This document outlines the installation guidelines and initial configuration activities required for a new TDM installation or an upgrade to the current TDM version.
If you've pre-created a database schema for TDM DB instead of using the default, do the following:
The following components must be installed:
Click here to open the TDM 9.3.x Docker Installation document.
Both TDM layers — the backend and frontend — are included in the TDM library starting from version 7.6.
Download the TDM Library export files from the links provided by your K2view representative.
Once downloaded, import and deploy them:
Click here for more information about the TDM Library.
Click here for more information about the import options.
Import the TDM LU to the Fabric project and deploy it to Fabric. Use the Import All option to import the TDM Portal (self-service) code (stored in the web subfolder) into the TDM LU. The TDM LU's deployment also deploys the TDM Portal to Fabric and adds it to the web applications in your Fabric web framework.
Click for more information about Fabric Web Framework.
For new installations:
From TDM 7.6 onwards, TDM creates the TDM DB objects by the TDM LU's deploy flow:
Note:
For existing installations:
For more details, read TDM Upgrade Document.
The k2masking schema is required for a TDM implementation to support masking or sequence handling. The k2masking schema is automatically created by the TDM LU's deploy.flow upon the deployment of the TDM LU to Fabric. Alternatively, you can run the masking-create-cache-table.flow from the library of Broadway examples or run the create_masking_cache_table.sql of the TDM Library to create the K2masking schema if needed.
The TDM Portal application is pre-integrated with the Fabric Web Framework. The user logs into the Fabric Web Framework, and Fabric authenticates the user. The TDM Portal retrieves the user ID and the user's Fabric roles from the user's session and identifies the user type (Permission Group) based on their Fabric roles.
The mapping of each Fabric role to a TDM Permission Group is done by the Permission Groups Mapping TDM window and is kept in permission_groups_mapping TDM DB table.
After installing TDM, the admin user must log into the TDM Portal, open the Permission Groups Mapping window, and define the Permission Group mapping of each user's group (= Fabric role). This process enables TDM users to access the TDM Portal based on their assigned Permission Groups.
The TDM project's profile must contain Fabric + PostgreSQL. Open the Fabric Web Studio, click the Extensions icon, and select TDM to install the TDM library.
Click here for more information about Fabric extensions.
K2View’s Test Data Management (TDM) 9.0 equips your QA and development teams with cutting-edge AI-driven synthetic data generation, transforming test data creation from manual rule-based scripts into intelligent automation:
The TDM AI installation guide outlines the key infrastructure and application setup steps required to integrate K2View TDM 9.0 with AI-powered capabilities, covering everything from GPU-enabled environment provisioning to project configuration, cleanup processes, and performance testing.
TDM can work on either 1 of the following 2 Fabric system DBs:
A new Global has been added in TDM 8.1 — SEQ_CACHE_INTERFACE. This Global is populated with the DB interface of the k2masking DB (PostgreSQL or Cassandra) and must be aligned with Fabric’s system DB. TDM 9.x sets the POSTGRESQL_ADMIN as a default value in this Global:
If you use Cassandra as Fabric’s system DB, you must edit the SEQ_CACHE_INTERFACE Global and update its value to DB_CASSANDRA.
If you wish to use the PostgreSQL DB as the Fabric system DB, do the following:
Open Fabric’s config.ini file and edit the [system_db] section’s attributes, including the SYSTEM_DB_DATABASE attribute, to be aligned with the POSTGRESQL_ADMIN DB interface.
The default limitation on the number of processed records is 100K records. If your tables have a higher number of records, do the following:
MAX_CONCRETE_ARRAY_SIZE=50000000
This document outlines the installation guidelines and initial configuration activities required for a new TDM installation or an upgrade to the current TDM version.
If you've pre-created a database schema for TDM DB instead of using the default, do the following:
The following components must be installed:
Click here to open the TDM 9.3.x Docker Installation document.
Both TDM layers — the backend and frontend — are included in the TDM library starting from version 7.6.
Download the TDM Library export files from the links provided by your K2view representative.
Once downloaded, import and deploy them:
Click here for more information about the TDM Library.
Click here for more information about the import options.
Import the TDM LU to the Fabric project and deploy it to Fabric. Use the Import All option to import the TDM Portal (self-service) code (stored in the web subfolder) into the TDM LU. The TDM LU's deployment also deploys the TDM Portal to Fabric and adds it to the web applications in your Fabric web framework.
Click for more information about Fabric Web Framework.
For new installations:
From TDM 7.6 onwards, TDM creates the TDM DB objects by the TDM LU's deploy flow:
Note:
For existing installations:
For more details, read TDM Upgrade Document.
The k2masking schema is required for a TDM implementation to support masking or sequence handling. The k2masking schema is automatically created by the TDM LU's deploy.flow upon the deployment of the TDM LU to Fabric. Alternatively, you can run the masking-create-cache-table.flow from the library of Broadway examples or run the create_masking_cache_table.sql of the TDM Library to create the K2masking schema if needed.
The TDM Portal application is pre-integrated with the Fabric Web Framework. The user logs into the Fabric Web Framework, and Fabric authenticates the user. The TDM Portal retrieves the user ID and the user's Fabric roles from the user's session and identifies the user type (Permission Group) based on their Fabric roles.
The mapping of each Fabric role to a TDM Permission Group is done by the Permission Groups Mapping TDM window and is kept in permission_groups_mapping TDM DB table.
After installing TDM, the admin user must log into the TDM Portal, open the Permission Groups Mapping window, and define the Permission Group mapping of each user's group (= Fabric role). This process enables TDM users to access the TDM Portal based on their assigned Permission Groups.
The TDM project's profile must contain Fabric + PostgreSQL. Open the Fabric Web Studio, click the Extensions icon, and select TDM to install the TDM library.
Click here for more information about Fabric extensions.
K2View’s Test Data Management (TDM) 9.0 equips your QA and development teams with cutting-edge AI-driven synthetic data generation, transforming test data creation from manual rule-based scripts into intelligent automation:
The TDM AI installation guide outlines the key infrastructure and application setup steps required to integrate K2View TDM 9.0 with AI-powered capabilities, covering everything from GPU-enabled environment provisioning to project configuration, cleanup processes, and performance testing.
TDM can work on either 1 of the following 2 Fabric system DBs:
A new Global has been added in TDM 8.1 — SEQ_CACHE_INTERFACE. This Global is populated with the DB interface of the k2masking DB (PostgreSQL or Cassandra) and must be aligned with Fabric’s system DB. TDM 9.x sets the POSTGRESQL_ADMIN as a default value in this Global:
If you use Cassandra as Fabric’s system DB, you must edit the SEQ_CACHE_INTERFACE Global and update its value to DB_CASSANDRA.
If you wish to use the PostgreSQL DB as the Fabric system DB, do the following:
Open Fabric’s config.ini file and edit the [system_db] section’s attributes, including the SYSTEM_DB_DATABASE attribute, to be aligned with the POSTGRESQL_ADMIN DB interface.
The default limitation on the number of processed records is 100K records. If your tables have a higher number of records, do the following:
MAX_CONCRETE_ARRAY_SIZE=50000000