to 32768 bytes.
• Set the NPAGES parameter to at least 5000. The NPAGES parameter determines the number of pages in
the tablespace.
Note: Informatica does not support the partitioned database environment for IBM DB2 databases when you
use a JDBC connection as the profiling warehouse connection.
• The database user account must have the CONNECT, CREATE TABLE, CREATE VIEW, and CREATE
FUNCTION privileges.
ALTER TABLE
CREATE ANY INDEX
CREATE PROCEDURE
CREATE SESSION
CREATE TABLE
CREATE VIEW
DROP TABLE
UPDATE TABLE
• Informatica does not support Oracle public synonyms for repository tables. Verify that public synonyms
have not been created for any tables in the database.
• Set the following parameters to the Informatica recommended values:
open_cursors 4000
Sessions 1000
Processes 1000
Data Privacy Management stores data and metadata such as data stores and scans in the Data Privacy
Management repository. Before you create the Data Privacy Management Service, set up a database and
database user account for the Data Privacy Management repository.
Dependency Summary
Products The following products use the Data Privacy Management Service:
- Data Privacy Management
Services The Data Privacy Management Service requires a direct association with the following service:
- Catalog Service
Databases The Data Privacy Management Service uses the following databases:
- Data Privacy Management repository. Stores data and metadata such as data stores and scans that
you run in Data Privacy Management.
Installer You can create the Data Privacy Management Service when you run the installer.
The Data Privacy Management repository supports the following database types:
• IBM DB2
• Microsoft SQL Server
• Microsoft Azure SQL Database
• Oracle
• PostgreSQL
When you configure Microsoft SQL Server, you can choose to configure the Microsoft Azure SQL Database as
the Data Privacy Management repository.
Allow 3 GB of disk space for DB2. Allow 200 MB of disk space for all other database types.
For more information about configuring the database, see the documentation for your database system.
• On the IBM DB2 instance where you create the database, set the following parameters to ON:
- DB2_SKIPINSERTED
- DB2_EVALUNCOMMITTED
- DB2_SKIPDELETED
- AUTO_RUNSTATS
• On the database, set the configuration parameters.
Parameter Value
logfilsiz 8000
maxlocks 98
locklist 50000
auto_stmt_stats ON
Use the following guidelines when you set up the repository on Microsoft SQL Server:
• Set the read committed isolation level to READ_COMMITTED_SNAPSHOT to minimize locking contention.
To set the isolation level for the database, run the following command:
ALTER DATABASE DatabaseName SET READ_COMMITTED_SNAPSHOT ON
To verify that the isolation level for the database is correct, run the following command:
SELECT is_read_committed_snapshot_on FROM sys.databases WHERE name = DatabaseName
• Set the ALLOW_SNAPSHOT_ISOLATION parameter to ON.
To set the parameter to ON, run the following command:
ALTER DATABASE DatabaseName SET ALLOW_SNAPSHOT_ISOLATION ON
Use the following guidelines when you set up the repository on Microsoft SQL Server:
• Set the read committed isolation level to READ_COMMITTED_SNAPSHOT to minimize locking contention.
To set the isolation level for the database, run the following command:
ALTER DATABASE DatabaseName SET READ_COMMITTED_SNAPSHOT ON
To verify that the isolation level for the database is correct, run the following command:
SELECT is_read_committed_snapshot_on FROM sys.databases WHERE name = DatabaseName
• Set the ALLOW_SNAPSHOT_ISOLATION parameter to ON.
To set the parameter to ON, run the following command:
ALTER DATABASE DatabaseName SET ALLOW_SNAPSHOT_ISOLATION ON
To verify that the parameter is set correctly, run the following command:
SELECT is_allow_snapshot_isolation_on FROM sys.databases WHERE name = DatabaseName
• Set the AUTO_UPDATE_STATISTICS_ASYNC parameter to ON.
To set the parameter to ON, run the following command:
ALTER DATABASE DatabaseName SET AUTO_UPDATE_STATISTICS_ASYNC ON
To verify that the parameter is set correctly, run the following command:
SELECT is_auto_update_statistics_async_on FROM sys.databases WHERE name = DatabaseName
• Set the AUTO_UPDATE_STATISTICS parameter to ON.
To set the parameter to ON, run the following command:
ALTER DATABASE DatabaseName SET AUTO_UPDATE_STATISTICS ON
To verify that the parameter is set correctly, run the following command:
SELECT is_auto_update_statistics_on FROM sys.databases WHERE name = DatabaseName
• The database user account must have the CONNECT, CREATE TABLE, and CREATE VIEW privileges.
• Verify that the database user account has CONNECT, CREATE TABLE, and CREATE VIEW privileges.
• Specify the database schema name when you use PostgreSQL as the database.
• Ensure that PostgreSQL has sufficient disk space for the data files. By default, the data files are present in
the following location:
<PostgreSQL installation directory>/data
• On the database, set the configuration parameters.
The following table lists the minimum and recommended values for the configuration parameters that you
must set:
shared_buffers 2 GB 16 GB
max_wal_size 1 GB 8 GB
The following table summarizes the dependencies for products, services, and databases that are associated
with the Informatica Cluster Service:
Dependency Summary
Services The Informatica Cluster Service must be associated with the Catalog Service.
Installer You can create the Informatica Cluster Service when you install Enterprise Data Catalog.
The following table summarizes the dependencies for products, services, and databases that are associated
with the Model Repository Service.
Dependency Summary
Services The Model Repository Service does not require an association with another application service.
Installer You can create the Model Repository Service when you run the installer.
When you configure Microsoft SQL Server, you can choose to configure the Microsoft Azure SQL Database as
the Model repository.
If you specify the Windows NT credentials for the Model repository database on Microsoft SQL Server, you
must also specify the connection string syntax to include the authentication method as NTLM.
Allow 3 GB of disk space for DB2. Allow 200 MB of disk space for all other database types.
For more information about configuring the database, see the documentation for your database system.
• Specify the tablespace name when you use IBM DB2 as the Model Repository database.
• If the repository is in an IBM DB2 database, verify that IBM DB2 Version 10.5 is installed.
• On the IBM DB2 instance where you create the database, set the following parameters to ON:
- DB2_SKIPINSERTED
- DB2_EVALUNCOMMITTED
- DB2_SKIPDELETED
- AUTO_RUNSTATS
• On the database, set the configuration parameters.
The following table lists the configuration parameters that you must set:
Parameter Value
logfilsiz 8000
maxlocks 98
locklist 50000
auto_stmt_stats ON
• Set the allow snapshot isolation and read committed isolation level to ALLOW_SNAPSHOT_ISOLATION
and READ_COMMITTED_SNAPSHOT to minimize locking contention.
To set the isolation level for the database, run the following commands:
ALTER DATABASE DatabaseName SET ALLOW_SNAPSHOT_ISOLATION ON
ALTER DATABASE DatabaseName SET READ_COMMITTED_SNAPSHOT ON
To verify that the isolation level for the database is correct, run the following commands:
SELECT snapshot_isolation_state FROM sys.databases WHERE name=[DatabaseName]
SELECT is_read_committed_snapshot_on FROM sys.databases WHERE name = DatabaseName
• The database user account must have the CONNECT, CREATE TABLE, and CREATE VIEW privileges.
Note: The guidelines to set up the repository for Azure SQL Database with Active Directory authentication is
the same.
• Specify the database schema name when you use Microsoft SQL Server as the Model Repository
database.
• Set the allow snapshot isolation and read committed isolation level to ALLOW_SNAPSHOT_ISOLATION
and READ_COMMITTED_SNAPSHOT to minimize locking contention.
To set the isolation level for the database, run the following commands:
ALTER DATABASE DatabaseName SET ALLOW_SNAPSHOT_ISOLATION ON
ALTER DATABASE DatabaseName SET READ_COMMITTED_SNAPSHOT ON
To verify that the isolation level for the database is correct, run the following commands:
SELECT snapshot_isolation_state FROM sys.databases WHERE name=[DatabaseName]
SELECT is_read_committed_snapshot_on FROM sys.databases WHERE name = DatabaseName
• The database user account must have the CONNECT, CREATE TABLE, and CREATE VIEW privileges.
Note: The guidelines to set up the repositories for Microsoft Azure SQL Database and Azure SQL Database
with Active Directory authentication is the same.
CREATE SEQUENCE
CREATE SESSION
CREATE SYNONYM
CREATE TABLE
CREATE VIEW
• Informatica does not support Oracle public synonyms for repository tables. Verify that public synonyms
have not been created for any tables in the database.
• Verify that the database user account has CONNECT, CREATE TABLE, and CREATE VIEW privileges.
• Specify the database schema name when you use PostgreSQL as the database.
• Ensure that PostgreSQL has sufficient disk space for the data files. By default, the data files are present in
the following location:
<PostgreSQL installation directory>/data
• On the database, set the configuration parameters.
The following table lists the minimum and recommended values for the configuration parameters that you
must set:
shared_buffers 2 GB 16 GB
max_wal_size 1 GB 8 GB
Note: If you want to generate monitoring statistics, you must create a dedicated Model Repository Service for
monitoring. You cannot store run-time monitoring statistics in the same repository where you store object
metadata.
Dependency Summary
Products The following products use the monitoring Model Repository Service:
- Data Engineering Integration
- Data Engineering Quality
- Data Engineering Streaming
- Data Privacy Management
- Enterprise Data Catalog
- Enterprise Data Preparation
- Informatica Data Quality
- PowerCenter
- Test Data Management
Services The monitoring Model Repository Service does not require an association with another application
service.
Databases The monitoring Model Repository Service uses the following database:
- Model repository. Stores run-time monitoring statistics that you can view in the Administrator tool.
Installer You can create the monitoring Model Repository Service when you run the installer.
Native drivers are packaged with the database server and client software. Configure connectivity on the
machines that need to access the databases. To ensure compatibility between the application service and
the database, install a client software that is compatible with the database version and use the appropriate
database client libraries.
The Data Integration Service uses native database drivers to connect to the following databases:
• Source and target databases. Reads data from source databases and writes data to target databases.
• Data object cache database. Stores the data object cache.
• Profiling source databases. Reads from relational source databases to run profiles against the sources.
• Profiling warehouse. Writes the profiling results to the profiling warehouse.
• Reference tables. Runs mappings to transfer data between the reference tables and the external data
sources.
When the Data Integration Service runs on a single node or on primary and back-up nodes, install database
client software and configure connectivity on the machines where the Data Integration Service runs.
When the Data Integration Service runs on a grid, install database client software and configure connectivity
on each machine that represents a node with the compute role or a node with both the service and compute
roles.
To ensure compatibility between the application service and the database, use the appropriate database
client libraries and install a client software that is compatible with the database version.
Install the following database client software based on the type of database that the application service
accesses:
Configure connectivity on the required machines by logging in to the machine as the user who starts
Informatica services.
Oracle client
Install compatible versions of the Oracle client and Oracle database server. You must also install the
same version of the Oracle client on all machines that require it. To verify compatibility, contact Oracle.
After you configure the database environment variables, you can test the connection to the database from
the database client.
Oracle database
The following table lists the database environment variables that you need to set for the Oracle database
with sqlplus as the database utility:
DB2INSTANCE <DB2InstanceName>
PostgreSQL database
The following table lists the database environment variables that you need to set for the PostgreSQL
database:
PGSERVICEFILE Set to the location of the pg_service.conf file: <pg_service.conf file directory>/
pg_service.conf
PATH $PGHOME:${PATH}
LD_LIBRARY_PATH $PGHOME/lib:${LD_LIBRARY_PATH}
POSTGRES_ODBC Set the value to 1 for the PostgreSQL ODBC connection. You can set it either for all the
repositories in the domain or for any PostgreSQL repository that uses an ODBC connection.
ODBCHOME USER_INSTALL_DIR/ODBC7.1
ODBCINI $ODBCHOME/odbc.ini
ODBCINST $ODBCHOME/odbcinst.ini
PATH /opt/mssql-tools/bin:$PATH$PATHUSER_INSTALL_DIR/ODBC7.1:$PATHUSER_INSTALL_DIR/
server/bin:$PATH
LD_LIBRARY_PATH $ODBCHOME/lib
INFA_TRUSTSTORE USER_INSTALL_DIR/server/bin:$LD_LIBRARY_PATH
For default SSL domain, add to: USER_INSTALL_DIR/services/shared/security
For custom SSL domain, set INFA_TRUSTSTORE and INFA_TRUSTSTORE_PASSWORD
This chapter contains tasks that you must complete before you deploy Enterprise Data Catalog.
Understand about Enterprise Data Catalog deployment and the Informatica Cluster Service that runs and
manages Enterprise Data Catalog.
62
Deployment Planning
You can plan to deploy Enterprise Data Catalog on one, three, or six nodes.
Deployment of Enterprise Data Catalog involves creating and configuring the Informatica Cluster Service. The
Informatica Cluster Service runs and manages your Enterprise Data Catalog deployment. If you plan to deploy
Enterprise Data Catalog on more than one node, high availability is enabled by default to provide resiliency
and fail over for the Informatica Cluster Service.
Note: If you plan to deploy Data Privacy Management with Enterprise Data Catalog, you can plan for a six-
data-node deployment. In a six-node deployment, the nodes are split equally between Enterprise Data Catalog
and Data Privacy Management.
The Informatica Cluster Service uses a set of applications and associated services bundled with the installer
to manage and run Enterprise Data Catalog.
When you configure the Informatica Cluster Service, you can specify one, three, or six nodes on which the
associated applications and services can run. These nodes are referred to as the data nodes in the cluster.
The nodes on which you want to run profiling jobs or metadata scan jobs are referred to as processing nodes
in the cluster. There are no restrictions on the number of processing nodes that you can configure.
Effective in version 10.5.2, the Advanced Scanners tool is renamed to the MetaDex tool. The installer panels
and the install and upgrade guides still refer to Advanced Scanners.
Important: For the associated application services, you cannot configure more than three service instances
for a deployment.
Service Description
MongoDB Service to manage the MongoDB database used as the metadata store.
Nomad Service to manage the Nomad orchestration service used to schedule resource scan jobs.
Apache Solr Service to manage Apache Solr used to index and search catalog assets.
Apache ZooKeeper Service to manage Apache ZooKeeper used as the service co-ordination application
PostgreSQL Service to manage PostgreSQL database used as the store for similarity profiling data.
Deployment Planning 63
Operating System Configuration Prerequisites
Make sure that you verify the following operating system prerequisites:
• JDK 1.8
• Bash shell
• xz-libs
• systemctl
• rsync
• netstat
• YUM
• Zypper
• scp
• curl
• rpm
• zip
• unzip
• tar
• wget
• libcurl
• nslookup
• md5sum
• ping
• ifconfig
• cksum
• dnsdomainname
• OpenSSL version 1.0.1e-30.el6_6.5.x86_64 or later.
Note: Verify that the $PATH variable points to the /usr/bin directory to use the correct version of Linux
OpenSSL.
The root directory (/) must have a minimum of 10 GB of free disk space. If you plan to create the data
directory for Informatica Cluster Service in the root directory, verify that the root directory has a
minimum of 50 GB additional free disk space available. If you want to configure a separate directory for
the Informatica Cluster Service log files, verify that the directory has a minimum of 50 GB of free disk
space.
If you configure the workingDir to /, validate if the file system mounted on /tmp and /var directories
have the EXEC flag set.
If the workingDir is not configured to /, validate if the workingDir directory has read, write, and
execute permissions configured. Validate if the EXEC flag is set for the directory.
The directory must not have the read, write, and execute permissions configured.
/var directory
The directory must not have the write permission for everyone.
The directory must not have the read, write, and execute permissions configured.
/tmp directory
The directory must have the read, write, and execute permissions configured.
/usr directory
Custom directory
Verify that a minimum of 60 GB of free disk space is available in any custom directory that you plan to
configure.
The requirements listed here are the minimum recommended values to install the product and start the
services. The requirements vary based on the size of deployment. See the Enterprise Data Catalog
Performance Tuning Guide for additional information about hardware requirements based on deployment
sizes.
DNS Prerequisites
Verify the following DNS prerequisites in the /etc/hosts file for all the nodes in the cluster:
• An entry for the loopback address, 127.0.0.1 localhost localhost.domain.com in the file.
• Each machine in the cluster includes the 127.0.0.1 localhost localhost.localdomain entry in the file.
• The file includes the fully-qualified host names for all the cluster nodes. Alternatively, make sure that
reverse DNS lookup returns the fully-qualified host names for all the cluster nodes.
• Create a user account without root privileges and ensure that the user has sudo privileges.
Note: The services associated with the Informatica Cluster Service such as Apache Solr, PostgreSQL, and
Nomad require a non-root user with sudo privileges to run the services. Sudo allows a user to run
programs or commands with elevated privileges for a specific time frame. Enterprise Data Catalog
requires a non-root user with sudo permissions to run certain commands when performing administrative
tasks such as installation, upgrade, and service status monitoring.
• Update the sudoers file. Certain commands require sudo privileges for the gateway user when you enable
the Informatica Cluster Service for the first time. Ensure that the user has sudo privileges for the mkdir,
chown, chmod, echo, systemctl, cp, mv, sysctl, rm, sshd commands.
Note: You must configure sudo permissions for the commands if you plan to change the properties for the
Informatica Cluster Service or replace the SSL certificates configured for the Informatica Cluster Service.
To configure sudo privileges for the commands, you must add the commands to the /etc/sudoers file as
shown in the following sample: %<Gateway user name> ALL =(ALL) NOPASSWD: /bin/mkdir, /bin/
chown, /bin/chmod, /bin/echo, /bin/systemctl, /bin/cp, /bin/mv, /usr/sbin/
sysctl, /bin/rm, /usr/sbin/sshd.
Note: You can determine the directory where each command is located using the which <command name>
command.
After you enable the Informatica Cluster Service for the first time, you can choose to disable the validation
for sudo permissions for the Informatica Cluster Service. To disable the validation, configure the following
custom property for the Informatica Cluster Service: IcsCustomOptions.IcsGatewayUserSudoEnabled and
set the value to false. After you disable the validation, sudo privileges are not required when you restart
the Informatica Cluster Service. However, to shut down the Informatica Cluster Service, sudo permission
is still required for the systemctl command.
To run the infacmd ics cleanCluster command to clean the Informatica Cluster Service, sudo
permission must be configured for the systemctl and rm commands.
• Add the following entries in the /etc/security/limits.d/20-nproc.conf file for the root user:
- soft nproc 65000
Port Prerequisites
Verify that the following ports are available:
HTTP/HTTPS 9075
ZooKeeper 2181
Solr 8983
PostgreSQL 5432
Operating Prerequisite
System
See the Informatica Product Availability Matrix for 10.5.2 for more details.
Operating Prerequisite
System
Requirement Value
CPU 4
Unused memory 12 GB
Total memory 16 GB
Disk space 60 GB
Node Prerequisites 69
Chapter 5
Record the names of nodes that you want to create and the services that you want to create on each
node.
Record basic database information for each database associated with a service that you are creating.
If the domain configuration and Model repository databases are secure, record the JDBC connection
string with required security parameters.
If you want to enable Kerberos authentication when you run the installer, record Kerberos information for
each node in the domain.
70
Record Information for Installer Prompts Overview
When you install the Informatica services, you need to know information about the domain, nodes,
application services, and databases that you plan to create.
This section lists information that you need to provide when you run the installer. Informatica recommends
recording installer prompts before you start the installation process. For example, you might want to create a
text file of information so you can copy into the installer.
Domain
When you create a domain, you must provide a domain name and gateway node name.
The following table describes the domain information that you need to enter during the installation process:
Domain name Name of the domain that you plan to create. The name must not exceed 128
characters and must be 7-bit ASCII only. It cannot contain a space or any of
the following characters: ` % * + ; " ? , < > \ /
Consider one of the following naming conventions: DMN, DOM, DOMAIN,
_<ORG>_<ENV>
Master gateway node host name Fully qualified host name of the machine on which to create the master
gateway node. If the machine has a single network name, use the default
host name. The node host name cannot contain the underscore (_)
character.
If the machine has multiple network names, you can modify the default host
name to use an alternate network name. If the machine has a single network
name, use the default host name.
Note: Do not use localhost. The host name must explicitly identify the
machine.
Master gateway node name Name of the master gateway node that you plan to create on this machine.
The node name is not the host name for the machine.
Consider the following naming convention: Node<node##>_<ORG>_<optional
distinguisher>_<ENV>
The following table describes the node information that you need to enter when you join a domain.
Node host name Fully qualified host name of the machine on which to create nodes. If the machine
has a single network name, use the default host name. The node host name cannot
contain the underscore (_) character.
If the machine has multiple network names, you can modify the default host name
to use an alternate network name. If the machine has a single network name, use
the default host name.
Note: Do not use localhost. The host name must explicitly identify the machine.
Node name Name of the nodes that you plan to create on this machine. The node name is not
the host name for the machine.
Consider the following naming convention: Node<node##>_<ORG>_<optional
distinguisher>_<ENV>
Application Services
Record the application service names and the nodes where you want to create them.
The following table lists the application services that you can create when you run the installer:
For more information about all service naming conventions, see the following Informatica Velocity Best
Practice article available on the Informatica Network: Velocity Naming Conventions
Databases
When you plan the installation, you also need to plan the required relational databases. The domain requires
a database to store configuration information and user account privileges and permissions. Some application
services require databases to store information processed by the application service.
Domain
The following table describes the information that you need to enter during the installation process:
Domain configuration database type Database type for the domain configuration repository. The domain
configuration repository supports IBM DB2 UDB, Microsoft SQL Server,
Oracle, PostgreSQL, or Sybase ASE.
Domain configuration database host The name of the machine hosting the database.
name
Reference data warehouse database Database type for the reference data warehouse. The reference data
type warehouse supports IBM DB2 UDB, Microsoft Azure SQL Database, Microsoft
SQL Server, Oracle, or PostgreSQL.
Reference data warehouse database The name of the machine hosting the database.
host name
Databases 73
Data Integration Service
The following table describes the information that you need to enter during the installation process:
Data object cache database type Database type for the data object cache database. The data object cache
database supports IBM DB2 UDB, Microsoft SQL Server, or Oracle.
Data object cache database host The name of the machine hosting the database.
name
Profiling warehouse database type Database type for the profiling warehouse. The profiling warehouse supports
IBM DB2 UDB, Microsoft SQL Server, or Oracle.
Profiling warehouse database host The name of the machine hosting the database.
name
Workflow database type Database type for the workflow database. The workflow database supports
IBM DB2 UDB, Microsoft Azure SQL Database, Microsoft SQL Server, Oracle,
or PostgreSQL.
Workflow database host name The name of the machine hosting the database.
Model repository database type Database type for the Model repository. The Model repository supports IBM
DB2 UDB, Microsoft SQL Server, PostgreSQL, or Oracle.
