2. Explain the Architecture of OBIEE 11g and function of each components?
OBIEE Comprises Presentation Services,Oracle BI Server : The user constructs sql and passes it to the Analytic Engine and then the Oracle BI (Analytic Engine) describes the physical sql to the Data sources and recover the data back to the Engine and presents to the presentation Services .
3. How we can extract sql from OBIEE for reports?
There are many ways to extract the sql :
Change the request and click Advanced in that you get xml code and also the actual sql.
In the catalog Manager click Tools-Create Report . In the Create Report Window –> Click Request SQL and save the sql to the physical path in your PC.
Enable Log level to 2 in the OBIEE 11g Administration Tool from Manage-> Security and enable the log level to 2 by clicking properties for the user, then go to the NQ Query.log in BI_HOME/OracleBI/Server/Logs.You will find the SQL for that User. d. By clicking Administration->Manage sessions-> view sql.
4. How can you sort in Reports in OBIEE 11g?
Click on modify and then click on sort (order by icon) on the relevant column in the criteria pane.
5. How we can do different types of narrative Reports in OBIEE?
By clicking modify request and Narrative View and by giving @1 for the first column result and @2 for the 2nd column and so on and we can also give a heading for No Results by clicking the Narrative view.
6. How will you create Interactive Dashboards ?
By clicking on Administration and Manage dashboards and by adding column selector we can create interactive Dashboard.
7. What is write-back in obiee ?
We can give a column as updatable and then view the reports,this option is called write back option.
9. How OBIEE Developer can create report from two subject areas?
From the Criteria Pane of the Report Created from First Subject Area come to the bottom of the page and click combine request. By this we can create report from two subject areas.
10. How we can Port changes for dashboards, reports, rpd from development to production?
For the RPD we can use the Merge option in Admin Tool and for dashboards and reports we can use Content Accelerator Framework.
11. What are the different types of variables in OBIEE 11g? explain
There are two types of variables in OBIEE 11g.
Repository variable : This variable is used for the whole repository.
Session variable : session variable are of two types: system variable and non system variable. System variable uses NQ_SESSION. Examples of non system variables are user defined filters.
12. How will you enable or disable caching in the system level and table level?
In the NQSConfig.ini file use ENABLE under CACHE Section for System Level For tables, if we want to enable the cache at table level , open the repository in offline mode This should be different from the current repository and click enable or disable the cache .
13. How will you go about adding additional column to the repository in the presentation layer?
Check if the table is already existing if so add in physical layer ,then click on BMM and then Presentation layer, then reload server metadata ,then it will be visible to all users.
14. How will effect the changes for a report, if for certain users only the column heading in the report should be changed?
Using session variables for that user.
15. What is a table alias in OBIEE 11g? Where and how will you create it?
Table alias is used for creating self joins. Table alias can be created by right clicking the table in the physical layer then click alias.
16. Have you created Hierarchy in OBIEE 11g. if so where and how?
Yes, we can create hierarchy in BMM Layer of OBIEE in dimensions for the dimension tables. This can be done by right clicking the dimension table and click create dimension and then we can manually define the hierarchy and its levels.
17. What is Level Based Metrics? How we can create it?
Level-base metrics means, having a measure held at a certain level of the dimension. Examples Monthly Total Sales or Quarterly Sales To create a level based measure, create a new logical column based on the original measure .Drag and drop the new logical column to the appropriate level in the Dimension hierarchy.
18. What are the different layers of OBIEE 11g Repository?
19. What is Authentication? How many types of authentication.
Authentication is the procedure by which a system confirms, through the use of a user
Operaing system authentication.
External table authentication.
20. What is a bridge table ?
If we want to connect two tables where there is no relationship we can use a third bridge table for connecting them which will have same columns in both tables.
21. How Time based triggered report can be generated?
Using Scheduler – ibots we can generate time based triggered report.
22. What is ibot?
Ibot is an arrangement agent, used to arrange reports to be sent across many devices such as email, pager, mobile, other devices etc
23. What are different types of joins that are possible in OBIEE RPD?
Complex Join – it uses multiple conditions, such as A.ROW_WID = B.ROW_WID AND / OR A.A_WID = B.B_WID
24. How we can have two different columns from two different tables or subject areas?
Using confirmed dimensions,we can fetch many metrics across various facts, but the join should be of same level of data detail.
