Beruflich Dokumente
Kultur Dokumente
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
6,029,178;
6,789,096;
7,254,590;
7,774,791,
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its iiaffiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Preface
Welcome to the PowerCenter 9x Level One Developer course.
This four-day, instructor led course introduces students to Informatica PowerCenter 9.x
through lecture and hands-on exercises. The course is designed for Database Developers
who are new to Informatica PowerCenter.
Informatica PowerCenter is a collection of thick client workbench tools that Developers
can use to create, execute, monitor and schedule ETL processes.
The course will introduce attendees to working with the PowerCenter Designer,
Workflow Manager, and Workflow Monitor tools, performing tasks such as creating
transformations, mappings, reusable objects, sessions and workflows to extract, transform
and load data. They will develop cleansing, formatting, sorting and aggregating
procedures. They can learn how to use routers, update strategies, parameters /variables
and overrides. This course will cover many different types of lookups, such as cached,
persistent, dynamic and multiple row returns. Workflow tasks will be created to define a
set of instructions for executing the ETL.
Prerequisites:
Prerequisites include basic familiarity with Windows GUI and at least two years work
experience and some knowledge of SQL.
Course Objectives:
After successfully completing this course, students should be able to:
Use Informatica Support to resolve questions and problems with PC9.x.
Use PowerCenter 9.x Designer to build mappings that extract data from a source
to a target, transforming it as necessary.
Use PowerCenter transformations to cleanse, format, join, aggregate and route
data to the appropriate targets
Perform error handling/trapping using PowerCenter mappings
Use PowerCenter 9.x Workflow Manager to build and run a workflow which
executes a sessions associated with a mapping
Design and build simple mappings and workflows based on essential business
needs.
Perform basic troubleshooting using PowerCenter logs and debugger
Audience:
This course is designed for database developers with little or no experience of
PowerCenter.
.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or itsiiiaffiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Document Conventions
This guide uses the following formatting conventions:
If you see
It means
Example
>
boldfaced text
UPPERCASE
Note:
Tip:
italicized text
T_ITEM_SUMMARY
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its vaffiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Providing Feedback
Email any comments on this guide to education@informatica.com.
WebSupport requires a user name and password. You can request a user name and password at:
http://mysupport.informatica.com.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Asia / Australia
Informatica Business
Solutions Pvt. Ltd.
301 & 302 Prestige Poseidon
139 Residency Road
Bangalore 560 025
India
Toll Free
877 463 2435
Toll Free
00 800 4632 4357
Standard Rate
United States: 650 385 5800
Standard Rate
Belgium: +32 15 281 702
France: +33 1 41 38 92 26
Germany: +49 1805 702 702
Netherlands: +31 306 022 797
United Kingdom: +44 1628 511 445
Toll Free
Australia: 00 11 800 4632
4357
Singapore: 001 800 4632 4357
Standard Rate
India: +91 80 5112 5738
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.0.1
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.0.2
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.0.3
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.0.4
Specialist
PK
Expert
PK
BPK
PE
Master
PK
ProductTraining
ProductTraining
ProductTraining
ProductCoreExam
ProductCore
Exam
ProductCore
Exam
FieldExperience
BPK PE
FieldExperience
VelocityBest
Practice Training
VelocityBest
Practice Training
VelocityExam
VelocityExam
MultipleProduct
Experience
Handson Exam
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.1.1
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.1.2
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.1.3
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.1.4
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.1.5
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.1.6
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.1.7
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.1.8
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.1.9
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
1.10
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
1.11
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
1.12
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
1.13
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
1.14
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
1.15
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
1.16
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
1.17
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
1.18
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
1.19
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
1.20
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Integration Service
Repository Service
Repository Service
Process
Repository
Client Tools
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
1.21
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Integration Service
Repository Service
Repository Service
Process
Repository
Client Tools
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
1.22
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Integration Service
Repository Service
Repository Service
Process
Repository
Client Tools
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
1.23
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Integration Service
Repository Service
Repository Service
Process
Repository
Client Tools
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
1.24
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Integration Service
Repository Service
Repository Service
Process
Repository
Client Tools
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
1.25
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Note
Designer and Repository Manager access the repository through the Repository
Service.
Workflow Manager and Workflow Monitor connect to the Integration Service.
