Hi, I'm Ask INFA!
What would you like to know?
ASK INFAPreview
Please to access Bolo.

Table of Contents

Search

  1. Introducing Mass Ingestion
  2. Getting Started with Mass Ingestion
  3. Connectors and Connections
  4. Mass Ingestion Applications
  5. Mass Ingestion Databases
  6. Mass Ingestion Files
  7. Mass Ingestion Streaming
  8. Monitoring Mass Ingestion Jobs
  9. Asset Management
  10. Troubleshooting

Mass Ingestion

Mass Ingestion

Getting Started with Mass Ingestion

Getting Started with
Mass Ingestion

Before you configure an ingestion task, verify that all prerequisite tasks have been completed.

Step 1. Check system requirements

Check the following items:

Step 2. Set up an organization.

If you are the administrator, set up an organization from the
Organization
page in
Administrator
. An organization is a secure area within the
Informatica Intelligent Cloud Services
repository that stores your licenses, user accounts, ingestion tasks, and information about jobs and security.
Then, configure users, user groups, and user role permissions for the organization.
If your organization has the Organization Hierarchy license, you can also create one or more sub-organizations within your organization. You can create sub-organizations to represent different business environments within your company. For example, you might create separate sub-organizations to represent your development, testing, and production environments.
For more information, see "Organizations" in the
Administrator
help.

Step 3. Download and install a Secure Agent

On the
Runtime Environments
page in
Administrator
, download a Secure Agent and install it. A Secure Agent is a lightweight program that runs tasks and enables secure communication across the firewall between your organization and
Informatica Intelligent Cloud Services
.
Mass Ingestion
does not support the Hosted Agent or serverless runtime environments for any ingestion type.
When you download and install a Secure Agent, a
Secure Agent group
, also called a runtime environment, is created. A Secure Agent group can contain one Secure Agent or multiple agents if your licensing and ingestion type allows it.
For
Mass Ingestion Files
,
Mass Ingestion Databases
, and
Mass Ingestion Streaming
, you can have multiple agents in a Secure Agent group, provided that you have the Secure Agent Cluster license. Then an available agent is picked from the active agent list for the Secure Agent group. For
Mass Ingestion Applications
, the ingestion jobs must be deployed to a single Secure Agent.
Enable services and connectors for the Secure Agent group. This action downloads components and packages based on your selections and creates an associated runtime environment. For more information, see "Secure Agent Groups" in the
Administrator
help.

Step 4. Configure the runtime environment

On the
Runtime Environments
page in
Administrator
, select your runtime environment.
A runtime environment is the execution platform for running tasks. You must have at least one runtime environment in your organization for users to be able to run tasks. If you create another runtime environment, you must add an unassigned Secure Agent to it.
Under
System Configuration Details
, configure properties for the CMI Streaming Agent, Database Ingestion, or Mass Ingestion (file ingestion) service. For more information, see Secure Agent services.

Step 5. Configure connections

On the
Connections
page, configure connection properties for the source and target connectors that you want to use in ingestion tasks.

Step 6. Create your project

From the
Explore
page in
Mass Ingestion
service, create projects and project folders to organize your ingestion tasks. A project can contain multiple subfolders. See Creating projects and project folders.

0 COMMENTS

We’d like to hear from you!