Escolar Documentos
Profissional Documentos
Cultura Documentos
Guide
Version: 8.0.1
Document Number: 09300801
First Edition, July 2005, version 8.0.1
To ensure that you are using the documentation that corresponds to the software you are licensed to use, compare this version number
with the software version shown in About MicroStrategy... in the Help menu of your software.
If you have not executed a written or electronic agreement with MicroStrategy or any authorized MicroStrategy distributor, the following
terms apply:
This software and documentation are the proprietary and confidential information of MicroStrategy Incorporated and may not be
provided to any other person. Copyright 2001-2005 by MicroStrategy Incorporated. All rights reserved.
THIS SOFTWARE AND DOCUMENTATION ARE PROVIDED AS IS AND WITHOUT EXPRESS OR LIMITED WARRANTY OF ANY
KIND BY EITHER MICROSTRATEGY INCORPORATED OR ANYONE WHO HAS BEEN INVOLVED IN THE CREATION,
PRODUCTION, OR DISTRIBUTION OF THE SOFTWARE OR DOCUMENTATION, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, GOOD TITLE AND
NONINFRINGMENT, QUALITY OR ACCURACY. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE
SOFTWARE AND DOCUMENTATION IS WITH YOU. SHOULD THE SOFTWARE OR DOCUMENTATION PROVE DEFECTIVE,
YOU (AND NOT MICROSTRATEGY, INC. OR ANYONE ELSE WHO HAS BEEN INVOLVED WITH THE CREATION, PRODUCTION,
OR DISTRIBUTION OF THE SOFTWARE OR DOCUMENTATION) ASSUME THE ENTIRE COST OF ALL NECESSARY
SERVICING, REPAIR, OR CORRECTION. SOME STATES DO NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES, SO THE
ABOVE EXCLUSION MAY NOT APPLY TO YOU.
In no event will MicroStrategy, Inc. or any other person involved with the creation, production, or distribution of the Software be liable
to you on account of any claim for damage, including any lost profits, lost savings, or other special, incidental, consequential, or
exemplary damages, including but not limited to any damages assessed against or paid by you to any third party, arising from the use,
inability to use, quality, or performance of such Software and Documentation, even if MicroStrategy, Inc. or any such other person or
entity has been advised of the possibility of such damages, or for the claim by any other party. In addition, MicroStrategy, Inc. or any
other person involved in the creation, production, or distribution of the Software shall not be liable for any claim by you or any other
party for damages arising from the use, inability to use, quality, or performance of such Software and Documentation, based upon
principles of contract warranty, negligence, strict liability for the negligence of indemnity or contribution, the failure of any remedy to
achieve its essential purpose, or otherwise. The entire liability of MicroStrategy, Inc. and your exclusive remedy shall not exceed, at
the option of MicroStrategy, Inc., either a full refund of the price paid, or replacement of the Software. No oral or written information
given out expands the liability of MicroStrategy, Inc. beyond that specified in the above limitation of liability. Some states do not allow
the limitation or exclusion of liability for incidental or consequential damages, so the above limitation may not apply to you.
The information contained in this manual (the Documentation) and the Software are copyrighted and all rights are reserved by
MicroStrategy, Inc. MicroStrategy, Inc. reserves the right to make periodic modifications to the Software or the Documentation without
obligation to notify any person or entity of such revision. Copying, duplicating, selling, or otherwise distributing any part of the Software
or Documentation without prior written consent of an authorized representative of MicroStrategy, Inc. are prohibited. U.S. Government
Restricted Rights. It is acknowledged that the Software and Documentation were developed at private expense, that no part is public
domain, and that the Software and Documentation are Commercial Computer Software provided with RESTRICTED RIGHTS under
Federal Acquisition Regulations and agency supplements to them. Use, duplication, or disclosure by the U.S. Government is subject
to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFAR
252.227-7013 et. seq. or subparagraphs (c)(1) and (2) of the Commercial Computer SoftwareRestricted Rights at FAR 52.227-19,
as applicable. Contractor is MicroStrategy, Inc., 1861 International Drive, McLean, Virginia 22102. Rights are reserved under copyright
laws of the United States with respect to unpublished portions of the Software.
The following are either trademarks or registered trademarks of MicroStrategy Incorporated in the United States and certain other
countries:
MicroStrategy, MicroStrategy 6, MicroStrategy 7, MicroStrategy 7i, MicroStrategy 7i Evaluation Edition, MicroStrategy 7i Olap Services,
MicroStrategy 8, MicroStrategy Evaluation Edition, MicroStrategy Administrator, MicroStrategy Agent, MicroStrategy Architect,
MicroStrategy Bi Developer Kit, MicroStrategy Broadcast Server, MicroStrategy Broadcaster, MicroStrategy Broadcaster Server,
MicroStrategy Business Intelligence Platform, MicroStrategy Consulting, MicroStrategy CRM Applications, MicroStrategy Customer
Analyzer, MicroStrategy Desktop, MicroStrategy Desktop Analyst, MicroStrategy Desktop Designer, MicroStrategy eCRM 7,
MicroStrategy Education, MicroStrategy eTrainer, MicroStrategy Executive, MicroStrategy Infocenter, MicroStrategy Intelligence
Server, MicroStrategy Intelligence Server Universal Edition, MicroStrategy MDX Adapter, MicroStrategy Narrowcast Server,
MicroStrategy Objects, MicroStrategy OLAP Provider, MicroStrategy SDK, MicroStrategy Support, MicroStrategy Telecaster,
MicroStrategy Transactor, MicroStrategy Web, MicroStrategy Web Business Analyzer, MicroStrategy World, Alarm, Alarm.com,
Alert.com, Angel, Angel.com, Application Development and Sophisticated Analysis, Best In Business Intelligence, Centralized
Application Management, Changing The Way Government Looks At Information, DSS Agent, DSS Architect, DSS Broadcaster, DSS
Broadcaster Server, DSS Office, DSS Server, DSS Subscriber, DSS Telecaster, DSS Web, eBroadcaster, eCaster, eStrategy,
eTelecaster, Information Like Water, Insight Is Everything, Intelligence Through Every Phone, Intelligence To Every Decision Maker,
Intelligent E-Business, IWAPU, Personal Intelligence Network, Personalized Intelligence Portal, Query Tone, Quickstrike, Rapid
Application Development, Strategy.com, Telepath, Telepath Intelligence, Telepath Intelligence (and Design), The E-Business
Intelligence Platform, The Foundation For Intelligent E-Business, The Integrated Business Intelligence Platform Built For The
Enterprise, The Intelligence Company, The Platform For Intelligent E-Business, The Power Of Intelligent eBusiness, The Power Of
Intelligent E-Business, and The Scalable Business Intelligence Platform Built For The Internet are all registered trademarks or
trademarks of MicroStrategy Incorporated.
All other products are trademarks of their respective holders. Specifications subject to change without notice. MicroStrategy is not
responsible for errors or omissions. MicroStrategy makes no warranties or commitments concerning the availability of future products
or versions that may be planned or under development.
This product is patented. One or more of the following patents may apply to the product sold herein: U.S. Patent Nos. 6,154,766,
6,173,310, 6,260,050, 6,263,051, 6,269,393, 6,279,033, 6,501,832, 6,567,796, 6,587,547, 6,606,596, 6,658,093, 6,658,432,
6,662,195, 6,671,715, 6,691,100, 6,694,316, 6,697,808, 6,704,723, 6,707,889, 6,741,980, 6,765,997, 6,768,788, 6,772,137,
6,788,768, 6,792,086, 6,798,867, 6,801,910, 6,820,073, 6,829,334, 6,836,537, 6,850,603, 6,859,798, 6,873,693 and 6,885,734.
Other patent applications are pending.
Various MicroStrategy products contain the copyrighted technology of third parties. This product may contain one or more of the
following copyrighted technologies:
Graph Generation Engine Copyright 1998-2004. Three D Graphics, Inc. All rights reserved.
Actuate Formula One. Copyright 1993-2004 Actuate Corporation. All rights reserved.
XML parser Copyright 2003 Microsoft Corporation. All rights reserved.
Xalan XSLT processor. Copyright 1999-2004. The Apache Software Foundation. All rights reserved.
Xerces XML parser. Copyright 1999-2004. The Apache Software Foundation. All rights reserved.
FOP XSL formatting objects. Copyright 2004. The Apache Software Foundation. All rights reserved.
Portions of Intelligence Server memory management Copyright 1991-2004 Compuware Corporation. All rights reserved.
International Components for Unicode
Copyright 1999-2004 Compaq Computer Corporation
Copyright 1999-2004 Hewlett-Packard Company
Copyright 1999-2004 IBM Corporation
Copyright 1999-2004 Hummingbird Communications Ltd.
Copyright 1999-2004 Silicon Graphics, Inc.
Copyright 1999-2004 Sun Microsystems, Inc.
Copyright 1999-2004 The Open Group
All rights reserved.
Real Player and RealJukebox are included under license from Real Networks, Inc. Copyright 1999-2004. All rights reserved.
CONTENTS
1. Introduction to Introduction.................................................................................. 1
MicroStrategy
MicroStrategy components ............................................................ 2
Common Setups for MicroStrategy.......................................... 2
How to use this book ................................................................... 14
Installing MicroStrategy on Windows ..................................... 14
Installing MicroStrategy on UNIX and Linux .......................... 16
3. Installing Introduction................................................................................ 49
MicroStrategy on
Installation procedure .................................................................. 50
Windows
InstallShield Wizard ............................................................... 51
Installation verification ........................................................... 67
Next steps.............................................................................. 68
4. Installing Introduction................................................................................ 71
MicroStrategy on
Installation procedures on UNIX or Linux .................................... 72
UNIX and Linux
Different methods of installation............................................. 72
Installing MicroStrategy using InstallShield Wizard ............... 73
Verifying installation ............................................................... 82
Directory structure.................................................................. 83
Next steps.................................................................................... 85
5. Configuring Introduction................................................................................ 87
MicroStrategy
Configuration prerequisites.......................................................... 88
Intelligence Server
Using the MicroStrategy Configuration Wizard............................ 89
Overview of the MicroStrategy Configuration Wizard ............ 89
Creating a metadata repository and statistics tables ............. 95
Document description
troubleshooting
Prerequisites
Before working with this document, you should be familiar
with
Objectives
After reading this manual, you will be able to
install MicroStrategy software on a UNIX, Linux, and
Windows system
When you are looking for specific information, you can use
the table of contents or index to quickly locate the
information.
Typographical standards
There are different typographical standards for the online
and printed documentation, and only for printed
documentation.
Type Indicates
Courier calculations
font code samples
registry keys
path and file names
URLs
messages displayed in the screen
Actions
Code
Sum(sales)/number of months
Data entry
Keyboard keys
New terms
New terms to note are in regular italic font style. These terms
are defined when they are first encountered in the course
material. Following is an example:
The aggregation level is the level of calculation for the
metric.
Heading icons
Precedes a Case Study. Cases Studies are real-life examples
from companies that are using MicroStrategy products.
Precedes a Business Scenario. Business Scenarios are
examples from the MicroStrategy Tutorial. They explain how
to accomplish complex tasks using MicroStrategy.
Resources
Product documentation
MicroStrategy includes a full set of product manuals,
designed to help you find the information you require to
install, configure, design, and administer your business
intelligence and narrowcast systems, as well as full SDK
documentation to help you extend and customize
MicroStrategy and integrate it with your existing
applications.
Online documentation
IfAcrobat
bookmarks are not visible on the left side of an
document, select Bookmarks and Page from
the View menu, then select the topic and section you
want to see. You can also scroll from the title page of
the guide to its table of contents, and select from there
the topic you want to read.
MicroStrategy Overview
Introduction to MicroStrategy: Evaluation Guide
International support
MicroStrategy supports several locales. Support for a locale
typically includes native database and operating system
support, support for date formats, decimal formats, currency
symbols etc. and availability of translated interfaces and
documentation. The level of support is defined in terms of the
components of a MicroStrategy Business Intelligence
environment. A MicroStrategy Business Intelligence
environment consists of the following components,
collectively known as a configuration:
warehouse, metadata, and statistics databases
Web browser
User assistance
The following paragraphs describe the types of assistance
available to answer questions you may have regarding
MicroStrategy products.
Online help
MicroStrategy provides several modes of access to online
help:
Netscape
help.
browser is required for viewing the online
Technical Support
If you have questions about a specific MicroStrategy product,
you should:
Aprobably
technical administrator in your organization can
help you resolve some of your issues
immediately.
The table on the following page shows where, when, and how
to contact MicroStrategy Technical Support. If you are unable
to reach MicroStrategy Technical Support by phone during
the hours of operation, you have the option to leave a
voicemail message or send electronic mail.
e-mail address
error message(s)
name
company
street address
phone number
fax number
e-mail address
problem description:
Feedback
Please send any comments or suggestions about user
documentation for MicroStrategy 7 products to:
documents@microstrategy.com
support@microstrategy.com
Introduction
MicroStrategy components
MicroStrategy components
MicroStrategy has a range of products that you can install on
different operating systems. Depending on the type of setup
you have, you can install various combinations of
MicroStrategy components. The components described in
this section offer a complete set of tools for creating,
deploying, supporting, and maintaining the business
intelligence applications. This section briefly describes the
most common setups and the components required for each.
