From d365d681ce52757cd9c28dc6ed32b779fd185033 Mon Sep 17 00:00:00 2001 From: Jared Balkman <jared.balkman@wisc.edu> Date: Thu, 5 Jan 2023 11:38:40 -0600 Subject: [PATCH] Fixed a couple anchor links and Informatica kb link; removed out-of-memory section --- docs/secure-agent.md | 10 +++------- 1 file changed, 3 insertions(+), 7 deletions(-) diff --git a/docs/secure-agent.md b/docs/secure-agent.md index 906619b..b723b9d 100644 --- a/docs/secure-agent.md +++ b/docs/secure-agent.md @@ -11,13 +11,13 @@ # Secure Agents A Secure Agent is a Java program that runs integration tasks and enables secure communication across the firewall between our organization and -IICS. More details can be found [here](https://docs.informatica.com/integration-cloud/cloud-platform/current-version/runtime-environments/runtime-environments/secure-agents.html). +IICS. More details can be found [here](https://docs.informatica.com/integration-cloud/cloud-platform/current-version/runtime-environments/secure-agents.html). ## Costs Secure Agents are licensed at a per-Secure-Agent rate. Secure Agents are installed at one Secure Agent per VM/host, or one Secure Agent per Docker Container. -For more information on the cost of a Secure Agent license, [please see this documentation on pricing](../pricing.md). +For more information on the cost of a Secure Agent license, [please see this documentation on pricing](../master/docs/pricing.md). ## Responsibilities @@ -28,7 +28,7 @@ The Secure Agent program is upgraded automatically by Informatica, but you are r The DoIT Integration Platform team has experience managing secure agents. We run our secure agent in a Docker container on Linux, hosted by Amazon Web Services (AWS). -[Instructions on setting up and running a Secure Agent in a similar manner are available here](../training/docker-secure-agent.md) if you want to build and try it yourself. +[Instructions on setting up and running a Secure Agent in a similar manner are available here](../master/docs/training/docker-secure-agent.md) if you want to build and try it yourself. We use AWS Elastic Container Service (ECS) to manage the secure agent deployment environment. By allowing ECS to run the Secure Agent container, we can make sure that the Secure Agent is always running because ECS would bring up a new instance if the current instance crashed. @@ -54,10 +54,6 @@ If one Secure Agent were to crash, the other would be able to handle requests wh For more information on Secure Agents with Cloud Application Integration, please [see this documentation from Informatica](https://kb.informatica.com/faq/7/pages/19/514162.aspx). -## Managing Out-of-Memory Errors - -If running in to errors relating to memory, refer to this [Informatica Knowledge Base Article](https://knowledge.informatica.com/s/article/336913?language=en_US). - ## Secure Agents For Training Purposes There are multiple options if you are looking for a Secure Agent for training and learning purposes. -- GitLab