SDI April2023 RuntimeEnvironments en
SDI April2023 RuntimeEnvironments en
SDI April2023 RuntimeEnvironments en
April 2023
Runtime Environments
Informatica Data Integration - Free & PayGo Runtime Environments
April 2023
© Copyright Informatica LLC 2022, 2023
This software and documentation are provided only under a separate license agreement containing restrictions on use and disclosure. No part of this document may be
reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise) without prior consent of Informatica LLC.
U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial
computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such,
the use, duplication, disclosure, modification, and adaptation is subject to the restrictions and license terms set forth in the applicable Government contract, and, to the
extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License.
Informatica, Informatica Cloud, Informatica Intelligent Cloud Services, PowerCenter, PowerExchange, and the Informatica logo are trademarks or registered trademarks
of Informatica LLC in the United States and many jurisdictions throughout the world. A current list of Informatica trademarks is available on the web at https://
www.informatica.com/trademarks.html. Other company and product names may be trade names or trademarks of their respective owners.
Portions of this software and/or documentation are subject to copyright held by third parties. Required third party notices are included with the product.
The information in this documentation is subject to change without notice. If you find any problems in this documentation, report them to us at
[email protected].
Informatica products are warranted according to the terms and conditions of the agreements under which they are provided. INFORMATICA PROVIDES THE
INFORMATION IN THIS DOCUMENT "AS IS" WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT.
Table of Contents 3
Changing the data encryption key on Windows. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Changing the data encryption key on Linux. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Secure Agent Manager. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Using a proxy server for the Secure Agent. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
Configuring a proxy to exclude non-proxy hosts. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Stopping and restarting the Secure Agent on Windows. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Starting and stopping the Secure Agent on Linux. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Troubleshooting a Secure Agent. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
Secure Agent errors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 40
4 Table of Contents
Preface
Use Runtime Environments to learn how to create and configure runtime environments to use with Data
Integration. Learn how to use the Informatica Intelligent Cloud Services Hosted Agent, download and install
Secure Agents, create and configure Secure Agent groups, and troubleshoot Secure Agents.
Informatica Resources
Informatica provides you with a range of product resources through the Informatica Network and other online
portals. Use the resources to get the most from your Informatica products and solutions and to learn from
other Informatica users and subject matter experts.
Informatica Documentation
Use the Informatica Documentation Portal to explore an extensive library of documentation for current and
recent product releases. To explore the Documentation Portal, visit https://docs.informatica.com.
If you have questions, comments, or ideas about the product documentation, contact the Informatica
Documentation team at [email protected].
https://network.informatica.com/community/informatica-network/products/cloud-integration
Developers can learn more and share tips at the Cloud Developer community:
https://network.informatica.com/community/informatica-network/products/cloud-integration/cloud-
developers
5
https://marketplace.informatica.com/
To search the Knowledge Base, visit https://search.informatica.com. If you have questions, comments, or
ideas about the Knowledge Base, contact the Informatica Knowledge Base team at
[email protected].
Subscribe to the Informatica Intelligent Cloud Services Trust Center to receive upgrade, maintenance, and
incident notifications. The Informatica Intelligent Cloud Services Status page displays the production status
of all the Informatica cloud products. All maintenance updates are posted to this page, and during an outage,
it will have the most current information. To ensure you are notified of updates and outages, you can
subscribe to receive updates for a single component or all Informatica Intelligent Cloud Services
components. Subscribing to all components is the best way to be certain you never miss an update.
For online support, click Submit Support Request in Informatica Intelligent Cloud Services. You can also use
Online Support to log a case. Online Support requires a login. You can request a login at
https://network.informatica.com/welcome.
The telephone numbers for Informatica Global Customer Support are available from the Informatica web site
at https://www.informatica.com/services-and-training/support-services/contact-us.html.
6 Preface
Chapter 1
Runtime environments
A runtime environment is the execution platform that runs Informatica Intelligent Cloud Services assets such
as tasks and taskflows. You must have at least one runtime environment in each organization so that users
in the organization can run tasks.
A runtime environment consists of one or more Secure Agents. A Secure Agent is a lightweight program that
runs all tasks and enables secure communication across the firewall between your organization and
Informatica Intelligent Cloud Services.
When you use the Hosted Agent, you run tasks within the Informatica Cloud hosting facility. Informatica
maintains the Hosted Agent runtime environment and agents. For more information about the
Informatica Cloud Hosted Agent, see Chapter 2, “Hosted Agent” on page 8.