Ifandyousubarecomponents,
familiar with MicroStrategy components
you can skip this section and go
to How to use this book, page 14.
http://www.microstrategy.com/Software/
Products/Desktop/feature_comparison.asp
MicroStrategy Administrator
IfWindows
you install MicroStrategy Administrator on
XP, the option to install Enterprise
Manager is not displayed.
sharing data
sharing objects
Enterprise edition
Universal edition
Intelligence Server
Intelligence Server
Functionality Standard and
Universal Edition
Enterprise Editions
Enterprise
MicroStrategy Full-featured Simplified
Reporting
Products version version
version
can be invoked
returns a response
MicroStrategy SDK
MicroStrategy Office
Asautomated
an alternative, you can perform a fully
installation and configuration. For
more information refer to Chapter 10, Automated
Installation and Configuration on Windows.
Chapter 5, Configuring MicroStrategy Intelligence Server:
After installing MicroStrategy products, you must use the
MicroStrategy Configuration Wizard to configure the
MicroStrategy metadata repository and statistics tables,
Intelligence Server, and project sources. This chapter
describes the steps used to configure an installed
MicroStrategy suite of products using the MicroStrategy
Configuration Wizard.
Introduction
Upgrade considerations
Installation prerequisites
Installation considerations
Methods of installation
Methods of installation
Licensing information
Next steps
Upgrade considerations
If you have MicroStrategy products installed and want to
upgrade them, refer to the MicroStrategy Upgrade Guide.
The upgrade procedures on Windows and UNIX are covered
in this guide. It is recommended that you read this guide
before deciding to upgrade an existing database.
Installation prerequisites
Before you install MicroStrategy, you must have the
following:
Hardware recommendations
Software recommendations
Hardware recommendations
MicroStrategy acknowledges that variables, such as CPU
speed, CPU type, OS version, and service upgrades, File
Space, Physical and Swap Memory, are factors that play an
important role in making your deployment of MicroStrategy
Intelligence Server Universal a successful one. This section
lists the hardware recommendations for Windows, UNIX,
and Linux platforms.
MicroStrategy
Processor Memory Storage
Product
MicroStrategy
Web
MicroStrategy
Processor Memory Storage
Product
MicroStrategy
Web Universal
Memory: 256 MB
Storage: 200 MB
Sun Solaris
Log Directory 2 KB 0 0 0
Web Universal N/A N/A 26.4 MB N/A
Deploy Directory
IBM AIX
RedHat Linux
Log Directory 2 KB 1 0 0
Web server
Web client
Web server
Software recommendations
This section lists the software recommendations for the
Windows and UNIX platforms.
MicroStrategy Web
MicroStrategy Web
Universal
Sun Solaris
Patch requirements:
Patch requirements:
111712-05 or higher
Other requirements:
IBM AIX
Patch requirements:
Other requirements:
RedHat Linux
Requirement Recommended
Application servers
Web servers
Installation considerations
The following section contains guidelines and considerations
you must keep in mind during MicroStrategy installation.
Number of users
Report complexity
OLAP Services
user concurrency
Additional considerations
RDBMS Driver
Methods of installation
The methods of MicroStrategy installation are:
Command line
Silent installation
GUI
The GUI mode presents a user interface for each page in the
InstallShield Wizard. You click the mouse to place the cursor
on the desired object, then proceed as appropriate to
complete the task. The following navigational buttons are
also displayed:
Next: Click to proceed to the next page.
Typical
Advanced
Typical installation
Advanced installation
Command line
In command line mode, you type the appropriate information
at the prompt and press ENTER. Instructions are included on
each page of the InstallShield Wizard.
Silent installation
A silent, or unattended, installation is one that presents no
graphical user interface (GUI). Silent installations are useful
for system administrators who do not want users to run the
installation themselves. It allows you to automate the
installation, so it can be called from a script and executed
without user interaction.
Licensing information
If you have installed the Evaluation version of MicroStrategy,
you cannot use its CD Key with a Generally Available (GA) CD
Key in the same environment. Hence, the Evaluation version
of MicroStrategy cannot be used for your production
environment.
Aenvironment,
workaround for this scenario is to create a testing
built entirely on the Evaluation CD key.
This enables customers to test any products they want
to evaluate.
Types of licenses
The types of MicroStrategy licenses are
CPU licenses
CPU licenses
Next steps
After planning your installation, you are now ready to install
the MicroStrategy components you need. The following
chapters instruct you on installing and configuring
MicroStrategy components. If you are installing
MicroStrategy on Windows, then see Chapter 3, Installing
MicroStrategy on Windows. If you are installing
MicroStrategy components on any other operating system,
then see Chapter 4, Installing MicroStrategy on UNIX and
Linux.
Introduction
IfMicroStrategy
you have used the Evaluation Edition of the
platform, you may have installed most
of these products already. However, additional
considerations are important when you are setting up
a production business intelligence system as opposed
to running the evaluation software. You should read
this chapter carefully, even if you already have a
working system from your Evaluation Edition.
Installation procedure
Installation procedure
The MicroStrategy InstallShield Wizard provides
step-by-step instructions to guide you through installing one
or more MicroStrategy products in a Windows environment.
The following sections can assist you in installing one or more
MicroStrategy products:
InstallShield Wizard
Installation verification
InstallShield Wizard
To install MicroStrategy products, you must log on to your
machine using a domain account with Windows
administrative privileges for the domain or target machine.
The domain must include your database servers.
3 Insert the CD into the CD-ROM drive and wait for the
MicroStrategy Main Menu window to display
automatically.
Iflocate
the MicroStrategy Main Menu does not display,
and run Setup.exe on the CD.
Welcome
IfMicrosoft
you opened the InstallShield Wizard through the
Control Panel using the Add/Remove
Programs option, the wizard opens the Welcome page
in maintenance mode. The table below describes this
window.
License Agreement
Customer Information
Setup Type
Select Components
Click Yes if you are prompted to stop your Web server. If you
click No, you cannot continue with the installation until you
stop your Web server.
MicroStrategy Administrator
If you did not choose the Advanced Setup option, you skip
this page and its series of dialog boxes. If you select the
Advanced Setup option, you must specify the installation
location for each component you choose to install.
Box to specify the name of the Specify the name of the IIS
Microsoft IIS virtual directory to be virtual directory to be created
created. for MicroStrategy Web.
Click Next to proceed.
Click Back to return to the
previous page.
You can specify only the number of CPUs that are allowed by
the license. If MicroStrategy Web is installed on more than
one machine, the total number of CPUs should not exceed the
maximum number of CPUs specified by the license. For
machines that support hyperthreading technology, the CPU
counts correspond to physical CPUs, not logical CPUs.
Box to specify the name of the Specify the name of the IIS
Microsoft IIS virtual directory to be virtual directory to be created
created. for MicroStrategy Subscription
Portal.
Click Next to proceed.
Click Back to return to the
previous page.
Box to specify the name of the Specify the name of the IIS
Microsoft IIS virtual directory to be virtual directory to be created
created. for MicroStrategy Web
Services.
Click Next to proceed.
Click Back to return to the
previous page.
Box to specify the name of the Specify the name of the IIS
Microsoft IIS virtual directory to be virtual directory to be created
created. for MicroStrategy Web
Services.
Click Next to proceed.
Click Back to return to the
previous page.
Check box: Option to not set Enter the necessary data and
the service account. click Next to establish the
Login: Windows login with account.
administrative privileges in the Select the check box to bypass
format Domain\User. account initiation.
Password: Valid password for
the login entered in the Login
box.
Confirmation: Retype the
password to confirm.
Check box: Option to not set Enter the necessary data and
the service account. click Next to establish the
Login: Windows login with account. It is recommended to
administrative privileges in the create the account.
format Domain\User. Select the check box to bypass
Password: Valid password for account initiation.
the login entered in the Login
box.
Confirmation: Retype the
password to confirm.
http://localhost/MicroStrategyWS/MSTRWS.asmx
Check boxes to specify the Select the check box next to the
Microsoft Office applications to applications to be used.
integrate with MicroStrategy Office. Click Next to proceed.
Click Back to return to the
previous page.
Software Activation
Common files\MicroStrategy\Web-INF\log.
This folder stores the Web log files, including all
errors. All Web users can write to this location.
Common files\MicroStrategy\Web-INF\xml.
This folder stores some of the configuration XML files,
such as AdminServers.xml and
AdminOptions.xml. The Web administrator can
add, remove, and modify the list of Intelligence
Servers to which the Web server is connected. The
Web administrator can also modify the Administrator
Preferences shared by all users.
Ifensure
the option to restart your machine appears, to
that the installation process finishes correctly,
you should select Yes I want to restart my computer
now.
Installation verification
During the installation routine, the InstallShield Wizard
gathers and records information about your system and your
installation selections. Verify installation setup information
through the installation log file (install.log), located by
default in C:\Program Files\Common
Files\MicroStrategy.
Installation date
Target directories
Hardware specifications
Registry paths
Next steps
If you encounter errors while installing MicroStrategy, refer
to Appendix E, Troubleshooting.
1 Log on to the application server by using the proper user name and
password.
2 Locate the MicroStrategy.war file. It is located in the Web
Universal Deployment Directory you specified during installation.
3 To increase the performance of the application and before
proceeding with the deployment, see the Performance-based setup
information section, if available, for your environment and configure
as necessary. Also, after deploying Web Universal on your
machine, there may be a few performance-based setup steps that
you should complete.
4 Choose the desired deployment method.
5 Follow the deployment procedure.
6 Log on to the MicroStrategy Web Administrator Page.
7 Launch MicroStrategy Web.
8 Start working with the application.
Introduction
MicroStrategy SDK
Language Setup
Welcome
License Agreement
Customer Information
Home Directory
Install Directory
Log Directory
Select Components
Software Activation
Common files\MicroStrategy\Web-INF\log.
This folder stores the Web log files, including all
errors. All Web users can write to this location.
Common files\MicroStrategy\Web-INF\xml.
This folder stores some of the configuration XML files,
such as AdminServers.xml and
AdminOptions.xml. The Web administrator can
add, remove, and modify the list of Intelligence
Servers to which the Web server is connected. The
Web administrator can also modify the Administrator
Preferences shared by all users.
Ifshould
the option to restart your machine appears, you
select Yes I want to restart my computer now
to restart your computer at this time to ensure that the
installation process finishes correctly.
Verifying installation
During the installation routine, the InstallShield Wizard
gathers and records information about your system and your
installation selections. You can verify the setup information
through the installation log file (install.log).
Installation date
Target directory
Directory structure
The following table describes the directories in which
MicroStrategy files are installed.
PATH/Directory Contents
PATH/Directory Contents
Directory Contents
Directory Contents
Next steps
After the installation is complete, you are ready to configure
the MicroStrategy components you have installed. This
ensures that the software can be used immediately.
1 Log on to the application server by using the proper user name and
password.
2 Locate the MicroStrategy.war file. It is located in the Web
Universal Deployment Directory you specified during installation.
3 To increase the performance of the application and before
proceeding with the deployment, see the Performance-based setup
information section, if available, for your environment and configure
as necessary. Also, after deploying Web Universal on your
machine, there may be a few performance-based setup steps that
you should complete.
4 Choose the desired deployment method.
5 Follow the deployment procedure.
6 Log on to the MicroStrategy Web Administrator Page.
7 Launch MicroStrategy Web.
8 Start working with the application.
Introduction
Configuration prerequisites
Configuration prerequisites
Before you begin using the Configuration Wizard you should
satisfy the following requirements:
Intelligence Server
Project Sources
Project Sources
Itproduction
is not recommended to use a 2-tier setup for the
environment.
Itrepository
is recommended that you create the metadata
and the statistics tables in different
databases to ensure enhanced performance.
SQL scripts
5 If you click New, choose the SQL script for creating the
metadata by accepting the default, or browse to select the
SQL script and click Finish. It is recommended that you
select the default SQL script.
This option lets you create the default configuration for the
MicroStrategy metadata. It is disabled if Create Metadata
Tables is selected because the process of creating the default
configuration occurs automatically when the Create
Metadata Tables check box is selected.
5 If you click New, choose the SQL script for creating the
statistics tables by accepting the default, or browse to
select the SQL script and click Finish. It is recommended
that you select the default SQL script.
Configuration messages
Ifmetadata
you continue, all information in the existing
repository is overwritten.
Select projects
Amemory
process is a running executable that resides in a
space and uses operating system resources.
An application can consist of one or several processes.
Each process owns an address space which is not
shared with other processes. If one process fails, the
others are not affected. This tends to make
multiprocess applications more robust and stable than
single process applications at the expense of overhead
in memory space and increased resources.
User authentication
To authenticate a user
After you specify the user name and password for the user,
click Next to access Create, Link, or Delete a Server
Definition page. From this page, you can create a new server
definition, link to an existing server definition, or delete a
current server definition. The steps to create, link, or delete a
server definition are as follows.
Select projects
To select projects
1 Select or clear the check boxes for each project to use with
this server definition and click Next.
Project Sources
When you create a metadata repository, by default it creates a
3-tier project source. Hence use the option, Project Sources,
if you need to create multiple project sources or a 2-tier
project source.
Direct (2-tier)
You can also click New to create a new DSN and click MD
Prefix to specify a metadata table prefix if necessary.
Next steps
Now you have configured MicroStrategy and are ready to
create a project. There are various ways to create a project to
get your MicroStrategy project started. The different methods
to create a project are described in Chapter 6, Creating a
Project.
