Installation and Configuration Guide: Document Number: 09300812
Installation and Configuration Guide: Document Number: 09300812
Installation and Configuration Guide: Document Number: 09300812
Guide
Version: 8.1.2
Document Number: 09300812
Sixth Edition, July 2008, version 8.1.2
To ensure that you are using the documentation that corresponds to the software you are licensed to use, compare this version number
with the software version shown in “About MicroStrategy...” in the Help menu of your software.
If you have not executed a written or electronic agreement with MicroStrategy or any authorized MicroStrategy distributor, the following
terms apply:
This software and documentation are the proprietary and confidential information of MicroStrategy Incorporated and may not be
provided to any other person. Copyright © 2001-2008 by MicroStrategy Incorporated. All rights reserved.
THIS SOFTWARE AND DOCUMENTATION ARE PROVIDED “AS IS” AND WITHOUT EXPRESS OR LIMITED WARRANTY OF ANY
KIND BY EITHER MICROSTRATEGY INCORPORATED OR ANYONE WHO HAS BEEN INVOLVED IN THE CREATION,
PRODUCTION, OR DISTRIBUTION OF THE SOFTWARE OR DOCUMENTATION, INCLUDING, BUT NOT LIMITED TO, THE
IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, GOOD TITLE AND
NONINFRINGMENT, QUALITY OR ACCURACY. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE
SOFTWARE AND DOCUMENTATION IS WITH YOU. SHOULD THE SOFTWARE OR DOCUMENTATION PROVE DEFECTIVE,
YOU (AND NOT MICROSTRATEGY, INC. OR ANYONE ELSE WHO HAS BEEN INVOLVED WITH THE CREATION, PRODUCTION,
OR DISTRIBUTION OF THE SOFTWARE OR DOCUMENTATION) ASSUME THE ENTIRE COST OF ALL NECESSARY
SERVICING, REPAIR, OR CORRECTION. SOME STATES DO NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES, SO
THE ABOVE EXCLUSION MAY NOT APPLY TO YOU.
In no event will MicroStrategy, Inc. or any other person involved with the creation, production, or distribution of the Software be liable
to you on account of any claim for damage, including any lost profits, lost savings, or other special, incidental, consequential, or
exemplary damages, including but not limited to any damages assessed against or paid by you to any third party, arising from the use,
inability to use, quality, or performance of such Software and Documentation, even if MicroStrategy, Inc. or any such other person or
entity has been advised of the possibility of such damages, or for the claim by any other party. In addition, MicroStrategy, Inc. or any
other person involved in the creation, production, or distribution of the Software shall not be liable for any claim by you or any other
party for damages arising from the use, inability to use, quality, or performance of such Software and Documentation, based upon
principles of contract warranty, negligence, strict liability for the negligence of indemnity or contribution, the failure of any remedy to
achieve its essential purpose, or otherwise. The entire liability of MicroStrategy, Inc. and your exclusive remedy shall not exceed, at
the option of MicroStrategy, Inc., either a full refund of the price paid, or replacement of the Software. No oral or written information
given out expands the liability of MicroStrategy, Inc. beyond that specified in the above limitation of liability. Some states do not allow
the limitation or exclusion of liability for incidental or consequential damages, so the above limitation may not apply to you.
The information contained in this manual (the Documentation) and the Software are copyrighted and all rights are reserved by
MicroStrategy, Inc. MicroStrategy, Inc. reserves the right to make periodic modifications to the Software or the Documentation without
obligation to notify any person or entity of such revision. Copying, duplicating, selling, or otherwise distributing any part of the Software
or Documentation without prior written consent of an authorized representative of MicroStrategy, Inc. are prohibited. U.S. Government
Restricted Rights. It is acknowledged that the Software and Documentation were developed at private expense, that no part is public
domain, and that the Software and Documentation are Commercial Computer Software provided with RESTRICTED RIGHTS under
Federal Acquisition Regulations and agency supplements to them. Use, duplication, or disclosure by the U.S. Government is subject
to restrictions as set forth in subparagraph (c)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFAR
252.227-7013 et. seq. or subparagraphs (c)(1) and (2) of the Commercial Computer Software—Restricted Rights at FAR 52.227-19,
as applicable. Contractor is MicroStrategy, Inc., 1861 International Drive, McLean, Virginia 22102. Rights are reserved under copyright
laws of the United States with respect to unpublished portions of the Software.
The following are either trademarks or registered trademarks of MicroStrategy Incorporated in the United States and certain other
countries:
MicroStrategy, MicroStrategy 6, MicroStrategy 7, MicroStrategy 7i, MicroStrategy 7i Evaluation Edition, MicroStrategy 7i Olap Services, MicroStrategy 8,
MicroStrategy Evaluation Edition, MicroStrategy Administrator, MicroStrategy Agent, MicroStrategy Architect, MicroStrategy BI Developer Kit,
MicroStrategy Broadcast Server, MicroStrategy Broadcaster, MicroStrategy Broadcaster Server, MicroStrategy Business Intelligence Platform,
MicroStrategy Consulting, MicroStrategy CRM Applications, MicroStrategy Customer Analyzer, MicroStrategy Desktop, MicroStrategy Desktop Analyst,
MicroStrategy Desktop Designer, MicroStrategy eCRM 7, MicroStrategy Education, MicroStrategy eTrainer, MicroStrategy Executive, MicroStrategy
Infocenter, MicroStrategy Intelligence Server, MicroStrategy Intelligence Server Universal Edition, MicroStrategy MDX Adapter, MicroStrategy Narrowcast
Server, MicroStrategy Objects, MicroStrategy OLAP Provider, MicroStrategy SDK, MicroStrategy Support, MicroStrategy Telecaster, MicroStrategy
Transactor, MicroStrategy Web, MicroStrategy Web Business Analyzer, MicroStrategy World, Alarm, Alarm.com, Alert.com, Angel, Angel.com,
Application Development and Sophisticated Analysis, Best In Business Intelligence, Centralized Application Management, Changing The Way
Government Looks At Information, DSSArchitect, DSS Broadcaster, DSS Broadcaster Server, DSS Office, DSSServer, DSS Subscriber, DSS Telecaster,
DSSWeb, eBroadcaster, eCaster, eStrategy, eTelecaster, Information Like Water, Insight Is Everything, Intelligence Through Every Phone, Your
Telephone Just Got Smarter, Intelligence To Every Decision Maker, Intelligent E-Business, IWAPU, Personal Intelligence Network, Personalized
Intelligence Portal, Query Tone, Quickstrike, Rapid Application Development, Strategy.com, Telepath, Telepath Intelligence, Telepath Intelligence (and
Design), MicroStrategy Intelligent Cubes, The E-Business Intelligence Platform, The Foundation For Intelligent E-Business, The Integrated Business
Intelligence Platform Built For The Enterprise, The Intelligence Company, The Platform For Intelligent E-Business, The Power Of Intelligent eBusiness,
The Power Of Intelligent E-Business, The Scalable Business Intelligence Platform Built For The Internet, Industrial-Strength Business Intelligence, Office
Intelligence, MicroStrategy Office, MicroStrategy Report Services, MicroStrategy Web MMT, MicroStrategy Web Services, Pixel Perfect, MicroStrategy
Mobile, MicroStrategy Integrity Manager and MicroStrategy Data Mining Services are all registered trademarks or trademarks of MicroStrategy
Incorporated.
All other products are trademarks of their respective holders. Specifications subject to change without notice. MicroStrategy is not responsible for errors
or omissions. MicroStrategy makes no warranties or commitments concerning the availability of future products or versions that may be planned or under
development.
Patent Information
This product is patented. One or more of the following patents may apply to the product sold herein: U.S. Patent Nos. 6,154,766, 6,173,310, 6,260,050,
6,263,051, 6,269,393, 6,279,033, 6,501,832, 6,567,796, 6,587,547, 6,606,596, 6,658,093, 6,658,432, 6,662,195, 6,671,715, 6,691,100, 6,694,316,
6,697,808, 6,704,723, 6,707,889, 6,741,980, 6,765,997, 6,768,788, 6,772,137, 6,788,768, 6,792,086, 6,798,867, 6,801,910, 6,820,073, 6,829,334,
6,836,537, 6,850,603, 6,859,798, 6,873,693, 6,885,734, 6,888,929, 6,895,084, 6,940,953, 6,964,012, 6,977,992, 6,996,568, 6,996,569, 7,003,512,
7,010,518, 7,016,480, 7,020,251, 7,039,165, 7,082,422, 7,113,993, 7,127,403, 7,174,349, 7,194,457, 7,197,461, 7,228,303, 7,260,577, 7,266,181,
7,272,212, 7,302,639, 7,324,942, 7,330,847, and 7,340,040. Other patent applications are pending.
Various MicroStrategy products contain the copyrighted technology of third parties. This product may contain one or more of the following copyrighted
technologies:
Graph Generation Engine Copyright © 1998-2008. Three D Graphics, Inc. All rights reserved.
Actuate® Formula One. Copyright © 1993-2008 Actuate Corporation. All rights reserved.
XML parser Copyright © 2003-2008 Microsoft Corporation. All rights reserved.
Xalan XSLT processor. Copyright © 1999-2008. The Apache Software Foundation. All rights reserved.
Xerces XML parser. Copyright © 1999-2008. The Apache Software Foundation. All rights reserved.
FOP XSL formatting objects. Copyright © 2004-2008. The Apache Software Foundation. All rights reserved.
Portions of Intelligence Server memory management Copyright 1991-2008 Compuware Corporation. All rights reserved.
International Components for Unicode
Copyright © 1999-2008 Compaq Computer Corporation
Copyright © 1999-2008 Hewlett-Packard Company
Copyright © 1999-2008 IBM Corporation
Copyright © 1999-2008 Hummingbird Communications Ltd.
Copyright © 1999-2008 Silicon Graphics, Inc.
Copyright © 1999-2008 Sun Microsystems, Inc.
Copyright © 1999-2008 The Open Group
All rights reserved.
Real Player and RealJukebox are included under license from Real Networks, Inc. Copyright © 1999-2008. All rights reserved.
CONTENTS
2. Installing Introduction................................................................................ 63
MicroStrategy on
Installation procedure .................................................................. 65
Windows
Installing with the MicroStrategy Installation Wizard.............. 66
Installation verification ........................................................... 81
Configuring your MicroStrategy installation ................................. 81
3. Installing Introduction................................................................................ 83
MicroStrategy on
Installation procedures on UNIX and Linux ................................. 84
UNIX and Linux
Different methods of installation............................................. 85
Installing with the MicroStrategy Installation Wizard.............. 86
Unique post-installation configurations. ................................. 96
Verifying installation ............................................................... 98
Directory structure.................................................................. 98
Configuring your MicroStrategy installation ............................... 100
Description of Guide
Prerequisites
Before working with this document, you should be familiar
with
• The nature and structure of the data to use for your
business intelligence application
• Your system’s configuration, including details such as
hardware configuration, installed applications, available
memory, and so on
Resources
Documentation
MicroStrategy provides both manuals and online help; these
two information sources provide different types of
information, as described below.
• Introductory information
• Concepts
• Checklists
• Examples
Manuals
The best place for all users to begin is with the MicroStrategy
Basic Reporting Guide.
MicroStrategy Overview
• Introduction to MicroStrategy: Evaluation Guide
IfAcrobat
bookmarks are not visible on the left side of an
(PDF) document, from the View menu click
Bookmarks and Page. These steps may vary slightly
depending on your version of Adobe Acrobat Reader.
Online help
Documentation standards
Type Indicates
bold • button names, check boxes, dialog boxes, options, lists, and menus that are the
focus of actions or part of a list of such GUI elements and their definitions
• text to be entered by the user
Example: Click Select
Warehouse.
Example: Type cmdmgr -f scriptfile.scp and press ENTER.
italic • new terms defined within the text and in the glossary
• names of other product manuals
• when part of a command syntax, indicates variable information to be replaced by the
user
Example: The aggregation level is the level of calculation for the metric.
Example: Type copy c:\filename d:\foldername\filename
Type Indicates
Courier • calculations
font • code samples
• registry keys
• path and file names
• URLs
• messages displayed in the screen
Example:
Sum(revenue)/number of months.
UPPERCASE • keyboard command key (such as ENTER)
• shortcut key (such as CTRL+V)
Example: To bold the selected text, press CTRL+B.
+ A keyboard command that calls for the use of more than one key (for example,
SHIFT+F1)
A warning icon alerts you to important information such as potential security risks; these
should be read before continuing.
Education
MicroStrategy Education Services provides a comprehensive
curriculum and highly skilled education consultants. Many
customers and partners from over 800 different
organizations have benefited from MicroStrategy instruction.
For a detailed description of education offerings and course
curriculums, visit www.microstrategy.com/Education.
Consulting
MicroStrategy Consulting Services provides proven methods
for delivering leading-edge technology solutions. Offerings
include complex security architecture designs, performance
and tuning, project and testing strategies and
recommendations, strategic planning, and more. For a
detailed description of consulting offerings, visit
www.microstrategy.com/Consulting.
International support
MicroStrategy supports several locales. Support for a locale
typically includes native database and operating system
support, support for date formats, numeric formats, currency
symbols etc. and availability of translated interfaces and
documentation.
Installation Result
Fresh installation on a system in which The MicroStrategy Installation Wizard prompts you to select the
MicroStrategy application has never language from the drop-down list.
been installed before The user language in the product interface is the language that
you select during installation.
Once the product is installed, the Online Help is displayed in the
same language that the user selects in the language prompt of
the installation routine.
Repair or maintenance installation on a All subsequent executions of the installation routine are
system on which MicroStrategy displayed in the language that you selected the first time you
application has been installed before installed the product on the system.
The user language in the product interface is also the language
that you selected the first time you installed the product on the
system.
Installation Result
Upgrading an earlier installation from The user language preference that was set previously in
version 7.2.3 version 7.2.3 is the language of display of the installation
routine and the user language of the product interface.
Upgrading an earlier installation from The MicroStrategy Installation Wizard prompts you to select the
version 7.2.2 or earlier, including 7.1.x language from the drop-down list. The installation routine is
displayed in the selected language.
However, the user language of the product interface language
remains the same as the one set in the product interface before
running the upgrade installation.
Besides, all subsequent executions of the installation routine for
maintenance or for upgrade, unless overridden by the
command line parameter, are displayed in the language that
you selected during the upgrade installation.
Completely uninstalling all the If you uninstall all the products and install either the same
MicroStrategy products and installing version or a higher version again, the MicroStrategy Installation
the same version or a newer version Wizard prompts you to select the language from the drop-down
list.
Note: Even if you select a language from the language prompt
in the installation routine, it has no effect on the default
language of the product interfaces.
Technical Support
If you have questions about a specific MicroStrategy product,
you should:
• Personal information:
• Case details:
• Business/system impact
• Street address
• Phone number
• Fax number
• Email address
• Case description:
Feedback
Please send any comments or suggestions about user
documentation for MicroStrategy products to:
documentationfeedback@microstrategy.com
support@microstrategy.com
Introduction
Upgrade considerations
If you have MicroStrategy products installed and want to
upgrade them, refer to the MicroStrategy Upgrade Guide.
The upgrade procedures on Windows, UNIX, and Linux are
covered in this guide. It is recommended that you read this
guide before deciding to upgrade an existing metadata.
MicroStrategy components
MicroStrategy has a range of products that you can install on
different operating systems. Depending on the type of setup
you have, you can install various combinations of
MicroStrategy components. The components described in
this section offer a complete set of tools for creating,
deploying, supporting, and maintaining the business
intelligence applications. This section briefly describes the
most common setups and the components required for each.
Ifandyousubcomponents,
are familiar with MicroStrategy components
you can skip this section and go
to Installation prerequisites, page 15.
http://www.microstrategy.com/Software/
Products/Desktop/feature_comparison.asp
MicroStrategy Administrator
MicroStrategy Administrator is a suite of tools that provide a
comprehensive systems management environment for
business intelligence. The subcomponents of MicroStrategy
Administrator are as follows:
IfWindows
you install MicroStrategy Administrator on
XP, the option to install Enterprise
Manager is not displayed.
• Sharing data
• Sharing objects
• Standard edition
• Enterprise edition
• Universal edition
Intelligence Server
Functionality Intelligence Server Universal Edition Standard and
Enterprise Editions
• Can be invoked
After they are located and examined, other services can
invoke them using an Internet standard protocol.
• Return a response
MicroStrategy Mobile
MicroStrategy Mobile is an interactive interface of the
MicroStrategy BI platform that lets mobile business users run
reports and dashboards directly from their BlackBerry®
mobile devices from Research in Motion.
MicroStrategy SDK
The MicroStrategy SDK allows you to easily adapt and
integrate MicroStrategy functionality into your application or
modify the standard interface or functionality. It provides
access to the entire platform and includes the necessary
services and utilities for building a business
intelligence-enabled application.
MicroStrategy Office
MicroStrategy Office lets every Microsoft Office user run,
edit, and format any MicroStrategy report directly from
within Microsoft applications such as Excel, PowerPoint, and
Word. MicroStrategy Office is designed using Microsoft .NET
technology and accesses the MicroStrategy business
intelligence platform using XML and MicroStrategy Web
Services.
ToServices
ensure that ASP.NET Framework 1.1 and Web
Enhancements (WSE) are installed on
users’ machines when they install MicroStrategy
Office, copy the Utilities folder to the network
location so that it is on the same folder level as the
Office folder. ASP.NET Framework and WSE
are installed only if they are not already installed
on the user’s machine.
Installation prerequisites
Before you install MicroStrategy, you must have the
following:
• Windows:
MicroStrategy Mobile Web Server The MicroStrategy Mobile Web Server hardware requirements are
the same as those for MicroStrategy Web Server hardware
requirements.
• Memory: 256 MB
• Storage: 200 MB
Sun Solaris
Log Directory 2 KB 0 0 0
IBM AIX
Log Directory 3 KB 0 0 0
HP-UX
Log Directory 2 KB 0 0 0
Log Directory 2 KB 1 0 0
RAM 1 GB 2 GB or higher
RAM 1 GB 4 GB or higher
Flash memory
Flash memory 32 MB 64 MB
BlackBerry devices
Bebelow:
aware of the following before reviewing the sections
Web browser Microsoft Internet Explorer 6.0 SP1, 6.0 SP2, or 7.0
Web browser Microsoft Internet Explorer 6.0 SP1, 6.0 SP2, or 7.0
Windows 2000 • Windows 2000 Advanced Server SP4 (on x86) - recommended with 4GT
enabled
• Windows 2000 Server SP4 (on x86)
Windows 2003 • Windows Server 2003 Enterprise Edition SP2 (on x86) - recommended with
4GT enabled
• Windows Server 2003 Standard Edition SP2 (on x86)
LDAP Client SDK Native Windows 32 bits SDK for LDAP (Wldap32.dl version 5.0.2195.6666).
For more details, refer to TN5303-8X-0719.
Operating system • Windows Server 2003 Standard Edition SP2 (on x86)
• Windows Server 2003 Enterprise Edition SP2 (on x86)
• Windows 2000 Advanced Server SP4 (on x86)
• Windows 2000 Professional SP4 (on x86)
• Windows 2000 Server SP4 (on x86)
• Windows XP Professional Edition SP3 (on x86)
• Windows Vista Ultimate Edition SP1 (on x86)
• Windows Vista Business Edition SP1 (on x86)
• Windows Vista Enterprise Edition SP1 (on x86)
Microsoft .NET Framework Microsoft .NET Framework 1.1, which is automatically installed with
MicroStrategy Office if not found on the client machine. The only
exception is when MicroStrategy Office is installed from MicroStrategy
Web. In that case, the user must follow the instructions provided to
download and install the .NET Framework.
Microsoft Web Services Microsoft Web Services Enhancements (WSE) 2.0 SP3 which is
Enhancements automatically installed with MicroStrategy Office if not found on the
client machine.
Adobe Flash Player To include Flash-enabled documents in Excel, PowerPoint, and Word,
you must have Adobe Flash Player 9.0 installed on your machine. If
Flash Player is not installed, a dialog box is displayed when you execute
a document. The dialog box provides a link to the Adobe download
website, from which you can install Flash Player.
Export application • Adobe Acrobat Reader 6, 7, and 8 or 8.1 (also used for viewing Report
Services documents)
• Microsoft Office 2007 SP1
• Microsoft Office 2003 SP3
• Microsoft Office 2002 (XP) SP3
• Microsoft Office 2000 SP3
MicroStrategy • Before you attempt to run MicroStrategy SDK 8.1.x, you need to have a
MicroStrategy 8.1.x project running in a server-based (three-tier or four-tier)
environment.