Model repository database host name The name of the machine hosting the database.
Data Privacy Management repository Database type for the Data Privacy Management repository. The Data Privacy
database type Management repository supports Oracle, Microsoft SQL Server, Microsoft
Azure SQL Database, IBM DB2 UDB, and PostgreSQL.
Data Privacy Management repository The name of the machine hosting the database.
database host name
During installation, you can create the domain configuration repository in a secure database. You can also
create the Model repository and PowerCenter repository in a secure database.
When you configure the connection to the secure database, you must specify the connection information in a
JDBC connection string. In addition to the host name and port number for the database server, the
connection string must include security parameters.
The following table describes the security parameters that you must include in the JDBC connection string:
Parameter Description
EncryptionMethod Required. Indicates whether data is encrypted when transmitted over the network.
This parameter must be set to SSL.
ValidateServerCertificate Optional. Indicates whether Informatica validates the certificate that is sent by the
database server.
If this parameter is set to True, Informatica validates the certificate that is sent by
the database server. If you specify the HostNameInCertificate parameter, Informatica
also validates the host name in the certificate.
If this parameter is set to false, Informatica does not validate the certificate that is
sent by the database server. Informatica ignores any truststore information that you
specify.
HostNameInCertificate Optional. Host name of the machine that hosts the secure database. If you specify a
host name, Informatica validates the host name included in the connection string
against the host name in the SSL certificate.
If SSL encryption and validation is enabled and this property is not specified, the
driver uses the server name specified in the connection URL or data source of the
connection to validate the certificate.
You can use the following syntax in the JDBC connection string to connect to a secure database:
Oracle
jdbc:Informatica:oracle://<host name>:<port number>;ServiceName=<service
name>;EncryptionMethod=SSL;HostNameInCertificate=<database host
name>;ValidateServerCertificate=<true or false>
Use the following connection string to connect to the Oracle database through the Oracle Connection
Manager:
If you specified the Windows NT credentials for the Model repository database on Microsoft SQL Server,
specify the connection string syntax to include the authentication method as NTLM.
Microsoft SQL Server that uses the default instance with Windows NT credentials:
Microsoft SQL Server that uses a named instance with Windows NT credentials:
PostgreSQL
jdbc:Informatica:postgresql://<host name>:<port number>;DatabaseName=<database
name>;EncryptionMethod=SSL;HostNameInCertificate=<database host
name>;ValidateServerCertificate=<true or false>
Azure PostgreSQL
jdbc:Informatica:postgresql://<host name>:<port number>;DatabaseName=<database
name>;EncryptionMethod=SSL;ValidateServerCertificate=true;CryptoProtocolVersion=TLSv1.2;
Note: The installer does not validate the connection string. Verify that the connection string contains all the
connection parameters and security parameters required by your database.
You can import the properties from an archive file that the Hadoop administrator creates, or you can import
the properties directly from the cluster. When you create the cluster configuration, you can also choose to
create Hadoop, Hive, HBase, HDFS, or Databricks connections associated with the cluster. The installer
appends the connection type to the cluster configuration name to create each connection name.
The following table describes the initial information that you need to enter during the installation process:
Cluster configuration import Method to import the cluster configuration. You can choose to import the cluster
method configuration from an archive file or from the cluster.
Property Description
Cluster Name Name of the cluster. Use the display name if the cluster manager manages multiple clusters. If you do
not provide a cluster name, the wizard imports information based on the default cluster.
Engine type For a Cloudera cluster, the installer prompts for the engine type.
If you are on a CDP cluster, accept the default engine type of Tez. If you are on a CDH cluster, set the
engine type to MRv2.
Cluster Configuration 77
The following table describes the cluster properties for Databricks that you need to enter during the
installation process:
Property Description
Use the following table to record the information that you need to configure secure data storage:
Property Description
Encryption key directory Directory in which to store the encryption key for the domain. By default, the
encryption key is created in the following directory: <Informatica installation
directory>/isp/config/keys.
Specify if you want to back Specify if you want to back up the site key that the installer generates or not:
up the site key that the - Select 1 for No. If you choose No, the installer exits.
installer generates or not: - Select 2 for Yes. If you choose Yes, you agree to back up the file manually.
A unique site key is generated. If you lose the site key, you cannot generate the site
key again. Make sure that you save a copy of this key and do not share the unique
site key with others.
If you choose to use CA-signed custom SSL certificates, use the generate_csr.sh and generate_certs.sh
scripts to generate the required certificates.
If you choose to use self-signed custom SSL certificates, use the custom SSL utility bundled with the installer
to generate the required certificates.
• The custom truststore and keystore files are placed in a custom directory. The truststore file name must
be infa_truststore.jks.
• The directory that stores the keystore and truststore files are accessible to the command line programs.
Important: The installer places the default infa_truststore.jks and keystore files in the <Informatica
installation directory>/services/shared/security directory on each node. Do not overwrite, delete, or
move the default truststore and keystore files. Do not place the custom truststore and keystore files in the
directory.
To know about how to convert a non-SSL Informatica domain to an SSL-enabled Informatica domain, see the
Knowledge Article Convert a non-SSL Informatica domain to an SSL-enabled Informatica domain.
79
Generate CA-signed Custom SSL Certificates
You have a custom SSL certificate for the Informatica domain, and you want to use CA-signed SSL
certificates as the client and cluster certificates for the Informatica Cluster Service.
Use the generate_csr.sh and generate_certs.sh scripts to generate the Certificate Signing Request (CSR)
to send it to a CA and generate the required SSL certificates. You can download the scripts from the Akamai
Download Manager.
Perform the following steps to use the scripts to generate the certificates:
1. Extract the generate_csr.sh and generate_certs.sh scripts from the following location: <Location of
installer files>/properties/utils/CustomSSLScriptsUtil_ExternalCA.
2. Set the JAVA_HOME environment variable to point to JDK 8.
3. In the gen_csr.properties file, provide the values for the following parameters:
Parameter Description
ServerHosts The Informatica Cluster Service hosts that include the data nodes, processing
nodes, and gateway node. Enter a comma-separated list of FQDNs of cluster
nodes.
ClientHosts Comma-separated list of unique host names of domain nodes and cluster
nodes.
KeysOutputDir The directory to store the generated keys. Specify the $CUSTOM KEYSTORE
LOC directory to avoid the additional steps to copy the generated keys.
The $ICS SERVICENAME/client_certs and the $ICS SERVICENAME/cluster_certs
directories are created under the $CUSTOM KEYSTORE LOC directory.
$CUSTOM KEYSTORE LOC is the directory where the custom keystore for the
Informatica domain (infa_keystore.jks) is located. $ICS SERVICENAME is the
name of the Informatica Cluster Service.
CertsOutputDir The $CUSTOM TRUSTSTORE LOC directory to store the generated truststore
files.
The $ICS SERVICENAME/client_certs and the $ICS SERVICENAME/cluster_certs
directories are created under the $CUSTOM TRUSTSTORE LOC directory.
The $CUSTOM TRUSTSTORE LOC is the directory where the custom truststore
for the Informatica domain (infa_truststore.jks) is located.
ClusterCert_OrganizationUnit Optional. The value for the OrganizationUnit for the cluster nodes certificate.
ClusterCert_Organization The value for the Organization for the cluster nodes certificate.
Note: Verify that the combination of the Organization (O) and the Organizational
Unit (OU) parameters in the certificate subject is distinct for the cluster and
client certificates
ClusterCert_Location The value for the Location for the cluster nodes certificate.
ClusterCert_State The value for the State for the cluster nodes certificate.
ClusterCert_CountryCode The value for the Country Code for the cluster nodes certificate.
DomainCert_OrganizationUnit Optional. The value for the Organization Unit for the domain nodes certificate.
DomainCert_Organization The value for the Organization for the domain nodes certificate.
Note: Verify that the combination of the Organization (O) and the Organizational
Unit (OU) parameters in the certificate subject is distinct for the cluster and
client certificates
DomainCert_Location Optional. The value for the Location for the domain nodes certificate. Default is
the ClusterCert_Location parameter.
DomainCert_State Optional. The value for the State for the domain nodes certificate. Default is the
ClusterCert_State parameter.
DomainCert_CountryCode Optional. The value for the Country Code for the domain nodes certificate.
Default is the ClusterCert_CountryCode parameter.
Custom_Server_Certificate_CN Optional. The value for the Common Name in the cluster nodes certificate that
can be used instead of the default $InfaDomainName-
$ICSServiceName.$DNSDomainName value.
Note: You must enter RFC2253 compliant values. The following special
characters are supported: , + " \ < > ;. Double quotes (") must be used in
pairs. The characters \ and " must not be used together. The value cannot
contain a space.
Custom_Client_Certificate_CN Optional. The value for the Common Name in the domain nodes certificate that
can be used instead of the default $InfaDomainName-
$ICSServiceName.$DNSDomainName value. Default is the
Custom_Server_Certificate_CN parameter.
Note: You must enter RFC2253 compliant values. The following special
characters are supported: , + " \ < > ;. Double quotes (") must be used in
pairs. The characters \ and " must not be used together. The value cannot
contain a space.
Note: If the values contain spaces or special characters, you must enclose the values within double-
quotes.
4. Run the generate_csr.sh script using the following command to generate the .csr files to send to an
external CA: ./generate_csr.sh gen_csr.properties
The following files are generated for the cluster:
infa_nodecert.csr
infa_nodecert.csr
infa_privkey.key
infa_privkey.pem
keystore.jks
browser_cert.csr
browser_keystore.jks
browser_privkey.key
browser_privkey.pem
5. Validate the contents of the .csr files. Run the following command to view the contents: keytool -
printcertreq -file $PATH TO CSR
6. Send the following .csr files to an external CA for signing:
• <CertsOutputDir>/<ICSServiceName>/client_certs/infa_nodecert.csr
• <CertsOutputDir>/<ICSServiceName>/cluster_certs/infa_nodecert.csr
• <CertsOutputDir>/<ICSServiceName>/client_certs/browser_cert.csr
Note: The browser_cert.csr file is required if you want to create the browser certificates to view the scan
job logs on Nomad.
7. After you receive the certificates or certificate chains from the CA in .pem format, “Validate the CA-
signed Certificates” on page 84 and store the certificates to a location under the $INFA HOME directory
on your machine.
Note: If you receive the certificates or certificate chains from the CA in .cer format, run the following
command to convert the files to pem format: openssl x509 -inform der -in <certificate file
name>.cer -outform pem -out <certificate file name>.pem.
If you receive a certificate chain from the CA, you must extract the root certificate, intermediate
certificates, and the end user certificate.
8. In the gen_certs.properties file, provide the values for the following parameters:
Parameter Description
ClusterCertificate The path to the cluster certificate signed by the CA in .pem format. This is
an end user certificate.
ClientCertificate The path to the client certificate signed by the CA in .pem format. This is
an end user certificate.
BrowserCertificate The path to the browser certificate signed by the CA in .pem format.
IsCACertificateChainAvailable Specify if the CA certificate chain is available as a single .pem file. Enter
true or false.
Note: The certificate chain must contain only the root and intermediate
certificates.
KeysOutputDir The $CUSTOM KEYSTORE LOC directory store the generated keys.
The $ICS SERVICENAME/client_certs and $ICS SERVICENAME/
cluster_certs directories are created under the $CUSTOM KEYSTORE LOC
directory.
$CUSTOM KEYSTORE LOC is the directory where the custom keystore for
the Informatica domain (infa_keystore.jks) is located. $ICS SERVICENAME
is the name of the Informatica Cluster Service
9. Run the generate_certs.sh script using the following command to generate the certificates: ./
generate_certs.sh gen_certs.properties
The keystore.jks keystore and the infa_privkey.pem private keys are stored at $CUSTOM KEYSTORE
LOC/$ICSServiceName/client_certs and $CUSTOM KEYSTORE LOC/$ICSServiceName/cluster_certs
directories.
The truststore.jks truststore and the infa_nodecert.pem, infa_nodecertkey.pem, and infa_pubcert.pem
public keys are stored at $CUSTOM TRUSTSTORE LOC/$ICSServiceName/client_certs and $CUSTOM
TRUSTSTORE LOC/$ICSServiceName/cluster_certs directories.
10. Optional. The directories $CUSTOM KEYSTORE LOC and $CUSTOM TRUSTSTORE LOC are generally the
same. If the <KeysOutputDir> location is not the same as $CUSTOM KEYSTORE LOC and
<CertsOutputDir> location is not the same as $CUSTOM TRUSTSTORE LOC, move the keys and
certificates to the respective directories.
Note: Verify that the $CUSTOM KEYSTORE LOC and the $CUSTOM TRUSTSTORE LOC directories have
the required user privileges. Also, validate that the user has minimum chmod 700 permissions
configured for the directories and chmod 600 permissions configured for the files that are copied to the
directories.
To access the Nomad Web UI and Solr Admin UI when the Informatica Cluster Service is SSL enabled, you
must import the browser certificates. To know more about how to import the browser certificates, see the
Knowledge Article Access Nomad Web UI and Solr Admin UI when Informatica Cluster Service is SSL enabled
in Enterprise Data Catalog.
Run the following command to view the contents of the signed cluster and client certificates: keytool -
printcert -file $PATH TO CERTIFICATE PEM FILE.
Validate the following requirements for the cluster and client certificates:
Mandatory fields For the cluster certificate, consider the following key usage requirements:
keyUsage = digitalSignature,keyEncipherment
extendedKeyUsage = serverAuth,clientAuth
For the client certificate, consider the following key usage requirements:
keyUsage = digitalSignature
extendedKeyUsage = clientAuth
Subject For the cluster certificate, the SAN must include the list of cluster nodes in the following format:
Alternate Name SAN=DNS:$CLUSTER HOST1 FQDN,DNS:$CLUSTER HOST2 FQDN,DNS:$CLUSTER HOST3 FQDN
(SAN) The client certificate must contain the FQDNs for the cluster nodes.
For the client certificate, the SAN must include the list of all Informatica nodes in the following
format: SAN=DNS:$INFA DOMAIN HOST1 FQDN,DNS:$INFA DOMAIN HOST2 FQDN
The client certificate must contain the FQDNs for both the domain and cluster nodes.
CLUSTER HOST FQDN represents the fully qualified domain name for the cluster gateway host, processing
nodes, and data nodes in the cluster.
INFA DOMAIN HOST FQDN represents the fully qualified domain name of the Informatica domain gateway
host, domain nodes, cluster gateway host, processing nodes, and data nodes in the cluster.
Note: Verify that the custom certificate location for the domain nodes contains the infa_truststore.pem file.
Also, verify that all the certificates in the CA certificate chain are present in the truststore.jks and the
infa_pubcert.pem files.
Use the custom SSL utility bundled with the installer to generate the required SSL certificates.
Perform the following steps to use the custom SSL utility to generate the certificates:
Parameter Description
KeystoreFile Path to a custom keystore file along with file name. The keystore type must be
in JKS. X509 format. The file must contain a single private key entry with the
complete certificate chain. Verify that the file has signing capability.
TruststoreFile Path to a custom truststore file along with file name. the truststore type must
be in JKS. X509 format. The file must contain the public certificates
corresponding to the private key entry in the keystore file.
ISPDomainKeystorePassword Password of Informatica domain keystore in plain text format. The utility uses
the password for the cluster and client keystore.jks file.
ISPDomainTruststorePassword Password of the Informatica domain truststore in plain text format. The utility
uses the password for the cluster and client truststore.jks file
KeystoreOutputDir Represents the location of the Informatica domain custom keystore that you
provided when you installed Enterprise Data Catalog.
TruststoreOutputDir Represents the location of the Informatica domain custom truststore that you
provided when you installed Enterprise Data Catalog.
Note: Verify that the KeystoreOutputDir and TruststoreOutputDir parameters
point to the same directory.
ServerNodes Comma-separated list of fully qualified domain names of nodes that you plan
to configure as data nodes, processing nodes, service hosts, and gateway node
when you configure the Informatica Cluster Service.
ClientNodes Comma-separated list of fully qualified domain names of nodes that you plan
to configure as Informatica domain hosts, data nodes, processing nodes,
service hosts, and gateway node.
ClusterNodeDNSDomain Domain name of the gateway host that you plan to configure for the
Informatica Cluster Service.
4. Run the utility using the following command: java -jar GenerateCustomSslUtility.jar -in
input.properties. The utility generates the following keys and client and cluster certificates:
• Keys:
- keystore.jks
- infa_privkey.pem
Note: The cluster keys are generated in the following directory: <Keystore output directory>/
<IcsServiceName>/cluster_certs. The client keys are generated in the following directory:
<Keystore output directory>/<IcsServiceName>/client_certs
- infa_pubcert.pem
- infa_nodecert.pem
- infa_nodecertkey.pem
Note: The cluster certificates are generated in the following directory: <Truststore output
directory>/<IcsServiceName>/cluster_certs. The client certificates are generated in the
following directory: <Truststore output directory>/<IcsServiceName>/client_certs
5. Copy the generated certificates to the required folders.
6. Assign the ownership of the following directories to the Informatica domain user:
• <Keystore output directory>/<IcsServiceName>/cluster_certs
• <Truststore output directory>/<IcsServiceName>/cluster_certs
• <Keystore output directory>/<IcsServiceName>/client_certs
• <Truststore output directory>/<IcsServiceName/client_certs
Note: Verify that all the client certificates are included in a single directory. Similarly, verify that all the cluster
certificates are included in a single directory. You must also verify that the directories have the chmod 700
permission configured and the files under the directories have the chmod 600 permission configured.
By default, the installer creates the following directories within the Informatica installation directory:
87
<Informatica installation directory>/isp/config
Contains the nodemeta.xml file. Also contains the /keys directory where the encryption key file is stored.
If you enable secure communication for the domain, the /security directory contains the keystore and
truststore files for the default SSL certificates.
To maintain the security of the directories and files, the installer restricts access to the directories and the
files in the directories. The installer assigns specific permissions to the group and user account that own the
directories and files.
For more information about permissions assigned to the directories and files, see the Informatica Security
Guide.
Pre-install Utilities
Informatica provides utilities to facilitate the Informatica services installation process. You can use the
Informatica installer to run the utilities.
Before you install the services, run the Pre-Installation (i10Pi) System Check Tool to verify whether a machine
meets the system requirements for the Informatica installation. Informatica recommends that you verify the
minimum system requirements before you start the installation. When you run the system check tool before
you perform the installation, the installer sets values for certain fields, such as the database connection and
domain port numbers, based on the information that you enter during the system check.
Ensure that you verified the system requirements and prepared the domain configuration repository
database.
Oracle
jdbc:Informatica:oracle://<host name>:<port number>;ServiceName=
Use the following connection string to connect to the Oracle database through the Oracle
Connection Manager:
jdbc:Informatica:oracle:TNSNamesFile=<fully qualified path to the tnsnames.ora
file>;TNSServerName=<TNS name>;
If you specified the Windows NT credentials for the Model repository database on Microsoft SQL
Server, specify the connection string syntax to include the authentication method as NTLM.
Microsoft SQL Server that uses the default instance with Windows NT credentials:
"jdbc:informatica:sqlserver://<host name>:<port number>;DatabaseName=<database
name>;SnapshotSerializable=true;authenticationMethod=NTLM"
Microsoft SQL Server that uses a named instance with Windows NT credentials:
"jdbc:informatica:sqlserver://<host name>\<named instance
name>;DatabaseName=<database
name>;SnapshotSerializable=true;authenticationMethod=NTLM"
PostgreSQL
jdbc:Informatica:postgresql://<host name>:<port number>;DatabaseName=
Azure PostgreSQL
jdbc:Informatica:postgresql://<host name>:<port number>;DatabaseName=<database
name>;EncryptionMethod=SSL;ValidateServerCertificate=true;CryptoProtocolVersion=TL
Sv1.2;
Sybase
jdbc:Informatica:sybase://<host name>:<port number>;DatabaseName=
Verify that the connection string contains all the connection parameters required by your database
system.
• To enter the connection information using the JDBC URL information, specify the JDBC URL
properties.
The following table describes the connection information:
Prompt Description
Database type Type of database for the domain configuration repository. Select from the
following database types:
- 1 - Oracle
- 2 - Microsoft SQL Server
- 3 - IBM DB2
- 4 - PostgreSQL
Database user ID User ID for the database user account for the domain configuration repository.
Database service name Service name for Oracle and IBM DB2 databases, or database name for
PostgreSQL and Microsoft SQL Server.
Note: If the Informatica Pre-Installation (i10Pi) System Check Tool check finishes with failed requirements,
you can still perform the Informatica installation or upgrade. However, Informatica highly recommends that
you resolve the failed requirements before you proceed.
Note: If the Informatica Pre-Installation (i10Pi) System Check Tool check finishes with failed requirements,
you can still perform the Informatica installation or upgrade. However, Informatica highly recommends that
you resolve the failed requirements before you proceed.
• Create a Domain With Data Engineering, Enterprise Data Catalog and Data Privacy Management, 94
• Join a Domain With Data Engineering, Enterprise Data Catalog and Data Privacy Management, 129
• Install Data Privacy Management in an Existing Domain, 142
• Run the Silent Installer, 149
• Troubleshooting , 152
93
Chapter 8
When you complete the preliminary tasks, you will continue with the installer prompts and will provide
information to configure the domain.
94
Welcome - Accept Terms and Conditions
u Read the terms and conditions for Informatica installation and the product usage toolkit and select I
agree to the terms and conditions.
a. Press 1 if you do not want to accept the terms and conditions.
b. Press 2 to accept the terms and conditions.
The Component Selection sections appears.
Product Installation
After you accept the terms and conditions, you can install Informatica Data Engineering, Enterprise Data
Catalog, and Data Privacy Management.
Property Description
Path to the Elasticsearch .tar file with X- Enter the complete path to the Elasticsearch .tar file that you
Pack features want to use.
Elasticsearch Admin User Password Enter the password to use. The user name is always elastic.
Note: You cannot change the Elasticsearch settings from the Administrator Tool.
The Installation Prerequisites section displays the installation requirements. Verify that all requirements are
met before you continue the installation.
Deployment Type Disk Space per Node Total Virtual Cores RAM per Node
Sandbox 140 GB 16 32 GB
Basic 140 GB 24 64 GB
Standard 140 GB 48 64 GB
3. Select whether you want to change the deployment type or continue with the current deployment
selection.
a. Press 1 to change the deployment type.
b. Press 2 to continue with the current deployment selection.
The License and Installation Directory section appears.
96 Chapter 8: Create a Domain With Data Engineering, Enterprise Data Catalog and Data Privacy Management
Default is 1 for Sandbox.
4. Select whether you want to run the pre-validation utility.
a. Press 1 to skip the pre-validation utility.
b. Press 2 to run the pre-validation utility.