Introduction
MicroStrategy metadata
MicroStrategy metadata is stored in a relational database
with a predefined structure, which MicroStrategy has
designed. The RDBMS for the metadata and warehouse do
not need to be the same. All schema objects, application
objects, configuration objects, and project settings are stored
in the metadata.
Metadata shell
Before you can populate the metadata database with data, the
necessary tables must be present. The metadata shell refers
to the set of blank tables that are created when you initially
implement a MicroStrategy business intelligence
environment.
MicroStrategy objects
Project creation and navigation in MicroStrategy is generally
handled through the creation and use of various types of
objects. You can build and manipulate three fundamentally
different kinds of objects in MicroStrategy:
Project source
The project source configuration object is the highest-level
MicroStrategy object that exists. It appears in the folder list
and represents a connection to a metadata database. This
connection is achieved in one of two ways:
Itproduction
is not recommended to use a 2-tier setup for the
environment.
Database instance
The database instance is a configuration object that
represents a connection to a data warehouse. When you
define a project, you specify the data warehouse location by
selecting a database instance with the appropriate connection
parameters.
Project
A project is the intersection of a data warehouse, metadata
repository, and the user community. It is the highest-level
object in the MicroStrategy reporting environment. A project
is where you build and store all schema objects and
information you require to create an application, which
together provide for a flexible reporting environment. A
project
Determines the set of warehouse tables to be used, and
therefore the set of data available to be analyzed.
After you create a project using the Project Builder you can
add more tables, facts, attributes, and hierarchies to the
project. The following sections describe the MicroStrategy
tools you can use to add additional objects to your project:
Warehouse Catalog allows you to add more warehouse
tables to your project. You can add tables in bulk using the
Warehouse Catalog, unlike Project Builder that requires
you to add just a few tables at a time.
tables
facts
attributes
shortcut objects
Ifdatayousource
are not authorized to create projects in the
you have selected, you cannot proceed
to the next step.
facts
attributes
From here you can add additional tables to the project or you
can remove tables you no longer require from the project.
Right-clicking any table provides you with additional
Warehouse Catalog functionality:
Creating facts
Facts are MicroStrategy objects that relate numeric data
values from the data warehouse to the project
creation/reporting environment. Relate is a key term here.
The facts correspond to physical columns in the data
warehouse. When you create facts, you are essentially
mapping column names in the warehouse to facts in the
MicroStrategy environment.
The Fact Editor and the fact definitions you can create
with it are discussed in detail in the Facts chapter of
the MicroStrategy Advanced Reporting Guide.
To create facts
6 Select the rules for the Column data type and Fact name.
9 Choose the fact columns to use for your facts and click > to
add them to your project. Click >> to add all the listed
columns.
Creating attributes
Attributes are additional information that provides context
for facts. For example, assume Sales is a fact. If you know that
the sales figure for your company is $25,000, this
information is meaningless unless you have the context for
the sales figure, such as:
When were the sales made? Does the total represent sales
for a day, week, or year? Which day, week, or year?
Where were the sales made? Is that a company-wide total
or is it just for a particular region or store?
Compound attributes
2 From the folder list, select the project to which to add new
attributes.
8 Choose the columns to use for your attribute IDs and click
> to add them to your project. Click >> to add all the
attribute IDs.
16 When you have defined children for all the attributes that
need them, click OK. The Finish page opens.
You can create shortcut objects either from the original object
or from the Shortcut Editor.
3 Click Update.
You can also update the schema with the last saved settings
by clicking the Update Schema icon in the toolbar.
Next steps
Now you have learned how to create a new project and how to
enhance it by adding additional facts and attributes to it. To
learn how you can use these objects to create metrics, filters,
reports, documents, and so on, refer to the MicroStrategy
Advanced Reporting Guide.
Introduction
http://webservername/microstrategy/asp/
where webservername is the name of the computer
hosting your Web server. For example, if the name of your
Web server machine is Web_Srv1, then the URL your
users would use to access MicroStrategy Web would be
http://Web_Srv1/microstrategy/asp
136 Connecting MicroStrategy Web to the Intelligence Server 2005 MicroStrategy, Inc.
Installation and Configuration Guide Deploying Your Project with MicroStrategy Web 7
2005 MicroStrategy, Inc. Connecting MicroStrategy Web to the Intelligence Server 137
7 Deploying Your Project with MicroStrategy Web Installation and Configuration Guide
138 Connecting MicroStrategy Web to the Intelligence Server 2005 MicroStrategy, Inc.
8
8. CONFIGURING AND DEPLOYING
MICROSTRATEGY WEB
UNIVERSAL
Introduction
WebLogic 7.x:
<WEBLOGIC_HOME>/user_projects/mydomain/
WebLogic 8.x:
<WEBLOGIC_HOME>/user_projects/domains/
mydomain/
Preconfiguration information
This section provides the preconfiguration information
necessary to deploy MicroStrategy Web Universal on your
machine. This includes the following sections:
Requirement Recommended
Ifwasyoualready
modify the web.xml file for an application that
deployed, you must re-deploy the
application for the changes to take effect. For details,
see Re-deploy the application, page 157.
You can have the Apache Web server and WebLogic Server
running independently on the same machine, but to
configure Apache to proxy the desired requests to the
WebLogic Server, you must install a plug-in provided by
WebLogic. Complete the instructions at the following URLs
to install and configure the plug-in.
http://e-docs.bea.com/wls/docs70/plugins/
apache.html
http://e-docs.bea.com/wls/docs81/plugins/
apache.html
<WEBLOGIC_HOME>/Server/lib/solaris/
mod_wl_ssl.so
- or -
With this method you can deploy from either of the following:
Ifremember
you do not change the name of the file,
to replace context_name with
MicroStrategy when accessing the application
from the URL.
Ifmake
you are running WebLogic Server in Windows,
sure that you specify only forward slashes in
the absolute path. For example, <par
am-value>ABSOLUTE:C:/MyFolder
</param-value> is a valid path, but
<param-value>ABSOLUTE:C:\MyFolder</pa
ram-value> is not valid.
/<WEBLOGIC_MYDOMAIN_FOLDER>/applications
ToUniversal,
increase the performance of MicroStrategy Web
you can configure additional settings after
deployment. For more information, see
Performance-based setup information, page 158.
/<WEBLOGIC_MYDOMAIN_FOLDER>/applications
4 To explode the WAR file inside the folder you created, run
the following command:
# jar -xvf MicroStrategy.war
# cd..
# mv context_folder
/<WEBLOGIC_MYDOMAIN_FOLDER>/applications
ToUniversal,
increase the performance of MicroStrategy Web
you can configure additional settings after
deployment. For more information, see
Performance-based setup information, page 158.
Ifsureyouthat
are running WebLogic Server in Windows, make
you specify only forward slashes in the
absolute path. For example, <par
am-value>ABSOLUTE:C:/MyFolder
</param-value> is a valid path, but
<param-value>ABSOLUTE:C:\MyFolder</param
-value> is not valid.
http://IP address:7001/console/
http://IP address:7001/console/
ToUniversal,
increase the performance of MicroStrategy Web
you can complete additional setup
configurations that occur after the deployment. For
more information, see Performance-based setup
information, page 158.
ToUniversal,
increase the performance of MicroStrategy Web
you can configure additional settings after
deployment. For more information, see
Performance-based setup information, page 158.
Automatic
deployment:
Automatic
deployment:
http://IP address:port/console/
The Java heap size for the WebLogic Server can be increased
by modifying the JAVA_OPTIONS variable in the
startWebLogic.sh script.
JAVA_OPTIONS=-ms128m -mx128m
This line reflects a Java heap size of 128 MB. Set the
appropriate size. MicroStrategy recommends the initial
java heap size be set at a minimum of 500MB, assuming
the machine has enough memory space.
Value Description
http://IP address:port/console/
-1 to never reload
0 to always reload
For WebLogic 7.x type the new value for the Reload
Period.
For WebLogic 8.x type the new value for Servlet
Reload Check Secs.
7 Click Apply.
<container-descriptor>
<servlet-reload-check-secs>-1</servlet-rel
oad-check-secs>
</container-descriptor>
3 Save the file and compress the WAR file again by typing
the following command:
Alias
/MSTRWeb/images/"/<WEBLOGIC_MYDOMAIN_
FOLDER>/applications/MSTRWeb/images/"
<Directory
"/<WEBLOGIC_MYDOMAIN_FOLDER>/
applications/MSTRWeb/images">
AllowOverride None
</Directory>
2 Repeat the previous step for the JavaScript and style sheet
folders, replacing the word images in the previous code
with the folder name where the JavaScript and style sheet
files are located.
The Web server now serves image (GIF), style sheet (CSS),
JavaScript, and all other static files, thus reducing the load on
the application server and increasing the applications
performance.
Preconfiguration information
This section provides the preconfiguration information
necessary to deploy MicroStrategy Web Universal on your
machine. Preconfiguration includes the following step:
2005 MicroStrategy, Inc. Deploying with WebSphere 5.x and IBM HTTP Server 165
8 Configuring and Deploying MicroStrategy Web Universal Installation and Configuration Guide
Requirement Recommended
166 Deploying with WebSphere 5.x and IBM HTTP Server 2005 MicroStrategy, Inc.
Installation and Configuration Guide Configuring and Deploying MicroStrategy Web Universal 8
4 Regenerating plugin-cfg.xml
2005 MicroStrategy, Inc. Deploying with WebSphere 5.x and IBM HTTP Server 167
8 Configuring and Deploying MicroStrategy Web Universal Installation and Configuration Guide
cd <WAS5_HOME>/bin
# ./startServer.sh <SERVER_NAME>
# ./serverStatus.sh -all
168 Deploying with WebSphere 5.x and IBM HTTP Server 2005 MicroStrategy, Inc.
Installation and Configuration Guide Configuring and Deploying MicroStrategy Web Universal 8
2 Click Install.
2005 MicroStrategy, Inc. Deploying with WebSphere 5.x and IBM HTTP Server 169
8 Configuring and Deploying MicroStrategy Web Universal Installation and Configuration Guide
2 Click Next.
4 For the Default virtual host name for Web modules, select
default host.
6 Click Next.
170 Deploying with WebSphere 5.x and IBM HTTP Server 2005 MicroStrategy, Inc.
Installation and Configuration Guide Configuring and Deploying MicroStrategy Web Universal 8
8 Click Next. The Map virtual hosts for web modules page
opens.
9 Select Web Tier (default host) and click Next. The Map
modules to application servers page opens.
Regenerating plugin-cfg.xml
To regenerate plugin-cfg.xml
2005 MicroStrategy, Inc. Deploying with WebSphere 5.x and IBM HTTP Server 171
8 Configuring and Deploying MicroStrategy Web Universal Installation and Configuration Guide
red: stopped
green: started
172 Deploying with WebSphere 5.x and IBM HTTP Server 2005 MicroStrategy, Inc.
Installation and Configuration Guide Configuring and Deploying MicroStrategy Web Universal 8
This process starts only the Web application, rather than all
the applications running on the application server. To stop
and start all applications, see Restarting the application
server, above.
1 Expand Applications.
red: stopped
green: started
2005 MicroStrategy, Inc. Deploying with WebSphere 5.x and IBM HTTP Server 173
8 Configuring and Deploying MicroStrategy Web Universal Installation and Configuration Guide
174 Deploying with WebSphere 5.x and IBM HTTP Server 2005 MicroStrategy, Inc.
Installation and Configuration Guide Configuring and Deploying MicroStrategy Web Universal 8
# /usr/<HTTPServer>/bin/apachectl start
/usr/IBMIHS/bin/apachect1
http://<machine-name>/<context_root>/
servlet/ mstrWeb
provided
In these addresses, context_root is the name you
for the Context root for Web Module box
on Preparing for the application installation page. For
example, the default name of the WAR file, which is
MicroStrategy. For more information, refer to
Preparing for the application installation, page 170.
2005 MicroStrategy, Inc. Deploying with WebSphere 5.x and IBM HTTP Server 175
8 Configuring and Deploying MicroStrategy Web Universal Installation and Configuration Guide
1 Expand Applications.
4 Click Uninstall.
176 Deploying with WebSphere 5.x and IBM HTTP Server 2005 MicroStrategy, Inc.
Installation and Configuration Guide Configuring and Deploying MicroStrategy Web Universal 8
You can increase the Java heap size for a given application
server by configuring the WebSphere Administrative
Console.
2005 MicroStrategy, Inc. Deploying with WebSphere 5.x and IBM HTTP Server 177
8 Configuring and Deploying MicroStrategy Web Universal Installation and Configuration Guide
username userID
password password
178 Deploying with WebSphere 5.x and IBM HTTP Server 2005 MicroStrategy, Inc.
Installation and Configuration Guide Configuring and Deploying MicroStrategy Web Universal 8
2005 MicroStrategy, Inc. Deploying with Sun ONE (iPlanet) 8.0 179
8 Configuring and Deploying MicroStrategy Web Universal Installation and Configuration Guide
Preconfiguration information
This section provides the preconfiguration information
necessary for deploying MicroStrategy Web Universal on
your machine. This includes:
UNIX/Linux environment
Requirement Recommended
180 Deploying with Sun ONE (iPlanet) 8.0 2005 MicroStrategy, Inc.
Installation and Configuration Guide Configuring and Deploying MicroStrategy Web Universal 8
Windows environment
Requirement Recommended
Make sure you install both the JRE and JDK for
running Sun ONE (iPlanet) on the Windows
environment.