• MicroStrategy Web or Web Universal 8.1.x should also be installed in addition to
MicroStrategy SDK to perform custom application work on MicroStrategy Web or
Web APIs.
Windows 2003 • Windows Server 2003 Enterprise Edition SP2 (on x86)
• Windows Server 2003 Standard Edition SP2 (on x86)
MicroStrategy The MicroStrategy Tutorial project should only be used with the MicroStrategy 8.1.x
product suite. This project can only be installed on Windows 32-bit operating systems.
See the Introduction to MicroStrategy: Evaluation Guide for complete details
MicroStrategy It is highly recommended you use the MicroStrategy Analytics Modules only with the
current release of MicroStrategy.
Web browsers Subscription Portal and Portal Administrator: Microsoft Internet Explorer 6.0.1,
6.0.2, and 7.0
Third party Adobe MicroStrategy Narrowcast Server can deliver Adobe Flash content as the body
Flash support of an email, as an email attachment, or to a file location. The support for Flash
content deliveries by some third-party products is discussed below.
Warning: The third-party products discussed below are manufactured by
vendors independent of MicroStrategy, and the information provided is subject
to change. Refer to the appropriate third-party vendor documentation for
updated Flash support information.
• Microsoft Outlook Express and Microsoft Outlook 2003 support Flash
content both in the email body and as an attachment.
• Hotmail, YahooMail, and Gmail support Flash content only as a Flash.mht
attachment. Flash content in the body of an email is not supported.
• Web browsers: Internet Explorer 6, Internet Explorer 7, Firefox 2, and Firefox
1.59 support Flash content.
ODBC connectivity Connectivity to the Object Repository, Subscription Book Repository, and Portal
Repository databases
• Service Manager
Bebelow:
aware of the following before reviewing the sections
Sun Solaris
Solaris Zones for Solaris 10.x MicroStrategy supports the installation of Intelligence Server Universal
on Solaris Zones which meet all applicable Solaris 10.x requirements.
Refer to your third-party Sun documentation for information on Solaris
Zones.
Sun Solaris 8.x Sun Solaris 8.x (on SPARC) - Supported, not certified
Patch requirements: Sun-recommended Patch Cluster dated
02/11/2008 (kernel patch 117350-53) or later.
For details and installation information for each of the patches, refer to
the Patch Finder section of the Sun Microsystems website, which can
be found at http://sunsolve.sun.com/pub-cgi/
show.pl?target=patches/patch-access.
IBM AIX
IBM AIX 5.2 IBM AIX 5L Version 5.2 (on IBM POWER Architecture)
Patch requirements: Technology Level 10, with the following file sets:
• bos.rte.libc 5.2.0.17 or higher
• Visual Age 8.0.0.0 (xlC.aix50.rte) or higher
• bos.perf.libperfstat 5.3.0.0 or higher
IBM AIX 5.3 IBM AIX 5L Version 5.3 (on IBM POWER Architecture)
Patch requirements: Technology Level 7, with the following file sets:
• bos.rte.libc 5.3.0.00 or higher
• Visual Age 8.0.0.0 (xlC.aix50.rte) or higher
• bos.perf.libperfstat 5.3.0.00 or higher
Be aware of the following:
• To successfully register MicroStrategy Intelligence Server Universal
as a service on IBM AIX 5.3, you must obtain the IBM Authorized
Program Analysis Report (APAR) IY81136. Contact IBM Production
Support for help with obtaining and configuring this APAR. This
APAR is available at the following URL, which is valid as of the
release of this manual:
http://www-1.ibm.com/support/docview.wss?rs=0&q1=I
Y81136&uid=isg1IY81136&loc=en_US&cs=.
• To successfully use CPU licenses with Intelligence Server Universal
on AIX 5.3, please contact MicroStrategy Technical Support.
IBM AIX 6.1 IBM AIX 6.1 (on IBM POWER Architecture)
Patch requirements: Technology Level 0
LPAR for AIX MicroStrategy certifies the installation of Intelligence Server Universal
Refer to your third-party IBM on AIX 6.1 LPAR architecture for micropartitions, which meets all
documentation for information applicable AIX 6.1 requirements.
on LPAR.
MicroStrategy supports the installation of Intelligence Server Universal
on AIX LPAR architecture for dedicated partitions, which meets all
applicable AIX requirements.
HP-UX
HP-UX 11i v2 HP-UX 11i v2 Foundation Operating Environment (on Intel Itanium)
Patch requirements: Base Quality Pack Bundle for HP-UX 11i v2 dated
December 2007
Red Hat Enterprise Linux ES Red Hat Enterprise Linux ES and AS 4 update 6
and AS 4
Red Hat Enterprise Linux 5 Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux Advanced
and Platform 5 (on x86-64)
Red Hat Enterprise Linux Note: To support the use of a graphical user interface for MicroStrategy
Advanced Platform 5 tools and installing MicroStrategy products on Red Hat Enterprise Linux
5 and Red Hat Enterprise Linux AP 5, you must install the
libXp-1.0.0-8.x86_64.rpm package included with your Linux
install media.
SUSE Linux Enterprise Server SUSE Linux Enterprise Server 9 Patchlevel 3 (on x86-64)
9 Warning: To support the installation of Intelligence Server Universal on
SUSE Linux Enterprise Server 9, see Requirements to install on SUSE
Linux 9 or 10 below.
SUSE Linux Enterprise Server SUSE Linux Enterprise Server 10 (on x86-64)
10 Warning: To support the installation of Intelligence Server Universal on
SUSE Linux Enterprise Server 10, see Requirements to install on SUSE
Linux 9 or 10 below.
RedHat Enterprise Linux ES RedHat Enterprise Linux ES and AS 3 update 8 (on x86-64) -
and AS 3 Supported, not certified
• ln -s /usr/lib64/libssl.so.0.9.7
/usr/lib64/libssl.so.4
• ln -s /usr/lib64/libcrypto.so.0.9.7
libcrypto.so.4
Requirement Recommended
Browser resolution Minimum resolution for the monitor is 800 x 600 or higher with 256 color
palette minimum, but the recommended resolution is 1024 x 768 or
higher.
Spreadsheet export Microsoft Excel or other spreadsheet application that supports the CSV
application file type.
PDF viewer (for viewing and Adobe Acrobat Reader versions 6, 7, 8, or 8.1.
exporting PDF documents)
• IBM AIX 5.2, 5.3, and 6.1 (on IBM POWER Architecture)
Application servers
Web servers
• Apache 2.0.x
Installation considerations
The following section contains guidelines and considerations
you must keep in mind during MicroStrategy installation.
Number of users
Report complexity
OLAP Services
• User concurrency
Additional considerations
What is the maximum Intelligent Cube cache size that I can store
in an Intelligence Server?
Bebelow:
aware of the following when reviewing the table
64-bit
32-bit ODBC drivers ODBC
DBMS Driver drivers
64-bit
32-bit ODBC drivers ODBC
DBMS Driver drivers
properties that affect how much memory the process can use,
how many CPU seconds it can use, what thread model it can
use, how many files it can open, and so on.
Setting Name
Description Recommended Value
ulimit name (limit name)
filesize (file) Maximum size for a single Unlimited, or as large as the file system allows.
file. Your system administrator may enforce limits
on the maximum size of files for reasons
unrelated to MicroStrategy. This value must be
at least as large as the maximum size for core
dump files (coredumpsize).
datasize (data) Maximum heap size per Unlimited, or as large as the system virtual
process. memory allows. Your system's virtual memory
constraints affect the data size you can set for
a process’s heap size. The value should be the
same as the maximum size for core dump files
(coredumpsize).
coredumpsize Maximum size for a single Set this value to the same value as the
(coredump) core dump file. maximum heap size per process (datasize).
If core dump files are created that are larger
than this value, the files are corrupted and
unusable.
Setting Name
Description Recommended Value
ulimit name (limit name)
memoryuse (memory) Maximum size of physical Unlimited, or as large as the physical memory
memory allotted per of your system allows.
process.
vmemoryuse (vmemory) Maximum size of virtual Unlimited, or as large as your system virtual
memory allowed per memory allows.
process.
Methods of installation
The methods of MicroStrategy installation are:
• Command line
• Silent installation
GUI
The GUI mode presents a user interface for each page in the
MicroStrategy Installation Wizard. You click the mouse to
place the cursor on the desired object, then proceed as
appropriate to complete the task. The following navigational
buttons are also displayed:
• Next: Click to proceed to the next page.
• Typical
• Advanced
Typical installation
Advanced installation
Command line
In command line mode, you type the appropriate information
at the prompt and press ENTER. Instructions are included on
each page of the MicroStrategy Installation Wizard.
Silent installation
A silent, or unattended, installation is one that presents no
graphical user interface (GUI). Silent installations are useful
for system administrators who do not want users to run the
installation themselves. It allows you to automate the
installation, so it can be called from a script and executed
without user interaction.
Licensing information
If you have installed the Evaluation version of MicroStrategy,
you cannot use its license key with a Generally Available (GA)
license key in the same environment. Hence, the Evaluation
version of MicroStrategy cannot be used for your production
environment.
Aenvironment,
workaround for this scenario is to create a testing
built entirely on the Evaluation license
key. This enables customers to test any products they
want to evaluate.
Types of licenses
Refer to your MicroStrategy contract and any accompanying
contract documentation for descriptions of the different
MicroStrategy license types.
Chapter 1, Planning Your Installation: Review this chapter for important installation
prerequisites and considerations.
Chapter 2, Installing MicroStrategy on Windows: This chapter describes the procedures for
installing the MicroStrategy products necessary to run your business intelligence application
in a Windows environment.
Or
Chapter 9, Automated Installation on Windows: As an alternative to the regular installation,
you can perform a fully automated and unattended installation including customization
routines available with the product. This chapter describes different types of unattended and
automated installations and provides steps to perform these installations on Windows.
Chapter 4, Activating Your Installation: After installing MicroStrategy products, you have 30
days to activate your software installation. If you have not activated your software after these
30 days have passed, some MicroStrategy features may become unavailable until you
complete the software activation.
Chapter 5, Configuring and Connecting Intelligence Server: After installing and activating
MicroStrategy products, you must use the MicroStrategy Configuration Wizard to configure
the MicroStrategy metadata repository, statistics tables, history list tables, Intelligence
Server, and project sources. This chapter describes the steps used to configure an installed
MicroStrategy suite of products using the MicroStrategy Configuration Wizard.
Chapter 6, Deploying MicroStrategy Web and Web Universal: You can deploy your project to
your user community using MicroStrategy Web or Web Universal. This chapter provides
information on how to deploy and configure MicroStrategy Web or Web Universal on
Windows, UNIX, and Linux platforms with various Web and application servers.
You can deploy your project with either MicroStrategy Web or Web Universal. MicroStrategy
Web Universal is platform-independent, whereas MicroStrategy Web can be installed only
on Windows.
Chapter 7, Deploying MicroStrategy Web Services: This chapter describes the procedure to
deploy MicroStrategy Web Services for ASP.NET and J2EE platforms. MicroStrategy Web
Services provides a standard SOAP-based implementation of XML Web Services. It is used
by MicroStrategy Office and can also support MicroStrategy SDK programming.
Chapter 12, Adding or Removing MicroStrategy Components: This chapter describes the
steps to add and remove MicroStrategy components on Windows, as well as other operating
systems. For Windows platforms, refer to the following sections:
• Adding or removing MicroStrategy components on Windows.
• Re-installing MicroStrategy components on Windows.
• Uninstalling MicroStrategy components on Windows.
Chapter 1, Planning Your Installation: Review this chapter for important installation
prerequisites and considerations.
Chapter 3, Installing MicroStrategy on UNIX and Linux: This chapter describes the
procedures for installing the MicroStrategy products necessary to run your business
intelligence application on a UNIX and Linux environment.
Or
Chapter 10, Automated Installation on UNIX and Linux: As an alternative, you can
perform a fully automated and unattended installation without using the graphical user
interface. This chapter describes different types of unattended and automated
installations and steps to perform these installations on UNIX.
Chapter 4, Activating Your Installation: After installing MicroStrategy products, you have
30 days to activate your software installation. If you have not activated your software
after these 30 days have passed, some MicroStrategy features may become unavailable
until you complete the software activation.
Chapter 6, Deploying MicroStrategy Web and Web Universal: You can deploy your
project to your user community using MicroStrategy Web Universal. This chapter
provides information on how to deploy and configure MicroStrategy Web and Web
Universal on Windows, UNIX, and Linux platforms with various Web and application
servers.
You can deploy your project with either MicroStrategy Web or Web Universal.
MicroStrategy Web Universal is platform-independent, whereas MicroStrategy Web can
be installed only on Windows.
Chapter 8, Setting Up Documents and HTML Documents: This chapter explains the
setup required for the Intelligence Server to create and execute HTML documents and
documents. It also describes the steps to create this setup, which are only necessary on
a UNIX or Linux environment.
Introduction
IfMicroStrategy
you have used the Evaluation Edition of the
platform, you may have installed most
of these products already. However, additional
considerations are important when you are setting up
a production business intelligence system as opposed
to running the evaluation software. You should read
this chapter carefully, even if you already have a
working system from your Evaluation Edition.
Installation procedure
The MicroStrategy Installation Wizard provides steps to
guide you through installing one or more MicroStrategy
products in a Windows environment. The following sections
can assist you in installing MicroStrategy products:
Iflocate
the MicroStrategy Main Menu does not display,
and run Setup.exe on the disk.
• From the download site: Download the files from the
MicroStrategy download site. Locate and run the
Setup.exe file.
Welcome
License Agreement
Customer Information
• User Name
• Company Name
• License Key
Setup Type
Select Components
The installation pages you see after this step depend on the
products you choose to install. These instructions describe all
possible pages, but to perform the functions described in this
book, you must install the following components along with
all their subcomponents.
• MicroStrategy Administrator
• MicroStrategy Office
Ifcanyouallow
are a MicroStrategy Web administrator, you
Web users to install MicroStrategy Office
by making an ‘Install MicroStrategy Office’ link
available in MicroStrategy Web. When a user
chooses to install MicroStrategy Office,
MicroStrategy Office is installed as a stand-alone
product on his or her machine. MicroStrategy
Office can be installed even if no other
MicroStrategy products are available on his or her
Ifserver,
you are prompted to stop your MicroStrategy Web
click Yes. If you click No, you cannot continue
with the installation until you stop your MicroStrategy
Web server.
You see this page only if both of the following statements are
true:
If you did not choose the Advanced Setup option, you skip
this page and its series of dialog boxes. If you select the
Advanced Setup option, you must specify the installation
location for each component you choose to install. The
system validates the space available for each destination
selected. This processing is transparent. You are notified of
the status only if the available space is insufficient.
Select the check box to use the local system account as the
Intelligence Server service account. If you clear the check box
to set a different Intelligence Server service account, enter the
following information:
Ifreconfigure
the password you supply changes, you must
the Windows service to use the new
password. Otherwise, Intelligence Server connections
fail when the connection attempts to authenticate the
login and password.
Ifreconfigure
you change the password for this account, you must
the Narrowcast Server Windows services
to use the new password.
http://localhost/MicroStrategyWS/MSTRWS.asmx
• License details
Software Activation
Welcome
Server Information
Privacy
Click Privacy Statement to view the MicroStrategy
Statement.
Installer Information
Contact Information
You see this page if you indicated that you are not an
employee of the company licensed to use this software, and
are installing the software on behalf of that company.
Installation verification
During the installation routine, the MicroStrategy
Installation Wizard gathers and records information about
your system and your installation selections. You can verify
installation setup information through the installation log file
(install.log), located by default in C:\Program
Files\Common Files\MicroStrategy.
• Installation date
• Target directories
• Hardware specifications
• Registry paths
Introduction
• MicroStrategy SDK
• MicroStrategy Administrator
• Solaris: QueryReportingAnalysis_SunOS
• AIX: QueryReportingAnalysis_AIX
• HP-UX: QueryReportingAnalysis_HP-UX
• Linux: QueryReportingAnalysis_Linux
– Solaris: ./setupsol.bin
– AIX: ./setupAIX.bin
– HP-UX: ./setupHPIA64.bin
– Linux: ./setupLinux.bin
• To run the wizard in command line mode
Language Setup
Welcome
License Agreement
Customer Information
• User
• Company
• License Key
Home Directory
Install Directory
Log Directory
Select Components
The installation pages you see after this step depend on the
products you choose to install. These instructions describe all
possible pages.
• License details
Software Activation
Welcome
Server Information
Privacy
Click Privacy Statement to view the MicroStrategy
Statement.
Installer Information
Contact Information
You see this page if you indicated that you are not an
employee of the company licensed to use this software, and
are installing the software on behalf of that company.
ln libssl.so.0.9.7 libssl.so.4
ln libcrypto.so.0.9.7 libcrypto.so.4
Verifying installation
During the installation routine, the MicroStrategy
Installation Wizard gathers and records information about
your system and your installation selections. You can verify
the setup information through the installation log file
(install.log).
• Installation date
• Target directory
• Operating system identification
Directory structure
The following table describes the directories in which
MicroStrategy files are installed.
PATH/Directory Contents
PATH/Directory Contents
Introduction
• Installation Information:
Installation timestamp
• Hardware information:
Locale
• MicroStrategy information:
• Manually in the
https://licensing.microstrategy.com website.
Communication with this website is conducted through
Secure Socket Layer once the user has been authenticated.
• Solaris: Host ID
getconf CS_MACHINE_IDENT
• Installation ID
• Activation Status
• Contract ID
• Operating System
• Machine CPUs
• Last Updated by
• Products installed
Introduction
116 Communicating with databases: ODBC and DSNs © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Configuring and Connecting Intelligence Server 5
© 2008 MicroStrategy, Inc. Communicating with databases: ODBC and DSNs 117
5 Configuring and Connecting Intelligence Server Installation and Configuration Guide
Setting up ODBC
The following information assists you in setting up ODBC
between MicroStrategy Intelligence Server and your
metadata database and data warehouse.
118 Communicating with databases: ODBC and DSNs © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Configuring and Connecting Intelligence Server 5
© 2008 MicroStrategy, Inc. Communicating with databases: ODBC and DSNs 119
5 Configuring and Connecting Intelligence Server Installation and Configuration Guide
Inmanager
Windows, MicroStrategy uses the ODBC driver
provided by Microsoft. In UNIX/Linux
environments, MicroStrategy includes its own
ODBC driver manager to facilitate the
MicroStrategy to database server communication.
This MicroStrategy ODBC driver manager has the
equivalent functionality of the Microsoft Windows
ODBC Driver Manager.
ODBC drivers
120 Communicating with databases: ODBC and DSNs © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Configuring and Connecting Intelligence Server 5
© 2008 MicroStrategy, Inc. Communicating with databases: ODBC and DSNs 121
5 Configuring and Connecting Intelligence Server Installation and Configuration Guide
Default location for ODBC and driver files for UNIX and Linux
122 Communicating with databases: ODBC and DSNs © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Configuring and Connecting Intelligence Server 5
Defining DSNs
After you install an ODBC driver, you can define one or more
data sources for it. The DSN should provide a unique
description of the data, for example,
Payroll_Project_Metadata or Payroll_Warehouse.
© 2008 MicroStrategy, Inc. Communicating with databases: ODBC and DSNs 123
5 Configuring and Connecting Intelligence Server Installation and Configuration Guide
To create a DSN
124 Communicating with databases: ODBC and DSNs © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Configuring and Connecting Intelligence Server 5
© 2008 MicroStrategy, Inc. Communicating with databases: ODBC and DSNs 125
5 Configuring and Connecting Intelligence Server Installation and Configuration Guide
Ifname
you already have an existing DSN with the same
as the one you provided, a message box
appears. You have the following options:
• Select Yes to make sure the DSN points to the
location you are expecting. This overwrites the
existing DSN.
126 Communicating with databases: ODBC and DSNs © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Configuring and Connecting Intelligence Server 5
Platform Procedure
Windows 98 and ME From the Windows Start menu, point to Settings, and then select Control
Panel. In the Control Panel dialog box, select Data Sources (ODBC).
Windows 2000 and 2003 From the Windows Start menu, point to Settings, and then choose Control
Panel. In the Control Panel dialog box, double-click Administrative Tools,
and then Data Sources (ODBC).
© 2008 MicroStrategy, Inc. Communicating with databases: ODBC and DSNs 127
5 Configuring and Connecting Intelligence Server Installation and Configuration Guide
3 Click the System DSN tab. A list displays all the existing
system data sources and their associated drivers.
