0% found this document useful (0 votes)
94 views98 pages

Boomi Essentials - Slides - Sep - 2019

The document provides an overview of Boomi Essentials Version 2.0, covering the AtomSphere integration platform's features, including the Build, Deploy, and Manage tabs. It explains key components such as processes, shapes, connectors, and document properties, along with their roles in integration scenarios. The document also includes exercises for hands-on learning and emphasizes the platform's capabilities for integrating various applications and data sources.

Uploaded by

vaarsh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
94 views98 pages

Boomi Essentials - Slides - Sep - 2019

The document provides an overview of Boomi Essentials Version 2.0, covering the AtomSphere integration platform's features, including the Build, Deploy, and Manage tabs. It explains key components such as processes, shapes, connectors, and document properties, along with their roles in integration scenarios. The document also includes exercises for hands-on learning and emphasizes the platform's capabilities for integrating various applications and data sources.

Uploaded by

vaarsh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 98

Welcome to Boomi Essentials

Version 2.0

Internal Use - Confidential


Agenda
• AtomSphere Basics
• Build Tab
• Deploy Tab
• Manage Tab
• Help and Support Options

Internal Use - Confidential


How Our Class Works

I will demo the


Multi-faceted
activity, then it Stay with us!
approach
is your turn

Internal Use - Confidential


AtomSphere Basics

Internal Use - Confidential


The Industry’s #1 Integration Clouds

Cloud Infrastructure
Integration
Platform as a Service
Business Partners

Cloud Applications

Customers
Business Divisions
On Premises Systems

Internal Use - Confidential


Accessing the Platform
https://platform.boomi.com

Internal Use - Confidential


Parts of AtomSphere UI

Administration
Welcome
Lifecycle
Panel
Links
Tab

Internal Use - Confidential


Parts of AtomSphere UI

Create Component
Universal
Process
Component
Process
Component
Action
Shapes
Window
Explorer
Canvas
Buttons
Bars
Palette

Internal Use - Confidential


Process Library

• Users can access the published


processes and install copies in their
accounts.
• Dell Boomi publishes processes for all
account users to install as samples and
snippets to help direct development for
certain common integration patterns.

Internal Use - Confidential


Process Library
• The Process Library feature to install specific training processes for our
activities during all training courses.
• The processes are all listed by class name under Education Services.

• The processes are templates and we will need to develop, create, add, and
configure shapes as part of the integration process.

Internal Use - Confidential


Boomi Integration
• What is a Dell Boomi Integration?

• Dell Boomi makes it possible for companies to integrate applications,


data, and trading partners directly from the Web by using a visual
designer with access to a library of integration components.

Internal Use - Confidential


What is an AtomSphere Process?
• It is the Core Integration Component
• Processes are built, deployed, and managed
• Contains all of the shapes and components required in a full integration flow
• The act of running a Process is called an Execution

Internal Use - Confidential


AtomSphere Shapes
Available shapes:

Internal Use - Confidential


AtomSphere Shapes
Each shape represents a task to be performed on a set of
documents. There are three types of shapes:

➢ Execute shapes manipulate or transform data

➢ Logic shapes control the flow of data through the process

➢ Connect shapes get data into the process or send data out of the process

Internal Use - Confidential


AtomSphere Shapes
Some common AtomSphere shapes we will see in this course:

Map – Transforms data from one format (profile) to another.

Set Properties – Sets connector specific properties (i.e.


Disk file name, FTP directory, etc.) for documents.
Branch – Creates a copy of a document and passes
down each branch in sequential order.

Connector - Gets data into and sends data out of a


process

Internal Use - Confidential


What is a Component?
• Reusable object
• Listed in Component Explorer
• Created once and referenced across multiple
shapes and multiple processes

Component

Internal Use - Confidential


AtomSphere: How it works

Build Deploy Manage


Use the AtomSphere library of Deploy your integration Monitor status of all deployed
components to visually design processes to the Boomi Atom Atoms, integration processes,
your integration processes. to integrate between SaaS, and trading partners, regardless
PaaS, or other cloud of location, using a web-based
applications or safely behind dashboard.
your firewall for on premise
applications.

Internal Use - Confidential


Build Tab

Internal Use - Confidential


Integration Scenario This form information is stored
on an FTP Server, in an XML
Business Use Case format.
Customers enter account and
contact information into an
online form to sign up for an
AtomSphere trial account.

