Professional Documents
Culture Documents
The content store is a database that Content Manager uses to store global configuration data, global
settings (such as the language and currency formats shown in the user interface), connections to data
sources, and product-specific content. Design models and log files are not stored in the content store.
By default, Cognos 8 products share the content store database. You must create this database using
one of the following:
● Oracle
● DB2
1. Ensure that the parameter for the database instance compatibility level of the content store
database is set to 9.0.1 or higher. Cognos 8 will not work if Oracle version is below 9.0.1.
For information about changing an instance configuration parameter, see the Oracle
documentation.
PRABIR SINGH
2
Note—This step is basically done to create the reports in the multiple languages.
If the result set returns an NLS_CHARACTERSET that is not Unicode, create a new database and
specify AL32UTF8 or UTF-8 for the database character set parameters.
Note—If the above points are not satisfied (The database is not Unicode)
follow the below mentioned steps to uninstall oracle.
4. Go to HKEY_CLASSES_ROOT.
6. Go to HKEY_LOCAL_MACHINE\SOFTWARE\ORACLE.
9. Go to HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services and remove all keys under here that begin with
ORACLE.
11. Go to HKEY_CURRENT_USER\SOFTWARE\ORACLE and delete keys that start with Oracle or ORCL (if any exist).
14. Go to Start > Settings > Control Panel > System > Environment tab.
15. Choose the system variable path and modify the Path variable.
16. Remove any Oracle entries from the path. For example, if JRE was installed by Oracle, remove the %ORACLE_HOME
%\BIN path and the JRE path. You may see a path similar to this one:
PRABIR SINGH
3
o Oracle - HOME_NAME
3. Determine which user account will be used to access the database. Its better to create a new
user.
ACCOUNT UNLOCK;
Ensure that the user account that accesses the database has permission to do the following:
● create, alter, and drop tables, triggers, views, procedures, and sequences.
PRABIR SINGH
4
To create database by using database configuration go to start button and click on programs -> oracle ->
configuration and migration tools ->database configuration assistant
Click the next button to follow the next screen; in this screen you have options, to create a database,
configure database options, delete a database, and manage templates.
PRABIR SINGH
5
Click the next button to get the database templates page, select the type of database template to be
used in creating the database. You can click show details to see the configuration for each type of
database. Choose the template suited to the type of workload your database will support. If you are not
sure, select the default general template. Click Next
Click next button to continue, here you have to enter the GLOBAL DATABASE NAME and SID.
PRABIR SINGH
6
Click the next button. By default it select the database with enterprise manager and grid control for
database management .or you can choose grid control for database management as it suit to your
configuration
PRABIR SINGH
7
Click the next button, Select File System, Automatic Storage Management, or Raw Devices to best suite
to system.
PRABIR SINGH
8
Click the next button; specify the location for the creation of the datafiles. Choose one of the following:
Use database File Locations from Template, Use Common Location for All database Files, or Use Oracle-
Managed Files.
PRABIR SINGH
9
directory.
PRABIR SINGH
10
PRABIR SINGH
11
If the directory contains the classes12.jar file, delete it before installing the ojdbc14.jar file.
PRABIR SINGH
12
1.
2.
PRABIR SINGH
13
And to
Before you use Web pages generated by Cognos 8, you must configure your Web server. You must set
up virtual directories, also known as Web aliases, for the directories that contain the HTML and Web
files for Cognos 8. The virtual directories in the Alias column of the following table are required for all
Web servers.
PRABIR SINGH
14
PRABIR SINGH
15
PRABIR SINGH
16
PRABIR SINGH
17
PRABIR SINGH
18
PRABIR SINGH
19
Select EXECUTE
PRABIR SINGH
20
Steps:
First, go to Control Panel, and then click on Programs. You’ll see a link for “Turn Windows features on or
off”
PRABIR SINGH
21
If you expand the Internet Information Services tree node, you can see that there are a lot of options
beneath it. You will probably want to explore these options, because even if you click on IIS, some of the
necessary options for doing development aren’t checked.
PRABIR SINGH
22
Once you’ve gone ahead and checked the items you want, and clicked OK, you’ll see this dialog for a
while….
Now when you navigate in your browser to localhost, you’ll see the new default page… slick!
Note—Once the IIS set up is complete please follow the above mentioned steps to configure the
web server.
Cognos Configuration.
PRABIR SINGH
23
Click “YES”
PRABIR SINGH
24
Now provide user ID and Password that you have created during Oracle installation.
PRABIR SINGH
25
PRABIR SINGH
26
PRABIR SINGH
27
PRABIR SINGH
28
Click Close
PRABIR SINGH
29
PRABIR SINGH
30
Click on MY HOME
PRABIR SINGH
31
Now point to be noted. The Folders are blanks and there are no Sample reports.
Cognos 8 provides sample databases for SQL Server, Oracle, and DB2 that contain sales and
Marketing information for a fictional company named the Great Outdoors. You can use Cognos
Sample packages and reports to help you learn how to use Cognos 8, including Framework Manager and Metric
Designer.
PRABIR SINGH
32
The following sample databases and associated files are provided with Cognos 8. For SQL Server and Oracle, each
database is delivered as a Microsoft SQL Server backup file and an Oracle export file (.dmp). For DB2, the database
schemas are delivered in a DB2 move file. The files are compressed, and you must extract them before you can
restore the databases or schemas.
to c: drive
EXECUTE @C:\gs_or_modify.sql
EXECUTE @C:\Event_Studio_ELM_Agent_Modify_GOSALES.sql
Note—This two execute statements are used for granting of dba permissions.
PRABIR SINGH
33
PRABIR SINGH
34
Open command prompt and go to the location where you have extracted *.dmp
files.
PRABIR SINGH
35
Password: GOSALESDW
PRABIR SINGH
36
PRABIR SINGH
37
PRABIR SINGH
38
PRABIR SINGH
39
PRABIR SINGH
40
PRABIR SINGH
41
PRABIR SINGH
42
PRABIR SINGH
43
PRABIR SINGH
44
PRABIR SINGH
45
PRABIR SINGH
46
Note---Restoring of the database is basically done to create the tables in the oracle database where
the
PRABIR SINGH
47
Cognos___Sqlserver
_installation_and_configuration.pdf
Configuration of Audit
1. Create database/schema to be used to collect logs from Cognos8. Follow the steps of
Create the Content Store in the Installation and Configuration Guide. These
steps are specific to the type of database being used.
2. Open the Cognos Configuration.
3. Right-click on Logging->New resource->Destination.
4. Type a name for example Audit. From the Type dropdown select Database and click
OK.
5. Right-click on Audit (or the name that was given in step 4) and New resource-
>Database.