ToDrivers
view all the installed ODBC drivers, click the
tab.
4 Click Add. The Create New Data Source dialog box opens.
ItODBC
is recommended that you select a MicroStrategy
driver. These drivers, whose names start
with MicroStrategy, were installed when you
installed the MicroStrategy application on the
computer.
128 Communicating with databases: ODBC and DSNs © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Configuring and Connecting Intelligence Server 5
Before you use the ODBC test tool, test the network layer with
the network layer utility, PING.EXE. Consult your operating
system or network system documentation for details.
© 2008 MicroStrategy, Inc. Communicating with databases: ODBC and DSNs 129
5 Configuring and Connecting Intelligence Server Installation and Configuration Guide
130 Communicating with databases: ODBC and DSNs © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Configuring and Connecting Intelligence Server 5
IP-address local-machine-name
Acommunicate
4-tier setup involves configuring a Web server to
between Intelligence Server and
MicroStrategy Web or Web Universal. For more
information on deploying MicroStrategy Web or Web
Universal, see Chapter 6, Deploying MicroStrategy
Web and Web Universal.
Itproduction
is not recommended to use a 2-tier setup for the
environment.
Project sources
Itstatistics
is recommended that you create the metadata and
repository tables in different databases to
ensure enhanced performance.
3 Select the Metadata Tables check box and click Next. The
ODBC Data Source Name for Metadata Repository page
opens.
7 Enter the prefix and click OK. You are returned to the
ODBC Data Source Name for Metadata Repository page.
7 Enter the prefix and click OK. You are returned to the
ODBC Data Source Name for Metadata Repository page.
SQL scripts
Configuration messages
Ifmetadata
you continue, all information in the existing
repository is overwritten.
• User authentication
User authentication
You must specify the user name and password for the
Microstrategy user to access the metadata to create, link, or
delete server definitions.
To authenticate a user
1 After you specify the user name and password for the user
(see User authentication, page 148), click Next to access
the Create, Link, or Delete a Server Definition page.
1 After you specify the user name and password for the user
(see User authentication, page 148), click Next to access
the Create, Link, or Delete a Server Definition page.
1 After you specify the user name and password for the user
(see User authentication, page 148), click Next to access
the Create, Link, or Delete a Server Definition page.
In the Port Number page you can use the default port
number or specify another port number. The port number is
how a server process identifies itself on the machine on which
it is running. If the port number is used by another process
such as, in a shared environment, specify a free port number.
For instructions on how to find an available port number, see
Port number is in use, page 485 in Appendix B,
Troubleshooting.
Select projects
The Select Projects page displays all the projects that are in
the metadata repository. You can select projects to use with
the server definition you have chosen. The projects you select
are loaded on the server at startup.
To select projects
2 Select the check boxes for each project to load when the
server is started and click Next. The Completing the
Server Configuration Wizard opens.
Prerequisites:
Direct (2-tier)
You can also click New to create a new DSN (see Creating
a DSN for a data source) and click MD Prefix to specify a
metadata table prefix if necessary.
Authentication modes
LDAP authentication
macfgwiz.exe -r “Path\response.ini”
Options Description
[Repository] This section configures the metadata repository and statistics tables. You can
have more than one [Repository] section. Additional repository sections
can be included as [Repository1], [Repository2], and so on.
Repository= Defines whether a metadata repository and statistics tables are configured, as
determined by the following values:
• 1: Configures metadata repository and statistics tables
• 0: Does not configure metadata repository or statistics tables
ConnType= Defines the type of database connection. The following connection types are
supported.
On Windows:
• 2: Connects to the metadata using an ODBC DSN.
• 3: Connects to the metadata through a MicroStrategy Intelligence Server
(3-tier).
On UNIX and Linux:
• 200: Connects to the metadata through a MicroStrategy Intelligence
Server (3-tier).
Options Description
CreateStatTables= Defines whether statistics tables are created, as determined by the following
values:
• 1: Creates statistics tables
• 0: Does not create statistics tables
MetadataPath= Locates the SQL scripts for creating the metadata tables. Example paths to
SQL scripts in different environments are listed below:
• Windows: C:\Program Files\Common Files\MicroStrategy\
MD8SQL8.sql.
• UNIX/Linux: \INTELLIGENCE_SERVER_INSTALL_PATH\mdsql.sql.
StatisticsPath= Locates the SQL scripts for creating the statistics table. Example paths to SQL
scripts in different environments are listed below:
• Windows: C:\Program Files\Common Files\MicroStrategy\
statistics_SQLServer.SQL
• UNIX/Linux: \INTELLIGENCE_SERVER_INSTALL_PATH\
statistics_DB2.sql.
DSNName= Defines the Data Source Name for configuring a metadata repository in the
ODBC database.
UserName= Defines the user name to log in to the database containing the metadata
repository.
UserPwd= Defines the password to log in to the database containing the metadata
repository.
DSNNameStats= Defines the Data Source Name for configuring statistics tables in the ODBC
database.
UserNameStats= Defines the user name to log in to the database for configuring statistics
tables.
UserPwdStats= Defines the password to log in to the database for configuring statistics tables.
Options Description
DBName= Defines the database name to create tables in DB2 MVS. This option should
only be used when connecting to a DB2 MVS database.
TBName= Defines the table name to be created in the database.This option should only
be used when connecting to a DB2 MVS database.
Options Description
[Server] In this section you can configure the Intelligence Server definition. You
can have more than one [Server] section. Additional server sections
can be included as [Server1], [Server2], and so on.
Options Description
ProjectsToUnRegister= Defines projects to not be loaded when Intelligence Server is started. You
can select to not load multiple projects, separating projects by the \
character. For example,
ProjectsToUnRegister=Project1\Project2.
DSName= Defines the data source name for configuring the MicroStrategy
Intelligence Server.
DSSPwd= Defines the password for the MicroStrategy user name to log in to the
project.
MDPrefix= Defines a prefix for metadata repository tables used by the server
definition.
TempTable= Defines a prefix to be used for temporary tables used by the server
definition.
Options Description
UseAsDefault= Defines whether the Intelligence Server definition is set as the default
server definition to use for Intelligence Server, as determined by the
following values:
• True: Defines the Intelligence Server definition as the default server
definition
• False: Does not define the Intelligence Server definition as the
default server definition
Options Description
[Client] In this section you can configure the project source name. You can have more
than one [Client] section. Additional client sections can be included as
[Client1], [Client2], and so on.
Client= Defines whether project sources are configured, as determined by the following
values:
• 1: Configures project sources
• 0: Does not configure project sources
Options Description
ConnType= Defines the database connection type for a project source. The following
connection types are supported.
On Windows:
• 2: Connects a project source to the metadata using an ODBC DSN.
• 3: Connects a project source to the metadata through a MicroStrategy
Intelligence Server (3-tier).
On UNIX and Linux:
• 4: Connects a project source to the metadata through a MicroStrategy
Intelligence Server (3-tier).
DSN= If using connection type 2 (ConnType=2), defines the name of the ODBC
database.
UserName= If using connection type 2 (ConnType=2), user name the user name to
connect to the ODBC database.
UserPwd= If using connection type 2 (ConnType=2), defines the password to log in to the
database.
Hide= Defines whether the default project sources displayed are hidden in the
MicroStrategy Desktop environment, set this option to TRUE. The values to
control this depend on the operating system Intelligence Server is running on,
as described below.
Windows:
• True: Hides the default project sources displayed in the MicroStrategy
Desktop environment.
• False: Does not hide the default project sources displayed in the
MicroStrategy Desktop environment. This is the default behavior.
UNIX/Linux:
• 1: Hides the default project sources displayed in the MicroStrategy Desktop
environment.
• 0: Does not hide the default project sources displayed in the MicroStrategy
Desktop environment. This is the default behavior.
Options Description
Schema Loading
IfMicroStrategy,
you have upgraded from a previous version of
you can click Upgrade to retrieve
any database connection types that have been
included since the previous version of
MicroStrategy that you used.
3 Select the Advanced tab, and set the options per your
requirements and the requirements of the database you
are connecting to.
4 Click OK.
Creating a project
Now you have configured Intelligence Server and are ready to
create a project. There are various ways to create a project to
get your MicroStrategy project started. The different methods
to create a project are described in the MicroStrategy Project
Design Guide.
Introduction
http://webservername/microstrategy/asp/
http://Web_Srv1/microstrategy/asp
1 Log on to the application server by using the proper user name and password.
2 Locate the MicroStrategy.war file in the MicroStrategy Web Universal Deployment Directory you
specified during installation.
3 To increase the performance of the application and before proceeding with the deployment, see the
Performance-based setup information section, if available, for your environment and configure as
necessary. Also, after deploying MicroStrategy Web Universal on your machine, there may be a few
performance-based setup steps that you should complete.
4 Choose the desired deployment method.
5 Follow the deployment procedure.
6 Log on to the MicroStrategy Web Administrator Page.
7 Launch MicroStrategy Web Universal.
8 Start working with the application.
186 General steps to deploy MicroStrategy Web Universal © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web and Web Universal 6
Directory Contents
\WEB-INF\log All log files, except for ncsportal.log files, which are
created in the application server root folder
© 2008 MicroStrategy, Inc. Deploying with WebLogic and Apache (Solaris) 187
6 Deploying MicroStrategy Web and Web Universal Installation and Configuration Guide
188 Deploying with WebLogic and Apache (Solaris) © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web and Web Universal 6
Preconfiguration information
This section provides the preconfiguration information
necessary to deploy MicroStrategy Web Universal on your
machine. This includes the following sections:
Requirement Recommended
© 2008 MicroStrategy, Inc. Deploying with WebLogic and Apache (Solaris) 189
6 Deploying MicroStrategy Web and Web Universal Installation and Configuration Guide
190 Deploying with WebLogic and Apache (Solaris) © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web and Web Universal 6
© 2008 MicroStrategy, Inc. Deploying with WebLogic and Apache (Solaris) 191
6 Deploying MicroStrategy Web and Web Universal Installation and Configuration Guide
Ifmake
you are running WebLogic Server in Windows,
sure that you specify only forward slashes in
the absolute path. For example, <par
am-value>ABSOLUTE:C:/MyFolder
</param-value> is a valid path, but
<param-value>ABSOLUTE:C:\MyFolder</pa
ram-value> is not valid.
Ifwasyoualready
modify the web.xml file for an application that
deployed, you must re-deploy the
application for the changes to take effect. For details,
see Re-deploy the application, page 203.
You can have the Apache Web server and WebLogic Server
running independently on the same machine, but to
configure Apache to proxy the desired requests to the
WebLogic Server, you must install a plug-in provided by
WebLogic. Complete the instructions at the following URLs
to install and configure the plug-in.
http://e-docs.bea.com/wls/docs81/plugins/
apache.html
192 Deploying with WebLogic and Apache (Solaris) © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web and Web Universal 6
<WEBLOGIC_HOME>/Server/lib/solaris/
mod_wl_ssl.so
ToUniversal,
increase the performance of MicroStrategy Web
you can complete additional setup
configurations before the deployment. For more
information, see Performance-based setup
information, page 204.
- or -
© 2008 MicroStrategy, Inc. Deploying with WebLogic and Apache (Solaris) 193
6 Deploying MicroStrategy Web and Web Universal Installation and Configuration Guide
194 Deploying with WebLogic and Apache (Solaris) © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web and Web Universal 6
Ifremember
you do not change the name of the file,
to replace context_name with
MicroStrategy when accessing the application
from the URL.
Ifmake
you are running WebLogic Server in Windows,
sure that you specify only forward slashes in
the absolute path.For example, <par
am-value>ABSOLUTE:C:/MyFolder
</param-value> is a valid path, but
<param-value>ABSOLUTE:C:\MyFolder</pa
ram-value> is not valid.
• /<WEBLOGIC_MYDOMAIN_FOLDER>/applications
© 2008 MicroStrategy, Inc. Deploying with WebLogic and Apache (Solaris) 195
6 Deploying MicroStrategy Web and Web Universal Installation and Configuration Guide
ToUniversal,
increase the performance of MicroStrategy Web
you can configure additional settings after
deployment. For more information, see
Performance-based setup information, page 204.
4 To explode the WAR file inside the folder you created, run
the following command:
# rm MicroStrategy.war
196 Deploying with WebLogic and Apache (Solaris) © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web and Web Universal 6
# cd..
# mv context_folder
/<WEBLOGIC_MYDOMAIN_FOLDER>/applications
ToUniversal,
increase the performance of MicroStrategy Web
you can configure additional settings after
deployment. For more information, see
Performance-based setup information, page 204.
© 2008 MicroStrategy, Inc. Deploying with WebLogic and Apache (Solaris) 197
6 Deploying MicroStrategy Web and Web Universal Installation and Configuration Guide
Ifmake
you are running WebLogic Server in Windows,
sure that you specify only forward slashes in
the absolute path. For example, <par
am-value>ABSOLUTE:C:/MyFolder
</param-value> is a valid path, but
<param-value>ABSOLUTE:C:\MyFolder</pa
ram-value> is not valid.
198 Deploying with WebLogic and Apache (Solaris) © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web and Web Universal 6
http://IP address:port/console/
© 2008 MicroStrategy, Inc. Deploying with WebLogic and Apache (Solaris) 199
6 Deploying MicroStrategy Web and Web Universal Installation and Configuration Guide
ToUniversal,
increase the performance of MicroStrategy Web
you can configure additional settings after
deployment. For more information, see
Performance-based setup information, page 204.
200 Deploying with WebLogic and Apache (Solaris) © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web and Web Universal 6
Automatic
deployment:
© 2008 MicroStrategy, Inc. Deploying with WebLogic and Apache (Solaris) 201
6 Deploying MicroStrategy Web and Web Universal Installation and Configuration Guide
Automatic
deployment:
202 Deploying with WebLogic and Apache (Solaris) © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web and Web Universal 6
http://IP address:port/console/
© 2008 MicroStrategy, Inc. Deploying with WebLogic and Apache (Solaris) 203
6 Deploying MicroStrategy Web and Web Universal Installation and Configuration Guide
The Java heap size for the WebLogic Server can be increased
by modifying the JAVA_OPTIONS variable in the
startWebLogic.sh script.
JAVA_OPTIONS=”-ms128m -mx128m”
204 Deploying with WebLogic and Apache (Solaris) © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web and Web Universal 6
This line reflects a Java heap size of 128 MB. Set the
appropriate size. MicroStrategy recommends the initial
java heap size be set at a minimum of 500MB, assuming
the machine has enough memory space.
© 2008 MicroStrategy, Inc. Deploying with WebLogic and Apache (Solaris) 205
6 Deploying MicroStrategy Web and Web Universal Installation and Configuration Guide
</jsp-descriptor>
3 Save the file and compress the WAR file again by typing
the following command:
#jar -cvf MicroStrategy.war *
Value Description
206 Deploying with WebLogic and Apache (Solaris) © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web and Web Universal 6
© 2008 MicroStrategy, Inc. Deploying with WebLogic and Apache (Solaris) 207
6 Deploying MicroStrategy Web and Web Universal Installation and Configuration Guide
http://IP address:port/console/
7 Type the new value for Servlet Reload Check Secs. The
values are:
• -1 to never reload
• 0 to always reload
8 Click Apply.
208 Deploying with WebLogic and Apache (Solaris) © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web and Web Universal 6
<container-descriptor>
<servlet-reload-check-secs>-1</servlet-rel
oad-check-secs>
</container-descriptor>
3 Save the file and compress the WAR file again by typing
the following command:
© 2008 MicroStrategy, Inc. Deploying with WebLogic and Apache (Solaris) 209
6 Deploying MicroStrategy Web and Web Universal Installation and Configuration Guide
Alias
/MSTRWeb/images/"/<WEBLOGIC_MYDOMAIN_
FOLDER>/applications/MSTRWeb/images/"
<Directory
"/<WEBLOGIC_MYDOMAIN_FOLDER>/
applications/MSTRWeb/images">
AllowOverride None
</Directory>
2 Repeat the previous step for the JavaScript and style sheet
folders, replacing the word images in the previous code
with the folder name where the JavaScript and style sheet
files are located.
210 Deploying with WebLogic and Apache (Solaris) © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web and Web Universal 6
The Web server now serves image (GIF), style sheet (CSS),
JavaScript, and all other static files, thus reducing the load on
the application server and increasing the application’s
performance.
Preconfiguration information
This section provides the preconfiguration information
necessary to deploy MicroStrategy Web Universal on your
machine. Preconfiguration includes the following step:
© 2008 MicroStrategy, Inc. Deploying with WebSphere and IBM HTTP Server (AIX)
6 Deploying MicroStrategy Web and Web Universal Installation and Configuration Guide
Requirement Recommended
212 Deploying with WebSphere and IBM HTTP Server (AIX) © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web and Web Universal 6
4 Regenerating plugin-cfg.xml
© 2008 MicroStrategy, Inc. Deploying with WebSphere and IBM HTTP Server (AIX)
6 Deploying MicroStrategy Web and Web Universal Installation and Configuration Guide
cd <WAS_HOME>/bin
# ./startServer.sh <SERVER_NAME>
cd <WAS_HOME>/bin
# ./serverStatus.sh -all
214 Deploying with WebSphere and IBM HTTP Server (AIX) © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web and Web Universal 6
2 Click Install.
© 2008 MicroStrategy, Inc. Deploying with WebSphere and IBM HTTP Server (AIX)
6 Deploying MicroStrategy Web and Web Universal Installation and Configuration Guide
2 Click Next.
4 For the Default virtual host name for Web modules, select
default host.
6 Click Next.
216 Deploying with WebSphere and IBM HTTP Server (AIX) © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web and Web Universal 6
8 Click Next. The Map virtual hosts for web modules page
opens.
9 Select Web Tier (default host) and click Next. The Map
modules to application servers page opens.
Regenerating plugin-cfg.xml
To regenerate plugin-cfg.xml
© 2008 MicroStrategy, Inc. Deploying with WebSphere and IBM HTTP Server (AIX)
6 Deploying MicroStrategy Web and Web Universal Installation and Configuration Guide
• red: stopped
• green: started
218 Deploying with WebSphere and IBM HTTP Server (AIX) © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web and Web Universal 6
This process starts only the Web application, rather than all
the applications running on the application server. To stop
and start all applications, see Restarting the application
server, above.
1 Expand Applications.
• red: stopped
• green: started
© 2008 MicroStrategy, Inc. Deploying with WebSphere and IBM HTTP Server (AIX)
6 Deploying MicroStrategy Web and Web Universal Installation and Configuration Guide
http://IPAddress/ContextRoot/servlet/
mstrWebAdmin
220 Deploying with WebSphere and IBM HTTP Server (AIX) © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web and Web Universal 6
# /usr/<HTTPServer>/bin/apachectl start
/usr/IBMIHS/bin/apachect1
http://<machine-name>/<context_root>/
servlet/ mstrWeb
http://<IPaddress>/<context_root>/servlet/
mstrWeb
provided
In these addresses, context_root is the name you
for the Context root for Web Module box
on Preparing for the application installation page. For
example, the default name of the WAR file, which is
MicroStrategy. For more information, refer to
Preparing for the application installation, page 216.
1 Expand Applications.
© 2008 MicroStrategy, Inc. Deploying with WebSphere and IBM HTTP Server (AIX)
6 Deploying MicroStrategy Web and Web Universal Installation and Configuration Guide
4 Click Uninstall.
You can increase the Java heap size for a given application
server by configuring the WebSphere Administrative
Console.
222 Deploying with WebSphere and IBM HTTP Server (AIX) © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web and Web Universal 6
© 2008 MicroStrategy, Inc. Deploying with WebSphere and IBM HTTP Server (AIX)
6 Deploying MicroStrategy Web and Web Universal Installation and Configuration Guide
username userID
password password
224 Deploying with WebSphere and IBM HTTP Server (AIX) © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web and Web Universal 6
Preconfiguration information
This section provides the preconfiguration information
necessary for deploying MicroStrategy Web Universal on
your machine. This includes:
© 2008 MicroStrategy, Inc. Deploying with Sun Java System (Solaris) 225
6 Deploying MicroStrategy Web and Web Universal Installation and Configuration Guide
UNIX/Linux environment
Requirement Recommended
Windows environment
Requirement Recommended
226 Deploying with Sun Java System (Solaris) © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web and Web Universal 6
© 2008 MicroStrategy, Inc. Deploying with Sun Java System (Solaris) 227
6 Deploying MicroStrategy Web and Web Universal Installation and Configuration Guide
http://<machine_name>:<admin_port>
228 Deploying with Sun Java System (Solaris) © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web and Web Universal 6
Bypassword
default, the user name is admin. There is no
set by default. It is mandatory for you to
assign a password during the installation.
