Pentaho Administration
This guide covers post-installation and maintenance tasks for the Pentaho Server and related tools. These tasks include setting up data connections, importing and exporting content, creating clusters, and configuring logging and monitoring operations. You can perform these tasks in any order.
For this guide, we assume you have installed and configured the Pentaho Suite. We also assume you are an IT administrator who knows where data is stored, how to connect to it, details about the computing environment, and how to use the command line to issue commands for Microsoft Windows or Linux.
Administration tasks for Pentaho Business Analysis (BA) components are handled through the Pentaho User Console. Some administration tasks for Pentaho Data Integration (DI) components are handled through the design tool, Spoon. Other tasks are handled through the command line interface. All BA component administration tasks require you log on to the Pentaho User Console with the administrator user name and password.
Manage the Pentaho System
After your system is installed and configured, use the following topics to manage your Pentaho products:
Pentaho Licenses
You can manage the licenses from the Pentaho User Console (PUC), Pentaho Data Integration (PDI client), or the command line interface.
Pentaho Server
You can manage the Pentaho Server by changing ports and URLs, clustering servers, and maintaining various server options.
Pentaho Repository
You can use the Pentaho Repository, which is an environment for collaborative analysis and ETL (Extract, Transform, and Load) development.
Folder and Report Localization
You can localize the names and descriptions for folders and reports that appear in the User Console.
Secure the Pentaho System
Apply your security plan based on the security requirements of your system.
User Security
You can choose from two different user security options: Pentaho Security or advanced security providers (such as LDAP, Single Sign-On, or Microsoft Active Directory).
Big Data Security
You can choose between two methods of implementing big data security: Kerberos authentication and secure impersonation.
Optimize the Pentaho System
Improve your system performance by monitoring logs and applying various optimization tools.
Performance Tuning
You can use optimization tools to improve the speed and efficiency of the Pentaho products.