Runtime Environments > Secure Agent installation in a cloud environment > Installing in Azure
  

Installing in Azure

The Secure Agent installer can configure a runtime environment on Microsoft Azure. Note that running data integration tasks on Azure incurs costs based on the workload and the VM size.
Note: You need a Microsoft Azure subscription with permissions that allow you to deploy resources. If admin consent is enabled at your organization, reach out to the Azure administrator for app consent approvals. For more information about admin consent requests, see the Microsoft documentation.
  1. 1In Administrator, select Runtime Environments.
  2. 2On the Runtime Environments page, click Manage Cloud Secure Agents.
  3. 3Click New Cloud Secure Agent.
  4. 4Select Microsoft Azure.
  5. 5Click Next.
  6. 6Select the Microsoft account to use.
  7. 7Enter the following properties:
  8. Property
    Description
    Subscription
    Select your Microsoft Azure subscription. The subscription must include permissions to deploy the following resources:
    • - Network security group
    • - Virtual network (including subnet)
    • - Network interface
    • - Public IP address
    • - OS disk
    • - Virtual machine
    Be sure to grant permission to the Hyperscalar Azure Integration App when prompted.
    Note: If you do not have an Azure subscription, exit the installer and sign up for one with Microsoft. You cannot sign up from within Informatica Intelligent Cloud Services.
    Resource Group
    A resource group is a container that holds related resources for your runtime environment. Informatica Intelligent Cloud Services uses one resource group for each Secure Agent to simplify management of the VM resources for that agent.
    You typically create new resource groups, but you can use any existing group that is empty.
    Tip: Use the same or similar name as the Secure Agent to more easily identify which resource group belongs with each agent.
    Resource Group Name
    Name of the resource group. Enter the name of a new group or select an existing group.
    Ensure that any existing resource group is empty, otherwise this message appears: "API Input validation failed."
    Location
    Select the region to deploy the Secure Agent. Choose the Azure region that's appropriate for your organization and your customers. Not every resource is available in every region.
    VM Name
    Enter a name for the virtual machine (VM) that will be created.
    VM User Name
    Enter your name as the virtual machine user.
    VM Password
    Enter a password to access the virtual machine.
    Secure Agent Name
    Enter a name for your Secure Agent. By default, the runtime environment has the same name as the agent.
    Tip: Use the same or similar name as the resource group, to more easily identify which resource group belongs with each agent.
    VM Size
    Select a size for your virtual machine. If you are unfamiliar with Azure image sizing, start with a size with at least 4 cores and 16 GB of memory.
    Note that your Azure hourly charges are affected by the VM size.
    Virtual Network
    Select an existing virtual network based on your Microsoft Azure subscription and location or create a new virtual network.
    Virtual Network Name
    Select an existing virtual network or enter the name for a new virtual network.
    When you select an existing virtual network, this associates the newly created VM with the existing VNet.
    Virtual Network Address
    Select an existing virtual network address or enter a new address.
    Subnet Name
    Select the subnet to use or enter a name for a new subnet.
    The subnet holds all the Azure resources that are deployed to the virtual network.
    Subnet Address
    Select the subnet address that includes all the resources or enter a new subnet address.
    Subnet addressing allows a system made up of multiple networks to share the same Internet address.
    CIDR IP Address Range
    Enter the CIDR IP address range.
    CIDR (Classless Inter-Domain Routing) is a method for allocating IP addresses. It configures a network rule to allow remote access to the Secure Agent. The "/x" portion of the address determines how many IP addresses are available in the subnet, for example: 108.124.81.10/32
    Tip: For more information, refer to "Explore Azure Virtual Networks" in the Microsoft documentation.
  9. 8Click Create. Administrator creates your runtime environment and displays it on the Runtime Environments page.
  10. Tip: To see the progress of your pending Secure Agents, click Manage Cloud Secure Agents on the Runtime Environments page. The status appears at the top of the page.