<install-dir>/bin
Log redirected to
C:\Sun\AppServer8\domains\domain1\logs\ser
ver.log.
© 2008 MicroStrategy, Inc. Deploying with Sun Java System (Solaris) 229
6 Deploying MicroStrategy Web and Web Universal Installation and Configuration Guide
• Run Verifier
• Precompile JSPs
Itcheck
is recommended you select the Precompile JSPs
box to quickly load the Web pages in the
application server when you access it for the first
time.
• Virtual Servers
8 Click OK.
230 Deploying with Sun Java System (Solaris) © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web and Web Universal 6
For security purposes, you must only assign certain users the
authorization to access the MicroStrategy Web Administrator
page. To do this, map the Admin security role to only those
users for whom you want to grant permission to work in the
MicroStrategy Web Administrator page.
• File
• Admin-realm
• Certificate
Asecurity
realm, also called a security policy domain or
domain, is a scope over which a common
security policy is defined and enforced by the security
administrator of the security service. For more
information, see the following resource:
http://docs.sun.com/db/prod/s1.asse#hic
© 2008 MicroStrategy, Inc. Deploying with Sun Java System (Solaris) 231
6 Deploying MicroStrategy Web and Web Universal Installation and Configuration Guide
<sun-web-app
xmlns="http://java.sun.com/xml/ns/j2ee">
<context-root>/MicroStrategy</context-root>
<security-role-mapping>
<role-name>admin</role-name>
<principal-name>admin</principal-name>
</security-role-mapping>
</sun-web-app>
232 Deploying with Sun Java System (Solaris) © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web and Web Universal 6
To access the admin user, you must change the default realm,
file, to the admin realm.
© 2008 MicroStrategy, Inc. Deploying with Sun Java System (Solaris) 233
6 Deploying MicroStrategy Web and Web Universal Installation and Configuration Guide
2 Click Restart.
http://machine_name:HTTP_port/context
234 Deploying with Sun Java System (Solaris) © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web and Web Universal 6
If you have used all the default variables, you can access
the following URLs:
http://localhost:80/MicroStrategy/
or
http://localhost:80/MicroStrategy/servlet/
mstrWeb
The maximum Java heap size, which handles all the Java
requests, is set to 512MB by default.
© 2008 MicroStrategy, Inc. Deploying with Sun Java System (Solaris) 235
6 Deploying MicroStrategy Web and Web Universal Installation and Configuration Guide
You are not required to provide the path to the WAR file.
When an application is deployed, Sun Java System (Sun
ONE) saves a copy of the WAR file under the
<install-dir>/ias/JARS folder and looks for that copy
when undeploying.
Preconfiguration information
This section provides the preconfiguration information
necessary to deploy MicroStrategy Web Universal on Tomcat
on your machine.
Requirement Recommended
If you have not installed SUN JDK 1.4.2 yet, download it from
the
http://java.sun.com/j2se/1.4.2/download.html
website. Be sure to install the JDK, not the JRE.
After you install the Sun JDK, you must configure it.
Iffolder,
you have installed JDK under the Program Files
type Progra~1 in the destination folder;
otherwise the system does not recognize the folder.
For example, C:\Progra~1\j2sdk1.4.2.
Configuring Tomcat
To configure Tomcat
Iffolder,
you installed Tomcat under the Program Files
type Progra~1 when specifying the
destination folder in the Value box. Otherwise, the
system does not recognize the folder. For example,
C:\Progra~1\Tomcat.
To deploy it, you must follow a set of steps that are specific to
the application server you are using. For more details, see the
application server vendor documentation or follow the
instructions within this guide. You should also follow any
relevant preconfiguration instructions within this chapter.
2 From the Start menu, select Run. The Run dialog box
opens.
3 Type cmd in the Open drop-down list and click OK. The
command prompt opens.
Iffolder,
you installed Tomcat under the Program Files
type Progra~1 when you change folders in the
command prompt. Otherwise, the system does not
recognize the folder. For example,
C:\Progra~1\Tomcat\bin.
<user name=”administrator”
password=”administrator” roles=”admin”/>
password
You can specify any value in the user name and
fields. These are used to log in to the
MicroStrategy Web Administrator page. The
roles field is required to be admin.
http://localhost:8080/MicroStrategy/
servlet/mstrWebAdmin
Preconfiguration information
This section provides the preconfiguration information
necessary to deploy MicroStrategy Web Universal with
Tomcat on your Windows machine.
• Installing Tomcat
• Configuring Tomcat
This section uses the following setup. While your setup may
vary slightly, for example, you may have different versions of
these applications, the overall process remains the same.
Requirement Recommended
If you have not installed SUN JDK 1.4.2 yet, download the
shell file from the
http://java.sun.com/j2se/1.4.2/download.html
website. Be sure to install the JDK, not the JRE.
From the location in which to install the JDK, run the shell
file you downloaded:
j2sdk-<version>-linux-i586.bin
j2sdk-1_4_2_13-linux-i586.bin
After you install the Sun JDK, you must configure it.
JAVA_HOME=/<path_name>/j2sdk<version>;
export JAVA_HOME
Installing Tomcat
Configuring Tomcat
• startup.sh
• shutdown.sh
• setclasspath.sh
dtpad setclasspath.sh
<tomcat-directory>/server/lib
Tofollow
deploy the MicroStrategy.war file, you must
a set of steps that are specific to the application
server you are using. For more details, see your
application server vendor documentation or follow the
instructions within this guide. You should also follow
any relevant preconfiguration instructions within this
chapter.
<role rolename=”admin”/>
<user username=”system”
password=”goldengate” roles=”admin”/>
password
You can specify any value in the user name and
fields. These are used to log in to the
MicroStrategy Web Administrator page. The
roles field must be admin.
servlet/mstrWebAdmin
Preconfiguration information
This section provides the preconfiguration information
necessary to deploy MicroStrategy Web Universal on your
machine. It also provides additional setup information for the
machine where the application server and Web server are
already installed.
Requirement Recommended
Ifincrease
the Deploy Tool causes performance issues, you can
the Java heap size in the Deploy Tool (shell or
batch) file using the following options:
8 Provide a name for the EAR file in the Address field and
click OK. The status bar on the Deploy Tool notifies you
when the EAR file is created. It also displays the file name
and path.
Start Deploying.
http://machinename:portnumber/
MicroStrategy/servlet/mstrWeb
Undeploy of application
sap.com/(Application Name) finished
successfully!!!
Preconfiguration information
This section provides the preconfiguration information
necessary to deploy MicroStrategy Web Universal on your
machine.
This section uses the following setup. While your setup may
vary slightly, for example, you may have different versions of
these applications, the overall process remains the same.
Requirement Recommended
Tofollow
deploy the MicroStrategy.war file, you must
a set of steps that are specific to the application
server you are using. For more details, see your
application server vendor documentation or follow the
instructions within this guide.
http://machine_name:port_number/em
1 Start the Apache Web Server. From the Start menu, point
to OracleAS 10g - DEFAULT_HOME1, and then choose
Start application_server_name.machine_name.
domain.
12 For the admin security role, select the Map Role (pencil)
icon. The Deployment Settings: Map Security Role: admin
page opens.
Repeat this step to add all users for whom you want to
grant permission to work in the MicroStrategy Web
Administrator page.
Any users mapped to the admin security role can now access
the MicroStrategy Web Administrator page to add and
connect to an Intelligence Server. For information about this,
see Accessing the MicroStrategy Web Administrator page
below.
http://server:port/Web_Services_virtual_di
rectory/Office
http://localhost/MicroStrategyWS/Office/
Lang_1033/officeinstall.htm
4 Test the URL path by clicking Go. If the path you specified
is correct, the MicroStrategy Office Installation page is
displayed.
Introduction
1 Log on to the application server by using the proper user name and
password.
2 Locate the MicroStrategyWS.war file in the MicroStrategy Web
Services J2EE Deployment Directory you specified during
installation.
3 To increase the performance of the application and before
proceeding with the deployment, see the Performance-based setup
information section, if available, for your environment and configure
as necessary. Also, after deploying MicroStrategy Web Services
J2EE on your machine, you may need to complete a few
performance-based setup steps.
4 Choose the desired deployment method.
5 Follow the deployment procedure.
6 View the MicroStrategy Web Services home page and validate
your installation.
7 Complete your installation by validating access to the runtime files,
editing your project sources file, and testing your Web Services
installation.
Directory Contents
© 2008 MicroStrategy, Inc. General steps to deploy MicroStrategy Web Services J2EE 267
7 Deploying MicroStrategy Web Services Installation and Configuration Guide
Directory Contents
7 Select the Java SDK version and click Next. The Create
Weblogic Configuration page opens.
Preconfiguration information
This section provides the preconfiguration information to
deploy MicroStrategy Web Services J2EE on your machine.
This includes Locating the WAR file, page 271.
- or -
4 To explode the WAR file in the folder you created, run the
following command from the command line:
jar -xvf MicroStrategyWS.war
ToServices
enhance the performance of MicroStrategy Web
J2EE, you can configure additional settings
after deployment. For more information, see
Performance-based setup information, page 278.
http://IP address:port/console/
http://IP address:port/console/
ToServices
enhance the performance of MicroStrategy Web
J2EE, you can configure additional settings
after deployment. For more information, see
Performance-based setup information, page 278.
When deployed from a Access the home page from a browser using either of the following addresses:
WAR file • http://IPaddress:port/context_name/
• http://IPaddress/context_name/
The first URL accesses the Web Services home page through port for the
WebLogic application server. The second URL uses the Apache Web server
when WebLogic is configured with Apache Web server.
The context_name is the name you gave to the WAR file and IPaddress is
the IP address of your machine. By default, the context_name is
MicroStrategyWS.
When deployed from Access the home page from a browser at this address:
an exploded directory http://IPaddress:port/context_folder/
where context_folder is the name of the folder where the application was
exploded and IPaddress is the IP address of your machine.
http://IP address:port/console/
The Java heap size for the WebLogic Server can be increased
by modifying the JAVA_OPTIONS variable in the
startWebLogic file.
This line reflects a Java heap size of 128 MB. Set the
appropriate size. MicroStrategy recommends the initial
Java heap size to be set at a minimum of 500MB,
assuming the machine has enough memory space.
Preconfiguration information
This section provides the preconfiguration information
necessary to deploy MicroStrategy Web Services J2EE on
your machine. Preconfiguration includes Locating the WAR
file, page 280.
© 2008 MicroStrategy, Inc. Deploying with WebSphere and IBM HTTP Server 279
7 Deploying MicroStrategy Web Services Installation and Configuration Guide
280 Deploying with WebSphere and IBM HTTP Server © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web Services 7
© 2008 MicroStrategy, Inc. Deploying with WebSphere and IBM HTTP Server 281
7 Deploying MicroStrategy Web Services Installation and Configuration Guide
http://<hostname>:9060/admin
If your version of WebSphere does not offer the start and stop
options through the console, use the following command line
options:
282 Deploying with WebSphere and IBM HTTP Server © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web Services 7
• For Windows:
• For UNIX/Linux:
2 Click Install.
© 2008 MicroStrategy, Inc. Deploying with WebSphere and IBM HTTP Server 283
7 Deploying MicroStrategy Web Services Installation and Configuration Guide
The
J2EE
URL to access MicroStrategy Web Services
(http://machine-name/ContextRoot/)
contains ContextRoot, which should be replaced
by any name of your choice. ContextRoot is
case-sensitive. For example, you can use the
default name of the WAR file, which is
MicroStrategyWS.
3 Click Next.
5 Click the radio button Use default virtual host name for
web modules.
IfclicktheContinue
installation options screen is not displayed,
on the Application Security
Warnings screen to view the installation options
screen.
10 Click Next. The Map virtual hosts for Web modules page
opens.
284 Deploying with WebSphere and IBM HTTP Server © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web Services 7
19 Click Apply.
23 Click Apply.
© 2008 MicroStrategy, Inc. Deploying with WebSphere and IBM HTTP Server 285
7 Deploying MicroStrategy Web Services Installation and Configuration Guide
• commons-discovery-0.2.jar
• commons-logging-1.0.4.jar
• Red: stopped
• Green: started
If your version of WebSphere does not offer the start and stop
options through the console, use the following command line
options:
286 Deploying with WebSphere and IBM HTTP Server © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web Services 7
• For Windows:
• For UNIX/Linux:
This process starts only the Web application, rather than all
the applications running on the application server. To stop
and start all applications, see Restarting the application
server above.
1 Expand Applications.
• Red: stopped
• Green: started
© 2008 MicroStrategy, Inc. Deploying with WebSphere and IBM HTTP Server 287
7 Deploying MicroStrategy Web Services Installation and Configuration Guide
http://<webservername>:<port>/ContextRoot/
288 Deploying with WebSphere and IBM HTTP Server © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web Services 7
1 Expand Applications.
4 Click Uninstall.
You can increase the Java heap size for a given application
server by configuring the WebSphere Administrative
Console.
© 2008 MicroStrategy, Inc. Deploying with WebSphere and IBM HTTP Server 289
7 Deploying MicroStrategy Web Services Installation and Configuration Guide
Preconfiguration information
This section provides the preconfiguration information
necessary for deploying MicroStrategy Web Services J2EE on
your machine. This includes:
..\AppServer\domains\domain1\config
\server.policy
<install-dir>/bin
http://machine_name:admin_port
Toa Windows
access the Application Server Admin Console in
environment, from the Start menu,
point to Programs, Sun MicroSystems,
Application Server 8.2, and then choose Admin
Console.
Bypassword
default, the user name is admin. There is no
set by default. It is mandatory for you to
assign a password during the installation.
3 Expand Applications.
6 Click Next.
8 All the other fields are optional and can be set as per your
requirements.
9 Click OK.
• File
• Admin-realm
• Certificate
Asecurity
realm, also called a security policy domain or
domain, is a scope over which a common
security policy is defined and enforced by the security
administrator of the security service. For more
information, refer to your application server vendor
documentation. For details, you can also refer to the
following resource:
http://docs.sun.com
<sun-web-app
xmlns="http://java.sun.com/xml/ns/j2ee">
<context-root>/MicroStrategyWS</context-root>
<security-role-mapping>
<role-name>admin</role-name>
<principal-name>admin</principal-name>
</security-role-mapping>
</sun-web-app>
Make sure your user has the proper privileges to access the
MicroStrategy Web Services J2EE home page.
http://machinename:port/ContextRoot/
1 Expand Applications.
The maximum Java heap size, which handles all the Java
requests, is set to 512MB by default.
1 Expand Applications.
Preconfiguration information
This section provides the preconfiguration information
necessary to deploy MicroStrategy Web Services J2EE on
Tomcat.
To deploy the WAR file, you must follow a set of steps that are
specific to the application server you are using. For more
details, see the application server vendor documentation or
3 From the Start menu, select Run. The Run dialog box
opens.
4 Type cmd in the Open drop-down list and click OK. The
command prompt opens.
cd C:\Tomcat\bin
IfFiles
you installed Tomcat under the Program
folder, type Progra~1 when you change
folders in the command prompt, for example,
C:\Progra~1\Tomcat\bin. Otherwise, the
system does not recognize the folder.
http://localhost:port/MicroStrategyWS/
Preconfiguration information
This section provides the preconfiguration information
necessary to deploy MicroStrategy J2EE Web Services on
your machine. It provides setup information for the machine
where the application server and Web server are already
installed.
To deploy the WAR file, you must follow a set of steps that are
specific to the application server you are using. For more
details, see the application server vendor documentation or
follow the instructions within this guide. You should also
follow any relevant preconfiguration instructions within this
section.
Ifincrease
the Deploy Tool causes performance issues, you can
the Java heap size in the Deploy Tool (shell or
batch) file using the following options:
• -Xms128m and -Xmx128m
8 Provide a name for the EAR file in the Address field and
click OK. The status bar on the Deploy Tool notifies you
when the EAR file is created. It also displays the file name
and path.
Start Deploying.
http://machinename:portnumber/
MicroStrategyWS/
Preconfiguration information
This section provides the preconfiguration information
necessary to deploy MicroStrategy Web Services J2EE on
your machine.
Tofollow
deploy the MicroStrategyWS.war file, you must
a set of steps that are specific to the application
server you are using. For more details, see your
application server vendor documentation or follow the
instructions within this guide.
http://machine_name:port_number/em
1 Start the Apache Web Server. From the Start menu, point
to OracleAS 10g - DEFAULT_HOME1, and then choose
Start <application_server_name>.
<machine_name>.<domain>.
15 For the admin security role, select the Map Role (pencil)
icon. The Deployment Settings: Map Security Role: admin
page opens.
Repeat this step to add all users for whom you want to
grant permission to work in the MicroStrategy Web
Services home page.
Any users mapped to the admin security role can now access
MicroStrategy Web Services home page. For information on
accessing this page, see Accessing the MicroStrategy Web
Services home page below.
http://IP_address/MicroStrategyWS/
After you log in, the MicroStrategy Web Services home page
appears.
314 Completing your MicroStrategy Web Services J2EE deployment © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web Services 7
© 2008 MicroStrategy, Inc. Completing your MicroStrategy Web Services J2EE deployment 315
7 Deploying MicroStrategy Web Services Installation and Configuration Guide
<ProjectSource>
<ProjectSourceName>MicroStrategy Tutorial
</ProjectSourceName>
<ServerName>Intelligence Server name
</ServerName>
<AuthMode>MWSStandard
</AuthMode>
<PortNumber>0
</PortNumber>
<MaxPooledConnections>100
</MaxPooledConnections>
</ProjectSource>
316 Completing your MicroStrategy Web Services J2EE deployment © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Deploying MicroStrategy Web Services 7
© 2008 MicroStrategy, Inc. Administering your MicroStrategy Web Services deployment 317
7 Deploying MicroStrategy Web Services Installation and Configuration Guide
Introduction
Prerequisites
This chapter assumes the following:
• You are familiar with UNIX or Linux.
InServices
this chapter, the term “document” signifies a Report
document. For additional information on
Report Services documents, refer to the
MicroStrategy Document Creation Guide.
© 2008 MicroStrategy, Inc. Executing documents and HTML documents in UNIX/Linux 321
8 Setting Up Documents and HTML Documents Installation and Configuration Guide
322 Executing documents and HTML documents in UNIX/Linux © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Setting Up Documents and HTML Documents 8
# cd /
# mkdir share
# cd share
# mkdir htmldocuments
5 Restart Samba.
© 2008 MicroStrategy, Inc. Executing documents and HTML documents in UNIX/Linux 323
8 Setting Up Documents and HTML Documents Installation and Configuration Guide
Inthethemachine
commands below, machine-name refers to
name of the computer where you
stored the HTML documents directory and created
an NFS and Samba share. This may be a different
name than the computer that you are mounting the
directory on.
cd /
mkdir machine-name
cd machine-name
mkdir share
cd share
mkdir htmldocuments
cd /
mount machine-name:/share/htmldocuments
/machine-name/share/htmldocuments
324 Executing documents and HTML documents in UNIX/Linux © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Setting Up Documents and HTML Documents 8
• Type \\machine-name\share\htmldocuments,
and click OK to open the top-level shared HTML
documents directory. For example, type
\\UNIX1\share\htmldocuments.
© 2008 MicroStrategy, Inc. Executing documents and HTML documents in UNIX/Linux 325
8 Setting Up Documents and HTML Documents Installation and Configuration Guide
2 View the source code of each HTML file and copy the XSL
file used by each HTML document in an appropriate
directory under
/machine-name/share/htmldocuments.
326 Executing documents and HTML documents in UNIX/Linux © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Setting Up Documents and HTML Documents 8
3 View the source code for the images used by each HTML
document in an appropriate directory under
/machine-name/share/htmldocuments.
© 2008 MicroStrategy, Inc. Executing documents and HTML documents in UNIX/Linux 327
8 Setting Up Documents and HTML Documents Installation and Configuration Guide
To resolve this issue, you must install the font files in the
PDFGeneratorFiles folder within the MicroStrategy
installation path on the UNIX or Linux machine, as described
below.