You can download and install one or more Secure Agents to run within your network or in a cloud
computing services environment such as Amazon Web Services, Google Cloud, or Microsoft Azure. You
can install one Secure Agent on each physical or virtual machine.
When you install a Secure Agent, it is added to its own group by default. You can add multiple agents to
one Secure Agent group. For more information about Secure Agent groups, see Chapter 3, “Secure Agent
groups” on page 10.
When you configure a connection or some types of tasks, you specify the runtime environment to use. The
runtime environment determines which agent runs the tasks at run time. If the runtime environment is the
Hosted Agent, the Hosted Agent runs the tasks. If the runtime environment is a Secure Agent group, any
available agent in the group can run the tasks.
7
Chapter 2
Hosted Agent
The Hosted Agent can run data loader and mapping tasks that use certain connectors.
Informatica Intelligent Cloud Services manages the Hosted Agent runtime environment, so you cannot add,
delete, or configure a Hosted Agent.
The Hosted Agent can run data loader and mapping tasks that use the following connectors:
8
• Salesforce Connector
• Salesforce Marketing Cloud Connector
• ServiceNow Connector
• Shopify Connector
• Snowflake Cloud Data Warehouse V2 Connector
• Stripe Connector
• SuccessFactors ODATA Connector
• Xactly Connector
• Zendesk V2 Connector
• Zuora AQuA Connector
Note: The Hosted Agent support is specific to connectors. For more information, see the help for the relevant
connector.
9
Chapter 3
To prevent the activities of one department from impacting a different department, create separate
Secure Agent groups for each department. For example, users in the sales department run 10 times as
many tasks as users in the finance department, but the finance tasks are more time critical. To prevent
the sales tasks from impacting the finance tasks, create separate Secure Agent groups for each
department. Then assign the sales tasks to one runtime environment and the finance tasks to the other
runtime environment.
You can create different Secure Agent groups for test and production environments. When you configure
a connection, you can associate it with the test or production database by choosing the appropriate
Secure Agent group as the runtime environment.
When you create a Secure Agent group, all users in the organization can select the Secure Agent group as the
runtime environment.
You can add and remove Secure Agents from a group. You can also add multiple agents to a Secure Agent
group.
If you need to access output files on the Secure Agent machine, you can view the All Jobs page in Monitor or
the My Jobs page in Data Integration to determine where a task ran.
Add multiple agents to a group to balance the distribution of tasks across machines. When the runtime
environment is a Secure Agent group with multiple agents, the group dispatches tasks and background
processes such as metadata calls to the available agents in a round-robin fashion.
10
Improve scalability for connections and tasks.
When you create a connection or task, you select the runtime environment to use. If the runtime
environment is a Secure Agent group with multiple agents, the tasks can run if any Secure Agent in the
group is up and running. You do not need to change connection or task properties when you add or
remove an agent or if an agent in the group stops running.
When you add multiple agents to a group, ensure that all of the Secure Agents are of the same type. For
example, your organization installs four Secure Agents on physical machines within your network and two
Secure Agents on Amazon EC2 machines. You can create a Secure Agent group that contains some or all of
the local agents and a different group that contains the EC2 agents. Do not create a group that contains both
a local agent and an EC2 agent.
If you need to access output files on the Secure Agent machine, you can view the job details to determine
which Secure Agent ran the task. To view job details, open Monitor, select All Jobs, and click the job name.
Enable Secure Agent services when you want the agents in the group to run the connections, tasks,
processes, or product features associated with a service or set of services. When you enable a Secure Agent
service, the service starts on each agent in the Secure Agent group.
Disable Secure Agent services when you do not want the agents in the group to run the connections, tasks,
processes, or product features associated with a service or set of services. When you disable a Secure Agent
service, the service stops on each agent in the Secure Agent group. Any connection, task, process, or product
feature that uses the Secure Agent group as the runtime environment no longer runs.
You can also enable or disable Secure Agent services for individual Secure Agents within the Secure Agent
group. For more information, see “Stopping and starting services on a Secure Agent” on page 20.
For more information about Secure Agent services, see Secure Agent Services.
Enable or disable services and connectors for a Secure Agent group on the Runtime Environments page:
After you make service assignments for a Secure Agent group, you might add or remove agents. When you
add a Secure Agent to a group, the agent inherits the service assignments of the group that you add it to.
• Before you disable a service, verify that no connection, task, or process that uses the group as the runtime
environment requires the service.
If a connection, task, or process has a Secure Agent group selected as the runtime environment and you
disable a required service, the task or process cannot run. For example, the connection for a mapping
source uses runtime environment RuntimeEnv1. If you disable Data Integration Server on RuntimeEnv1,
the mapping task fails at run time.