6. Type a name and from the Type dropdown select they type of database that is used for
auditing. See step 1 above.
7. Select the name that is created in step 6 and enter the connection parameters of the
database in the Properties window.
8. Save the Cognos Configuration and restart the Service.
PRABIR SINGH
48
6. Check the box of Audit the native query for batch report service and Audit the
native query for report service.
7. Check the box of Delete the configuration settings of all child entries and click
OK.
PRABIR SINGH
49
The report usage audit report lists reports by frequency of use. Before it can be used, it
must be setup.
Steps
<servlet>
<servlet-name>DSServlet</servlet-name>
PRABIR SINGH
50
<servlet-class>com.cognos.demo.DSServlet</servlet-class>
</servlet>
<servlet-mapping>
<servlet-name>DSServlet</servlet-name>
<url-pattern>/cognos/DSServlet.jsp</url-pattern>
</servlet-mapping>
Note that there two sections in the above xml snippet. The <servlet> section of the above
snippet should be added just below the <servlet> section in web.xml. The <servlet-mapping>
snippet should be added just below the <servlet-mapping> section in web.xml. Otherwise
errors will be displayed in tomcat. The Cognos8 will still function.
3. If you do not have the following directory on your system, create it:
c8_location/webapps/p2pd/web-inf/classes/com/cognos/demo.
4. Copy the file build.bat for Windows or build.sh for UNIX located in
c8_location/webapps/Audit to c8_location/webapps/p2pd/WEB-
INF/classes/com/cognos/demo.
5. Edit the build file to ensure the JAVA_HOME definition points to your JDK and ensure
the CRN_HOME definition points to your Cognos 8 location. If JDK is not installed
on the server, then download and install it.
6. If it is not already there, copy the DSServlet.java file from the
c8_location/webapps/Audit directory to c8_location/webapps/p2pd/web-
inf/classes/com/cognos/demo.
7. Do one of the following in the DSServlet.java file:
If you are allowing anonymous logon, comment out the following line:
binding.logon (...)
If you are not allowing anonymous logon, make sure that the username,
password, and namespace are correct and uncomment the following line:
binding.logon (...)
The following snippet of code in DSServlet.java needs to be modified to reflect the corrent
username, password, namespace and the dispatcher URI.
PRABIR SINGH
51
Since this is the user which will be used to run the servlet to get the report usage information,
the username should be a member of System Administrator’s group in Cognos Connection.
The namespaceID can be obtained from Cognos Configuration. NamespaceID should be used
and not the name of namespace.
Note that DSServlet.jsp is not physically created on the drive. However, the
data source connection is pointed to this URI.
Logon to Cognos Connection. Now you should be able to run any Audit reports. That
is if the user has read and executes privileges on these reports.
Most people are familiar with, or at least aware of, Cognos 8 logging. By
Default, plain text log files are created under the <c8_install>\logs
Directory. These logs contain various categories of information, and are often
used for identifying errors within the Cognos 8 environment. The level of
detail logged can be controlled, for example a system that is running well
PRABIR SINGH
52
may have a low level of detail, but when tracing an issue, such as unexpected
error messages or performance problems, then the logging level may be
increased to include diagnostic information that is not usually of concern.
Logging does not need to be exclusively for troubleshooting, by extracting
key information, the data can also be used for Auditing purposes – that is
tracking the activity taking place on the system. Some of benefits of auditing
usage include:
• Planning down time by identifying quiet periods.
• Justifying additional infrastructure requirements.
• Performance monitoring.
• License conformance.
• Identifying unused content.
To facilitate easier access to this kind of information, Cognos 8 allows logging
to be directed to a relational database where it can be easily queried.
Note—By default cognos provides 10 MB of log file. One can change the
size of the log file as per requirement. Once the log file is full cognos itself
creates a log file of 10 MB by default.
PRABIR SINGH
53
Note---As shown in the above diagram one can delete the existing audit
and create its own auditing database.
PRABIR SINGH
54
Note –As shown in the above diagram one need to provide the
configuration details in the value field .
After saving the settings and starting Cognos 8, examining the specified the
database you should see the following tables created. If they are not, check
the cogserver.log file to see if any errors are indicated.
PRABIR SINGH
55
The logging levels are not stored in a Cognos 8 Deployment Archive, even if
PRABIR SINGH
56
The logging levels are set to specify the events and messages to record in the log
file or in the log database. A different logging level can be set for each dispatcher
service.
In Cognos 8 there are 5 different logging levels: Minimal, Basic, Request, Trace,
Full.
Use of DS Servlet
Information is logged as actions occur, for example, when a user logs in and
runs a report; the log in event is stored, along with the report execution
details. This allows activities to traced, but what if we want to trace
something that DOESN’T happen? Specifically, there may be a desire to
discover content that is not being used – the very fact that a report is never
accessed means that it will never appear in the audit files.
PRABIR SINGH
57
Security in Cognos 8
There are basically 6 types of security in cognos that we can configure according to
the recording.
NTLM Security—This is windows enabled security. To enable this one need to select the security option in cognos
configuration and change the parameters accordingly.
1. One need to create users with userid and password in windows and those users will have
the cognos access through cognos.
PRABIR SINGH
58
2. For creating new system users and server users go to Cognos administrator and then add the users and delete the
everyone group.
PRABIR SINGH
59
Note—As shown in the above diagram in the default security cognos the
Allow anonymous users must be set to false after creating the security
otherwise NTLM or other securities will not work.
Steps
1. On every computer where you installed Content Manager, open IBM Cognos
Configuration.
2. In the Explorer window, under Security, right-click Authentication, and then click
New resource, Namespace.
PRABIR SINGH
60
4. In the Type list, click the appropriate namespace and then click OK.
The new authentication provider resource appears in the Explorer window, under the
Authentication component.
6. Specify the values for all other required properties to ensure that IBM Cognos 8
components can locate and use your existing authentication provider.
If your IBM Cognos Series 7 namespace version is 16.0, ensure that the Data
encoding property is set to UTF-8. In addition, the computers where Content Manager
is installed must use the same locale as the data in the IBM Cognos Series 7
namespace.
The host value can be a computer name or an IP address. If you are publishing from
PowerPlay Enterprise Server to IBM Cognos 8, you must use the same value format
used in IBM Cognos Series 7 Configuration Manager for the location of the directory
server. For example, if the computer name is used in IBM Cognos Series 7
Configuration Manager, you must also use the computer name in IBM Cognos
Configuration for IBM Cognos 8.
7. If your namespace environment includes version 15.2 of the IBM Cognos Series 7
namespace, you must disable the Series7NamespacesAreUnicode setting.
In the Properties window, in the Advanced Properties value, click the edit
button.
8. In the Properties window, under Cookie settings, ensure that the Path, Domain,
and Secure flag enabled properties match the settings configured for IBM Cognos
Series 7.
10. Test the connection to a new namespace. In the Explorer window, under
Authentication, right-click the new authentication resource and click Test.
PRABIR SINGH
61
Notification in Cognos
1. Notification in cognos is basically used for sending the mail to the users or the
client.
2. As shown in the above diagram, on the right hand side of the window one has to
provide SMTP mail server For Example Smtp server for gmail is smtp.gmail.com.
PRABIR SINGH
62
3. In the account and password field provide the gmail userid and password and in
the default sender provide the email id Ex—prabirsingh52@gmail.com.
4. Before creating the notification one has the configure the outlook as per the
requirement.
5. For configuring the outlook 2003 one need to manually provide the port number
for SMTP and POP3 server. For outlook 2007 the configuration is automatic.
PRABIR SINGH
63
6. By default the SMTP server for Gmail is 587 and pop3 server is 995(SSL).
7. As shown in the figure click more settings and in the connection tab provide the
port numbers for SMTP and pop3.
Small Configuration.
Medium Configuration.
Large Configuration.
PRABIR SINGH
64
1. The default memory, set in cognos is 768 byte. Depending upon the requirement
one can set the different memory allocation.
Steps:
1. In Cognos Connection, click the Server Administration link.
2. In the Server Administration page, under Type, click the Services radio button and
PRABIR SINGH
65
then choose Content Manager in the drop-down menu. The Content Manager service
appears below the drop-down menu.
3. Under the Actions column, click the set properties button.
4. Click the Settings tab.
CM.OUTPUTLOCATION
8. In the corresponding Value cell, type the file system location where you want to
store report outputs. Note: for the network file system, use a UNC Path, eg:
\\hostname\share_folders, instead of a mapped drivename.
The full file names of the output file and descriptor are passed to the script. For example,
c:\reportnet\146_1062107695000.pdf
c:\reportnet\146_1062107695000_desc.xml.
Steps:
1. Open Cognos Configuration on each install that contains the Application Tier.
PRABIR SINGH
66
http://servername:80/c8/cgi-bin/cognosisapi.dll
4. In the /webcontent directory of each gateway install, open the default.htm and the
index.htm files with an HTML or text editor and in both files, change the following:
url=cgi-bin/cognos.cgi? etc...
To:
url=cgi-bin/cognosisapi.dll? etc...
Note: if you copied these two files from the ISAPI folder, you will need to remove the "../"
from the beginning of the URL (this is only relevant while that file resides in the subfolder)
6. Open your browser and enter the following in your address bar:
Customization of Cognos UI
customizing_the_cog
nos_8_ui.pdf
ibm_cognos8_failove
r_and_load_balancing.pdf
PRABIR SINGH
67
Introduction
Purpose
The standard auditing features that come out of the box with IBM Cognos BI cover many
aspects of operation. However, some areas such as the auditing of users and capability
assignments are not included. The aim of the c8AuditExtension application is to provide
additional auditing for these areas.
The application currently covers the following:
Account Audit
An audit of all the user accounts that are found in all configured namespaces and certain
properties of those accounts (basic details, portal pages, created and modified dates etc.).
This allows reporting on the Cognos user base and provides additional information to go
with the role/capability audit. This type of audit will also by default record the content of
users’ My Folders.
Content Audit
An audit of all the objects that exist in the main Content Store. This audit will process
through the content store tree and log all the objects (folders, reports, queries, etc.) that
it finds. It will log the basic information (such as name, search path, object permissions,
created and modified date), as well as some details more specific to the item types (such
as the specification XML of reports and queries, any saved parameter values applied to
saved reports and the details of report output versions).
In order to also record the items in the Content Store that are located inside individual
users’ My Folders areas, this audit type should be used in conjunction with the Account
Audit (see above).
Status Audit
An audit of the current state of a server and related dispatchers. For each dispatcher
registered in the target system, the configuration and activity will be logged, saving
information such as time taken to connect, number of active processes and request
duration.
Usage
The application is managed via a web front end that allows the configuration of server and
namespace information and can be used to turn on or off individual audit types for a given
server.
Audits can be initiated in three ways,
The results of each audit are logged to a database and an IBM Cognos Framework
Manager model is provided to help report off the data.
Applicability
This application is designed for IBM Cognos 8 BI versions 8.1 MR1, 8.2, 8.3, 8.4 and 8.4.1
and makes use of the IBM Cognos 8 BI SDK to communicate with the various IBM Cognos
PRABIR SINGH
68
8 BI components. It is also intended to interact with any third party application that can
issue commands via web services.
Limited support is also provided for IBM Cognos ReportNet 1.1 servers, although
differences in product features mean that not all audit features are supported.
Exclusions and Exceptions
This application may not be compatible with all Custom Authentication Providers,
depending on the implementation of the provider – for example, it generally expects a
provider/namespace to require a simple username and password to log on - where a
custom provider uses some other form of credential, the audit extension may be unable to
authenticate to that namespace to audit it. This does not affect trusted signon type
custom providers, providing that the underlying provider can be authenticated to in the
normal way.
The supported databases for the application are,
The Status audit depends on some information provided by the IBM Cognos 8 server that
is subject to change and may be affected by future upgrades of IBM Cognos 8.
This application will only work within a JRE 1.5 or above. An appropriate JRE is provided
with installations of IBM Cognos 8 BI versions 8.3 and above.
Usage, support and feedback
This application should only be supplied to customers as part of a suitable Services
package to ensure successful implementation and interpretation of the results.
The application and model are provided on a strictly "as is" basis and IBM Cognos Support
is not able to offer any support for it. However, any feedback, bug reports or suggestions
are welcomed.
Application Details
Process overview and architecture
The application is a web application and web service written in Java/AXIS. It is intended to
be installed on an IBM Cognos 8 machine, running in either the IBM Cognos 8 Tomcat
instance or its own application server.
After installation, the application will create its own database tables if they do not already
exist and present an interface to allow the administrator to enter the details of IBM
Cognos 8 servers and namespaces. Generally only one server entry would be used for
each group of IBM Cognos 8 servers that makes use of the same Content Store. However,
separate server entries are often used for different functional groups such as Production
and Development.
The application can be secured from the management interface by defining a local
password which will subsequently be required to access the interface or run audits. The
reason a local password is used rather than tying to IBM Cognos 8 security is that the
application can interact with multiple IBM Cognos 8 installations, so there is no one IBM
Cognos 8 security namespace to tie it to.
PRABIR SINGH
69
When the administrator enters the details of a new IBM Cognos 8 Dispatcher, the
application will connect to that Dispatcher and gather details of the configured security
namespaces. These details will be added to the properties page for that Dispatcher and
made ready for editing. It is essential that an entry exists, complete with valid login
details, for every namespace that is used for object security or capability assignment in
the Content Store so that they can be audited. This is because the application needs to be
able to authenticate to the namespace in order to audit its contents. If the application
cannot authenticate to a namespace that is used for object security or users, then its
objects cannot be audited. If multiple namespaces are specified in a single server entry,
authentication to all namespaces must be made otherwise the application will terminate
the audit run.
Namespace login details will be encrypted and stored in the application database.
Installation
The application is deployed as a WAR file that can be used with any suitable servlet
container or application server such as IBM WebSphere. You must first build the WAR file
within your IBM Cognos 8 installation using the supplied scripts and then deploy this file
to your server.
The procedures outlined in this document cover deploying the application into the Tomcat
servlet container that is normally installed with an IBM Cognos 8 server. Consult the
documentation of the specific application server/servlet container for instructions on
deploying a WAR file into alternative destinations.
Generally speaking, it is desirable for a production environment to run this application
within its own Tomcat or WAS instance. Please refer to the documentation of Tomcat,
WAS or other application server for details on how to deploy a web application.
The process for installation is as follows,
war
PRABIR SINGH
70
This folder contains the application itself, in a subdirectory named AuditExt. You need to use this to
build the WAR file.
Take the war/AuditExt directory and place it in your IBM Cognos 8 installation directory
under <c8install>/war. For example,
At this point, you can customise the application before building the WAR file. The default
settings should be fine for most users, but if you need to make any changes to the
configuration settings in the c8AuditExtension.properties file (see section 3.6) or the
logging settings in the log4j.properties file (see section 5.1), the files are located in the
<c8install>/war/AuditExt/classes directory.
PRABIR SINGH
71
If you are using an IBM DB2 or Apache Derby database to store the Audit Extension data,
you will not need to install any additional JDBC drivers, as the DB2 Universal Driver is
included in the distribution. If you plan to use Microsoft SQL Server, MySQL or Oracle then
you will need to obtain the correct driver file and install it.
The SQL Server driver file is sqljdbc.jar and can be obtained from,
http://www.microsoft.com/downloads/details.aspx?FamilyId=6D483869-816A-44CB-9787-
A866235EFC7C&displaylang=en
or
http://tinyurl.com/sqljdbc
The Oracle driver file is ojdbc14.jar and can be obtained from either your Oracle installation or
from,
http://www.oracle.com/technology/software/tech/java/sqlj_jdbc/htdocs/jdbc_10201.html
or
http://tinyurl.com/ojdbc
Once you have obtained the correct jar file(s) for your database, place them in the
<c8install>/war/AuditExt/lib directory. For example, the illustration below shows the
Microsoft SQL Server driver being added,
PRABIR SINGH
72
If you do not install the correct driver at this stage, the application will warn you when
you attempt to first configure the database.
Build and deploy the WAR file
Build the war file by running the <c8install>/war/AuditExt/build.bat (Windows) or
<c8install>/war/AuditExt/build.sh (UNIX/Linux) script.
This will create the WAR file <c8install>/war/AuditExt/AuditExt.war. Place this file in the
<c8install>/webapps directory,
After a short time, the IBM Cognos 8 Tomcat server will automatically unpack the WAR
file,
PRABIR SINGH
73
The c8AuditExtension application can use either an existing IBM Cognos 8 audit database
or a separate database created specifically for this application. It is strongly recommended
not to use a database that is already in use for a IBM Cognos 8 Content Store.
IMPORTANT: The database specified in the Database name field must already exist prior
to connecting. The application will create the necessary tables under this database.
The process of creating and populating database tables may take some time, depending
on the speed of the server. Once OK has been clicked, wait for the screen to refresh
before continuing – do not click OK more than once.
Database preparation
To prepare the database for use by this application, you should configure it in the same as
described in the IBM Cognos Installation and Configuration Guide as if it were being used
for a Content Store. You may also use a standard IBM Cognos 8 audit logging database,
which should also have been configured in this way.
IMPORTANT: For DB2, you must create an additional regular user tablespace with a
page size of 16 KB. If you are using a database that has already been set up for IBM
Cognos 8 audit logging, you may already have done this.
PRABIR SINGH
74
IMPORTANT: For Oracle, you may need to increase the maximum number of open
cursors supported by the database. The default is 50, which will probably be insufficient
for this application – a more suitable value would be 500. For more information see
http://www.orafaq.com/node/758.
Reconfiguration
To reconfigure the main database connection, click on the Reset configuration link on the
Manage Servers page. This allows for the re-entry of the database connection details.
Alternatively, the main database connection can be reset manually by following these
steps,
Restart IBM Cognos 8.
When IBM Cognos 8 is restarted and the administration URL is accessed again, the screen
prompting for the JDBC connection details will be presented.
Configuration file reference
The main configuration file is called c8AuditExtension.properties and can be found at
<c8install>/webapps/AuditExt/WEB-INF/classes. This configuration file contains the
following parameters,
jdbc.url
jdbc.user
jdbc.password
Connection details for the database used by the audit extension application. These are generated by the
application configuration interface and should not be edited manually, except to reset to empty values
for reconfiguration. Note that the password is stored in an encrypted format.
option.ca.include.specifications
A Content Audit option that determines if the audit should record the specification XML of any
reports/queries/analyses that it finds. Possible values are true and false. The default value is true. If this
parameter is set to false, less database space will be used.
option.ca.include.output
A Content Audit option that determines if the audit should record details of report versions and outputs
for report objects that it finds. Possible values are true and false. The default value is true. If this
parameter is set to false, less database space will be used and the audit may run faster.
PRABIR SINGH
75
option.ca.max.items
A Content Audit option that limits the maximum number of items that will be processed by the audit. If
the number is exceeded, the audit is terminated and recorded as a failure. The default value is 0 (zero)
which means no limit will be applied.
option.ca.max.duration
A Content Audit option that limits the maximum length of time, in seconds, that the audit should be run
for. If this time is exceeded, the audit is terminated and recorded as a failure. If it is set to a value of 0
(zero), no time limit will be applied. The default value is 900 (15 minutes).
option.ca.policy.calculation
A Content Audit option that determines whether security policy calculation should be done in FM.
Possible values are true and false. If set to false, the calculation will instead be done at runtime. The
default value is true meaning there will be no calculation done at runtime.
option.aa.max.items
An Account Audit option that limits the maximum number of items that will be processed by the audit. If
the number is exceeded, the audit is terminated and recorded as a failure. If it is set to a value of zero,
no limit will be applied. The default value is 10000.
option.aa.max.duration
An Account Audit option that limits the maximum length of time, in seconds, that the audit should be
run for. If this time is exceeded, the audit is terminated and recorded as a failure. If it is set to a value of
0 (zero), no time limit will be applied. The default value is 900 (15 minutes).
option.aa.include.content
An Account Audit option that determines if the audit should process the content of users’ My Folders. If
set, this will cause a mini-Content Audit to be run for each user’s content where it exists. Possible values
are true and false. The default value is true.
option.sa.include.configuration
A Status Audit option that determines if the audit should record the configuration information of
dispatchers. This includes such information as the maximum number of processes. Possible values are
true and false. The default value is true. If this parameter is set to false, less database space will be used.
option.sa.include.rawstatus
A Status Audit option that specifies if the audit should record the raw status XML of services that the
audit finds. Possible values are true and false. The default value is true. If this parameter is set to false,
less database space will be used.
PRABIR SINGH
76
option.sa.include.ping
A Status Audit option that specifies if the audit should perform additional basic network tests on the
dispatchers registered with a server. Possible values are true and false. The default value is true.
security.keystore.filename
The location of the keystore file that is used for security. If the file does not exist at this location, a new
one will be generated. Note that this must be a writeable location otherwise the application will fail. The
default value will place the keystore in the configuration directory of the IBM Cognos 8 installation using
a relative file path. If this application was deployed anywhere other than the Tomcat servlet container
that was installed with IBM Cognos 8, this value will need to be edited.
option.db.setdefault.audittypes
A database option that determines if the application should reset the audit type descriptions in the
database to their default values if they have changed. Possible values are true and false. The default
value is false.
option.db.setdefault.statusresulttypes
A database option that determines if the application should reset the status result type descriptions in
the database to their default values if they have changed. Possible values are true and false. The default
value is false.
option.db.setdefault.serverversiondesc
A database option that determines if the application should reset the server version descriptions in the
database to their default values if they have changed. Possible values are true and false. The default
value is false.
option.db.setdefault.pingtypev
A database option that determines if the application should reset the ping test type descriptions in the
database to their default values if they have changed. Possible values are true and false. The default
value is false.
option.db.setdefault.pingresult
A database option that determines if the application should reset the ping test result descriptions in the
database to their default values if they have changed. Possible values are true and false. The default
value is false.
option.db.dimension.time.populate
A database option that determines if the application should fully populate the time dimension table
when the table is created on first startup. Note that any missing times will be added when the audit for
that time runs, so pre-population is not required, although it is considered better for reporting purposes.
Possible values are true and false. The default value is true.
PRABIR SINGH
77
option.db.dimension.date.initdays
A database option that specifies the number of days (starting from the current date) to pre-populate in
the date dimension table when it creates it on first startup. Note that any missing dates will be added
when the audit for that time runs, so full pre-population is not required, although it is considered better
for reporting purposes. The default value is 730 (2 years).
option.db.maxbatch
An option that specifies the maximum number of items that should be processed before a database
write. This applies to all audit types and is designed to reduce overall memory consumption for very
large audits. The default value is 2000.
option.db.random-audit-id
An option that controls whether the database ID generated for each audit should be a pseudo-random
number (a value of true) or sequential (a value of false). The default value is false.
PRABIR SINGH
78
Optionally, the keystore file can also be deleted. By default, the keystore file is located at
<c8install>/configuration/c8AuditExtension.keystore but this location will be different if
the application has been deployed outside of the Tomcat servlet container installed with
IBM Cognos 8.
IMPORTANT: If the keystore file is deleted or the application is installed on another machine without
copying the keystore file to the new machine, it will no longer be possible to access saved passwords
and there may be errors running and administering audits.
Optionally, delete the database tables created by the application can be deleted. The
database tables are all prefixed with "AE_".
Back to top
Add a server
PRABIR SINGH
79
From the Manage Servers page, add a new server entry by filling in the fields beside the
label Add new server and clicking the Add button. The fields to fill in are,
ID: A text identifier for the server. This could be a hostname or simple identifier like "PrimaryServer". As
the value of this identifier may be used to refer to the server for commands, it is suggested that this
value be a simple, short string with only standard characters. URL: The URL the application will use to
connect to IBM Cognos 8. This URL could either be directly to a IBM Cognos 8 Dispatcher or to a
dedicated gateway for IBM Cognos 8 SDK applications. Version: The IBM Cognos 8 version running on
the server.
Once a new server has been added successfully, the properties page for that apply to the
IBM Cognos 8 server just added will automatically be shown.
PRABIR SINGH
80
Any namespaces that have been configured for the new server will have been
automatically added to the properties page without passwords.
NOTE: If using this application in a test or development environment and Anonymous access has been
enabled on the IBM Cognos 8 instance, the configured namespaces will not automatically appear.
Configured namespaces can be added manually by filling in the fields under the label Add new
namespace login.
When a new server has been added, the Manage Servers page will contain a list of all the
servers that can be audited by this application.
PRABIR SINGH
81
Delete a server
A server can be deleted from the Manage Servers page. To delete a server, click the
Delete Server icon next to the server entry. A page will appear asking the user to confirm
or cancel the deletion. If confirmed, the Manage Servers screen will reappear with the
deleted server removed from the list.
Manage server namespaces
For each server, namespaces can be managed from the properties page of the specified
server. If a new server has just been added, the properties page will be displayed
automatically. To access and edit the properties page for any server shown in the list on
the Manage Servers page, click the Set Properties icon beside the targeted server. The
properties page for a server will look similar to the following page,
PRABIR SINGH
82
Before a namespace can be included in an audit, the login credentials the application is to
use must be supplied. Enter usernames and passwords one namespace at a time, clicking
the Save icon next to that namespace entry after each one. If an attempt is made to save
multiple namespace credentials at the same time, only the credentials that correspond to
the Save button that was clicked will be saved. Note that saved namespaces will display
the saved user but will never display the saved password.
For any unwanted namespaces, they should be deleted these by clicking the Delete Login
icon. An example of such a namespace is one that is used only for single signon.
To add a new namespace, enter the details in the section labelled Add new namespace
login at the bottom of the screen. The value for the Namespace ID field is the same value
that is specified in the Namespace ID field when the namespace was originally defined in
IBM Cognos Configuration.
When finished with the server properties page, click the Return button to go back to the
Manage Servers page.
Configure server properties and audit types
Within the server properties page, additional properties can be set for the server. The
properties are,
PRABIR SINGH
83
PRABIR SINGH
84
After a password has been set, users will be prompted to enter it in order to access the
application.