2005 MicroStrategy, Inc. Deploying with Sun ONE (iPlanet) 8.0 181
8 Configuring and Deploying MicroStrategy Web Universal Installation and Configuration Guide
182 Deploying with Sun ONE (iPlanet) 8.0 2005 MicroStrategy, Inc.
Installation and Configuration Guide Configuring and Deploying MicroStrategy Web Universal 8
http://<machine_name>:<admin_port>
Bypassword
default, the user name is admin. There is no
set by default. It is mandatory for you to
assign a password during the installation.
<install-dir>/bin
2005 MicroStrategy, Inc. Deploying with Sun ONE (iPlanet) 8.0 183
8 Configuring and Deploying MicroStrategy Web Universal Installation and Configuration Guide
Log redirected to
C:\Sun\AppServer8\domains\domain1\logs\ser
ver.log.
184 Deploying with Sun ONE (iPlanet) 8.0 2005 MicroStrategy, Inc.
Installation and Configuration Guide Configuring and Deploying MicroStrategy Web Universal 8
Run Verifier
Precompile JSPs
Itcheck
is recommended you select the Precompile JSPs
box to quickly load the Web pages in the
application server when you access it for the first
time.
Virtual Servers
8 Click OK.
For security purposes, you must only assign certain users the
authorization to access the MicroStrategy Web Administrator
page. To do this, map the Admin security role to only those
users for whom you want to grant permission to work in the
MicroStrategy Web Administrator page.
file
admin-realm
certificate
Asecurity
realm, also called a security policy domain or
domain, is a scope over which a common
security policy is defined and enforced by the security
administrator of the security service. For more
information, see the following resource:
http://docs.sun.com/db/prod/s1.asse#hic
2005 MicroStrategy, Inc. Deploying with Sun ONE (iPlanet) 8.0 185
8 Configuring and Deploying MicroStrategy Web Universal Installation and Configuration Guide
<sun-web-app
xmlns="http://java.sun.com/xml/ns/j2ee">
<context-root>/MicroStrategy</context-root>
<security-role-mapping>
<role-name>admin</role-name>
<principal-name>admin</principal-name>
</security-role-mapping>
</sun-web-app>
186 Deploying with Sun ONE (iPlanet) 8.0 2005 MicroStrategy, Inc.
Installation and Configuration Guide Configuring and Deploying MicroStrategy Web Universal 8
When installing Sun One 8.0 (iPlanet), the user that you
create is saved in the admin realm. By default, the user name
is admin. You must enable this admin user to access the
MicroStrategy Web Administrator page.
To access the admin user, you must change the default realm,
file, to the admin realm.
2005 MicroStrategy, Inc. Deploying with Sun ONE (iPlanet) 8.0 187
8 Configuring and Deploying MicroStrategy Web Universal Installation and Configuration Guide
2 Click Restart.
188 Deploying with Sun ONE (iPlanet) 8.0 2005 MicroStrategy, Inc.
Installation and Configuration Guide Configuring and Deploying MicroStrategy Web Universal 8
http://machine_name:HTTP_port/context
If you have used all the default variables, you can access
the following URLs:
http://localhost:80/MicroStrategy/
or
http://localhost:80/MicroStrategy/servlet/
mstrWeb
2005 MicroStrategy, Inc. Deploying with Sun ONE (iPlanet) 8.0 189
8 Configuring and Deploying MicroStrategy Web Universal Installation and Configuration Guide
The maximum Java heap size, which handles all the Java
requests, is set to 512MB by default.
You are not required to provide the path to the WAR file.
When an application is deployed, Sun ONE (iPlanet) saves a
copy of the WAR file under the <install-dir>/ias/JARS
folder and looks for that copy when undeploying.
190 Deploying with Sun ONE (iPlanet) 8.0 2005 MicroStrategy, Inc.
Installation and Configuration Guide Configuring and Deploying MicroStrategy Web Universal 8
Preconfiguration information
This section provides the preconfiguration information
necessary to deploy MicroStrategy Web Universal with
Tomcat on your Windows machine.
Installing Tomcat
Configuring Tomcat
This section uses the following setup. While your setup may
vary slightly, for example, you may have different versions of
these applications, the overall process remains the same.
Requirement Recommended
j2sdk-<version>_08-linux-i586.bin
j2sdk-1_4_2_08-linux-i586.bin
After you install the Sun JDK, you must configure it.
Ifxalan.jar
you are using Sun JDK 1.4.x, you must remove the
and xerces.jar files once you have
deployed MicroStrategy Web Universal because they
conflict with the JRE parser. The files are located by
default in the following location:
<tomcat_home>\webapps\MicroStrategy
<version>\WEB-INF\lib
Installing Tomcat
If you have not installed Tomcat 4.0 yet, download it from the
http://jakarta.apache.org/site/downloads/down
loads_tomcat-5.cgi website. For Linux, you need the
jakarta-tomcat-Y.M.D.zip file, for example,
jakarta-tomcat-4.1.29.zip.
untar jakarta-tomcat-Y.M.D.zip
Configuring Tomcat
startup.sh
shutdown.sh
setclasspath.sh
dtpad startup.sh
dtpad shutdown.sh
<tomcat-directory>/server/lib
<role rolename=admin/>
<user username=system
password=goldengate roles=admin/>
password
You can specify any value in the user name and
fields. These are used to log in to the
MicroStrategy Web Administrator page. The
roles field must be admin.
servlet/mstrWebAdmin
Preconfiguration information
This section provides the preconfiguration information
necessary to deploy MicroStrategy Web Universal on your
machine. The following are covered in this section:
This section uses the following setup. While your setup may
vary slightly, for example, you may have different versions of
these applications, the overall process remains the same.
Requirement Recommended
http://machine_name:1810
1 Start the Apache Web Server. From the Start menu, point
to OracleAS 10g - DEFAULT_HOME1, and then choose
Start
<application_server_name>.<machine_name>.<doma
in>.
You can deploy the WAR file or the EAR file. The
procedure for deploying the WAR file and EAR file
is the same.
8 Click Deploy.
6 Click Add User. Type the user name and assign the
password. Make sure that the user is a member of the
group you created in the previous step. Save the user(s).
http://IP_address/MicroStrategy/servlet/ms
trWebAdmin
Diagnostics page
Security
2005 MicroStrategy, Inc. Using the MicroStrategy Web Administrator Console 205
8 Configuring and Deploying MicroStrategy Web Universal Installation and Configuration Guide
Ifaccessed,
this is the first time the Administrator Page has been
the first two sections do not have any
Intelligence Servers listed.
206 Using the MicroStrategy Web Administrator Console 2005 MicroStrategy, Inc.
Installation and Configuration Guide Configuring and Deploying MicroStrategy Web Universal 8
ToModify
change the server properties at a later time, click
in the Connected Servers section. You can also
click Disconnect to disconnect the server.
2005 MicroStrategy, Inc. Using the MicroStrategy Web Administrator Console 207
8 Configuring and Deploying MicroStrategy Web Universal Installation and Configuration Guide
Options Description
Connection
Properties:
208 Using the MicroStrategy Web Administrator Console 2005 MicroStrategy, Inc.
Installation and Configuration Guide Configuring and Deploying MicroStrategy Web Universal 8
Options Description
Initial pool size Specifies the initial pool size for the server cluster if the
server is not connected. The pool is the number of
connections between the Web and the Intelligence
Server. This is defined at the Intelligence Server level,
not at the cluster level. You must define the pool size for
each Intelligence Server, which allows you to grant
more or fewer initial connections depending on the size
of the Intelligence Server machine. If the server is
already connected, you cannot change this option. The
default is 5.
Maximum pool size Specifies the maximum pool size for the server cluster if
the server is not connected. If the server is already
connected, you cannot change this option. The default
is 50.
Server busy Length of time, in minutes, that a Web request waits for
timeout: This is not a connection from the connection pool, if the maximum
displayed in the number of connections are all busy. The default value is
Server Properties 10.
page.
Keep the Used when there is a firewall between the Web Server
connection alive and the Intelligence Server. This setting ensures that
between Web the firewall does not remove connections between the
Server and Web Server and Intelligence Server.
Intelligence Server
2005 MicroStrategy, Inc. Using the MicroStrategy Web Administrator Console 209
8 Configuring and Deploying MicroStrategy Web Universal Installation and Configuration Guide
Options Description
Project List: This is This allows you to specify whether the user must log in
not displayed in the before or after the projects are shown. You can choose
Server Properties the following options:
page. Show all the projects connected to the Web Server
before the user logs in. This option is selected by
default.
Log in, then show the projects accessible by the
supplied login.
If users log in after the projects are shown, then all
projects from all Intelligence Servers are presented to
the users. This is the default behavior.
If they log in before the projects are shown, then the
users should only see projects available to them.
Save Allows you to save the changes you made on this page.
Delete: This is not Allows you to remove the Intelligence Server from the
displayed in the list. This button is displayed when the server is
Default Server disconnected.
Properties page.
210 Using the MicroStrategy Web Administrator Console 2005 MicroStrategy, Inc.
Installation and Configuration Guide Configuring and Deploying MicroStrategy Web Universal 8
Diagnostics page
Diagnostics allows you to define what information is logged
by the Web and SDK, as well as where it is logged. It also
provides an interface to view these messages.
2005 MicroStrategy, Inc. Using the MicroStrategy Web Administrator Console 211
8 Configuring and Deploying MicroStrategy Web Universal Installation and Configuration Guide
Options Description
Internal diagnostics This is the default option and is used to set the
setup type of information logged in the log file. The
settings defined here are written in the
logger.properties file.
Log files directory Displays the default path where the log files are
saved; use / as the directory delimiter in the path.
You can also specify a different path. The log file
is generated in the specified path in the
MSTRmmddyyyy.log_num format. Naming of
the log file is handled by the
logger.properties file. For example, the first
log file created on 01/02/2003 appears as
MSTR01022003.log_1.
212 Using the MicroStrategy Web Administrator Console 2005 MicroStrategy, Inc.
Installation and Configuration Guide Configuring and Deploying MicroStrategy Web Universal 8
Options Description
Load default values Allows you to set the options to the default values
shipped with MicroStrategy Web Universal. This
option deletes settings that you have previously
configured.
2005 MicroStrategy, Inc. Using the MicroStrategy Web Administrator Console 213
8 Configuring and Deploying MicroStrategy Web Universal Installation and Configuration Guide
Options Description
Load Default Values Allows you to return to the default values in the Web
page.
214 Using the MicroStrategy Web Administrator Console 2005 MicroStrategy, Inc.
Installation and Configuration Guide Configuring and Deploying MicroStrategy Web Universal 8
3 Specify the date range to see the data available for that
period using the From and To options. This setting is
optional. If you do not specify the date range, the data for
the current date displays.
2005 MicroStrategy, Inc. Using the MicroStrategy Web Administrator Console 215
8 Configuring and Deploying MicroStrategy Web Universal Installation and Configuration Guide
Ifgrows
the statistics are being saved in a file, the file size
quickly. For this reason, this feature should not
be used under normal circumstances. It is useful only
when the system is not working properly and you want
to analyze the data for system tuning or
troubleshooting.
Options Description
Statistics File If you select File or File and Screen mode, you
must specify an absolute path in this box. Use /
as the directory delimiter in the path.
For this page, the absolute path is the path where the
Web Server is installed.
216 Using the MicroStrategy Web Administrator Console 2005 MicroStrategy, Inc.
Installation and Configuration Guide Configuring and Deploying MicroStrategy Web Universal 8
When you set the mode to show statistics on the screen, the
following information is displayed on the left side of all the
Web pages:
2005 MicroStrategy, Inc. Using the MicroStrategy Web Administrator Console 217
8 Configuring and Deploying MicroStrategy Web Universal Installation and Configuration Guide
Security
MicroStrategy provides various security features to make
your application more secure and reliable. The Web
Administrators Security Web page allows you to enable or
disable various security options for users working with
MicroStrategy Web Universal.
218 Using the MicroStrategy Web Administrator Console 2005 MicroStrategy, Inc.
Installation and Configuration Guide Configuring and Deploying MicroStrategy Web Universal 8
Ifinformation
the Disable cookies option is selected, no
is saved in the cookies.
2005 MicroStrategy, Inc. Using the MicroStrategy Web Administrator Console 219
8 Configuring and Deploying MicroStrategy Web Universal Installation and Configuration Guide
220 Using the MicroStrategy Web Administrator Console 2005 MicroStrategy, Inc.
9
9. SETTING UP DOCUMENTS AND
HTML DOCUMENTS
Introduction
Overview
Overview
An HTML document is a container for formatting, displaying,
and distributing multiple reports on the same page, or at the
same time within a project. An HTML document object is the
standard container for creating dashboards and scorecards to
display a group of reports within the MicroStrategy platform.
InServices
this chapter, the term document signifies a Report
document.
224 Setup for creating and executing HTML documents 2005 MicroStrategy, Inc.
Installation and Configuration Guide Setting up Documents and HTML Documents 9
mkdir / machine-name/share/htmldocuments
cd /
2005 MicroStrategy, Inc. Setup for creating and executing HTML documents 225
9 Setting up Documents and HTML Documents Installation and Configuration Guide
# cd /
# mkdir <machine-name>
# cd <machine-name>
# mkdir share
# cd share
# mkdir myhtmldocuments
# ln -s /home/install/myhtmldocuments
myhtmldocuments
226 Setup for creating and executing HTML documents 2005 MicroStrategy, Inc.
Installation and Configuration Guide Setting up Documents and HTML Documents 9
2 View the source code of each HTML file and copy the XSL
file used by each HTML document in an appropriate
directory under
/machine-name/share/htmldocuments.