Each client has its own user interface. The UIs typically have toolbars, a navigation
window to the left, a workspace to the right, and an output window at the bottom.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
1.26
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.2.1
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.2.2
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.2.3
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.2.4
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.2.5
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.2.6
Repository Management
Folder Management
Shortcut Folders
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.2.7
Note
Two sources from different systems may use the same name. Placing each
source in a folder based on its connection type avoids confusion when this is
the case.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.2.8
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.2.9
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.10
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.11
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.12
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.13
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.14
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Note
Examples
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.15
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Examples
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.16
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Type
Active
Description
Mandatory for all flat file and relational sources in a mapping. Selects
records from flat file and relational table sources. For relational tables,
creates a SQL SELECT statement. Converts native source datatypes to
PowerCenter transformation datatypes.
Ports
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.17
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Note
Note
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.18
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Datatype Conversion
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.19
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.20
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.21
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.22
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.23
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.24
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
A workflow is a set of ordered tasks that describe runtime ETL processes. Tasks can be
sequenced serially, in parallel and conditionally. Each linked icon represents a task.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.25
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.26
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.27
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.28
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.29
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.30
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.31
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.32
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.33
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.34
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.35
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.36
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.37
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Velocity Phases
Note
Note
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.38
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.39
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Note
In the labs for this course, we are simulating part of the creation of a
(very simple) Dimensional Data Warehouse. In these labs, you will begin
with data in OLTP tables and flat files, bring data to Staging, and from
Staging (STG) to the Operational Data Store (ODS).
Because creation of Staging tables is fairly trivial, you will do more work
on moving data from STG to ODS. This will provide more realistic uses
of the capabilities of PowerCenter.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.40
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.41
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
2.42
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Module 3: Troubleshooting
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.3.1
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Module 3: Troubleshooting
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.3.2
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Module 3: Troubleshooting
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.3.3
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Module 3: Troubleshooting
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.3.4
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Module 3: Troubleshooting
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.3.5
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Module 3: Troubleshooting
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.3.6
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Module 3: Troubleshooting
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.3.7
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Module 3: Troubleshooting
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.3.8
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Module 3: Troubleshooting
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.3.9
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Module 3: Troubleshooting
3.10
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Module 3: Troubleshooting
3.11
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Module 3: Troubleshooting
3.12
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Module 3: Troubleshooting
3.13
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Module 3: Troubleshooting
3.14
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Module 3: Troubleshooting
3.15
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.4.1
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.4.2
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.4.3
Type
Passive
Description
Modifies individual ports (columns) within a single row. Can add and suppress
ports. Cannot perform aggregation across multiple rows.
Business
Purpose
Use the logical and arithmetic operators and built-in functions for:
Character manipulation (concatenate, truncate, etc.)
Datatype conversion (to char, to date, etc.)
Data cleansing (check nulls, replace strings, etc.)
Data manipulation (round, truncate, etc.)
Numerical calculations
Scientific calculations
Special functions (lookup, decode, etc.)
Testing (for spaces, number, etc.)
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.4.4
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.4.5
Comments
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.4.6
Tip
Highlighting a function and pressing F1 will launch the online help at the selected
function section.
Note
All expressions resolve to a single value of a specific datatype. For example, the
expression LENGTH (HELLO WORLD) / 2 returns the numerical value 5.5.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.4.7
Note
Creating
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.4.8
Note
When a record is processed, the expression is evaluated and the result is assigned
to the variable port. The result must be compatible with the ports datatype.
The variable persists across the set of records, and may be used or modified
anywhere in the set of records.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.4.9
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
4.10
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
4.11
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
4.12
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
4.13
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Type
Active
Description
Rows which meet the filter condition are passed through to the next
transformation. Rows which do not meet the filter condition are skipped.
Business Purpose
A business may choose not to process records which do not meet a data
quality criterion.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
4.14
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
4.15
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
4.16
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Warning
Note
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
4.17
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
4.18
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
4.19
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
4.20
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
4.21
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.5.1
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.5.2
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.5.3
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.6.1
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.6.2
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.6.3
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.6.4
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.6.5
Example:
A business sells a high volume of products and updates the Product Dimension table on a regular
basis. To update the dimension table, a join of the PRODUCT and PRODUCT_COST table is
required. Since the source tables are form the same database and have a key relationship only a
single Source Qualifier transformation is needed.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.6.6
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.6.7
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.6.8
Pipelines
There are two pipelines; one from the master source, one from the detail.
