On Linux, the Secure Agent runs as a process. You can use a shell command line to install, register, start, stop, and uninstall the Secure Agent.
You can also use the shell command line to check the Secure Agent status.
When you install a Secure Agent, you perform the following tasks:
1Verify that the machine where you install the Secure Agent meets the minimum requirements.
2Download the Secure Agent installer files.
3Install and register the Secure Agent.
Secure Agent requirements on Linux
You can install the Secure Agent on any machine that has internet connectivity and can access Informatica Intelligent Cloud Services. Before you install the Secure Agent on Linux, verify the system requirements.
Verify the following requirements before you install the Secure Agent on Linux:
•Verify that the machine on which you install the Secure Agent uses a supported operating system. For the list of supported operating systems for the Secure Agent, see the Product Availability Matrix (PAM) for Informatica Intelligent Cloud Services on the Product Availability Matrices page on Informatica Network.
•Verify that the machine where you install the Secure Agent has at least 5 GB of free disk space.
•The account that you use to install the Secure Agent must have access to all remote directories that contain flat source or target files.
•If you use PowerCenter, install the Secure Agent using a different user account than the account you used to install PowerCenter.
Informatica Intelligent Cloud Services and PowerCenter use some common environment variables. If the environment variables are not set correctly for Informatica Intelligent Cloud Services, your jobs might fail at run time.
For more information about Secure Agent requirements, contact Informatica Global Customer Support.
Configure the firewall
If your organization uses a protective firewall, include the Informatica Intelligent Cloud Services domain name or IP address ranges in the list of approved domain names or IP addresses. You should also enable the port that the Secure Agent uses. This ensures that the Secure Agent can perform all necessary tasks through the firewall.
The Secure Agent uses port 443 (HTTPS) to connect to the internet. Configure your firewall to allow traffic to pass over port 443.
The whitelists of domains and IP addresses can vary according to your data center, which is also called a POD (Point of Deployment). You can identify your POD through the URL that appears when you open any service in Informatica Intelligent Cloud Services. The first few characters of the URL string identify the POD. For example, if the URL starts with usw3.dm-us.informaticacloud.com, your POD is USW3.
You can find the whitelists of Informatica Intelligent Cloud Services domains and IP addresses for different PODs in this Knowledge Base article on Informatica Network or by clicking the link at the top of the Runtime Environments page in Administrator.
Secure Agent permissions on Linux
A Secure Agent requires certain permissions to transfer data between sources and targets.
When you install a Secure Agent on Linux, the Secure Agent must have read/write/execute permissions for the installation directory.
Downloading and installing the Secure Agent on Linux
To install the Secure Agent on a Linux machine, you must download and run the Secure Agent installation program and then register the agent.
Secure Agent registration requires an install token. To get the install token, copy the token when you download the agent or use the Generate Install Token option in Administrator. The token expires after 24 hours.
Before you download and install the Secure Agent, verify that no other Secure Agent is installed on the machine using the same Linux user account. If there is, you must uninstall it.
1Open Administrator and select Runtime Environments.
2On the Runtime Environments page, click Download Secure Agent.
3Select the Linux 64-bit operating system platform, copy the install token, and then click Download.
The installation program is downloaded to your machine. The name of the installation program is agent64_install_ng_ext.bin.
4Save the installation program to a directory on the machine where you want to run the Secure Agent.
Note: If the file path contains spaces, the installation might fail.
5From a shell command line, navigate to the directory where you downloaded the installation program and enter the following command:
./agent64_install_ng_ext.bin –i console
6When the installer completes, navigate to the following directory:
7To start the Secure Agent, enter the following command:
./infaagent startup
The Secure Agent Manager starts. You must register the agent using the user name that you use to access Informatica Intelligent Cloud Services. You must also supply the install token.
8If you did not copy the install token when you downloaded the agent, click Generate Install Token on the Runtime Environments page in Administrator, and copy the token.
9In the <Secure Agent installation directory>/apps/agentcore directory, enter the following command using your Informatica Intelligent Cloud Services user name and the token that you copied:
You can check the registration status of a Secure Agent using the following command:
./consoleAgentManager.sh isConfigured
Configure the proxy settings on Linux
If your organization uses an outgoing proxy server to connect to the internet, the Secure Agent connects to Informatica Intelligent Cloud Services through the proxy server.
The Secure Agent installer configures the proxy server settings for the Secure Agent based on settings configured in the browser. You can update the proxy server settings defined for the Secure Agent from the command line.
To configure the proxy server settings for the Secure Agent on a Linux machine, use a shell command that updates the proxy.ini file. Contact the network administrator to determine the proxy settings.