Download
whodunnit a hyperion murder mystery n.
Skip this Video
Loading SlideShow in 5 Seconds..
Whodunnit ? A Hyperion Murder Mystery PowerPoint Presentation
Download Presentation
Whodunnit ? A Hyperion Murder Mystery

Whodunnit ? A Hyperion Murder Mystery

178 Views Download Presentation
Download Presentation

Whodunnit ? A Hyperion Murder Mystery

- - - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript

  1. Whodunnit? A Hyperion Murder Mystery • Casey Ratliff, System Architect • Jon Harvey, EPM Practice Lead • HUGMN TechDay • 03/19/14

  2. eCapitalAdvisors Overview • Oracle/ Hyperion/ OBIEE • Strategic assessments & technology roadmaps • Project Managers with extensive implementation experience • Business consultants with planning, financial reporting & consolidation delivery experience • Certified Oracle Planning, Essbase, HFM, OBIEE Consultants • Customer enablement services (training, hosting, extended support and managed services) • Employee lead engagements with minimal contractor utilization • Board of Director Advisors to the MN Hyperion User Group

  3. Founded in 2001 – Profitable every year in business Performance management consulting firm Over 250 performance management customers eCapital Advisors employees: Dedicated to Enterprise Performance Management and Business Analytics, helping client better understand business drivers Proven record and high customer satisfaction Experience across a variety of industries and have worked with companies of all sizes eCapital Advisors Overview

  4. 2013 Inc. MagazineInc. 5000 award: #1558 2013 MSP Business Journal Fast50 award winner, #17

  5. eCapitalOracle BI & HyperionClient Sampling

  6. Agenda • Well, “agenda” ruins the fun of it… • Key points we’re going to cover • Who changed the system? • Who changed data? • Who changed the application objects? • New functionality in 11.1.2.3

  7. Why audit? • Why are systems audits important? • Mandated by data set • Prevention of malicious acts • Useful for troubleshooting • The perils of not auditing?

  8. Our story begins…

  9. Our story begins… • We know that our nightly batch completed successfully at 10PM • Batch runs metadata updates, redeployment and calc scripts

  10. Our first suspect… • Was it: • Who: Col. Mustard • Where: Server console • Weapon: The EPM Configurator

  11. Windows Event Viewer • Security log failures • System reboot • Backup conflicts • EPM Deployment Report • Architecture • Configurations • Changes to Registry

  12. Digging in • While the IT department continues to troubleshoot… • The system is up and running fine now, but our tie outs are hosed

  13. Who changed the data? • Data audit options available to us • SSAUDIT • Planning Data Audit • Let’s take a look at both…

  14. SSAUDIT • Essbase.cfg setting • Tracks Essbase writes only

  15. SSAUDIT • Generates 2 files • Generates an ALG and ATX file

  16. SSAUDIT • ALG File • History records from every update transaction • Includes user name, time stamp, and number of updated rows

  17. SSAUDIT • ATX File • Transaction records in a format that can be used as the input source for data load

  18. Planning Data Audit • 11.1.2.0, 11.1.2.1 (Administration→Application→Reports) • 11.1.2.2 (Tools→Reports)

  19. Planning Data Audit

  20. Planning Data Audit

  21. When we look into our audit table…

  22. Our next suspect • Who: Nick Chihak • Where: Planning App • Weapon: Data Form

  23. The Plot Thickens… Who would try to frame Nick???

  24. Shared Services Audit Reports • What information is available to us in Shared Services?

  25. Shared Services Audit Reports • The catch – not enabled by default

  26. Looking back, the fake ID only changed one YearTotal dollar amount, but our variances are much bigger. • Could calcs or other objects have been changed?

  27. Now what? • We know the batch completed successfully, like it always does • The nightly batch does a bunch of stuff, including: • Imports Metadata • Redeploys the application • Runs calc scripts • Runs report scripts • Let’s take a look at what information is available to us about these objects’ change histories…

  28. Were Objects Modified? (Planning)

  29. Were Objects Modified? (Planning)

  30. Were Objects Modified? (Calc Manager) • No history of changes, but has user ID and date

  31. Were Objects Modified? (Essbase) • No history, no user ID, only update date

  32. Where do we look next? • One of the first places we should have looked, EAS: • Half of the Entity dimension is missing!

  33. Were Objects Modified in EPMA? • We found our culprit!

  34. The Culprit • It was: • Who: Jim Farley • Where: Dimension Library • Weapon: Import Profile

  35. 11.1.2.3 • Fun exercise, but could have been a lot easier in 11.1.2.3 • New in Shared Services 11.1.2.3: • “Artifact Change Reports”

  36. Artifact Change Reports

  37. Artifact Change Reports

  38. Q&A