The master pipeline ends at the Joiner transformation, while the detail
pipeline continues to the target.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.6.9
Type
Active
Description
Combines fields from two data sources into a single combined data
source, based on one or more common fields called the join condition
Business Purpose
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
6.10
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
6.11
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
6.12
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
6.13
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
6.14
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
6.15
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
6.16
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
6.17
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
6.18
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
6.19
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
6.20
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.7.1
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.7.2
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.7.3
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.7.4
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.7.5
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.7.6
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.7.7
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.7.8
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.7.9
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.8.1
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.8.2
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.8.3
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.8.4
Type
Active or Passive
Description
Business Purpose Allows data from external sources such as product codes, dates, names, etc., to
be brought into the row being processed.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.8.5
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.8.6
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.8.7
Report Error. The Integration Service reports an error and does not return a row. If you do not
enable the Output Old Value On Update option, the Lookup Policy On Multiple Match option is
set to Report Error for dynamic lookups.
Use First Value. Returns the first row that matches the lookup condition.
Use Last Value. Return the last row that matches the lookup condition.
Use Any Value. The Integration Service returns the first value that matches the lookup
condition. It creates an index based on the key ports instead of all Lookup transformation
ports.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.8.8
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.8.9
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
8.10
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
8.11
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
8.12
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
8.13
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
8.14
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
And you have one source in your mapping, the database connection you specify for the
source will be used as the value for $Source.
And you have only one target in the mapping, the database connection you specify for the
target will be used for the lookup or SP.
If you have Multiple relational targets in the mapping and the $Target connection value is not
configured, the session fails.
If your mapping contains an Unconnected Lookup or Stored Procedure and the $Target
connection value is not configured, the session fails.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
8.15
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Description
Event Wait tasks wait for either the presence of a named flat file (a predefined event) or some other user-defined event to occur in the workflow
processing. Note that the Workflow must be running in order to
recognize a pre-defined event.
Business Purpose
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
8.16
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
8.17
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
8.18
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
8.19
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Description
Business Purpose
Performance
Considerations
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
8.20
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
8.21
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Note
The Control task can fail, stop, or abort either the parent Workflow or the top-level
Workflow. However, stopping or aborting the parent Workflow means that no further
progress takes place along that branch in the top-level Workflow. This can cause
the top-level Workflow to stop if there is no other branch.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
8.22
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Description
Business Purpose
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
8.23
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Examples of Command
Tasks
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
8.24
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Description
Decision tasks enable workflow designers to set criteria by which the workflow
will or will not proceed to the next set of tasks, depending on whether the set
criteria is true or false
Business Purpose
Commonly, workflows have multiple paths. Some are simply concurrent tasks.
Others are pipelines of tasks that should only run if the previous tasks are
successful. Still others should be run only if those tasks are not successful.
What determines the success or failure of a task or group of tasks is userdefined, depending on the business-defined rules and operational rules of
processing.
The criteria are set as the decision condition in a Decision task, and
subsequently tested for a True or False condition
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
8.25
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
8.26
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
8.27
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
8.28
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
8.29
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
8.30
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
8.31
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
8.32
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Note
Caching for lookup tables is an option. When the lookup references a flat file,
caching is always performed.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
8.33
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
8.34
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
8.35
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
8.36
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
8.37
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
8.38
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
8.39
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
8.40
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.9.1
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.9.2
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.9.3
Type
Active
Description
Tags a row with the appropriate DML (Data Manipulation Language) for
PowerCenters writer to apply to the relational target. Each row can be
tagged with one of the tags shown on the following slide.
Business Purpose
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.9.4
Note
For the row tags DD_DELETE and DD_UPDATE, the table definition in the
mapping must have a key identified. Otherwise, the session created from the
mapping will fail.
If the Forward Rejected Rows attribute is checked (default), then rows tagged
with DD_REJECT will be passed on to the next transformation or the Target, and
subsequently placed in the appropriate bad file. If the attribute is unchecked,
then the reject rows will be skipped.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.9.5
Performance
Considerations
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.9.6
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.9.7
Type
Active
Description
Business Purpose
Allows you to write records from a single source into multiple targets
based on user-defined criteria.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.9.8
Performance
Considerations
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.9.9
Note
In the diagram above, the record for a salesperson hired less than 90 days ago
will be routed to both STG_EMPLOYEES_NEW and
STG_EMPLOYEES_SALES.
If you wish to prevent single records from being routed to multiple Targets, you
must ensure that their filter conditions are mutually exclusive.
