Post-upgrade migration of security from one version of Hyperion to another can be challenging. Ideally, security is migrated as part of the upgrade as documented in the upgrade steps, however there are times between the initial upgrade and go-live that requires a second migration, with a large amount of security changing and parallel maintenance either not practical or simply neglected.
FDMEE’s Universal Data Adapter (UDA) allows you to pull records from an external table or view. The UDA can be utilized to connect to a source database’s table or view when a standard FDMEE adapter is not available. When defining the UDA as a Source Adapter, filters can be applied by configuring parameters on “Parameters” tab.
When working with a client reporting frequent slowdowns in copying of data between schemas, we asked the DBAs to investigate, as well as the UNIX team. Both teams reported that the individual database servers were performing fine, with plenty of resources available to them. However, after a number of conference calls, we overheard one of the team members say their HOST server was at or near 100% CPU usage and had been for some time. As the host was an Exadata 3 server, we had not anticipated we would be subject to shortages of system resources. Unfortunately, without visibility on the host server, we had to rely on reports from the teams maintaining the individual instances. Without us asking specifically for a screenshot of the host server’s performance statistics, we would not have been able to certify the issue was with the database server after all. As always, trust, but verify.
Oracle bundles an installer for WebLogic with their Oracle EPM suite of products, that ‘phones home’ to Oracle for more information. Many of us deal with clients who have firewalls that may block all attempts to communicate from the installation server to Oracle.com or other outside Internet addresses. In these cases, the installer for Oracle EPM informs us of the communication error and asks us to provide proxy information for the installer to communicate with Oracle.com. Refusal to grant the proxy information results in another nag screen after which we can move on with our installation.
When you create a new Essbase application, one task that needs to be performed is creating substitution variables. This is usually done one at a time, selecting the application, selecting the database, entering the variable name and the corresponding value. This task gets really tedious when there are so many to add.
If you’ve stumbled across this blog first, don’t forget to check out Parts I and II. The purpose of this series is to offer insight into the mapping process and identify reasons as to why a dimension’s mappings can grow to an abnormal size. Part III will provide details with regard to the causes of large volume mappings within a dimension, as well as efficient ways to deal with mappings that have gotten disproportional.
The most basic and vital use of FDMEE is its mapping functionality. Mapping is so integral to the application that without it users have no way of integrating or validating their data into HFM. This blog will serve as an introduction to a three-part series that covers what to consider when developing your mapping process.
I am just wrapping up my first month at CheckPoint and what a month it has been. As much as things have changed it is amazing how similar certain activities can be between my role as Sr. Director of Product Management for Data Integration and my role as Practice Leader of Data and Governance for CheckPoint. One of the best aspects of my job has always been the customer interaction, and that has not changed at CheckPoint. There is nothing better than knowing you have truly helped your customer; whether this is talking with a Data Architect on the best technology for big data streaming or advising a CIO on how to achieve the next level of value out of their data infrastructure. During these first four weeks I have visited with in-person several CheckPoint customers, many are repeat customers too. Imagine that! I am happy to report that many of the implementations were well beyond the initial phases of the implementation with no issues. Commitments are solid – no over promising and under delivering here.