Runtime environments
Hosted Agent
Secure Agent groups
Secure Agent groups with multiple agents
Service and connector assignment for Secure Agent groups
Service assignment guidelines
Enabling or disabling services and connectors for a Secure Agent group
Service and connector assignment example
Shared Secure Agent groups
Flat file connections in shared Secure Agent groups
Working with Secure Agent groups
Adding a Secure Agent to a group
Adding a new Secure Agent to an existing group
Removing a Secure Agent from a group
Viewing Secure Agent group dependencies
Elastic runtime environments
Security to protect your data
Downloading images
Verify the prerequisites
Set up the AWS environment
Step 1. Create AWS resources
Step 2. Create a cluster installer policy
Step 3. Create a cluster installer role
Step 4. Create a worker policy
Step 5. Create a worker role
Step 6. Create the jump host (optional)
Step 7. Create the master node
Create an elastic runtime environment
Connectors in an elastic runtime environment
Environment configuration
Service configuration
Deploy an elastic runtime environment
Step 1. SSH into the master node
Step 2. Clean up Kubernetes resources (optional)
Step 3. Download the cluster installer
Step 4. Update the config.txt file
Step 5. Run the cluster installer
Step 6. Mount the EFS file systems on the master node
Step 7. Verify that the elastic runtime environment is running
Upload flat files to an EFS file system
Working with elastic runtime environments
Troubleshooting
Troubleshooting general validation errors
Troubleshooting proxy errors
Troubleshooting AWS errors
Troubleshooting errors for master and worker nodes
Troubleshooting ALMS deployment errors
Troubleshooting EFS errors
Troubleshooting miscellaneous errors
IAM policy reference
Cluster installer policy statements
Worker policy statements
Serverless runtime environments
Serverless runtime environment setup on AWS
Configure your environment
VPC configuration tasks
Configure the serverlessUserAgentConfig.yml file
Proxy servers in a serverless runtime environment
Serverless runtime environment in Administrator
Serverless runtime validation
Serverless runtime environment management
Serverless runtime environment setup on Microsoft Azure
Step 1. Verify your user consent settings
Step 2. Configure the subnet
Step 3. Configure the serverlessUserAgentConfig.yml file
Step 4. Create an Informatica organization
Step 5. Create a serverless runtime environment
Manage the serverless runtime environment
Configure VNet for databases or endpoints outside of Azure
Run command tasks
Troubleshooting a serverless runtime environment in Azure
How to configure the serverlessUserAgentConfig.yml file
Populating the serverlessUserAgentConfig.yml File
Copying files for the Elastic Server
Copying JDBC V2 Connector JAR files
Copying Java transformation JAR files
Copying Python transformation resource files
Adding files while the environment is running
Connectors in a serverless runtime environment
Secure Agents
Working with Secure Agents
Stopping and restarting the Secure Agent on Windows
Stopping and restarting the Secure Agent on Linux
Stopping and starting services on a Secure Agent
Guidelines for stopping and starting Secure Agent services
Stopping a Secure Agent service
Starting a Secure Agent service
Configuring agent blackout periods
Overriding the blackout file name and directory
Blackout file structure
Renaming a Secure Agent
Deleting a Secure Agent
Upgrading a Secure Agent
Migrating a Secure Agent
Secure Agent Manager
Secure Agent logs
Troubleshooting a Secure Agent
Secure Agent installation
Installing in AWS
Installing in Google Cloud
Troubleshooting connection issues on Google Cloud
Installing in Microsoft Azure
Installing in Windows
Secure Agent requirements on Windows
Downloading and installing the Secure Agent on Windows
Configuring the proxy settings in Windows
Configuring a login for a Windows Secure Agent service
Uninstalling the Secure Agent in Windows
Installing in Linux
Secure Agent requirements on Linux
Downloading and installing the Secure Agent on Linux
Configuring the proxy settings in Linux
Uninstalling the Secure Agent in Linux
Troubleshooting a Secure Agent installation
Runtime environments
Troubleshooting a Secure Agent installation
RUNTIME_ENVIRONMENTS
AGENT_GROUPS_PAGE
HL_ServiceAndConnectorAssignment
HL_ENABLINGSERVICES
SA_GROUP_DEPENDENCY_PAGE
ADMIN_SERVERLESS_RTE_SUMMARY
HL_SERVERLESS_RUNTIME_ENVIRONMENT_SETUP
HL_ADMIN_PROXY_SERVER_SERVERLESS
ADMIN_SERVERLESS_RTE_NEW
DMT_SE
ADMIN_RUNTIMENV_MOD_HYLNK
REGISTER_AGENT_PAGE
AGENTS_PAGE
VIEW_AGENT_PAGE
VIEW_SECURE_AGENT
HL_SecureAgentInstallation
RTE_WIZARD_AWSCONFIG
RTE_WIZARD_GCPCONFIG
RTE_WIZARD_AZURECONFIG
CDI_HL_CONFIGURE_PROXY_WINDOWS
HL_SA_LINUX_INSTALL