25. How can we use saved filters and where we will save the filters?
Shared Folders – XYZ Folder – It have two folders a. Prompts b. Reports
26. Have you worked in dashboard? when we run a dashboard? how will we stop the dashboard report run automatically?
By clicking on the cancel button, we can stop a exact report placed on the dashboard.
27. Define surrogate key.
A surrogate key is an artificially generated key, usually a number. A surrogate key, in the level aggregate table, simplifies this join and removes unnecessary columns from the fact table, resulting in a smaller-sized fact table.
28. Define repository in terms of Siebel Analytics.
Repository stores the Meta data information. Siebel repository is a file system ,extension of the repository file. rpd. META DATA REPOSITORY.
With Siebel Analytics Server, all the rules needed for security, data modeling, aggregate navigation, caching, and connectivity is stored in metadata repositories.
Every metadata repository can store many business models. Siebel Analytics Server can access many repositories.
29. Explain the end to end life cycle of Siebel Analytics?
Siebel Analytics life cycle
Collect Business Requirements.
Recognize source systems.
Plan ETL to load to a DW if source data doesn’t exist.
Build a repository.
Build dashboard or use answers for reporting.
Based on performance, decide an aggregations and/or caching mechanism.
Testing and QA.
30. How does Siebel Architecture works? Explain the three layers.
There are five parts of Siebel Architecture.
Siebel analytics Web Server data sorces.
Siebel analytics scheduler.
Siebel analytics server
Metadata represents the analytical Model which is created using the siebel Analytics Administration tool. Repository divided into three layer
Physical – Signifies the data Sources.
Business – copies the Data sources into Facts And Dimension.
Presentation – Specifies the users view of the model ; rendered in Siebel answer.
31. If we have 3 facts and 4 dimension and we need to join would you recommend joining fact with fact? If no than what is the option?
In the BMM layer,we can create one logical table (fact) and add the 3 fact table as logical table source.
32. What is connection pool and how many connection pools did we have in our last project?
connection pool is needed for each and every physical database.
It contains material about the connection to the database, not the database itself.
We can use either shared user accounts or pass-through accounts -Use: USER and PASSWORD for pass through .
We can have many connection pools for each group to avoid waiting
33. Define JDK and why do we need it?
Java Development Kit (JDK), is a software package that contains the minimal set of tools needed to write, compile, debug, and run Java applets.
34. Oracle doesn’t recommend Opaque Views because of performance considerations, so why/when do we use them?
An opaque view is a physical layer table that contain select statement. An opaque view should be used only if there is no other option.
35. Can we migrate the presentation layer to a different server.
No we cant migrate the presentation layer to a different server rather we have to migrate the whole web & rpd files
36. How we can identify the dimension tables and how we can decide them during the Business/Data modeling?
Dimension tables contain descriptions about data analysts which is used as query in the database. Every table contains a primary key that contains one or more columns; each row in a table is uniquely identified by its primary-key value or values
37. Why do we have multiple LTS in BMM layer?What is the purpose?
To improve the performance and query response time we have multiple LTS in BMM.
38. What is the full form of rpd?
There is no full form for rpd as such, it is just a repository file which is known as Rapidfile Database.
39. How we can disable cache for only 2 particular tables?
We can disable cache in the physical layer, by right clicking on the table there we can have the option which define cacheable
40. How we can split a table in the rpd given the condition. ( the condition given was Broker and customer in the same table) Split Broker and customer.
We have to make a dubbed table in the physical layer.
42. Can we have multiple data sources in Siebel Analytics?
Yes, we can have multiple data sources in Siebel Analytics.
43. How we can deal with case statement and expressions in siebel analytics?
By using expression builder we can create case statement when…then.. end .
44. What do you know about Initialization Blocks?
Init blocks are used for instantiating a session when a user logs in.
To make dynamic variable we have to create IB to write sql statement.
45. Explain query repository tool?
It is utility of OBIEE /Seibel Admin tool.
allows us to examine the repository metadata tool.
