This guide is to be the primary resource that system administrators use to learn about the concepts and high-level steps for implementing, deploying, maintaining, tuning, and troubleshooting the MicroStrategy business intelligence system. It offers a full discussion of the concepts that a system administrator should consider before the system is made widely available to users in the enterprise.
For additional reference information about seldom-used or advanced topics such as VLDB properties, internationalization, and the Intelligence Server statistics data dictionaries, see the Supplemental Reference for System Administration.
The chapters provide the following information:
|•||Introduction to MicroStrategy System Administration|
This chapter provides an overview of the architecture and how the MicroStrategy system interacts with the various external components/systems. It describes how Intelligence Server connects to and uses the data warehouse. It also describes what Intelligence Server is, what happens when it is started and stopped, and what MicroStrategy metadata is and what purposes it serves, as well as what a MicroStrategy project is and what MicroStrategy objects are. It describes all aspects of connecting to databases including database instances, database connections, and what a MicroStrategy server definition is and what it controls. It also describes general job processing flows with the MicroStrategy system including report execution, object and element browsing, and HTML document execution.
|•||Setting Up User Security|
This chapter covers what users and groups are, what the different modes are for authentication and how to implement them, how to control access to data at both the application and database levels, and how to control access to the application functionality. The examples section shows how combinations of security features in both the MicroStrategy system and in the database management systems can be used together.
This chapter describes how to manage MicroStrategy Web and MicroStrategy Web Universal, what the Web-related privileges are for the product, how to use the Administrator page including how to set project defaults. It also describes additional security requirements or options you can use with MicroStrategy Web products, including using digital certificates or firewalls, secure sockets layers, and so on.
|•||Identifying Users: Authentication|
Authentication is the process through which the system identifies the user. This chapter describes the modes of authentication that MicroStrategy supports, and how to configure them so that they support your user community.
|•||Enabling Secure Communication|
This chapter describes the steps to enable secure, encrypted communications between MicroStrategy components using SSL.
|•||Managing Your Licenses|
This chapter covers making the system available to users. This includes some best practices are for deploying the system, and how to implement easy ways to install systems using SMS systems and silent installs; what License Manager is and how to use it; and setting up security in the MicroStrategy environment.
|•||Managing Your Projects|
In a MicroStrategy system, a project is the environment in which reporting is done. This chapter provides information on how to manage a project’s life cycle, how to duplicate a project, update or copy project objects, merge projects, compare and track projects, and manage schema objects.
|•||Monitoring System Usage|
This chapter explains how you can use the monitors available in the system to see the state of the system at any time (past or present). It describes how Enterprise Manager can help do this by monitoring statistics that can be logged.
|•||Tuning Your System for Best Performance|
This chapter provides information for you to find the balance that maximizes the use of your system’s capacity to provide the best performance possible for the required number of users.
|•||Clustering Multiple MicroStrategy Servers|
A clustered set of machines provides a related set of functionality or services to a common set of users. MicroStrategy recommends clustering Intelligence Servers in environments where access to the data warehouse is mission-critical and system performance is of utmost importance. This chapter describes how to cluster Intelligence Servers, how to manage clustered projects, and how to connect MicroStrategy Web to a cluster.
|•||Improving Report and Document Response Time: Caching|
This chapter explains how you can make the system efficient and remove load from Intelligence Server by using the caching and History List features. It describes how caches work in the system, where they are stored, what the matching requirements are for using a cache, how to create pre-calculated data using aggregate tables, how to administer caches including how to invalidate them. It also describes what the History List is, how it is used in both MicroStrategy Web and Developer, and how to administer it.
|•||Managing Intelligent Cubes|
You can return data from your data warehouse and save it to Intelligence Server memory, rather than directly displaying the results in a report. This data can then be shared as a single in-memory copy, among many different reports created by multiple users. The reports created from the shared sets of data are executed against the in-memory copy, also known as an Intelligent Cube. This chapter provides details to understand and to create Intelligent Cubes your users can access when the execute reports and documents.
|•||Scheduling Jobs and Administrative Tasks|
This chapter describes how you can automate certain MicroStrategy jobs and administrative tasks. Methods of automation include scheduling reports, documents, and administrative tasks, and using MicroStrategy Distribution Services to distribute reports and documents via email, file, and printer subscriptions.
|•||Administering MicroStrategy Web and Mobile|
This chapter provides a high-level overview for some of the administrative tasks that are unique to administering MicroStrategy Web, Web Universal, and Mobile Server.
|•||Combining Administrative Tasks with System Manager|
System Manager lets you define multiple configurations for your MicroStrategy environment, that can then be executed in a single workflow. This provides the ability to deploy the various configurations to as many systems as required. The deployment of these configurations can be done using a standard interface, an interactive command line process, or a completely silent configuration process.
|•||Automating Administrative Tasks with Command Manager|
Command Manager lets you automate various administrative and application development tasks by using text commands that can be saved as scripts. This chapter describes how to create and execute these scripts.
|•||Verifying Reports and Documents with Integrity Manager|
Integrity Manager is an automated comparison tool designed to streamline the testing of MicroStrategy reports and documents. It can verify that changes to the environment have not caused changes to the report results, and can also test the performance of an Intelligence Server. This chapter describes how to configure Integrity Manager and how to create and execute an integrity test, and provides best practices for using Integrity Manager.
|•||Maintaining Your MicroStrategy System with Health Center|
MicroStrategy Health Center can help you diagnose and fix problems in your MicroStrategy system. It detects known problems and provides an immediate solution to many of them. This chapter describes how to configure your Health Center network and how to schedule system checks for MicroStrategy components.
This chapter provides a high-level methodology for finding trouble spots in the system and fixing them. It describes how to use the Diagnostics and Performance Logging tool to help diagnose bottlenecks in the system, memory depletions, exceptions, or authentication problems.