• http://www.microsoft.com/typography/
RedistributionFAQ.mspx
• http://www.ascendercorp.com/msfonts/
msfonts_main.html
• http://corefonts.sourceforge.net/
Introduction
• Update dates
• Machine specifications
• User selections
setup.exe --LogFile=“C:\install.log”
Methods of installation
The installation methods discussed in this chapter are:
332 Installing and configuring with a response.ini file © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation on Windows 9
Component dependencies
© 2008 MicroStrategy, Inc. Installing and configuring with a response.ini file 333
9 Automated Installation on Windows Installation and Configuration Guide
Installer
Options Description
ForceReboot = TRUE or FALSE. TRUE reboots the machine after the installation
is done. The default is FALSE.
RunConfigWizard = TRUE or FALSE. Set this option to specify whether to run the
Configuration Wizard. The default is FALSE.
ConfigWizardResponseFile = Specify the name of the response file for the Configuration
Wizard; otherwise, it takes the default name of
response.ini.
For more details on configuring the response.ini file for the
Configuration Wizard, see Configuring your installation with a
response.ini file, page 366.
334 Installing and configuring with a response.ini file © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation on Windows 9
Options Description
EnableTracing = TRUE or FALSE. Set this option to trace the setup process in a
log file that is saved in the Temp folder. The log file records
errors that are encountered during the installation. The default
is FALSE.
© 2008 MicroStrategy, Inc. Installing and configuring with a response.ini file 335
9 Automated Installation on Windows Installation and Configuration Guide
Options Description
Paths
Options Description
[InitialPaths] Section for specifying the path for the products that you select to install.
Desktop = Location where Desktop will be installed. If left empty, it takes the
default location of C:\Program Files\MicroStrategy\Desktop.
ObjectManager = Location where Object Manager will be installed. If left empty, it takes
the default location of C:\Program Files\MicroStrategy\
Administrator\Object Manager.
336 Installing and configuring with a response.ini file © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation on Windows 9
Options Description
SDK = Location where the SDK will be installed. If left empty, it takes the
default location of C:\Program Files\MicroStrategy\SDK.
eTrainer= Location where eTrainer for MicroStrategy Web will be installed. If left
empty, it takes the default location of C:\Program Files\
MicroStrategy\eTrainer.
AnalyticsModules = Location where the Analytics Modules will be installed. If left empty, it
takes the default location of C:\Program Files\MicroStrategy\
Analytics Modules.
NCSAdminDeliveryEngine Location where the Narrowcast Server Delivery Engine will be installed.
= If left empty, it takes the default location of C:\Program Files\
MicroStrategy\Narrowcast Server\Delivery Engine.
SubscriptionPortal = Location where the Subscription Portal will be installed. If left empty, it
takes the default location of C:\Program Files\MicroStrategy\
Narrowcast Server\Subscription Portal.
© 2008 MicroStrategy, Inc. Installing and configuring with a response.ini file 337
9 Automated Installation on Windows Installation and Configuration Guide
Options Description
HideDialog = TRUE or FALSE. FALSE displays the dialog box. The default is FALSE.
RemoveAll = TRUE or FALSE. This option is for the uninstall process only. Setting it
to TRUE removes all MicroStrategy products during the uninstall
process. The default is FALSE.
Options Description
HideDialog = TRUE or FALSE. FALSE displays the dialog box. The default is FALSE.
UserName = Indicates the user name of the currently logged user or a user who is
already registered. If no information is provided, you cannot proceed to
the next page.
CompanyName = The name of the company for which the software is registered. The
default is the company name in the registry.
LicenseKey = Specify the license key for the software. If you do not specify the license
key, the MicroStrategy Installation Wizard will ask for it when it reaches
that step. By default it is blank for a fresh install or displays the license
key from a previous install.
Options Description
[SetupType] Section for setting the appropriate dialog boxes to display for Typical or
Advanced installation. This dialog box offers the option to select the
installation type.
HideDialog = TRUE or FALSE. FALSE displays the dialog box. The default is FALSE.
338 Installing and configuring with a response.ini file © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation on Windows 9
Options Description
[SuiteTarget] Section specifying the name of the target directory from where you can
run the MicroStrategy products.
HideDialog = TRUE or FALSE. FALSE displays the dialog box. The default is FALSE.
TargetDirectory = Location of the root directory for the Program Files. The default is set to
C:\Program Files\MicroStrategy.
Options Description
© 2008 MicroStrategy, Inc. Installing and configuring with a response.ini file 339
9 Automated Installation on Windows Installation and Configuration Guide
Options Description
340 Installing and configuring with a response.ini file © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation on Windows 9
value for each product, the installation always uses the most
recent selection from a previous install. If you specify TRUE,
the product check box is selected. The
[ComponentSelection] options specify whether the check
box for each product will be selected or cleared.
Options Description
© 2008 MicroStrategy, Inc. Installing and configuring with a response.ini file 341
9 Automated Installation on Windows Installation and Configuration Guide
Options Description
Options Description
[WebVirtualDirectory] Section that specifies the virtual directory to be used for the
MicroStrategy Web application.
HideDialog = TRUE or FALSE. FALSE displays the dialog box. The default is FALSE.
VirtualDirectory = Enter a name for the virtual directory. The default is MicroStrategy8.
RemoveVD = YES or NO. This option is for the uninstall only. Set this option to remove
an existing MicroStrategy Web virtual directory from a previous
installation. The default is NO.
Options Description
HideDialog = TRUE or FALSE. FALSE displays the dialog box. The default
is FALSE.
342 Installing and configuring with a response.ini file © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation on Windows 9
Options Description
RemoveVD = YES or NO. This option is for the uninstall only. Set this option to
remove an existing MicroStrategy Subscription Portal virtual
directory from a previous installation. The default is NO.
Options Description
[WebServicesDirectory] Section that specifies the virtual directory to be used for MicroStrategy
Web Services.
HideDialog = TRUE or FALSE. FALSE displays the dialog box. The default is FALSE.
RemoveVD = YES or NO. This option is for the uninstall only. Set this option to remove
an existing MicroStrategy Subscription Portal virtual directory from a
previous installation. The default is NO.
Options Description
HideDialog = TRUE or FALSE. Set this option to TRUE to hide either the
MicroStrategy eTrainer for MicroStrategy Web Virtual
Directory Setting dialog box, or the prompt for removal of
the virtual directory while MicroStrategy eTrainer for
MicroStrategy Web is being uninstalled. The default is
FALSE.
VirtualDirectory = Enter a name for the virtual directory. If left empty, it takes
the value of eTrainer.
© 2008 MicroStrategy, Inc. Installing and configuring with a response.ini file 343
9 Automated Installation on Windows Installation and Configuration Guide
Program folder
Options Description
[ProgramFolder] Section specifying the Windows Start name of the folder from where you
can run the MicroStrategy products. The folder will be created under the
default Start\Programs\.
HideDialog = TRUE or FALSE. FALSE displays the dialog box. The default is FALSE.
Options Description
HideDialog = TRUE or FALSE. FALSE displays the dialog box. The default is FALSE.
SkipAccountSetting = TRUE or FALSE. Set TRUE to bypass the service account setting in the
MicroStrategy Intelligence Server Setting dialog box. If you bypass it,
then the service runs with the local system account that is installing
the products. The default is FALSE.
ServiceStartup = AUTO or MANUAL. Select to set the Intelligence Server service startup
to be automatic or manual. The default is AUTO.
Options Description
[NarrowcastServiceAcco Section specifying the Windows account from which the MicroStrategy
unt] Narrowcast Server service will run.
HideDialog = TRUE or FALSE. FALSE displays the dialog box. The default is FALSE.
344 Installing and configuring with a response.ini file © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation on Windows 9
Options Description
Options Description
HideDialog = TRUE or FALSE. FALSE displays the dialog box. The default is FALSE.
SkipDeploymentSetting TRUE or FALSE. TRUE skips the Deployment setting. The default is
= FALSE.
Options Description
[OfficeWebServicesURL] Section specifying the URL for MicroStrategy Web Services and Web
Services Universal.
HideDialog = TRUE or FALSE. FALSE displays the dialog box. The default is FALSE.
AllowBlankURL = TRUE or FALSE. Specify whether to allow a blank URL. The installation
routine validates the provided URL. If no URL is provided, the user is
informed that it has been left blank and needs to be configured with the
MicroStrategy Office Configuration Tool. If this is set to TRUE, the user
message is not displayed if the URL is left blank. The default is FALSE.
© 2008 MicroStrategy, Inc. Installing and configuring with a response.ini file 345
9 Automated Installation on Windows Installation and Configuration Guide
Options Description
[MSOfficeLoadOptions] Section specifying the options that determine if the MicroStrategy Office
toolbar is loaded in the installed Microsoft Office applications.
HideDialog = TRUE or FALSE. FALSE displays the dialog box. The default is FALSE.
Options Description
HideDialog = TRUE or FALSE. FALSE displays the dialog box. The default is
FALSE.
OverwriteServerDefinition = TRUE or FALSE. This option relates to the Tutorial. Set this
option to overwrite existing MicroStrategy Intelligence Server
definitions from a previous install. The default is FALSE.
Options Description
HideDialog = TRUE or FALSE. FALSE displays the dialog box. The default is
FALSE.
346 Installing and configuring with a response.ini file © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation on Windows 9
Options Description
[Summary] Section that specifies the installation summary in the Start Copying
Files dialog box.
HideDialog = TRUE or FALSE. FALSE displays the dialog box. The default is FALSE.
Options Description
HideDialog = TRUE or FALSE. FALSE displays the dialog box. The default is FALSE.
© 2008 MicroStrategy, Inc. Installing and configuring with a response.ini file 347
9 Automated Installation on Windows Installation and Configuration Guide
LogFile=C:\Program Files\install.log
[Welcome]
HideDialog=TRUE
RemoveAll=FALSE
[UserRegistration]
HideDialog=TRUE
UserName=<user name here>
CompanyName=<Company name here>
LicenseKey=<Customer License Key here>
[SetupType]
HideDialog=TRUE
Type=TYPICAL
[SuiteTarget]
HideDialog=TRUE
TargetDirectory=C:\Program Files\
MicroStrategy
[ComponentSelection]
HideDialog=TRUE
348 Installing and configuring with a response.ini file © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation on Windows 9
SubscriptionPortalVisible=TRUE
JMSGatewayVisible=FALSE
WebGatewayVisible=FALSE
TutorialReportingVisible=TRUE
TutorialDeliveryInstallVisible=TRUE
TutorialDeliveryConfigureVisible=TRUE
WebUniversalReporterVisible=FALSE
WebUniversalAnalystVisible=FALSE
WebUniversalProfessionalVisible=FALSE
WebServicesJSPVisible=FALSE
WebServicesASPNETVisible=TRUE
OfficeVisible=TRUE
eTrainerForWebVisible=TRUE
FunctionPluginVisible=TRUE
SequeLinkVisible=TRUE
IServerOLAPServicesVisible=TRUE
IServerReportServicesVisible=TRUE
© 2008 MicroStrategy, Inc. Installing and configuring with a response.ini file 349
9 Automated Installation on Windows Installation and Configuration Guide
WebServicesASPNETSelect=FALSE
OfficeSelect=TRUE
WebServerASPNETSelect=TRUE
WebUniversalServerJSPSelect=FALSE
WebUniversalServerASPNETSelect=TRUE
MobileSelect=TRUE
MobileWebASPServer=TRUE
eTrainerForWebSelect=TRUE
FunctionPluginSelect=FALSE
SequeLinkSelect=TRUE
IServerOLAPServicesSelect=TRUE
IServerReportServicesSelect=TRUE
[ServerDefinitionSetting]
HideDialog=TRUE
OverwriteServerDefinition=FALSE
[TutorialReportingSetting]
HideDialog=TRUE
OverwriteDSN=FALSE
[WebVirtualDirectory]
HideDialog=TRUE
VirtualDirectory=MicroStrategy
ReconfigureVirtualDirectory=TRUE
[PortalVirtualDirectory]
HideDialog=TRUE
VirtualDirectory=NarrowcastServer
ReconfigureVirtualDirectory=TRUE
[WebServicesVirtualDirectory]
HideDialog=TRUE
VirtualDirectory=MicroStrategyWS
ReconfigureVirtualDirectory=TRUE
[eTrainerForWebVirtualDirectory]
HideDialog=TRUE
VirtualDirectory=eTrainer
ReconfigureVirtualDirectory=TRUE
[OfficeWebServicesURL]
HideDialog=TRUE
AllowBlankURL=FALSE
URL=http://localhost/MicroStrategyWS/
mstrws.asmx
350 Installing and configuring with a response.ini file © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation on Windows 9
[MSOfficeLoadOptions]
HideDialog=TRUE
ConfigureExcel=TRUE
ConfigurePowerpoint=TRUE
ConfigureWord=TRUE
[IServerServiceAccount]
HideDialog=TRUE
SkipAccountSetting=FALSE
Login=<NT userlogin here>
Password=<user password here>
Domain=<domain here>
ServiceStartUp=AUTO
[NarrowcastServiceAccount]
HideDialog=TRUE
SkipAccountSetting=FALSE
Login=<NT userlogin here>
Password=<user password here>
Domain=<domain here>
[WebUDeployment]
HideDialog=TRUE
SkipDeploymentSetting=FALSE
DeploymentDirectory=C:\Program Files\
MicroStrategy\Web JSP
[Programfolder]
HideDialog=TRUE
Name=MicroStrategy
[Summary]
HideDialog=TRUE
[Finish]
HideDialog=TRUE
© 2008 MicroStrategy, Inc. Installing and configuring with a response.ini file 351
9 Automated Installation on Windows Installation and Configuration Guide
[Welcome]
HideDialog=TRUE
RemoveAll=FALSE
[UserRegistration]
HideDialog=TRUE
UserName=<user name here>
CompanyName=<Company name here>
LicenseKey=<Customer License Key here>
[SetupType]
HideDialog=TRUE
Type=TYPICAL
[SuiteTarget]
HideDialog=TRUE
TargetDirectory=C:\Program Files\
MicroStrategy
[ComponentSelection]
HideDialog=TRUE
352 Installing and configuring with a response.ini file © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation on Windows 9
ObjectManagerVisible=TRUE
IServerVisible=TRUE
SDKVisible=TRUE
IServerOLAPServicesVisible=TRUE
IServerReportServicesVisible=TRUE
[IServerServiceAccount]
HideDialog=TRUE
SkipAccountSetting=FALSE
Login=UID
Password=PWD
Domain=DOMAIN
ServiceStartUp=AUTO
[Programfolder]
HideDialog=TRUE
Name=MicroStrategy
[Summary]
HideDialog=TRUE
[Finish]
HideDialog=TRUE
Copy and paste this example to create a response.ini file.
Replace any text between angled brackets (<>) with your own
specific information. For example, change
UserName=<user name here> to UserName=jsmith.
Make sure to check that all file paths are entered with correct
spacing.
© 2008 MicroStrategy, Inc. Installing and configuring with a response.ini file 353
9 Automated Installation on Windows Installation and Configuration Guide
IServerOLAPServicesSelect=TRUE and
IServerOLAPServices=TRUE to install these
components.
HideAllDialogs=TRUE
ForceReboot=TRUE
StopAllServices=TRUE
[Welcome]
HideDialog=TRUE
RemoveAll=FALSE
[UserRegistration]
HideDialog=TRUE
UserName=<user name here>
CompanyName=<Company name here>
LicenseKey=<Customer License Key here>
[SetupType]
HideDialog=TRUE
Type=TYPICAL
[SuiteTarget]
HideDialog=TRUE
TargetDirectory=C:\Program
Files\MicroStrategy
[ComponentSelection]
HideDialog=TRUE
354 Installing and configuring with a response.ini file © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation on Windows 9
ServerAdminSelect=TRUE
IServerSelect=TRUE
IServerOLAPServicesSelect=TRUE
IServerReportServicesSelect=TRUE
[IServerServiceAccount]
HideDialog=TRUE
SkipAccountSetting=FALSE
Login=UID
Password=PWD
Domain=DOMAIN
ServiceStartUp=AUTO
[Programfolder]
HideDialog=TRUE
Name=MicroStrategy
[Summary]
HideDialog=TRUE
[Finish]
HideDialog=TRUE
Copy and paste this example to create a response.ini file.
Replace any text between angled brackets (<>) with your own
specific information. For example, change
UserName=<user name here> to UserName=jsmith.
Make sure to check that all file paths are entered with correct
spacing.
© 2008 MicroStrategy, Inc. Installing and configuring with a response.ini file 355
9 Automated Installation on Windows Installation and Configuration Guide
EnableASPServices=TRUE
EnableASPNETServices=TRUE
[Welcome]
HideDialog=TRUE
RemoveAll=FALSE
[UserRegistration]
HideDialog=TRUE
UserName=<user name here>
CompanyName=<Company name here>
LicenseKey=<Customer License Key here>
[SetupType]
HideDialog=TRUE
Type=TYPICAL
[SuiteTarget]
HideDialog=TRUE
TargetDirectory=C:\Program
Files\MicroStrategy
[ComponentSelection]
HideDialog=TRUE
356 Installing and configuring with a response.ini file © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation on Windows 9
[WebVirtualDirectory]
HideDialog=TRUE
VirtualDirectory=MicroStrategy
ReconfigureVirtualDirectory=TRUE
[WebServicesVirtualDirectory]
HideDialog=TRUE
VirtualDirectory=MicroStrategyWS
ReconfigureVirtualDirectory=TRUE
[WebUDeployment]
HideDialog=TRUE
SkipDeploymentSetting=TRUE
DeploymentDirectory=C:\Program
Files\MicroStrategy\Web JSP
[Programfolder]
HideDialog=TRUE
Name=MicroStrategy
[Summary]
HideDialog=TRUE
[Finish]
HideDialog=TRUE
Copy and paste this example to create a response.ini file.
Replace any text between angled brackets (<>) with your own
specific information. For example, change
UserName=<user name here> to UserName=jsmith.
Make sure to check that all file paths are entered with correct
spacing.
© 2008 MicroStrategy, Inc. Installing and configuring with a response.ini file 357
9 Automated Installation on Windows Installation and Configuration Guide
[Welcome]
HideDialog=TRUE
RemoveAll=FALSE
[UserRegistration]
HideDialog=TRUE
UserName=<user name here>
CompanyName=<Company name here>
LicenseKey=<Customer License Key here>
[SetupType]
HideDialog=TRUE
Type=TYPICAL
[SuiteTarget]
HideDialog=TRUE
TargetDirectory=C:\Program
Files\MicroStrategy
[ComponentSelection]
HideDialog=TRUE
[Programfolder]
HideDialog=TRUE
Name=MicroStrategy
[Summary]
HideDialog=TRUE
[Finish]
358 Installing and configuring with a response.ini file © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation on Windows 9
HideDialog=TRUE
Copy and paste this example to create a response.ini file.
Replace any text between angled brackets (<>) with your own
specific information. For example, change
UserName=<user name here> to UserName=jsmith.
Make sure to check that all file paths are entered with correct
spacing.
[Welcome]
HideDialog=TRUE
RemoveAll=FALSE
[UserRegistration]
HideDialog=TRUE
UserName=<user name here>
CompanyName=<Company name here>
LicenseKey=<Customer License Key here>
[SetupType]
HideDialog=TRUE
Type=TYPICAL
[SuiteTarget]
HideDialog=TRUE
TargetDirectory=C:\Program
Files\MicroStrategy
[ComponentSelection]
© 2008 MicroStrategy, Inc. Installing and configuring with a response.ini file 359
9 Automated Installation on Windows Installation and Configuration Guide
HideDialog=TRUE
[Programfolder]
HideDialog=TRUE
Name=MicroStrategy
[Summary]
HideDialog=TRUE
[Finish]
HideDialog=TRUE
Copy and paste this example to create a response.ini file.
Replace any text between angled brackets (<>) with your own
specific information. For example, change
UserName=<user name here> to UserName=jsmith.
Make sure to check that all file paths are entered with correct
spacing.
[Welcome]
360 Installing and configuring with a response.ini file © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation on Windows 9
HideDialog=TRUE
RemoveAll=FALSE
[UserRegistration]
HideDialog=TRUE
UserName=<user name here>
CompanyName=<Company name here>
LicenseKey=<Customer License Key here>
[SetupType]
HideDialog=TRUE
Type=TYPICAL
[SuiteTarget]
HideDialog=TRUE
TargetDirectory=C:\Program
Files\MicroStrategy
[ComponentSelection]
HideDialog=TRUE
[Programfolder]
HideDialog=TRUE
Name=MicroStrategy
© 2008 MicroStrategy, Inc. Installing and configuring with a response.ini file 361
9 Automated Installation on Windows Installation and Configuration Guide
[Summary]
HideDialog=TRUE
[Finish]
HideDialog=TRUE
Copy and paste this example to create a response.ini file.