CSV FTP
(XML Format)
Build an Excel spreadsheet
with the latest account data
and archive it on our server
for reporting.

Internal Use - Confidential


Integration Scenario
• Request Account XML from FTP server

• Archive copy of XML file on server directory

• Convert XML data into CSV Flat File type

• Archive new CSV file on server directory

Boomi Server Archive

XML

Flat File
XML (CSV)
FTP Disk

Internal Use - Confidential


• Exercise 1: Folder Setup

• Exercise 2: Download Process


Endpoints from the Process
Instructor to Library

Demonstrate P

Internal Use - Confidential


What is a Connector?
The main component containing all
information needed to connect
to a data source or application

Combination of two parts:

• 1) Connection – Physical Connection


Information (The “Where”)

• 2) Operation – Function to call or


file(s) to act upon (The “How”)

Internal Use - Confidential


Connector Types
Standard Application
• Common data repositories • Packaged Integration Services
• Communication Protocols • System API’s

Internal Use - Confidential


FTP Connector: Options
The main component containing all the
information needed to connect to a
single FTP Server

Combination of two parts:

• 1) Connection – FTP Server Hostname


and user log-in

• 2) Operation – Get or Send action,


subdirectory and file filter definition

Internal Use - Confidential


FTP Connection: Configuration
Host: The Host name, IP address or Domain Name of the FTP server
Port: The FTP server port which listens for incoming client connections
Connection Mode: Active or Passive | Passive is common for most setups
User/Password: Login information for account on FTP server

Internal Use - Confidential


FTP Connection: Configuration (SSL Options)
SSL Mode: None, Explicit, or Implicit | Methods for invoking client security
Client Authorization: Enables client certificate import and definition

Internal Use - Confidential


FTP Operation: Configuration
FTP Action: Get / Get & Delete | Retrieve files and define optional delete command

Remote Directory: Subdirectory the FTP user can access if deeper than the base directory

File Filter: Conditionally reads files based on a pattern matching using the file name
Transfer Type: ASCII / Binary | Transfer files as text or raw data

Max Files to Read: Sets the greatest number of files to read at once. Default value is "0“ for all

Internal Use - Confidential


• Exercise 3: Access the FTP
Connection

• Exercise 4: Create an FTP


Instructor to Operation

Demonstrate P

• 10 - 15

Internal Use - Confidential


Disk Connector: Options
The main component containing all
of the information needed to connect
to a single directory

Combination of two parts:

• 1) Connection – Directory definition

• 2) Operation – Get or Send: File


Naming Options

Internal Use - Confidential


Disk Connection: Configuration
Directory: Directory path definition for reading or writing documents

Save Documents Atom Disk Save Documents


to Directory to Directory

Does Directory
Exist?

Create Directory Yes Yes


on Boomi Cloud Create Directory
Where Atom on Disk Where
Resides Atom Resides
No

Internal Use - Confidential


Disk Operation: Configuration
Create Directory: Creates directory on server during Process execution if it doesn’t exist

File Naming Options: Create Unique/Overwrite/Append/Error | Action when filename exists

Internal Use - Confidential


• Exercise 5: Access the Disk
Connection

• Exercise 6: Create a Disk


Instructor to Operation

Demonstrate P

• 16 - 21

Internal Use - Confidential


The Boomi Atom

• Lightweight, self-contained run-time engine.


• Handle any combination of SaaS-to-SaaS or SaaS-to-on-
premise integrations from one platform.

• Deploy behind the firewall for on-premise integrations or in


the cloud.
• Regardless of deployment option, all Atoms provide runtime
metadata to the platform for continuous monitoring.

Internal Use - Confidential


Single Atom Cloud to Regional Clouds

Internal Use - Confidential


Exercise 7: Enable your
regional Production and Test
Clouds
Instructor to
Demonstrate P

• 22 - 24

Internal Use - Confidential


Exercise 7: Enable your
regional Production and Test
Clouds
Participant to
Complete

• 22 - 24

Internal Use - Confidential


Test Mode

Test Mode supports unit testing a limited set of documents

Connectors support retrieval of:


• 100 – Max Document Count
• 10 MB – Total Data Size

Internal Use - Confidential


• Exercise 8: Test the Process

Instructor to
Demonstrate P

• 25-28

Internal Use - Confidential


What is a Document?
• It is the main unit that powers the execution in a process flow.
• Dell Boomi supports five raw document types:
XML JSON Flat File Database EDI
1,Contact1,Address1 S5*1*CL~
<Account> { |^|ColumnA|^|ColumnB
"values": [ |^|ColumnA|^|ColumnB
{ 2,Contact2,Address1 L11*0003187*BM~
<activeBillingAddress/> "_key": "~",
|^|ColumnA|^|ColumnB
"connections": {"_total": 3,Contact3,Address1 |^|ColumnA|^|ColumnB L11*122*PO~
<activeResAddress/> 129}, |^|ColumnA|^|ColumnB
"firstName": "Adam“ 4,Contact4,Address1 |^|ColumnA|^|ColumnB L11*ZOR*SO~
}, |^|ColumnA|^|ColumnB
<addressComplement/> { G62*10*20110809*Y*0*CD~
"_key": "hks0NPUMZF", 5,Contact6,Address1 |^|ColumnA|^|ColumnB
"connections": {"_total": |^|ColumnA|^|ColumnB
<addressTypeCode/> G62*79*20110809*Y*9*CD~
500}, 6,Contact6,Address1 |^|ColumnA|^|ColumnB
"firstName": "Brandon“ |^|ColumnA|^|ColumnB
</Account> }
AT8*G*L*48*41**E*2154.1~
7,Contact7,Address1 |^|ColumnA|^|ColumnB
],
"_total": 2
|^|ColumnA|^|ColumnB NTE*GEN*A S~
}

Internal Use - Confidential


What is a Document?
Documents are presented in four different formats:

8888888888888888888888888888888888888888888888
8888888888888888888888888888888888888888888888
888888888888888888888888
888888888888888888888888888888888888
88888888888888888888888888888
8888888888888888888888888
888888888888888888888888888888888888
8888888888888888888888888
888888888888888888888888888888888
888888888888888888888888888888888
8888888888888888888888
88888888888888888888
8888888888888888888888888888888888
888888888888888888888888888
8888888888888888888888888
888888888888888888888888888888888888
888888888888888888888888
8888888888888888888888888888
8888888888888888888888888888888888888
88888888888888888888888888888888
88888888888888888888888888888888

8888888888 8888888888
8888888 8888888
888888888 888888888
88888888 88888888
8888888888 8888888888
888888 888888
8888888888 8888888888

8888888888 8888888888
8888888 8888888
888888888 888888888
88888888 88888888
8888888888 8888888888
888888 888888
8888888888 8888888888

Internal Use - Confidential


Document Flow

Internal Use - Confidential


Document Flow

Internal Use - Confidential


Document Flow

Internal Use - Confidential


Document Flow

Internal Use - Confidential


Document Flow

Internal Use - Confidential


Document Flow

Internal Use - Confidential


Document Flow

Internal Use - Confidential


Document Flow

Internal Use - Confidential


What are Document Properties?
Document Properties are configured using the Set Properties shape
• Extract runtime-related information related to a Document
• Set new properties for destination Documents

Internal Use - Confidential


Set Properties
The Set Properties shape is a
two-part container:
• Properties to Set
• Parameters

Internal Use - Confidential


Setting Parameters
Common interface for configuring
dynamic runtime inputs
• Reference elements from
document(s)
• Reference system date where the
Process is executing
• Define lookup inputs against
databases and system APIs
• Build dynamic messaging and
notifications

Internal Use - Confidential


What is a Profile?
• Profiles describe the layout or format of different documents read
into or sent out of AtomSphere
• A Profile is not a shape, but it is a component some shapes use
• Structure consists of data elements of a specific document type
• Entire profiles are used in the Map shape
• Individual profile elements are used in many shapes
Profile Shape
Component

Internal Use - Confidential


How are Profiles Created?
Profiles are created in a number
of ways:
• Manually
• Upload a file or schema
• Import in the Connector Operation

Internal Use - Confidential


• Exercise 9: Create XML
Profile

Instructor to
Demonstrate P

• 29 - 32

Internal Use - Confidential


Let’s Get Dynamic!
• Use the Set Properties shape to dynamically set the output File Name
• Use multiple Parameters to create complex dynamic values for file names
or directories
• One method is to use a Profile Element
01920101.dat