3 View the source code for the images used and follow the
instructions provided in the step above for XSLs.
2005 MicroStrategy, Inc. Setup for executing existing HTML documents 227
9 Setting up Documents and HTML Documents Installation and Configuration Guide
228 Setup for executing Report Services documents 2005 MicroStrategy, Inc.
10
AUTOMATED INSTALLATION
10.
AND CONFIGURATION ON
WINDOWS
Introduction
Methods of installation
The methods of installations discussed in this chapter are
Silent installation
Silent installation
Silent installations do not present any graphical user
interface (GUI) and are typically implemented by IT
departments that perform package-based installations across
the network (SMS, for example). Although not as commonly
used as the response file installations, this scenario can also
be used for OEM installations.
update dates
machine specifications
user selections
Configuration Wizard
2005 MicroStrategy, Inc. Installing and configuring with a response.ini file 233
10 Automated Installation and Configuration on Windows Installation and Configuration Guide
Installer
Options Description
234 Installing and configuring with a response.ini file 2005 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation and Configuration on Windows 10
Options Description
2005 MicroStrategy, Inc. Installing and configuring with a response.ini file 235
10 Automated Installation and Configuration on Windows Installation and Configuration Guide
Options Description
236 Installing and configuring with a response.ini file 2005 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation and Configuration on Windows 10
Paths
Options Description
2005 MicroStrategy, Inc. Installing and configuring with a response.ini file 237
10 Automated Installation and Configuration on Windows Installation and Configuration Guide
Options Description
238 Installing and configuring with a response.ini file 2005 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation and Configuration on Windows 10
Options Description
Options Description
2005 MicroStrategy, Inc. Installing and configuring with a response.ini file 239
10 Automated Installation and Configuration on Windows Installation and Configuration Guide
Options Description
Options Description
240 Installing and configuring with a response.ini file 2005 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation and Configuration on Windows 10
Options Description
2005 MicroStrategy, Inc. Installing and configuring with a response.ini file 241
10 Automated Installation and Configuration on Windows Installation and Configuration Guide
Options Description
242 Installing and configuring with a response.ini file 2005 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation and Configuration on Windows 10
Options Description
2005 MicroStrategy, Inc. Installing and configuring with a response.ini file 243
10 Automated Installation and Configuration on Windows Installation and Configuration Guide
Options Description
Options Description
244 Installing and configuring with a response.ini file 2005 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation and Configuration on Windows 10
Options Description
Options Description
2005 MicroStrategy, Inc. Installing and configuring with a response.ini file 245
10 Automated Installation and Configuration on Windows Installation and Configuration Guide
Options Description
Program folder
Options Description
246 Installing and configuring with a response.ini file 2005 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation and Configuration on Windows 10
Options Description
Options Description
2005 MicroStrategy, Inc. Installing and configuring with a response.ini file 247
10 Automated Installation and Configuration on Windows Installation and Configuration Guide
Options Description
Options Description
Options Description
248 Installing and configuring with a response.ini file 2005 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation and Configuration on Windows 10
Options Description
Options Description
2005 MicroStrategy, Inc. Installing and configuring with a response.ini file 249
10 Automated Installation and Configuration on Windows Installation and Configuration Guide
Options Description
Options Description
Options Description
250 Installing and configuring with a response.ini file 2005 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation and Configuration on Windows 10
Options Description
[Welcome]
HideDialog=TRUE
RemoveAll=FALSE
[UserRegistration]
2005 MicroStrategy, Inc. Installing and configuring with a response.ini file 251
10 Automated Installation and Configuration on Windows Installation and Configuration Guide
HideDialog=TRUE
UserName=<user name here>
CompanyName=<Company name here>
LicenseKey=<Customer License Key here>
[SetupType]
HideDialog=TRUE
Type=TYPICAL
[SuiteTarget]
HideDialog=TRUE
TargetDirectory=C:\Program
Files\MicroStrategy
[ComponentSelection]
HideDialog=TRUE
252 Installing and configuring with a response.ini file 2005 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation and Configuration on Windows 10
JDataConnectVisible=FALSE
RealAudioPlayerVisible=TRUE
WebUniversalReporterVisible=FALSE
WebUniversalAnalystVisible=FALSE
WebUniversalProfessionalVisible=FALSE
WebServicesASPNETVisible=TRUE
OfficeVisible=TRUE
eTrainerForWebVisible=TRUE
FunctionPluginVisible=TRUE
SequeLinkVisible=TRUE
IServerOLAPServicesVisible=TRUE
IServerReportServicesVisible=TRUE
2005 MicroStrategy, Inc. Installing and configuring with a response.ini file 253
10 Automated Installation and Configuration on Windows Installation and Configuration Guide
WebUniversalServerJSPSelect=TRUE
WebUniversalServerASPSelect=FALSE
eTrainerForWebSelect=TRUE
FunctionPluginSelect=FALSE
SequeLinkSelect=TRUE
IServerOLAPServicesSelect=TRUE
IServerReportServicesSelect=TRUE
[ServerDefinitionSetting]
HideDialog=TRUE
OverwriteServerDefinition=FALSE
[TutorialReportingSetting]
HideDialog=TRUE
OverwriteDSN=FALSE
[Transactor]
LoggerOutput=TRUE
LoggerDirectory=Logger
[WebVirtualDirectory]
HideDialog=TRUE
VirtualDirectory=MicroStrategy
ReconfigureVirtualDirectory=TRUE
[PortalVirtualDirectory]
HideDialog=TRUE
VirtualDirectory=NarrowcastServer
ReconfigureVirtualDirectory=TRUE
[WebServicesVirtualDirectory]
HideDialog=TRUE
VirtualDirectory=MicroStrategyWS
ReconfigureVirtualDirectory=TRUE
[eTrainerForWebVirtualDirectory]
HideDialog=TRUE
VirtualDirectory=eTrainer
ReconfigureVirtualDirectory=TRUE
[OfficeWebServicesURL]
HideDialog=TRUE
AllowBlankURL=FALSE
URL=http://localhost/MicroStrategyWS/mstrws.a
smx
254 Installing and configuring with a response.ini file 2005 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation and Configuration on Windows 10
[MSOfficeLoadOptions]
HideDialog=TRUE
ConfigureExcel=TRUE
ConfigurePowerpoint=TRUE
ConfigureWord=TRUE
[IServerServiceAccount]
HideDialog=TRUE
SkipAccountSetting=FALSE
Login=<NT userlogin here>
Password=<user password here>
Domain=<domain here>
ServiceStartUp=AUTO
[NarrowcastServiceAccount]
HideDialog=TRUE
SkipAccountSetting=FALSE
Login=<NT userlogin here>
Password=<user password here>
Domain=<domain here>
[TransactorServiceAccount]
HideDialog=TRUE
SkipAccountSetting=FALSE
Login=<NT userlogin here>
Password=<user password here>
Domain=<domain here>
[WebUDeployment]
HideDialog=TRUE
SkipDeploymentSetting=FALSE
DeploymentDirectory=C:\Program
Files\MicroStrategy\Web
JSP
[Programfolder]
HideDialog=TRUE
Name=MicroStrategy
[Summary]
HideDialog=TRUE
[Finish]
HideDialog=TRUE
2005 MicroStrategy, Inc. Installing and configuring with a response.ini file 255
10 Automated Installation and Configuration on Windows Installation and Configuration Guide
Setup.exe --ResponseFile=C:\response.ini
256 Installing and configuring with a response.ini file 2005 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation and Configuration on Windows 10
Itresponse.ini
is recommended that you always generate
file and configure it through the
Configuration Wizard.
2005 MicroStrategy, Inc. Installing and configuring with a response.ini file 257
10 Automated Installation and Configuration on Windows Installation and Configuration Guide
258 Installing and configuring with a response.ini file 2005 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation and Configuration on Windows 10
Options Description
2005 MicroStrategy, Inc. Installing and configuring with a response.ini file 259
10 Automated Installation and Configuration on Windows Installation and Configuration Guide
Options Description
260 Installing and configuring with a response.ini file 2005 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation and Configuration on Windows 10
Options Description
2005 MicroStrategy, Inc. Installing and configuring with a response.ini file 261
10 Automated Installation and Configuration on Windows Installation and Configuration Guide
InstanceName=
DSName=TEST
DSNUser=vmall
EncryptPassword=1
DSSUser=Administrator
DSNPwd=wnnnbcmomx
UseMultiProcess=True
#In this section you can configure the
Project Source Names. You can have more than
one [Client] section.
[Client]
Client=1
DataSource=Test PSN
ConnType=3
UserName=AccessUser
ServerName=
Port=34952
DSSFile=C:\WINNT\
MDType=0
Hide=False
Authentication=1
macfgwiz.exe
executable.
is the Configuration Wizard
262 Installing and configuring with a response.ini file 2005 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation and Configuration on Windows 10
[Installer]
PropertiesFilesOverwrite=FALSE
EnableTracing=FALSE
HideAllDialogs=TRUE
ForceReboot=TRUE
PreventReboot=FALSE
CheckTCPIP=TRUE
CheckIIS=TRUE
CheckSP=TRUE
CreateShortcuts=TRUE
CheckRenameOperations=TRUE
AnalyticsOverwrite=FALSE
TutReportingOverwrite=FALSE
TutDeliveryOverwrite=FALSE
BackupFiles=FALSE
RunConfigWizard=FALSE
StopAllServices=TRUE
StopIIS=TRUE
EnableASPServices=FALSE
ConfigWizardResponseFile=
RegistrySizeReq=
LogFile=
[Welcome]
HideDialog=TRUE
RemoveAll=TRUE
[WebVirtualDirectory]
HideDialog=TRUE
VirtualDirectory=MicroStrategy
RemoveVD=YES
[PortalVirtualDirectory]
HideDialog=TRUE
VirtualDirectory=NarrowcastServer
RemoveVD=YES
[WebServicesDirectory]
HideDialog=TRUE
VirtualDirectory=MicroStrategyWS
RemoveVD=YES
[eTrainerForWebVirtualDirectory]
HideDialog=TRUE
VirtualDirectory=eTrainer
RemoveVD=YES
[Finish]
HideDialog=TRUE
<path>\setup.exe --ResponseFile=
<path>\<responsefilename>
Silent installation
A silent, or unattended, installation is one that presents no
user interface. Silent installations are useful for system
administrators who do not want users to interfere with the
installation. They are typically implemented by IT
departments that perform package-based installations across
the network, such as SMS. The silent installation can be used
for
OEM installations
[Installer] Required
HideAllDialogs = Required
PreventReboot = Optional
StopAllServices = Optional
StopIIS = Optional
CheckRenameOperations = Optional
[UserRegistration] Required
[ComponentSelection] Required
EnterpriseManagerSelect = Required
[InitialPaths] Required
EnterpriseManager = Required
for
Setting HideAllDialogs = TRUE causes the script
the response file to
[InstallShield Silent]
Version=v7.00
File=ResponseFile
[File Transfer]
OverwrittenReadOnly=NoToAll
[Application]
Name=MicroStrategy
Version=x.y.z
#x.y.z represent the version of the
product#
Company=MicroStrategy
Lang=0009
[{B339F3B3-E78C-45E8-B4D2-3C46C1C13663}-Dl
gOrder]
Count=0
<path>\setup.exe -L0009
--ResponseFile="c:\response.ini" -s
-f1c:\setup.iss -f2c:\setup.log
Language Value
English L0009
Italian L0010
Portuguese L0016
German L0007
Language Value
Spanish L000A
Japanese L0011
Korean L0012
Chinese L0004
Swedish L001D
French L000C
<path>\setup.exe -L000A
Ifsubsequent
there are installation termination messages in
installation instances that use the same
dialog flow, they are also stored in the
MSTRInst.log.
Line Description
AND CONFIGURATION ON
UNIX
Introduction
Silent installation
A silent or unattended installation is one that presents no
graphical user interface (GUI). Silent installations allow you
to automate the installation, so it can be called from a script
and executed without user interaction. Silent installations are
useful for system administrators who do not want users to
run the installation themselves. The silent installation can be
done on one or more computers.
2 You can access the installation files and the options file
from a CD-ROM or you can ask your system
administrator to share the files in a network location. For
information on mounting or unmounting CD-ROMs, see
Mounting CD-ROMs, page 400 in Appendix E,
Troubleshooting.
-W settingname=<value>
Customer information
Your name, the name of the company for which you work,
and the license key.
User
-W userRegistration.user=<value>
Company
-W userRegistration.company=<value>
License key
-W userRegistration.cdkey=<value>
Home directory
-W silent.homeDirectory=<value>
Install directory
-W silent.installDirectory=<value>
Log directory
-W silent.logDirectory=<value>
Product features
Legal values that you provide for all the product features are
-P IServerFeature.active=<value>
-P IServerFeature.active=true
-P WebUAnalystFeature.active=<value>
-P WebUAnalystFeature.active=true
-P WebUReporterFeature.active=<value>
-P WebUReporterFeature.active=true
-P WebUProfFeature.active=<value>
MicroStrategy SDK
-P SDKFeature.active=true
This value should be specified when the license being used for
MicroStrategy Intelligence Server is based on CPUs. Legal
values are integers between 1 and either the number of CPUs
allowed by the license or the number of CPUs in the machine,
whichever is lower.
