SQL Server Analysis Services

Documentation for Tabular Models

Deployment and Management of Tabular Models

This document outlines the key aspects of deploying and managing SQL Server Analysis Services (SSAS) tabular models. Effective deployment and ongoing management are crucial for ensuring the availability, performance, and security of your business intelligence solutions.

Deployment Strategies

There are several approaches to deploying tabular models, each with its own advantages:

Key Deployment Steps:

  1. Create or Import: Develop your model in Visual Studio or import an existing one.
  2. Configure Properties: Set database properties, compatibility levels, and other settings.
  3. Process Data: Ensure the model is populated with the latest data. This can be done manually, scheduled, or triggered during deployment.
  4. Deploy: Use the chosen method (e.g., Visual Studio deploy, XMLA script) to push the model to the SSAS server.
  5. Grant Permissions: Assign appropriate roles and permissions to users and groups.

Management Best Practices

Post-deployment, continuous management is essential. This includes:

Tools and Technologies

A variety of tools can assist in the deployment and management process:

Example: Deploying via XMLA Script

Here's a simplified example of an XMLA script to deploy a tabular model:

<Batch xmlns="http://schemas.microsoft.com/analysisservices/2003/engine">
    <Create xmlns="http://schemas.microsoft.com/analysisservices/2003/engine">
        <ObjectDefinition>
            <Database xmlns="http://schemas.microsoft.com/analysisservices/2003/engine">
                <Name>MyTabularModel</Name>
                <DataSource>...</DataSource>
                <Tables>...</Tables>
                <Relationships>...</Relationships>
            </Database>
        </ObjectDefinition>
    </Create>
</Batch>
Important: Always test deployment scripts in a non-production environment before applying them to live systems. Ensure proper version control for all deployment artifacts.

Security Considerations

Implementing security at the database and object level is critical. This includes:

For detailed information on specific deployment scenarios or advanced management techniques, please refer to the following resources: