Académique Documents
Professionnel Documents
Culture Documents
5.4
Installation Guide
Informatica Axon Data Governance Installation Guide
5.4
September 2018
© Copyright Informatica LLC 2015, 2018
This software and documentation are provided only under a separate license agreement containing restrictions on use and disclosure. No part of this document may be
reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise) without prior consent of Informatica LLC.
Informatica and the Informatica logo are trademarks or registered trademarks of Informatica LLC in the United States and many jurisdictions throughout the world. A
current list of Informatica trademarks is available on the web at https://www.informatica.com/trademarks.html. Other company and product names may be trade
names or trademarks of their respective owners.
U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial
computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such,
the use, duplication, disclosure, modification, and adaptation is subject to the restrictions and license terms set forth in the applicable Government contract, and, to the
extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License.
Portions of this software and/or documentation are subject to copyright held by third parties, including without limitation: Copyright DataDirect Technologies. All rights
reserved. Copyright © Sun Microsystems. All rights reserved. Copyright © RSA Security Inc. All Rights Reserved. Copyright © Ordinal Technology Corp. All rights
reserved. Copyright © Aandacht c.v. All rights reserved. Copyright Genivia, Inc. All rights reserved. Copyright Isomorphic Software. All rights reserved. Copyright © Meta
Integration Technology, Inc. All rights reserved. Copyright © Intalio. All rights reserved. Copyright © Oracle. All rights reserved. Copyright © Adobe Systems Incorporated.
All rights reserved. Copyright © DataArt, Inc. All rights reserved. Copyright © ComponentSource. All rights reserved. Copyright © Microsoft Corporation. All rights
reserved. Copyright © Rogue Wave Software, Inc. All rights reserved. Copyright © Teradata Corporation. All rights reserved. Copyright © Yahoo! Inc. All rights reserved.
Copyright © Glyph & Cog, LLC. All rights reserved. Copyright © Thinkmap, Inc. All rights reserved. Copyright © Clearpace Software Limited. All rights reserved. Copyright
© Information Builders, Inc. All rights reserved. Copyright © OSS Nokalva, Inc. All rights reserved. Copyright Edifecs, Inc. All rights reserved. Copyright Cleo
Communications, Inc. All rights reserved. Copyright © International Organization for Standardization 1986. All rights reserved. Copyright © ej-technologies GmbH. All
rights reserved. Copyright © Jaspersoft Corporation. All rights reserved. Copyright © International Business Machines Corporation. All rights reserved. Copyright ©
yWorks GmbH. All rights reserved. Copyright © Lucent Technologies. All rights reserved. Copyright © University of Toronto. All rights reserved. Copyright © Daniel
Veillard. All rights reserved. Copyright © Unicode, Inc. Copyright IBM Corp. All rights reserved. Copyright © MicroQuill Software Publishing, Inc. All rights reserved.
Copyright © PassMark Software Pty Ltd. All rights reserved. Copyright © LogiXML, Inc. All rights reserved. Copyright © 2003-2010 Lorenzi Davide, All rights reserved.
Copyright © Red Hat, Inc. All rights reserved. Copyright © The Board of Trustees of the Leland Stanford Junior University. All rights reserved. Copyright © EMC
Corporation. All rights reserved. Copyright © Flexera Software. All rights reserved. Copyright © Jinfonet Software. All rights reserved. Copyright © Apple Inc. All rights
reserved. Copyright © Telerik Inc. All rights reserved. Copyright © BEA Systems. All rights reserved. Copyright © PDFlib GmbH. All rights reserved. Copyright ©
Orientation in Objects GmbH. All rights reserved. Copyright © Tanuki Software, Ltd. All rights reserved. Copyright © Ricebridge. All rights reserved. Copyright © Sencha,
Inc. All rights reserved. Copyright © Scalable Systems, Inc. All rights reserved. Copyright © jQWidgets. All rights reserved. Copyright © Tableau Software, Inc. All rights
reserved. Copyright© MaxMind, Inc. All Rights Reserved. Copyright © TMate Software s.r.o. All rights reserved. Copyright © MapR Technologies Inc. All rights reserved.
Copyright © Amazon Corporate LLC. All rights reserved. Copyright © Highsoft. All rights reserved. Copyright © Python Software Foundation. All rights reserved.
Copyright © BeOpen.com. All rights reserved. Copyright © CNRI. All rights reserved.
This product includes software developed by the Apache Software Foundation (http://www.apache.org/), and/or other software which is licensed under various
versions of the Apache License (the "License"). You may obtain a copy of these Licenses at http://www.apache.org/licenses/. Unless required by applicable law or
agreed to in writing, software distributed under these Licenses is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express
or implied. See the Licenses for the specific language governing permissions and limitations under the Licenses.
This product includes software which was developed by Mozilla (http://www.mozilla.org/), software copyright The JBoss Group, LLC, all rights reserved; software
copyright © 1999-2006 by Bruno Lowagie and Paulo Soares and other software which is licensed under various versions of the GNU Lesser General Public License
Agreement, which may be found at http:// www.gnu.org/licenses/lgpl.html. The materials are provided free of charge by Informatica, "as-is", without warranty of any
kind, either express or implied, including but not limited to the implied warranties of merchantability and fitness for a particular purpose.
The product includes ACE(TM) and TAO(TM) software copyrighted by Douglas C. Schmidt and his research group at Washington University, University of California,
Irvine, and Vanderbilt University, Copyright (©) 1993-2006, all rights reserved.
This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (copyright The OpenSSL Project. All Rights Reserved) and
redistribution of this software is subject to terms available at http://www.openssl.org and http://www.openssl.org/source/license.html.
This product includes Curl software which is Copyright 1996-2013, Daniel Stenberg, <daniel@haxx.se>. All Rights Reserved. Permissions and limitations regarding this
software are subject to terms available at http://curl.haxx.se/docs/copyright.html. Permission to use, copy, modify, and distribute this software for any purpose with or
without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies.
The product includes software copyright 2001-2005 (©) MetaStuff, Ltd. All Rights Reserved. Permissions and limitations regarding this software are subject to terms
available at http://www.dom4j.org/ license.html.
The product includes software copyright © 2004-2007, The Dojo Foundation. All Rights Reserved. Permissions and limitations regarding this software are subject to
terms available at http://dojotoolkit.org/license.
This product includes ICU software which is copyright International Business Machines Corporation and others. All rights reserved. Permissions and limitations
regarding this software are subject to terms available at http://source.icu-project.org/repos/icu/icu/trunk/license.html.
This product includes software copyright © 1996-2006 Per Bothner. All rights reserved. Your right to use such materials is set forth in the license which may be found at
http:// www.gnu.org/software/ kawa/Software-License.html.
This product includes OSSP UUID software which is Copyright © 2002 Ralf S. Engelschall, Copyright © 2002 The OSSP Project Copyright © 2002 Cable & Wireless
Deutschland. Permissions and limitations regarding this software are subject to terms available at http://www.opensource.org/licenses/mit-license.php.
This product includes software developed by Boost (http://www.boost.org/) or under the Boost software license. Permissions and limitations regarding this software
are subject to terms available at http:/ /www.boost.org/LICENSE_1_0.txt.
This product includes software copyright © 1997-2007 University of Cambridge. Permissions and limitations regarding this software are subject to terms available at
http:// www.pcre.org/license.txt.
This product includes software copyright © 2007 The Eclipse Foundation. All Rights Reserved. Permissions and limitations regarding this software are subject to terms
available at http:// www.eclipse.org/org/documents/epl-v10.php and at http://www.eclipse.org/org/documents/edl-v10.php.
This product includes software licensed under the terms at http://www.tcl.tk/software/tcltk/license.html, http://www.bosrup.com/web/overlib/?License, http://
www.stlport.org/doc/ license.html, http://asm.ow2.org/license.html, http://www.cryptix.org/LICENSE.TXT, http://hsqldb.org/web/hsqlLicense.html, http://
httpunit.sourceforge.net/doc/ license.html, http://jung.sourceforge.net/license.txt , http://www.gzip.org/zlib/zlib_license.html, http://www.openldap.org/software/
release/license.html, http://www.libssh2.org, http://slf4j.org/license.html, http://www.sente.ch/software/OpenSourceLicense.html, http://fusesource.com/downloads/
license-agreements/fuse-message-broker-v-5-3- license-agreement; http://antlr.org/license.html; http://aopalliance.sourceforge.net/; http://www.bouncycastle.org/
licence.html; http://www.jgraph.com/jgraphdownload.html; http://www.jcraft.com/jsch/LICENSE.txt; http://jotm.objectweb.org/bsd_license.html; . http://www.w3.org/
Consortium/Legal/2002/copyright-software-20021231; http://www.slf4j.org/license.html; http://nanoxml.sourceforge.net/orig/copyright.html; http://www.json.org/
license.html; http://forge.ow2.org/projects/javaservice/, http://www.postgresql.org/about/licence.html, http://www.sqlite.org/copyright.html, http://www.tcl.tk/
software/tcltk/license.html, http://www.jaxen.org/faq.html, http://www.jdom.org/docs/faq.html, http://www.slf4j.org/license.html; http://www.iodbc.org/dataspace/
iodbc/wiki/iODBC/License; http://www.keplerproject.org/md5/license.html; http://www.toedter.com/en/jcalendar/license.html; http://www.edankert.com/bounce/
index.html; http://www.net-snmp.org/about/license.html; http://www.openmdx.org/#FAQ; http://www.php.net/license/3_01.txt; http://srp.stanford.edu/license.txt;
http://www.schneier.com/blowfish.html; http://www.jmock.org/license.html; http://xsom.java.net; http://benalman.com/about/license/; https://github.com/CreateJS/
EaselJS/blob/master/src/easeljs/display/Bitmap.js; http://www.h2database.com/html/license.html#summary; http://jsoncpp.sourceforge.net/LICENSE; http://
jdbc.postgresql.org/license.html; http://protobuf.googlecode.com/svn/trunk/src/google/protobuf/descriptor.proto; https://github.com/rantav/hector/blob/master/
LICENSE; http://web.mit.edu/Kerberos/krb5-current/doc/mitK5license.html; http://jibx.sourceforge.net/jibx-license.html; https://github.com/lyokato/libgeohash/blob/
master/LICENSE; https://github.com/hjiang/jsonxx/blob/master/LICENSE; https://code.google.com/p/lz4/; https://github.com/jedisct1/libsodium/blob/master/
LICENSE; http://one-jar.sourceforge.net/index.php?page=documents&file=license; https://github.com/EsotericSoftware/kryo/blob/master/license.txt; http://www.scala-
lang.org/license.html; https://github.com/tinkerpop/blueprints/blob/master/LICENSE.txt; http://gee.cs.oswego.edu/dl/classes/EDU/oswego/cs/dl/util/concurrent/
intro.html; https://aws.amazon.com/asl/; https://github.com/twbs/bootstrap/blob/master/LICENSE; https://sourceforge.net/p/xmlunit/code/HEAD/tree/trunk/
LICENSE.txt; https://github.com/documentcloud/underscore-contrib/blob/master/LICENSE, and https://github.com/apache/hbase/blob/master/LICENSE.txt.
This product includes software licensed under the Academic Free License (http://www.opensource.org/licenses/afl-3.0.php), the Common Development and
Distribution License (http://www.opensource.org/licenses/cddl1.php) the Common Public License (http://www.opensource.org/licenses/cpl1.0.php), the Sun Binary
Code License Agreement Supplemental License Terms, the BSD License (http:// www.opensource.org/licenses/bsd-license.php), the new BSD License (http://
opensource.org/licenses/BSD-3-Clause), the MIT License (http://www.opensource.org/licenses/mit-license.php), the Artistic License (http://www.opensource.org/
licenses/artistic-license-1.0) and the Initial Developer’s Public License Version 1.0 (http://www.firebirdsql.org/en/initial-developer-s-public-license-version-1-0/).
This product includes software copyright © 2003-2006 Joe WaInes, 2006-2007 XStream Committers. All rights reserved. Permissions and limitations regarding this
software are subject to terms available at http://xstream.codehaus.org/license.html. This product includes software developed by the Indiana University Extreme! Lab.
For further information please visit http://www.extreme.indiana.edu/.
This product includes software Copyright (c) 2013 Frank Balluffi and Markus Moeller. All rights reserved. Permissions and limitations regarding this software are subject
to terms of the MIT license.
DISCLAIMER: Informatica LLC provides this documentation "as is" without warranty of any kind, either express or implied, including, but not limited to, the implied
warranties of noninfringement, merchantability, or use for a particular purpose. Informatica LLC does not warrant that this software or documentation is error free. The
information provided in this software or documentation may include technical inaccuracies or typographical errors. The information in this software and documentation
is subject to change at any time without notice.
NOTICES
This Informatica product (the "Software") includes certain drivers (the "DataDirect Drivers") from DataDirect Technologies, an operating company of Progress Software
Corporation ("DataDirect") which are subject to the following terms and conditions:
1. THE DATADIRECT DRIVERS ARE PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO,
THE IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT.
2. IN NO EVENT WILL DATADIRECT OR ITS THIRD PARTY SUPPLIERS BE LIABLE TO THE END-USER CUSTOMER FOR ANY DIRECT, INDIRECT, INCIDENTAL,
SPECIAL, CONSEQUENTIAL OR OTHER DAMAGES ARISING OUT OF THE USE OF THE ODBC DRIVERS, WHETHER OR NOT INFORMED OF THE POSSIBILITIES
OF DAMAGES IN ADVANCE. THESE LIMITATIONS APPLY TO ALL CAUSES OF ACTION, INCLUDING, WITHOUT LIMITATION, BREACH OF CONTRACT, BREACH
OF WARRANTY, NEGLIGENCE, STRICT LIABILITY, MISREPRESENTATION AND OTHER TORTS.
The information in this documentation is subject to change without notice. If you find any problems in this documentation, report them to us at
infa_documentation@informatica.com.
Informatica products are warranted according to the terms and conditions of the agreements under which they are provided. INFORMATICA PROVIDES THE
INFORMATION IN THIS DOCUMENT "AS IS" WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT.
Chapter 1: Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Introduction to Axon. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Installation Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Installation Process. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Users. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Users in the Linux Environment. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Users in Axon. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
4 Table of Contents
Running the Installer in Console Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
Installing Axon. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23
Installing the Axon Agent. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Installing Axon and the Axon Agent. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
Running the Installer in Silent Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Installing Axon in Silent Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32
Installing the Axon Agent in Silent Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Installing Axon and the Axon Agent in Silent Mode. . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
Chapter 5: Uninstallation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Running the Axon Uninstaller. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
Running the Axon Agent Uninstaller. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
Chapter 6: Troubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Cannot Log In to Axon. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 43
Axon Does Not Load in the Browser. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
Incorrect Host Name. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Validation Utility Errors. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Uninstallation is Incomplete. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
Index. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
Table of Contents 5
Preface
The Axon Data Governance Installation Guide is intended to help an administrator in an enterprise to install
Axon.
This guide covers the tasks that you can perform using the Axon installer.
Informatica Resources
Informatica Network
Informatica Network hosts Informatica Global Customer Support, the Informatica Knowledge Base, and other
product resources. To access Informatica Network, visit https://network.informatica.com.
To access the Knowledge Base, visit https://kb.informatica.com. If you have questions, comments, or ideas
about the Knowledge Base, contact the Informatica Knowledge Base team at
KB_Feedback@informatica.com.
Informatica Documentation
To get the latest documentation for your product, browse the Informatica Knowledge Base at
https://kb.informatica.com/_layouts/ProductDocumentation/Page/ProductDocumentSearch.aspx.
If you have questions, comments, or ideas about this documentation, contact the Informatica Documentation
team through email at infa_documentation@informatica.com.
6
Informatica Product Availability Matrixes
Product Availability Matrixes (PAMs) indicate the versions of operating systems, databases, and other types
of data sources and targets that a product release supports. If you are an Informatica Network member, you
can access PAMs at
https://network.informatica.com/community/informatica-network/product-availability-matrices.
Informatica Velocity
Informatica Velocity is a collection of tips and best practices developed by Informatica Professional
Services. Developed from the real-world experience of hundreds of data management projects, Informatica
Velocity represents the collective knowledge of our consultants who have worked with organizations from
around the world to plan, develop, deploy, and maintain successful data management solutions.
If you are an Informatica Network member, you can access Informatica Velocity resources at
http://velocity.informatica.com.
If you have questions, comments, or ideas about Informatica Velocity, contact Informatica Professional
Services at ips@informatica.com.
Informatica Marketplace
The Informatica Marketplace is a forum where you can find solutions that augment, extend, or enhance your
Informatica implementations. By leveraging any of the hundreds of solutions from Informatica developers
and partners, you can improve your productivity and speed up time to implementation on your projects. You
can access Informatica Marketplace at https://marketplace.informatica.com.
To find your local Informatica Global Customer Support telephone number, visit the Informatica website at
the following link:
http://www.informatica.com/us/services-and-training/support-services/global-support-centers.
If you are an Informatica Network member, you can use Online Support at http://network.informatica.com.
Preface 7
Chapter 1
Overview
This chapter includes the following topics:
• Introduction to Axon, 8
• Installation Overview, 8
• Installation Process, 8
• Users, 10
Introduction to Axon
Axon Data Governance is a knowledge repository tool that you can use to document the data items that
require governance. Data owners, data stewards, subject matter experts, and other responsible stakeholders
collaborate across the organization to progressively chart the business reality of data, its lineage, and usage
across processes, policies, projects, and regulation.
Installation Overview
Informatica provides a validation utility to verify if your system meets the software requirements for
installation, and an installer to install Axon. Use the installer to install Axon, the Axon Agent, or both of them.
The Axon Agent is required by Axon to connect to Informatica Data Quality. You can install the Axon Agent on
the same machine where you install Axon, or on a different machine. You must provide the details of your
Informatica domain when you install the Axon Agent.
The Informatica domain is a collection of nodes and services that define the basic administrative unit for
Informatica Data Quality.
Installation Process
The installation of Axon consists of multiple phases that include preparation for the installation, planning the
deployment type, and post-installation tasks.
8
Preparation
Set up the system to meet the operating system requirements to ensure that you can successfully install
and run Axon and the Axon Agent. Run the validation utility to verify if your system meets the
requirements.
Planning
Before you run the Axon installer, you must plan your deployment.
Integrating Data Quality. Determine whether you intend to retrieve data quality scores and display them
in Axon dashboards. If yes, you must install both Axon and the Axon Agent. You can install the Axon
Agent on the same machine where you install Axon or on a different machine.
Retrieving Enterprise Metadata. Determine whether you want to discover and retrieve enterprise
metadata from Enterprise Data Catalog. To integrate Axon with Enterprise Data Catalog, you need to
configure certain advanced settings after you install Axon.
Complying with Data Security Standards. Determine whether you want Axon to integrate with
Secure@Source to verify if your data meets the security standards that are required for your
organization. To integrate Axon with Secure@Source, you need to configure certain advanced settings
after you install Axon.
The following table lists the choices that the Axon installer provides. Plan your deployment based on
these choices before you run the installer:
Integration with Informatica Data Quality. Axon Keep the details of your Choose to install Axon
integrates with Informatica Data Quality to retrieve Informatica domain and the Axon Agent, or
data quality scores and display them in the Axon ready. install only the Axon
dashboards. Agent if you have already
installed Axon.
Integration with Informatica Enterprise Data Catalog. Keep the details of your Choose the advanced
Axon integrates with Enterprise Data Catalog to Enterprise Data Catalog configuration step during
discover and retrieve metadata from the catalog deployment ready. Axon installation.
platform. The catalog represents an indexed inventory
of all the data assets in the enterprise.
Integration with Informatica Secure@Source. Axon Keep the details of your Choose the advanced
integrates with Secure@Source to identify sensitive Secure@Source configuration step during
data in your organization and verify if they comply with deployment ready. Axon installation.
data security standards.
Before you run the Axon installer, perform the preparatory steps described in the Before You Run the
Installer chapter.
After Installation
After you run the installer, perform the tasks described in the After You Run the Installer chapter. Access
Axon by typing the fully qualified host name in a web browser. Log in to verify if the installation is
successful.
Installation Process 9
Users
Users in Axon have privileges that allow them to interact with the Axon application in different ways. To
install and manage Axon effectively, you must have users with the correct privileges in the Linux environment
and Axon interface.
To install and manage Axon, you must have the following users in the Linux environment:
Root User
The Linux root user creates the Axon Administrator in Linux and provides a home directory to install Axon.
The root user is also required to upgrade Axon from version 5.2 or earlier.
Axon Administrator
This user is a non-root user who installs and manages Axon. The Axon Administrator monitors the Axon
application in the Linux environment, troubleshoots Axon services that might have stopped, and configures
Axon in Linux to connect with other applications.
The Axon Administrator must have read and write permissions on the Axon installation directory. The Axon
Administrator does not require the root or sudo privilege.
Users in Axon
You can view objects in Axon without logging in. After logging in, you can perform tasks on objects based on
the user profile that the administrator has associated with your account.
An Axon user can perform the following different types of tasks based on the profile that is assigned to their
account:
User Profiles
Every Axon user has a user profile. The type of profile decides the tasks that a user can perform in Axon. An
administrator associates user profiles to user accounts.
Users can have one of the following user profiles associated with their account:
WebUser
A WebUser is the most basic user profile in Axon. WebUsers have permission to view content.
10 Chapter 1: Overview
Admin
Users can perform administrative tasks on facets if they are assigned the Admin profile. Users with the
admin profile have access to the Admin Panel.
Users with the Admin profile can perform the following tasks from the Admin Panel:
SuperAdmin
Users with the SuperAdmin profile can perform all administrative tasks in Axon. In addition to the tasks
that a user with the Admin profile can perform, a user with a SuperAdmin profile can perform the
following tasks:
Users 11
Chapter 2
• System Requirements, 12
• Tasks Before You Run the Installer, 16
• Installer Directory Structure, 21
System Requirements
Verify that the system where you plan to install Axon meets the minimum requirements for the installation
process.
Component Description
Disk 200 GB
Memory 24 GB
CPU Cores 4
Applications - unzip
- tar
- RPM
- In
- setfacl
- YUM
- sed
- libargon2
You cannot install Axon on the same server where the Hadoop cluster for Enterprise Data Catalog is installed.
Important: Informatica recommends that you use a dedicated system to deploy Axon.
12
Performance
Make sure that the Linux system has at least 16 GB memory available so that Axon runs efficiently. To see
the available memory, run the free h command in your Linux environment. The value in the Mem row and free
column indicates the available memory in the system.
If the system has less than 16 GB memory available, contact the IT department of your organization to clear
the system memory.
If you choose to view the logs, make sure that the Linux system has 32 GB of memory and 10 CPU cores.
When you enable the viewing of logs, the Axon SuperAdmin can view log files in the Axon Admin Panel. You
can enable or disable this option during Step 2 of 7 of Axon installation. To enable or disable this option after
installation, see the Enable or Disable Viewing of Logs topic in the Axon Data Governance 5.4 Administrator
Guide. To know more about viewing logs, see the View Logs topic in the Axon Data Governance 5.4
Administrator Guide.
Port Requirements
The packages and services that Axon installs use unique ports. You can choose to change some of the port
numbers during installation. The installer sets up the ports for some of the third party services and
designates a range of dynamic ports to use for some application services. Verify that the port numbers are
available before you start the installation process.
Axon uses the internal ports for internal communication, and the external ports for external communication.
Note: Make sure that the external ports are open. If you want Axon to use the default ports for the services,
make sure that the ports are available before you start the installation process.
The following table describes the default ports used by the services:
System Requirements 13
Port Type Default Port Number
The following table describes the ports used by Enterprise Data Catalog:
The following table describes the ports used by the process map configuration:
The following table describes the ports used by the message broker:
The following table describes the port used by the search service Solr:
System Requirements
Make sure that the following RPMs or higher versions are available in your Linux system before you run the
Axon installer:
• freetype
• gettext-runtime
• grub2
• libjpeg62
• libopenssl1_0_0
• libpng15
• libXext6
• libXrender1
• libxslt1
• apr-1.4.8
• apr-util-1.5.2
• glibc-2.17
• libevent-2.0.21
• libselinux-2.5
• mailcap-2.1.41
• openssl-libs-1.0.2k
• systemd-219
• yajl-2.0.4
• glibc-2.22
• libapr1-1.5.1
• libapr-util1-1.5.3
• libevent-2_0-5-2.0.21
• libselinux1-2.5
• libyajl2-2.0.1
• metamail-2.7.19
• openssl-1.0.2j
System Requirements 15
• systemd-sysvinit-228
• apr-1.4.8
• apr-util-1.5.2
• glibc-2.17
• libevent-2.0.21
• libselinux-2.5
• mailcap-2.1.41
• openssl-libs-1.0.2k
• systemd-219
• yajl-2.0.4
To know more about the permissions, see the Provide Permissions for Running RPM Commands topic.
Note: The non-root user is called the Axon Administrator in this guide. All subsequent tasks in Linux must be
done by the Axon Administrator inside the home directory.
Run the following command to provide execute permission recursively for the RPM library directory:
chmod -R 755 /var/lib/rpm
Run the following command to show the IP address of your host name:
hostname -i
Run the following command to show the fully qualified domain name of your host:
hostname -f
Perform the following tasks in the Linux system where you want to install Axon:
Property Description
nofile Set the file descriptor limit per process to 16000 or higher. Informatica recommends 32000 file
descriptors per process.
nproc Set the user process to 1024 or higher. Informatica recommends 4096 user processes.
3. Exit and log in to the terminal for the changes to take effect.
The installer files are compressed and distributed as a .tar file. Use an extraction utility to extract the installer
files to the <SOURCE_BINARIES_DIRECTORY> directory on your machine.
The validation utility displays status messages when it runs. Follow the instructions given in the messages
before you proceed with running the Axon installer. After you run the validation utility, you can also verify the
log directory for log messages.
You can run the following command to check the existing package version that is installed in your Linux
system:
rpm -qa | grep <package_name>
For a list of RPMs required by the Axon installer, see the Internal RPM Package Manager Files topic in the
Before You Run the Installer chapter.
Axon can connect to the Informatica domain to extract profile and scorecard information from Data
Quality. You must provide the following details of your Informatica domain if you choose to install the
Axon Agent when you run the Axon installer:
• Domain name
• Node port number
• Model Repository Service node name
• Model Repository Service domain host name
• Model Repository Service username and password
• Model Repository Service name
• Model Repository Service security domain
• Model Repository Service SSL details
• Data Integration Service node name
• Data Integration Service domain host name
• Data Integration Service username and password
• Data Integration Service name
• Data Integration Service security domain
• Data Integration Service SSL details
Axon can discover and retrieve enterprise metadata from Enterprise Data Catalog. To integrate Axon
with Enterprise Data Catalog, you must provide the following details of your Enterprise Data Catalog
installation:
Secure@Source
Axon can display the security status of your data from Secure@Source. To integrate Axon with
Secure@Source, you must provide the following details of your Secure@Source installation:
Note: If you plan to integrate Axon with Secure@Source, you must ensure that Secure@Source and
Enterprise Data Catalog have been configured properly and are running.
You must have the following information ready before you start the installation:
Copy the SSL certificate file and SSL key file to a directory on which the Axon Administrator has read and
write permissions.
Note: If the SSL certificate is in the DER format, go to the certificate location and run the following command
to convert the certificate to the PEM format:
openssl x509 -in <DER_file_name> -inform der -outform pem -out <PEM_file_output_name>
For example, if the SSL certificate file is cert.der, and you want to convert the file to cert.pem, run the
following command:
openssl x509 -in cert.der -inform der -outform pem -out cert.pem
When Axon connects to other Informatica products and acts as the server, Axon supports TLS versions 1.0,
1.1, and 1.2.
After you extract the installer file, you can find the following files and directories in the
<SOURCE_BINARIES_DIRECTORY> directory:
• install.sh file
• silentinstall.sh file
• Messages directory
• SilentInput_AxonAgent.properties file
• SilentInput.properties file
• Server directory
• properties directory
• source directory
• The installer .tar file
• log directory
You can install Axon or the Axon Agent in one of the following ways:
• Console mode. Interact with the installer wizard to configure the installation parameters. After you run the
installer file, the interactive wizard prompts you to enter the parameters at each step of the installation.
• Silent mode. Install without user intervention. Enter the installation parameters in the installer properties
file before you start the installation. After you have prepared the installer properties file, run the installer
file. The installer reads the parameters from the properties files, runs in the background, and installs Axon
or the Axon Agent.
The console mode installer and silent mode installer files are located in the <SOURCE_BINARIES_DIRECTORY>
directory.
22
2. Ensure that no Axon-related service is running. If you are running an earlier version of Axon, go to the
<INSTALLATION_DIR>/bin directory and run the following command to shut down Axon and all Axon
services:
shutdown.sh
3. From the command line, run the install.sh file.
4. Enter the number corresponding to one of the following options to continue:
Option Description
2. Install Axon Agent. Run the installer to install the Axon Agent.
3. Install both Axon and Axon Agent. Run the installer to install both Axon and the Axon Agent.
Installing Axon
Select the option to install only Axon if you do not want to install the Axon Agent. Informatica recommends
that you run the validation utility before you run the Axon installer.
Run the install.sh file, and select option 1 Install only Axon.
Note: When you install Axon, the installer prompts you to enter the port numbers of the Axon services. At
each prompt, press the Enter key to proceed with the default port. If you want to enter custom port numbers,
make sure that the port numbers are in the range of 1025 to 65535.
Step 1 of 7
Review the information on the screen, and type 1 to continue with the installation.
To upgrade your Axon installation to a newer version, type 2. For more information, see the Axon Data
Governance Upgrade Guide guide in the Informatica Knowledge Base.
Step 2 of 7
• Directory where you want to install Axon. Press the Enter key to proceed with the default directory.
• Path to the Axon license key file.
Note: If you install Axon as the Axon Administrator, you must have read permission for the directory
where the license key file is located.
• Path to your cryptographic private key. Press the Enter key to proceed with the default key that the
Axon installer provides. The installer uses this key to encrypt the passwords that you type during
installation.
Note: The private key file must have a minimum of 16 characters.
• Option to connect to the Axon server using a proxy host name. If you do not select this option, the
installer uses the URL of the Axon server as the host name. If you select this option, enter the proxy
host name.
• Option to allow the Axon SuperAdmin to view log files in the Axon Admin Panel. If you enable this
option now, you can disable it any time after installation is complete.
Note: If you enable this option, make sure that the Linux system has 32 GB of memory and 10 CPU
cores. For more information on the requirements to run Axon, see the System Requirements topic in
the Axon Data Governance 5.4 Installation Guide.
Step 3 of 7
If you install Axon as a root user, specify the Axon Administrator that installs and manages Axon. This
user is a non-root user that must have read and write permission on the Axon installation directory.
Step 4 of 7
Review the pre-installation summary information. Press the Enter key to continue. If you want to make
changes to the information you provided, type in Back and press Enter.
Step 5 of 7
Step 6 of 7
After the installation progress reaches 100%, you can choose to set advanced configurations.
Step 6A of 7
Type 1 if you want to enable HTTPS authentication, and then enter the values for the following
parameters:
Step 6B of 7
Specify the port numbers of the following services. At each step, press the Enter key to proceed with the
default port.
Press the Enter key to proceed with the default port numbers for the OrientDB database configurations.
Note: Do not enter custom port numbers for the OrientDB database configurations.
Step 6D of 7
Specify the port number for the message broker. Press the Enter key to proceed with the default port.
Step 6E of 7
Specify the Tomcat port number for Apache Solr that Axon uses for indexing. Press the Enter key to
proceed with the default port.
Type 1 to integrate Axon with Enterprise Data Catalog. Type 2 to skip to step 7.
Note: If you want to integrate Axon with Enterprise Data Catalog at a later stage after installation, see the
Configure Access to Enterprise Data Catalog topic in the After You Run the Installer chapter.
Note: If you want to integrate Axon with Secure@Source at a later stage after installation, see the
Configure Access to Secure@Source topic in the After You Run the Installer chapter.
Step 6F of 7
Enter values for the following parameters of the Enterprise Data Catalog installation:
Step 6G of 7
Note: The Axon installation process might take some time to complete. To view the status of the installation,
open the file <INSTALLATION_DIRECTORY>/Configure.log.
Step 7 of 7
Review the installation summary to verify that all components are successfully installed.
Run the install.sh file, and select option 2 Install only the Axon Agent.
Note: The console is refreshed and the installation screen is cleared. You might want to note down any
important information on the screen.
Step 1 of 9
Review the information on the screen, and press the Enter key to continue.
Step 2 of 9
Choose the version of the Informatica domain that you want Axon to connect to.
If you run the install.sh file as a root user, specify the non-root user that installs and manages the
Axon Agent. The non-root user must have read and write permission on the Axon Agent installation
directory.
Step 3 of 9
Enter the path to the directory where you want the installer to install the Axon Agent.
Step 4 of 9
Review the pre-installation summary information. Press the Enter key to continue. If you want to make
changes to the information you provided, type Back and press Enter.
Step 5 of 9
Step 6 of 9
Specify the details of the Model Repository Service (MRS). Enter values for the following parameters:
• Domain name
• Node port
• MRS domain host
• MRS node name
• MRS user name
• MRS password
• MRS service name
• Security domain of the MRS user. Choose LDAP or your native domain as the security domain. Press
the Enter key to proceed with the native domain as default.
• SSL security. Specify whether SSL security is enabled for your MRS system. Press the Enter key to
proceed with no SSL security as the default option. If you select yes, you must provide the local path
to the trust store file.
• Custom SSL authentication. Specify whether your MRS system uses custom SSL authentication.
Press the Enter key to proceed with no custom SSL authentication as the default option. If you select
yes, you must provide the SSL password.
Specify the details of the Data Integration Service (DIS). Enter values for the following parameters:
• Node port
• DIS domain host
• DIS node name
• DIS user name
• DIS password
• DIS service name
• Security domain of the DIS user. Choose LDAP or your native domain as the security domain. Press
the Enter key to proceed with the native domain as default.
Note: If you choose LDAP as your security domain, you must point the Axon Agent to connect to your
organization's LDAP server. For more information, see the Modify Connection Details topic in the
Monitoring Axon chapter of the Axon Data Governance 5.4 Administrator Guide.
• SSL security. Specify whether SSL security is enabled for your DIS system. Press the Enter key to
proceed with no SSL security as the default option. If you select yes, you must provide the local path
to the trust store file.
• Custom SSL authentication. Specify whether your DIS system uses custom SSL authentication. Press
the Enter key to proceed with no custom SSL authentication as the default option. If you select yes,
you must provide the SSL password.
Step 8 of 9
Specify the details of the Axon installation. The Axon Agent uses the parameters you provide here to
connect to Axon. Enter values for the following parameters:
• HTTPS authentication
• Axon URL in the format http(s)://<host_name>:<9999_or_9443_or_custom_port_number>
Note: The default port number for HTTP authentication is 9999, and the default port number for
HTTPS authentication is 9443. Do not enter a forward slash (/) after the URL.
• Axon user name
Note: If you use Single Sign-On (SSO) for Axon, do not enter the SSO user name. Enter the user name
that is configured in the Axon application.
• Axon password
Note: If you use Single Sign-On (SSO) for Axon, do not enter the SSO password. Enter the password
that is configured in the Axon application.
• HTTP port where you want to run the Axon Agent.
Step 9 of 9
Review the installation summary to verify that all components are successfully installed.
To verify that the Axon Agent is running, open the file <Axon_Agent_Home>/logs/dq-axon/dqagent.log
Run the install.sh file, and select option 3 Install both Axon and the Axon Agent.
Step 1 of 7
Review the information on the screen, and type 1 to continue with the installation.
To upgrade your Axon installation to a newer version, type 2. For more information, see the Axon Data
Governance Upgrade Guide guide in the Informatica Knowledge Base.
Step 2 of 7
• Directory where you want to install Axon. Press the Enter key to proceed with the default directory.
• Path to the Axon license key file.
Note: If you install Axon as the Axon Administrator, you must have read permission for the directory
where the license key file is located.
• Path to your cryptographic private key. Press the Enter key to proceed with the default key that the
Axon installer provides. The installer uses this key to encrypt the passwords that you type during
installation.
Note: The private key file must have a minimum of 16 characters.
• Option to connect to the Axon server using a proxy host name. If you do not select this option, the
installer uses the URL of the Axon server as the host name. If you select this option, enter the proxy
host name.
• Option to allow the Axon SuperAdmin to view log files in the Axon Admin Panel. If you enable this
option now, you can disable it any time after installation is complete.
Note: If you enable this option, make sure that the Linux system has 32 GB of memory and 10 CPU
cores. For more information on the requirements to run Axon, see the System Requirements topic in
the Axon Data Governance 5.4 Installation Guide.
The installer performs a check to validate the system requirements and verifies whether the license key
and cryptographic private key files exist in the directory locations that you have provided.
Step 3 of 7
If you install Axon as a root user, specify the Axon Administrator that installs and manages Axon. This
user is a non-root user that must have read and write permission on the Axon installation directory.
Step 4 of 7
Review the pre-installation summary information. Press the Enter key to continue. If you want to make
changes to the information you provided, type in Back and press Enter.
Step 5 of 7
Step 6 of 7
After the installation progress reaches 100%, you can choose to set advanced configurations.
Type 1 if you want to enable HTTPS authentication, and then enter the values for the following
parameters:
Step 6B of 7
Specify the port numbers of the following services. At each step, press the Enter key to proceed with the
default port.
Step 6C of 7
Specify the port numbers for the OrientDB database configurations. At each step, press the Enter key to
proceed with the default port.
Step 6D of 7
Specify the port number for the message broker. Press the Enter key to proceed with the default port.
Step 6E of 7
Specify the Tomcat port number for Apache Solr that Axon uses for indexing. Press the Enter key to
proceed with the default port.
Type 1 to integrate Axon with Enterprise Data Catalog. Type 2 to skip to step 7.
Note: If you want to integrate Axon with Enterprise Data Catalog at a later stage after installation, see the
Configure Access to Enterprise Data Catalog topic in the After You Run the Installer chapter.
Note: If you want to integrate Axon with Secure@Source at a later stage after installation, see the
Configure Access to Secure@Source topic in the After You Run the Installer chapter.
Enter values for the following parameters of the Enterprise Data Catalog installation:
Step 6G of 7
Note: The Axon installation process might take some time to complete. To view the status of the installation,
open the file <INSTALLATION_DIRECTORY>/Configure.log.
Step 7 of 7
Review the installation summary to verify that all components are successfully installed.
Note: The console is refreshed and the installation screen is cleared. You might want to note down any
important information on the screen.
Step 1 of 9
Review the information on the screen, and press the Enter key to continue.
Step 2 of 9
Choose the version of the Informatica domain that you want Axon to connect to.
If you run the install.sh file as a root user, specify the non-root user that installs and manages the
Axon Agent. The non-root user must have read and write permission on the Axon Agent installation
directory.
Step 3 of 9
Enter the path to the directory where you want the installer to install the Axon Agent.
If you install the Axon Agent as a root user, specify the Axon Administrator that installs and manages
Axon. This user is a non-root user that must have read and write permission on the Axon Agent
installation directory.
Step 4 of 9
Review the pre-installation summary information. Press the Enter key to continue. If you want to make
changes to the information you provided, type Back and press Enter.
Step 6 of 9
Specify the details of the Model Repository Service (MRS). Enter values for the following parameters:
• Domain name
• Node port
• MRS domain host
• MRS node name
• MRS user name
• MRS password
• MRS service name
• Security domain of the MRS user. Choose LDAP or your native domain as the security domain. Press
the Enter key to proceed with the native domain as default.
• SSL security. Specify whether SSL security is enabled for your MRS system. Press the Enter key to
proceed with no SSL security as the default option. If you select yes, you must provide the local path
to the trust store file.
• Custom SSL authentication. Specify whether your MRS system uses custom SSL authentication.
Press the Enter key to proceed with no custom SSL authentication as the default option. If you select
yes, you must provide the SSL password.
Step 7 of 9
Specify the details of the Data Integration Service (DIS). Enter values for the following parameters:
• Node port
• DIS domain host
• DIS node name
• DIS user name
• DIS password
• DIS service name
• Security domain of the DIS user. Choose LDAP or your native domain as the security domain. Press
the Enter key to proceed with the native domain as default.
Note: If you choose LDAP as your security domain, you must point the Axon Agent to connect to your
organization's LDAP server. For more information, see the Modify Connection Details topic in the
Monitoring Axon chapter of the Axon Data Governance 5.4 Administrator Guide.
• SSL security. Specify whether SSL security is enabled for your DIS system. Press the Enter key to
proceed with no SSL security as the default option. If you select yes, you must provide the local path
to the trust store file.
• Custom SSL authentication. Specify whether your DIS system uses custom SSL authentication. Press
the Enter key to proceed with no custom SSL authentication as the default option. If you select yes,
you must provide the SSL password.
Step 8 of 9
Specify the details of the Axon installation. The Axon Agent uses the parameters you provide here to
connect to Axon. Enter values for the following parameters:
• HTTPS authentication
Step 9 of 9
Review the installation summary to verify that all components are successfully installed.
To verify that the Axon Agent is running, open the file <Axon_Agent_Home>/logs/dq-axon/dqagent.log
Option Description
2. Install Axon Agent. Run the installer to install the Axon Agent.
3. Install both Axon and Axon Agent. Run the installer to install both Axon and the Axon Agent.
1. Enter the installation parameters in the property files available in the <SOURCE_BINARIES_DIRECTORY>
directory.
• To configure properties for Axon installation, enter the installation parameters in the
SilentInput.properties file.
• To configure properties for the Axon Agent installation, enter the installation parameters in the
SilentInput_AxonAgent.properties file.
2. Run the silentinstall.sh file, and select option 3 Install both Axon and the Axon Agent.
The installer installs both Axon and the Axon Agent and displays a message when the installation is
complete.
• To view the status of the Axon installation, open the following file:
<INSTALLATION_DIRECTORY>/Configure.log
• To verify that the Axon Agent is running, open the following file:
<Axon_Agent_Home>/logs/dq-axon/dqagent.log
You must have the Super Admin profile to perform this task.
1. From the Axon toolbar, click the Admin Panel menu item under your user name.
2. In the menu on the left, under the Customize & Configure category, click Configure Axon.
3. In the Group dropdown, select Enterprise Data Catalog.
4. Click Edit, and configure the following properties:
Property Description
Enterprise Data Catalog Server Host URL of the Enterprise Data Catalog service in the following format:
http(s)://<host_name> or http(s)://<IP_address>
Enterprise Data Catalog Server Port Port number of the Enterprise Data Catalog service
Enterprise Data Catalog Server Login User name to log in to Enterprise Data Catalog server
User Name
34
Property Description
Enterprise Data Catalog Server Login Password to log in to Enterprise Data Catalog server
Password
Enterprise Data Catalog Server Login User security domain of Enterprise Data Catalog server
Namespace
Enterprise Data Catalog Resource Name of the Axon resource created in Enterprise Data Catalog that
Name connects to your specific Axon application
5. Click Save.
6. In the Linux environment, run the following command to clear the contents of the cache directory:
rm -rf <INSTALLATION_DIRECTORY>/axonhome/axon/app/cache/*
7. Go to the <INSTALLATION_DIR>/axonhome/third-party-app/scripts directory, and run the following
commands to restart the Memcached and HTTPD services:
sh memcached restart
sh httpd restart
Note: When you clear the cache and restart the Memcached and HTTPD services, the Axon web interface
might be disrupted for some users that are logged into Axon. Informatica recommends that you update the
cache after you save your changes in all the Configure Axon pages. Additionally, perform this action during a
maintenance period when very few users are using Axon.
You must have the following library versions running on your Linux system:
To check the existing versions of cURL and NSS libraries, run the following command:
curl --version
To upgrade the cURL and NSS libraries to the latest versions, run the following commands:
yum upgrade curl
yum upgrade nss
You must have the Super Admin profile to perform this task.
1. From the Axon toolbar, click the Admin Panel menu item under your user name.
2. In the menu on the left, under the Customize & Configure category, click Configure Axon.
3. In the Group dropdown, select Data Quality.
4. Click Edit, and configure the following properties:
Property Description
Data Quality Server Host Host name of the system where you installed the Axon Agent
Data Quality Server Port Port number on which the Axon Agent runs
5. Click Save.
6. In the Linux environment, run the following command to clear the contents of the cache directory:
rm -rf <INSTALLATION_DIRECTORY>/axonhome/axon/app/cache/*
7. Go to the <INSTALLATION_DIR>/axonhome/third-party-app/scripts directory, and run the following
commands to restart the Memcached and HTTPD services:
sh memcached restart
sh httpd restart
Note: When you clear the cache and restart the Memcached and HTTPD services, the Axon web interface
might be disrupted for some users that are logged into Axon. Informatica recommends that you update the
cache after you save your changes in all the Configure Axon pages. Additionally, perform this action during a
maintenance period when very few users are using Axon.
You must have the Super Admin profile to perform this task.
1. From the Axon toolbar, click the Admin Panel menu item under your user name.
2. In the menu on the left, under the Customize & Configure category, click Configure Axon.
3. In the Group dropdown, select Secure@Source.
Property Description
Secure@Source Server Host URL of the Secure@Source service in the following format:
http(s)://<host_name> or http(s)://<IP_address>
Secure@Source Server Login User User name to log in to the Secure@Source server
Name
5. Click Save.
6. In the Linux environment, run the following command to clear the contents of the cache directory:
rm -rf <INSTALLATION_DIRECTORY>/axonhome/axon/app/cache/*
7. Go to the <INSTALLATION_DIR>/axonhome/third-party-app/scripts directory, and run the following
commands to restart the Memcached and HTTPD services:
sh memcached restart
sh httpd restart
Note: When you clear the cache and restart the Memcached and HTTPD services, the Axon web interface
might be disrupted for some users that are logged into Axon. Informatica recommends that you update the
cache after you save your changes in all the Configure Axon pages. Additionally, perform this action during a
maintenance period when very few users are using Axon.
You must update the Axon cache when you perform the following configurations:
To clear the Axon cache and load the cache with the new configuration values, perform the following steps in
the Linux environment:
1. Run the following command to clear the contents of the cache directory:
rm -rf <INSTALLATION_DIRECTORY>/axonhome/axon/app/cache/*
2. Go to the <INSTALLATION_DIR>/axonhome/third-party-app/scripts directory, and run the following
commands to restart the Memcached and HTTPD services:
sh memcached restart
sh httpd restart
Note: When you clear the cache and restart the Memcached and HTTPD services, the Axon web interface
might be disrupted for some users that are logged into Axon. Informatica recommends that you update the
cache after you save your changes in all the Configure Axon pages. Additionally, perform this action during a
maintenance period when very few users are using Axon.
Log in to Axon as an administrator, go to the Admin Panel, and view the Admin Dashboard. The Status of
Axon Services section shows the services that are operational.
Axon uses the following services, which are located in the <INSTALLATION_DIR>/axonhome/third-party-
app/scripts directory in the Linux environment:
The Axon installer assigns the following default port numbers for the Apache server:
• If you use HTTP authentication, the installer assigns 9999 as the default port number for the Apache
server.
• If you use HTTPS authentication, the installer assigns 9443 as the default port number for the Apache
server.
Depending on whether you selected the default port number or entered a custom port number for the Apache
server during installation, you must enter the correct port number in the browser address field.
1. Open a browser.
2. In the address field, type the fully qualified host name for the Axon login page in the following format:
http(s)://<host_name>:<9999_or_9443_or_custom_port_number>/
3. From the Axon home page, on the top right corner of the toolbar, click Login.
4. Enter your login credentials. The following are the default login credentials for the Super Admin user:
Username: admin@informatica.com
Password: changeme
5. Click Login.
Axon refreshes the page and displays your username in the toolbar, indicating that you have successfully
logged in.
When you log in to Axon for the first time, Informatica recommends that you modify your login password for
security purposes. The password must be at least eight characters long and contain at least one lowercase
character, one uppercase character, one numeric digit, and one special character.
Uninstallation
This chapter includes the following topics:
Note: If the <INSTALLATION_DIR>/Uninstaller_axon directory does not contain the uninstaller.sh script
file, perform the following tasks:
1. Go to the <INSTALLATION_DIR>/bin directory and run the following command to shut down Axon:
shutdown.sh
2. Delete the <INSTALLATION_DIR> directory where Axon is installed.
41
Running the Axon Agent Uninstaller
Run the Axon Agent uninstaller to remove the Axon Agent from your system.
Note: If you installed the Axon Agent in silent mode, the uninstaller removes the Axon Agent in silent mode.
The console does not prompt you to press the Enter key after you run the uninstaller file, and it does not
display the progress indicator during uninstallation.
42 Chapter 5: Uninstallation
Chapter 6
Troubleshooting
This chapter includes the following topics:
<INSTALLATION_DIR>/axonhome/license/
Note: Make sure that the new license key file and expired license key file share the same name.
3. Run the following command to clear the contents of the cache directory:
rm -rf <INSTALLATION_DIRECTORY>/axonhome/axon/app/cache/*
4. Go to the <INSTALLATION_DIR>/axonhome/third-party-app/scripts directory, and run the following
command to restart the Memcached service:
sh memcached restart
43
Axon Does Not Load in the Browser
You can access Axon by typing the fully qualified host name in the address bar of a web browser. In the
address field, type the fully qualified host name for the Axon login page in the following format: http(s)://
<host_name>:<port_number>/
If Axon does not load in the browser, perform the following tasks.
<INSTALLATION_DIR>/axonhome/license/
Note: Make sure that the new license key file and expired license key file share the same name.
3. Run the following command to clear the contents of the cache directory:
rm -rf <INSTALLATION_DIRECTORY>/axonhome/axon/app/cache/*
4. Go to the <INSTALLATION_DIR>/axonhome/third-party-app/scripts directory, and run the following
command to restart the Memcached service:
sh memcached restart
44 Chapter 6: Troubleshooting
Verify Axon Settings and Parameters
Check if the Axon settings and Admin Panel parameters are correct. You can modify some of the Admin
Panel settings from the Linux environment. You can run specific commands to display the current parameter
values, reset the parameters to their default values, or enter new parameter values.
For more information, see the Modify Admin Panel Settings from the Linux Environment topic in the Monitoring
Axon chapter of the Axon Data Governance 5.4 Administrator Guide.
Run the following command to show the IP address of your host name:
hostname -i
Run the following command to show the fully qualified domain name of your host:
hostname -f
Upgrade your version of OpenSSL to openssl-libs-1.0.2k if you see the following error when you run the
validation utility:
Your system contains internal RPMs that are lower than the versions required for Axon.
Install the following internal RPM versions before you proceed: openssl-libs-1.0.2k
Uninstallation is Incomplete
If Axon is not uninstalled properly, the services are not stopped. The Uninstaller_axon directory is deleted
from your system, but other Axon files and directories remain.
This issue occurs if you did not press the Enter key after Step 7 of the Axon installation procedure. For more
information, see “Installing Axon” on page 23.
Perform the following steps to complete the uninstallation and remove all the Axon files present in the Axon
home and installation directories:
1. Go to the <INSTALLATION_DIR>/bin directory and run the following command to shut down Axon:
shutdown.sh
2. Delete the <INSTALLATION_DIR> directory where Axon is installed.
To verify that uninstallation is complete, check whether all services have stopped. If any service is running,
you must stop the service. For more information, see the Check the Status of the Services topic in the After
You Run the Installer chapter.
A U
Axon user profile
user 10 admin 10
user profile 10 superadmin 10
webuser 10
S
services
check status 38
46