Replace any text between angled brackets (<>) with your own
specific information. Make sure to check that all file paths are
entered with correct spacing.
[Welcome]
HideDialog=TRUE
RemoveAll=FALSE
[UserRegistration]
HideDialog=TRUE
UserName=<user name here>
CompanyName=<Company name here>
LicenseKey=<Customer License Key here>
[SetupType]
HideDialog=TRUE
Type=TYPICAL
[SuiteTarget]
HideDialog=TRUE
362 Installing and configuring with a response.ini file © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation on Windows 9
TargetDirectory=C:\Program
Files\MicroStrategy
[ComponentSelection]
HideDialog=TRUE
[Programfolder]
HideDialog=TRUE
Name=MicroStrategy
[Summary]
HideDialog=TRUE
[Finish]
HideDialog=TRUE
Copy and paste this example to create a response.ini file.
Replace any text between angled brackets (<>) with your own
specific information. Make sure to check that all file paths are
entered with correct spacing.
© 2008 MicroStrategy, Inc. Installing and configuring with a response.ini file 363
9 Automated Installation on Windows Installation and Configuration Guide
[Welcome]
HideDialog=TRUE
RemoveAll=FALSE
[UserRegistration]
HideDialog=TRUE
UserName=<user name here>
CompanyName=<Company name here>
LicenseKey=<Customer License Key here>
[SetupType]
HideDialog=TRUE
Type=TYPICAL
[SuiteTarget]
HideDialog=TRUE
TargetDirectory=C:\Program
Files\MicroStrategy
[ComponentSelection]
HideDialog=TRUE
[Programfolder]
HideDialog=TRUE
Name=MicroStrategy
[Summary]
HideDialog=TRUE
364 Installing and configuring with a response.ini file © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation on Windows 9
[Finish]
HideDialog=TRUE
Copy and paste this example to create a response.ini file.
Replace any text between angled brackets (<>) with your own
specific information. Make sure to check that all file paths are
entered with correct spacing.
© 2008 MicroStrategy, Inc. Installing and configuring with a response.ini file 365
9 Automated Installation on Windows Installation and Configuration Guide
366 Installing and configuring with a response.ini file © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation on Windows 9
[Installer]
PropertiesFilesOverwrite=FALSE
EnableTracing=FALSE
HideAllDialogs=TRUE
ForceReboot=TRUE
PreventReboot=FALSE
CheckTCPIP=TRUE
CheckIIS=TRUE
CheckSP=TRUE
CreateShortcuts=TRUE
CheckRenameOperations=TRUE
AnalyticsOverwrite=FALSE
TutReportingOverwrite=FALSE
TutDeliveryOverwrite=FALSE
BackupFiles=FALSE
RunConfigWizard=FALSE
StopAllServices=TRUE
© 2008 MicroStrategy, Inc. Installing and configuring with a response.ini file 367
9 Automated Installation on Windows Installation and Configuration Guide
StopIIS=TRUE
EnableASPServices=FALSE
ConfigWizardResponseFile=
RegistrySizeReq=
LogFile=
[Welcome]
HideDialog=TRUE
RemoveAll=TRUE
[WebVirtualDirectory]
HideDialog=TRUE
VirtualDirectory=MicroStrategy
RemoveVD=YES
[PortalVirtualDirectory]
HideDialog=TRUE
VirtualDirectory=NarrowcastServer
RemoveVD=YES
[WebServicesDirectory]
HideDialog=TRUE
VirtualDirectory=MicroStrategyWS
RemoveVD=YES
[eTrainerForWebVirtualDirectory]
HideDialog=TRUE
VirtualDirectory=eTrainer
RemoveVD=YES
[Finish]
HideDialog=TRUE
<path>\setup.exe --ResponseFile=
“<path>\response.ini”
368 Installing and configuring with a response.ini file © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Automated Installation on Windows 9
Silent installation
A silent, or unattended, installation is one that presents no
user interface. Silent installations are useful for system
administrators who do not want users to interfere with the
installation. They are typically implemented by IT
departments that perform package-based installations across
the network, such as SMS. The silent installation can be used
for
• OEM installations
[Installer] Required
HideAllDialogs = Required
PreventReboot = Optional
StopAllServices = Optional
StopIIS = Optional
CheckRenameOperations = Optional
[UserRegistration] Required
[ComponentSelection] Required
EnterpriseManagerSelect = Required
[InitialPaths] Required
EnterpriseManager = Required
[{B339F3B3-E78C-45E8-B4D2-3C46C1C13663}
-DlgOrder]
Count=0
<path>\setup.exe -LLanguageValue
--ResponseFile="C:\response.ini" -s
-f1c:\setup.iss -f2c:\setup.log
The following table lists the values for the different languages
that MicroStrategy supports.
Language Value
English 0009
Italian 0010
Portuguese 0016
German 0007
Spanish 000A
Japanese 0011
Korean 0012
Chinese 0004
Swedish 001D
French 000C
Lang=0009
front
For the command line option, you must type -L in
of the language code to signify you are
entering a language.
Ifsubsequent
there are installation termination messages in
installation instances that use the same
dialog flow, they are also stored in the
MSTRInst.log.
Line Description
Warning [W] Includes feedback that you must verify related to the setup. For example, in
normal mode, when MicroStrategy applications are running on a machine where
the setup is being run, you are prompted to close all MicroStrategy applications
before proceeding. In silent mode, you are not prompted, and instead the setup
terminates.
Severe [S] Includes fatal problems that prevent the setup from proceeding. For example,
the Intelligence Server Service cannot be created and setup fails as a result.
11D7-847C-000C293B5019}\{B339F3B3-E78C-45E
8-B4D2-3C46C1C13663}\MAInst.dll couldn't
be loaded in memory.
Introduction
Silent installation
A silent or unattended installation is one that presents no
graphical user interface (GUI). Silent installations allow you
to automate the installation, so it can be called from a script
and executed without user interaction. Silent installations are
useful for system administrators who do not want users to
run the installation themselves. The silent installation can be
done on one or more computers.
2 You can access the installation files and the options file
from a disk or you can ask your system administrator to
share the files in a network location. For information on
mounting or unmounting CD-ROM drives, see Mounting
and unmounting CD-ROMs, page 480 in Appendix B,
Troubleshooting.
-W settingname=<value>
Customer information
Your name, the name of the company for which you work,
and the license key.
• User
-W userRegistration.user=<value>
• Company
-W userRegistration.company=<value>
• License key
-W userRegistration.cdkey=<value>
• Home directory
-W silent.homeDirectory=<value>
• Install directory
-W silent.installDirectory=<value>
• Log directory
-W silent.logDirectory=<value>
Product features
Legal values that you provide for all the product features are:
-P WebUAnalystFeature.active=<value>
-P WebUAnalystFeature.active=true
-P WebUReporterFeature.active=<value>
-P WebUReporterFeature.active=true
-P WebUProfFeature.active=true
MicroStrategy SDK
-P SDKFeature.active=true
This value should be specified when the license being used for
MicroStrategy Intelligence Server is based on CPUs. Legal
values are integers between 1 and either the number of CPUs
allowed by the license or the number of CPUs in the machine,
whichever is lower.
-W cpuCountBean.cpuNumber=<value>
-W cpuCountBean.cpuNumber=
$J(install.cpuCount.maximum)
-W silent.keepDefaultDeployPath=<value>
-W silent.sdkDirectory="<value>"
Override options
Ifstarts
the installation fails on any of the steps before it
copying the files, it does not give any feedback
other than the return value different from 0.
MICROSTRATEGY USING
COMMAND LINE TOOLS
Introduction
Configuration tasks
Prerequisites:
IfLinux
you do not have a DSN defined on your UNIX or
machine, see Creating a DSN for a data
source, page 388.
You are then prompted to provide a login to your DSN.
6 You can enter the database name to use or use the default
name, as described below:
• Type the database name to use, and then press ENTER.
• Leave the field blank, and then press ENTER to use the
default script for your database type.
Prerequisites:
2 Type Y, and then press ENTER. You are then prompted for
ODBC data source information.
7 You can enter the database name to use or use the default
name, as described below:
Prerequisites:
6 You can enter the database name to use or use the default
name, as described below:
8 You can select the script used to create the statistics tables
or use the default script, as described below:
• Enter a valid path to a script file, and then press
ENTER.
• Leave the field blank, and then press ENTER to use the
default script for your database type.
Prerequisites:
Prerequisites:
4 Press ENTER.
/home/username/MicroStrategy/RESPONSE.INI
If the path and the response file are valid, the configuration is
performed and a successful configuration message appears. If
an error occurs before or during the process, an error
message displays the error that occurred when executing the
response file.
• Metadata DSN
• Metadata login
• Port number
• Monitor users
4 Type a port number, and then press ENTER. You are then
prompted to provide a DSN to connect to.
6 Type a valid login for the DSN, and then press ENTER. You
are then prompted to provide a password for the DSN
login.
7 Type a valid password for the DSN login, and then press
ENTER. You are then prompted to provide a server
definition name.
With the mstrctl command line tool, you can perform the
following tasks:
MICROSTRATEGY
COMPONENTS
Introduction
© 2008 MicroStrategy, Inc. Uninstalling MicroStrategy components on UNIX and Linux 423
12 Adding or Removing MicroStrategy Components Installation and Configuration Guide
424 Uninstalling MicroStrategy components on UNIX and Linux © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Adding or Removing MicroStrategy Components 12
© 2008 MicroStrategy, Inc. Uninstalling MicroStrategy components on UNIX and Linux 425
12 Adding or Removing MicroStrategy Components Installation and Configuration Guide
426 Uninstalling MicroStrategy components on UNIX and Linux © 2008 MicroStrategy, Inc.
A
CONNECTING TO DATABASES:
A.
Introduction
© 2008 MicroStrategy, Inc. Creating DSNs for specific ODBC drivers 427
A Connecting to Databases: ODBC and DSNs Installation and Configuration Guide
MicroStrategy ODBC Driver for Oracle Wire Protocol for Data source name and either:
Windows and UNIX/Linux Standard Connection:
• Host name
• Port number (in most cases, 1521)
• SID (MicroStrategy default is ORCL)
• Service name
• Alternate servers
TNSNames Connection:
• Server name
• TNSNames file
MicroStrategy ODBC Driver for DB2 Wire Protocol for UDB • Data source name
iSeries for Windows and UNIX/Linux • IP address
• Collection
• Location
• Isolation Level
• Package owner
• TCP port (446 in most cases)
MicroStrategy ODBC Driver for DB2 Wire Protocol for UDB for • Data source name
UNIX/Linux • Host name
• Database name
• Port number
428 Creating DSNs for specific ODBC drivers © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Connecting to Databases: ODBC and DSNs A
MicroStrategy ODBC Driver for Informix 8 for Windows • Data source name
• Database name
• Server name
• Host name
• Service name
• Protocol type
MicroStrategy ODBC Driver for Informix Wire Protocol for • Data source name
Windows and UNIX/Linux • Server name
• Host name
• Port number (1526 in most cases)
• Database name
MicroStrategy ODBC Driver for Sybase ASE Wire Protocol for • Data source name
Windows and UNIX/Linux • Network address
• Database name
• Enable Unicode support
MicroStrategy ODBC Driver for DB2 Wire Protocol for UDB for • Data source name
Windows • IP address
• TCP Port (in most cases, 50000)
• Database name
• Default User ID
• Password
MicroStrategy ODBC Driver for MySQL Wire Protocol for • Data Source Name
Windows and Linux, page 437 • Host Name
• Database Name
• Port Number
• User Name
© 2008 MicroStrategy, Inc. Creating DSNs for specific ODBC drivers 429
A Connecting to Databases: ODBC and DSNs Installation and Configuration Guide
430 Creating DSNs for specific ODBC drivers © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Connecting to Databases: ODBC and DSNs A
– Using an SID:
HostName=DB_server_name:PortNumber=15
26:SID=ORCL
© 2008 MicroStrategy, Inc. Creating DSNs for specific ODBC drivers 431
A Connecting to Databases: ODBC and DSNs Installation and Configuration Guide
432 Creating DSNs for specific ODBC drivers © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Connecting to Databases: ODBC and DSNs A
MicroStrategy ODBC Driver for DB2 Wire Protocol for UDB for
UNIX/Linux
The following information is required for setting up the
driver connection for MicroStrategy ODBC Driver for DB2
UDB Wire Protocol when running against DB2:
• Host Name: The name of the machine that runs the DB2
UDB server.
© 2008 MicroStrategy, Inc. Creating DSNs for specific ODBC drivers 433
A Connecting to Databases: ODBC and DSNs Installation and Configuration Guide
434 Creating DSNs for specific ODBC drivers © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Connecting to Databases: ODBC and DSNs A
© 2008 MicroStrategy, Inc. Creating DSNs for specific ODBC drivers 435
A Connecting to Databases: ODBC and DSNs Installation and Configuration Guide
MicroStrategy ODBC Driver for DB2 Wire Protocol for UDB for
Windows
The following information is required for setting up the
driver connection for MicroStrategy ODBC Driver for DB2
Wire Protocol when running against DB2 in Windows:
436 Creating DSNs for specific ODBC drivers © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Connecting to Databases: ODBC and DSNs A
© 2008 MicroStrategy, Inc. Creating DSNs for specific ODBC drivers 437
A Connecting to Databases: ODBC and DSNs Installation and Configuration Guide
• Data Source Name: The name used for the data source
connection request.
• Server Name: The machine name or IP address of the
machine where the database is stored.
438 Creating DSNs for specific ODBC drivers © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Connecting to Databases: ODBC and DSNs A
RB_CONFIG=RED_BRICK_INSTALL_PATH
© 2008 MicroStrategy, Inc. Creating DSNs for specific ODBC drivers 439
A Connecting to Databases: ODBC and DSNs Installation and Configuration Guide
440 Creating DSNs for specific ODBC drivers © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Connecting to Databases: ODBC and DSNs A
ASDIR=SYBASE_ASIQ_INSTALL_PATH
© 2008 MicroStrategy, Inc. Creating DSNs for specific ODBC drivers 441
A Connecting to Databases: ODBC and DSNs Installation and Configuration Guide
MSTR_TERADATA_PATH=TERADATA_INSTALL_PATH
442 Creating DSNs for specific ODBC drivers © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Connecting to Databases: ODBC and DSNs A
6 For AIX only, you need to also specify the Teradata GSS
library installation in the ODBC.sh. To do this, make the
following changes to the MicroStrategy Teradata GSS
path. Set this path, in the MSTR_TERADATA_GSS_PATH
parameter, to the location of the local Teradata GSS
library installation:
MSTR_TERADATA_GSS_PATH='<MSTR_TERADATA_GSS
_PATH>’
if [ "${MSTR_TERADATA_GSS_PATH}" !=
'<MSTR_TERADATA_GSS_PATH>' ];
© 2008 MicroStrategy, Inc. Creating DSNs for specific ODBC drivers 443
A Connecting to Databases: ODBC and DSNs Installation and Configuration Guide
INFORMIXDIR=CSDK_INSTALL_PATH
444 Creating DSNs for specific ODBC drivers © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Connecting to Databases: ODBC and DSNs A
INFORMIXSERVER=INFORMIX_SERVER_NAME
© 2008 MicroStrategy, Inc. Creating DSNs for specific ODBC drivers 445
A Connecting to Databases: ODBC and DSNs Installation and Configuration Guide
Driver = /netezza_odbc_install_dir/lib/
libnzsqlodbc3.so,
then the modified path will be:
Driver = /usr/odbc/netezza221sp5/lib/
libnzsqlodbc3.so.
446 Creating DSNs for specific ODBC drivers © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Connecting to Databases: ODBC and DSNs A
[NZSQL]
Driver = /usr/local/nz/lib/
libnzsqlodbc.so
Description = NetezzaSQL ODBC
Servername = ip_address
Port = 5480
Database = database_name
Username = uid
Password = pwd
CancelAsFreeStmt = false
CommLog = false
Ksqo = false
Lie = false
Optimizer = false
Parse = false
PreFetch = 256
Protocol = 7.0
ReadOnly = false
ShowSystemTables = false
Socket = 16384
DateFormat = 1
TranslationDLL =
TranslationName =
TranslationOption =
12 Paste the contents copied from the example DSN from the
Netezza .odbc.ini.example file. You should paste the
contents of the DSN exactly as they appear in the example
file.
© 2008 MicroStrategy, Inc. Creating DSNs for specific ODBC drivers 447
A Connecting to Databases: ODBC and DSNs Installation and Configuration Guide
[NZSQL]
Driver = /usr/odbc/
netezza221sp5/lib/
libnzsqlodbc3.so
Description = NetezzaSQL ODBC
Servername = 10.11.112.13
Port = 5480
Database = testDB
Username = tester01
Password = tester01
CancelAsFreeStmt = false
CommLog = false
Ksqo = false
Lie = false
Optimizer = false
Parse = false
PreFetch = 256
Protocol = 7.0
ReadOnly = false
ShowSystemTables = false
Socket = 16384
DateFormat = 1
TranslationDLL =
TranslationName =
TranslationOption =
448 Creating DSNs for specific ODBC drivers © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Connecting to Databases: ODBC and DSNs A
You must modify the odbc.ini file to create the DSN for
MySQL Community Server 5.0. For any late-breaking
changes on configuring MicroStrategy with MySQL, refer to
MicroStrategy Tech Note TN1100-000-0645.
1 Install the 32-bit ODBC Driver for MySQL (3.51) for the
Linux operating system, found at the hyperlink
http://dev.mysql.com/downloads/connector/odbc/
3.51.html. This site is valid as of the release of this
manual. For information on installation, refer to the
product documentation provided by the database vendor.
© 2008 MicroStrategy, Inc. Creating DSNs for specific ODBC drivers 449
A Connecting to Databases: ODBC and DSNs Installation and Configuration Guide
the
You must replace all placeholders in italics with
respective values for your MySQL database.
Any parameters not mentioned below are
considered optional for common configurations.
For details on the DSN parameters, refer to the
product documentation provided by the database
vendor.
[DataSourceName]
Driver = /usr/lib/libmyodbc3.so
Description = MySQL ODBC 3.51 Driver
Server = IP address
Port = Port number
Database = Database name
User = Database user name
Password = Database user password
[ODBC]
Trace = 0
TraceFile = odbctrace.out
TraceDll = /home/linux/8.1.2/
install/lib32/odbctrac.so
InstallDir = /home/linux/8.1.2/
install
IANAAppCodePage = 106
UseCursorLib = 0
450 Creating DSNs for specific ODBC drivers © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Connecting to Databases: ODBC and DSNs A
You must modify the odbc.ini file to create the DSN for
PostgreSQL. For any late-breaking changes on configuring
MicroStrategy with PostgreSQL, refer to MicroStrategy Tech
Note TN1100-000-0653.
© 2008 MicroStrategy, Inc. Creating DSNs for specific ODBC drivers 451
A Connecting to Databases: ODBC and DSNs Installation and Configuration Guide
the
You must replace all placeholders in italics with
respective values for your PostgreSQL
database. Any parameters not mentioned below are
considered optional for common configurations.
For details on the DSN parameters, refer to the
product documentation provided by the database
vendor.
452 Creating DSNs for specific ODBC drivers © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Connecting to Databases: ODBC and DSNs A
[DataSourceName]
Driver = UNIXODBC_DIR/usr/lib/
libodbcpsql.so
Description = PostgreSQL driver for
Linux
Trace = No
TraceFile = sql.log
Database = Database name
Servername = IP address
UserName = Database user name
Password = Database user password
Port = Port number
Protocol = 6.4
ReadOnly = No
RowVersioning = No
ShowSystemTables = No
ShowOIDColumn = No
FakeOIDIndex = No
ConnSettings =
[ODBC]
Trace = 0
TraceFile = odbctrace.out
TraceDll = /home/linux/8.1.2/
install/lib32/odbctrac.so
InstallDir = /home/linux/8.1.2/
install
IANAAppCodePage = 106
UseCursorLib = 0
© 2008 MicroStrategy, Inc. Creating DSNs for specific ODBC drivers 453
A Connecting to Databases: ODBC and DSNs Installation and Configuration Guide
Teradata
454 Creating DSNs for specific ODBC drivers © 2008 MicroStrategy, Inc.
Installation and Configuration Guide Connecting to Databases: ODBC and DSNs A
Syntax Indicates
{option1 | option2} You must select one of the options. For example, if the syntax is
{Y | N}, you must type Y, or N. There can be two or more
options, with each option separated by a pipe (|) symbol.
