Go to previous topic
Go to next topic
Last Post 2/4/2013 2:10 PM by  Jimmy Chiu
Finding drill around tables
 5 Replies
Author Messages
Ari
Senior Programmer/Analyst
CBJ
Veteran Member
(125 points)
Veteran Member
Posts:49


Send Message:

--
1/25/2013 8:32 PM
    In order to secure tables used in drill arounds, we have to search the .or files to find the associated tables; has any come up with an easier method to find the tables associated with a drill around?

    Greg Moeller
    Private
    Private
    Veteran Member
    (4141 points)
    Veteran Member
    Posts:1479


    Send Message:

    --
    1/25/2013 8:52 PM
    What I've done is run a Fiddler session and then do the drill... the captured Fiddler data will include the table name(s) that you need to secure, or unsecure.
    Greg Moeller
    Private
    Private
    Veteran Member
    (4141 points)
    Veteran Member
    Posts:1479


    Send Message:

    --
    1/25/2013 9:09 PM
    Look for a URL on the left of the Fiddler screen like /servlet/Router/Drill/Erp ...
    Click on that, then move to the right half of the Fiddler screen. Click on the Inspectors tab, and (I like to click on the 'Raw' tabs in both the upper and lower portions of the window) the fileName parameter will identify the table name.
    Ari
    Senior Programmer/Analyst
    CBJ
    Veteran Member
    (125 points)
    Veteran Member
    Posts:49


    Send Message:

    --
    1/25/2013 9:33 PM
    The URL dme lists the key name (ie. EMPSET1...) but not the table name.
    Greg Moeller
    Private
    Private
    Veteran Member
    (4141 points)
    Veteran Member
    Posts:1479


    Send Message:

    --
    1/28/2013 8:08 PM
    And using that information, you can determine the table name.
    1) select * from gen.filedef
    where prefix = 'EMP'; # Note: the first 3 char from your example above
    2) rngdbdump -ct gen filedef -f filename prefix -v prefix=EMP
    Jimmy Chiu
    System Analyst
    Federal Government
    Veteran Member
    (1880 points)
    Veteran Member
    Posts:640


    Send Message:

    --
    2/4/2013 2:10 PM
    Another way is to use DrillExplorer builtin feature in LSA.





    ---