Getting Started with Data Ingestion and Replication > Getting Started with Data Ingestion and Replication
  

Getting Started with Data Ingestion and Replication

Before you configure a Data Ingestion and Replication task, verify that all prerequisite steps have been completed. Most of these steps are completed in the common Administrator service.

Step 1. Check system requirements

Check the following items:

Step 2. Set up an organization.

If you are the administrator, set up an organization from the Organization page in Administrator. An organization is a secure area within the Informatica Intelligent Cloud Services repository that stores your licenses, user accounts, ingestion tasks, and information about jobs and security.
Then, configure users, user groups, and user role permissions for the organization.
If your organization has the Organization Hierarchy license, you can also create one or more sub-organizations within your organization. You can create sub-organizations to represent different business environments in your company. For example, you might create separate sub-organizations to represent your development, testing, and production environments.
For more information, see "Organizations" in the Administrator help.

Step 3. Download and install a Secure Agent

On the Runtime Environments page in Administrator, download a local Secure Agent and install it. A Secure Agent is a lightweight program that runs tasks and enables secure communication across the firewall between your organization and Informatica Intelligent Cloud Services.
Note: Data Ingestion and Replication does not support the Informatica Cloud Hosted Agent, runtime environments in cloud environments, and serverless runtime environments.
When you download and install a Secure Agent, a Secure Agent group, also called a runtime environment, is created. A Secure Agent group can contain one Secure Agent or multiple agents if your licensing allows it.
Note: Informatica recommends that you do not run Data Ingestion and Replication tasks and Data Integration tasks on the same Secure Agent if you want to achieve the best performance.
After you enable services and connectors for the Secure Agent group, the components and packages based on your selections are downloaded and an associated runtime environment is created. For more information, see "Secure Agent Groups" in the Administrator help.
If you use a Secure Agent group with multiple agents, an available agent will be picked from the active agent list to run your jobs. If the active agent goes down unexpectedly, initial load, incremental load, and combined initial and incremental load jobs can automatically switch over to another available agent in the group. Application Ingestion and Replication and Database Ingestion and Replication support automatic switchovers for initial load jobs that have any supported source type and a target type other than Kafka. Database Ingestion and Replication also supports automatic switchovers for incremental load and combined load jobs that have an Oracle or SQL Server source, subject to the following limitations:
For other types of intial load, incremental load, and combined initial and incremental load jobs, you must use a single Secure Agent.
If you are an administrator of a parent organization, you can share the parent organization's Secure Agent group with sub-organizations. However, a sub-organization user cannot share a Secure Agent group. When a Secure Agent group is shared, users in the sub-organizations can create application or database ingestion and replication tasks of any load type and run the associated jobs on the Secure Agents in the group. Sharing a Secure Agent group can help optimize the use of available Secure Agent resources. For more information, see "Shared Secure Agent groups" in the Administrator help.
Note: If you create a connection using a shared Secure Agent group as the runtime environment and create an application or database ingestion and replication task with that connection under a sub-organization that uses a non-shared Secure Agent group, the task wizard can't fetch the list of schemas for the target. The connection and task must both use a shared Secure Agent group, either the same shared group or different shared groups.

Step 4. Configure the runtime environment

On the Runtime Environments page in Administrator, create a new runtime environment with one or more Secure Agents, or select the runtime environment you want to use and make sure it's running. Alternatively, in the Runtime environments panel on the Home page, click Manage runtime environments to go to the Runtime Environments page in Administrator.
A runtime environment is the execution platform for running tasks. You must have at least one runtime environment in your organization for users to be able to run tasks. If you create another runtime environment, you must add an unassigned Secure Agent to it.
Under System Configuration Details, configure properties for the CMI Streaming Agent, Database Ingestion, or Mass Ingestion (file ingestion) service. For more information, see Secure Agent services.

Step 5. Configure connections

From the Connections page in Administrator, configure connection properties for the source and target connectors that you want to use in Data Ingestion and Replication tasks. To quickly get to the New Connection page, you can click the Let's get connected! pane on the Home page.

Step 6. Create your project

On the Explore page , you can create projects and project folders to organize your Data Ingestion and Replication tasks. To access the Explore page, click Explore in the left navigation bar of the Home page. A project can contain multiple subfolders. See Creating projects and project folders.