It Examine relationship between metadata objects like which column in the presentation layer maps to which table in physical layer.
for example : search for objects based on name,type.
46. How can you bypass siebel analytics server security ?
It can by-passed by setting authententication type in NQSCONFIG file in the security section as:authentication_type=bypass_nqs.instanceconfig.xml and nqsconfig.ini are the 2 places
47. Where we can add new groups and set permissions? Explain what is R?
We can add groups by going to manage>security>add new groups> We can give permissions to a group for query limitation and filter conditions.
48. What are the things we can do in the BMM layer?
We can do Aggrigation navigation ,level base matrics, time series wizard, create new logical column, comlex join.
49. Where are passwords for userid?
Passwords for userid are in siebel analytics server repository .
50. Define pipeline.
Pipelines are the stages in a particular contract, valuation, economics etc.
51. What are the Key Configuration Files in OBIEE?
The key configuration files in OBIEE 11g are NQSConfig.ini, NQSCluster.ini, odbc.ini, instanceconfig.xml
52. Give a brief introduction of OBIEE?
Oracle BI Enterprise Edition (sometimes simply referred to as Oracle Business Intelligence) provides a full range of business intelligence capabilities that allow you to :
Collect up-to-date data from your organization.
Present the data in easy-to-understand formats (such as tables and graphs).
Deliver data in a timely fashion to the employees in your organization
53. What Is the Oracle BI Presentation Catalog?
The Oracle BI Presentation Catalog stores the objects, such as analyses, dashboards, and KPIs, that you and other users create using Oracle BI EE. Users have their own personal folder (My Folders), where they can store the objects that they create. The objects in a personal folder can be accessed only by the user who created and saved the content into that folder. Users can add sub-folders to their personal folders to organize their content in the way that is the most logical to them.
You can also store objects in shared folders where other users or groups can access the objects. A combination of business logic security,catalog object security, and data level security determines who has the ability to view data and objects, edit objects, and delete objects from the catalog. Your administrator creates and maintains the catalog’s shared folder structure.
54. What is OBIEE 11G?
Oracle Business Intelligence Enterprise Edition (OBIEE) 11g is the most significant release of OBIEE since 2006.
55. Explain the main features of OBIEE 11G?
Oracle Business Intelligence is now more integrate with the Oracle Fusion Middleware software family. Oracle WebLogic Server replaces Oracle Application Server and Oracle Containers for Java (OC4J). Oracle Business Intelligence 11g Installer replaces the installer that was used in previous versions of Oracle Business Intelligence. It can perform software installation and configuration steps in the same process or separately in their own processes
This release add the following administration command-line utilities :
Oracle WebLogic Server scripting tool (WLST) for managing the Oracle WebLogic Server domain.
OPMN and the opmnctl commands for the Oracle Process Manager and Notification Server.
A database repository must be created before installation of the components with the Repository Creation Utility (RCU) tool.
Log centralization via the web log viewer.
In addition, Oracle Business Intelligence is now deployed in a clustered configuration by default. Because of this, the default ODBC DSN for the Oracle BI Server points to the Cluster Controller by default, rather than to the Oracle BI Server
56. Explain Oracle Business Intelligence Applications?
An Oracle BI application consists of pre-built, industry-specific Oracl e BI interactive dashboards and Oracle BI reports that are built using industry best practices and address key functional areas within an organization. Oracle BI applications are integrated with operational applications to provide business metrics in reports, in context with an organization’s business function and industry.
Oracle BI applications include Extract Transform Load (ETL) routines to extract, transform, and load data into the Oracle Business Analytics Warehouse.
Security in Oracle BI : OBIEE allows a high degree of control over access to elements in Oracle BI applications. The security mechanism comprises Business logic object security, Presentation Catalog object security and Data level security.
Drilling Down in Oracle BI : In OBIEE, you can drill down from a dashboard or report to an actual item in the database. For example, if you work in sales, you can drill down to the city level within a sales report, and observe that there is a large sale pending in Paris. If you are using an Oracle Siebel operational application, you can then drill down on the pending sale and go directly to that opportunity in the Oracle BI application.
