Spotfire Server and Environment - Quick Start

Importing a library for analyzing action logs in Spotfire Analyst

The installation kit includes a library import file containing information links and a sample analysis file so that you can easily analyze your user action logs (only available for Microsoft SQL Server and Oracle databases).

Before you begin

  • You must have administrative credentials for Spotfire Server. If Spotfire Server is set up to authenticate with the Spotfire database using Windows Integrated Authentication, you must run commands as the same user that Spotfire Server authenticates as. Otherwise, the commands cannot authenticate with the database.
  • You must have enabled action logging, configured action logging to a database (MSSQL or Oracle), and configured the web service to specify which services to log.

Procedure

  1. In the installation kit that you downloaded from the TIBCO eDelivery site, browse to the directory containing the scripts to create a new database and schema.
    This directory is found under /scripts/{database_type}_install/actionlog.
  2. In the installation kit directory, find the logged_user_actions_{database_type}.part0.zip file.
  3. On Spotfire Server, open a command line as an administrator (or, if you are using Windows Integrated Authentication, as the Spotfire Server database user) and go to the <server installation dir>/tomcat/spotfire-bin directory.
  4. On the command line, type the command config import-library-content, specifying the options needed to import the .zip file.

    Example:

    config import-library-content --tool-password=<password> --file-path=/scripts/oracle_install/actionlog/logged_user_actions_ora.part0.zip --conflict-resolution-mode=KEEP_BOTH --user=jdoe
    See import-library-content for more information.
  5. Open Spotfire Analyst.
  6. From the menu, click Data > Information designer.
  7. In Information designer, click the Data Sources tab, locate the data source logged_user_actions_datasource, right-click on it and select Edit.
  8. Provide information to connect to the data source, and then save the changes.
    You must provide the Type, the Connection URL, the Username, and the Password to the database.

Results

The analysis is now ready to use, and will show you an overview of your system monitoring and user action log data from your logging database.