Skip to main content
Pentaho Documentation

Specify Data Connections for the BA Server

File:/grBaservStepAddDataConnections.png

The User Console is used to define the connection to where you store data. We support accessing data stored in these ways.

CSV Files

To work with .csv files, the only required information is the location of the files.

Use .csv files if you want to get started quickly, have used the Pentaho Trial Download, are evaluating or testing, or do not have the information or expertise to configure a database connection. There is nothing you need to do now to configure these connections. Please skip this topic and go to the next stop on the Guide Post graphic.

JDBC Database Connections

To connect to databases, install the driver for your database, as well as define the access protocol and settings now. You can choose from these access protocols.

Table 1. Database Access Protocol Decision Table
Explore Considerations Choose Options
Native (JDBC) JNDI
Summary Native (JDBC) connections are the easiest way to get going quickly. You specify the connection information in the User Console. The connections are controlled by the BA Server.

If the connection information changes, you change it in the User Console for each connection you have defined.

JNDI connections are maintained in the application server, offering more advanced configuration options. One typical use case is you may want to hide security credentials from administrators of the Pentaho system. You specify the connection information by editing the context.xml file and selecting JNDI as the access type in the User Console.

If the connection information changes, you change the context.xml file.

Expertise Knowledge of the JDBC driver and options for your RDBMS Knowledge of Tomcat or JBoss JNDI connection procedures and options
Time Approximately 10 minutes Approximately 30 minutes
Recommendation Use for the Pentaho Trial Download and evaluation. Use for production, when the work environment is distributed in a network, or if you want to hide security credentials from Pentaho administrators.