The utility helps you validate the prerequisites to install Enterprise Data Catalog.
If you choose to skip the pre-validation utility, the Pre-Installation Summary section appears. Review the
installation summary.
Property Description
Informatica cluster Fully qualified domain name of the node that you want to configure as the gateway host.
gateway host
Enable advanced - Press 1 to skip validation of advanced configuration properties for associated services.
configuration - Press 2 to validate advanced configuration properties of associated services. If you
select this option, you must specify values for all the properties.
Data nodes Comma-separated list of fully qualified domain names of nodes that you want to
configure as data nodes.
Processing nodes Comma-separated list of fully qualified domain names of nodes that you want to
configure as processing nodes.
Working directory Directory for the Informatica Cluster Service. Default is /opt/informatica/ics. For a
path multi-node setup, the installer prompts you to confirm if you want to specify the path to
the shared file system.
- Type 1 if you want to configure the shared file system path for the multi-node setup.
- Type 2 if you want to configure the shared file system path for the multi-node setup. If
you select this option, you must specify the path to the cluster custom directory.
Note: The permission on the directory must be u=rwx (0700) or u=rwx,g=rx
(0750). The Postgres service does not start if the directory does not have the required
permission.
3. Applies if you selected the option to validate advanced configuration properties of associated services.
Property Description
Nomad Server Comma-separated list of fully qualified domain names of nodes that host the Nomad
Hosts servers.
Nomad HTTP HTTP port number configured for the Nomad server. Default is 4646.
Port
Nomad Serf Port Serf port configured as the gossip protocol for the Nomad servers. Default is 4648.
Nomad RPC Port The Remote Procedure Call (RPC) port configured for communication. Default is 4647.
Nomad Server The directory that includes sub directories with tasks running on the Nomad server. Default
Working is $clusterCustomDir/nomad/nomadserver
Directory
Nomad Client The directory configured for tasks in the Nomad client. Default is $clusterCustomDir/nomad/
Working nomadclient
Directory
Nomad Custom Specify any custom options for the service in the following format:
Options [OptionGroupName.OptionName=OptionValue]. You can separate multiple options using a
white space character.
If the OptionValue includes a white space character, you must enclose the OptionValue
within double quotes as shown in the following sample: “sample value”.
Provide the following values for validation of the Apache ZooKeeper server configuration parameters:
Property Description
ZooKeeper Hosts Comma-separated list of fully qualified domain names of nodes that host the Apache
ZooKeeper server.
ZooKeeper Port Port number configured for the Apache ZooKeeper Server. Default is 2181.
ZooKeeper Peer Port number configured for Apache ZooKeeper peer communication. Default is 2888.
Port
ZooKeeper Port number configured for the ZooKeeper Sever identified as the Leader. Default is 3888.
Leader Port
ZooKeeper Specify the path to the directory where you want to install Apache ZooKeeper. Default is
Installation $clusterCustomDir/zk/install
Directory
98 Chapter 8: Create a Domain With Data Engineering, Enterprise Data Catalog and Data Privacy Management
Property Description
ZooKeeper Data Specify the path to the directory where you want to store data from Apache ZooKeeper.
Directory Default is $clusterCustomDir/zk/data
ZooKeeper Specify any custom options for the service in the following format:
Custom Options [OptionGroupName.OptionName=OptionValue]. You can separate multiple options using a
white space character.
If the OptionValue includes a white space character, you must enclose the OptionValue
within double quotes as shown in the following sample: “sample value”.
Provide the following values for validation of the Apache Solr server configuration parameters:
Property Description
Solr Hosts Comma-separated list of fully qualified domain names of nodes that host the Apache Solr
server.
Solr Port Port number configured for Apache Solr Server. Default is 8983.
Solr Installation Specify the path to the directory where you want to install Apache Solr Server. Default is
Directory $clusterCustomDir/solr/install.
Solr Data Specify the path to the directory where you want to store data from Apache Solr. Default is
Directory $clusterCustomDir/solr/data
Solr Custom Specify any custom options for the service in the following format:
Options [OptionGroupName.OptionName=OptionValue]. You can separate multiple options using a
white space character.
If the OptionValue includes a white space character, you must enclose the OptionValue within
double quotes as shown in the following sample: “sample value”.
Provide the following values for validation of the MongoDB database configuration parameters:
Property Description
MongoDB Comma-separated list of fully qualified domain names of nodes that host the MongoDB
Hosts database.
MongoDB Log Specify the path to the directory where you want to store the log files. Default is
Directory $clusterCustomDir/mongo/log
MongoDB Data Specify the path to the directory where you want to store data from the MongoDB database.
Directory Default is $clusterCustomDir/mongo/data
MongoDB Specify any custom options for the service in the following format:
Custom [OptionGroupName.OptionName=OptionValue]. You can separate multiple options using a
Options white space character.
If the OptionValue includes a white space character, you must enclose the OptionValue within
double quotes as shown in the following sample: “sample value”.
Property Description
PostgreSQL DB Fully qualified domain name of the machine that hosts the PostgreSQL database. Default is
Host the gateway host.
Note: If you did not select the Enable Advanced Configuration option, the service uses the
gateway host value specified as the host value
PostgreSQL DB Specify the path to the directory where you want to install the PostgreSQL database. Default
Installation is $clusterCustomDir/postgres/install
Directory
PostgreSQL DB Specify the path to the directory where you want to store the log files from the PostgreSQL
Log Directory database. Default is $clusterCustomDir/postgres/log
PostgreSQL DB Specify the path to the directory where you want to store PostgreSQL data. Default is
Data Directory $clusterCustomDir/postgres/data
PostgreSQL DB Specify any custom options for the service in the following format:
Custom Options [OptionGroupName.OptionName=OptionValue]. You can separate multiple options using a
white space character. If the OptionValue includes a white space character, you must
enclose the OptionValue within double quotes as shown in the following sample: “sample
value”.
Note: The details for the Data Privacy Management, Elasticsearch, and Spark services are not validated
by the pre-validation utility.
4. Press Enter to continue after running the pre-validation utility.
100 Chapter 8: Create a Domain With Data Engineering, Enterprise Data Catalog and Data Privacy Management
The following table describes the connection information you must enter:
Option Description
Keystore file Select whether to use a keystore file generated by the installer or a keystore
file you create. You can use a keystore file with a self-signed certificate or a
certificate signed by a certification authority.
1 - Use a keystore generated by the installer
2 - Specify a keystore file and password
If you select to use a keystore file generated by the installer, the installer
creates a self-signed keystore file named Default.keystore in the following
location: <Informatica installation directory>/tomcat/conf/
b. If you use custom SSL certificates, specify the keystore, enter the password and location of the
keystore file.
3. Select whether to enable SAML authentication to configure Security Assertion Markup Language
(SAML)-based single sign-on (SSO) support for web-based Informatica applications in an Informatica
domain.
Press 1 to disable SAML authentication and skip to “Domain Security - Secure Communication” on page
103. Press 2 to enable and configure SAML authentication.
4. Enter the Identity Provider URL for the domain.
5. Specify the relying party trust name or the service provider identifier for the domain as defined in the
identity provider. If you choose No, the service provider identifier is set to "Informatica".
6. Specify whether IdP will sign SAML assertion or not.
7. Enter the identity provider assertion signing certificate alias name.
8. Specify whether to use the default Informatica SSL certificates or to use your SSL certificates to secure
domain communication.
9. Select whether to use the default Informatica SSL certificates or to use your SSL certificates to enable
SAML authentication in the domain.
The following table describes the SSL certificate options for SAML authentication:
Option Description
Use the default Informatica Use the default SSL certificates provided by Informatica.
SSL certificates.
Use custom SSL Select to use a custom truststore file for SAML authentication. Specify the
certificates. directory containing the custom truststore file on gateway nodes within the
domain. Specify the directory only, not the full path to the file.
10. If you provide the security certificates, specify the location and passwords of the keystore and truststore
files.
Property Description
Truststore Directory Specify the directory containing the custom truststore file on gateway nodes within the
domain. Specify the directory only, not the full path to the file.
Keystore Directory Specify the directory containing the custom keystore file.
11. To specify the Authentication Context Comparison, specify the strength comparison of the
authentication mechanism used by the user with the IdP server.
Supported values are MINIMUM, MAXIMUM, BETTER, or EXACT option. Default is MINIMUM.
12. To set the Authentication Context Class, specify the expected mechanism of first time authentication of
the user with the IdP server.
Supported values are PASSWORD or PASSWORDPROTECTEDTRANSPORT. Default is PASSWORD.
13. Specify if you want to enable the webapp to sign the SAML authentication request or not?
Default is disabled.
14. Specify the alias name of the private key that was imported to the node SAML keystore using which the
SAML request should be signed.
15. Specify the password to access the private key used for signing the SAML request.
16. Specify the algorithm that the web application uses to sign the SAML request.
Supported values are RSA_SHA256, DSA_SHA1, DSA_SHA256, RSA_SHA1, RSA_SHA224, RSA_SHA384,
RSA_SHA512, ECDSA_SHA1, ECDSA_SHA224, ECDSA_SHA256, ECDSA_SHA384, ECDSA_SHA512,
RIPEMD160, or RSA_MD5.
17. Specify whether you want IdP to sign the SAML response or not?
Choose to select to enable the webapp to receive the signed SAML response or not. Default is disabled.
18. Specify whether IdP will encrypt SAML assertion or not.
Select to enable the webapp to receive an encrypted SAML assertion. Default is enabled.
19. Specify the alias name of the private key present in the gateway nodes gateway node SAML truststore
that used for Informatica uses to decrypt decrypting the SAML assertion.
20. Provide the password to access the private key to use when decrypting the assertion encryption key.
21. Click Next.
The Domain Security - Secure Communication section appears.
102 Chapter 8: Create a Domain With Data Engineering, Enterprise Data Catalog and Data Privacy Management
Domain Security - Secure Communication
After you configure the domain, you can configure domain security.
u In the Domain Security - Secure Communication section, specify whether to use the default Informatica
SSL certificates or to use your SSL certificates to secure domain communication.
a. Select the type of SSL certificates to use.
The following table describes the options for the SSL certificates that you can use to secure the
Informatica domain:
Option Description
Use the default Use the default SSL certificates contained in the default keystore and
Informatica SSL truststore.
certificates Note: If you do not provide an SSL certificate, Informatica uses the same
default private key for all Informatica installations. If you use the default
Informatica keystore and truststore files, the security of your domain could be
compromised. To ensure a high level of security for the domain, select the
option to specify the location of the SSL certificate files.
Use custom SSL Specify the path for the keystore and truststore files that contain the SSL
certificates certificates. You must also specify the keystore and truststore passwords.
You can provide a self-signed certificate or a certificate issued by a certificate
authority (CA). You must provide SSL certificates in PEM format and in Java
Keystore (JKS) files.
Informatica requires specific names for the SSL certificate files for the
Informatica domain. You must use the same SSL certificates for all nodes in
the domain.
Store the truststore and keystore files in a directory accessible to all the
nodes in the domain and specify the same keystore file directory and
truststore file directory for all nodes in the same domain.
b. If you provide the SSL certificate, specify the location and passwords of the keystore and truststore
files.
The following table describes the parameters that you must enter for the SSL certificate files:
Property Description
Keystore file directory Directory that contains the keystore files. The directory must contain files
named infa_keystore.jks.
Truststore file directory Directory that contains the truststore files. The directory must contain files
named infa_truststore.jks and infa_truststore.pem.
1. Select the database to use for the domain configuration repository details.
The following table lists the databases you can use for the domain configuration repository:
Prompt Description
Database type Type of database for the domain configuration repository. Select from the following
options:
1 - Oracle
2 - Microsoft SQL Server
3 - IBM DB2
4 - PostgreSQL
The Informatica domain configuration repository stores metadata for domain operations and user
authentication. The domain configuration repository must be accessible to all gateway nodes in the
domain.
2. Enter the properties for the database user account.
The following table lists the properties for the database user account:
Property Description
Database user ID Name for the domain configuration database user account.
User password Password for the domain configuration database user account.
Property Description
Tablespace Name of the tablespace in which to create the tables. Specify a tablespace
that meets the pageSize requirement of 32768 bytes.
In a single-partition database, if you select Yes to configure the tablespace,
enter the name of the tablespace in which to create the tables.
In a multi-partition database, specify the name of the tablespace that resides
in the catalog partition of the database.
b. If you select Microsoft SQL Server, select whether to enter the schema name for the database.
104 Chapter 8: Create a Domain With Data Engineering, Enterprise Data Catalog and Data Privacy Management
The following table describes the properties that you must configure for the Microsoft SQL Server
database:
Property Description
Specify Schema Name Specify whether you want to specify a schema name.
Enter 1 for No.
Enter 2 for Yes.
Schema name Name of the schema that will contain domain configuration tables. If this
parameter is blank, the installer creates the tables in the default schema.
4. At the Secure database prompt, specify whether to create a secure domain configuration repository. You
can create a domain configuration repository in a database secured with the SSL protocol. To create a
domain configuration repository in a secure database, press 1 and enter the required parameters. To
create the repository in an unsecured database, press 2.
5. To enter the JDBC connection information using the JDBC URL information, press 1. To enter the JDBC
connection information using a custom JDBC connection string, press 2.
a. Enter the JDBC connection information.
• To enter the connection information using the JDBC URL information, specify the JDBC URL
properties.
The following table describes the database connection information:
Prompt Description
Configure JDBC Select whether to add additional JDBC parameters to the connection string:
Parameters 1 - Yes
2 - No
If you select Yes, enter the parameters or press Enter to accept the default.
If you select No, the installer creates the JDBC connection string without
parameters.
Oracle
jdbc:Informatica:oracle://<host name>:<port number>;ServiceName=
PostgreSQL
jdbc:Informatica:postgresql://<host name>:<port number>;DatabaseName=
Verify that the connection string contains all the connection parameters required by your
database system.
u In the Domain Security - Encryption Key section, enter the directory for the encryption key for the
Informatica domain.
The following table describes the encryption key parameters that you must specify when you create a
domain:
Property Description
Encryption key directory Directory in which to store the encryption key for the domain. By default, the
encryption key is created in the following directory: <Informatica
installation directory>/isp/config/keys.
Specify if you want to back A unique site key is generated. If you lose the site key, you cannot generate the
up the site key that the site key again. Make sure that you save a copy of this key and do not share the
installer generates or not unique site key with others.
Specify if you want to back up the site key that the installer generates or not:
- Select 1 for No. If you choose No, the installer generates an error. Press Enter
to continue.
- Select 2 for Yes. If you choose Yes, you agree to back up the file manually.
The installer sets different permissions to the directory and the files in the directory. For more
information about the permissions for the encryption key file and directory, see “Secure Files and
Directories” on page 87.
106 Chapter 8: Create a Domain With Data Engineering, Enterprise Data Catalog and Data Privacy Management
Domain and Node Configuration
After you configure the encryption key, you can configure the domain and node.
1. Enter the information for the domain and the node that you want to create.
The following table describes the properties that you set for the domain and gateway node.
Property Description
Domain Name of the domain to create. The default domain name is Domain_<MachineName>. The name
name must not exceed 128 characters and must be 7-bit ASCII only. It cannot contain a space or any of
the following characters: ` % * + ; " ? , < > \ /
Node host Host name of the machine on which to create the node. The node host name cannot contain the
name underscore (_) character. If the machine has a single network name, use the default host name. If
the a machine has multiple network names, you can modify the default host name to use an
alternate network name. Optionally, you can use the IP address.
Note: The default suggestion is the fully qualified host name. If you choose to change the default,
do not use localhost. Use the fully qualified host name that explicitly identifies the machine.
Node name Name of the node to create on this machine. The node name is not the host name for the
machine.
Node port Port number for the node. The default port number for the node is 6005. If the port number is not
number available on the machine, the installer displays the next available port number.
Domain user User name for the domain administrator. You can use this user name to initially log in to
name Informatica Administrator. Use the following guidelines:
- The name is not case sensitive and cannot exceed 128 characters.
- The name cannot include a tab, newline character, or the following special characters: % *
+/?;<>
- The name can include an ASCII space character except for the first and last character. Other
space characters are not allowed.
2. Select whether you want to enable password complexity to secure sensitive data in the domain.
The following table describes the password complexity:
Prompt Description
Domain password Password for the domain administrator. The password must be more than 2
characters and must not exceed 16 characters.
Not available if you configure the Informatica domain to run on a network with
Kerberos authentication.
Port Description
Service Manager port Port number used by the Service Manager on the node. The Service Manager
listens for incoming connection requests on this port. Client applications use
this port to communicate with the services in the domain. The Informatica
command line programs use this port to communicate to the domain. This is
also the port for the SQL data service JDBC/ODBC driver. Default is 6006.
Service Manager Shutdown Port number that controls server shutdown for the domain Service Manager.
port The Service Manager listens for shutdown commands on this port. Default is
6007.
Informatica Administrator No default port. Enter the required port number when you create the service.
HTTPS port Setting this port to 0 disables an HTTPS connection to the Administrator tool.
Informatica Administrator Port number that controls server shutdown for Informatica Administrator.
shutdown port Informatica Administrator listens for shutdown commands on this port. Default
is 6009.
Minimum port number Lowest port number in the range of dynamic port numbers that can be assigned
to the application service processes that run on this node. Default is 6014.
Maximum port number Highest port number in the range of dynamic port numbers that can be
assigned to the application service processes that run on this node. Default is
6114.
4. At the prompt to configure the repository for Advanced Scanners, press 2 to continue without
configuring the repository.
The Model Repository Database section appears.
108 Chapter 8: Create a Domain With Data Engineering, Enterprise Data Catalog and Data Privacy Management
Model Repository Database
The Model Repository Database panel collects information on the database for the Model Repository Service.
Prompt Description
Database type Type of database for the Model repository. Select from the following options:
1 - Oracle
2 - SQL Server
3 - IBM DB2
4 - PostgreSQL
Property Description
Database user ID Name for the Model repository database user account.
You can enter the Windows NT user name for trusted connection on Microsoft
SQL Server.
Property Description
Tablespace Name of the tablespace in which to create the tables. Specify a tablespace
that meets the pageSize requirement of 32768 bytes.
In a single-partition database, if you select Yes to configure the tablespace,
enter the name of the tablespace in which to create the tables.
In a multi-partition database, specify the name of the tablespace that resides
in the catalog partition of the database.
b. If you select Microsoft SQL Server, select whether to enter the schema name for the database.
The following table describes the properties that you must configure for the Microsoft SQL Server
database:
Property Description
Specify Schema Name Specify whether you want to specify a schema name.
Enter 1 for No.
Enter 2 for Yes.
Schema name Name of the schema that will contain domain configuration tables. If this
parameter is blank, the installer creates the tables in the default schema.
5. At the Secure database prompt, specify whether to create a secure repository. You can create a
repository in a database secured with the SSL protocol. To create a Model repository in a secure
database, press 1 and enter the required parameters. To create the repository in an unsecured database,
press 2.
6. To enter the JDBC connection information using the JDBC URL information, press 1. To enter the JDBC
connection information using a custom JDBC connection string, press 2.
a. Enter the JDBC connection information.
• To enter the connection information using the JDBC URL information, specify the JDBC URL
properties.
110 Chapter 8: Create a Domain With Data Engineering, Enterprise Data Catalog and Data Privacy Management
The following table describes the database connection information:
Prompt Description
Configure JDBC Select whether to add additional JDBC parameters to the connection string:
Parameters 1 - Yes
2 - No
If you select Yes, enter the parameters or press Enter to accept the default.
If you select No, the installer creates the JDBC connection string without
parameters.
Oracle
jdbc:Informatica:oracle://<host name:port number>;ServiceName=<service name>;
Use the following connection string to connect to the Oracle database through the Oracle
Connection Manager:
jdbc:Informatica:oracle:TNSNamesFile=<fully qualified path to the tnsnames.ora
file>;TNSServerName=<TNS server name>;
If you specified the Windows NT credentials for the Model repository database on Microsoft
SQL Server, specify the connection string syntax to include the authentication method as
NTLM.
Microsoft SQL Server that uses the default instance with Windows NT credentials:
"jdbc:informatica:sqlserver://<host name>:<port number>;DatabaseName=<database
name>;SnapshotSerializable=true;authenticationMethod=NTLM"
Microsoft SQL Server that uses a named instance with Windows NT credentials:
"jdbc:informatica:sqlserver://<host name>\<named instance
name>;DatabaseName=<database
name>;SnapshotSerializable=true;authenticationMethod=NTLM"
PostgreSQL
jdbc:Informatica:postgresql://<host name:port number>;DatabaseName=<database
name>;
Note: The installer does not validate the connection string. Verify that the connection string
contains all the connection parameters and security parameters required by your database.
112 Chapter 8: Create a Domain With Data Engineering, Enterprise Data Catalog and Data Privacy Management
Model Repository Database for Monitoring
The Model Repository Database for Monitoring panel collects information on the database for the Monitoring
Model Repository Service database.
Prompt Description
Database type Type of database type for monitoring Model repository. Select from the following
options:
1 - Oracle
2 - Microsoft SQL Server
3 - IBM DB2
4 - PostgreSQL
Property Description
Database user ID Name for the monitoring Model repository database user account.
You can enter the Windows NT user name for trusted connection on Microsoft
SQL Server.
User password Password for the Monitoring model repository database user account.
You can enter the Windows NT password for trusted connection on Microsoft SQL
Server.
Property Description
Tablespace Name of the tablespace in which to create the tables. Specify a tablespace
that meets the pageSize requirement of 32768 bytes.
In a single-partition database, if you select Yes to configure the tablespace,
enter the name of the tablespace in which to create the tables.
In a multipartition database, select this option and specify the name of the
non-partitioned tablespace that resides in the catalog partition of the
database.
b. If you select Microsoft SQL Server or PostgreSQL, enter the schema name for the database.
The following table describes the properties that you must configure for the Microsoft SQL Server or
PostgreSQL database:
Property Description
Specify Schema Name Specify whether you want to specify a schema name.
Enter 1 for No.
Enter 2 for Yes.
Schema name Name of the schema that will contain domain configuration tables. If this
parameter is blank, the installer creates the tables in the default schema.
114 Chapter 8: Create a Domain With Data Engineering, Enterprise Data Catalog and Data Privacy Management
The following table describes the database connection information:
Prompt Description
Configure JDBC Select whether to add additional JDBC parameters to the connection string:
Parameters 1 - Yes
2 - No
If you select Yes, enter the parameters or press Enter to accept the default.
If you select No, the installer creates the JDBC connection string without
parameters.
Oracle
jdbc:Informatica:oracle://<host name>:<port number>;ServiceName=
If you specified the Windows NT credentials for the Model repository database on Microsoft
SQL Server, specify the connection string syntax to include the authentication method as
NTLM.
