Skip to main content

Pentaho+ documentation has moved!

The new product documentation portal is here. Check it out now at


Hitachi Vantara Lumada and Pentaho Documentation

Pentaho administration

Parent article

This guide covers post-installation and maintenance tasks for the Pentaho Server and related tools. These tasks include setting up data connections, importing and exporting content, creating clusters, and configuring logging and monitoring operations. You can perform these tasks in any order.

For this guide, we assume you have installed and configured the Pentaho Suite. We also assume you are an IT administrator who knows where data is stored, how to connect to it, details about the computing environment, and how to use the command line to issue commands for Microsoft Windows or Linux.

Administration tasks for Pentaho Business Analysis (BA) components are handled through the Pentaho User Console. Some administration tasks for Pentaho Data Integration (PDI) components are handled through the design tool, PDI client (Spoon). Other tasks are handled through the command line interface. All BA component administration tasks require you log on to the Pentaho User Console with the administrator user name and password.

Manage the Pentaho system

After your system is installed and configured, use the following topics to manage your Pentaho products:

Pentaho licenses

You can manage the licenses from the Pentaho User Console (PUC), Pentaho Data Integration (PDI client), or the command line interface.

Learn more

Pentaho Server

You can manage the Pentaho Server by changing ports and URLs, clustering servers, and maintaining various server options.

Learn more

Pentaho Repository

You can use the Pentaho Repository, which is an environment for collaborative analysis and ETL (Extract, Transform, and Load) development.

Learn more

Folder and report localization

You can localize the names and descriptions for folders and reports that appear in the User Console

Learn more

Secure the Pentaho system

Apply your security plan based on the security requirements of your system.

User security

You can choose from two different user security options: Pentaho Security or advanced security providers (such as LDAP, Single Sign-On, or Microsoft Active Directory).

Learn more

Big Data security

You can choose between two methods of implementing big data security: Kerberos authentication and secure impersonation.

Learn more

Optimize the Pentaho system

Performance monitoring

You can logging to monitor and review system performance.

Learn more

Performance tuning

You can use optimization tools to improve the speed and efficiency of the Pentaho products.

Learn more

Troubleshoot the Pentaho system

See our list of common problems and resolutions.

Learn more