Solved

Accessing MicroStrategy Intelligence Server via Web Services

Posted on 2010-09-23
3
1,437 Views
Last Modified: 2013-11-19
Hi All,

I need to extract the MicroStrategy metadata from the Intelligence Server by directly accessing the Intelligence Server, either through web services or some client Java APIs.

I found this package in the MicroStrategy SDK, com.microstrategy.webservices.Axis2, but not sure if it's exposed as a web service. Can someone tell me if these are exposed as web services and if yes, then how to deploy them.

Also MicroStrategy Web Services SDK exposes the following operations:
(RWDataService
projects
getSessionState
searchMetadata
logout
RWExecute
login
reportExecute
reportDataService
folderBrowse)
but they are not sufficient for me.

Any help is appreciated.

Thanks!
0
Comment
Question by:deeptisg
  • 2
3 Comments
 
LVL 40

Accepted Solution

by:
RQuadling earned 250 total points
ID: 33777486
http://www.microstrategy.com/Software/Products/Dev_Tools/SDK/ suggests this toolkit provides you with the services you need.

But you say this isn't enough. What do you need?

If the service doesn't provide the data, you are going to have to hack it in some way.

I'd recommend talking to Micro Strategy. You've not had any other replies.

Do you have a WSDL file already (you asked this question in the WSDL zone)?

If you do, I can build you a simple testing framework using PHP.
0
 

Author Closing Comment

by:deeptisg
ID: 33931338
Worked partially for me.
0
 
LVL 40

Expert Comment

by:RQuadling
ID: 33936215
I'm sorry I didn't get a full answer for you.

If you need any more help, please let us know.

If you have a route which is being partially successful, then maybe we can come up with a better scenario for you.

As you asked this question ins the WSDL zone, I'd be able to show you a working SOAP client in PHP using the WSDL file. Easily adaptable to any other language.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
retrieving files from old server once DNS has changed 10 71
HTTP POST URL 2 88
Coova-Chilli can't work with URL using HTTPS! 3 162
Question on web subscription for apps 3 92
To properly understand GitHub, let’s divide it into two words ‘Git’ and ‘Hub’. Git is basically a ‘Distribution Version Control’ (DVC) and ‘Source Code Management’ (SCM) system widely used by software programmers while Hub means the efficient centre…
SASS allows you to treat your CSS code in a more OOP way. Let's have a look on how you can structure your code in order for it to be easily maintained and reused.
Explain concepts important to validation of email addresses with regular expressions. Applies to most languages/tools that uses regular expressions. Consider email address RFCs: Look at HTML5 form input element (with type=email) regex pattern: T…
Video by: Mark
This lesson goes over how to construct ordered and unordered lists and how to create hyperlinks.

896 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

18 Experts available now in Live!

Get 1:1 Help Now