PRABIR SINGH
85
To run an audit for all servers specified in the Manage Servers page using a URL use the
following syntax,
http://servername:9300/AuditExt/AuditServlet?action=run_audit&server_id=serverId
runAudit – Takes one parameter, the server ID, and runs the configured audits for that server.
runAuditAll – Takes no parameters and runs the configured audits for all servers.
PRABIR SINGH
86
This web service can be called from any application but an example will be presented here
that uses Event Studio to create a IBM Cognos 8 agent that will call the web service
interface to run an audit. The example will use the sample package that accompanies this
application.
When Event Studio is invoked to create a new agent, the first screen that appears is
Specify an event condition… Use a measure in the model that is known to be greater than
zero or non-null. This will force the event condition to be true and the agent will be
guaranteed to run on demand or as scheduled.
From the "Add a Task" list, select Advanced > Call a Web service…
PRABIR SINGH
87
Enter the URL to the WSDL and click on the Retrieve button to get the available methods.
PRABIR SINGH
88
In this instance, the runAudit method has been selected. Enter a previously configured
server ID as the serverIdentifier argument.
PRABIR SINGH
89
The agent can now be scheduled using IBM Cognos Connection and the IBM Cognos 8
scheduling service.
Sample deployment
An IBM Cognos 8 deployment archive consisting of a package containing some sample
reports and agents created against the sample Framework Manager model is provided
with this application. The sample deployment and model are contained within the file
AuditExt_reporting_ver_yyyymmdd.zip, where the ver portion of the name is the
version(s) of IBM Cognos 8 to use and the yyyymmdd portion of the name represents the
date the reporting package was released.
To import the sample deployment so that it can be used by the IBM Cognos 8 studios,
PRABIR SINGH
90
wizard. In most instances, the default settings will suffice. Note that the internal deployment
name is Cognos_Audit_Extension.
Before the package can be used, it is necessary to create a new data source in the IBM
Cognos 8 Content Store that will interact with the audit database specified when this
application was initially installed
From IBM Cognos Administration, click the Configuration tab and select Data Source Connection.
Click on the New Data Source icon and give the new data source the name c8_audit. From there,
follow the instructions and options presented by the New Data Source wizard to create the data
source.
PRABIR SINGH
91
Back to top
Other
Logging
This application uses log4j to provide logging services. To change the logging settings,
edit the file <c8-install>/webapps/c8AuditExtension/WEB-INF/classes/log4j.properties.
The log file defaults to <c8install>/logs/c8AuditExtension.log.
See the log4j documentation at http://logging.apache.org/log4j/docs/ for more
information on how to configure log4j.
Database tables
The application creates/uses the following tables:
General configuration
AE_CONFIG_MAIN
Main application configuration containing the configured servers.
AE_CONFIG_NS
PRABIR SINGH
92
AE_AUDIT_TYPES
List of possible audit types.
AE_SERVER_VERSIONS
List of supported Cognos server versions.
AE_CONFIG_AUDIT_TYPES
Which audit types are configured for each server.
AE_SECURITY
Table containing encrypted admin password.
Account audit
AE_ACCOUNTAUDIT_MAIN
Main detail table.
AE_ACCOUNTAUDIT_PORTALPAGES
Records of any user portal pages.
Content audit
AE_CONTENTAUDIT_MAIN
Main detail table. AE_CONTENTAUDIT_PARAMS
Record of saved parameters for reports and views.
AE_CONTENTAUDIT_POLICIES
Record of all security policies applied to all objects.
AE_CONTENTAUDIT_SPEC
Record of report, query and analysis specifications.
AE_CONTENTAUDIT_REPORT_VERSIONS
Record of report output versions saved in the Content Store.
AE_CONTENTAUDIT_REPORT_OUTPUTS
Record of report outputs saved in the Content Store.
Status audit
AE_STATUSAUDIT_MAIN
Main detail table.
PRABIR SINGH
93
AE_STATUSAUDIT_RESULT_TYPES
Lookup table for result type codes.
AE_STATUSAUDIT_DISP
Main audit details for each dispatcher registered in the content store.
AE_STATUSAUDIT_DISP
Main audit details for each dispatcher registered in the content store.
AE_STATUSAUDIT_DISP_CONFIG
Additional configuration details for each dispatcher registered in the content store.
AE_STATUSAUDIT_DISP_SERVICES
Details on the running services for each dispatcher registered in the content store.
AE_STATUSAUDIT_DISP_PING
Results of simple network tests on dispatchers.
AE_STATUSAUDIT_PING_TEST_TYPES
Possible types of of simple network tests that can be performed on dispatchers.
AE_STATUSAUDIT_PING_RESULT_TYPES
Possible result codes and descriptions of simple dispatcher network tests.
AE_AUDIT_TYPE_LOG
Log of the audit types run for each audit.
AE_ITEM_LOOKUP
Lookup table mapping item store IDs to names.
AE_ITEM_LOOKUP_FAILURES
Record of all items that could not be looked up (for example because they were removed from the
content store but were found in audits as owners of other items etc.)
AE_MAP_DATETIME
Table for mapping timestamps (such as the audit start and end times) to date and time dimension table
keys.
PRABIR SINGH
94
AE_DIM_DATE
Date dimension table. The granularity is days.
AE_DIM_TIME
Time dimension table. The granularity is minutes.
AE_SECURITY_MEMBERS
Optional data on security policies generated during an Account or Content Audit when the
option.ca.policy.calculation option is set to false.
The Content Manager computers must know the location of the content store, the location of
other Content Manager components, and the database that is used for notification.
Permissions
You can install using either root or non-root authority.
Also, IBM Cognos 8 respects the file mode creation mask (umask) of the account running
the installation program. This affects only the installation directories. It does not affect the
file permissions within the directories. However, run-time generated files, such as logs,
respect the mask. We recommend umask 022 on the installation directory.
PRABIR SINGH
95
Steps
1. Ensure that the JAVA_HOME environment variable is set to the JRE location.
For example, to set JAVA_HOME to the JRE files provided with the installation, the path
is c8_location/bin/jre/version.
The standby Content Manager components are for failover protection. If the active Content
Manager is not available because of a software or hardware failure, a standby Content
Manager becomes active and requests are directed to it.
When the active Content Manager fails, unsaved session data is lost. When another Content
Manager becomes active, users may be prompted to log on.
By default, the first Content Manager installed with IBM Cognos 8 is the active one. A IBM
Cognos 8 server administrator can change the default Content Manager and the active
Content Manager at any time. When IBM Cognos 8 is started, the default Content Manager
locks the content store from access by all other installations of Content Manager. These
other Content Manager installations enter standby mode.