• Do not disable a service to temporarily stop the service on a Secure Agent. For information about
temporarily stopping a service on a Secure Agent, see “Stopping and starting services on a Secure
Agent” on page 20.
Tip: Click the refresh icon next to New Runtime Environment to refresh the page before performing any
actions on Secure Agent groups.
To create a Secure Agent group, click New Runtime Environment and enter a name and optionally a
description for the group. After you create a group, you can add Secure Agents to the group.
Note: If you use multi-byte characters in the Secure Agent group name and you create the group in a
cloud-hosted environment, verify that the environment also supports these characters.
To rename a Secure Agent group, expand the Actions menu, select Edit Environment Properties, and
enter a new name for the group. Update the description if necessary. Informatica Intelligent Cloud
Services updates the group name in all services that use the group.
To enable or disable Secure Agent services for a Secure Agent group, expand the Actions menu, select
Enable or Disable Services, and select the services to enable or disable. You can enable or disable any
service that your organization uses.
Note: Before you disable a service, verify that no connection, task, or process that uses the group as the
runtime environment requires the service. If a connection, task, or process has a Secure Agent group
selected as the runtime environment and you disable a required service, the task or process cannot run.
Similarly, if a feature has a Secure Agent group selected as the runtime environment and you disable a
required service, the feature cannot be used.
To add Secure Agents to a group, expand the Actions menu and select Add or Remove Secure Agents.
You can add any agent that is in the Unassigned Agents group on the Runtime Environments page.
Alternatively, you can add a new Secure Agent to an existing group by setting the InfaAgent.GroupName
property in the infaagent.ini file before you register the agent. When you add a Secure Agent to a Secure
Agent group, the Secure Agent inherits the services and connectors that are configured for the Secure
Agent groups.
• All of the agents must be of the same type, for example, all local agents or all agents that run on
Amazon EC2 machines.
• Each Secure Agent must be configured to connect to the same external systems and have access to
files such as libraries, initialization files, and JAR files.
• Each Secure Agent must have access to the files used in tasks. Ensure that all files used in a task are
available in a shared location.
To remove Secure Agents from a group, expand the Actions menu and select Add or Remove Secure
Agents. When you remove an agent from a group, Informatica Intelligent Cloud Services adds it to a
group named "Unassigned Agents."
You can remove an agent from a Secure Agent group if the group is not used as the runtime environment
for a connection or task. If the group is used, you can remove an agent if it is not the only agent in the
group.
To delete Secure Agent group, expand the Actions menu and select Delete. You can delete a Secure
Agent group if it does not contain any Secure Agents.
If you are the administrator of a parent organization, you can share a Secure Agent group so that the
sub-organizations can use it. You can unshare a group if it is not used in a connection or task. From the
Actions menu associated with the group, choose Share Secure Agent Group or Unshare Secure Agent
Group.
4. Click OK.
When you view dependencies for a Secure Agent group, Administrator lists the connections and assets in
each service that use the group as the runtime environment.
To view object dependencies for a Secure Agent Group, expand the Actions menu and select Show
Dependencies.
The following image shows the Dependencies page for a Secure Agent group:
To sort the objects that appear on the page, click the sort icon and select the column name for the property
you want to sort by.
To filter the objects that appear on the dependencies page, click the Filter icon. Use filters to find specific
objects. To apply a filter, click Add Field, select the property to filter by, and then enter the property value.
You can specify multiple filters. For example, to find connections with Oracle in the name, add the Type filter
and specify Connection. Then add the Name filter and enter "Oracle."
Secure Agents
The Informatica Cloud Secure Agent is a lightweight program that runs all tasks and enables secure
communication across the firewall between your organization and Informatica Intelligent Cloud Services.
When the Secure Agent runs a task, it connects to the Informatica Cloud hosting facility to access task
information. It connects directly and securely to sources and targets, transfers data between them,
orchestrates the flow of tasks, runs processes, and performs any additional task requirement.
If the Secure Agent loses connectivity to Informatica Intelligent Cloud Services, it tries to reestablish
connectivity to continue the task. If it cannot reestablish connectivity, the task fails.
The Secure Agent uses pluggable microservices for data processing. For example, the Data Integration
Server runs all data integration jobsand the Common Integration Components service runs the commands
specified in a Command Task step of a taskflow. Each Secure Agent service has a unique set of
configuration properties, such as Tomcat and Tomcat JRE settings. For more information about Secure
Agent services, see Secure Agent Services.