-W cpuCountBean.cpuNumber=<value>
-W cpuCountBean.cpuNumber=
$J(install.cpuCount.maximum)
-W silent.keepDefaultDeployPath=<value>
-W silent.applicationDeployPath=<value>
-W silent.sdkDirectory="<value>"
Override options
Ifstarts
the installation fails on any of the steps before it
copying the files, it does not give any feedback
other than the return value different from 0.
Itresponse.ini
is recommended that you always create the
file through the GUI mode of the
Configuration Wizard. For more information, refer to
Creating a response.ini file for the Configuration
Wizard, page 280.
Itresponse.ini
is recommended that you always create the
file through the GUI mode of the
Configuration Wizard.
Option Description
Repository 1 or 0.
1: TRUE. The Configuration Wizard
configures the metadata repository and
statistics table.
0: FALSE.
Option Description
CreateConfig 1 or 0.
1: TRUE. The Configure Default
Configuration option is set. This setting is
dependent on the CreateMDTables setting,
described below. If the CreateMDTables
option is set to 1, then you cannot set the
CreateConfig option to 0 because this task
is performed by default.
0: FALSE.
CreateMDTables 1 or 0.
1: TRUE. The Configuration Wizard
performs the Create metadata table task to
create a metadata repository in the
database location of your choice. If this
value is set to 1, the CreateConfig option
above is automatically configured.
0: FALSE.
CreateStatTables 1 or 0.
1: TRUE. The Configuration Wizard
performs the Create statistics table task.
0: FALSE.
Option Description
Server 1 or 0.
1: TRUE. Configures the Setup
MicroStrategy Intelligence Server option of
the Configuration Wizard.
0: FALSE.
Action 1, 2, 3, or 4.
1: Creates a new Intelligence Server
definition.
2: Uses an existing Intelligence Server
definition.
3: Removes an existing Intelligence Server
definition.
4: Creates a new Intelligence Server
definition and use that as the default.
Option Description
EncryptPassword 1 or 0.
1: TRUE. Indicates that the password
indicated in the response.ini file will be
encrypted.
0: FALSE. Indicates that the password
indicated in the response.ini file will be
used exactly as typed, that is, it will not be
encrypted.
Client 1 or 0.
1: TRUE. Configures project sources.
0: FALSE.
Option Description
Hide 1 or 0.
1: Hides the default project sources
displayed in the MicroStrategy Desktop
environment.
0: Default.
EncryptPassword 1 or 0.
1: TRUE. Indicates that the password
indicated in the response.ini file will be
encrypted.
0: FALSE. Indicates that the password
indicated in the response.ini file will be
used exactly as typed, that is, it will not be
encrypted.
Welcome message
Main menu
Prompt for response file path to be Type a valid path for the existing
executed in an unattended mode response file.
Option to specify name of the Type the name and press ENTER.
ODBC data source
If you specify a valid name for the ODBC data source, the
ODBC metadata login section is displayed. If you provide a
name that does not exist or the data source is not supported
for the metadata connection, an error message is displayed
along with the option to specify the correct name.
Option to specify login for the Type the name and press ENTER.
metadata
Option to specify password for the Type the password and press
metadata ENTER.
Metadata prefix
Option to specify prefix for the Type the prefix and press ENTER.
metadata To ignore this step, press ENTER.
Option to specify name for the Type the name and press ENTER.
MVS database To ignore this step, press ENTER.
Option to specify name of the table Type the name and press ENTER.
space for the MVS database To ignore this step, press ENTER.
Metadata script
Option to specify location of the Type the path and press ENTER.
metadata script To use the default script, press
ENTER.
You access this step if you specify a valid path in the Metadata
script section, or if you choose not to create metadata tables
in the Create metadata tables section.
Option to specify name of the Type the name and press ENTER.
ODBC data source for statistics
configuration
If you specify a valid name for the ODBC data source for
statistics configuration, the ODBC statistics login section is
displayed. If you provide a name that does not exist or the
data source uses a database that is not allowed to create
statistics, an error message is displayed along with the option
to specify the correct name.
Option to specify login for the Type the name and press ENTER.
ODBC statistics
Option to specify password for the Type the password and press
ODBC statistics ENTER.
Statistics script
Option to specify location of the Type the path and press ENTER.
statistics script To use the default script, simply
press ENTER.
If you specify a valid path and the response file is saved, the
Finish metadata process section is displayed. If the path is
invalid or if there is a problem saving the response file, an
error message is displayed along with the option to specify a
valid path.
Option to specify name of the Type the name and press ENTER.
ODBC data source for Intelligence
Server
If you specify a valid name for the ODBC data source, the
ODBC server login section is displayed. If you provide a name
that does not exist or the data source is not supported for the
metadata connection, an error message is displayed along
with the option to specify the correct name.
Option to specify login for the Type the name and press ENTER.
metadata
Option to specify password for the Type the password and press
metadata ENTER.
Option to specify prefix for the Type the prefix and press ENTER.
metadata To ignore this step, press ENTER.
Option to specify prefix for the Type the prefix and press ENTER.
temp tables To ignore this step, press ENTER.
MicroStrategy login
MicroStrategy password
Itcannot
is mandatory to specify the password, otherwise you
proceed to the next page.
Server action
Option to specify server definition Type the name and press ENTER.
Option to specify server definitions Type the name and press ENTER.
to be removed To remove multiple server
definitions, separate the names
with a backslash (\).
Option to specify port number Type the port number and press
ENTER.
The default port number is 34952.
Projects to be loaded
Projects to be unloaded
If you specify a valid path and the response file is saved, the
Finish server process section is displayed. If the path is
invalid or if there is a problem saving the response file, an
error message is displayed along with the option to specify a
valid path.
Option to specify name of the Type the name and press ENTER.
project source
Option to specify the name of the Type the name and press ENTER.
Intelligence Server The default is the name of the
machine on which Intelligence
Server is installed.
Option to specify the port number Type the port number and press
ENTER.
The default port number is 34952.
Authentication type
If you specify a valid path and the response file is saved, the
Finish project source process section is displayed. If the path
is invalid or if there is a problem saving the response file, an
error message is displayed along with the option to specify a
valid path.
MICROSTRATEGY
COMPONENTS
Introduction
314 Uninstalling MicroStrategy components on UNIX and Linux 2005 MicroStrategy, Inc.
Installation and Configuration Guide Adding or Removing MicroStrategy Components 12
2005 MicroStrategy, Inc. Uninstalling MicroStrategy components on UNIX and Linux 315
12 Adding or Removing MicroStrategy Components Installation and Configuration Guide
316 Uninstalling MicroStrategy components on UNIX and Linux 2005 MicroStrategy, Inc.
A
A. MANAGING LICENSES
Introduction
Named user
CPU
Upgrading a license
Upgrading a license
If you need to upgrade a license, use the License Manager to
perform the upgrade after you receive a new license key from
MicroStrategy.
To upgrade a license
2 On the Upgrade tab, type or paste the new key in the New
License Key box and click Upgrade. The results of the
upgrade appear in the Upgrade Results box.
Iflicense
you have upgraded your system to bring it back into
compliance, you should run a compliance
check after the upgrade. This allows the system to
recognize the upgrade and system behavior can return
to normal. To run a compliance check, on the Audit
tab, click the Compliance Check button. A message
appears when the compliance check is complete
Introduction
Creating DSNs
Setting up ODBC
The following information is intended to assist you in setting
up ODBC between the MicroStrategy Intelligence Server and
your metadata database and data warehouse.
MicroStrategy Software
ODBC Driver
Manager
Operating
Default Location for ODBC Driver Manager Libraries
System
Solaris 8, 9 <INSTALL_PATH>/lib32
AIX 5.2 <INSTALL_PATH>/lib32
RedHat <INSTALL_PATH>/lib32
Linux
Creating DSNs
After you install an ODBC driver, you can define one or more
data sources for it. The DSN should provide a unique
description of the data, for example,
Payroll_Project_Metadata or Payroll_Warehouse.
IfNext,
you select Other Relational Databases and click
you see a list of all other drivers installed on
your machine, excluding the MicroStrategy and the
Microsoft SQL Server drivers.
Ifname
you already have an existing DSN with the same
as the one you provided, a message box
appears. Select Yes to make sure the DSN points to
the location you are expecting. This will overwrite
the existing DSN. Select No to save the DSN with a
different name.
IfODBC
the DSN is not listed, check if the MicroStrategy
driver used to create the DSN is one of the
certified metadata repository vendors and try
creating the DSN again.
Platform Procedure
3 Click the System DSN tab. A list displays all the existing
system data sources and their associated drivers.
ToDrivers
view all the installed ODBC drivers, click the
tab.
4 Click Add to open the Create New Data Source dialog box.
ItODBC
is recommended that you select a MicroStrategy
driver. Starting with MicroStrategy in their
names, these drivers were installed when you installed
the MicroStrategy application on the computer.
Teradata
IfMicroStrategy,
you intend to use Teradata, which is supported by
you need to
pre-install the NCR ODBC Driver for Teradata
RDBMS. Otherwise, you will not see Teradata in the
drivers list for Other Relational Databases when using
the MicroStrategy ODBC DSN Creator.
iii Edit the ODBC.sh file and add the location of the
directory where the Red Brick Client Products are
installed to the RB_CONFIG environment variable.
RB_CONFIG=<RED_BRICK_INSTALL_PATH>
iii Edit the ODBC.sh file and add the location of the
directory where the ODBC Driver for Sybase Adaptive
Server IQ is installed to the ASDIR environment
variable.
ASDIR=<SYBASE_ASIQ_INSTALL_PATH>
iii Edit the ODBC.sh file and add the location of the
directory where the ODBC Driver for Teradata is
installed to the MSTR_TERADATA_PATH environment
variable.
MSTR_TERADATA_PATH=
<TERADATA_INSTALL_PATH>
MSTR_TERADATA_GSS_PATH='<MSTR_TERADATA_G
SS_PATH>
if [ "${MSTR_TERADATA_GSS_PATH}" !=
'<MSTR_TERADATA_GSS_PATH>' ];
INFORMIXDIR=<CSDK_INSTALL_PATH>
Driver =
/netezza_odbc_install_dir/lib/libnzsqlod
bc3.so,
Driver =
/usr/odbc/netezza221sp5/lib/libnzsqlodbc
3.so.
[NZSQL]
Driver =
/usr/local/nz/lib/libnzsqlodbc.so
Servername = 127.0.0.1
Port = 5480
Database = system
Username = admin
Password = password
CancelAsFreeStmt = false
CommLog = false
Ksqo = false
Lie = false
Optimizer = false
Parse = false
PreFetch = 256
Protocol = 7.0
ReadOnly = false
ShowSystemTables = false
Socket = 16384
DateFormat = 1
TranslationDLL =
TranslationName =
TranslationOption =
Driver =
/usr/odbc/netezza221sp5/lib/libnzsqlodbc
3.so
Servername = 10.15.225.30
Port = 5480
Database = testDB
Username = tester01
Password = tester01
CancelAsFreeStmt = false
CommLog = false
Ksqo = false
Lie = false
Optimizer = false
Parse = false
PreFetch = 256
Protocol = 7.0
ReadOnly = false
ShowSystemTables = false
Socket = 16384
DateFormat = 1
TranslationDLL =
TranslationName =
TranslationOption =
Before you use the ODBC test tool, test the network layer with
the network layer utility, PING.EXE. Consult your operating
system or network system documentation for details.
SID Oracle System Identifier that refers to the instance of Oracle running on the
server.
CatalogOptions {0 | 1}. Determines whether the result column REMARKS for the catalog
functions SQLTables and SQLColumns, and COLUMN_DEF for the catalog
function SQLColumns, have meaning for Oracle.
0: Default.
To obtain the actual default value, set CO=1.
ProcedureRetResults {0 | 1}. Determines whether the driver returns result sets from stored
procedure functions.
0: (Default) The driver does not return result sets from stored procedures.
1: The driver returns result sets from stored procedures. When set to 1
and you execute a stored procedure that does not return result sets, you
will incur a small performance penalty.
EnableStaticCursorsForL {0 | 1}. Determines whether the driver supports long columns when using a
ongData static cursor. Using this parameter causes a performance penalty at the time
of execution when reading long data.
You must set this parameter to 1 if you want to persist a result set that
contains LONG data into an XML data file.
ApplicationUsingThreads {0 | 1}. Ensures that the driver works with multi-threaded applications.
1: (Default) The driver is thread-safe.
When using the driver with single-threaded applications, set this option to
0 to avoid additional processing required for ODBC thread-safety
standards.
AlternateServers A list of alternate database servers to which the driver tries to connect if the
primary database server is unavailable. Specifying a value for this option
enables connection failover for the driver.
LogonID Default logon ID used to connect to your database. The LogonID value is
your UNIX user ID.
ServerCharSet Setting that must be invoked if the automatic codepage conversion fails. (The
driver determines the codepage of the DB2 database and converts
accordingly.)
Default setting: -1, which is equivalent to disabled.
IpAddress IP (Internet Protocol) address of the machine where the catalog tables are
stored. Enter the address using the machines numeric address (for example,
123.456.78.90) or type the address name.
If you enter an address name, the driver must find this name, with the
correct address assignment, in the HOSTS file on the workstation or in a
DNS server.