Microsoft SQL Server that uses the default instance with Windows NT credentials:
"jdbc:informatica:sqlserver://<host name>:<port number>;DatabaseName=<database
name>;SnapshotSerializable=true;authenticationMethod=NTLM"
Microsoft SQL Server that uses a named instance with Windows NT credentials:
"jdbc:informatica:sqlserver://<host name>\<named instance
name>;DatabaseName=<database
name>;SnapshotSerializable=true;authenticationMethod=NTLM"
PostgreSQL
jdbc:Informatica:postgresql://<host name>:<port number>;DatabaseName=
Verify that the connection string contains all the connection parameters required by your
database system.
116 Chapter 8: Create a Domain With Data Engineering, Enterprise Data Catalog and Data Privacy Management
• Enter a port number.
3. Select the SSL certificates to use to secure the Data Integration Service.
Option Description
Use the default Use the default Informatica SSL certificates contained in the default keystore and truststore.
Informatica SSL Note: If you do not provide an SSL certificate, Informatica uses the same default private key
certificate files for all Informatica installations. If you use the default Informatica keystore and truststore
files, the security of your domain could be compromised. To ensure a high level of security
for the domain, select the option to specify the location of the SSL certificate files.
Use custom SSL Use custom SSL certificates. You must specify the location of the keystore and truststore
certificates files.
You can provide a self-signed certificate or a certificate issued by a certificate authority (CA).
You must provide SSL certificates in PEM format and in Java Keystore (JKS) files.
Informatica requires specific names for the SSL certificate files for the Informatica domain.
You must use the same SSL certificates for all nodes in the domain. Store the truststore and
keystore files in a directory accessible to all the nodes in the domain and specify the same
keystore file directory and truststore file directory for all nodes in the same domain.
If you choose to use custom SSL certificates, enter the following information.
Property Description
Keystore file directory Directory that contains the keystore files. The directory must contain files named
infa_keystore.jks and infa_keystore.pem.
Truststore file directory Directory that contains the truststore files. The directory must contain files
named infa_truststore.jks and infa_truststore.pem.
4. Choose whether you want to enable data engineering recovery for the Data Integration Service or not.
• Press 1 for Yes.
• Press 2 for No.
If you choose Yes, you can recover mapping jobs that the Data Integration Service pushes to the Spark
engine for processing. Default is No.
The Content Management Service Parameters and Database section appears.
1. At the Content Management Service name prompt, enter the service name. For example, CMS
2. At the HTTPS port prompt, enter the HTTPS port number to use for the Content Management Service.
Option Description
Use the default Use the default Informatica SSL certificates contained in the default keystore and truststore.
Informatica Note: If you do not provide an SSL certificate, Informatica uses the same default private key
keystore files for all Informatica installations. If you use the default Informatica keystore and truststore
files, the security of your domain could be compromised. To ensure a high level of security for
the domain, select the option to specify the location of the SSL certificate files.
Use custom Use custom SSL certificates. You must specify the location of the keystore and truststore
keystore files files.
You can provide a self-signed certificate or a certificate issued by a certificate authority (CA).
You must provide SSL certificates in PEM format and in Java Keystore (JKS) files. Informatica
requires specific names for the SSL certificate files for the Informatica domain. You must use
the same SSL certificates for all nodes in the domain. Store the truststore and keystore files
in a directory accessible to all the nodes in the domain and specify the same keystore file
directory and truststore file directory for all nodes in the same domain.
If you choose to use custom SSL certificates, enter the following information.
Property Description
Keystore file directory Directory that contains the keystore files. The directory must contain files named
infa_keystore.jks and infa_keystore.pem.
The keystore certificate types for the Content Management Service depends on the certificate types that
the SSL-enabled domain uses:
• If you used the default keystore certificate for the domain, you can use either the default or a custom
keystore certificate for the Content Management Service.
• If you used a custom keystore certificate for the domain, you must use a custom keystore certificate
for the Content Management Service.
Prompt Description
Database type Type of database for reference data warehouse. Select from the following options:
1 - Oracle
2 - Microsoft SQL Server
3 - IBM DB2
4 - PostgreSQL
118 Chapter 8: Create a Domain With Data Engineering, Enterprise Data Catalog and Data Privacy Management
The following table lists the properties for the database user account:
Property Description
Database user ID Name for the reference data warehouse database user account.
User password Password for the profiling warehouse database user account.
6. Based on the database type selected, enter the parameters for the database.
a. If you select IBM DB2, select whether to configure a tablespace and enter the tablespace name.
The following table describes the properties that you must configure for the IBM DB2 database:
Property Description
Tablespace Name of the tablespace in which to create the tables. Specify a tablespace
that meets the pageSize requirement of 32768 bytes.
In a single-partition database, if you select Yes to configure the tablespace,
enter the name of the tablespace in which to create the tables.
In a multipartition database, select this option and specify the name of the
non-partitioned tablespace that resides in the catalog partition of the
database.
b. If you select Microsoft SQL Server, enter the schema name for the database.
The following table describes the properties that you must configure for the Microsoft SQL Server
database:
Property Description
Specify Schema Name Specify whether you want to specify a schema name.
Enter 1 for No.
Enter 2 for Yes.
Schema name Name of the schema that will contain domain configuration tables. If this
parameter is blank, the installer creates the tables in the default schema.
7. To enter the JDBC connection information using the JDBC URL information, press 1. To enter the JDBC
connection information using a custom JDBC connection string, press 2.
8. Enter the JDBC connection information.
• To enter the connection information using the JDBC URL information, specify the JDBC URL
properties.
Prompt Description
Database address Host name and port number for the database.
Configure JDBC Select whether to add additional JDBC parameters to the connection string:
Parameters 1 - Yes
2 - No
If you select Yes, enter the parameters or press Enter to accept the default.
If you select No, the installer creates the JDBC connection string without
parameters.
• To enter the connection information using a custom JDBC connection string, type the connection
string.
Use the following syntax in the JDBC connection string:
IBM DB2
jdbc:Informatica:db2://<host name>:<port number>;DatabaseName=
Oracle
jdbc:Informatica:oracle://<host name>:<port number>;ServiceName=
Use the following connection string to connect to the Oracle database through the Oracle
Connection Manager:
jdbc:Informatica:oracle:TNSNamesFile=<fully qualified path to the tnsnames.ora
file>;TNSServerName=<TNS name>;
PostgreSQL
jdbc:Informatica:postgresql://<host name>:<port number>;DatabaseName=
Verify that the connection string contains all the connection parameters required by your database
system.
120 Chapter 8: Create a Domain With Data Engineering, Enterprise Data Catalog and Data Privacy Management
Profiling Warehouse Connection Database
The Profiling Warehouse Connection Database panel collects information on the database for the Profiling
Warehouse.
Prompt Description
Database type Type of database for the profiling warehouse connection. Select from the following
options:
1 - Oracle
2 - Microsoft SQL Server
3 - IBM DB2
Property Description
Database user ID Name for the profiling warehouse database user account.
User password Password for the profiling warehouse database user account.
3. Based on the database type selected, enter the parameters for the database.
a. If you select IBM DB2, select whether to configure a tablespace and enter the tablespace name.
The following table describes the properties that you must configure for the IBM DB2 database:
Property Description
Tablespace Name of the tablespace in which to create the tables. Specify a tablespace
that meets the pageSize requirement of 32768 bytes.
In a single-partition database, if you select Yes to configure the tablespace,
enter the name of the tablespace in which to create the tables.
In a multipartition database, select this option and specify the name of the
non-partitioned tablespace that resides in the catalog partition of the
database.
b. If you select Microsoft SQL Server, enter the schema name for the database.
Property Description
Specify Schema Name Specify whether you want to specify a schema name.
Enter 1 for No.
Enter 2 for Yes.
Schema name Name of the schema that will contain domain configuration tables. If this
parameter is blank, the installer creates the tables in the default schema.
4. To enter the JDBC connection information using the JDBC URL information, press 1. To enter the JDBC
connection information using a custom JDBC connection string, press 2.
5. Enter the JDBC connection information.
• To enter the connection information using the JDBC URL information, specify the JDBC URL
properties.
The following table describes the database connection information:
Prompt Description
Database address Host name and port number for the database.
Configure JDBC Select whether to add additional JDBC parameters to the connection string:
Parameters 1 - Yes
2 - No
If you select Yes, enter the parameters or press Enter to accept the default.
If you select No, the installer creates the JDBC connection string without
parameters.
122 Chapter 8: Create a Domain With Data Engineering, Enterprise Data Catalog and Data Privacy Management
• To enter the connection information using a custom JDBC connection string, type the connection
string.
Use the following syntax in the JDBC connection string:
IBM DB2
jdbc:Informatica:db2://host_name:port_no;DatabaseName=
Oracle
jdbc:Informatica:oracle://host_name:port_no;ServiceName=
Verify that the connection string contains all the connection parameters required by your database
system.
Property Description
User name for the User name for the gateway host. The gateway user must be a non-root user with sudo
gateway host access.
You must enable passwordless SSH for the following nodes:
- Between the Informatica domain and the gateway host for the gateway user.
- Between gateway host and data nodes and processing nodes.
- If you plan to enable Advanced Configuration for the service, enable passwordless
SSH between the gateway node and service nodes.
Enter the Informatica Name of the service. The name is not case-sensitive and must be unique within the
Cluster Service Name domain. The name cannot exceed 128 characters or begin with @. The name cannot
contain character spaces. The characters in the name must be compatible with the
code page of the Model repository. The name cannot contain the following special
characters:` ~ % ^ * + = { } \ ; : ' " / ? . , < > | ! ( ) ] [
Informatica Cluster Fully qualified domain name of the node that you want to configure as the gateway
Gateway Host host.
The node that you configure as the gateway host must be a data node or a processing
node.
Enable Advanced Select 2 if you want to configure the properties of the applications and associated
Configuration services. If you select 2, the associated services use the values that you specify for
them instead of using the values specified for the data nodes.
Provide the parameters listed in “Informatica Cluster Service Advanced Configuration” on
page 189 .
Data Nodes Comma-separated list of fully qualified domain names of nodes that you want to
configure as data nodes.
Processing Nodes Comma-separated list of fully qualified domain names of nodes that you want to
configure as processing nodes.
Enable Transport Layer Select the option to enable TLS for the Informatica Cluster Service.
Security (TLS)
Enter the Informatica Port number for the HTTPS connection. Required if you selected Enable Transport
Cluster Service HTTPS Layer Security.
Port
Enable Secure Select 1 to use to default Informatica SSL certificates or select 2 to use the custom
Communication for the SSL certificates.
Service If the Informatica domain is enabled for SSL, you must provide the following details:
- HTTPS port. The HTTPS port to access the Informatica domain node.
- Informatica keystore file. The fully qualified path to the Informatica domain
keystore file.
- Keystore password. The password for the keystore file.
SSL protocol to use Optional. Provide the SSL protocol that you want to use for the service.
Enable Advanced Select 2 if you want to configure the properties of the Spark and Elasticsearch
Configuration for Data services. If you select 2, the associated services use the values that you specify for
Privacy Management them instead of using the values specified for the data nodes.
Note: You must select the same option for the Advanced Configuration for the
Informatica Cluster Service and the Advanced Configuration for Data Privacy
Management.
Provide the parameters listed in the “Data Privacy Management Service Advanced
Configuration” on page 192 section.
If you do not enable advanced configuration, Elasticsearch installs on all data nodes.
The gateway host is used as the Spark master node. Spark slave nodes are installed
on processing nodes.
2. Press Enter.
124 Chapter 8: Create a Domain With Data Engineering, Enterprise Data Catalog and Data Privacy Management
The following table describes the options for the SSL certificates that you can use to secure the
repository:
Option Description
Use the default Use the default Informatica SSL certificates contained in the default keystore and
keystore truststore.
generated by the Note: If you do not provide an SSL certificate, Informatica uses the same default private key
installer for all Informatica installations. If you use the default Informatica keystore and truststore
files, the security of your domain could be compromised. To ensure a high level of security
for the domain, select the option to specify the location of the SSL certificate files.
Specify the Use custom SSL certificates. You must specify the location of the keystore and truststore
location and files.
password of a You can provide a self-signed certificate or a certificate issued by a certificate authority
custom keystore (CA). You must provide SSL certificates in PEM format and in Java Keystore (JKS) files.
file Informatica requires specific names for the SSL certificate files for the Informatica domain.
You must use the same SSL certificates for all nodes in the domain. Store the truststore and
keystore files in a directory accessible to all the nodes in the domain and specify the same
keystore file directory and truststore file directory for all nodes in the same domain.
If you choose to use custom SSL certificates, enter the following information.
Property Description
Catalog Service Keystore Full path and file name of the keystore file.
file
1. At the Data Privacy Management Service name prompt, enter the service name. For example, DPM
2. At the HTTPS port prompt, enter the HTTPS port number to use for the Data Privacy Management
Service.
3. Enable secure communication for the Service.
Option Description
Use the default Use the default Informatica SSL certificates contained in the default keystore and
keystore truststore.
generated by the Note: If you do not provide an SSL certificate, Informatica uses the same default private key
installer for all Informatica installations. If you use the default Informatica keystore and truststore
files, the security of your domain could be compromised. To ensure a high level of security
for the domain, select the option to specify the location of the SSL certificate files.
Specify the Use custom SSL certificates. You must specify the location of the keystore and truststore
location and files.
password of a You can provide a self-signed certificate or a certificate issued by a certificate authority
custom keystore (CA). You must provide SSL certificates in PEM format and in Java Keystore (JKS) files.
file Informatica requires specific names for the SSL certificate files for the Informatica domain.
You must use the same SSL certificates for all nodes in the domain. Store the truststore and
keystore files in a directory accessible to all the nodes in the domain and specify the same
keystore file directory and truststore file directory for all nodes in the same domain.
If you choose to use custom SSL certificates, enter the following information.
Property Description
Keystore file Full path and file name of the keystore file.
4. At the Database type prompt, select the database type to use for the Data Privacy Management
repository database.
• Enter 1 for Oracle.
• Enter 2 for Microsoft SQL Server or Azure SQL Database.
• Enter 3 for IBM DB2.
• Enter 4 for PostgreSQL.
5. At the Database user ID prompt, enter the name for the Data Privacy Management repository database
user account.
6. At the User password prompt, enter password for the Data Privacy Management repository database
user account.
7. Enter the parameters for the database.
a. If you select IBM DB2, select whether to configure a tablespace and enter the tablespace name.
126 Chapter 8: Create a Domain With Data Engineering, Enterprise Data Catalog and Data Privacy Management
The following table describes the properties that you must configure for the IBM DB2 database:
Property Description
Tablespace Name of the tablespace in which to create the tables. Specify a tablespace
that meets the pageSize requirement of 32768 bytes.
In a single-partition database, if you select Yes to configure the tablespace,
enter the name of the tablespace in which to create the tables.
In a multi-partition database, specify the name of the tablespace that resides
in the catalog partition of the database.
b. If you select Microsoft SQL Server, choose not to enter the schema name for the database.
Prompt Description
Configure JDBC Select whether to add additional JDBC parameters to the connection string:
Parameters 1 - Yes
2 - No
If you select Yes, enter the parameters or press Enter to accept the default.
If you select No, the installer creates the JDBC connection string without
parameters.
Oracle
jdbc:Informatica:oracle://<host name>:<port number>;ServiceName=
PostgreSQL
jdbc:Informatica:postgresql://<host name:port number>;DatabaseName=<database
name>;
Verify that the connection string contains all the connection parameters required by your
database system.
10. If you enabled User Activity monitoring, enter the mount location to store event messages.
The mount location must be accessible to the domain machine and all cluster machines. The path to the
mount location must be the same on all machines with Read, Write, and Execute permissions for the
domain user on all machines.
The post-installation summary appears when the install completes successfully.
128 Chapter 8: Create a Domain With Data Engineering, Enterprise Data Catalog and Data Privacy Management
Chapter 9
When you complete the preliminary tasks, you will continue with the installer prompts and will provide
information to configure the domain.
You must have performed the following prerequisite tasks before you run the installer to join a domain:
• The installation path on each machine where you install Data Privacy Management must be the same.
• Configure the backup node with all domain prerequisites for an Enterprise Data Catalog installation
• Copy the $INFA_HOME/isp/config/keys/siteKey siteKey from the primary node to the backup node
machine.
• If the primary node uses custom SSL certificates, the backup node must also use custom SSL certificates.
Both nodes must use the same truststore file with certificates of both nodes imported.
• If you use a remote agent, import the remote agent certificate to the truststores of both nodes. Import the
certificate of the backup node machine into the remote agent truststore.
129
2. Close all other applications.
3. On a shell command line, run the install.sh file from the installer directory.
The installer displays the message to verify that the locale environment variables are set.
4. At the prompt to read the documents, press y to continue the install.
Press n if you want to read the documentation before you continue.
5. Press 1 to install Informatica products.
6. Press 3 to run the installer.
Component Selection
After you accept terms and conditions, you can install Informatica Data Engineering, Enterprise Data Catalog,
and Data Privacy Management.
130 Chapter 9: Join a Domain With Data Engineering, Enterprise Data Catalog and Data Privacy Management
Enter the following information:
Property Description
Path to the Elasticsearch .tar file with X- Enter the complete path to the Elasticsearch .tar file that you
Pack features want to use.
Elasticsearch Admin User Password Enter the password to use. The user name is always elastic.
Note: You cannot change the Elasticsearch settings from the Administrator Tool.
The Installation Prerequisites section displays the installation requirements. Verify that all requirements are
met before you continue the installation.
Deployment Type Disk Space per Node Total Virtual Cores RAM per Node
Sandbox 140 GB 16 32 GB
Basic 140 GB 24 64 GB
Standard 140 GB 48 64 GB
3. Select whether you want to change the deployment type or continue with the current deployment
selection.
a. Press 1 to change the deployment type.
b. Press 2 to continue with the current deployment selection.
The License and Installation Directory section appears.
Property Description
Informatica cluster Fully qualified domain name of the node that you want to configure as the gateway host.
gateway host
Enable advanced - Press 1 to skip validation of advanced configuration properties for associated services.
configuration - Press 2 to validate advanced configuration properties of associated services. If you
select this option, you must specify values for all the properties.
132 Chapter 9: Join a Domain With Data Engineering, Enterprise Data Catalog and Data Privacy Management
Property Description
Data nodes Comma-separated list of fully qualified domain names of nodes that you want to
configure as data nodes.
Processing nodes Comma-separated list of fully qualified domain names of nodes that you want to
configure as processing nodes.
Working directory Directory for the Informatica Cluster Service. Default is /opt/informatica/ics. For a
path multi-node setup, the installer prompts you to confirm if you want to specify the path to
the shared file system.
- Type 1 if you want to configure the shared file system path for the multi-node setup.
- Type 2 if you want to configure the shared file system path for the multi-node setup. If
you select this option, you must specify the path to the cluster custom directory.
Note: The permission on the directory must be u=rwx (0700) or u=rwx,g=rx
(0750). The Postgres service does not start if the directory does not have the required
permission.
3. Applies if you selected the option to validate advanced configuration properties of associated services.
Provide the following values for validation of the Nomad server configuration parameters:
Property Description
Nomad Server Comma-separated list of fully qualified domain names of nodes that host the Nomad
Hosts servers.
Nomad HTTP HTTP port number configured for the Nomad server. Default is 4646.
Port
Nomad Serf Port Serf port configured as the gossip protocol for the Nomad servers. Default is 4648.
Nomad RPC Port The Remote Procedure Call (RPC) port configured for communication. Default is 4647.
Nomad Server The directory that includes sub directories with tasks running on the Nomad server. Default
Working is $clusterCustomDir/nomad/nomadserver
Directory
Nomad Client The directory configured for tasks in the Nomad client. Default is $clusterCustomDir/nomad/
Working nomadclient
Directory
Nomad Custom Specify any custom options for the service in the following format:
Options [OptionGroupName.OptionName=OptionValue]. You can separate multiple options using a
white space character.
If the OptionValue includes a white space character, you must enclose the OptionValue
within double quotes as shown in the following sample: “sample value”.
Property Description
ZooKeeper Hosts Comma-separated list of fully qualified domain names of nodes that host the Apache
ZooKeeper server.
ZooKeeper Port Port number configured for the Apache ZooKeeper Server. Default is 2181.
ZooKeeper Peer Port number configured for Apache ZooKeeper peer communication. Default is 2888.
Port
ZooKeeper Port number configured for the ZooKeeper Sever identified as the Leader. Default is 3888.
Leader Port
ZooKeeper Specify the path to the directory where you want to install Apache ZooKeeper. Default is
Installation $clusterCustomDir/zk/install
Directory
ZooKeeper Data Specify the path to the directory where you want to store data from Apache ZooKeeper.
Directory Default is $clusterCustomDir/zk/data
ZooKeeper Specify any custom options for the service in the following format:
Custom Options [OptionGroupName.OptionName=OptionValue]. You can separate multiple options using a
white space character.
If the OptionValue includes a white space character, you must enclose the OptionValue
within double quotes as shown in the following sample: “sample value”.
Provide the following values for validation of the Apache Solr server configuration parameters:
Property Description
Solr Hosts Comma-separated list of fully qualified domain names of nodes that host the Apache Solr
server.
Solr Port Port number configured for Apache Solr Server. Default is 8983.
Solr Installation Specify the path to the directory where you want to install Apache Solr Server. Default is
Directory $clusterCustomDir/solr/install.
Solr Data Specify the path to the directory where you want to store data from Apache Solr. Default is
Directory $clusterCustomDir/solr/data
Solr Custom Specify any custom options for the service in the following format:
Options [OptionGroupName.OptionName=OptionValue]. You can separate multiple options using a
white space character.
If the OptionValue includes a white space character, you must enclose the OptionValue within
double quotes as shown in the following sample: “sample value”.
134 Chapter 9: Join a Domain With Data Engineering, Enterprise Data Catalog and Data Privacy Management
Provide the following values for validation of the MongoDB database configuration parameters:
Property Description
MongoDB Comma-separated list of fully qualified domain names of nodes that host the MongoDB
Hosts database.
MongoDB Log Specify the path to the directory where you want to store the log files. Default is
Directory $clusterCustomDir/mongo/log
MongoDB Data Specify the path to the directory where you want to store data from the MongoDB database.
Directory Default is $clusterCustomDir/mongo/data
MongoDB Specify any custom options for the service in the following format:
Custom [OptionGroupName.OptionName=OptionValue]. You can separate multiple options using a
Options white space character.
If the OptionValue includes a white space character, you must enclose the OptionValue within
double quotes as shown in the following sample: “sample value”.