01920105.dat

Internal Use - Confidential


Let’s Get Dynamic!
• Use the Set Properties shape to dynamically set the output File Name
• Use multiple Parameters to create complex dynamic values for file names
or directories
• One method is to use a Profile Element
BockelCorp_01-01-17.xml

Pasko Communications_01-01-17.xml

Internal Use - Confidential


• Exercise 10: Set a File Name
and Test the Process

Instructor to
Demonstrate P

• 33 - 38

Internal Use - Confidential


What is a Map?
• The component which transforms one structured data format (Profile) to another (Profile).
• Each Map contains a Source Profile and a Destination Profile
• Drag Source Profile element to Destination Profile element

Source Destination

Internal Use - Confidential


• Exercise 11: Create a Map and
Source Profile

• Exercise 12: Create a Flat File


Instructor to Profile Destination Profile

Demonstrate P

• 39 - 44

Internal Use - Confidential


Boomi Suggest
• First community driven suggestion wizard for integration
• Leverage tens of thousands of live data maps
• Up to 93% of mappings are auto-generated
• Greatly reduce integration setup time
• Benchmark your maps against the community

Internal Use - Confidential


• Exercise 13: Map Fields

Instructor to
Demonstrate P

• 45 - 46

Internal Use - Confidential


Map Functions
Allow conversion logic to be applied to individual values as they are being mapped
Provide on-the-fly querying of data
Types
1) Standard (single task)

2) User Defined
(multiple, sophisticated)

Internal Use - Confidential


• Exercise 14: Add Get
Current Date Map Function

Instructor to
Demonstrate P

• 47 - 49

Internal Use - Confidential


Branching Off
XML

Flat File (CSV)

Internal Use - Confidential


What is a Branch?
• Creates a copy of the document(s) and executes each path in sequential order.
• A Branch's path is executed to completion before flowing to the next branch.
• Documents only flow down subsequent paths when/if it successfully completes the
preceding path
• A given Branch shape can have up to 25 paths.

. . . . . . SUCCESS
. . . . . . SUCCESS

. . . . . . FAILURE

(DOES NOT FLOW DOWN PATH)

Internal Use - Confidential


• Exercise 15: Add a Branch
to Manage the Process Flow

Instructor to
Demonstrate P

• 50 - 52

Internal Use - Confidential


Congratulations!

Internal Use - Confidential


Deploy and Manage Tabs

Internal Use - Confidential


Distributed Architecture: Centralized Monitoring and Managing

Move, manage, and govern data


across all your applications

Implement faster with a


configuration-based UI
Boomi – the #1
Deploy and monitor integrations Integration Cloud
in the cloud and on-premise

Continual innovation available


through a true PaaS solution

Internal Use - Confidential


On-premise to on-premise integration

AtomSphere Platform

256-bit encryption
(metadata only)

Data Data

Internal Use - Confidential


Cloud to on-premise integration

AtomSphere Platform

256-bit encryption
(metadata only)

Data

Data Data

Internal Use - Confidential


Cloud to cloud integration

Status.Boomi.com
AtomSphere Platform

256-bit encryption Data


(metadata only)

Data

Data Regional Boomi Atom Clouds

Internal Use - Confidential


Status.boomi.com

Internal Use - Confidential


Local Atom vs. Cloud Atom

Firewall

Internal Use - Confidential


Environments
• Accessible via Manage→Atom Management
• Environment is the container which contains the Atom and the deployed processes
• An Atom can only be assigned to one Environment

Internal Use - Confidential


Environments: Attach Atom
Environment Deployment
1) Attach an Atom to an Environment

Internal Use - Confidential


Environments: Deploy Process
Environment Deployment
1) Attach an Atom to an Environment
2) Deploy a Process to an Environment

Production Production

Internal Use - Confidential


• Exercise 16: Create an
Environment and Attach an Atom

• Exercise 17: Deploy the Process


Instructor to
Demonstrate P

• 53 - 60

Internal Use - Confidential


Deploy vs. Execute
Deploying a Process does NOT Execute the Process into active production.
Once a Process is Deployed, it needs to be Executed either by:
• Manual execution (Manage→Process Reporting)

• Applying a schedule (Manage→Atom Management)

• External event triggering a Listener process

Deployed Executed
(Manual or Schedule)

