What are best methods for loading data into Hyperion Essbase

Posted on 2009-02-13
Last Modified: 2012-05-06
We have some Hyperion Essbase data loads (for the Hyperion Planning and Budgeting modules) that were written several years (and versions) ago, and I believe that MaxL script is the mechanism being used to actually load the data into Essbase. The developers who wrote the code are no longer with the company, and no knowledge transfer was done before they left, so our ability to support ETL into Hyperion is almost non-existant at this point. Now, several versions later (we are on Hyperion 9.3.x) there are some new needs to load data in Essbase. Can anyone suggest the best methods for loading into Essbase? Is MaxL script the only way to do it? Also, any suggestions for how to get up to speed on whatever tool you might suggest? Books, Oracle training, etc?
Question by:csbrownnine
    1 Comment
    LVL 5

    Accepted Solution

    The primary way data is loaded into Essbase is through what are called load rules.  If you login to the admin tool EAS and go to your application and expand the database you will see a node for "Rules Files".  The rules files are basically the mapping that tells Essbase which column in the text source file identifies a member from each dimension, remember you need to define every dimension in order to load data into Essbase.  Review the rule files and you will understand how the data is being loaded.  As far as the MaxL scripts; MaxL is an administrative automation language that allows you to script processes.  So in this case your MaxL script would tell Essbase to load a data file and identify the path to the source file and tell Essbase which load rule to use.
    All of this is well documented in the database administrators guide, which can be found at
    As far as books, you can pickup a copy of "Look Smarter Than You Are with Essbase System 9" by Ed Roske.

    Write Comment

    Please enter a first name

    Please enter a last name

    We will never share this with anyone.

    Featured Post

    6 Surprising Benefits of Threat Intelligence

    All sorts of threat intelligence is available on the web. Intelligence you can learn from, and use to anticipate and prepare for future attacks.

    Problem Statement In an SAP BI BO Integration project when a BO universe is built on a BEx query, there can be an issue of unit & formatted value objects not getting generated in a BO universe for some key figures. This results in an issue whereb…
    Hi, In my previous Article  ( discussed some basic understanding of Microstrategy that how we can get in Intro of Microstrategy (MSTR). Now it's tim…
    It is a freely distributed piece of software for such tasks as photo retouching, image composition and image authoring. It works on many operating systems, in many languages.
    Hi everyone! This is Experts Exchange customer support.  This quick video will show you how to change your primary email address.  If you have any questions, then please Write a Comment below!

    779 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    9 Experts available now in Live!

    Get 1:1 Help Now