19 Manage Essbase Using the MaxL Client
MaxL is a multi-dimensional database access language for Essbase.
To run MaxL scripts or statements, you must use the MaxL Client to issue the statements over HTTP or HTTPS.
Prerequisites to Set Up the MaxL Client
Complete these tasks before you download and use the MaxL Client. To execute MaxL scripts or statements, you must be a power user or administrator.
Download and Use the MaxL Client
The Essbase MaxL Client enables you to use MaxL over HTTP or HTTPS. MaxL is an administrative, language-based interface for managing cubes and artifacts. Be sure you are using the latest client version provided in the Console, as older, previously downloaded versions may not work correctly.
To run MaxL statements, you must be a power user or an administrator. Before you download the MaxL Client, see Prerequisites to Set Up the MaxL Client.
If you’re a federated SSO user in Oracle Identity Cloud Service, logging in using MaxL or CLI is not supported. Federated SSO login requires a browser window. Create a native Identity Cloud Service user, and use that instead to log in using MaxL or CLI.
-
In the Essbase web interface, click Console.
-
In the Console, go to MaxL Clients.
-
Click Download next to the MaxL Client that is appropriate for your platform.
-
Save the compressed
EssbaseMaxl
file to your local drive. -
Extract the contents of the compressed file to a folder.
-
If you’re using a proxy, you must set the correct proxy in the MaxL execution script,
startMAXL.bat
orstartMAXL.sh
. The following example, applicable for editingstartMAXL.sh
for UNIX, tells MaxL to use the designated proxy (proxy.example.com), but to bypass using a proxy for the specific destinations listed in the exception list (127.0.0.1, localhost, and something.example.com).export https_proxy=http://proxy.example.com export no_proxy=127.0.0.1,localhost,something.example.com
For Windows,
startMAXL.bat
can be edited similarly but with different syntax.set proxy proxy-server="https://proxy.example.com" bypass-list="127.0.0.1;localhost;*.example.com"
-
If you're using Essbase deployed on Oracle Cloud Infrastructure and are using a self signed certificate, you must disable peer verification in the MaxL execution script. Caution: this solution should be only temporary, until you can obtain a trusted CA certificate. Here is an example using bash (for
startMAXL.sh
):export API_DISABLE_PEER_VERIFICATION=1
-
Run the
startMAXL
batch or shell script. A command prompt opens, the environment setup completes, and the MaxL Client starts up. -
Log in by providing your credentials and the Essbase URL in the MaxL login statement.
In the following example, the user logging in,
admin1@example.com
is an Identity Cloud Service administrator who was set as the initial Essbase administrator during Essbase stack deployment on Oracle Cloud Infrastructure. As the password is not entered in this example, the administrator will be prompted to provide it next. The URL is the essbase_url from the job outputs resulting from the stack deployment.login admin1@example.com on "https://192.0.2.1/essbase";
Any Identity Cloud Service user provisioned to work with Essbase can log in to MaxL, as long as they are provisioned as a power user or administrator.
-
Execute an interactive MaxL statement.
For example:
display database all;
To learn more about MaxL, see MaxL Statement Reference.