Configuring Responder/Smart Grid
9.2 Upgrade Scripts - SQLServer

Version: 10.1

Resource Center Home

The following implementation scripts must be run on your Responder SQLServer database to add the correct tables, views, and indices to upgrade Responder to version 9.2. When upgrading Responder execute ONLY the Upgrade script(s) that fall between your previous release and the new release to which you are upgrading. Do NOT execute any Implementation Scripts.

Responder requires two databases: Responder and Archive. Some scripts are run on the Responder database and some on the Archive database. In the list below, the database on which the script should be executed is in parentheses.

  1. Open the SQL Server Query Analyzer window, connecting to the Responder database as the schema owner (e.g., RESPONDER).
  2. Execute the 920_01_RxTables_mssql.sql script. This script creates the database tables required by Responder.
  3. The 920_02_ArcJoinViews_mssql.sql script creates the views that are used to display Responder data in ArcMap. Execute 920_02_ArcJoinViews_mssql.sql. Even if you executed this script as part of the initial implementation, execute it again.
    Before executing this script, you will need to modify the feature class names within it to match those in your geodatabase. Open the script and ensure that the feature class names in the script match the corresponding feature class names in your geodatabase. If you have done this for a previous release, you may use the prior script and copy/paste the new views into it. This would prevent the need to re-update feature class names for all views.
  4. Open the SQL Server Query Analyzer window, connecting to the Archive database as the schema owner (e.g., ARCHIVE).
  5. Execute the 920_03_ArchiveTables_mssql.sql script. This script creates the database tables required by Responder Archive Explorer.
  6. Open 920_04_GenerateGrants_mssql.sql in a text editor (e.g., Notepad). This script generates a grant script that must also be run on both the Responder and Archive databases. This script ensures permissions are assigned to tables created by the RxTables and ArchiveTables scripts run in previous steps. Before executing, you must determine the roles and permissions you wish to assign them. You may assign permissions to several different roles. Look for the following lines of code in the script:
    -- rx_editor role can edit data in responder or archive schema
    select 'grant insert, update, delete, select on ' 
    + table_name + ' to rx_editor ;' 
    from information_schema.tables where table_type = 'base table' and table_schema = 'responder'
    go
    select 'grant select on ' 
    + table_name + ' to rx_editor ;' 
    from information_schema.tables where table_type = 'view' and table_schema = 'responder'
    go
    
    -- rx_viewer role can view data in responder schema
    select 'grant select on ' 
    + table_name + ' to rx_viewer ;' 
    from information_schema.tables where table_type = 'base table' and table_schema = 'responder'
    go
    select 'grant select on ' 
    + table_name + ' to rx_viewer ;' 
    from information_schema.tables where table_type = 'view' and table_schema = 'responder'
    go
    
    The table_schema = 'responder' portion above refers to the database owner (Responder).

    The first four lines assign permissions to a role for tables. The second set of four lines assign permissions to a role for views (views can only be assigned the Select permission). The last eight lines perform the same tasks as the first half, but for views rather than tables. You will need a set of lines for each role to which you wish to assign permissions to tables and views. The next few steps describe how to perform the modifications you may wish to make for each role.

    You may execute the same script for the Responder database and Archive database. The script MUST be executed on both databases.
  7. The "grant insert, update, delete, select" portion determines which permissions are to be assigned. Modify these permissions as necessary.
  8. Replace "rx_editor" with the name of the role to assign the permissions. There are two possible roles: rx_editor and rx_viewer.
  9. When you've finished adding statements for roles, close and save the file.
  10. Open 920_04_GenerateGrants_mssql.sql in SQL Server Query Analyzer.
  11. Right-click in the top grid (with the query) and select Results in Text.
  12. Execute 920_04_GenerateGrants_mssql.sql. Remember, this script only generates a script that sets permissions. Below is an example of the resulting script:
    grant insert, update, delete, select on RX_TAG_GROUND_STEPS_HISTORY to rx_editor ;
    grant insert, update, delete, select on RX_TAGS_AND_GROUNDS to rx_editor ;
    grant insert, update, delete, select on RX_TAGS_AND_GROUNDS_HISTORY to rx_editor ;
    grant insert, update, delete, select on RX_TRUCKS to rx_editor ;
    grant insert, update, delete, select on RX_TRUCKS_HISTORY to rx_editor ;
    grant insert, update, delete, select on RX_USERS to rx_editor ;
    
    (41 row(s) affected)
    
                                                                                                                                                                    
    --------------------------------------------------------------------------------------- 
    grant select on Current_Outages to rx_editor ;
    grant select on RX_CREW_ASSIGNMENT_COUNT_VIEW to rx_editor ;
    grant select on RX_CREW_INCDEV_DPD_VIEW to rx_editor ;
    grant select on RX_CREW_INCDEV_FUS_VIEW to rx_editor ;
    
  13. Remove the highlighted portions above and any extra empty returns. Copy the script and paste it into a new query. Copy only the "grant..." lines.
  14. Execute the copied query to assign permissions to roles. The permissions assigned apply to all Responder tables and views.

 


Send Comment to documentation@schneider-electric.com