You can install and run one Secure Agent on a physical or virtual machine. After you install a Secure Agent,
all users in the organization share the Secure Agent. You can configure the Secure Agent properties and
move it to a different Secure Agent group. To improve scalability, you can also add multiple agents to a
Secure Agent group.
You perform most management tasks for Secure Agents on the agent details page. To access the agent
details page, click a Secure Agent on the Runtime Environments page.
17
The following image shows the agent details page:
View details such as the host name, the current status, the last date and time that the agent was
updated, and the agent version.
Status Description
Agent Core is not running. The Secure Agent is not available, but one or more of the services is running.
Not all the services are running. The Secure Agent is available, but one or more of the services is not available.
Up and Running The Secure Agent and all of the services that the agent runs are available.
View details for Secure Agent services that run on the Secure Agent such as the service name, status,
version, and last update time.
Status Description
Standby The service is running, but it is not compatible with Informatica Intelligent Cloud
Services.
The version number changes each time you modify the service. The Secure Agent retains the directories
for the old version of the service for seven days. For example, if you update the NetworkTimeoutPeriod
for version 55.0.2 of the Data Integration Server, the agent increments the version number to 55.0.3 and
creates the following directory:
Stop and start the services that run on a Secure Agent to perform troubleshooting, optimize resources
on the agent machine, or make service configuration changes. When you stop or start a Secure Agent
service, other services that run on the agent are not affected.
Expand the Agent Package Details section to see the name and version number for the packages in each
service that runs on the Secure Agent. You can filter the packages by service.
Expand the System Configuration Details section to see the Secure Agent service properties. You can
filter the properties by service and type.
To configure the properties, click Edit. You can configure properties for each service that runs on the
Secure Agent. You can also add and remove custom properties, which are used by connectors. For more
information about Secure Agent services and service properties, see Secure Agent Services. For more
information about custom properties, see the help for the appropriate connector.
Expand the Agent Host section to see information about the machine that hosts the Secure Agent. For
example, you can view the machine name, operating system, and available disk space.
To view audit information such as start and stop times, server connections, and upgrade messages, click
Audit Log.
To refresh the status of the Secure Agent, click Refresh Status in the upper right corner of the page.
To view the status on Linux, you can also navigate to the following directory:
./consoleAgentManager.sh getstatus
./consoleAgentManager.sh updatestatus
The microservices that you stop and start on a Secure Agent are the Secure Agent services, which are
different from the Informatica Intelligent Cloud Services. For example, the Data Integration Server runs data
integration tasks such as data loader tasks and mapping tasks. For more information about Secure Agent
services, see Secure Agent Services.
You might need to stop and restart a Secure Agent service to troubleshoot issues with a specific Secure
Agent service. For example, if a Secure Agent service shows an error state, you can stop the service,
troubleshoot the problem, and then restart the service.
Each time you start and restart a service, the Secure Agent creates a new subdirectory for the service-related
files. For example, if the Secure Agent uses version 64.0.38 of the Data Integration Server, the Secure Agent
installation directory contains the following subdirectory:
When you stop and restart the Data Integration Server, the Secure Agent creates the following directory:
• Use caution when you stop Secure Agent services because this can cause job failures.
When you stop a Secure Agent service, any job that requires the service and is currently running on the
agent stops. If there are no other agents in the group, the job can no longer run. If there are other agents
in the group, you can restart the job and it will run on a different agent.
• Do not stop and start services to reserve a Secure Agent group for certain types of jobs.
If you want to reserve a Secure Agent group for certain types of jobs, you can enable the required services
for the Secure Agent group and disable other services. For more information about enabling and disabling
services for a Secure Agent group, see “Service assignment for Secure Agent groups” on page 11.
Note: If you stop a Secure Agent service and then restart the Secure Agent, the service remains stopped until
you start it.
Agent blackout periods stop the Data Integration Server service from running jobs on a Secure Agent during
the blackout period. They do not prevent other types of jobs from running on the agent. Configure an agent
blackout period in the following circumstances:
• The Data Integration Server is the only service enabled on the agent and you want to stop all data
integration jobs from running during a certain period.
• The Secure Agent runs multiple services and you want to stop only the data integration jobs from running
during a certain period.
Note: The agent blackout period is different than the schedule blackout period for the organization. During an
organization's schedule blackout period, no jobs can run on any agent. For more information about schedule
blackout periods, see Organization Administration.
To configure a blackout period on a Secure Agent, you must create a blackout file. The blackout file is an
XML file that specifies the repeat frequency, start date, and end date for each blackout period.
