Providing a run able solution at testing or production generally we go for deployment (moving the developed application from one environment to another environment)
In SSIS there are two deployments.
a) File system deployment:
In this case the packages deployed to a file system (i.e., to a specified drive and folder).
b) SQL server deployment:
Here packages deployed in SQL server integration services.
Note: In real time we always perform the second type of (b) deployment (i.e., SQL server deployment).
Solution explorer
↓
Project
↓
Rt click
↓
Properties
Build: BIN
Create deployment utility:
Allow configuration changes: Type
Create deployment utility: True
Deployment output path: BINdeployment.
Build menu → build SSIS project
Go to solution → bin → deployment → observe manifest file.
Go to manifest file → rt click → deploy → next → select file system deployment → specify folder to deploy → click next → next → finish.
Go to deployed folder and observe the package and configuration files deployed or not.
Execution:
Package → rt click → open with → SQL server 2008 package execution utility → run (execute).
Manifest file → rt click → deploy → next → Select SQL server deploymentàspecify
Server name: local host
Package path: maintenance plan
Click next → next → finish.
Observing:
Go to SSMS → integration services → stored → Packages → MSDB → maintenance plan
Frequently Asked MSBI Interview Questions & Answers
Maintenance plan → packages → rt click → run package → execute.
Note: The property allow configuration true, ”allows configuration changes after the deployment”.
Applying security:
Two levels—
Bids level → password protection.
SSMS → Role base security
It helps us to prevent from
BIDS level for having better security; along with password we take “protection level also”.
Here protection levels available are:
a) Don’t save sensitive
b) Encrypt sensitive with user key.
c) Encrypt sensitive with password.
d) Encrypt all with password.
e) Encrypt all with user key.
f) Server storage.
Generally package connection strings, user defined variables, enumerators…are considered as sensitive information.
→ Go to control flow → rt click → properties → security →
In package level password option assign.password → in protection level option select “Encrypt all with password” option.
“Build solution” and test in either of the ways
a)By opening the solution again.
b) By deploying the manifest file.
In the above two situations it asks password.
SSMS level security:
A user or group assigned to a role and every role will have responsibilities, so the users act according to the responsibilities.
Creating user/Group:
My computer → rt click → manager → local users and group → users → rt click → new user.
User name: VINAY → click ok.
Start menu → SSMS → Database engine → security → logins → rt click → new login.
Login name → search → vinay → ok.
Click ok.
System databases → MSDB → security → users → rt click → new user
User name: VINAY user
Login name: Rawanvinay
Check the required owned schemas and role members.
Eg: check DB-Data reader, DB-Backup operator..etc.
Sol: SSMS → integration services → connect → stored packages → MSDB → data collector → rt click on any package → click package roles → specify the roles in the reader and writer sections.
SSRS | Power BI |
SSAS | SQL Server |
SCCM | SQL Server DBA |
SharePoint | BizTalk Server |
Team Foundation Server | BizTalk Server Administrator |
Our work-support plans provide precise options as per your project tasks. Whether you are a newbie or an experienced professional seeking assistance in completing project tasks, we are here with the following plans to meet your custom needs:
Name | Dates | |
---|---|---|
MSBI Training | Nov 19 to Dec 04 | View Details |
MSBI Training | Nov 23 to Dec 08 | View Details |
MSBI Training | Nov 26 to Dec 11 | View Details |
MSBI Training | Nov 30 to Dec 15 | View Details |
As a content writer and storyteller, Raunaak Mitra regards himself to be a prodigy in writing. He firmly believes that language is borderless, and anyone can write as long as they have a strong narrative capability and the ability to emote feelings into words. Authors like F. Scott Fitzgerald and R. K. Narayan have influenced him to keep the writing as simple as possible for anyone to understand. Other than being well-versed about technological trends like AI, Machine Learning, AR, VR, Gaming, Microprocessors, Cloud Computing, Industry 4.0, literally any technological advancement (old or new), he also shares a knack to curate fiction on sci-fi, satire, and thriller genres.