Solved

Failed to Apply Usage Based Optimization for Aggregation Design

Posted on 2012-03-16
8
1,010 Views
Last Modified: 2016-02-15
When I try to use the Usage Based Optimization to apply Aggregation Design to my measure group, it shows me the following error message.

The connection string cannot be found. Open Microsoft SQL Server Management Studio and, in the Analysis Server Properties page, check the value of the Log\QueryLog\QueryLogConnectionString property.

I encountered this error like two weeks ago.  At that time I just reset the connection string and every things seem to be fine.  A week ago, I successfully applied the Usage Based Optimization for one of my cubes.  However when I tried to apply UBO for my other cubes today, I encountered the same issue again!  I believe no one has changed the property of the connection string.

Also if I query the Query Log table, I can see those latest queries made by the users.  I'm sure the queries are still logging into this table.

This is really strange.  Anyone else has encountered the same issue?  Thanks.
0
Comment
Question by:thomaszhwang
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 4
8 Comments
 
LVL 25

Assisted Solution

by:TempDBA
TempDBA earned 500 total points
ID: 37733452
Would you mind just reviewing your connectionstring while applying the aggregation design to the measure group. May be something fishy is going on there.
0
 

Author Comment

by:thomaszhwang
ID: 37733460
I checked already.  The Connection String to the Query Log table is somehow encrypted.  I'm sure no one did that.  It must be something else trigger the encryption.  Any idea?
0
 
LVL 25

Assisted Solution

by:TempDBA
TempDBA earned 500 total points
ID: 37733478
Nope. Generally it should be visible in non-encrypted form.
0
Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

 

Author Comment

by:thomaszhwang
ID: 37733481
I know, but somehow it's just encrypted...

I can reset it, but a few days later.  It gets encrypted again...
0
 
LVL 25

Accepted Solution

by:
TempDBA earned 500 total points
ID: 37733486
Are you by any chance using the "Encrypt=yes" property?
0
 

Author Comment

by:thomaszhwang
ID: 37733491
You mean in the connection string?

I don't even know we have that option.  I used the dialog to set the server name and database - that's it.
0
 

Author Closing Comment

by:thomaszhwang
ID: 37738922
It turned out to be a permission issue.  Thanks anyway.
0
 
LVL 25

Expert Comment

by:TempDBA
ID: 37739236
Thanks thomas for sharing the answer.
0

Featured Post

U.S. Department of Agriculture and Acronis Access

With the new era of mobile computing, smartphones and tablets, wireless communications and cloud services, the USDA sought to take advantage of a mobilized workforce and the blurring lines between personal and corporate computing resources.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Load balancing is the method of dividing the total amount of work performed by one computer between two or more computers. Its aim is to get more work done in the same amount of time, ensuring that all the users get served faster.
I have a large data set and a SSIS package. How can I load this file in multi threading?
Familiarize people with the process of retrieving data from SQL Server using an Access pass-thru query. Microsoft Access is a very powerful client/server development tool. One of the ways that you can retrieve data from a SQL Server is by using a pa…
Using examples as well as descriptions, and references to Books Online, show the documentation available for date manipulation functions and by using a select few of these functions, show how date based data can be manipulated with these functions.

705 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question