For example, the following blackout file contains two blackout periods: one blackout period from July 27,
2021, 5:00 AM through July 28, 2021, 11:00 PM and a second blackout period that repeats on Fridays from
2:00-4:00 PM:
<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<BlackoutWindows>
<BlackoutWindow>
<RepeatFrequency>OneTime</RepeatFrequency>
<Start>2021-07-27 5:00:00</Start>
<End>2021-07-28 23:00:00</End>
</BlackoutWindow>
<BlackoutWindow>
<RepeatFrequency>Friday</RepeatFrequency>
<Start>14:00:00</Start>
<End>16:00:00</End>
</BlackoutWindow>
</BlackoutWindows>
To configure one or more blackout periods, create a file named "blackoutWindows.dat" in the following
directory on the Secure Agent machine:
If the Secure Agent is in a Secure Agent group, copy the blackout file to the ...\conf\ directory on each
agent machine in the group.
If you want to use a different file name and directory, you can override the file name and file path.
After you create a blackout file, restart the Data Integration Server service on the Secure Agent so that the
blackout periods take effect.
Set the following custom property for the Data Integration Server on the agent details page:
Data Tomcat BlackoutWindowsFile File path and file name for the blackout file. For example:
Integration C:/AgentBlackouts/Agent001Blackouts.dat
Server Note: Use forward slashes (/) in the file path on both Windows
and UNIX machines because the Secure Agent interprets
backslashes (\) as escape characters.
The file path must be accessible by the Secure Agent.
For more information about configuring custom properties for a Secure Agent service, see Secure Agent
Services.
Start Required Blackout period start time in the format yyyy-mm-dd hh24:mi:ss. For example,
2019-07-25 10:26:55.
The time zone is the Secure Agent time zone.
End Required Blackout period end time in the format yyyy-mm-dd hh24:mi:ss. For example,
2019-07-26 11:45:00.
The time zone is the Secure Agent time zone.
1. On the Runtime Environments page, click the name of the Secure Agent.
Note: You might have to expand the Secure Agent group to see the list of Secure Agents within the
group.
2. Click the Details tab.
3. In the upper right corner, click Edit.
4. Enter a new name in the Agent Name field.
Note: If you use multi-byte characters in the Secure Agent name and the agent is in a cloud-hosted
environment, verify that the environment also supports these characters.
5. Click Save.
Note: You cannot delete a Secure Agent if it is used in a connection or a task. For example, if the Secure
Agent is the only agent in a group, and the group is used as the runtime environment for a connection or task,
you cannot delete the agent.
It is important to delete the resource group, otherwise the virtual machine may be left in a running state,
incurring charges.
If you no longer need the Secure Agent, uninstall the Secure Agent after you delete it.
Note: A Secure Agent can upgrade only if the agent version is the current major release and the agent is
running. For example, the new major release upgrades the Secure Agent to version 65.x. To be upgraded, an
agent must be version 64.x and must be running.
When you install a Secure Agent, some of the files in the Secure Agent directory contain sensitive data such
as agent credentials, agent proxy credentials, and JDK keystore passwords. If you store connections on the
The encryption key uses some machine-specific information. This prevents an attacker from copying the
Secure Agent directory from one machine to a different machine and starting the agent on that machine.
You can change the encryption key at any time. To do this, you use the consoleAgentManager
rotateDeviceKey command.
INFA_AGENT_EXCLUDE_SEC_PROPS Specifies the properties to exclude. Set the value to the same values you
excluded in the rotateDeviceKey command.
INFA_AGENT_ADDITIONAL_SEC_PROPS Specifies the properties to add. Set the value to the same values you added
in the rotateDeviceKey command.
Back up the Secure Agent installation directory before you change the data encryption key.
The user account you use to change the encryption key must have privileges to delete files in the Secure
Agent installation directory and its subdirectories.
Note: During upgrade, there can be two versions of the Data Integration Server running within the
maintenance window. Do not change the encryption key until the upgrade has completed and the newer
version of the Data Integration Server is the only version that is running.
Back up the Secure Agent installation directory before you change the data encryption key.
Note: During upgrade, there can be two versions of the Data Integration Server running within the
maintenance window. Do not change the encryption key until the upgrade has completed and the newer
version of the Data Integration Server is the only version that is running.
• View the status of the Secure Agent and the services that the Secure Agent runs.
• Stop and restart the Secure Agent.
• Configure Windows settings such as proxy settings and a Windows Secure Agent service login.
The Secure Agent Manager displays the status of the Secure Agent and the services that the Secure Agent
runs. If the Secure Agent or one of the services that the Secure Agent runs is not starting or not running, the
Secure Agent Manager displays an alert message and a link that you can click to view details.