57. Define repository in terms of OBIEE?
Repository stores the Meta data information.The extension of the repository file is “.rpd”.With OBIEE Server, all the rules needed for security,data modeling, aggregate navigation, caching, and connectivity is stored in metadata repositories. Each metadata repository can store multiple business models. OBIEE Server can access multiple repositories.
Repository is divided into three layer
Physical – Represents the data Sources.
Business – model the Data sources into Facts and Dimension and apply business logic.
Presentation – Specifies the user’s view of the data rendered in OBIEE answers client
58. What is the end to end life cycle of OBIEE?
OBIEE life cycle :
Gather Business Requirements.
Identify source systems.
Design ETL to load data to the Data Warehouse.
Build a repository.
Build dashboards and reports.
Define security (LDAP or External table).
Based on performance, decide on aggregations and/or caching mechanism.
Testing and QA.
59. What is the purpose of Alias Tables?
An Alias table is a physical table with the type of Alias. It is a reference to a physical table, and inherits all its column definitions and some properties from the physical table. A logical table source shows how the logical objects are mapped to the physical layer and can be mapped to physical tables, stored procedures and select statements. An alias table can be a reference to any of these logical table source types.
Alias Tables can be an important part of designing a physical layer. The following is a list of the main reasons to create an alias table
To reuse an existing table more than once in your physical layer (without having to import it several times)
To set up multiple alias tables, each with different keys, names, or joins
To help you design sophisticated star or snowflake structures in the business model layer. Alias tables are critical in the process of converting ER Schems to Dimensional Sachems.
60. What is Authentication? How many types of authentication do we have in OBIEE?
Authentication is the process by which a system verifies a user with the help of a user ID and password. It checks if user has the necessary permissions and authorizations to log in and access data.
There are 4 main types of Authentication in OBIEE :
Operating system authentication.
External table authentication.
61. What is aggregate navigation? How do you configure the Aggregate tables in OBIEE?
Aggregate tables store pre-computed results, which are measures that have been aggregated (typically summed) over a set of dimensional attributes. Using aggregate tables is a very popular technique for speeding up query response times in decision support systems.
Ex : If you observe that most of the queries are fired on aggregated values like yearly or monthly data rather that day level data then to speed up the report we can create an aggregate table containing month level and year level data and map it to the respective logical table and set the aggregation levels in the content tab of LTS.
62. Difference between a session and repo variable?
Session variables are similar to dynamic repository variables in that they obtain their values from initialization blocks. Unlike dynamic repository variables, however, the initialization of session variables is not scheduled. When a user begins a session, the Oracle BI Server creates new instances of session variables and initializes them.
A repository variable has a single value at any point in time. Repository variables can be used instead of literals or constants in Expression Builder in the Administration Tool. The Oracle BI Server substitutes the value of the repository variable for the variable itself in the metadata.
Unlike a repository variable, there are as many instances of a session variable as there are active sessions on the Oracle BI Server. Each instance of a session variable could be initialized to a different value.
63. What kind of sources can be connected to OBIee?
OBIEE security is defined by the use of a role-based access control model. It is defined in terms of roles that are aligned to different directory server groups and users. In this chapter, we will be discussing the components defined to compose a security policy.
One can define a Security structure with the following components
The directory Server User and Group managed by the Authentication provider.
The application roles managed by the Policy store provide Security policy with the following components: Presentation catalog, repository, policy store.
Security provider is called in order to get the security information. Following types of security providers are used by OBIEE −
Authentication provider to authenticate users.
Policy store provider is used to give privileges on all applications except for BI Presentation Services.
Credential store provider is used to store credentials used internally by the BI application.
Security policy in OBIEE is divided into the following components −
It defines the catalog objects and Oracle BI Presentation Services functionality.
Oracle BI Presentation Services Administration
It enables you to set privileges for users to access features and functions such as editing views and creating agents and prompts.
Presentation Catalog privileges access to presentation catalog objects defined in the Permission dialog.
Presentation Services administration does not have its own authentication system and it relies on the authentication system that it inherits from the Oracle BI Server. All users who sign in to Presentation Services are granted the Authenticated User role and any other roles that they were assigned in Fusion Middleware Control.
