The reason for building my "IBM i" Change Data Capture solution for Informatica® PowerCenter is to grab complete stream of "IBM i" database changes and process them with great power of Informatica® PowerCenter. Let me present, what can be done with the "IBM i" Change Data Capture for Informatica® PowerCenter solution.
As you see, CDC is not enough. We need additional functionalities to mainan source and targets in consistent states.
All five workflows are oriented on multi table operations. Thus, adding tables, changing structure does not required to do any changes to Workflows or Mappings. My LinkedIn profile is open. So feel free to send me and email if you have any questions. Cezary Opacki LinkedIn profile
Change data Capture workflow is described hier
Published in
i5/OS Integration
In a well known financial institution was developed workflow with 47 concurrently running sessions. Each session was populating one table by doing table copy between source and target. The purpose of the workflow was to make full target refresh, which is usually required before incremental replication. As full refresh is a very rare operation, the workflow had not been run for months. One day, the workflow was going to be used. As there was no modification to the workflow, no one expected any errors. Our workflow was ended with following error:
[Informatica][SCLI PWX Driver] PWX-33312 xxxxxxxxx:42915 : Partially completed network transmission timed out after 1322 seconds (bytes completed: 72484 mode: R) Database driver error... Function Name : Fetch SQL Stmt : …..
Published in
PowerExchange rules
In case of error 67 on Windows while connecting to IFS on i5/OS check if following Windows local policy is set properly: Network security: Minimum session security for NTLM SSP based (including secure RPC) clients Suggested value:"No minimum".
Changes of the value are reflected after system restart.
Published in
NetServer
Authentication to i5/OS NetServer can be setup to "Encrypted Password" or "Encrypted Password/Network Security". In case of "Encrypted Password", logging to NetServer is simple to configure but does not use LDAP to authenticate user. "Network Security" allows to use Kerberos to logon. Configuring for "Encrypted Password/Network Security" first tries to find LDAP. If LDAP is not found then "Encrypted Password" method is used. When LDAP is not available extremely long logging time can be experienced. It should be keep in mind especially when moving machine to new environment through backup/Recovery of operating system.
Published in
NetServer
|