When you close the Secure Agent Manager, it minimizes to the Windows taskbar for quick access. Closing
the Secure Agent Manager does not stop the Secure Agent. When the Secure Agent Manager is minimized,
you can view the Secure Agent status by hovering over the Secure Agent Manager icon.
When you configure a proxy server for the Informatica Cloud Secure Agent, you define the minimum required
settings in the Secure Agent Manager. Informatica Intelligent Cloud Services updates the following file and
adds other properties that you can edit manually:
Launch the Secure Agent Manager from the Windows Start menu. If the Secure Agent Manager is active, you
can click the Informatica Cloud Secure Agent Manager icon in the Windows taskbar notification area to open
the Secure Agent Manager.
To stop the Secure Agent from the Secure Agent Manager, click Stop. To restart the Secure Agent, click
Restart. The Secure Agent Manager displays a message when the action is complete.
When you close the Secure Agent Manager, it minimizes to the Windows taskbar notification tray. Closing the
Secure Agent Manager does not stop the Secure Agent.
Why does my Secure Agent always display "Agent Core Upgrading" in Administrator?
On the Runtime Environments page in Administrator, the status of an agent always displays "Agent Core
Upgrading". You see the following message in the agentcore.log file:
2022-10-11 17:02:57,560 GMT tid="21" tn="Agent Core State Machine Thread" ERROR
[com.informatica.saas.infaagent.agentcore.AgentCoreStateMachine] - Authentication failed
due to IO error: [cannot decrypt null or empty string].
This issue occurs when the agent missed one or more previous major upgrades. For example, you stopped an
agent that was on version 62.x and the current version is 65.x when you restart it. The automatic upgrade
only supports upgrading from the previous major version, 64.x. Since your version is older than version 64.x,
the automatic upgrade fails.
You can see the agent version in the Details tab of a Secure Agent:
• If your organization uses a proxy server to access the internet, verify that the proxy settings are set
correctly.
• View the details in infaagent.log in the directory where you installed the Secure Agent.
1. View the installation details in infaagent.log in the directory where you installed the Secure Agent.
2. View the application logs in the Event Viewer for a Secure Agent that runs on Windows.
3. From the Azure console, delete the resource group belonging to Secure Agent.
One of my services shows an error status after I restarted the service successfully.
If a service fails with an error status, the error status for the service might continue to display in the Agent
Service Details after the service starts up successfully. The error stays on the page until an internal job that
cleans up obsolete messages runs. You can ignore the error.
I am trying to uninstall the Secure Agent, but the Secure Agent status still shows "Up and
Running."
When you uninstall the Secure Agent without first stopping the Secure Agent, the Agent Core and other
services might continue to run for several minutes. To avoid this issue, stop the Secure Agent before you
uninstall it.
After you uninstall the Secure Agent, delete the resource group belonging to that agent through the Azure
portal. This shuts down the virtual machine, preventing further charges.
By default, the Secure Agent starts when you start Windows. You can stop and restart the Secure Agent using
the Secure Agent Manager or Windows Services. If you install the Secure Agent on a different volume than
you use to run the installation program, you must start and stop the Secure Agent from Windows Services.
You can also use the Secure Agent Manager to check the Secure Agent status and configure proxy
information. The Secure Agent works with BASIC, DIGEST, and NTLMv2 proxy authentication.
You can launch the Secure Agent Manager from the Start menu or desktop icon. When you close the Secure
Agent Manager, it minimizes to the Windows taskbar notification area for quick access.
When you install a Secure Agent, you perform the following tasks:
Verify the following requirements before you install the Secure Agent on Windows:
• The Secure Agent machine uses a supported operating system. For the list of supported operating
systems for the Secure Agent, see the
Product Availability Matrix (PAM) for Informatica Intelligent Cloud Services on the Knowledge Base.
• The Secure Agent machine has the Microsoft Visual C++ 2015 Redistributable.
• The Secure Agent machine has at least 4 CPU cores, 16 GB RAM, and at least 5 GB of free disk space.
• The Secure Agent machine is on a volume with at least 250GB disk space, with at least 5 GB free space or
three times the size of the Secure Agent installation, whichever is greater.
32
• The account you use to install the Secure Agent has access to all remote directories that contain flat
source files.
• No other Secure Agent is installed on the machine. If another Secure Agent is installed on the machine,
uninstall it first.