AlternateServers You can enable driver-side connection failover for the driver by specifying a
list of available servers. When the primary database server is unavailable,
connections to the available database servers are attempted sequentially.
Syntax:
(HostName=hostvalue:PortNumber=portvalue:
{SID=sidvalue |ServiceName=servicevalue}[,...])
ApplicationUsingThreads You can specify whether the driver works with single-threaded or
multi-threaded applications. You have the following options:
• 1: (Default) Use this setting to ensure the thread-safe driver works with
multi-threaded applications.
• 0: Use this setting to prevent additional processing, which occurs due to
ODBC thread-safety standards, for drivers that work with single-threaded
applications.
AuthenticationMethod Specifies which type of authentication the driver uses to authenticate a user.
The selected type of authentication must be supported by the database
server, otherwise the driver displays an error.
You have the following options:
• 1: the driver sends the user ID in clear text and encrypts the password
before sending it to the server to be authenticated.
• 3: the driver uses client authentication. The server does not provide any
authentication; it relies on the client to authenticate the user.
• 4: the driver users Kerberos authentication, which supports Windows
Active Directory Kerberos and MIT Kerberos environments.
• 5: the driver uses Kerberos and user ID and password authentication.
First, the user is authenticated using Kerberos and is then
re-authenticated by the driver using the username and password.
CatalogOptions You can specify whether result columns REMARKS and COLUMN_DEF return
values or SQL_NULL_DATA. You have the following options:
• 0: (Default) The REMARKS and COLUMN_DEF result columns return
SQL_NULL_DATA.
• 1: The REMARKS and COLUMN_DEF result columns return their actual
values.
ConnectionRetryCount You can indicate the number of times this driver will attempt to connect to the
primary or alternate servers (if enabled), if the initial attempt fails. The limits
of this parameter are:
• 0: (Default) No reconnection attempt is made.
• 65535: Maximum number of retries.
Parameter Description
EnableDescribeParam You can enable the ODBC API function SQLDescribeParam. This function
causes all parameters to be described with a SQL_VARCHAR data type. You
have the following options:
• 0: (Default) Disables the SQLDescribeParam function.
• 1: (Default when using Microsoft Remote Data Objects to access data)
Enables the SQLDescribeParam function.
EnableNcharSupport You can enable support for the N-datatypes NCHAR, NVARCHAR2, and
NCLOB. You have the following options:
• 0: (Default) Disables support for NCHAR, NVARCHAR2, and NCLOB.
• 1: Enables support for NCHAR, NVARCHAR2, and NCLOB. These
N-datatypes are described as SQL_WCHAR, SQL_WVARCHAR, and
SQL_WLONGVARCHAR, respectively.
Note: This parameter is supported in Oracle 9i and later.
EnableStaticCursorsForL You can enable support for columns with the long data type when using static
ongData cursors with your driver. You have the following options:
• 0: (Default) Disables support for columns with the long data type when
using static cursors.
• 1: Enables support for columns with the long data type when using static
cursors. Use this option to persist a result set containing long data types
into an XML file.
EncryptionMethod Specifies how the driver encrypts data that is sent between the driver and the
database server. You have the following options:
• 0 (Default): the data is not encrypted
• 1: the data is encrypted using SSL
GSSClient The driver, by default, uses the GSS Client library packaged with the
operating system to communicate with the Key Distribution Center. This
parameter can be changed to use a different GSS Client library.
HostName Name of the host machine where the database server resides. This may also
be the IP address.
HostNameInCertificate Specifies whether or not the driver validates the Host Name in the certificate
that is used in systems operating using SSL authentication. This parameter is
ignored if the EncryptionMethod is set to 0, and if the value in
ValidateServerCertificate is set to zero.
KeyStore The path to the location of the keystore, which is the file that contains the list
of the client certificates that are trusted by the server for Client Authentication
with SSL.
Parameter Description
LoadBalancing You can enable client load balancing when connecting to primary and
alternate servers. You have the following options:
• 0: (Default) Disables client load balancing. Connection attempts to
database servers are performed sequentially, starting with the primary
server.
• 1: Enables client load balancing. Connection attempts to database
servers are performed in no particular order.
Note: Us the AlternateServers parameter to define alternate servers
to connect to.
ProcedureRetResults You can enable the driver to return result sets from stored procedure
functions. You have the following options:
• 0: (Default) The driver does not return result sets from stored procedures.
• 1: The driver returns result sets from stored procedures.
SID Site Identifier of the Oracle instance you are trying to connect to.
TNSNamesFile You can specify the location of the TNSNAMES.ORA file. Make sure to type
the entire path to the TNSNAMES.ORA file, including the file name itself. You
can specify multiple TNSNAMES.ORA files.
You must set the Server Name parameter to use this option. Using the Server
Name and TNSNamesFiles parameters disables the HostName,
PortNumber, SID, and Service Name fields.
Syntax:
(filelocation1[,...])
TrustStore The path for the location to the truststore, which is the file that contains the
list of certificate authorities that are trusted by the machine for SSL server
authentication.
ValidateServerCertificate Specifies whether or not the driver validates the server’s security certificate
during SSL authentication. You have the following options:
• 0: the certificate is not validated
• 1(Default): the certificate is validated
AuthenticationMethod Specifies which type of authentication the driver uses to authenticate a user.
The selected type of authentication must be supported by the database
server, otherwise the driver displays an error.
You have the following options:
• 0 (Default): the driver sends the user ID and password to the server in
clear text to be authenticated.
• 1: the driver sends the user ID in clear text and encrypts the password
before sending it to the server to be authenticated.
• 2: the driver encrypts both the user ID and the password before sending it
to the server to be authenticated.
• 3: the driver uses client authentication. The server does not provide any
authentication; it relies on the client to authenticate the user.
• 4: the driver users Kerberos authentication, which supports Windows
Active Directory Kerberos and MIT Kerberos environments.
EncryptionMethod Specifies the way the driver encrypts data that is sent between the driver and
the database server. You have the following options:
• 0 (Default): the data is not encrypted
• 1: the data is encrypted using SSL (supported only on DB2 for iSeries)
• 2: the data is encrypted using the DB2 encryption protocol (supported
only on DB2 for Linux/UNIX/Windows and DB2 for z/OS)
The AuthenticationMethod must be set to 0, 1, or 2 to use DB2 encryption. If
the Database server does not support the type of encryption, it displays an
error and the connection fails.
GSS Client The driver, by default, uses the GSS Client library that comes with the
operating system to communicate with the Key Distribution Center. This
parameter can be changed to use a different GSS Client library.
HostNameInCertificate Specifies whether or not the driver validates the Host Name in the certificate
that is used in systems operating using SSL authentication. This parameter is
ignored if the EncryptionMethod is not set to 1, and if the value in
ValidateServerCertificate is set to zero.
TrustStore The path for the location to the truststore, which is the file that contains the
list of certificate authorities that are trusted by the machine for SSL server
authentication.
ValidateServerCertificate Specifies whether or not the driver validates the server’s security certificate
during SSL authentication. You have the following options:
• 0: the certificate is not validated
• 1(Default): the certificate is validated
Parameter Description
XMLDescribeType Specifies what SQL Data Type the SQLGetTypeInfo() returns for the XML
Data type. You have the following options:
• -4: The description SQL_LONGVARBINARY is used for DB2 XML data
type columns.
• -10(Default): The description SQL_WLONGVARCHAR is used for DB2
XML data type columns.
LogonID Default user ID to log on to the database. On UNIX/Linux, the LogonID value
is your UNIX/Linux user ID.
AlternateID Default qualifier used at connection time for any unqualified object names
used in SQL statements. You must set the DB2 permissions to SYSADM.
DB2 UDB V5R1 on iSeries does not support this parameter.
IpAddress Specifies the IP address of the machine where the catalog tables are stored,
as either a numeric address or address name. If you enter an address name,
the address name is retrieved from the workstation’s HOSTS file or in a DNS
server.
Collection Name that identifies a logical group of database objects. This parameter is
valid only if you are connecting to DB2 for z/OS (formerly OS/390) or iSeries
(formerly AS/400). On iSeries, it is also the current Schema.These objects
include the DataDirect Connect DB2 Wire Protocol driver for ODBC
packages.
Location Specifies the DB2 location name. Use the name defined on the DB2 Server.
This parameter is valid only if you are connecting to DB2 for z/OS (formerly
OS/390) or iSeries (formerly AS/400).
TcpPort Specifies the port number used by the DB2 database instance on the server
host machine.
GrantExecute You can grant execute privileges on the package you specify as the
GrantAuthID. You have the following options:
• 1: (Default) Privileges are granted.
• 0: Privileges are not granted.
GrantAuthid You can indicate to whom execute privileges are granted. By default, this
parameter is set to PUBLIC.
Note: This parameter is ignored if GranteExecute=0.
Parameter Description
DefaultIsolationLevel Method by which locks are acquired and released by the system. ODBC
isolation levels map to DB2 isolation levels as follows:
ODBC DB2
DynamicSections Specifies how many statements the DB2 Wire Protocol driver package can
prepare for each user. The default is 200.
CatalogSchema Specifies the name of a valid DB2 schema to use for Catalog functions. If you
do not specify a value, the parameter defaults to the following values:
• SYSIBM: Default for z/OS.
• QSYS2: Default for iSeries.
• SYSCAT: Default when connected to UNIX/Linux.
PackageCollection Specifies the collection or location name where the driver creates and
searches for the bind packages. The default is NULLID.
PackageOwner Specifies the DB2 user account assigned to the package. This user must
have authority to run all the SQL statements in the package.
Parameter Description
UseCurrentSchema You can restrict results to the tables in the current schema when a catalog
function call is made either without specifying a schema or when specifying
the schema as the wildcard character %. You have the following options:
• 0: (Default) Results can include tables outside of the current schema.
• 1: Results are restricted to tables in the current schema. Restricting
results to tables in the current schema improves the performance of calls
that do not specify a schema.
ApplicationUsingThreads You can specify whether the driver works with single-threaded or
multi-threaded applications. You have the following options:
• 1: (Default) Use this setting to ensure the thread-safe driver works with
multi-threaded applications.
• 0: Use this setting to prevent additional processing, which occurs due to
ODBC thread-safety standards, for drivers that work with single-threaded
applications.
WithHold Specifies the cursor behavior for the application used with this data
source.You have the following options:
• 1: (Default) DB2 leaves all cursors open after a commit or rollback.
(SQLGetInfo( ) returns SQL_CB_PRESERVE for
SQL_COMMIT_CURSOR_BEHAVIOR.)
• 0: DB2 closes all open cursors after a commit or rollback. (SQLGetInfo( )
returns SQL_CB_DELETE.)
Informix 8 (XPS)
Parameter Description
ApplicationUsingThreads You can specify whether the driver works with single-threaded or
multi-threaded applications. You have the following options:
• 1: (Default) Use this setting to ensure the thread-safe driver works with
multi-threaded applications.
• 0: Use this setting to prevent additional processing, which occurs due to
ODBC thread-safety standards, for drivers that work with single-threaded
applications.
CancelDetectInterval Specifies how often (in seconds) the driver checks whether a query has been
canceled. When the driver detects that SQLCancel has been issued by the
MicroStrategy Platform, the query is canceled. You have the following
options:
• 0: (Default) Queries are not canceled even if SQLCancel is issued.
• {5| 10 | 30 | 60}: The driver checks if pending requests have been
cancelled with SQLCancel every 5, 10, 30, or 60 seconds.
CursorBehavior Determines the behavior of cursors at the end of each transaction. You have
the following options:
• 0: (Default) Cursors are closed at the end of each transaction.
• 1: Cursors are preserved, meaning they are held at the current position at
the end of each transaction.Preserving cursor position can slow down
your database operations.
EnableInsertCursors You can enable Insert cursors. You have the following options.
• 1: (Default) Insert cursors are enabled. Insert cursors improve
performance during multiple Insert operations using the same statement.
Insert data can be buffered in memory before being written to disk.
• 0: Insert cursors are disabled.
GetDBListFromInformix Specifies whether the database list is returned from the Informix server or
from the database list the user entered during driver setup.
• 1: (Default) The database list is returned from the Informix server.
• 0: The database list is returned from the database list the user entered
during driver setup.
Parameter Description
Protocol Specifies the protocol used to communicate with the server. You can specify
one or more values; separate the names with commas. You can enter any of
the following protocols:
• olsocspx
• olsoctcp
• onsocspx
• onsoctcp
• seipcpip
• sesocspx
• sesoctcp
• ontlitcp
Note: For Solaris, the protocol must be ontlitcp.
Service Name of the service being used by Informix on the host machine.
TrimBlankFromIndexNa You can specify whether to trim leading space from a system-generated
me index name. You have the following options:
• 1: (Default) The driver trims the leading space.
• 0: The driver does not trim the space.
ApplicationUsingThreads You can specify whether the driver works with single-threaded or
multi-threaded applications. You have the following options:
• 1: (Default) Use this setting to ensure the thread-safe driver works with
multi-threaded applications.
• 0: Use this setting to prevent additional processing, which occurs due to
ODBC thread-safety standards, for drivers that work with single-threaded
applications.
CancelDetectInterval Specifies how often (in seconds) the driver checks whether a query has been
canceled. When the driver detects that SQLCancel has been issued by the
MicroStrategy Platform, the query is canceled. You have the following
options:
• 0: (Default) Queries are not canceled even if SQLCancel is issued.
• {5| 10 | 30 | 60}: The driver checks if pending requests have been
cancelled with SQLCancel every 5, 10, 30, or 60 seconds.
HostName Name or IP address of the machine on which the Informix server resides.
TrimBlankFromIndex You can specify whether to trim leading space from a system-generated
Name index name. You have the following options:
• 1: (Default) The driver trims leading space.
• 0: The driver does not trim leading space.
UseDelimitedIdentifiers Specifies how the server interprets double quotation marks(“) when used in
SQL statements. You have the following options:
• 0 (Default): strings within double quotation marks are interpreted as string
literals.
• 1: strings within double quotation marks are interpreted as identifiers.
ApplicationUsingThreads You can specify whether the driver works with single-threaded or
multi-threaded applications. You have the following options:
• 1: (Default) Use this setting to ensure the thread-safe driver works with
multi-threaded applications.
• 0: Use this setting to prevent additional processing, which occurs due to
ODBC thread-safety standards, for drivers that work with single-threaded
applications.
Authentication Method Specifies which type of authentication the driver uses to authenticate a user.
The selected type of authentication must be supported by the database
server, otherwise the driver displays an error.
You have the following options:
• 0 (Default): the driver sends the user ID and password to the server in
clear text to be authenticated.
• 1: the driver sends the user ID in clear text and encrypts the password
before sending it to the server to be authenticated.
• 4: the driver users Kerberos authentication, which supports Windows
Active Directory Kerberos and MIT Kerberos environments.
Charset Specifies the name of a character set installed on the Sybase server. The
default is the setting on the Sybase server. For Sybase ASE 12.5 and higher,
set this parameter to UTF-8 to support Unicode SQL types. Refer to Sybase
documentation for a list of valid character sets.
EnableDescribeParam You can enable the ODBC API function SQLDescribeParam. This function
causes all parameters to be described with a SQL_VARCHAR data type. You
have the following options:
• 0: (Default) Disables the SQLDescribeParam function.
• 1: (Default when using Microsoft Remote Data Objects to access data)
Enables the SQLDescribeParam function.
EnableQuotedIdentifiers You can enable quoted identifiers. You have the following options:
• 0: (Default) Disables quoted identifiers. Applications that generate
statements with quoted identifiers encounter errors.
• 1: Enables quoted identifiers. Double quotes are only allowed around
identifiers in SQL statements such as column and table names. For
example, an ID column for the Category attribute appears as
“CATEGORY_ID” in the SQL statement.
EncryptionMethod Specifies the way the driver encrypts data that is sent between the driver and
the database server. You have the following options:
• 0 (Default): the data is not encrypted
• 1: the data is encrypted using SSL
Parameter Description
GSSClient The driver, by default, uses the GSS Client library that comes with the
operating system to communicate with the Key Distribution Center. This
parameter can be changed to use a different GSS Client library.
HostNameInCertificate Specifies whether or not the driver validates the Host Name in the certificate
that is used in systems operating using SSL authentication. This parameter is
ignored if the EncryptionMethod is not set to SSL, and if the value in
ValidateServerCertificate is set to zero.
Language Specifies the national language installed on the Sybase server. The default is
English.
NetworkAddress Specifies the network address. The format depends on the network protocol
chosen under Network Library Name and the Sybase server. If you are
choosing Windows Sockets (Winsock), then the format is: {IP address |
Hostname}, port number. For example, you might enter “199.226.224.34,
5000” or “Sybase_15, 5000”.
OptimizePrepare Specifies how stored procedures are prepared when using SQLPrepare. You
have the following options:
• 0: Stored procedures are created for every call to SQLPrepare.
Decreased performance occurs when statements that do not contain
parameters are processed.
• 1: (Default) Stored procedures are created only if the statement contains
parameters. Otherwise, the statement for the stored procedure is cached
and run when SQLExecute is called.
• 2: Stored procedures are never created. The statement for the stored
procedure is cached and run when SQLExecute is called. Any syntax
errors or other errors are returned when SQLExecute is called.
• 3: Stored procedures are never created. This option is identical to option 2
except that any syntax errors or other errors are returned when
SQLPrepare is called instead of SQLExecute.
RaiseErrorPositionBehav You can configure when errors are returned and where the cursor is
ior positioned after encountering a raiseerror. You have the following options:
• 0: (Default) Raiseerror is handled separately from surrounding
statements. Errors are returned when raiseerror is processed via
SQLExecute, SQLExecDirect, or SQLMoreResults.
• 1: (Microsoft-compatible) RaiseError is returned when the next statement
is processed and the cursor is positioned on the first row of the
subsequent result set. Multiple RaiseErrors may be returned on a single
execute.
SelectMethod You can enable database cursors for SELECT statements. You have the
following options:
• 0: (Default) Database cursors are enabled. Creating database cursors
requires additional overhead, which can negatively affect performance
when executing a large number of sequential SELECT statements.
• 1: Database cursors are disabled for SELECT statements, thus limiting the
database to one active statement at a time.
Parameter Description
ServicePrincipalName The Sybase server principal name used for Kerberos authentication. If no
name is specified, then the driver defaults to the value forNetworkAddress.
This parameter is ignored if an authentication type other than Kerberos is
used.
TrustStore The path for the location to the truststore, which is the file that contains the
list of certificate authorities that are trusted by the machine for SSL server
authentication.
ValidateServerCertificate Specifies whether or not the driver validates the server’s security certificate
during SSL authentication. You have the following options:
• 0: the certificate is not validated
• 1(Default): the certificate is validated
Address Network address of the SQL Server. The address should be the network
name of the server, but it can be a TCP/IP port and socket address. For
example, on TCP/IP it can be 199.199.199.5; 1433; or MYSVR, 1433.
SnapshotSerializable If you are using Microsoft SQL server 2005 and it is configured for snapshot
isolation, you can allow the application to use the snapshot isolation level.
You have the following choices:
• 0 (Default): the application uses the serializable isolation level when the
isolation level is set to serializable.
• 1: The application uses the snapshot isolation level when the isolation
level is set to serializable.
AlternateServers You can enable driver-side connection failover for the driver by specifying a
list of available servers. When the primary database server is unavailable,
connections to the available database servers are attempted sequentially.
Syntax:
(HostName=hostvalue:PortNumber=portvalue:
{SID=sidvalue |ServiceName=servicevalue}[,...])
ApplicationUsingThreads You can specify whether the driver works with single-threaded or
multi-threaded applications. You have the following options:
• 1: (Default) Use this setting to ensure the thread-safe driver works with
multi-threaded applications.
• 0: Use this setting to prevent additional processing, which occurs due to
ODBC thread-safety standards, for drivers that work with single-threaded
applications.
ConnectionRetryCount You can indicate the number of times this driver will attempt to connect to the
primary or alternate servers (if enabled), if the initial attempt fails. The limits
of this parameter are:
• 0: (Default) No attempt is made to reconnect.
• 65535: Maximum number of retries.
ConnectionRetryDelay You can specify the amount of time, in seconds, that the driver delays
between attempts to connect to the primary server and alternate servers, if
specified. Integers within the following limits are valid:
• 0: There is no delay between attempts to reconnect.