Provide the following values for validation of the PostgreSQL database configuration parameters:
Property Description
PostgreSQL DB Fully qualified domain name of the machine that hosts the PostgreSQL database. Default is
Host the gateway host.
Note: If you did not select the Enable Advanced Configuration option, the service uses the
gateway host value specified as the host value
PostgreSQL DB Specify the path to the directory where you want to install the PostgreSQL database. Default
Installation is $clusterCustomDir/postgres/install
Directory
PostgreSQL DB Specify the path to the directory where you want to store the log files from the PostgreSQL
Log Directory database. Default is $clusterCustomDir/postgres/log
PostgreSQL DB Specify the path to the directory where you want to store PostgreSQL data. Default is
Data Directory $clusterCustomDir/postgres/data
PostgreSQL DB Specify any custom options for the service in the following format:
Custom Options [OptionGroupName.OptionName=OptionValue]. You can separate multiple options using a
white space character. If the OptionValue includes a white space character, you must
enclose the OptionValue within double quotes as shown in the following sample: “sample
value”.
Note: The details for the Data Privacy Management, Elasticsearch, and Spark services are not validated
by the pre-validation utility.
4. Press Enter to continue after running the pre-validation utility.
When you complete the tasks, you will complete the installation.
Domain Selection
After you review the Pre-Installation summary, you can enter the domain information.
Property Description
Configure this node as a Select whether to configure the node as a gateway or worker node.
gateway 1 - Yes
2 - No
Select 1 to configure a gateway node or 2 to configure a worker node.
3. Enter a HTTPS port number or press Enter to use the default port number.
Default is 8443.
4. If you configure the node as a gateway, enable a secure HTTPS connection to the Informatica
Administrator.
a. Enable secure communication.
Option Description
Use the default Use the default Informatica SSL certificates contained in the default keystore and
keystore truststore.
generated by the Note: If you do not provide an SSL certificate, Informatica uses the same default private
installer key for all Informatica installations. If you use the default Informatica keystore and
truststore files, the security of your domain could be compromised. To ensure a high
level of security for the domain, select the option to specify the location of the SSL
certificate files.
Specify the Use custom SSL certificates. You must specify the location of the keystore and
location and truststore files.
password of a You can provide a self-signed certificate or a certificate issued by a certificate
custom keystore authority (CA). You must provide SSL certificates in PEM format and in Java Keystore
file (JKS) files. Informatica requires specific names for the SSL certificate files for the
Informatica domain. You must use the same SSL certificates for all nodes in the
domain. Store the truststore and keystore files in a directory accessible to all the nodes
in the domain and specify the same keystore file directory and truststore file directory
for all nodes in the same domain.
136 Chapter 9: Join a Domain With Data Engineering, Enterprise Data Catalog and Data Privacy Management
If you choose to use custom SSL certificates, enter the following information:
Property Description
Keystore file directory Directory that contains the keystore files. The directory must contain files
named infa_keystore.jks and infa_keystore.pem.
5. Applicable if you configure the node as a gateway node. Select whether SAML authentication is enabled
to configure Security Assertion Markup Language (SAML)-based single sign-on (SSO) support for web-
based Informatica applications in an Informatica domain.
• Press 1 if the domain does not use SAML authentication and skip to “Domain Security - Secure
Communication” on page 103.
• Press 2 if the domain uses SAML authentication.
6. Select whether to use the default Informatica SSL certificates or to use your SSL certificates to enable
secure communication in the domain.
The following table describes the SSL certificate options for SAML authentication:
Option Description
Use the default Informatica SSL Select to use the default Informatica truststore file for SAML authentication.
certificate file.
Enter the location of the SSL Select to use a custom truststore file for SAML authentication. Specify the
certificate file. directory containing the custom truststore file on gateway nodes within the
domain. Specify the directory only, not the full path to the file.
7. Select whether to use the default Informatica SSL certificates or to use your SSL certificates to enable
SAML authentication in the domain.
The following table describes the SSL certificate options for SAML authentication:
Option Description
Use the default Informatica SSL Select to use the default Informatica truststore file for SAML authentication.
certificate file.
Enter the location of the SSL Select to use a custom truststore file for SAML authentication. Specify the
certificate file. directory containing the custom truststore file on gateway nodes within the
domain. Specify the directory only, not the full path to the file.
8. If you provide the security certificates, specify the location and passwords of the keystore and truststore
files.
Property Description
Truststore Directory Specify the directory containing the custom truststore file on gateway nodes within the
domain. Specify the directory only, not the full path to the file.
Keystore Directory Specify the directory containing the custom keystore file.
9. Click Next.
The Domain Security - Secure Communication appears.
Domain Security
After you configure the domain, you can configure domain security.
u In the Domain Security - Secure Communication section, specify whether to use the default Informatica
SSL certificates or to use your SSL certificates to secure domain communication.
a. Select the type of SSL certificates to use.
The following table describes the options for the SSL certificates that you can use to secure the
Informatica domain:
Option Description
Use the default Use the default SSL certificates contained in the default keystore and
Informatica SSL truststore.
certificates Note: If you do not provide an SSL certificate, Informatica uses the same
default private key for all Informatica installations. If you use the default
Informatica keystore and truststore files, the security of your domain could be
compromised. To ensure a high level of security for the domain, select the
option to specify the location of the SSL certificate files.
Use custom SSL Specify the path for the keystore and truststore files that contain the SSL
certificates certificates. You must also specify the keystore and truststore passwords.
You can provide a self-signed certificate or a certificate issued by a certificate
authority (CA). You must provide SSL certificates in PEM format and in Java
Keystore (JKS) files. Informatica requires specific names for the SSL
certificate files for the Informatica domain. You must use the same SSL
certificates for all nodes in the domain. Store the truststore and keystore files
in a directory accessible to all the nodes in the domain and specify the same
keystore file directory and truststore file directory for all nodes in the same
domain.
If the node that you create uses a different keystore, perform the following steps:
1. Import the node keystore to the domain truststore.
138 Chapter 9: Join a Domain With Data Engineering, Enterprise Data Catalog and Data Privacy Management
2. Copy the domain truststore to the node.
3. Update the Informatica Cluster Service truststore with the node keystore. The Informatica
Cluster Service truststore is stored in the following location: opt/Informatica/<Informatica
Cluster Service name>/certs/trustore.jks
4. Shut down and enable the Informatica Cluster Service.
b. If you provide the SSL certificate, specify the location and passwords of the keystore and truststore
files.
The following table describes the parameters that you must enter for the SSL certificate files:
Property Description
Keystore file directory Directory that contains the keystore files. The directory must contain files
named infa_keystore.jks.
Truststore file directory Directory that contains the truststore files. The directory must contain files
named infa_truststore.jks and infa_truststore.pem.
Domain Configuration
After you configure the domain security, you can enter the domain details.
u Enter the information for the domain that you want to join.
The following table describes the properties that you specify for the domain:
Property Description
Gateway node host Host name of the machine that hosts the gateway node for the domain.
Domain user name User name of the administrator for the domain you want to join.
u Enter the directory for the encryption key for the Informatica domain.
The following table describes the encryption key parameters that you must specify when you join a
domain:
Prompt Description
Select the Path and file name of the encryption key for the Informatica domain that you want to join. All
encryption key nodes in the Informatica domain use the same encryption key. You must specify the
encryption key file created on the gateway node for the domain that you want to join.
If you copied the encryption key file to a temporary directory to make it accessible to the
nodes in the domain, specify the path and file name of the encryption key file in the temporary
directory.
Encryption key Directory in which to store the encryption key on the node created during this installation. The
directory installer copies the encryption key file for the domain to the encryption key directory on the
new node.
The installer sets different permissions to the directory and the files in the directory. For more
information about the permissions for the encryption key file and directory, see “Secure Files and
Directories” on page 87.
1. Enter the information for the domain and the node that you want to join.
The following table describes the properties that you set for the current node.
Property Description
Node host name Host name or IP address of the machine on which to join the node.
If the machine has a single network name, use the default host name. If the a
machine has multiple network names, you can modify the default host name to
use an alternate network name.
Note: The node host name cannot contain the underscore (_) character. Do not
use localhost. The host name must explicitly identify the machine.
Node port number Port number for the node. The default port number for the node is 6005. If the
port number is not available on the machine, the installer displays the next
available port number.
2. Select whether to display the advanced port configurations for the domain and node components
assigned by the installer.
140 Chapter 9: Join a Domain With Data Engineering, Enterprise Data Catalog and Data Privacy Management
If you select 1, the installer does not display the port configurations. If you select 2 to create the ports,
the Port Configuration section appears. The installer displays the default port numbers assigned to the
domain components. You can specify the port numbers to use for the domain and node components.
You can also specify a range of port numbers to use for the service process that will run on the node.
You can use the default port numbers or specify new port numbers. Verify that the port numbers you
enter are not used by other applications.
3. Press 2 to choose not to create the Model Repository Service and Data Integration Service.
The Post-Installation Summary section indicates whether the installation completed successfully. The
summary also shows the status of the installed components and their configuration.
You can configure the backup nodes for available services from Informatica Administrator.
Port Configuration
If you chose to display the advanced port configuration page, you can set the ports for the domain
components.
u Enter new port numbers at the prompt or press Enter to use the default port numbers.
The following table describes the ports that you can set:
Port Description
Service Manager port Port number used by the Service Manager on the node. The Service Manager
listens for incoming connection requests on this port. Client applications use this
port to communicate with the services in the domain. The Informatica command
line programs use this port to communicate to the domain. This is also the port
for the SQL data service JDBC/ODBC driver. Default is 6006.
Service Manager Shutdown Port number that controls server shutdown for the domain Service Manager. The
port Service Manager listens for shutdown commands on this port. Default is 6007.
Informatica Administrator No default port. Enter the required port number when you create the service.
HTTPS port Setting this port to 0 disables an HTTPS connection to the Administrator tool.
Informatica Administrator Port number that controls server shutdown for Informatica Administrator.
shutdown port Informatica Administrator listens for shutdown commands on this port. Default is
6009.
Minimum port number Lowest port number in the range of dynamic port numbers that can be assigned to
the application service processes that run on this node. Default is 6014.
Maximum port number Highest port number in the range of dynamic port numbers that can be assigned
to the application service processes that run on this node. Default is 6114.
The Post-Installation Summary section appears. The Post-Installation Summary section indicates whether
the installation completed successfully. The summary also shows the status of the installed components and
their configuration.
• Overview, 142
• Prerequisites, 142
• Install Data Privacy Management, 143
• Data Privacy Management Service Configuration, 146
Overview
If you installed and configured Data Engineering and Enterprise Data Catalog, you can install Data Privacy
Management on a node in the domain and configure the Data Privacy Management Service.
Complete the following tasks to install and configure Data Privacy Management on an existing node in the
domain:
Prerequisites
If you plan to install Data Privacy Management in an existing domain with Enterprise Data Catalog and Data
Engineering products installed, you must account for the dependencies for each product.
Ensure you complete the following prerequisite tasks before you run the installer to install Data Privacy
Management in an existing domain:
• Install the current version of Data Engineering products and Enterprise Data Catalog.
• The Informatica domain and Enterprise Data Catalog must have SSL authentication enabled.
• Data Engineering services and Enterprise Data Catalog services that Data Privacy Management requires
must be created and available.
Verify that the following services are available when you run the installer:
142
Model Repository Service
The Model Repository Service manages the Model repository. It receives requests from Informatica
clients and application services to store or access metadata in the Model repository. You also need to
prepare the Model Repository database. For more information, see Model Repository Service “Model
Repository Service” on page 54.
The monitoring Model Repository Service is a Model Repository Service that monitors statistics for Data
Integration Service jobs. The service uses the Model repository to store data. For more information, see
“Monitoring Model Repository Service” on page 57.
The Data Integration Service receives requests from Informatica client tools to run integration, profile,
and data preparation jobs. It writes results to different databases, and it writes run-time metadata to the
Model repository. You also need to prepare databases associated with the service. For more information,
see “Data Integration Service” on page 46.
The Content Management Service manages reference data for data domains that use reference tables. It
uses the Data Integration Service to run mappings to transfer data between reference tables and
external data sources. For more information, see “Content Management Service” on page 44.
The Informatica Cluster Service runs and manages the cluster that runs with Enterprise Data Catalog. It
distributes the Hortonworks binaries and launches the required cluster services on the hosts where the
cluster runs. For more information, see “Informatica Cluster Service” on page 54.
Catalog Service
The Catalog Service manages connections between service components and the users that have access
to Enterprise Data Catalog search interface and Catalog Administrator. For more information, see
“Catalog Service” on page 40.
1. On a shell command line, run the install.sh file from the installer directory.
The installer displays the message for documentation. Press Y to continue.
2. Press 1 to install the products.
3. Press Y to continue the installation.
4. Press Y to continue the installation.
5. Press 3 to run the installer.
6. Press 2 to agree to the terms and conditions.
7. Press 4 to install Data Privacy Management.
8. Press 2 to indicate that Enterprise Data Catalog is installed on the node.
9. You can choose to enable User Activity.
Property Description
Path to the Elasticsearch .tar file with X- Enter the complete path to the Elasticsearch .tar file that you
Pack features want to use.
Elasticsearch Admin User Password Enter the password to use. The user name is always elastic.
Note: You cannot change the Elasticsearch settings from the Administrator Tool.
Property Description
Keystore file name Full path and file name of the keystore file.
Truststore file name Full path and file name of the truststore file.
Property Description
Elasticsearch Hosts Comma-separated list of fully qualified domain names of the nodes configured as
Elasticsearch hosts.
Elasticsearch WebUI Port Web UI port configure for the service.Default is 9200.
Elasticsearch Application Application port number configured for the service. Default is 9300.
Port
Elasticsearch Log The path to the directory where you want to store the log files from the service.
Directory Default is /opt/informatica/ics/elasticsearch/log.
Elasticsearch Data The path to the directory where you want to store data from the service. Default
Directory is /opt/informatica/ics/elasticsearch/data.
Property Description
Spark Master Node Fully qualified domain name of the machine configured as the gateway host.
Spark Master Port Port number configured for the service. Default is 7077.
Spark Slave Nodes Comma-separated list of fully qualified domain names of nodes configured as Apache
Spark slave nodes.
Spark Executor Cores The number of concurrent tasks that you want an Apache Spark executor to run.
Spark Log Directory The path to the directory where you want to store the log files related to the service.
Default is /opt/informatica/ics/spark/log.
1. At the Data Privacy Management Service name prompt, enter the service name. For example, DPM
2. At the HTTPS port prompt, enter the HTTPS port number to use for the Data Privacy Management
Service.
3. Enable secure communication for the Service.
The following table describes the options for the SSL certificates that you can use to secure the
repository:
Option Description
Use the default Use the default Informatica SSL certificates contained in the default keystore and
keystore truststore.
generated by the Note: If you do not provide an SSL certificate, Informatica uses the same default private key
installer for all Informatica installations. If you use the default Informatica keystore and truststore
files, the security of your domain could be compromised. To ensure a high level of security
for the domain, select the option to specify the location of the SSL certificate files.
Specify the Use custom SSL certificates. You must specify the location of the keystore and truststore
location and files.
password of a You can provide a self-signed certificate or a certificate issued by a certificate authority
custom keystore (CA). You must provide SSL certificates in PEM format and in Java Keystore (JKS) files.
file Informatica requires specific names for the SSL certificate files for the Informatica domain.
You must use the same SSL certificates for all nodes in the domain. Store the truststore and
keystore files in a directory accessible to all the nodes in the domain and specify the same
keystore file directory and truststore file directory for all nodes in the same domain.
If you choose to use custom SSL certificates, enter the following information.
Property Description
Keystore file Full path and file name of the keystore file.
4. At the Database type prompt, select the database type to use for the Data Privacy Management
repository database.
• Enter 1 for Oracle.
• Enter 2 for Microsoft SQL Server or Azure SQL Database.
• Enter 3 for IBM DB2.
• Enter 4 for PostgreSQL.
5. At the Database user ID prompt, enter the name for the Data Privacy Management repository database
user account.
6. At the User password prompt, enter password for the Data Privacy Management repository database
user account.
Property Description
Tablespace Name of the tablespace in which to create the tables. Specify a tablespace
that meets the pageSize requirement of 32768 bytes.
In a single-partition database, if you select Yes to configure the tablespace,
enter the name of the tablespace in which to create the tables.
In a multi-partition database, specify the name of the tablespace that resides
in the catalog partition of the database.
b. If you select Microsoft SQL Server, choose not to enter the schema name for the database.
Prompt Description
Configure JDBC Select whether to add additional JDBC parameters to the connection string:
Parameters 1 - Yes
2 - No
If you select Yes, enter the parameters or press Enter to accept the default.
If you select No, the installer creates the JDBC connection string without
parameters.
Oracle
jdbc:Informatica:oracle://<host name>:<port number>;ServiceName=
PostgreSQL
jdbc:Informatica:postgresql://<host name:port number>;DatabaseName=<database
name>;
Verify that the connection string contains all the connection parameters required by your
database system.
10. If you enabled User Activity monitoring, enter the mount location to store event messages.
The mount location must be accessible to the domain machine and all cluster machines. The path to the
mount location must be the same on all machines with Read, Write, and Execute permissions for the
domain user on all machines.
The post-installation summary appears when the install completes successfully.
Copy the installation files to the hard disk on the machine where you plan to install the services. If you install
on a remote machine, verify that you can access and create files on the remote machine.
1. Run the password encryption utility to encrypt the passwords in the installation properties file.
2. Configure the installation properties file and specify the installation options in the properties file.
3. Run the installer with the installation properties file.
The install files include separate files for each type of Data Privacy Managementinstall. Use the correct file
for the required installation.
You can choose from the following files based on the installation:
SilentInput_DPM.properties
The file contains the configuration properties required to install Informatica services, Enterprise Data
Catalog, and Data Privacy Management in silent mode. Use the file if you want to perform a fresh install
of all three products.
SilentInput_Standalone_DPM.properties
The file contains the configuration properties required to install Data Privacy Management in silent
mode. Use the file if you have installed Informatica services and Enterprise Data Catalog and want to
install Data Privacy Management.
149
To configure the properties files, perform the following steps:
The silent installation fails if you incorrectly configure the properties file or if the installation directory is not
accessible. View the installation log files and correct the errors. Then run the silent installation again.
You run the utility for each password you want to encrypt. When you run the utility, you specify the value of
the password in plain text at the command prompt. The utility generates the password in encrypted format as
output. The output includes the following prefix: =INSTALLER:CIPHER:AES:256=
Copy the complete output string, including the prefix, and then paste it into the properties file as the value for
the password property. When you run the installer in silent mode, the installation framework decrypts the
password.
Troubleshooting
This chapter includes the following topics:
When the service installation process fails on UNIX or Linux, you can resume from the previous service
configuration and recover the last entered details for that service installation. The install process might fail
for reasons such as network outage, when you exit the installation before completing the entire installation
process, or because of incorrect information entered.
If a service fails or if the installation process fails during a service creation, you can resume the
installation process with the server installer. To resume the installation process, ensure that at least one
of the services is created and that the domain is up and running from the installation log. For example, if
you want to check whether the Model Repository Service is created, check if you have a service creation
success text in the server log in the following format:
152
When you resume the installer while creating a service, the installer retains all the service and database
specific information, such as the create service status, service name, service enabled or disabled status.
You can confirm and use the previously entered values or specify new values for the service and resume
the installation process.
• You run installer to configure services after the services are created.
• You run the service configuration wizard.
• You join a domain.
Before you can resume the installer, complete the following prerequisites:
1. In the installation log file present in the installation directory, verify that at least the domain and one
service is created. The installer log file name appears in the following syntax:
Informatica_<Version>_Services_<timestamp>.log
2. Ensure that you do not delete the installInst.obj object file present in the tools folder of the user
installation directory.
3. If you are going to resume through the silent installer, ensure that RESUME_INSTALLATION is set to true
in the SilentInput.properties file.
1. Open a command prompt and navigate to the location of the installation files.
2. Run the console installer or the silent installer.
3. When the regular installer runs, you might get a prompt confirming whether you want to resume previous
installer or not.
• If you do not want to resume installation, enter 1 for No. Default is 1.
• If you want to resume installation, enter 2 for Yes.
Before you can resume the installation, the services get validated.
The installer produces log files during and after the installation. You can use these logs to get more
information about the tasks completed by the installer and errors that occurred during installation. The
installation log files include the following logs:
• Debug logs
The debug log contains output from the infacmd and infasetup commands used to create the domain, node,
and application services. It also contains information about starting the application services.
The following table describes the properties of the debug log files:
Property Description
Usage Get more information about the actions performed by the installer and get more information about
installation errors. The installer writes information to this file during the installation. If the installer
generates an error, you can use this log to troubleshoot the error.
Contents Detailed summary of each action performed by the installer, the information you entered in the
installer, each command line command used by the installer, and the error code returned by the
command.
The following table describes the properties of the installation log file:
Property Description
Usage Get information about the files installed and registry entries created.
Contents Directories created, names of the files installed and commands run, and status for each installed
file.
The following table describes the files generated by the Service Manager:
Property Description
catalina.out Log events from the Java Virtual Machine (JVM) that runs the Service Manager. For
example, a port is available during installation, but is in use when the Service Manager
starts. Use this log to get more information about which port was unavailable during
startup of the Service Manager.
The catalina.out file is in the following directory: <Informatica installation
directory>/logs/<node name>/catalina.out
node.log Log events generated during the startup of the Service Manager on a node. You can use
this log to get more information about why the Service Manager for a node failed to start.
For example, if the Service Manager cannot connect to the domain configuration database
after 30 seconds, the Service Manager fails to start. The node.log file is in the /tomcat/
logs directory.
Note: The Service Manager also uses node.log to record events when the Log Manager is unavailable. For
example, if the machine where the Service Manager runs does not have enough available disk space to write
log event files, the Log Manager is unavailable.
The installer creates and drops a table in the domain configuration repository database to verify the
connection information. The user account for the database must have create privileges on the database.
Each domain must have a separate domain configuration repository.
• Creating a domain. The installer runs the infasetup DefineDomain command to create the domain and the
gateway node for the domain on the current machine based on the information you enter in the Configure
Domain window.
• Joining a domain. The installer runs the infasetup DefineWorkerNode command to create a node on the
current machine, and runs the infacmd AddDomainNode command to add the node to the domain. The
installer uses the information you enter in the Configure Domain window to run the commands.
For example, the DefineDomain command fails if you click Test Connection and the connection test passes
but the database becomes unavailable before you click Next. The DefineDomain command can also fail if the
host name or IP address does not belong to the current machine. Verify that the database for the domain
configuration is available and that the host name is correct and try again.
If the AddDomainNode command fails, verify that the Informatica service is running on the gateway node and
try again.