Internal Use - Confidential


• Exercise 18: Execute the
Process

Instructor to
Demonstrate P

• 61 - 62

Internal Use - Confidential


Process Reporting
• Defaults to Executions launched in Past Hour across All Atoms
• Set search filters and Refresh Search
• Highlight execution records to display document activity
• Manually ‘play’ deployed Processes in specific Atoms

Internal Use - Confidential


Process Reporting
• Click on filter links to sort by
Execution Status
• Page through sets of 25 execution
records
• View high-level Process log

Internal Use - Confidential


Process Reporting
View Process
• Open the Process on the Build Tab

View Deployment Components


• View and open component versions on the
Build Tab

View Process State


• View real-time information about step
execution and duration

View Extended Information


• View IDs and Download Execution Artifacts
(Admin Only)

Internal Use - Confidential


• Exercise 19: Track Live
Executions in Process
Reporting
Instructor to
Demonstrate P

• 63 - 66

Internal Use - Confidential


Help and Support

Internal Use - Confidential


Dell Boomi Integration Editions

Which Dell Boomi Integration Edition is Right for My Business?


Base Edition
Starter solution for SMB’s to integrate two applications.

Professional Edition
For businesses looking to fully integrate their back- and front-offices.

Pro Plus Edition


Additional functionality to support real-time integration needs.

Enterprise Edition
Advanced features to support complex enterprise needs.

Enterprise Plus Edition


Advanced features and connectivity to support large enterprise needs.

Internal Use - Confidential


Help Options

Internal Use - Confidential


User Guide
• Boomi also offers a
comprehensive User Guide
for each of it’s platforms
• Searchable “encyclopedia”
of all of Boomi’s shapes,
terminology, and tools
• Located under the Help
dropdown icon within User
Guide

Internal Use - Confidential


Contacting Support
• Support Center (Recommended) –
via the Help link to browse
knowledge articles, collaborate with
other users, or open a support case
• Email - email [email protected]
to open a support case
• Phone - call the support number located in the Support Center to create a
support case (Premier and Premier Plus) or for a Sev 1 issue
• Live Chat - Available 24x5 for Premier Entitlement or 24x7 for Premier Plus
Entitlement

Internal Use - Confidential


Opening a Support Case
1. Go to the Help menu and click
Support.
2. The Boomi Customer Portal
home page opens. (Log in)
3. Under Contact Us, select
Create a Case.
4. Enter the details of your case in
the Create a New Support
Case form, select Submit.
5. Track any existing support
cases in the My Support Cases
section at the bottom of the
Support Center page.

Internal Use - Confidential


Process Deactivation

Internal Use - Confidential


Process Deactivation
Detach the Atom
Deploy >> Process >> Attachments >> Unattached

Internal Use - Confidential


• Exercise 20: Detach the
Atom

Instructor to
Demonstrate P

• 67 - 68

Internal Use - Confidential


Congratulations!

Internal Use - Confidential


End of Boomi Essentials

Internal Use - Confidential


Thank you

Internal Use - Confidential


Internal Use - Confidential
Copyrights and Trademarks
This guide contains proprietary information protected by copyright and/or other legal grounds. The software described in this guide is furnished under a software license or nondisclosure
agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by
any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser’s personal use without the written permission of Boomi, Inc. (“Dell
Boomi”).

The information in this document is provided in connection with Dell Boomi products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by
this document or in connection with the sale of Dell Boomi products. EXCEPT AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR
THIS PRODUCT, DELL BOOMI (TOGETHER WITH DELL INC. AND ITS DIRECT AND INDIRECT SUBSIDIARIES) ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY
EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY,
FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL DELL BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL
OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF
THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF ANY OF THEM HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Dell Boomi makes no representations
or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time
without notice. Dell Boomi does not make any commitment to update the information contained in this document.

If you have any questions regarding your potential use of this material, contact:

Boomi, Inc.
Attn: LEGAL Dept.
[email protected]

With a copy to:

Boomi, Inc., Legal Department, 1400 Liberty Ridge Drive, Chesterbrook, PA 19087

Trademarks
Copyright © 2017 Boomi, Inc. All rights reserved. Dell, the Dell logo, Dell Boomi, Boomi, AtomSphere, Atom, and AtomSphere Integration Cloud are trademarks of Dell Inc. and/or its
subsidiaries in the United States and/or other countries. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their
products.

Internal Use - Confidential

You might also like