This failover mechanism works because dispatchers and the active Content Manager
routinely communicate with each other. If a dispatcher can no longer reach Content
Manager, the dispatcher signals a standby Content Manager, which becomes the active
Content Manager. The other installations of Content Manager remain in standby mode for
continuing failover support. The standby Content Managers retrieve cryptographic settings,
PRABIR SINGH
96
such as the common symmetric key (used to encrypt and decrypt data), from the active
Content Manager.
Install JRE
Note: The isainfo command can be used to determine if a Solaris system has been
configured to run in 32 or 64 bit mode. Run the command: isainfo -v
If the system is running in 32 bit mode, you will see the following output:
32-bit sparc applications
On a 64 bit Solaris system, you'll see:
64-bit sparcv9 applications
32-bit sparc applications
Note: when copying files to UNIX boxes, set FTP transfer mode to binary. After files have
been copied, don't forget to change permissions to allow execution (ie. chmod 777
<filename>).
PRABIR SINGH
97
# export JAVA_HOME=<path/to/jre>
# export LD_LIBRARY_PATH =<crn location>/bin
For AIX:
# export JAVA_HOME=<path/to/jre>
# export LIBPATH=<crn location>/bin
PRABIR SINGH
98
Security in cognos
In Framework Manager, security is a way of restricting access to metadata and data across Cognos 8
products. There are different types of security in Framework Manager:
1.Data Security
You can restrict the data represented by query subjects in a project by creating a security filter. The
security filter controls the data that is shown to the report authors when they set up their reports.For
example, your Sales team consists of a Sales Director, and four Sales Managers. You create a security
filter that includes the groups directors and sales managers, and apply the filter to the
salary query subject. When the package is available for report authors, and a report is generated for
the Sales Managers and the Sales Director, only the Sales Director can see the salary information for
the sales managers.
2.Object Security
You secure an object directly by allowing users access to the object, denying users access tothe
object, or keeping it hidden for all users.
Metadata security can be applied directly to objects in a project. When you add object-based security, you apply a
specific user, group, or role directly to the object. You choose to make the object visible to selected users or groups.
If you do not set object-based security, all objects in your project are visible to everyone who has
access to the package. When you apply security to one object, all objects in the model will also have
security applied to them. They will not be visible to anyone. Once you set security for one object, you
need to set it for all objects. You can do this by setting security on the root namespace.
3.Package Security
You can define metadata security when you create and publish packages in Framework Manager. You
can also define metadata security after creating the package. A package is a secured subset of a
project. A package can be published and can be included in other packages. You can add entries that
were created in both third-party authentication providers and Cognos 8 as members of a Cognos
group. You can organize your security by specifying which users, groups, and roles have access to
certain parts of the published model.
PRABIR SINGH
99
1) Package Level
2) Object level
3) Data level
Package level
Click Adds
select Cognos
OK it
----------------------------------------------------
Object Level
click on ADD
PRABIR SINGH
100
select Cognos
Click Add
Explore package
window opens
-------------------------------------------------------
Data level
click on ADD
select Cognos
PRABIR SINGH
101
select consumers
Ok it
click on insert
In Filters folder
You can use session parameters to map a data item to one of the ldap user values.
depending on what you authentication source is and if the necessary values are there.
EX: Your ldap has employee # your data has a table with employee # manager# other columns and this
table is joined to you model. You need to do this to all query subject that you want to secure you map
a FM query item to the session parameter employeenumber (from your ldap source). This will filter on
the users employee number.
Now to go one step further let's say you have employee and managers as users if your ldap source has
them in different groups you can create a different mapping to equate the employee number of the
managers to the manager# query item this will allow the managers to see all of their staff.
The content store includes all entries in the portal, such as:
● Public folders
● Packages
● Reports
● Data sources
● Distribution lists and contacts
● Printers
● The Cognos namespace● deployment specifications
Cognos Content Store Database Tables
PRABIR SINGH
102
PRABIR SINGH
103
CMLOCALES Has the locale ids associated with each language supported by Cognos 8
Causes
Zero-footprint web-client
Web-tier : one or more web-servers
Application tier : one or more application-servers
Data tier :
o o Connection to content store (JDBC)
o o Connection to query databases
o o Connection to Cubes
o o Connection to metric store (JDBC
applicationservers.p
df
bwas05_c8.4_installi
ng_cognos8.pdf
PRABIR SINGH
104
Joins in Oracle
INNER: The returned data must be present in both the joined tables.
The join returns data from one or both of the tables even if it
does not match data from the other table. Null is used for the
missing values.
OUTER:
The join includes all the data from the first table, whether or
not it matches data from the second. The join includes data from
the second table only if it matches data from the first table.
LEFT:
The join includes all the data from the second table, whether or
not it matches data from the first. The join includes data from
the first table only if it matches data from the second table.
RIGHT
The join includes all the data from each table, whether or not
Service Purpose
Agent service Runs agents. If the conditions for an agent are met when the agent runs,
the agent service asks the monitor service to run the tasks.
Annotation Enables the addition of commentary to reports via the IBM Cognos
service Dashboard. These comments persist across versions of the report.
PRABIR SINGH
105
Service Purpose
Batch report Manages background requests to run reports and provides output on behalf
service of the monitor service.
Content Enhances the overall system performance and Content Manager scalability
Manager cache by caching frequent query results in each dispatcher.
service
Data movement Manages the execution of data movement tasks in IBM Cognos BI. Data
service movement tasks, such as Builds and JobStreams, are created in Data
Manager Designer and published to IBM Cognos BI.
Delivery service Sends emails to an external SMTP server on behalf of other services, such
as the report service, job service, agent service, or data integration service
Event Creates, schedules, and manages event objects that represent reports,
management jobs, agents, content store maintenance, deployment imports and exports,
service and metrics
Graphics service Produces graphics on behalf of the Report service. Graphics can be
generated in 4 different formats: Raster, Vector, Microsoft® Excel XML or
PDF.
Human task Enables the creation and management of human tasks. A human task such
service as report approval can be assigned to individuals or groups on an ad hoc
basis or by any of the other services.
Index data Provides basic full-text functions for storage and retrieval of terms and
service indexed summary documents.
Index search Provides search and drill-through functions, including lists of aliases and
service examples.
PRABIR SINGH
106
Service Purpose
Job service Runs jobs by signaling the monitor service to run job steps in the
background. Steps include reports, other jobs, import, exports, and so on.