Starting Informatica
The installer runs infaservice to start the Informatica service. To troubleshoot issues when Informatica fails
to start, use the information in the installation debug log and the node.log and catalina.out Service Manager
log files to identify the cause of the error.
If you create a domain, log in to Informatica Administrator after the Informatica service starts to verify that
the domain is available. If you join a domain, log in to Informatica Administrator after the Informatica service
starts to verify that the node was successfully created and started.
• The Service Manager is out of system memory. The Java Runtime Environment (JRE) that starts
Informatica and runs the Service Manager may not have enough system memory to start. Set the
INFA_JAVA_OPTS environment variable to configure the amount of system memory used by Informatica.
On UNIX, you can set the memory configuration when you start Informatica.
• The domain configuration database is not available. Informatica fails to start on a node if the Service
Manager on a gateway node cannot connect to the domain configuration database within 30 seconds.
Verify that the domain configuration repository is available.
• Some of the folders in the Informatica installation directory do not have the appropriate execute
permissions. Grant execute permission on the Informatica installation directory.
• The localhost does not resolve successfully. If you use an embedded cluster and the localhost does not
resolve successfully, Informatica Cluster Service might fail. You need to verify that the localhost resolves
successfully.
Adding a License
The installer runs the infacmd AddLicense command to read the Informatica license key file and create a
license object in the domain. To run the application services in Informatica Administrator, a valid license
object must exist in the domain.
If you use an incremental license and join a domain, the serial number of the incremental license must match
the serial number for an existing license object in the domain. If the serial numbers do not match, the
AddLicense command fails.
You can get more information about the contents of the license key file used for installation, including serial
number, version, expiration date, operating systems, and connectivity options in the installation debug log.
You can get more information about existing licenses for the domain in Informatica Administrator.
This issue might occur if the jvm.dll of java requires the MSVCR100.dll.
To resolve this issue, download Microsoft Visual C++ Studio 2010 Redistributable Package from the
Microsoft website.
158
Chapter 13
159
Complete the Domain Configuration Overview
After you install Informatica services and before you create the application services, complete the
configuration for the domain services.
Domain configuration includes tasks such as verifying code pages, configuring the environment variables for
the domain, and configuring the firewall.
For information on how to import a Hadoop cluster configuration, refer to the “Cluster Configuration” on page
77 topic and the Hadoop Integration section of the Data Engineering Integration Guide.
To integrate the domain with the Hadoop environment, you complete the following high-level tasks:
Verify that the domain configuration database is compatible with the code pages of the application services that you
create in the domain.
The Service Manager synchronizes the list of users in the domain with the list of users and group in each
application service. If a user name in the domain has characters that the code page of the application
service does not recognize, characters do not convert correctly and inconsistencies occur.
Verify that the locale settings on machines that access the Administrator tool and the Informatica client tools are
compatible with code pages of repositories in the domain.
If the locale setting is not compatible with the repository code page, you cannot create an application
service.
Use LANG, LC_CTYPE, or LC_ALL to set the UNIX or Linux code page.
Different operating systems require different values for the same locale. The value for the locale variable is
case sensitive.
Use the following command to verify that the value for the locale environment variable is compatible with the
language settings for the machine and the type of code page you want to use for the repository:
locale -a
The command returns the languages installed on the operating system and the existing locale settings.
Locale on Linux
All UNIX operating systems except Linux have a unique value for each locale. Linux allows different
values to represent the same locale. For example, “utf8,” “UTF-8,” “UTF8,” and “utf-8” represent the same
locale on a Linux machine. Informatica requires that you use a specific value for each locale on a Linux
machine. Make sure that you set the LANG environment variable appropriately for all Linux machines.
For Oracle database clients, set NLS_LANG to the locale that you want the database client and server to
use with the login. A locale setting consists of the language, territory, and character set. The value of
NLS_LANG depends on the configuration.
For example, if the value is american_america.UTF8, set the variable in a C shell with the following
command:
setenv NLS_LANG american_america.UTF8
To read multibyte characters from the database, set the variable with the following command:
setenv NLS_LANG=american_america.AL32UTF8
You must set the correct variable on the Data Integration Service machine so that the Data Integration
Service can read the Oracle data correctly.
Incorrectly configured environment variables can cause the Informatica domain or nodes to fail to start or
can cause connection problems between the Informatica clients and the domain.
To configure environment variables, log in with the system user account you used to install Informatica.
The following table lists the minimum requirement for the maximum heap size settings, based on the
number of users and services in the domain:
Note: The maximum heap size settings in the table are based on the number of application services in
the domain.
If the domain has more than 1,000 users, update the maximum heap size based on the number of users
in the domain.
You can use the INFA_JAVA_OPTS environment variable to configure the amount of system memory
used by Informatica. For example, to configure 1 GB of system memory for the Informatica daemon in a
C shell, use the following command:
setenv INFA_JAVA_OPTS "-Xmx1024m"
Restart the node for the changes to take effect.
INFA_DOMAINS_FILE
The installer creates a domains.infa file in the Informatica installation directory. The domains.infa file
contains the connectivity information for the gateway nodes in a domain, including the domain names,
domain host names, and domain host port numbers.
Set the value of the INFA_DOMAINS_FILE variable to the path and file name of the domains.infa file.
Configure the INFA_DOMAINS_FILE variable on the machine where you install the Informatica services.
INFA_HOME
Use INFA_HOME to designate the Informatica installation directory. If you modify the Informatica
directory structure, you need to set the environment variable to the location of the Informatica
installation directory or the directory where the installed Informatica files are located.
For example, you use a softlink for any of the Informatica directories. To configure INFA_HOME so that
any Informatica application or service can locate the other Informatica components it needs to run, set
INFA_HOME to the location of the Informatica installation directory.
INFA_TRUSTSTORE
If you enable secure communication for the domain, set the INFA_TRUSTSTORE variable with the
directory that contains the truststore files for the SSL certificates. The directory must contain truststore
files named infa_truststore.jks and infa_truststore.pem.
INFA_TRUSTSTORE_PASSWORD
If you enable secure communication for the domain and you specify the SSL certificate to use, set the
INFA_TRUSTSTORE_PASSWORD variable with the password for the infa_truststore.jks that contains the
SSL certificate. The password must be encrypted. Use the command line program pmpasswd to encrypt
the password.
The following table describes the values that you set for the LD_LIBRARY_PATH for the different databases:
Database Value
ODBC <CLOSEDODBCHOME>/lib
Copy the SiteKey to the Remote Test Data Management Domain 163
<Informatica installation directory>/isp/bin/infasetup.sh MigrateEncryptionKey -loc
$INFA_HOME/isp/config/keys/ -mig false
The command changes the encryption key used to secure sensitive data, such as passwords, in the
Informatica domain.
5. Restart the remote Test Data Management domain.
6. Upgrade the PowerCenter Repository Service and Model Repository Service content.
7. Restart the services in the following order:
• Model Repository Service
• Data Integration Service
• PowerCenter Repository Service
• PowerCenter Integration Service
• Test Data Manager Service
If you use multiple remote Test Data Management domains with Data Privacy Management, repeat the steps
on each remote domain.
Prerequisites
Perform the following tasks before you install the Informatica Discovery Agent:
165
4. At startup, the agent checks for all libraries that OCR requires and lists the libraries missing on the
machine.
To include image files in unstructured scans, the following files must be available on the agent machine:
RHEL 7 or RHEL 8 agent machine
You can install the agent on Windows and Linux machines. On Windows machines, use the .bat file to start
the agent.
1. You can run the agent on Linux and Windows machines. To start the agent run the following command:
• Linux.
cd <remote agent>/bin
./siagent.sh startup
• Windows.
cd <remote agent>/bin
siagent.bat startup
The following message appears: Tomcat started.
2. To stop the agent run the following command:
• Linux.
cd <remote agent>/bin
./siagent.sh shutdown
• Windows.
cd <remote agent>/bin
siagent.bat shutdown
Note: You can view the Informatica Discovery Agent logs at the following location: <remote agent>/
tomcat/logs/catalina.out
168
Create a Keystore for a Secure Connection to a Web
Application Service
You can secure the connection between the Informatica domain and a web application service, such as the
Analyst service. Informatica uses the SSL/TLS protocol to encrypt network traffic. To secure the connection,
you must create the required files.
Before you can secure the connection to a web application service, verify that the following requirements are
met:
You can use keytool or OpenSSL to create the CSR and private key.
If you use RSA encryption, you must use more than 512 bits.
A keystore must contain only one certificate. If you use a unique certificate for each web application
service, create a separate keystore for each certificate. Alternatively, you can use a shared certificate
and keystore.
If you use the installer-generated SSL certificate for the Administrator tool, you do not need to import the
certificate into a keystore in JKS format.
In Microsoft Internet Explorer and Google Chrome, add the URL of the Informatica web application to the list
of trusted sites. If you are using Chrome version 80.0.39x or later, you must also set the AuthServerWhitelist
and AuthNegotiateDelegateWhitelist policies.
Create Connections
In the Administrator tool, create connections to the databases that the application services use. You need to
specify the connection details while you configure the application service.
When you create the database connection, specify the database connection properties and test the
connection.
The following table describes the database connections that you need to create before the application
services can access the associated databases.
Database Description
Connection
Data object cache To access the data object cache, create the data object cache connection for the Data
database Integration Service.
Workflow database To store run-time metadata for workflows, create the workflow database connection for the
Data Integration Service.
Profiling warehouse To create and run profiles and scorecards, create the profiling warehouse database
database connection for the Data Integration Service.
Use this instance of the Data Integration Service when you configure the run-time properties
of the Analyst Service.
Note: To use the Microsoft SQL Server database as the profiling warehouse, choose ODBC as
the provider type, and clear the use DSN option in the Microsoft SQL Server connection
properties dialog box when you configure the Microsoft SQL Server connection.
Reference data To store reference table data, create the reference data warehouse connection for the
warehouse Content Management Service.
The following table describes the DB2 for LUW connection properties:
Property Description
Connection String for metadata access Connection string to import physical data objects. Use the following
connection string: jdbc:informatica:db2://
<host>:50000;databaseName=<dbname>
Connection String for data access Connection string to preview data and run mappings. Enter dbname from
the alias configured in the DB2 client.
Environment SQL Optional. Enter SQL commands to set the database environment when you
connect to the database. The Data Integration Service executes the
connection environment SQL each time it connects to the database.
Transaction SQL Optional. Enter SQL commands to set the database environment when you
connect to the database. The Data Integration Service executes the
transaction environment SQL at the beginning of each transaction.
SQL Identifier Character The type of character used to identify special characters and reserved SQL
keywords, such as WHERE. The Data Integration Service places the
selected character around special characters and reserved SQL keywords.
The Data Integration Service also uses this character for the Support
Mixed-case Identifiers property.
Support Mixed-case Identifiers When enabled, the Data Integration Service places identifier characters
around table, view, schema, synonym, and column names when generating
and executing SQL against these objects in the connection. Use if the
objects have mixed-case or lowercase names. By default, this option is not
selected.
The following table describes the Microsoft Azure SQL Database connection properties:
Property Description
Azure DW JDBC URL Connection string to the Microsoft Azure SQL database.
Blob End-Point
VNet Rule
Note: When you use a Microsoft SQL Server connection to access tables in a Microsoft SQL Server database,
the Developer tool does not display the synonyms for the tables.
The following table describes the Microsoft SQL Server connection properties:
Property Description
Use Trusted Connection Optional. When enabled, the Data Integration Service uses Windows
authentication to access the Microsoft SQL Server database. The user
name that starts the Data Integration Service must be a valid Windows
user with access to the Microsoft SQL Server database.
Connection String for metadata access Connection string to import physical data objects. Use the following
connection string: jdbc:informatica:sqlserver://
<host>:<port>;databaseName=<dbname>
Connection String for data access Connection string to preview data and run mappings. Enter
<ServerName>@<DBName>
Domain Name Optional. Name of the domain where Microsoft SQL Server is running.
Packet Size Required. Optimize the ODBC connection to Microsoft SQL Server. Increase
the packet size to increase performance. Default is 0.
Owner Name Name of the schema owner. Specify for connections to the profiling
warehouse database or data object cache database.
Schema Name Name of the schema in the database. Specify for connections to the
profiling warehouse or data object cache database. You must specify the
schema name for the profiling warehouse if the schema name is different
from the database user name. You must specify the schema name for the
data object cache database if the schema name is different from the
database user name and you manage the cache with an external tool.
Environment SQL Optional. Enter SQL commands to set the database environment when you
connect to the database. The Data Integration Service executes the
connection environment SQL each time it connects to the database.
Transaction SQL Optional. Enter SQL commands to set the database environment when you
connect to the database. The Data Integration Service executes the
transaction environment SQL at the beginning of each transaction.
SQL Identifier Character The type of character used to identify special characters and reserved SQL
keywords, such as WHERE. The Data Integration Service places the
selected character around special characters and reserved SQL keywords.
The Data Integration Service also uses this character for the Support
Mixed-case Identifiers property.
Support Mixed-case Identifiers When enabled, the Data Integration Service places identifier characters
around table, view, schema, synonym, and column names when generating
and executing SQL against these objects in the connection. Use if the
objects have mixed-case or lowercase names. By default, this option is not
selected.
Note: When you use a Microsoft SQL Server connection to access tables in a Microsoft SQL Server database,
the Developer tool does not display the synonyms for the tables.
Property Description
Connection String for metadata access Connection string to import physical data objects.
Use the following connection string: jdbc:informatica:oracle://
<host>:1521;SID=<sid>
Use the following connection string to connect to Oracle through Oracle
Connection Manager:
jdbc:Informatica:oracle:TNSNamesFile=<fully qualified
path to the tnsnames.ora file>;TNSServerName=<TNS server
name>;
Connection String for data access Connection string to preview data and run mappings. Enter dbname.world
from the TNSNAMES entry.
Environment SQL Optional. Enter SQL commands to set the database environment when you
connect to the database. The Data Integration Service executes the
connection environment SQL each time it connects to the database.
Transaction SQL Optional. Enter SQL commands to set the database environment when you
connect to the database. The Data Integration Service executes the
transaction environment SQL at the beginning of each transaction.
Parallel Mode Optional. Enables parallel processing when loading data into a table in
bulk mode. Default is disabled.
SQL Identifier Character The type of character used to identify special characters and reserved SQL
keywords, such as WHERE. The Data Integration Service places the
selected character around special characters and reserved SQL keywords.
The Data Integration Service also uses this character for the Support
Mixed-case Identifiers property.
Support Mixed-case Identifiers When enabled, the Data Integration Service places identifier characters
around table, view, schema, synonym, and column names when generating
and executing SQL against these objects in the connection. Use if the
objects have mixed-case or lowercase names. By default, this option is not
selected.
Property Description
Connection String Connection string to use to read data and metadata from the database.
Define the connection string in the following format:
jdbc:informatica:postgresql://<host>:<port>;Database=<id>
Environment SQL Optional. Enter SQL commands to set the database environment when you
connect to the database. The Data Integration Service executes the
connection environment SQL each time it connects to the database.
Transaction SQL Optional. Enter SQL commands to set the database environment when you
connect to the database. The Data Integration Service executes the
transaction environment SQL at the beginning of each transaction.
Support Mixed-case Identifiers When enabled, the Data Integration Service places identifier characters
around table, view, schema, synonym, and column names when generating
and executing SQL against these objects in the connection. Use if the
objects have mixed-case or lowercase names. By default, this option is not
selected.
SQL Identifier Character The type of character used to identify special characters and reserved SQL
keywords, such as WHERE. The Data Integration Service places the
selected character around special characters and reserved SQL keywords.
The Data Integration Service also uses this character for the Support
Mixed-case Identifiers property.
Sqoop Arguments
Creating a Connection
In the Administrator tool, you can create relational database, social media, and file systems connections.
8. Click Finish.
Identify the services that you created during installation, and complete additional configuration for the
service.
Create and configure other services that you want in the domain.
176
Create and Configure the Application Services
Overview
If you did not create services with you ran the installer, use the Administrator tool to create the application
services.
Some application services depend on other application services. When you create these dependent
application services, you must provide the name of other running application services. Review the application
service dependencies to determine the order that you must create the services. For example, you must create
a Model Repository Service before you create a Data Integration Service.
Before you create the application services, verify that you have completed the prerequisite tasks required by
the installation and configuration process.
When you access a Model repository object from an Informatica client tool or application service, the client
or service sends a request to the Model Repository Service. The Model Repository Service process fetches,
inserts, and updates the metadata in the Model repository database tables.
Property Description
Name Name of the service. The name is not case sensitive and must be unique within the domain. It
cannot exceed 128 characters or begin with @. It also cannot contain spaces or the following
special characters:
`~%^*+={}\;:'"/?.,<>|!()][
Description Description of the service. The description cannot exceed 765 characters.
Location Domain and folder where the service is created. Click Browse to choose a different folder. You
can move the service after you create it.
Backup Nodes If your license includes high availability, nodes on which the service can run if the primary node
is unavailable.
4. Click Next.
The New Model Repository Service - Step 2 of 2 page appears.
5. Enter the following properties for the Model repository database:
Property Description
Database Schema Available for Microsoft SQL Server and PostgreSQL. Name of the schema that will contain
Model repository tables.
Database Available for IBM DB2. Name of the tablespace in which to create the tables. For a multi-
Tablespace partition IBM DB2 database, the tablespace must span a single node and a single partition.
6. Enter the JDBC connection string that the service uses to connect to the Model repository database.
Microsoft SQL Server - Microsoft SQL Server that uses the default instance
"jdbc:informatica:sqlserver://<host name>:<port
number>;DatabaseName=<database
name>;SnapshotSerializable=true"
- Microsoft SQL Server that uses a named instance
"jdbc:informatica:sqlserver://<host name>\<named instance
name>;DatabaseName=<database name>;SnapshotSerializable=true"
- Microsoft Azure. jdbc:informatica:sqlserver://
<host_name>:<port_number>;DatabaseName=<database_name>;Snapsho
tSerializable=true;
SnapshotSerializable=true;EncryptionMethod=SSL;HostNameInCerti
ficate=*.<hostnameincertificate>;ValidateServerCertificate=tru
e
- Azure SQL Database with Active Directory authentication.
"jdbc:informatica: sqlserver://
<host_name>:<port_number>;database=<database_name>;encrypt=tru
e;AuthenticationMethod=ActiveDirectoryPassword;trustServerCert
ificate=false;hostNameInCertificate=*.database.windows.net;log
inTimeout=<seconds>"
Note: If you specified the Windows NT credentials for the Model repository
database on Microsoft SQL Server, specify the connection string syntax to include
the authentication method as NTLM.
- Microsoft SQL Server that uses the default instance with Windows NT
credentials:
"jdbc:informatica:sqlserver://<host name>:<port
number>;DatabaseName=<database
name>;SnapshotSerializable=true;authenticationMethod=NTLM"
- Microsoft SQL Server that uses a named instance with Windows NT credentials:
"jdbc:informatica:sqlserver://<host name>\<named instance
name>;DatabaseName=<database
name>;SnapshotSerializable=true;authenticationMethod=NTLM"
7. If the Model repository database is secured with the SSL protocol, you must enter the secure database
parameters in the Secure JDBC Parameters field.
Enter the parameters as name=value pairs separated by semicolon characters (;). For example:
param1=value1;param2=value2
EncryptionMethod Required. Indicates whether data is encrypted when transmitted over the network.
This parameter must be set to SSL.
ValidateServerCertificate Optional. Indicates whether Informatica validates the certificate that the database
server sends.
If this parameter is set to True, Informatica validates the certificate that the
database server sends. If you specify the HostNameInCertificate parameter,
Informatica also validates the host name in the certificate.
If this parameter is set to False, Informatica does not validate the certificate that
the database server sends. Informatica ignores any truststore information that you
specify.
HostNameInCertificate Optional. Host name of the machine that hosts the secure database. If you specify
a host name, Informatica validates the host name included in the connection string
against the host name in the SSL certificate.
TrustStore Required. Path and file name of the truststore file that contains the SSL certificate
for the database.
If you do not include the path for the truststore file, Informatica looks for the file in
the following default directory: <Informatica installation directory>/
tomcat/bin
TrustStorePassword Required. Password for the truststore file for the secure database.
Note: Informatica appends the secure JDBC parameters to the JDBC connection string. If you include the
secure JDBC parameters directly in the connection string, do not enter any parameter in the Secure
JDBC Parameters field.
8. Click Test Connection to verify that you can connect to the database.
9. Select No content exists under specified connection string. Create new content.
10. Click Finish.
The domain creates the Model Repository Service, creates content for the Model repository in the
specified database, and enables the service.
After you create the service through the wizard, you can edit the properties or configure other properties.
• Create the Model repository user if the domain does not use Kerberos authentication.
• Create other application services.
Property Description
Login Name Login name for the user account. The login name for a user account must be unique
within the security domain to which it belongs.
The name is not case sensitive and cannot exceed 128 characters. It cannot include a
tab, newline character, or the following special characters:
,+"\<>;/*%?&
The name can include an ASCII space character except for the first and last character. All
other space characters are not allowed.
Password Password for the user account. The password can be from 1 through 80 characters long.
Confirm Password Enter the password again to confirm. You must retype the password. Do not copy and
paste the password.
Full Name Full name for the user account. The full name cannot include the following special
characters:
<>“
Description Description of the user account. The description cannot exceed 765 characters or include
the following special characters:
<>“
4. Click OK.
The user properties appear.
5. Click the Privileges tab.
6. Click Edit.
The Edit Roles and Privileges dialog box appears.
7. On the Roles tab, expand the Model Repository Service.
8. Under System Defined Roles, select Administrator and click OK.
Before you create the Data Integration Service, verify that you have created the following service:
Property Description
Name Name of the service. The name is not case sensitive and must be unique within the domain. It
cannot exceed 128 characters or begin with @. It also cannot contain spaces or the following
special characters:
`~%^*+={}\;:'"/?.,<>|!()][
Description Description of the service. The description cannot exceed 765 characters.
Location Domain and folder where the service is created. Click Browse to choose a different folder.
You can move the service after you create it.
Assign Select Node to configure the service to run on a node. If your license includes grid, you can
create a grid and assign the service to run on the grid after you create the service.
Backup Nodes If your license includes high availability, nodes on which the service can run if the primary
node is unavailable.
Username User name that the service uses to access the Model Repository Service. Enter the Model
repository user that you created.
Security Domain LDAP security domain for the Model repository user. The field appears when the Informatica
domain contains an LDAP security domain. Not available for a domain with Kerberos
authentication.
6. Click Next.
The New Data Integration Service - Step 2 of 14 page appears.
7. Enter the HTTP port number to use for the Data Integration Service.
8. Accept the default values for the remaining security properties. You can configure the security properties
after you create the Data Integration Service.