Collection Name that identifies a logical group of database objects. On AS/400, it is also
the current Schema. These objects include the DataDirect Connect DB2 Wire
Protocol driver for ODBC packages. This attribute is valid only if you are
connecting to DB2 on OS/390 or AS/400.
Location Path that specifies the DB2 location name. Use the name defined during the
local DB2 installation. This attribute is valid and required only if you are
connecting to DB2 on OS/390 or AS/400.
TcpPort Port number that is assigned to the DB2 DRDA listener process on the server
host machine. Specify this ports numeric address or its name.
5179 is the default port address.
If you specify a port name, the driver must find this name, with the correct
port assignment, in the SERVICES file on the workstation.
Package Name of the package that the driver uses to process dynamic SQL for
applications that use this data source definition.
Parameter Description
QueryBlockSize Number of rows the driver retrieves when fetching from the server. This is not
the number of rows returned to the user.
Default: 8 rows.
CloseConversation {DEALLOC | AT_COMMIT}. Determines when the DB2 Wire Protocol driver
closes an LU 6.2 conversation.
DEALLOC: (Default) The conversation is closed when the client
application terminates. Use this value unless you are tuning the system
for OLTP applications, or you want to prevent an application from using
host resources when a client leaves it idle for an extended period of time.
AT_COMMIT: The conversation is closed after the client application
executes a COMMIT statement.
UserBufferSize The size in kilobytes of the bulk packet that the DB2 Wire Protocol driver
uses to download data from the host. Valid values are 1 to 63. For most
environments, the default value of 32 is sufficient; however, adjusting the
value can optimize some client applications as follows:
For client applications that frequently download large amounts of data, a
large buffer size can improve response time.
For client applications that perform brief online transactions, a small buffer
will maximize memory on the machine where the DB2 Wire Protocol
driver is installed.
MaximumClients An integer that specifies the maximum number of concurrent client sessions
that the DB2 Wire Protocol driver can carry. If the driver is used with an
application server, select a value that will accommodate the number of users
who will simultaneously access the host system through the DB2 Wire
Protocol driver. In a client configuration, use a small value to reduce the DB2
Wire Protocol drivers memory requirements. The default is 10.
GrantExecute {0 | 1}. Indicates whether or not to grant privileges on the package you are
creating.
0: Privileges are not granted.
1: (Default) Privileges are granted.
Parameter Description
OEMANSI {0 | 1}. 1 translates data from the IBM PC character set to the ANSI character
set.
DecimalDelimiter {COMMA | PERIOD}. Determines how the decimal point is represented. This
is a required field if the DBRM file contains a decimal literal that does not
match the host systems default value.
COMMA: The decimal point is represented with a comma. For example,
3,17.
PERIOD: The decimal point is represented with a period. For example,
3.17.
DecimalPrecision {15 | 31}. Determines the number of places following the decimal point that
will be calculated.
15: (Default) 15 decimal places are calculated.
31: 31 decimal places are calculated.
Parameter Description
DynamicSections Number of statements that the DB2 Wire Protocol driver package can
prepare for a single user.
Trace Generates a trace file in the applications directory. The trace file name is
packet.xxx, where xxx is an incremental number starting with 000.
WithHold {0 | 1}. Value that specifies the cursor behavior for the application used with
this data source.
1: (Default) DB2 leaves all cursors open after a commit or rollback.
(SQLGetInfo( ) returns SQL_CB_PRESERVE for
SQL_COMMIT_CURSOR_BEHAVIOR.)
0: DB2 closes all open cursors after a commit or rollback. (SQLGetInfo( )
returns SQL_CB_DELETE.)
EnableInsertCursors {0 | 1}. Determines whether the driver can use Insert cursors during inserts
governed by parameters. Using Insert cursors improves performance during
multiple Insert operations using the same statement.
0: The driver does not use Insert cursors.
1: (Default) The driver uses Insert cursors. This option enables insert data
to be buffered in memory before being written to disk.
GetDBListFromInformix {0 | 1}. Determines whether the driver requests the database list to be
returned from the Informix server or from the database list that the user
entered at driver setup.
0: The driver uses the list that was entered by the user at driver setup.
1: (Default) The driver requests the database list from the Informix server.
NetworkAddress Specifies which network protocol is chosen under Network Library Name and
the Sybase server.
RaiseErrorPositionBehav {0 | 1}. Specifies when the error is returned and where the cursor is
ior positioned when RaiseError is encountered.
0: (Default) RaiseError is handled separately from surrounding
statements. The error is returned when RaiseError is processed via
SQLExecute, SQLExecDirect, or SQLMoreResults. The result set is
empty.
1: (MS-compatible) RaiseError is handled with the next statement. The
error is returned when the next statement is processed; the cursor is
positioned on the first row of the subsequent result set. This may result in
multiple RaiseErrors being returned on a single Execute.
Parameter Description
SelectMethod {0 | 1}. Determines whether database cursors are used for Select statements.
0: (Default) Database cursors are used. In some cases, performance
degradation can occur when performing large numbers of sequential
Select statements because of the amount of overhead associated with
creating database cursors.
1: Select statements are run directly without using database cursors, and
the data source is limited to one active statement.
Address The network address of the server running SQL Server. Used only if the
Server keyword does not specify the network name of a server running SQL
Server. Address is usually the network name of the server, but can be other
names such as a pipe, or a TCP/IP port and socket address. For example, on
TCP/IP: 199.199.199.5, 1433 or MYSVR, 1433.
ODBC
Parameter Description
UseCursorLib This setting is not used in UNIX. It specifies which CursorLibrary is used, the
one in the driver or the one that comes with the ODBC components. On the
UNIX platform, there is no ODBC Manager CursorLibrary available, which
means that the driver CursorLibrary is always used.
SERVER Host name and port number of the server that runs the database.
RB_CONFIG Location where the ODBC driver is installed.
SybaseIQ
Parameter Description
CommLinks Host name and port number of the server that runs the database. The value
should be as follows: tcpip(host=X.X.X.X;port=x)
AutoStop Specifies whether the database should continue running after connections
are disconnected.
Teradata-Server
Parameter Description
SessionMode Specifies the mode for sessions. Values can be Teradata, ANSI, or System
Default.
RunInQuietMode Specifies whether the driver should display standard message boxes on the
screen.
Parameter Description
StCheckLevel Provides enhanced ODBC state checking to detect SQLState 24000 (invalid
cursor state error) according to the requirements from the ODBC SDK.
0: (Default) No additional state checking is performed. Provides backward
compatibility. The ODBC driver will not generate error 24000 when an
ODBC function such as SQLExecute, SQLExecDirect, or an ODBC
catalog function generates a result set (open cursor state) and another
function that generates a result set is called before the first results were
fetched or freed.
1: Driver generates SQLState 24000 error if an application is in an open
cursor state and one of the following functions is called: SQLColumns,
SQLColumnPrivileges, SQLExecDirect, SQLExecute, SQLForeignKeys,
SQLGetTypeInfo, SQLPrepare, SQLPrimaryKeys,
SQLProcedureColumns, SQLProcedures, SQLSpecialColumns,
SQLStatistics, SQLTablePrivileges, or SQLTables.
2: Driver generates SQLSTate 24000 error if an application is not in an
open cursor state and SQLColAttributes, SQLDescribeCol, or SQLFetch
is called.
CharacterSet Specifies the default character set for the session. The default character set
for Single Byte Character Sets (SBCS) is ASCII. For DBCS character sets,
the value in the KanjiFormat option should match the character set name
specified for this option. Entries for this option include:
blank (default for KanjiFormat)
ASCII (for SBCS)
UTF8
SCHEBCDIC935_2IJ, TCHEBCKIC937_3IB
TCHBIG5_1RO, SDTCHBIG5_3RO
SCHEGB2312_1TO, SDSCHGB2312_2TO
SDSCHEBCDIC935_6IJ, SDTCHEBCDIC937_7IB
SDKANJIEBCDIC5026_4IG, SDKANJIEBCDIC5035_4IH
SDKANJIEUC_1U3, SDKANJISJIS_1S3
HANGULEBCKIC933_1II, HANGULKSC5601_2R4
SDHANGULEBCKIC933_5II, SDHANGULKSC5601_4R4
KANJISJIS_OS, KANJIEUC_OU
DateTimeFormat Specifies whether the ODBC driver should handle DATEs, TIMEs, and
TIMESTAMPs as integer values or ANSI-compatible strings.
III specifies that all three should be handled as integer values.
AAA specifies that they should be handled as ANSI-compatible strings.
Informix XPS
Parameter Description
ApplicationUsingThreads {0 | 1}. Ensures that the driver works with multi-threaded applications.
(AUT) 1: (Default) The driver is thread-safe.
0: Use this setting when using the driver with single-threaded applications,
to avoid additional processing required for ODBC thread-safety
standards.
CancelDetectInterval Value in seconds that determines how often the driver checks whether a
(CDI) query has been canceled using SQLCancel. If the driver determines that
SQLCancel has been issued, the query is canceled. This parameter
determines whether long-running queries in threaded applications are
canceled if the application issues a SQLCancel. For example, if
CancelDetectInterval is set to 5, then for every pending request the driver
checks every five seconds to see whether the application has canceled
execution of the query using SQLCancel.
0: (Default) Queries are not canceled even if SQLCancel is issued.
CursorBehavior (CB) {0 | 1}. Determines whether cursors will be preserved or closed at the end of
each transaction.
0: (Default) Cursors are closed at the end of each transaction.
1: Cursors are held at the current position when the transaction ends. This
value may impact the performance of your database operations.
EnableInsertCursors {0 | 1}. Determines whether the driver can use Insert cursors during inserts
(EIC) governed by parameters.
0: The driver does not use Insert cursors.
1: (Default) The drier uses Insert cursors. Using Insert cursors improves
performance during multiple Insert operations using the same statement.
This option enables insert data to be buffered in memory before being
written to disk.
Note: The driver does not currently support SQLDescribeParam so there is
no support for parameterized queries.
GetDBListFromInformix {0 | 1}. Determines whether the driver requests the database list to be
(GDBLFI) returned from the Informix server or from the database list that the user
entered at driver setup.
0: The driver uses the list that was entered by the user at driver setup.
1: (Default) The driver requests the database list from the Informix server.
HostName (HOST) Name of the machine on which the Informix server resides.
Parameter Description
Service (SERV) Name of the service as it appears on the host machine. This service is
assigned by the system administrator.
TrimBlankFromIndexNa {0 | 1}. Determines whether the leading space should be trimmed from a
me (TBFIN) system-generated index name. This option is provided to address problems
with applications that cannot process a leading space in index names.
0: The driver does not trim the space.
1: (Default) The driver trims the leading space.
UseDefaultLogin (UDL) {0 | 1}. Determines from where the logon information is read.
0: (Default) Logon information is read from the system information, the
connection string, or the Logon to Informix dialog box.
1: The Logon ID and Password are read directly from the Informix registry.
CATALOG USAGE
Introduction
You can add or remove all the tables from one section
to the other by clicking << and >> buttons.
Menu Description
File
Save Saves the current settings and status of the
Warehouse Catalog.
Tools
View Partitions Displays the list of tables referred to by the
selected partition mapping table in the Table
Partitions dialog box. This option is enabled
when a partition mapping table is selected.
Actions
Read the Warehouse Allows you to update and reflect the changes
Catalog done to tables in the warehouse.
7 Click Save and Close to save the changes and close the
Warehouse Catalog dialog box.
Catalog tab
View tab
Schema tab
Catalog tab
View tab
Or,
Schema tab
From the Schema tab, you can select the options that guide
the Warehouse Catalog to map schema objects to new tables
and calculate logical sizes for new tables.
Tables missing
Columns missing
Tables missing
Columns missing
CONSIDERATIONS
Introduction
Minimum Minimum
Minimum
Suggested Storage Space
Server # Recommended
Memory Required for
Processor
(RAM) Installation
On server 1 install:
MicroStrategy Desktop
MicroStrategy Architect
MicroStrategy Administrator
On server 2 install:
MicroStrategy Web
MicroStrategy Desktop
MicroStrategy Architect
MicroStrategy Administrator
The following table shows the user breakdown for the typical
small configuration.
MicroStrategy Desktop
Architect 1-2 Named Users
MicroStrategy Web
Minimum Minimum
Minimum
Suggested Storage Space
Server # Recommended
Memory Required for
Processor
(RAM) Installation
MicroStrategy Desktop
MicroStrategy Web
Analyst 100-1000 Named Users
Minimum Minimum
Minimum
Suggested Storage Space
Server # Recommended
Memory Required for
Processor
(RAM) Installation
Introduction
Mounting CD-ROMs
Before you can install MicroStrategy on either the Solaris or
AIX operating system, you need to mount the CD-ROM. The
procedure for each is included below, along with instructions
to unmount the CD-ROM
# mkdir /cdrom
# /usr/sbin/vold &
# /usr/sbin/vold &
# etc/mountall
1 # cd
2 # umount /cdrom/cdrom0
3 # eject
# mkdir /cdrom
# cd /cdrom
# unmount /cdrom
Permission errors
This section provides troubleshooting information on
permission errors.
2 Press ENTER.
The names and links between the two may or may not be
synchronized depending on whether the synchronize option
is selected in combination with whether the users and groups
are to be imported.
