Skip to main content

Informatica Repository Backup and restore

How to take Informatica Repository Backup  and restore it.

Informatica Repository backup can be taken in 2 ways


  1. Admin Console
  2. pmrep command



Using Admin Console


  1. Login to admin console.
  2. Select Repository service
  3. Select Backup contents under Actions menu to take backup of repository contents.
  4. Provide repository service username, password.
  5. provide a name for the backup that will create a backup file with .rep extension.
  6. the backup will be generally stored to infa_shared backup folder.



Using pmrep command

pmrep connect -r <repository_name> -d <domain_name> -n <user_name> -x <password>

pmrep backup -o <output_file_name> [-d <description>] [-f (overwrite existing output file)] [-b (skip workflow and session logs)]  [-j (skip deploy group history)] [-q (skip MX data)] [-v (skip task statistics)]


Restore Backup:

Using pmrep command

To restore a repository backup, it is to be ensured that the repository database schema is empty as there is no option to forcefully restore a repository backup unlike domain restore.

However, a delete command may be issued to delete the repository contents before a repository backup in case if there is repository contents alreayd present in the schema.

To delete contents (if exists) and restore the repository contents from a backup file, do the following:
​​pmrep connect with user
pmrep connect -r repository_name <-d domain_name | -h portal_host_name -o portal_port_number> -n username -x password
pmrep delete
pmrep delete -x repository_password_for_confirmation -f (forceful delete: unregisters local repositories and delete)
pmrep connect without user -- This is required to connect to the repository does not have any content during restore i.e empty schema
pmrep connect -r repository_name <-d domain_name | -h portal_host_name -o portal_port_number>
pmrep restore
pmrep restore -u domain_user_name -s domain_user_security_domain -p domain_password -i input_file_name [-b (skip workflow and session logs) -j (skip deployment group history) -q (skip MX data) -f (skip task statistics)]

Using admin console

  1. Login to admin console.
  2. Select Repository service
  3. Select restore contents under Actions menu to restore repository contents.
  4. Provide repository service username, password.
  5. provide a name and path for the backup file to be restored.


Comments

Popular posts from this blog

Gateway port to use 80 to 443 on Tableau Server

Change Gateway port from 80 to 443 or 8080       To change the Gateway port from 80 to 443 then use below commands First , list your nodes with the command. tsm topology list-node  Then execute the command to set port  tsm topology set-ports --node-name node1 --port-name gateway:primary --port-value 443 The above command will ask for a restart.  Check ports using  tsm topology list-ports  If some error occurs in applying changes: try disabling (enable later) external ssl first- tsm security external-ssl disable You might need to run init command again with new port- tsm reset tabcmd initialuser --server localhost:443 --username 'ADMINUSER' --password 'adminpwd'

Creating Groups using Tableau API and Python Script

 Creating Tableau Groups using Python and API Prerequisites: Python on the machine tableauserverclient module API enabled on Tableau server. Permissions to update for the user Groups.csv file . list all groups in a csv file Changes to be made in the script for below lines in the script groups = open('<Filepath>/groups.csv') pat='getyourpersonaltoken' server = TSC.Server('http://myserver.tableau.com',use_server_version=True) tokenName = 'mytokenname' Script: import tableauserverclient as TSC import csv groups = open('<Filepath>/groups.csv') grp = csv.reader(groups) sourcegroups=[] createdgrps=[] pat='getyourpersonaltoken' server = TSC.Server('http://myserver.tableau.com',use_server_version=True) tokenName = 'mytokenname' ta = TSC.PersonalAccessTokenAuth(token_name=tokenName, personal_access_token=pat) with server.auth.sign_in_with_personal_access_token(ta):    groupslist, pagination_item  = server.groups.get() ...

Tableau dirty Backup

Steps for performing a dirty restore 1. Install Tableau Server 2019.1.0 on the Dev machine 2. Stop Tableau Server 3. Copy the following folders from the current production: D:\Tableau Server\data\tabsvc\pgsql D:\Tableau Server\data\tabsvc\dataengine 4. Update the pg_hba.conf D:\Tableau Server\data\tabsvc\config\pgsql_0.<version>/pg_hba.conf Change "md5" to "trust" for the user "tblwgadmin" like this: host    all         tblwgadmin         <address>/32          md5 to : host    all         tblwgadmin        <address>/32         trust 5. Regenerate the internal token: tsm security regenerate-internal-tokens [options] [global options] tsm pending-changes apply 6. Re-index tsm maintenance reindex-search 7. Make a proper backup: tsm maintenance backup -f myBackup At this point, we w...