9. Select Enable Service.
The Model Repository Service must be running to enable the Data Integration Service.
10. Verify that the Move to plugin configuration page is not selected.
11. Click Next.
The New Data Integration Service - Step 3 of 14 page appears.
12. Set the Launch Job Options property to one of the following values:
• In the service process. Configure when you run SQL data service and web service jobs. SQL data
service and web service jobs typically achieve better performance when the Data Integration Service
runs jobs in the service process.
• In separate local processes. Configure when you run mapping, profile, and workflow jobs. When the
Data Integration Service runs jobs in separate local processes, stability increases because an
unexpected interruption to one job does not affect all other jobs.
If you configure the Data Integration Service to run on a grid after you create the service, you can
configure the service to run jobs in separate remote processes.
13. Accept the default values for the remaining execution options and click Next.
The New Data Integration Service - Step 4 of 14 page appears.
14. If you created the data object cache database for the Data Integration Service, click Select to select the
cache connection. Select the data object cache connection that you created for the service to access the
database.
15. Accept the default values for the remaining properties on this page and click Next.
The New Data Integration Service - Step 5 of 14 page appears.
16. For optimal performance, enable the Data Integration Service modules that you plan to use.
The following table lists the Data Integration Service modules that you can enable:
Module Description
SQL Service Module Runs SQL queries from a third-party client tool to an SQL data service.
The Content Management Service uses the Data Integration Service to run mappings to transfer data
between reference tables and external data sources. The Content Management Service also provides
transformations, mapping specifications, and rule specifications with the following types of reference data:
Before you create the Content Management Service, verify that you have created and enabled the following
services:
Property Description
Name Name of the service. The name is not case sensitive and must be unique within the domain.
It cannot exceed 128 characters or begin with @. It also cannot contain spaces or the
following special characters:
`~%^*+={}\;:'"/?.,<>|!()][
Description Description of the service. The description cannot exceed 765 characters.
Location Domain and folder where the service is created. Click Browse to choose a different folder.
You can move the service after you create it.
HTTP Port HTTP port number to use for the Content Management Service.
Data Integration Data Integration Service to associate with the service. The Data Integration Service and the
Service Content Management Service must run on the same node.
Username User name that the service uses to access the Model Repository Service. Enter the Model
repository user that you created.
Security Domain LDAP security domain for the Model repository user. The field appears when the Informatica
domain contains an LDAP security domain. Not available for a domain with Kerberos
authentication.
Reference Data Reference data warehouse connection that you created for the Content Management Service
Location to access the reference data warehouse. Click Select to select the connection.
4. Click Next.
The New Content Management Service - Step 2 of 2 page appears.
5. Accept the default values for the security properties.
6. Select Enable Service.
The Model Repository Service and Data Integration Service must be running to enable the Content
Management Service.
7. Click Finish.
The domain creates and enables the Content Management Service.
After you create the service through the wizard, you can edit the properties or configure other properties.
You can choose to create the Informatica Cluster Service when you install Enterprise Data Catalog or create
the application service manually using Informatica Administrator.
1. In the Administrator tool, select a domain, and click the Services and Nodes tab.
2. On the Actions menu, click New > Informatica Cluster Service.
The New Informatica Cluster Service: Step 1 of 4 dialog box appears.
3. Configure the general properties in the dialog box.
The following table describes the properties:
Property Description
Name Name of the service. The name is not case-sensitive and must be unique within the domain. The
name cannot exceed 128 characters or begin with @. The name cannot contain character
spaces. The characters in the name must be compatible with the code page of the Model
repository.
The name cannot contain the following special characters:
`~%^*+={}\;:'"/?.,<>|!()][
Description Description of the service. The description cannot exceed 765 characters.
License License to assign to the Informatica Cluster Service. Select the license that you installed with
Enterprise Data Catalog.
Node Primary node on which the Informatica Cluster Service runs. If you change the node, you must
recycle the Informatica Cluster Service.
Backup Nodes Nodes on which the service can run if the primary node is unavailable.
4. Click Next.
The New Informatica Cluster Service - Step 2 of 4 dialog box appears.
5. Configure the security properties in the dialog box.
The following table describes the properties:
Property Description
HTTP Port A unique HTTP port number for the service. The default is 9075.
Enable Transport Select the option to enable TLS for the Informatica Cluster Service.
Layer Security
(TLS)
HTTPS Port Port number for the HTTPS connection. Required if you select Enable Transport layer
Security.
Keystore File Path and file name of the keystore file. The keystore file contains the keys and certificates
required if you use the SSL security protocol with Catalog Administrator. Required if you
select Enable Transport layer Security.
Note: Verify that you specified the correct keystore file for the Informatica Cluster Service.
The certificates in the keystore must be trusted by the domain truststore. The keystore file
must contain CA-signed certificates for custom SSL configuration.
Keystore Password for the keystore file. Required if you select Enable Transport Layer Security.
Password
6. Click Next.
The New Informatica Cluster Service - Step 3 of 4 dialog box appears.
7. Configure the cluster properties in the dialog box.
The following table describes the properties:
Property Description
Gateway Host Fully qualified domain name of the node that you want to configure as the gateway host.
The node that you configure as the gateway host must be a data node or a processing node.
Data Nodes Comma-separated list of fully qualified domain names of nodes that you want to configure as
data nodes.
Processing Comma-separated list of fully qualified domain names of nodes that you want to configure as
Nodes processing nodes.
Gateway User User name for the gateway host. The gateway user must be a non-root user with sudo access.
You must enable passwordless SSH for the following nodes:
- Between the Informatica domain and the gateway host for the gateway user.
- Between gateway host and data nodes and precessing nodes.
- If you plan to enable Advanced Configuration for the service, enable passwordless SSH
between the gateway node and service nodes.
Cluster Shared Applies if you deploy the service in multiple nodes. The shared directory on all cluster nodes.
File System The service uses this directory on all cluster nodes to back up Apache Solr data.
Path Verify the following directory prerequisites:
- The directory must be empty.
- The directory must have the NFS file system mounted.
- The user name to access the directory must be the same in all cluster nodes.
- The user configured to access the directory must be a non-root user.
8. Optional. Click Enable Advanced Configuration if you want to configure the properties of the
applications and associated services. By default, the services use the values that you provided for the
Configure the following properties for the services associated with the Informatica Cluster Service:
Property Description
Nomad Server Comma-separated list of fully qualified domain names of nodes that host the Nomad servers.
Hosts
Nomad HTTP HTTP port number configured for the Nomad server. Default is 4646.
Port
Nomad Serf Port Serf port configured as the gossip protocol for the Nomad servers. Default is 4648.
Nomad RPC Port The Remote Procedure Call (RPC) port configured for communication. Default is 4647.
Nomad Server The directory that includes sub directories with tasks running on the Nomad server. Default is
Working Directory <Cluster custom directory>/nomad/nomadserver
Nomad Client The directory configured for tasks in the Nomad client. Default is <Cluster custom
Working Directory directory>/nomad/nomadclient
Nomad Custom Specify any custom options for the service in the following format:
Options [OptionGroupName.OptionName=OptionValue]. You can separate multiple options using a white
space character.
If the OptionValue includes a white space character, you must enclose the OptionValue within
double quotes as shown in the following sample: “sample value”.
Property Description
ZooKeeper Hosts Comma-separated list of fully qualified domain names of nodes that host the Apache ZooKeeper
server.
ZooKeeper Port Port number configured for the Apache ZooKeeper Server. Default is 2181.
ZooKeeper Peer Port number configured for Apache ZooKeeper peer communication. Default is 2888.
Port
ZooKeeper Leader Port number configured for the ZooKeeper Sever identified as the Leader. Default is 3888.
Port
ZooKeeper Specify the path to the directory where you want to install Apache ZooKeeper. Default is
Installation <Cluster custom directory>/zk/install.
Directory
ZooKeeper Data Specify the path to the directory where you want to store data from Apache ZooKeeper. Default is
Directory <Cluster custom directory>/zk/data.
ZooKeeper Specify any custom options for the service in the following format:
Custom Options [OptionGroupName.OptionName=OptionValue]. You can separate multiple options using a white
space character.
If the OptionValue includes a white space character, you must enclose the OptionValue within
double quotes as shown in the following sample: “sample value”.
Property Description
Solr Hosts Comma-separated list of fully qualified domain names of nodes that host the Apache Solr server.
Solr Port Port number configured for Apache Solr Server. Default is 8983.
Solr Installation Specify the path to the directory where you want to install Apache Solr Server. Default is
Directory <Cluster custom directory>/solr/install.
Solr Data Specify the path to the directory where you want to store data from Apache Solr. Default is
Directory <Cluster custom directory>/solr/data.
Solr Custom Specify any custom options for the service in the following format:
Options [OptionGroupName.OptionName=OptionValue]. You can separate multiple options using a white
space character.
If the OptionValue includes a white space character, you must enclose the OptionValue within
double quotes as shown in the following sample: “sample value”.
Property Description
MongoDB Comma-separated list of fully qualified domain names of nodes that host the MongoDB database.
Hosts
MongoDB Log Specify the path to the directory where you want to store the log files. Default is <Cluster
Directory custom directory>/mongo/log.
MongoDB Data Specify the path to the directory where you want to store data from the MongoDB database. Default
Directory is <Cluster custom directory>/mongo/data.
MongoDB Specify any custom options for the service in the following format:
Custom Options [OptionGroupName.OptionName=OptionValue]. You can separate multiple options using a white
space character.
If the OptionValue includes a white space character, you must enclose the OptionValue within
double quotes as shown in the following sample: “sample value”.
Property Description
PostgreSQL DB Fully qualified domain name of the machine that hosts the PostgreSQL database. Default is the
Host gateway host.
Note: If you did not select the Enable Advanced Configuration option, the service uses the
gateway host value specified as the host value.
PostgreSQL DB Specify the path to the directory where you want to install the PostgreSQL database. Default is
Installation <Cluster custom directory>/postgres/install.
Directory
PostgreSQL DB Specify the path to the directory where you want to store the log files from the PostgreSQL
Log Directory database. Default is <Cluster custom directory>/postgres/log.
PostgreSQL DB Specify the path to the directory where you want to store PostgreSQL data. Default is <Cluster
Data Directory custom directory>/postgres/data.
PostgreSQL DB Specify any custom options for the service in the following format:
Custom Options [OptionGroupName.OptionName=OptionValue]. You can separate multiple options using a white
space character. If the OptionValue includes a white space character, you must enclose the
OptionValue within double quotes as shown in the following sample: “sample value”.
Configure the following properties for the services associated with the Data Privacy Management Service:
Elasticsearch Service
Property Description
Elasticsearch Hosts Comma-separated list of fully qualified domain names of the nodes configured as
Elasticsearch hosts.
Elasticsearch Web UI Port Web UI port configured for the service. Default is 9200.
Elasticsearch Application Application port number configured for the service. Default is 9300.
Port
Elasticsearch Log The path to the directory where you want to store the log files from the service. Default
Directory is /opt/informatica/ics/elasticsearch/log.
Elasticsearch Data The path to the directory where you want to store data from the service. Default
Directory is /opt/informatica/ics/elasticsearch/data.
Enable TLS for Select the option to enable TLS for the Service.
Elasticsearch Note: ElasticSearch with TLS enabled takes more time to persist events compared to
ElasticSearch without TLS. You might notice a difference in performance.
Spark Service
Property Description
Spark Augmenter Listener The path to the directory configured as the listener directory in Apache Spark.
Directory
Spark Master Node Fully qualified domain name of the machine configured as the master node for Apache
Spark.
Spark Master Port Port number configured for the service. Default is 7077.
Spark Slave Nodes Comma-separated list of fully qualified domain names of nodes configured as Apache
Spark slave nodes.
Spark Executor Cores The number of concurrent tasks that you want an Apache Spark executor to run. Default
is 2.
Spark Log Directory The path to the directory where you want to store the log files related to the service.
Default is /opt/informatica/ics/spark/log.
If you plan to deploy Enterprise Data Catalog on multiple nodes, ensure that you configure the Informatica
Cluster Service and Catalog Service on separate nodes.
Before you create the Catalog Service, verify that you have created and enabled the following services:
Note: The Catalog Service has the same privileges as the user account that creates it. Ensure that the user
account does not have privileges to read or modify sensitive files on the system.
1. In the Administrator tool, select a domain, and click the Services and Nodes tab.
2. On the Actions menu, click New > Catalog Service.
The New Catalog Service Step 1 of 5 dialog box appears.
3. Configure the general properties in the dialog box.
The following table describes the properties:
Property Description
Name Name of the service. The name is not case-sensitive and must be unique within the domain. The
name cannot exceed 128 characters or begin with @. The name cannot contain character
spaces. The characters in the name must be compatible with the code page of the Model
repository that you associate with the Catalog Service.
The name cannot contain the following special characters:
`~%^*+={}\;:'"/?.,<>|!()][
Description Description of the service. The description cannot exceed 765 characters.
License License to assign to the Catalog Service. Select the license that you installed with Informatica.
Node Node in the Informatica domain on which the Catalog Service runs. If you change the node, you
must recycle the Catalog Service.
Backup Nodes If your license includes high availability, nodes on which the service can run if the primary node
is unavailable.
4. Click Next.
The New Catalog Service - Step 2 of 5 dialog box appears.
5. Configure the application service properties in the dialog box.
The following table describes the properties:
Property Description
Model Repository Model Repository Service to associate with the Catalog Service. The Model Repository
Service Service manages the Model repository that Enterprise Data Catalog uses. If you update
the property to specify a different Model Repository Service, recycle the Catalog Service.
User name The database user name for the Model repository.
Password An encrypted version of the database password for the Model repository.
Security Domain Name of the security domain that includes the User name.
6. Click Next.
The New Catalog Service - Step 3 of 5 dialog box appears.
7. Configure the security properties in the dialog box.
The following table describes the properties:
Property Description
HTTP Port A unique HTTP port number used for each Data Integration Service process. Default is 8085.
Enable Indicates that the Catalog Service must use HTTPS. If you did not configure the Data
Transport Layer Integration Service to use HTTPS, the Catalog Service does not start.
Security If the cluster is enabled for SSL, make sure that you enable SSL for the Informatica domain
and the application services.
Keystore File Path and file name of the keystore file. The keystore file contains the keys and certificates
required if you use the SSL security protocol with Catalog Administrator. Required if you
select Enable Transport layer Security.
When Enterprise Data Catalog creates the Catalog Service, Enterprise Data Catalog exports
the keystore to a certificate and stores the certificate in the keystore directory. Ensure that
you configure the read and write permissions on the directory for Enterprise Data Catalog to
successfully store the certificate.
Note: Verify that you specified the correct keystore file for the Catalog Service. The
certificates in the keystore must be trusted by the domain truststore. The keystore file must
contain CA-signed certificates for custom SSL configuration.
Keystore Password for the keystore file. Required if you select Enable Transport layer Security.
Password
8. Click Next.
The New Catalog Service - Step 4 of 5 dialog box appears.
9. Configure the following properties in the dialog box.
The following table describes the properties:
Property Description
Informatica Cluster Service Name of the Informatica Cluster Service that you must associate with the Catalog
Service.
Receive Alerts through Choose to receive email notifications on the Catalog Service status.
Email Note: If you select this option, you must enable the Email Service.
For more information about enabling Email Service, see
Administrator Reference for Enterprise Data Catalog.
Enable Catalog Service Select the option to enable the Catalog Service.
Enable Email Notifications Select the option to receive email notifications in Enterprise Data Catalog when
for Asset Changes there are updates for assets.
Property Description
Select Database Select the repository database that you want to use for Data Asset Analytics from the
following options:
- Oracle
- SQLServer
- PostgreSQL
Database Enter the JDBC connection string to connect to the repository database.
Connection Use the following syntax for the connection string based on the database selected:
String
- Oracle.
jdbc:informatica:oracle://<host name>:<port
number>;ServiceName=<database name>
- SQLServer:
- SQL Server.
jdbc:informatica:sqlserver://<host name>: <port
number>;DatabaseName=<database name>;SnapshotSerializable=true
- PostgreSQL.
jdbc:informatica:postgresql://<host name>: <port
number>;DatabaseName=<database name>
Secure JDBC If the repository database is secured with the SSL protocol, you must enter the secure
Parameters database parameters as name=value pairs separated by semicolon characters (;). For
example: param1=value1;param2=value2
Data Asset Analytics supports the following schemas for the databases listed:
• dbo schema for SQL Server.
• public schema for PostgreSQL.
Optional. Click Test Connection if you want to validate the configuration details.
12. Click Finish.
Variable Value
EDC_URL The host name and port number configured for Enterprise Data Catalog in the following
format: <host>:<port>
5. Shut down the Advanced Scanners server using the server.sh stop command available in the following
directory: <INFA_HOME>/services/CatalogService/AdvancedScannersApplication/app/
6. Start the Advanced Scanners repository server using the following command: server.sh &.
When you access a repository object from Data Privacy Management, it sends a request to the Data Privacy
Management Service. The service process fetches, inserts, and updates the metadata in the repository
database tables.
Before you create the Data Privacy Management Service, verify that you have created and enabled the
following service:
Catalog Service
1. In the Administrator tool, click the Manage tab, and click Services and Nodes.
2. Click Actions > New > Data Privacy Management Service.
The New Data Privacy Management Service dialog box appears.
Property Description
Name Name of the service. The name is not case sensitive and must be unique within the domain. It
cannot exceed 128 characters or begin with @. It also cannot contain spaces or the following
special characters:
`~%^*+={}\;:'"/?.,<>|!()][
Description Description of the service. The description cannot exceed 765 characters.
Location Domain and folder where the service is created. Click Browse to choose a different folder. You
can move the service after you create it.
Backup Nodes If your license includes high availability, nodes on which the service can run if the primary node
is unavailable.
4. Click Next.
The New Data Privacy Management Service - Step 2 of 4 page appears.
5. Enter the following properties for the Data Privacy Management repository database:
Property Description
Schema Available for Microsoft SQL Server. Name of the schema that will contain Data Privacy
Management repository tables.
Tablespace Available for IBM DB2. Name of the tablespace in which to create the tables. For a multi-
partition IBM DB2 database, the tablespace must span a single node and a single partition.
6. Enter the JDBC connection string that the service uses to connect to the Data Privacy Management
repository database.
Microsoft SQL Server - Microsoft SQL Server that uses the default instance
"jdbc:informatica:sqlserver://<host name>:<port
number>;DatabaseName=<database
name>;SnapshotSerializable=true"
- Microsoft SQL Server that uses a named instance
"jdbc:informatica:sqlserver://<host name>\<named instance
name>;DatabaseName=<database name>;SnapshotSerializable=true"
- Azure SQL Server. "jdbc:informatica:sqlserver://<host name>:<port
number>;DatabaseName=<database
name>;SnapshotSerializable=true;
SnapshotSerializable=true;EncryptionMethod=SSL;HostNameInCerti
ficate=*.<hostnameincertificate>;ValidateServerCertificate=tru
e"
7. If the Data Privacy Management repository database is secured with the SSL protocol, you must enter
the secure database parameters in the Secure JDBC Parameters field.
Enter the parameters as name=value pairs separated by semicolon characters (;). For example:
param1=value1;param2=value2
Enter the following secure database parameters:
EncryptionMethod Required. Indicates whether data is encrypted when transmitted over the network.
This parameter must be set to SSL.
ValidateServerCertificate Optional. Indicates whether Informatica validates the certificate that the database
server sends.
If this parameter is set to True, Informatica validates the certificate that the
database server sends. If you specify the HostNameInCertificate parameter,
Informatica also validates the host name in the certificate.
If this parameter is set to False, Informatica does not validate the certificate that
the database server sends. Informatica ignores any truststore information that you
specify.
HostNameInCertificate Optional. Host name of the machine that hosts the secure database. If you specify
a host name, Informatica validates the host name included in the connection string
against the host name in the SSL certificate.
TrustStore Required. Path and file name of the truststore file that contains the SSL certificate
for the database.
If you do not include the path for the truststore file, Informatica looks for the file in
the following default directory: <Informatica installation directory>/
tomcat/bin
TrustStorePassword Required. Password for the truststore file for the secure database.
Note: Informatica appends the secure JDBC parameters to the JDBC connection string. If you include the
secure JDBC parameters directly in the connection string, do not enter any parameter in the Secure
JDBC Parameters field.
8. Click Test Connection to verify that you can connect to the database.
9. Select No content exists under specified connection string. Create new content.
10. Click Next.
The New Data Privacy Management Service - Step 3 of 4 page appears.
11. Required. Enter the name of the associated Catalog Service.
12. Optional. Enter the name of the associated Test Data Manager Service.
13. Enter the Catalog Service user name and password.
14. Click Next.
The New Data Privacy Management Service - Step 4 of 4 page appears.
15. Configure the security properties in the dialog box.
The following table describes the properties:
Property Description
HTTP Port A unique HTTP port number used for each service process. The defaults is 6200.
Enable Secure Use a secure connection to connect to the Data Privacy Management Service. If you
Communication enable secure communication, you must set all required HTTPS properties, including the
keystore and truststore properties.
Keystore File Path and file name of the keystore file. The keystore file contains the keys and
certificates required if you use the SSL security protocol with Data Privacy Management.
When the domain creates the Data Privacy Management Service, Data Privacy
Management exports the keystore to a certificate and stores the certificate in the
keystore directory. Ensure that you configure the read and write permissions on the
directory for Data Privacy Management to successfully store the certificate.
Keystore Password Password for the keystore file. Required if you select Enable Transport layer Security.
Note: You must enable secure communication, enter the HTTPS port, and keystore file. The Data Privacy
Management Service does not start if you do not configure the properties.
16. Click Finish.
The domain creates the Data Privacy Management Service, creates content for the Data Privacy
Management repository in the specified database, and enables the service.
After you create the service through the wizard, you can edit the properties or configure other properties.
17. If you enabled User Activity monitoring during installation, update the service to set the User Activity
properties. Click Edit on the User Activity Configuration tab and enter the following properties:
Property Description
Enable User When enabled, starts the system jobs required for user activity data streaming to Data Privacy
Activity Management. Default is False.
Note: If you enable User Activity during installation and then update the field to False, the
Data Privacy Management system jobs stop.
Event Details Required. Determines the number of days to retain user activity details and anomalies in the
Retention user activity store. The Data Privacy Management Service runs a daily retention job that
Period (In Days) purges expired data from the user activity store.
Event File The mount location where you want to store streamed user activity event messages.
Shared Location The mount location must be accessible to the domain machine and all cluster machines. The
path to the mount location must be the same on all machines with Read, Write, and Execute
permissions for the domain user on all machines.
Note: ElasticSearch with TLS enabled takes more time to persist events compared to
ElasticSearch without TLS. You might notice a difference in performance.
