Creating the Burst Table in the Source Database
- A unique identifierTip: Some database systems do not require a unique identifier for each table.
- A recipient column
- The data item on which to burst
You can also include other columns that provide additional information. For example, if you plan to distribute reports by email, you can add a column for the email address of each recipient.
After you create the table, add the recipients who will receive the report. You can create a mixed recipients list that includes individual users, groups, roles, contacts, distribution lists, or email addresses. For example, a burst table may contain the following recipients.
Recipient example |
Recipient type |
---|---|
CAMID(":Canada") |
Group |
CAMID(":")/contact[@name='Silvano Allessori'] |
Contact |
CAMID(":")/distributionList[@name='European Partners'] |
Distribution list |
CAMID("LDAP_Local_ID :u:uid=gbelding,ou=people") |
Authentication provider user or group, where LDAP_Local_ID is the name of an LDAP namespace ID, and people is the name of an organizational unit |
c10@ibmcognos99.com |
Email address |
CAMID stands for Cognos® Access Manager ID, and it represents an internal search path to the recipients. Specify search paths when you want to save burst reports in a folder. You can obtain the search path in the IBM® Cognos Analytics portal by opening the Properties page for each recipient and clicking View the search path. Ensure that you use the proper syntax when adding recipients to the burst table.
In the case of NTLM namespaces, user IDs in the search path use alphanumeric or numeric characters that make them difficult to read. You can use the following alternate search path syntax:
directory/namespace[@name="Local NT"]//account[@userName="gbelding"]
where Local NT is the name of a namespace and gbelding is the name of a user. The double slash before the account element indicates that you are searching all accounts under the specified namespace.
For more information about users, groups, roles, contacts, and distribution lists, see the IBM Cognos Analytics Administration and Security Guide.