Log service Records log messages generated by the dispatcher and other services. The
log service can be configured to record log information in a file, a
database, a remote log server, Windows® Event Viewer, or a UNIX® system
log. The log information can then be analyzed by customers or by Cognos
Software Services, including:
security events
Metadata Provides support for data lineage information displayed in Cognos Viewer,
service Report Studio, Query Studio, and Analysis Studio. Lineage information
includes information such as data source and calculation expressions.
Metric Studio Provides the Metric Studio user interface for monitoring and entering
service performance information
Migration Manages the migration from IBM Cognos Series 7 to IBM Cognos BI.
service
Monitor service Manages the monitoring and execution of tasks that are scheduled,
submitted for execution at a later time, or run as a background task
PRABIR SINGH
107
Service Purpose
Presentation Transforms generic XML responses from another service into output
service format, such as HTML or PDF
Query service Manages Dynamic Query requests and returns the result to the requesting
batch or report service.
Report data Manages the transfer of report data between IBM Cognos BI and
service applications that consume the data, such as IBM Cognos BI for Microsoft
Office and IBM Cognos Mobile.
Report service Manages interactive requests to run reports and provides output for a user
in IBM Cognos Connection or a studio.
A metric, as Metric Studio uses the term, is a key performance indicator (KPI) related to time. In other
words you use Metric Studio to monitor KPIs between one period and the next. A scorecard shows
graphically whether the metric has improved, got worse or stayed the same. Metrics have both status
(whether the metric is within scope) and trend (performance relative to last period).
What ‘improved’ and ‘got worse’ actually mean is defined when the metric is set up. In other words, a
bigger number might mean performance has improved or slipped, depending on what it is measuring.
Metrics are grouped into types; all metrics of the same type have the same behavior, so this saves
time when defining the metric. For example, all revenue measures might have the same type.
With Metric Studio, performance can be displayed either as a list report or a line chart. Often a chart
makes it easier to spot trends.
Actions can be set up to improve performance of a metric. Projects track long-term business activities
associated with a scorecard.
PRABIR SINGH
108
Sometimes it is useful to attach a Cognos 8 report to a metric, to give you more detail about the
metric data and this feature is available.
At Ace star Solutions we design and build star-schema data warehouses following the popular Kimball
methodology. A data warehouse is essentially a database and is a combination of two sorts of
database tables, ‘fact’ tables and ‘dimension’ tables.
Fact tables – a ‘fact’ table records the measures that are included in the data warehouse, for example
quantity sold, revenue etc.
Dimension tables – these contain descriptive information. An example of a dimension table might be
called D_Products and contain a list of product codes and descriptions.
A Star Schema
A simple star schema is shown above. There is only one table join between each table, which speeds
up processing when using it for reports and analyses. Note that only the details of the actual sale are
held in the sales fact table F_Sales. Product details, customer details and the date are held in separate
tables.
Multi-layered design. The star schema warehouse is built in three layers, each of which is usually a
PRABIR SINGH
109
database. The staging layer holds the raw data as it comes in, for example a spreadsheet containing
product details would be stored in a table in the staging layer.
The enterprise layer is the place where things are added to the data, for example revenue might be
calculated by multiplying quantity sold and price.
Finally, in the presentation layer the dimension and fact tables the end users have access to are
created (see diagram above).
Data Marts A data warehouse usually has more than one fact table. Each fact table will then have its
own star schema (but they usually overlap) and each is called a data mart. So one or more data marts
go to make a single data warehouse. A large corporation may have only one data warehouse, but this
will include many data marts.
First we extract the data from its various data sources. These will usually be database tables from
various systems within an organisation, but are often supplemented by other files such as
spreadsheets and text files.
In the transformation process we have the opportunity to massage the data into what we want for the
data warehouse. This is where most of the action takes place. Apart from adding calculations and data
from various tables where necessary, this is where we check that the data is consistent. For example
dates on different systems in the organisation are often stored in different ways. These differences
must be resolved in the transformation process.
The load process creates the data warehouse. In a dimensional star schema data warehouse this
means loading the dimension and fact tables. Often the dimensions do not change much – for example
a price list might only change annually – so not all dimensions need to be loaded every day. Even
then, the dimensions can often be updated with changes and additions rather than being completely
rebuilt each time.
Fact tables – for example your daily sales – need to be updated more often, usually on a daily basis.
This involves checking that all records in the fact tables link correctly to the dimension tables, as this
is vital for the star schema to join together properly and have any meaning.
Monitoring the build. In most organisations the data warehouse build will need to be monitored to
ensure that the data has arrived at its destination and is correct. This monitoring can be done in a
number of ways (home-made scripts for example) but should involve some form of automation. A
good ETL package will provide tools for monitoring the load such as log files, a shcheduler and reject
files for rejected input records. A sophisticated ETL system will be able to send out email alerts when
things go wrong, and in some cases correct the problem and reinput the data.
PRABIR SINGH
110
is called a star schema because the entity-relationship diagram between dimensions and fact tables
resembles a star where one fact table is connected to multiple dimensions. The center of the star
schema consists of a large fact table and it points towards the dimension tables. The advantage of star
schema is slicing down performance increase and easy understanding of data.
Snowflake Schema: A snowflake schema is a term that describes a star schema structure normalized
through the use of outrigger tables. i.e dimension table hierarchies are broken into simpler tables.
in a star schema a dimension table will not have any parent table.
Whereas in a snow flake schema a dimension table will have one or more parent tables.
Hierarchies for the dimensions are stored in the dimensional table itself in star schema.
Whereas hierarchies are broken into separate tables in snow flake schema. These hierarchies helps
to drill down the data from topmost hierarchies to the lowermost hierarchies.
Installing IBM
Cognos 8 BI Server Components in Multiple Locations (Distributed Installations).doc
Use Cognos Configuration to set the application size appropriately, or alternatively edit the
appropriate startup batch files.
Small, Medium and Large refer to the amount of memory (heap size) allocated to the Java
process. For ReportNet there are two Java processes: (1) the Content Manager Service (CM); (2)
the Reportnet Dispatcher Service (BiBusTkServerMain).
PRABIR SINGH
111
2. Under Environment, find the ReportNet Service. Right-click the Cognos ReportNet entry and
select delete.
4. Type Cognos ReportNet as the configuration name, and change the Type to the desired
configuration of Small, Medium, or Large.
It is also possible to change the setting manually by modifying the startup.bat (Windows) or
startup.sh (UNIX) file to use the right configuration. Stop the Service before making manual
changes, and restart it once the changes have been made.
Remove the # from the configuration line in the Startup file that you would like, and ensure the
other configurations are not used by inserting a # at the beginning of the line. Save the file, and
restart the server by using the startup.bat or startup.sh script.
PRABIR SINGH