Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Comment: Corrected links that should have been relative instead of absolute.
  • Describe the high-level process flow and key activities involved, typical in an ETL data flow, Adeptia's process designer can be used to create an empty flow without associating activities.
  • Identify specific activities for source schema and source type
    • For example, LAN, File System, FTP, Application (e.g. SalesForce), REST API
  • Identify specific activities for Target Schema and target type
    • For example, LAN, File System, FTP, Application (e.g. SalesForce), REST API
  • Identify mapping at field level from the source schema to the target schema. It is preferred to capture the mapping and mapping rules in an excel spreadsheet, Adeptia can provide a template for reference, Mapping rules, data validation, aggregation are the key points to be considered. Key considerations are one to one mapping or complex mapping involving more than on-field to process for the target field. Ensure that you have a good understanding of out of the box Mapping functions available.
  • Any other pre-processing of source data and post-processing of data required, sometime pre-processing may be required like extracting from a zip file for source files, decryption, creating output a zip file, encryption, etc.
  • Identify requirements if any for dynamic routing of data based on a rule within the data content or external criteria.
  • Define exception handling and reporting exceptions and re-processing requirements for re-submission, process flow recovery, retention of processed files in the repository.
  • Identifying process flow triggers and events, design for easy migration across environments with Parametrization of activity settings.
  • Design process flows for re-use, design process flows so that the process flows can be easily migrated to different environments without having to change activity parameters like FTP location, user id, password, and other source and target activity parameters.
Panel
borderStylesolid
titleYou may be interested in...
What is new
Application architecture
Key terms
InstallDeploy
Usage scenarios