DRM – Insufficient Rights Error

I thought today, we’d look at a simple error message that might crop during your implementations. I’ve been neglecting the blog for a month or so, and I need something simple to get me back in gear. So, here goes. Sometimes, when you run action scripts, you might run into the following error, “Insufficient rights……

Continue reading

Workflow Task Calculate Name and Calculate Parent features

DRM (Data Relationship Management) version 11.1.2.4.341 brings some new features to DRG, specifically to the workflow tasks and in this post we will talk about the Calculate Name and Calculate Parent features. (Hopefully, a Calculate Description option will be added in a future release) Before I start, I just want to mention that I had not personally used……

Continue reading

DRM Errata Close Version

Here’s a quick little post on some errata in the DRM documentation. I was recently looking at setting up a process to unload versions as part of my automation scripts. I was using regular batch utility execution, instead of the configuration file method (see here). According to the documentation, the way to do this is:……

Continue reading

Oracle DRM Application Not Starting (DRM-61003 and ORA-12514 errors)

A few weeks back I was looking to install Oracle Data Relationship Management (DRM) on a virtual machine for some testing. I fired up my trusty Windows 2008 server VM and went to work installing Oracle DRM using the installation instructions found on this very blog (written by the magnificent Vijay Kurian no less). The software……

Continue reading

Copy Planning Security to Essbase II

As we’ve seen in the last post, we have a list of users and their filter names as they exist in Planning. Continuing on, let’s take a look at what the documentation tells us about filters. It’s not evident at first glance, the importance of the section, “as FILTER-NAME”. If you dig one step deeper,……

Continue reading

Copy Planning Security to Essbase I

Today, I thought we’d look at a little proof of concept, in this part 1 of a 2-part series of posts. One of my co-authors and I were trying to figure out how to replicate security from a Planning application to an Essbase cube. Imagine the scenario, where we might have a planning application, for inputs……

Continue reading