• 3 (default): The default delay is three seconds.
• 65535: The maximum delay between attempts to reconnect.
This parameter only has an effect if the ConnectionRetryCount parameter is
set to a value other than 0.
DefaultLongDataBuffLen You can specify the maximum data length, in bytes, that is fetched from
Long/LOB columns. The value must be in multiples of 1024, and is multiplied
by 1024 to define the maximum data length in bytes. For example, the default
for this parameter is 1024, which is multiplied by 1024, for a total of 1048576
bytes, or 1 megabyte. This parameter also resizes any data passed in a
Long/LOB SQL_DATA_AT_EXEC parameter to fit the data length specified,
and chunks any data exceeding this data length limit.
Parameter Description
EnableDescribeParam You can enable the ODBC API function SQLDescribeParam. This function
causes all parameters to be described with a SQL_VARCHAR data type. You
have the following options:
• 0: (Default) Disables the SQLDescribeParam function.
• 1: (Default when using Microsoft Remote Data Objects to access data)
Enables the SQLDescribeParam function.
HostName Name of the host machine where the database server resides. This may also
be the IP address.
InteractiveClient Determines which variable is used to determine the amount of time that a
connection can idle until the server disconnects it. The possible values are:
• 0 (Default): the driver uses the value for the global wait_timeout variable
to initialize the wait_timeout session
• 1: the driver uses the global interactive_timeout variable value to initialize
the wait_time session
The wait_timeout variable, controlled by InteractiveClient, can be modified
after the connection has been made.
LoadBalancing You can enable client load balancing when connecting to primary and
alternate servers. You have the following options:
• 0: (Default) disables client load balancing. Connection attempts to
database servers are performed sequentially, starting with the primary
server.
• 1: enables client load balancing. Connection attempts to database servers
are performed in no particular order.
Note: Use the AlternateServers parameter to define alternate servers to
connect to.
Parameter Description
ReportCodePageConver Specifies the format in which the driver returns errors encountered when
sionErrors converting code pages. Errors are returned with the following message:
Code page conversion error encountered. If the error occurs
when converting parameter data, the following sentence is added: Error in
parameter X, where X is the number of the parameter. You have the
following options when specifying the formatting:
0 (Default): For each character that cannot be converted, the driver
substitutes 0x1A and does not display an error message.
1: for each character that cannot be converted the driver displays an error
message.
2: for each character that cannot be converted, the driver substitutes 0x1A for
each unconverted character and displays an error message.
TreatBinaryAsChar Specifies how the driver returns data that MySQL stores as BINARY or
VARBINARY, and specifies the data type the driver uses to describe these
values. You have the following options:
• 0 (Default): data that MySQL has stored as BINARY or VARBINARY is
described and returned as BINARY or VARBINARY values, respectively.
• 1:data that MySQL has stored as BINARY or VARBINARY is described
and returned as CHAR or VARCHAR values, respectively.
ODBC
Parameter Description
IANAAppCodePage Used with the transliteration system. The code page that you specify must be
the same as the code page used by your application. The driver on
UNIX/Linux determines the value of the application’s code page by checking
for an IANAAppCodePage value, in the following order:
1 In the connection string
2 In the DataSource section of the system file (odbc.ini)
3 In the ODBC section of the system file (odbc.ini)
If no IANAAppCodePage value is found, the driver uses the default value of 4
(ISO 8859-1 Latin-1).
Note: The IANAAppCodePage connection string parameter replaces the
AppCodePage connection string parameter in earlier versions of Connect for
ODBC. The drivers are backwardly compatible with the AppCodePage
parameter, but you must now use the IANAAppCodePage parameter. In this
case, the parameter uses the value in the ODBC section of the odbc.ini file.
UseCursorLib This setting is not used in UNIX. It specifies whether the CursorLibrary in the
driver or the one that comes with the ODBC components is used. On the
UNIX platform, no ODBC Manager CursorLibrary is available, which means
that the driver CursorLibrary is always used.
SERVER Host name and port number of the server that runs the database.
Sybase IQ
Parameter Description
AutoStop Specifies whether the database should continue running after connections
are disconnected.
CommLinks Host name and port number of the server that runs the database. The value
should be as follows: tcpip(host=X.X.X.X;port=x)
Teradata Server
Parameter Description
CharacterSet Specifies the default character set for the session. The default character set
for Single Byte Character Sets (SBCS) is ASCII. For DBCS character sets,
the value in the KanjiFormat option should match the character set name
specified for this option. You have the following options:
• blank (default for KanjiFormat)
• ASCII (for SBCS)
• UTF8
• SCHEBCDIC935_2IJ, TCHEBCKIC937_3IB
• TCHBIG5_1RO, SDTCHBIG5_3RO
• SCHEGB2312_1TO, SDSCHGB2312_2TO
• SDSCHEBCDIC935_6IJ, SDTCHEBCDIC937_7IB
• SDKANJIEBCDIC5026_4IG, SDKANJIEBCDIC5035_4IH
• SDKANJIEUC_1U3, SDKANJISJIS_1S3
• HANGULEBCKIC933_1II, HANGULKSC5601_2R4
• SDHANGULEBCKIC933_5II, SDHANGULKSC5601_4R4
• KANJISJIS_OS, KANJIEUC_OU
DateTimeFormat Specifies whether the ODBC driver should handle DATEs, TIMEs, and
TIMESTAMPs as integer values or ANSI-compatible strings.
• III specifies that all three should be handled as integer values.
• AAA specifies that they should be handled as ANSI-compatible strings.
Parameter Description
NoScan You can enable parsing of SQL statements in the driver. You have the
following options:
• Yes: Parsing is disabled. The parser in the driver is bypassed and the
SQL statement is sent directly to Teradata. Setting this option to Yes
when the SQL statement contains ODBC-specific syntax results in
Teradata Database reporting errors.
• No: Parsing is enabled in the driver and SQL statements are sent to the
parser.
RunInQuietMode Specifies whether the driver should display standard message boxes on the
screen.
SessionMode Specifies the mode for sessions. Values can be Teradata, ANSI, or System
Default.
StCheckLevel You can enable enhanced ODBC state checking to detect SQLState 24000
(invalid cursor state error) according to the requirements from the ODBC
SDK. You have the following options:
• 0: (Default) No additional state checking is performed and provides
backward compatibility. The ODBC driver does not generate error 24000
when an ODBC function generates a result set (open cursor state), and
then another function that generates a result set is called before the first
results were fetched or freed. This can be caused by ODBC functions
such as SQLExecute, SQLExecDirect, or an ODBC catalog function.
• 1: The driver generates SQLState 24000 error if an application is in an
open cursor state and SQLColumns, SQLColumnPrivileges,
SQLExecDirect, SQLExecute, SQLForeignKeys, SQLGetTypeInfo,
SQLPrepare, SQLPrimaryKeys, SQLProcedureColumns,
SQLProcedures, SQLSpecialColumns, SQLStatistics,
SQLTablePrivileges, or SQLTables is called.
• 2: The driver generates SQLSTate 24000 error if an application is not in
an open cursor state and SQLCol, SQLDescribeCol, or SQLFetch is
called.
Netezza
Parameter Description
Parameter Description
Port The port number for the connection. Check with your database administrator
for the correct number. The default is 5480.
ServerName The machine name or IP address of the host machine for the database.
Introduction
# mkdir /cdrom
# /usr/sbin/vold &
# /usr/sbin/vold &
• # etc/mountall
1 # cd
2 # umount /cdrom/cdrom0
3 # eject
# mkdir /cdrom
# cd /cdrom
# mkdir /cdrom
# cd /cdrom
# unmount /cdrom
Permission errors
This section provides troubleshooting information on
permission errors in a UNIX or Linux environment.
2 Press ENTER.
Introduction
<context-param>
<param-name>dtdLocation</param-name>
<param-value>/WEB-INF/xml/dtds</param-value>
<description>This is the directory where the
application looks for DTDs used by Layout
Definitions</description>
</context-param>
<context-param>
<param-name>localesFile</param-name>
<param-value>/WEB-INF/xml/locales.xml
</param-value>
</context-param>
<context-param>
<param-name>preferencesGroupsFile</param-name>
<param-value>/WEB-INF/xml/
preferencesGroups.xml</param-value>
</context-param>
<context-param>
<param-name>resourcesFolderImage</param-name>
<param-value>../images</param-value>
</context-param>
<context-param>
<param-name>resourcesFolderJavaScript
</param-name>
<param-value>../javascript</param-value>
</context-param>
<context-param>
<param-name>resourcesFolderJSP</param-name>
<param-value>../jsp</param-value>
</context-param>
<context-param>
<param-name>resourcesFolderStyle</param-name>
<param-value>../style</param-value>
</context-param>
<context-param>
<param-name>resourcesFolderStyleFixedFont
</param-name>
<param-value>../style/fixed-font</param-value>
</context-param>
<context-param>
<param-name>resourcesFolderStyleFixedFontDB
</param-name>
<param-value>../style/fixed-font/db
</param-value>
</context-param>
<context-param>
<param-name>serverConfigFilesDefaultLocation
</param-name>
<param-value>ABSOLUTE:/usr/GGapps/
MicroStrategy/xml/</param-value>
</context-param>
<context-param>
<param-name>serverLogFilesDefaultLocation
</param-name>
<param-value>ABSOLUTE:/usr/GGapps/
MicroStrategy/xml/log/</param-value>
</context-param>
<context-param>
<param-name>serverLogPropertiesFile
</param-name>
<param-value>logger.properties</param-value>
</context-param>
<context-param>
<param-name>styleCatalogFile</param-name>
<param-value>>/WEB-INF/xml/styleCatalog.xml
</param-value>
</context-param>
<context-param>
<param-name>sysPreferenceDefinitionFile
</param-name>
<param-value>sys_definitions.xml</param-value>
</context-param>
<context-param>
<param-name>sysServerDefaultsFile</param-name>
<param-value>sys_defaults.xml</param-value>
</context-param>
<!-- Other parameters that are available for
customization
<context-param>
<param-name>configServletPath</param-name>
<param-value />
</context-param>
<context-param>
<param-name>appBeanEventsFile</param-name>
<param-value></param-value>
</context-param>
<context-param>
<param-name>mdBeanEventsFile</param-name>
<param-value></param-value>
</context-param>
-->
- <servlet>
<servlet-name>mstrDocumentImages</servlet-name>
<servlet-class>com.microstrategy.web.servlets.
DocumentImageServlet</servlet-class>
- <init-param>
<param-name>imagesPath</param-name>
<param-value>../../images</param-value>
</init-param>
</servlet>
- <servlet>
<servlet-name>mstrWeb</servlet-name>
<display-name>Main Servlet</display-name>
<servlet-class>com.microstrategy.web.servlets.
MainServlet</servlet-class>
- <init-param>
<param-name>adminServletDeploymentName
</param-name>
<param-value>mstrWebAdmin</param-value>
</init-param>
- <init-param>
<param-name>blankReportId</param-name>
<param-value>05B202B9999F4C1AB960DA6208CADF3D
</param-value>
</init-param>
- <init-param>
<param-name>blankReportWritingId</param-name>
<param-value>934195564E2E58BD7CD7E4AF0423C149
</param-value>
</init-param>
- <init-param>
<param-name>clientLoggingFile</param-name>
<param-value>C:\MyTest.log</param-value>
<description>This parameter specifies the
location of the log file where the statistics
will be
saved. The full path should be included as part
of the parameter value. If the file does not
exist, the logging infrastructure will create
it (if possible). If the file already
exists,then the new information will be
appended to it.</description>
</init-param>
- <init-param>
<param-name>clientLoggingForm</param-name>
<param-value>http://localhost:8080/Microstrategy
7/jsp/ClientPerformanceForm.jsp
<description>This parameter specifies the server
and page to be used for displaying the client
performance results processing
form.</description>
</init-param>
- <init-param>
<param-name>clientLoggingLevel</param-name>
<param-value>0</param-value>
<description>This is the level of detail included
in the log. Its value is formed by the
BITWISE OR-ing of these values:
1=Analyze information at the PAGE (rendering)
level,
2=Analyze information at the DETAILED
(rendering) level,
4=Analyze information at the METHOD (client
manipulation) level,
8=Analyze information at the ACTION (client
manipulation) level.</description>
</init-param>
- <init-param>
<param-name>clientLoggingMode</param-name>
<param-value>1</param-value>
<description>This is how the logging is presented
to the user. Its value is formed by the
BITWISE OR-ing of these values:
1=Log to a file (see the value of
clientLoggingFile above for location). For this
flag to be applied, it requires the
clientLoggingType is set to LIVE.
2=Display results through an HTML page loaded
on the client's computer. For this flag
to be applied, it requires the
clientLoggingType is set to LIVE.
4=Display results through a Browser ALERT box.
</description>
</init-param>
- <init-param>
<param-name>clientLoggingPage</param-name>
<param-value>http://localhost:8080/Microstrategy
7/jsp/Client_Log.jsp</param-value>
<description>This parameter specifies what will
be the server and page to be used for
displaying client performance results.
</description>
</init-param>
- <init-param>
<param-name>clientLoggingType</param-name>
<param-value>1</param-value>
<description>This parameter specifies the type of
process that will be used for collecting the
statistics information.If the server/page to
process the statistical information is going
to be available for the client computer and
the reporting method involves log file or HTML
report, the logging type should be specified
to be LIVE (1). If the client computer where
the test is going to be performed does not have
access to this server, then the logging type
is STATIC (2). It does not matter if the pages
are being accessed live from the Web Universal
application or not.</description>
</init-param>
<init-param>
<param-name>configFile</param-name>
<param-value>/WEB-INF/xml/pageConfig.xml
</param-value>
</init-param>
- <init-param>
<param-name>controllerClass</param-name>
<param-value>com.microstrategy.web.app.MSTRWeb
Controller</param-value>
</init-param>
- <init-param>
<param-name>defaultPDFImagesFolder</param-name>
<param-value>/images/</param-value>
</init-param>
- <init-param>
<param-name>excelDirectExport</param-name>
<param-value>false</param-value>
</init-param>
- <init-param>
<param-name>externalSecurityClass</param-name>
<param-value>com.microstrategy.web.app.Default
ExternalSecurity</param-value>
</init-param>
- <init-param>
<param-name>formatPropertiesMapping
</param-name>
<param-value>>/WEB-INF/xml/formattingProperties.
xml</param-value>
</init-param>
- <init-param>
<param-name>iframeJSP</param-name>
<param-value>/jsp/iframe.jsp</param-value>
</init-param>
- <init-param>
<param-name>intelligenceServerPollingFrequency
</param-name>
<param-value>300000</param-value>
</init-param>
- <init-param>
<param-name>objBrowserFolderLinksConfigFile
</param-name>
<param-value>>/WEB-INF/xml/objBrowserFolderLink
.xml</param-value>
</init-param>
-<init-param>
<param-name>reloadConfigurationFiles
</param-name>
<param-value>false</param-value>
</init-param>
- <init-param>
<param-name>servletDeploymentName
</param-name>
<param-value>mstrWeb</param-value>
</init-param>
- <init-param>
<param-name>useServletForPDF</param-name>
<param-value>true</param-value>
</init-param>
</servlet>
- <servlet>
<servlet-name>mstrWeb72GraphLoader</servlet-name>
<servlet-class>com.microstrategy.web.servlets.
OldLinksServlet</servlet-class>
- <init-param>
<param-name>graphBeanName</param-name>
<param-value>gb</param-value>
</init-param>
<param-name>mainServletPath</param-name>
<param-value>mstrWeb</param-value>
</init-param>
- <init-param>
<param-name>reportBeanPath</param-name>
<param-value>mstrWeb.report.frame.rb
</param-value>
</init-param>
- <init-param>
<param-name>resourceName</param-name>
<param-value>MSIGraphLoader.asp</param-value>
</init-param>
</servlet>
- <servlet>
<servlet-name>mstrWeb72RebuildReport
</servlet-name>
<servlet-class>com.microstrategy.web.servlets.
OldLinksServlet</servlet-class>
- <init-param>
<param-name>mainServletPath</param-name>
<param-value>mstrWeb</param-value>
</init-param>
- <init-param>
<param-name>reportBeanPath</param-name>
<param-value>mstrWeb.report.frame.rb
</param-value>
</init-param>
- <init-param>
<param-name>resourceName</param-name>
<param-value>RebuildReport.asp</param-value>
</init-param>
</servlet>
- <servlet>
<servlet-name>mstrWebAdmin</servlet-name>
<display-name>Main Admin Servlet</display-name>
<servlet-class>com.microstrategy.web.servlets.
AdminServlet</servlet-class>
- <init-param>
<param-name>adminServletDeploymentName
</param-name>
<param-value>mstrWebAdmin</param-value>
</init-param>
- <init-param>
<param-name>configFile</param-name>
<param-value>/WEB-INF/xml/Admin_pageConfig.xml
</param-value>
</init-param>
- <init-param>
<param-name>controllerClass</param-name>
<param-value>com.microstrategy.web.admin.Admin
Controller</param-value>
</init-param>
- <init-param>
<param-name>diagnosticsFileMbSizeLimit
</param-name>
<param-value>1</param-value>
</init-param>
- <init-param>
<param-name>externalSecurityClass</param-name>
<param-value>com.microstrategy.web.app.
DefaultExternalSecurity</param-value>
</init-param>
- <init-param>
<param-name>servletDeploymentName</param-name>
<param-value>mstrWebAdmin</param-value>
</init-param>
- <init-param>
<param-name>webServletDeploymentName
</param-name>
<param-value>mstrWeb</param-value>
</init-param>
- <security-role-ref>
<role-name>ADMIN</role-name>
<role-link>admin</role-link>
</security-role-ref>
</servlet>
- <servlet>
- <servlet-mapping>
<servlet-name>mstrDocumentImages</servlet-name>
<url-pattern>/servlet/Images/*</url-pattern>
</servlet-mapping>
- <servlet-mapping>
<servlet-name>mstrWeb72GraphLoader
</servlet-name>
<url-pattern>servlet/MSIGraphLoader.asp
</url-pattern>
</servlet-mapping>
- <servlet-mapping>
servlet-name>mstrWeb72RebuildReport
</servlet-name>
<url-pattern>/servlet/RebuildReport.asp
</url-pattern>
</servlet-mapping>
- <servlet-mapping>
servlet-name>mstrDocumentImages
</servlet-name>
<url-pattern>/servlet/images/*</url-pattern>
</servlet-mapping>
- <servlet-mapping>
servlet-name>mstrWeb</servlet-name>
<url-pattern>/servlet/mstrWeb</url-pattern>
</servlet-mapping>
- <servlet-mapping>
servlet-name>mstrWebAdmin</servlet-name>
<url-pattern>/servlet/mstrWebAdmin</url-pattern>
</servlet-mapping>
- <session-config>
<session-timeout>30</session-timeout>
</session-config>
<!-- TQMS 207957 -->
- <mime-mapping>
<extension>css</extension>
<mime-type>text/css</mime-type>
</mime-mapping>
- <taglib>
<taglib-uri>/webUtilTL.tld</taglib-uri>
<taglib-location>/WEB-INF/tlds/webUtilTL.tld
</taglib-location></taglib>
- <security-constraint>
<web-resource-collection>
<web-resource-name>Administrator
</web-resource-name>
<url-pattern>/servlet/mstrWebAdmin
</url-pattern>
<http-method>GET</http-method>
<http-method>POST</http-method>
<http-method>PUT</http-method>
<http-method>DELETE</http-method>
</web-resource-collection>
<auth-constraint>
<role-name>admin</role-name>
</auth-constraint>
<user-data-constraint>
<transport-guarantee>NONE
</transport-guarantee>
</user-data-constraint>
</security-constraint>
<login-config>
<auth-method>BASIC</auth-method>
<realm-name>Administrator Authentication
Area</realm-name>
</login-config>
<security-role>
<role-name>admin</role-name>
</security-role>
</web-app>
installation log file The MicroStrategy setup program generates a log file in text
format. This log file contains records of all actions performed
by the setup program and by other executable files related to
installation.
port number The port number is how a server process identifies itself on
the machine on which it is running. For example, when the
Intelligence Server machine receives a network call from a
client (Desktop, Web Universal, Narrowcast Server,
Command Manager, and so on), it knows to forward those
calls to the Intelligence Server port number that is specified
in the call.
U
unattended installation (UNIX) 380
W
undeploying WAR file
Web Services J2EE using command deploying Web Universal 195
line 299 exploding for WebLogic 273
X
XSL report style 49