For more information about Secure Agent requirements, see this article:
https://knowledge.informatica.com/s/article/526096
The Secure Agent uses port 443 (HTTPS) to connect to the internet. Configure your firewall to allow traffic to
pass over port 443.
The allowlists of domains and IP addresses can vary according to your data center, which is also called a
POD (Point of Deployment). You can identify your POD through the URL that appears when you open any
service in Informatica Intelligent Cloud Services. The first few characters of the URL string identify the POD.
For example, if the URL starts with usw3.dm-us.informaticacloud.com, your POD is USW3.
You can find the allowlists of Informatica Intelligent Cloud Services domains and IP addresses for different
PODs in this Knowledge Base article on Informatica Network or by clicking the link at the top of the Runtime
Environments page in Administrator.
When you install a Secure Agent on Windows, the Secure Agent must be part of the local Administrators
group.
You can configure proxy settings in Secure Agent Manager. Configure a login for the Windows Secure Agent
service on Windows.
Note: If you use the Secure Agent for Informatica Cloud Data Wizard, you do not need to configure proxy
settings or a Windows service login for the Secure Agent.
Secure Agent registration requires an install token. To get the install token, copy the token when you
download the agent or use the Generate Install Token option in Administrator. The token expires after 24
hours.
Before you download and install the Secure Agent, verify that no other Secure Agent is installed on the
machine. If there is, you must uninstall it.
5. If you did not copy the install token when you downloaded the agent, click Generate Install Token on the
Runtime Environments page in Administrator, and copy the token.
6. In the Secure Agent Manager, enter the following information, and then click Register:
Option Description
User Name User name that you use to access Informatica Intelligent Cloud Services.
The Secure Agent Manager displays the status of the Secure Agent. It takes a minute for all of the
services to start.
7. If your organization uses an outgoing proxy server to connect to the internet, enter the proxy server
information.
Field Description
Proxy Host Required. Host name of the outgoing proxy server that the Secure Agent uses.
4. Click OK.
The Secure Agent Manager restarts the Secure Agent to apply the settings.
Configure a login for the Secure Agent machine to allow the Secure Agent to access directories to configure
and run tasks. When you configure connections, configure tasks, and run tasks that use flat file connection
types, the Secure Agent might require read and write permissions on the related directories.
For example, to browse to a directory to configure a flat file connection, the Secure Agent login might require
permission to access the directory. Without a Secure Agent login with the appropriate permissions,
Informatica Intelligent Cloud Services cannot display the directory in the Browse for Directory dialog box.
Before you uninstall the Secure Agent, verify that no connection or task is configured to use it.
1. Click Start > All Programs > Informatica Cloud Secure Agent > Uninstall Informatica Cloud Secure
Agent.
The Secure Agent uninstaller launches.
2. Click Uninstall.
3. When the uninstall completes, click Done.
4. Delete any remaining files in the installation directory.
After you uninstall the Secure Agent, delete all files and directories associated with the Secure Agent
installation.
Note: Uninstalling the Secure Agent does not delete log files from the Secure Agent directory. If you want to
reinstall a Secure Agent on the machine, you must delete all files and directories associated with the Secure
Agent installation or reinstallation will fail. If you want to save the log files, copy them to a different directory,
and then delete the Secure Agent installation directory.
You can also use the shell command line to check the Secure Agent status.
When you install a Secure Agent, you perform the following tasks:
• Create a specific user profile to install the Secure Agent with full access to all folders from the Secure
Agent installation directory. Don't install the Secure Agent as the root user.
• Don't install more than one Secure Agent on the same machine.
• Don't install the Secure Agent on any node within the Informatica domain.
For more information about Secure Agent requirements, see this article:
https://knowledge.informatica.com/s/article/526096
Verify the following requirements before you install the Secure Agent on Linux:
• Verify that the machine uses a supported operating system. For the list of supported operating systems
for the Secure Agent, see the Product Availability Matrix (PAM) for Informatica Intelligent Cloud Services
on the Knowledge Base.
• Verify that the machine has at least 11 GB free disk space.
• Verify that the libidn.x86_64 package is installed.
If the package isn't present, install it using the following command: sudo yum install libidn.x86_64
Note: The command to install the package might vary based on your Linux distribution.
• Verify that the environment variable LD_LIBRARY_PATH is set to the following location: <Secure Agent
installation directory>/apps/Data_Integration_Server/<version>/ICS/main/bin/rdtm
• The account that you use to install the Secure Agent must have access to all remote directories that
contain flat source files.
• If you use PowerCenter, install the Secure Agent using a different user account than the account you used
to install PowerCenter.