In the example above, you would prefix the conditions for the position-based
tables with DATE HIRED >= 90 DAYS AGO AND.
Note that multiple target objects can be instances of the same target table. If this
is the case, only one INSERT statement will be generated per record.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
9.10
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
9.11
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
9.12
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
9.13
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
9.14
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
9.15
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
9.16
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.1
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.2
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.3
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Type
Active
Description
Sorts incoming data based on one or more key values. Sort order may
be ascending, descending, or mixed.
Business Purpose
10
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.4
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Property
Description
Case Sensitive
Work Directory
Distinct
Treats output rows as distinct. If this is selected, all ports are considered
as part of the sort key.
Transformation Scope
Other Properties
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.5
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.6
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Type
Active
Description
Business Purpose
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.7
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Attribute
Description
Cache Directory
Tracing Level
Sorted Input
Data cache size for the transformation. Default size is set to Auto.
Index cache size for the transformation. Default cache size is set to Auto.
Transformation Scope
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10
10.8
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Key Points
If there is not enough memory specified in the index and data cache
properties, overflow is written to disk
No rows are returned until all rows are aggregated
Checking the sorted input attribute bypasses caching and aggregate
calculations are performed as the Integration Service reads rows for
each group.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.9
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.10
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.11
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Type
Passive
Description
Business Purpose
A source table may have a small percentage of records with incomplete data.
These holes in the data can be filled by performing a lookup to another table
or tables, on an as-needed basis.
10
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.12
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.13
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.14
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Key Points
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.15
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.16
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.17
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.18
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.19
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Description
System variables hold information derived from the system. The user
cannot control the content of the variable but can reference the
information contained within the variable.
Business Purpose
10
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.20
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Description
System variables hold information derived from the system. The user
cannot control the content of the variable but can reference the
information contained within the variable.
Business Purpose
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.21
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.22
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Description
Business Purpose
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.23
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Scope
Parameters and variables can be used only inside the object in which
they are created. A Mapping variable created for Mapping_1 is available
only within that Mapping and cannot be used by another Mapping or
Mapplet in the same workflow. A parameter or variables scope is the
object in which it was created.
Aggregation Type
IsExpVar
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10
10.24
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.25
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Variable Persistence
Naming Convention
10
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.26
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Parameter File
Repository Saved
Value
Values for variables that were saved in the Repository after successful
completion of a Session
Declared Initial
Value
The initial value, as set by the user when creating the variable or parameter
Default Value
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.27
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.28
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.29
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.30
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.31
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Service variables. Define general properties for the Integration Service such as email addresses,
log file counts, and error thresholds.
Service process variables. Define the directories for Integration Service files for each Integration
Service process. $PMRootDir, PMSessionLogDir, and $PMBadFileDir are examples of service
process variables.
10
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.32
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.33
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.34
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
From WhatIs.com
In data warehousing and business intelligence, a star schema is the simplest form of a dimensional
model, in which data is organized into facts and dimensions.
A fact is an event that is counted or measured, such as a sale or login.
A dimension contains reference information about the fact, such as date, product, or customer.
A star schema is diagramed by surrounding each fact with its associated dimensions. The resulting
diagram resembles a star.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.35
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.36
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Type
Passive or Active
Description
Mapplets combine multiple mapping objects for reusability; they can also
simplify complex mapping maintenance. A Mapplet receives input data from
either an internal Source or the Mapping pipeline that calls the Mapping. A
Mapplet must pass data out to the Mapping via a Mapplet Output
transformation.
Note
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.37
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Example
10
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.38
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Type
Passive
Description
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.39
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.40
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Type
Passive
Description
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.41
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.42
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.43
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Warning
10
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.44
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Note
Mapplets cannot be nested that is, you cannot use a Mapplet inside
another Mapplet.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.45
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.46
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.47
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
10.48
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
11.1
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
11
PowerCenter 9.x Level 1 Developer
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
11.2
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
11.3
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
11
PowerCenter 9.x Level 1 Developer
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
11.4
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
In this lab, we will build a fact table that tracks promotions by day for each dealership for each
product being sold.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
11.5
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
11
PowerCenter 9.x Level 1 Developer
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
12.1
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
12
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
12.2
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
12.3
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
12
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
12.4
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.
Unauthorized reproduction or distribution prohibited. Copyright 2012, Informatica and/or its affiliates.