If users are imported into the metadata, they have their own
Inbox and personal folders. If users are not imported,
regardless of whether they are part of the LDAP Users or
LDAP Public group, their Inbox is persisted only for the
current session. Users that are not imported do not have
personal folders and can only save items in public folders if
they have the correct privileges and permissions.
The scope for all searches is for all nodes in the sub-tree.
Intelligence Server does not support configuration of the
scope parameter, although the search results may be limited
using conditions in the search filter.
WEB.XML FILE
Introduction
<context-param>
<param-name>configFile</param-name>
<param-value>pageConfig.xml</param-value>
</context-param>
<context-param>
<param-name>dtdLocation</param-name>
<param-value>/WEB-INF/xml/dtds</param-value>
<description>This is the directory where the
application looks for DTDs used by Layout
Definitions</description>
</context-param>
<context-param>
<param-name>localesFile</param-name>
<param-value>/WEB-INF/xml/locales.xml
</param-value>
</context-param>
<context-param>
<param-name>preferencesGroupsFile</param-name>
<param-value>/WEB-INF/xml/
preferencesGroups.xml</param-value>
</context-param>
<context-param>
<param-name>resourcesFolderImage</param-name>
<param-value>../images</param-value>
</context-param>
<context-param>
<param-name>resourcesFolderJavaScript
</param-name>
<param-value>../javascript</param-value>
</context-param>
<context-param>
<param-name>resourcesFolderJSP</param-name>
<param-value>../jsp</param-value>
</context-param>
<context-param>
<param-name>resourcesFolderStyle</param-name>
<param-value>../style</param-value>
</context-param>
<context-param>
<param-name>resourcesFolderStyleFixedFont
</param-name>
<param-value>../style/fixed-font</param-value>
</context-param>
<context-param>
<param-name>resourcesFolderStyleFixedFontDB
</param-name>
<param-value>../style/fixed-font/db
</param-value>
</context-param>
<context-param>
<param-name>serverConfigFilesDefaultLocation
</param-name>
<param-value>ABSOLUTE:/usr/GGapps/
MicroStrategy/xml/</param-value>
</context-param>
<context-param>
<param-name>serverLogFilesDefaultLocation
</param-name>
<param-value>ABSOLUTE:/usr/GGapps/
MicroStrategy/xml/log/</param-value>
</context-param>
<context-param>
<param-name>serverLogPropertiesFile
</param-name>
<param-value>logger.properties</param-value>
</context-param>
<context-param>
<param-name>styleCatalogFile</param-name>
<param-value>>/WEB-INF/xml/styleCatalog.xml
</param-value>
</context-param>
<context-param>
<param-name>sysPreferenceDefinitionFile
</param-name>
<param-value>sys_definitions.xml</param-value>
</context-param>
<context-param>
<param-name>sysServerDefaultsFile</param-name>
<param-value>sys_defaults.xml</param-value>
</context-param>
<!-- Other parameters that are available for
customization
<context-param>
<param-name>configServletPath</param-name>
<param-value />
</context-param>
<context-param>
<param-name>appBeanEventsFile</param-name>
<param-value></param-value>
</context-param>
<context-param>
<param-name>mdBeanEventsFile</param-name>
<param-value></param-value>
</context-param>
-->
- <servlet>
<servlet-name>mstrDocumentImages</servlet-name>
<servlet-class>com.microstrategy.web.servlets.
DocumentImageServlet</servlet-class>
- <init-param>
<param-name>imagesPath</param-name>
<param-value>../../images</param-value>
</init-param>
</servlet>
- <servlet>
<servlet-name>mstrWeb</servlet-name>
<display-name>Main Servlet</display-name>
<servlet-class>com.microstrategy.web.servlets.
MainServlet</servlet-class>
- <init-param>
<param-name>adminServletDeploymentName
</param-name>
<param-value>mstrWebAdmin</param-value>
</init-param>
- <init-param>
<param-name>blankReportId</param-name>
<param-value>05B202B9999F4C1AB960DA6208CADF3D
</param-value>
</init-param>
- <init-param>
<param-name>blankReportWritingId</param-name>
<param-value>934195564E2E58BD7CD7E4AF0423C149
</param-value>
</init-param>
- <init-param>
<param-name>clientLoggingFile</param-name>
<param-value>C:\MyTest.log</param-value>
<description>This parameter specifies the
location of the log file where the statistics
will be
saved. The full path should be included as part
of the parameter value. If the file does not
exist, the logging infrastructure will create
it (if possible). If the file already
exists,then the new information will be
appended to it.</description>
</init-param>
- <init-param>
<param-name>clientLoggingForm</param-name>
<param-value>http://localhost:8080/Microstrategy
7/jsp/ClientPerformanceForm.jsp
<description>This parameter specifies the server
and page to be used for displaying the client
performance results processing
form.</description>
</init-param>
- <init-param>
<param-name>clientLoggingLevel</param-name>
<param-value>0</param-value>
<description>This is the level of detail included
in the log. Its value is formed by the
BITWISE OR-ing of these values:
1=Analyze information at the PAGE (rendering)
level,
2=Analyze information at the DETAILED
(rendering) level,
4=Analyze information at the METHOD (client
manipulation) level,
8=Analyze information at the ACTION (client
manipulation) level.</description>
</init-param>
- <init-param>
<param-name>clientLoggingMode</param-name>
<param-value>1</param-value>
<description>This is how the logging is presented
to the user. Its value is formed by the
BITWISE OR-ing of these values:
1=Log to a file (see the value of
clientLoggingFile above for location). For this
flag to be applied, it requires the
clientLoggingType is set to LIVE.
2=Display results through an HTML page loaded
- <init-param>
<param-name>iframeJSP</param-name>
<param-value>/jsp/iframe.jsp</param-value>
</init-param>
- <init-param>
<param-name>intelligenceServerPollingFrequency
</param-name>
<param-value>300000</param-value>
</init-param>
- <init-param>
<param-name>objBrowserFolderLinksConfigFile
</param-name>
<param-value>>/WEB-INF/xml/objBrowserFolderLink
.xml</param-value>
</init-param>
-<init-param>
<param-name>reloadConfigurationFiles
</param-name>
<param-value>false</param-value>
</init-param>
- <init-param>
<param-name>servletDeploymentName
</param-name>
<param-value>mstrWeb</param-value>
</init-param>
- <init-param>
<param-name>useServletForPDF</param-name>
<param-value>true</param-value>
</init-param>
</servlet>
- <servlet>
<servlet-name>mstrWeb72GraphLoader</servlet-name>
<servlet-class>com.microstrategy.web.servlets.
OldLinksServlet</servlet-class>
- <init-param>
<param-name>graphBeanName</param-name>
<param-value>gb</param-value>
</init-param>
<param-name>mainServletPath</param-name>
<param-value>mstrWeb</param-value>
</init-param>
- <init-param>
<param-name>reportBeanPath</param-name>
<param-value>mstrWeb.report.frame.rb
</param-value>
</init-param>
- <init-param>
<param-name>resourceName</param-name>
<param-value>MSIGraphLoader.asp</param-value>
</init-param>
</servlet>
- <servlet>
<servlet-name>mstrWeb72RebuildReport
</servlet-name>
<servlet-class>com.microstrategy.web.servlets.
OldLinksServlet</servlet-class>
- <init-param>
<param-name>mainServletPath</param-name>
<param-value>mstrWeb</param-value>
</init-param>
- <init-param>
<param-name>reportBeanPath</param-name>
<param-value>mstrWeb.report.frame.rb
</param-value>
</init-param>
- <init-param>
<param-name>resourceName</param-name>
<param-value>RebuildReport.asp</param-value>
</init-param>
</servlet>
- <servlet>
<servlet-name>mstrWebAdmin</servlet-name>
<display-name>Main Admin Servlet</display-name>
<servlet-class>com.microstrategy.web.servlets.
AdminServlet</servlet-class>
- <init-param>
<param-name>adminServletDeploymentName
</param-name>
<param-value>mstrWebAdmin</param-value>
</init-param>
- <init-param>
<param-name>configFile</param-name>
<param-value>/WEB-INF/xml/pageConfig.xml
</param-value>
</init-param>
- <init-param>
<param-name>controllerClass</param-name>
<param-value>com.microstrategy.web.admin.Admin
Controller</param-value>
</init-param>
- <init-param>
<param-name>diagnosticsFileMbSizeLimit
</param-name>
<param-value>1</param-value>
</init-param>
- <init-param>
<param-name>externalSecurityClass</param-name>
<param-value>com.microstrategy.web.app.
DefaultExternalSecurity</param-value>
</init-param>
- <init-param>
<param-name>servletDeploymentName</param-name>
<param-value>mstrWebAdmin</param-value>
</init-param>
- <init-param>
<param-name>webServletDeploymentName
</param-name>
<param-value>mstrWeb</param-value>
</init-param>
- <security-role-ref>
<role-name>ADMIN</role-name>
<role-link>admin</role-link>
</security-role-ref>
</servlet>
- <servlet>
- <servlet-mapping>
<servlet-name>mstrDocumentImages</servlet-name>
<url-pattern>/servlet/Images/*</url-pattern>
</servlet-mapping>
- <servlet-mapping>
<servlet-name>mstrWeb72GraphLoader
</servlet-name>
<url-pattern>servlet/MSIGraphLoader.asp
</url-pattern>
</servlet-mapping>
- <servlet-mapping>
servlet-name>mstrWeb72RebuildReport
</servlet-name>
<url-pattern>/servlet/RebuildReport.asp
</url-pattern>
</servlet-mapping>
- <servlet-mapping>
servlet-name>mstrDocumentImages
</servlet-name>
<url-pattern>/servlet/images/*</url-pattern>
</servlet-mapping>
- <servlet-mapping>
servlet-name>mstrWeb</servlet-name>
<url-pattern>/servlet/mstrWeb</url-pattern>
</servlet-mapping>
- <servlet-mapping>
servlet-name>mstrWebAdmin</servlet-name>
<url-pattern>/servlet/mstrWebAdmin</url-pattern>
</servlet-mapping>
- <session-config>
<session-timeout>30</session-timeout>
</session-config>
<!-- TQMS 207957 -->
- <mime-mapping>
<extension>css</extension>
<mime-type>text/css</mime-type>
</mime-mapping>
- <taglib>
<taglib-uri>/webUtilTL.tld</taglib-uri>
<taglib-location>/WEB-INF/tlds/webUtilTL.tld
</taglib-location></taglib>
- <security-constraint>
<web-resource-collection>
<web-resource-name>Administrator
</web-resource-name>
<url-pattern>/servlet/mstrWebAdmin
</url-pattern>
<http-method>GET</http-method>
<http-method>POST</http-method>
<http-method>PUT</http-method>
<http-method>DELETE</http-method>
</web-resource-collection>
<auth-constraint>
<role-name>admin</role-name>
</auth-constraint>
<user-data-constraint>
<transport-guarantee>NONE
</transport-guarantee>
</user-data-constraint>
</security-constraint>
<login-config>
<auth-method>BASIC</auth-method>
<realm-name>Administrator Authentication
Area</realm-name>
</login-config>
<security-role>
<role-name>admin</role-name>
</security-role>
</web-app>
compound attribute An attribute that has more than one key (ID) form.
direct-attached storage A device such as an array of disks, a fiber channel, and the
(DAS) like that is directly connected to a machine, meaning that no
network traffic or overhead is involved.
installation log file The MicroStrategy setup program generates a log file in text
format. This log file contains records of all actions performed
by the setup program and by other executable files related to
installation.
port number The port number is how a server process identifies itself on
the machine on which it is running. For example, when the
Intelligence Server machine receives a network call from a
client (Desktop, Web Universal, Narrowcast Server,
Command Manager, and so on), it knows to forward those
calls to the Intelligence Server port number that is specified
in the call.
C accessing on Windows 93
create metadata repository 95
CD-ROMs
overview 89
mounting on AIX 402
prerequisites 88
mounting on Solaris 400
response.ini file (Windows) 257
unmounting on AIX 402
setup Intelligence server 102
unmounting on Solaris 401
configuring
certified database and drivers
Apache Web server to serve static
Intelligence Server 42 files 161
column 379 logs display 215
command line mode Tomcat 193
configuring metadata 291 configuring MicroStrategy
creating project source 304
command line mode 289
MicroStrategy Configuration configuring ODBC
Wizard 289
default directories (UNIX) 329
setting up MicroStrategy Intelligence
Server 298 default directories (Windows) 328
command line utility UNIX defined on 328
undeploying Web Universal 190 Windows defined on 328
common setups 2 configuring Sun JDK
components 2 Tomcat 192
Administrator 4 configuring through command line mode
(UNIX) 279
MicroStrategy Analytics Modules 12
connection errors, DSN 404
MicroStrategy Desktop 3
connection strings defined on 327
MicroStrategy eTrainer for Web 11
connectivity 357
MicroStrategy Intelligence Server 5
Connectivity Configuration Wizard 331
MicroStrategy Office 10
access 331
MicroStrategy SDK 9
adding DSN 332
MicroStrategy Tutorial Reporting 12
cookies, Security page 218
MicroStrategy Web and Web
Universal 7 CPU licensing 56
MicroStrategy Web Services 8 creating DSN
Narrowcast Server 11 using MicroStrategy Configuration
Wizard 334
SequeLink ODBC Socket Server 13
using MicroStrategy Connectivity Con-
configuration figuration Wizard 331
metadata repository and statistics using ODBC Administrator 336
tables 90
Configuration Wizard
accessing on UNIX 93