Data Sources

The Data Sources page allows admins to manage all the various data sources and servers for querying and / or data modeling.

Apart from providing a convenient mechanism to add new data sources for end users (who don't need to handle all the complexities of setting up a data source), it also provides the main mechanism for governing who can see which data source (by role) and who will be able to write-back and build models into the data source where possible.

Adding a new Data Source Server

Click the "Add Server" button in the top right hand corner of the screen to launch the Add Server panel at the bottom of the page.

General Connection Details

  • Type: First select the type of data source to add from the drop down list.
  • Tenant: Next, select which tenant the data source will belong to. Each data source is specifically earmarked to each tenant in a multi-tenant role out, beyond the role settings that can be set for it.
  • Pulse: this determines if the data source will be routed through a Pulse server connection. If checked, select the relevant Pulse node to use. See below for more.
  • Write capable: this determines if the data server can be used for housing new databases. See below more.
  • Overlays: this determines if Pyramid can and should overlay metadata adjustments and / or security to the existing details from the data source. See below for more.

Specific Connection Details

Next, provide the connection details that will allow Pyramid to connect to the data source server. Many settings are common to all server types, including:

  • Display Name: this is the user-friendly name for the data source as it appears to end users in the application. Required.
  • Server Name or IP address: this is the host name or server address that is hosting the data application / service. Required.
  • Security: provide the security mechanism needed to access the data source. Required.
  • Optional Parameters: these are optional switches that can be added to the JDBC connection string.

More granular information by data source type can be found here.

Finalization

Once the server details have been added, click the TEST button in the top right hand corner of the dialog. If the test connection is successful, click the APPLY button to commit the new data source to the list.

The next phase is usually setting up security on the data source in the Data Source Manager ("DSM").

  • Click the Security button to jump to the security panel for the data source in the DSM to setup roles and access to the server (or its child objects)
  • Click the Databases button to jump to the database panel for the data source to see the listing of currently materialized data on the server.

Related Capabilities

Write Capable

Certain types of data sources are write-capable. This means that Pyramid can actually use them as a DESTINATION for data that has been processed and cleansed in the Data Modeling tool. By checking this box, you allow users (with Write access) to create new databases on the targeted machine using that data stack application / service.

Note that users need to be given explicit 'write' access to a server beyond making the data server 'write-able'.

Security and Metadata Overlay

Security and Metadata overlays in Pyramid are NOT automatically extended to MS SSAS (OLAP / Tabular)and SAP Hana. To extend this functionality, the overlay function must be enabled in the server setup page. This will provide overlaid controls for server, database and model security, as well as hierarchy and measure security and meta-data.

Note: Pyramid member level security is not provided for these engines - since these tools provide their own engines for member or row level security.

Pulse Remote Data Access

If Pulse Servers have been deployed, a remote datasource can be set to use Pulse server for remote connectivity. Click here for more.

Editing Data Source Servers

Clicking on the data source row in the top panel of the page will open up the server editor where all the above settings can be changed as needed. The same dialog will let admins edit the server's role access, as well as the role access to any databases currently hosted on the data application / service.

  • For more on data source role security click here.