You can assign permissions in one of the following ways −
To application roles − Most recommended way of assigning permissions and privileges.
To individual users − This is difficult to manage where you can assign permissions and privileges to specific users.
To Catalog groups − It was used in previous releases for backward compatibility maintenance.
This defines which application roles and users have access to which items of metadata within the repository. The Oracle BI Administration Tool through the security manager is used and enables you to perform the following tasks −
Set permissions for business models, tables, columns, and subject areas.
Specify database access for each user.
Specify filters to limit the data accessible by users.
Set authentication options.
It defines BI Server, BI Publisher, and Real Time Decisions functionality that can be accessed by given users or users with given Application Roles.
Authentication and Authorization
Authenticator Provider in Oracle WebLogic Server domain is used for user authentication. This authentication provider accesses users and group information stored in the LDAP server in the Oracle Business Intelligence's Oracle WebLogic Server domain.
To create and manage users and groups in an LDAP server, Oracle WebLogic Server Administration Console is used. You can also choose to configure an authentication provider for an alternative directory. In this case, Oracle WebLogic Server Administration Console enables you to view the users and groups in your directory; however, you need to continue to use the appropriate tools to make any modifications to the directory.
Example − If you reconfigure Oracle Business Intelligence to use OID, you can view users and groups in Oracle WebLogic Server Administration Console but you must manage them in OID Console.
Once authentication is done, the next step in security is to ensure that the user can do and see what they are authorized to do. Authorization for Oracle Business Intelligence 11g is managed by a security policy in terms of Applications Roles.
Security is normally defined in terms of Application roles that are assigned to directory server users and groups. Example: the default Application roles are BIAdministrator, BIConsumer, and BIAuthor.
Application roles are defined as functional role assigned to a user, which gives that user the privileges required to perform that role. Example: Marketing Analyst Application role might grant a user access to view, edit and create reports on a company's marketing pipeline.
This communication between Application roles and directory server users and groups allows the administrator to define the Application roles and policies without creating additional users or groups in LDAP server. Application roles allows business intelligence system to be easily moved between development, test and production environments.
This doesn’t require any change in security policy and all that is required is to assign the Application roles to the users and groups available in the target environment.
The group named 'BIConsumers' contains user1, user2, and user3. Users in the group 'BIConsumers' are assigned the Application role 'BIConsumer', which enables the users to view reports.
The group named 'BIAuthors' contains user4 and user5. Users in the group 'BIAuthors' are assigned the Application role 'BIAuthor', which enables the users to create reports.
The group named 'BIAdministrators' contains user6 and user7, user 8. Users in the group 'BIAdministrators' are assigned the Application role 'BIAdministrator', which enables the users to manage repositories.
Oracle BI Enterprise Edition enables you to look at results of analyses in a meaningful way using its presentation capabilities. Different types of views can be added, such as graphs and pivot tables that allow drilling down to more detailed information and many more options like using filters, etc.
The results of the analysis is displayed using a table/Pivot table view and depends on the type of columns that the analysis contains −
Table view is used if the analysis contains only attribute columns/only measure columns or a combination of both.
Pivot table is the default view if the analysis contains at least one hierarchical column.
A title view displays the name of the saved analysis.
You can edit or delete an existing view, add another view to an analysis and can also combine views.
Types of Views
All view types except logical SQL view can be edited. Each view has its own editor in which you can perform edit task.
Each view editor contains a unique functionality for that view type but might also contain functionality that is the same across view types.
Edit a View
Open the analysis that contains the view to edit. Click the "Analysis editor: Results tab."
Click the Edit View button for the view. View editors is displayed. Now, using the editor for the view, make the required edits. Click done and then save the view.
Delete a View
You can delete a view from −
A compound layout − If you remove a view from a compound layout, it is only removed from the compound layout and not from the analysis.
An analysis − If you remove a view from an analysis, it removes the view from the analysis and also from any compound layout to which it had been added.
Remove a View
If you want to remove a view from −
A compound layout − In the view in the Compound Layout → click the Remove View from Compound Layout button.
An analysis − In the Views pane → select the view and then click the Remove View from Analysis toolbar button.