Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The data strategy governs the process of validating the vendor data, creating, enriching, and validating the golden copy security, and releasing the golden copy security on a field by field basis to the SECURITY database in the Eagle data warehouse.

When you create a data strategy, you select the options that control the types of reference data to release, the vendors to use, and the validations to apply for each gold copy composited security. You can define a series of data strategies for each reference data type, such as security, analytics, and so forth; however, you must not set up two data strategies that process the same security for the same reference data type. You can import Eagle default data strategies when you migrate security data strategies.


Each data strategy identifies the following:

  • Securities managed by the data strategy
  • Field groups and release levels in the data strategy
  • Gold copy sources to release
  • Source hierarchy rules for each field
  • Validation rules for each field
  • Enrichment rules for each field
  • Input values, such as default and override values

Create Data Strategies

You can use the Setup workspace in Reference Data Center to create a data strategy by specifying information about the data strategy, including the name, general description, securities to process, fields to composite, data sources to use, and the enrichments and validations to apply during the securities compositing process. You can also audit the historical changes to data strategies.


Define the Data Strategy

You can define a data strategy that governs a specific subset of securities, including source hierarchy rules and other information about compositing data for these securities.

...

  1. Select the Field Groups from the drop-down list.
    You see the field group details displayed in the space below.
  2. To require that a field group be Authorization Required, click the corresponding checkbox.
  3. Click Next.
    You see the Fields pagwpage.

Select the Fields

In the Fields page you can determine characteristics of the fields chosen in Field Group will display. Here you can indicate that a field is Needs Authorization or is to be Locked or HIdden from display. 

  1. Select the check box that corresponds to the field selection. 
  2. Click Next.
    You see the Sources page.

Define the Sources

In the Sources page you can select a pre-defined source hierarchy rule.

...

  1. Select the Validation Processing. Options include:
    –  Process using global validation rules only.
    –  Define specific validation rule
  2. If you selected to Define specific validation rules, then select Validation Rule from the drop-down list. 
  3. Click Save & Close.
    The data strategy has been added to the list of available data strategies in the workspace.

Apply Overrides

In the Override page you can apply field level overrides. 

  1. Select an option from the Override value drop-down list. Options include: Override Value and Default value.
  2. Click Save & Close to save your sections.

    Info
    Click Back to return to any of the previous pages where you can edit your selections or