Before you configure application ingestion and replication tasks for initial, incremental, or combined initial and incremental load operations, review the following limitations and guidelines:
•Application Ingestion and Replication does not support the Cloud Hosted Agent, a runtime environment on a cloud platform, or the serverless runtime environment. Use a local Secure Agent installation.
•If a Secure Agent in a runtime environment that is assigned to a application ingestion and replication task terminates, you cannot undeploy the associated ingestion job, update the task to specify another runtime environment, and deploy the task again. In this situation, perform one of the following actions:
- Assign a different Secure Agent to the runtime environment. Ensure that the new Secure Agent is running. Then restart the associated ingestion job.
- Copy the task. In the task copy, specify another runtime environment that has an active Secure Agent. Then deploy the task and run the associated ingestion job.
•If you run multiple incremental load or combined initial and incremental load jobs against the same source, you cannot move capture processing of some source objects from one job to another job or merge the jobs into a single job, without resynchronizing the source and target objects being processed by the new job. Each job maintains a unique recovery checkpoint. If you try to move capture processing of an object from one job to another job, the correct recovery information for that table is not maintained, potentially causing data loss or duplicate events on the target.
•Application Ingestion and Replication uses the minimum source constraints needed for replication when generating target objects. If a source has a primary key, the job preferentially uses that primary key and no other constraint when creating the target object. If a source does not have a primary key but does have unique indexes, the job chooses the best available unique index for replication, or if all indexes are equal for replication purposes, the job chooses one at random. Only a single primary key or unique index is used. Other constraints such as those for nullability, foreign keys, and defaults, are not created at the target. Similarly, source object properties not required for replication, such as for storage and partitioning, are not reflected on the target.