Informatica Intelligent Cloud Services and PowerCenter use some common environment variables. If the
environment variables are not set correctly for Informatica Intelligent Cloud Services, your jobs might fail
at run time.
For more information about Secure Agent requirements, see this article:
https://knowledge.informatica.com/s/article/526096
The Secure Agent uses port 443 (HTTPS) to connect to the internet. Configure your firewall to allow traffic to
pass over port 443.
The allowlists of domains and IP addresses can vary according to your data center, which is also called a
POD (Point of Deployment). You can identify your POD through the URL that appears when you open any
service in Informatica Intelligent Cloud Services. The first few characters of the URL string identify the POD.
For example, if the URL starts with usw3.dm-us.informaticacloud.com, your POD is USW3.
You can find the allowlists of Informatica Intelligent Cloud Services domains and IP addresses for different
PODs in this Knowledge Base article on Informatica Network or by clicking the link at the top of the Runtime
Environments page in Administrator.
When you install a Secure Agent on Linux, the Secure Agent must have read/write/execute permissions for
the installation directory.
Secure Agent registration requires an install token. To get the install token, copy the token when you
download the agent or use the Generate Install Token option in Administrator. The token expires after 24
hours.
When you register the agent, it is added to its own Secure Agent group by default. You can add the agent to a
different Secure Agent group.
Before you download and install the Secure Agent, verify that no other Secure Agent is installed on the
machine using the same Linux user account. If there is, you must uninstall it.
Option Description
User Name Required. Informatica Intelligent Cloud Services user name of the user installing the Secure
Agent.
Secure Agent Optional. Include when you want to add the agent to an existing Secure Agent group
group name instead. If this option isn’t included in the command, the agent will be in its own Secure
Agent group.
You can check the registration status of a Secure Agent using the following command:
./consoleAgentManager.sh isConfigured
The Secure Agent installer configures the proxy server settings for the Secure Agent based on settings
configured in the browser. You can update the proxy server settings defined for the Secure Agent from the
command line.
To configure the proxy server settings for the Secure Agent on a Linux machine, use a shell command that
updates the proxy.ini file. Contact the network administrator to determine the proxy settings.
Before you uninstall the Secure Agent, verify that no connection or task is configured to use it.
A Linux (continued)
uninstalling the Secure Agent 39
allowlist
Secure Agent domains 33, 37
Secure Agent IP addresses 33, 37 M
maintenance outages 6
B
blackout period
configuring for a Secure Agent 22
O
overriding Secure Agent blackout file 23 object dependencies
Secure Agent blackout file structure 23 viewing for Secure Agent groups 16
C P
Cloud Application Integration community POD
URL 5 how to identify 33, 37
Cloud Developer community proxy settings
URL 5 configuring on Linux 39
configuring on Windows 29, 35
D R
Data Integration community
URL 5 requirements
directories Secure Agent 32, 37
configuring Secure Agent login to access 35 runtime environments
Hosted Agent 8
enabling and disabling services 11, 12
H S
Hosted Agent
description 8 Secure Agent
troubleshooting 30
Secure Agent connectors
40
Secure Agent groups (continued) Secure Agents (continued)
viewing dependencies 16 Secure Agent Manager 28
Secure Agent Manager starting a service 21
launching 32 starting and stopping on Linux 29
stopping and restarting the Secure Agent 29 starting and stopping services 20
using 28 starting on Windows 32
Secure Agent services stopping a service 21
enabling and disabling 11, 12 stopping and restarting on Windows 29
Secure Agents uninstalling on Linux 39
adding to Secure Agent groups 14 uninstalling on Windows 36
blackout file structure 23 upgrading 25
changing the data encryption key on Linux 27 view details, refresh status 17
changing the data encryption key on Windows 26 status
communication port 33, 37 Informatica Intelligent Cloud Services 6
configuring a Windows service login 35 system status 6
configuring blackout periods 22
data encryption 25
deleting 25
domains allowlist 33, 37
T
guidelines for starting and stopping services 21 troubleshooting
installing 32 Secure Agent 30
installing on Linux 38 trust site
installing on Windows 33 description 6
IP address allowlist 33, 37
load balancing 10
overriding blackout file 23
overview 17
U
permissions on Linux 37 upgrade notifications 6
permissions on Windows 33
registering on Linux 38
registering on Windows 33
removing from Secure Agent groups 15
W
renaming 24 web site 5
requirements on Linux 37 Windows
requirements on Windows 32 configuring proxy settings 29, 35
rotateDeviceKey command 25 Windows service
scalability 10 configuring Secure Agent login 35
Secure Agent groups 10
Index 41