Configuring environments for command-line extractions

Before you run a Business Intelligence Exchange (BIX) extract from the command line, specify the source and target databases, configure logging, configure the database holding the engine code, and set up split schema. Additionally, you can create a pegarules.keyring file to support encryption of the database password that you supply with the database connection settings in prconfig.xml.
  1. Enable the BIX ruleset on your application. For more information, see Enabling the BIX ruleset.
  2. Create an initial Extract rule. For more information, see Creating and running an Extract rule.
  3. Configure the Pega Platform database from which you want to extract data. For more information, see Configuring the source database for BIX command line extractions .
  4. For Database Schema extractions, configure the target database to which you want to extract data. For more information, see Configuring the target database for BIX command line extractions.
  5. Optional: To save information about the command-line extractions in a log file, configure command line BIX logging. For more information, see Configuring BIX logs for command-line extractions.
  6. To store usernames and passwords in an encrypted form, enable password encryption for command-line BIX extractions. For more information, see Enabling password encryption for BIX command-line extractions.
  7. Run the command line extraction process. For more information, seeRunning a BIX command-line extraction.