Note: When you update the Data Privacy Management Service properties, you must restart the Data Privacy
Management Service for the modifications to take effect.
202
Chapter 17
Verify the checksum for the specific installer files against the checksum of the installation files downloaded
from Akamai.
The following table lists the checksum and file size for Informatica client on Windows:
A checksum mismatch can occur when there are data errors during download due to network issues or when
data corruption occurs in the file on disk. For more information about the checksum errors, see
HOW TO: Identify file errors after downloading Informatica installation files.
203
Disk space for the temporary files
The installer writes temporary files to the hard disk. Verify that you have 1 GB disk space on the machine
to support the installation. When the installation completes, the installer deletes the temporary files and
releases the disk space.
Permissions to install
Verify that the user account that you use to install the client has write permission on the installation
directory and Windows registry.
The following table lists the minimum system requirements to run the client:
1 CPU 1GB 6 GB
• Install the .NET Framework 4.0 or later. If you plan to use Data Processor or Hierarchical-To-Relational
transformations, you must install the .NET Framework before you install the Developer tool.
• Install the latest version of Microsoft Visual C++ Redistributable Package (x64) before you use or install
the Developer tool. You can download it from the Microsoft website.
Install Languages
To view languages other than the system locale and to work with repositories that use a UTF-8 code page,
install additional languages on Windows for use with the Informatica clients.
You also must install languages to use the Windows Input Method Editor (IME).
You might need to set the following environment variables on each client host:
INFA_TRUSTSTORE
Set this variable to the directory that contains the truststore files for the SSL certificates. The directory
must contain truststore files named infa_truststore.jks and infa_truststore.pem.
Set this variable to the password for the infa_truststore.jks file. The password must be encrypted.
Use the command line program pmpasswd to encrypt the password.
Informatica provides an SSL certificate that you can use to secure the domain. When you install the
Informatica clients, the installer sets the environment variables and installs the truststore files in the
following directory by default: <Informatica installation directory>\clients\shared\security
If you use the default Informatica SSL certificate, and the infa_truststore.jks and infa_truststore.pem
are in the default directory, you do not need to set the INFA_TRUSTSTORE or INFA_TRUSTSTORE_PASSWORD
environment variables.
You must set the INFA_TRUSTSTORE and INFA_TRUSTSTORE_PASSWORD environment variables on each
client host in the following scenarios:
If you provide an SSL certificate to use to secure the domain, copy the infa_truststore.jks and
infa_truststore.pem truststore files to each client host. You must specify the location of the files and
the truststore password.
You use the default Informatica SSL certificate, but the truststore files are not in the default Informatica directory.
If you use the default Informatica SSL certificate, but the infa_truststore.jks and
infa_truststore.pem truststore files are not in the default Informatica directory, you must specify the
location of the files and the truststore password.
Important: If you push processing to a compute cluster and the Data Integration Service runs on a grid,
import the certificates one time and then copy them to each Data Integration Service on the grid. Each time
you import a certificate, the contents of the certificate are identical, but the hex values are different. As a
result, concurrent mappings that run on the grid fail with initialization errors.
You can override the workspace directory when you start Informatica Developer.
1. From the Windows Start menu, click Programs > Informatica[Version] > Client > Developer Client >
Launch Informatica Developer.
The first time you run the Developer tool, the Welcome page displays several icons. The Welcome page
does not appear when you run the Developer tool subsequently.
2. Click Workbench.
The first time you start the Developer tool, you must select the repository in which to save the objects
you create.
3. Click File > Connect to Repository.
The Connect to Repository dialog box appears.
4. If you have not configured a domain in the Developer tool, click Configure Domains to configure a
domain.
You must configure a domain to access a Model Repository Service.
5. Click Add to add a domain.
The New Domain dialog box appears.
6. Enter the domain name, host name, and port number.
7. Click Finish.
8. Click OK.
9. In the Connect to Repository dialog box, click Browse and select the Model Repository Service.
10. Click OK.
11. Click Next.
12. Enter a user name and password.
13. Click Finish.
The Developer tool adds the Model repository to the Object Explorer view. When you run the Developer
tool the next time, you can connect to the same repository.
Use a properties file to specify the installation options. The installer reads the file to determine the
installation options. You can use silent mode installation to install the Informatica clients on multiple
machines on the network or to standardize the installation across machines.
1. Configure the installation properties file and specify the installation options in the properties file.
2. Run the installer with the installation properties file.
208
The following table describes the installation properties that you can modify:
• Uninstallation, 211
210
Chapter 19
Uninstallation
This chapter includes the following topics:
The Informatica uninstallation process deletes all Informatica files and clears all Informatica configurations
from a machine. The uninstallation process does not delete files that are not installed with Informatica. For
example, the installation process creates temporary directories. The uninstaller does not keep a record of
these directories and therefore cannot delete them. You must manually delete these directories for a clean
uninstallation.
Important: If you install the Informatica services and the PowerCenter Client in the same install directory, the
service binaries will be uninstalled when you uninstall the PowerCenter Client.
• The Informatica server uninstallation mode depends on the mode you use to install Informatica server.
For example, you install Informatica server in console mode. When you run the uninstaller, it runs in
console mode. The Informatica clients uninstallation mode does not depend on the mode you use to
install Informatica clients. For example, you install Informatica clients in silent mode. When you run the
uninstaller, it can run in graphical or silent mode.
• Uninstalling Informatica does not affect the Informatica repositories. The uninstaller removes the
Informatica files. It does not remove repositories from the database. If you need to move the repositories,
you can back them up and restore them to another database.
• Uninstalling Informatica does not remove the metadata tables from the domain configuration database. If
you install Informatica again using the same domain configuration database and user account, you must
manually remove the tables or choose to overwrite the tables. You can use the infasetup BackupDomain
211
command to back up the domain configuration database before you overwrite the metadata tables. To
remove the metadata tables manually, use the infasetup DeleteDomain command before you run the
uninstaller.
• Uninstalling Informatica removes all installation files and subdirectories from the Informatica installation
directory. Before you uninstall Informatica, stop all Informatica services and processes and verify that all
of the files in the installation directory are closed. At the end of the uninstallation process, the uninstaller
displays the names of the files and directories that could not be removed.
• The Informatica server installation creates the following folder for the files and libraries required by third
party adapters built using the Informatica Development Platform APIs:
<Informatica installation directory>/services/shared/extensions
Uninstalling the Informatica server deletes this folder and any subfolders created under it. If you have
adapter files stored in the /extensions folder, back up the folder before you start uninstallation.
• If you perform the uninstallation on a machine, you must back up the ODBC folder before you uninstall.
Restore the folder after the uninstallation completes.
Before you run the uninstaller, stop all Informatica services and processes and verify that all files in the
installation directory are closed. The uninstallation process cannot remove files that are open or are being
used by a service or process that is running.
Before you run the uninstaller, stop all Informatica services and processes and verify that all files in the
installation directory are closed. The uninstallation process cannot remove files that are open or are being
used by a service or process that is running.
The Informatica service also runs Informatica Administrator. You use Informatica Administrator to
administer the Informatica domain objects and user accounts. Log in to Informatica Administrator to create
the user accounts for users of Informatica and to create and configure the application services in the
domain.
214
Enter the following command to stop the daemon:
infaservice.sh shutdown
Note: If you use a softlink to specify the location of infaservice.sh, set the INFA_HOME environment
variable to the location of the Informatica installation directory.
You can abort the processes that are running or allow them to complete before the service shuts down. If you
shut down a node and abort the repository service processes running on the node, you can lose changes that
have not yet been written to the repository. If you abort a node running integration service processes, the
workflows will abort.
• When you shut down a node, the node is unavailable to the domain. If you shut down a gateway node and
do not have another gateway node in the domain, the domain is unavailable.
• When you start Informatica, verify that the port used by the service on the node is available. For example,
if you stop Informatica on a node, verify that the port is not used by any other process on the machine
before you restart Informatica. If the port is not available, Informatica will fail to start.
• If you do not use Informatica Administrator to shut down a node, any process running on the node will be
aborted. If you want to wait for all processes to complete before shutting down a node, use Informatica
Administrator.
• If you have two nodes in a domain with one node configured as a primary node for an application service
and the other node configured as a backup node, start Informatica on the primary node before you start
the backup node. Otherwise, the application service will run on the backup node and not the primary node.
The Informatica installation includes DataDirect ODBC drivers. If you have existing ODBC data sources
created with an earlier version of the drivers, you must create new ODBC data sources using the new drivers.
Configure ODBC connections using the DataDirect ODBC drivers provided by Informatica or third party ODBC
drivers that are Level 2 compliant or higher.
You must configure a database connection for the following services in the Informatica domain:
216
Connecting to an IBM DB2 Universal Database
For native connectivity, install the version of IBM DB2 Client Application Enabler (CAE) appropriate for the
IBM DB2 database server version. To ensure compatibility between Informatica and databases, use the
appropriate database client libraries.
The following steps provide a guideline for configuring native connectivity. For specific instructions, see the
database documentation.
1. To configure connectivity on the machine where the Data Integration Service, PowerCenter Integration
Service, or PowerCenter Repository Service process runs, log in to the machine as a user who can start a
service process.
2. Set the DB2INSTANCE, INSTHOME, DB2DIR, and PATH environment variables.
The UNIX IBM DB2 software always has an associated user login, often db2admin, which serves as a
holder for database configurations. This user holds the instance for DB2.
DB2INSTANCE. The name of the instance holder.
Using a Bourne shell:
$ DB2INSTANCE=db2admin; export DB2INSTANCE
Using a C shell:
$ setenv DB2INSTANCE db2admin
INSTHOME. This is db2admin home directory path.
Using a Bourne shell:
$ INSTHOME=~db2admin
Using a C shell:
$ setenv INSTHOME ~db2admin>
DB2DIR. Set the variable to point to the IBM DB2 CAE installation directory. For example, if the client is
installed in the /opt/IBM/db2/V9.7 directory:
Using a Bourne shell:
$ DB2DIR=/opt/IBM/db2/V9.7; export DB2DIR
Using a C shell:
$ setenv DB2DIR /opt/IBM/db2/V9.7
PATH. To run the IBM DB2 command line programs, set the variable to include the DB2 bin directory.
Using a Bourne shell:
$ PATH=${PATH}:$DB2DIR/bin; export PATH
Using a C shell:
$ setenv PATH ${PATH}:$DB2DIR/bin
3. Set the shared library variable to include the DB2 lib directory.
The IBM DB2 client software contains a number of shared library components that the Data Integration
Service, PowerCenter Integration Service, and PowerCenter Repository Service processes load
dynamically. Set the shared library environment variable so that the services can find the shared libraries
at run time.
The shared library path must also include the Informatica installation directory (server_dir).
Linux LD_LIBRARY_PATH
AIX LIBPATH
1. Open the odbc.ini file and add an entry for the ODBC data source and DataDirect New SQL Server Wire
Protocol driver under the section [ODBC Data Sources].
2. Add the attributes in the odbc.ini file for configuring SSL.
The following table lists the attributes that you must add to the odbc.ini file when you configure SSL
authentication:
Attribute Description
EncryptionMethod The method that the driver uses to encrypt the data sent between the driver and the
database server. Set the value to 1 to encrypt data using SSL.
ValidateServerCertificate Determines whether the driver validates the certificate sent by the database server
when SSL encryption is enabled. Set the value to 1 for the driver to validate the
server certificate.
TrustStore The location and name of the trust store file. The trust store file contains a list of
Certificate Authorities (CAs) that the driver uses for SSL server authentication.
TrustStorePassword The password to access the contents of the trust store file.
HostNameInCertificate Optional. The host name that is established by the SSL administrator for the driver to
validate the host name contained in the certificate.
You must install compatible versions of the Oracle client and Oracle database server. You must also install
the same version of the Oracle client on all machines that require it. To verify compatibility, contact Oracle.
The following steps provide a guideline for configuring native connectivity through Oracle Net Services or
Net8. For specific instructions, see the database documentation.
1. To configure connectivity for the Data Integration Service, PowerCenter Integration Service, or
PowerCenter Repository Service process, log in to the machine as a user who can start the server
process.
Install an Open Client version that is compatible with the Sybase ASE database server. You must also install
the same version of Open Client on the machines hosting the Sybase ASE database and Informatica. To
verify compatibility, contact Sybase.
If you want to create, restore, or upgrade a Sybase ASE repository, set allow nulls by default to TRUE at the
database level. Setting this option changes the default null type of the column to null in compliance with the
SQL standard.
The following steps provide a guideline for configuring native connectivity. For specific instructions, see the
database documentation.
Linux LD_LIBRARY_PATH
AIX LIBPATH
Install the Teradata client, the Teradata ODBC driver, and any other Teradata client software that you might
need on the machine where the Data Integration Service or PowerCenter Integration Service runs. You must
also configure ODBC connectivity.
Note: Based on a recommendation from Teradata, Informatica uses ODBC to connect to Teradata. ODBC is a
native interface for Teradata.
The following steps provide a guideline for configuring ODBC connectivity. For specific instructions, see the
database documentation.
1. To configure connectivity for the integration service process, log in to the machine as a user who can
start a service process.
2. Set the TERADATA_HOME, ODBCHOME, and PATH environment variables.
TERADATA_HOME. Set the variable to the Teradata driver installation directory. The defaults are as
follows:
Using a Bourne shell:
$ TERADATA_HOME=/opt/teradata/client/<version>; export TERADATA_HOME
Linux LD_LIBRARY_PATH
AIX LIBPATH
$TERADATA_HOME/lib64:$TERADATA_HOME/odbc_64/lib";
export LD_LIBRARY_PATH
• Using a C shell:
$ setenv LD_LIBRARY_PATH "${LD_LIBRARY_PATH}:$HOME/server_dir:$ODBCHOME/
lib:$TERADATA_HOME/lib64:
$TERADATA_HOME/odbc_64/lib"
For AIX
• Using a Bourne shell:
$ LIBPATH=${LIBPATH}:$HOME/server_dir:$ODBCHOME/lib:$TERADATA_HOME/
lib64:$TERADATA_HOME/odbc_64/lib; export LIBPATH
• Using a C shell:
$ setenv LIBPATH ${LIBPATH}:$HOME/server_dir:$ODBCHOME/lib:$TERADATA_HOME/lib64:
$TERADATA_HOME/odbc_64/lib
4. Edit the existing odbc.ini file or copy the odbc.ini file to the home directory and edit it.
Obtain the driver .jar file from the database vendor. For example, to access an Oracle database, download the
file ojdbc.jar from the Oracle website.
1. Place the JDBC driver .jar file in the following directory on the Data Integration Service machine
<Informatica installation directory>/externaljdbcjars. Then recycle the Data Integration
Service.
2. Place the JDBC driver .jar file in the following directory on machines that host the Developer tool:
<Informatica installation directory>/clients/externaljdbcjars. Then recycle the Developer
tool.
The Informatica installation includes DataDirect ODBC drivers. If the odbc.ini file contains connections that
use earlier versions of the ODBC driver, update the connection information to use the new drivers. Use the
System DSN to specify an ODBC data source on Windows.
1. On the machine where the application service runs, log in as a user who can start a service process.
2. Set the ODBCHOME and PATH environment variables.
ODBCHOME. Set to the DataDirect ODBC installation directory. For example, if the install directory is /
export/home/Informatica/10.0.0/ODBC7.1.
Using a Bourne shell:
$ ODBCHOME=/export/home/Informatica/10.0.0/ODBC7.1; export ODBCHOME
Using a C shell:
$ setenv ODBCHOME /export/home/Informatica/10.0.0/ODBC7.1
PATH. To run the ODBC command line programs, like ddtestlib, set the variable to include the odbc bin
directory.
Using a Bourne shell:
$ PATH=${PATH}:$ODBCHOME/bin; export PATH
Linux LD_LIBRARY_PATH
AIX LIBPATH
[ODBC]
IANAAppCodePage=4
InstallDir=/<Informatica installation directory>/ODBC7.1
Trace=0
TraceFile=odbctrace.out
TraceDll=/<Informatica installation directory>/ODBC7.1/lib/DWtrc27.so
A D
AddLicense (infacmd) Data Integration Service
troubleshooting 156 after creating 185
application services configuring 182
Content Management Service 44 creating 182
Catalog Service 40 host file configuration 185
Data Integration Service 46 data object cache
Informatica Cluster Service 54 database requirements 47
Model Repository Service 54 IBM DB2 database requirements 47
monitoring Model Repository Service 57 Microsoft Azure SQL database requirements 47
ports 26 Microsoft SQL Server database requirements 47
products 36 Oracle database requirements 48
Data Privacy Management
Microsoft Azure SQL Server database requirements 52
C configuring 197
database clients
catalina.out configuring 59
troubleshooting installation 154 environment variables 59
Catalog Service IBM DB2 client application enabler 59
creating 193 Microsoft SQL Server native clients 59
clients Oracle clients 59
configuring for secure domains 205 Sybase open clients 59
code page compatibility database connections
application services 160 creating 170
locale 160 database preparations
configuration repositories 36
domains 160 database requirements
environment variables 161 data object cache 47
environment variables on UNIX 163 Data Privacy Management repository 50
connecting Model repository 55
Integration Service to IBM DB2 (Windows) 217 profiling warehouse 48
Integration Service to JDBC data sources (UNIX) 226 reference data warehouse 44
Integration Service to ODBC data sources (UNIX) 226 database user accounts
Integration Service to Oracle (UNIX) 219 guidelines for setup 36
Integration Service to Sybase ASE (UNIX) 221 databases
UNIX databases 216 connecting to (UNIX) 216
connections connecting to IBM DB2 217
creating database connections 170, 175 connecting to Oracle 219
IBM DB2 properties 170 connecting to Sybase ASE 221
Microsoft Azure SQL Database properties 171 connecting to Teradata (UNIX) 223
Microsoft SQL Server properties 172 repository 36
Oracle properties 173 testing connections 59
PostgreSQL properties 174 dbs2 connect
Content Management Service testing database connections 59
configuring 185 debug logs
creating 185 troubleshooting the installation 154
Developer tool
third-party software requirements 204
235
domain configuration repository infasetup
IBM DB2 database requirements 38, 50, 55 defining domains 155
Microsoft Azure SQL database requirements 39, 56 defining worker nodes 155
Microsoft SQL Server database requirements 39, 56 Informatica Administrator
Oracle database requirements 39 logging in 169
preparing databases 37 Informatica clients
troubleshooting 155 installing in graphical mode 204
Domain configuration repository installing in silent mode 208
PostgreSQL database requirements 39 uninstalling 211
domains Informatica Cluster Service
configuring 160 creating 123, 187
overview 16 Informatica Developer
ports 26 configuring local workspace directory 206
installing languages 205
local machines 206
J
G JDBC data sources
connecting to (UNIX) 226
graphical mode JRE_HOME
installing Informatica clients 204 environment variables 28
H K
host file keystore files
Data Integration Service 185 installation requirements 29
HTTPS
installation requirements 29
L
I LANG
environment variables 161
i10Pi locale environment variables 28
UNIX 88 languages
IATEMPDIR client tools 205
environment variables 28 LC_ALL
IBM DB2 environment variables 161
connecting to Integration Service (Windows) 217 locale environment variables 28
IBM DB2 database requirements LC_CTYPE
data object cache 47 environment variables 161
Data Privacy Management repository database 50 library paths
domain repository 38, 50, 55 environment variables 28
Model repository database 38, 55 license keys
profiling warehouse 48 verifying 33
reference data warehouse 45 licenses
infacmd adding 156
adding nodes to domains 155 Linux
pinging objects 156 database client environment variables 59
236 Index
locale environment variables
configuring 161 P
localhost patch requirements
Data Integration Service 185 installation 25
log files PATH
catalina.out 154 environment variables 28
debug logs 154 Ping (infacmd)
installation 153 troubleshooting 156
installation logs 154 port requirements
node.log 154 installation requirements 26
types 153 ports
application services 26
domains 26
M requirements 26
PostgreSQL database requirements
Microsoft Azure SQL database requirements Data Privacy Management repository 53
data object cache 47 Domain configuration repository 39
domain configuration repository 39, 56 Model repository 57
reference data warehouse 45 pre-installation
Microsoft Azure SQL Server database requirements i10Pi on UNIX 88
Data Privacy Management 52 profiling warehouse
Microsoft SQL Server database requirements 48
connecting from UNIX 219 IBM DB2 database requirements 48
Microsoft SQL Server database requirements Microsoft SQL Server database requirements 49
data object cache 47 Oracle database requirements 49
Data Privacy Management 51
domain configuration repository 39, 56
profiling warehouse 49
reference data warehouse 45 R
Model repository reference data warehouse
database requirements 55 database requirements 44
IBM DB2 database requirements 38, 55 IBM DB2 database requirements 45
Oracle database requirements 57 Microsoft Azure SQL database requirements 45
PostgreSQL database requirements 57 Microsoft SQL Server database requirements 45
users 181 Oracle database requirements 45
Model Repository Service repositories
after creating 180 configuring native connectivity 58
configuring 177 installing database clients 59
creating 177 preparing databases 36
N S
node.log samples
troubleshooting installation 154 odbc.ini file 228
nodes secure domains
troubleshooting 155 configuring clients 205
Service Manager
log files 154
O silent mode
installing Informatica clients 208
ODBC data sources installing Informatica services 149
connecting to (UNIX) 226 source databases
odbc.ini file connecting through JDBC (UNIX) 226
sample 228 connecting through ODBC (UNIX) 226
Oracle sqlplus
connecting to Integration Service (UNIX) 219 testing database connections 59
Oracle database requirements Sybase ASE
data object cache 48 connecting to Integration Service (UNIX) 221
Data Privacy Management repository 53 system requirements
domain configuration repository 39 minimum 22, 23
Model repository 57
profiling warehouse 49
reference data warehouse 45
Oracle Net Services T
using to connect Integration Service to Oracle (UNIX) 219 target databases
connecting through JDBC (UNIX) 226
connecting through ODBC (UNIX) 226
Index 237
Teradata UNIX (continued)
connecting to Informatica clients (UNIX) 223 connecting to ODBC data sources 226
connecting to Integration Service (UNIX) 223 database client environment variables 59
third-party software requirements database client variables 59
Developer tool 204 environment variables 161
troubleshooting i10Pi 88
creating domains 155 library paths 163
domain configuration repository 155 pre-installation 88
Informatica services 156 starting and stopping Informatica services 214
joining domains 155 user accounts 29
licenses 156 user accounts
pinging domains 156 Model repository 181
truststore files UNIX 29
installation requirements 29
W
U Windows
uninstallation installing Informatica clients in graphical mode 204
rules and guidelines 211
UNIX
connecting to JDBC data sources 226
238 Index