Understand the Reference Data Center Pricing Workflow

RDC Prices allows you to validate and composite security pricing data from external vendors and internal sources, creating one or more "Gold Copies" that downstream systems can leverage. At a high-level, a traditional pricing workflow consists of the below steps:

  1. Demand prices

  2. Load prices

  3. Validate prices

  4. Composite Gold Copy prices

A more detailed description of each step in the workflow follows.

Create Demand

The first step in a pricing workflow is to identify the securities for which prices are required. During the create demand phase, the data strategy criteria are evaluated to determine which security prices to request. Criteria can consist of security criteria and holding criteria, or just security criteria. For each security evaluated, a shell record is created in the composite SECURITYDBO.PRICE table for the security, composite field, and composite source. A record is also created in the price vendor table for each security, price type, exchange, and vendor source defined in the vendor source rule for the data strategy.

When submitting a Price Data Strategy for the Demand phase, it inserts records into the RULESDBO.PRICE_RULE_SECURITIES and RULESDBO.PRICE_STATUS tables. The records from the RULESDBO.PRICE_STATUS table are shown in the Vendor Prices Summary Screen view. The records from the RULESDBO.PRICE_RULE_SECURITIES table are shown in the Gold Copy Prices Summary Screen view.

The PRICE_STATUS table contains information on the price validation status for all securities. After creating demand, records are inserted into this table with a status of '0'. A list of all values, along with their corresponding descriptions is provided below:

Value

Description

Value

Description

0

Demand Created

6

Securities Requested

5

Price is loaded (record not validated)

2, 3, 4, and 7

After running validation

2

Pass With Warnings

3

Hold

4

Pass

7

Skip

Vendor Request

Once the list of securities is determined, the security data is converted into a vendor required format, and a requestor file is created. These requestor files include security details such as the Primary Asset ID, Base Currency, and Exchange. They are then typically sent out to the respective vendors at a scheduled time. After requesting files from a vendor, the final validation status is modified to ‘6-Securities Requested’ in the PRICE_STATUS table.

Vendor Response

After vendors receive the requestor files, they send back a price response file. A basic vendor file validation is done to make sure that the correct data was received. This initial basic validation is only related to checking that the data file is valid. These checks oftentimes include checking for an empty file, junk file, or number of records in a file.

Load Prices

The vendor files are then loaded via a client’s preferred ETL methodology, such as an EagleML stream. These typically include business logic, such as a current date check. The ETL process then passes the information to the relevant fields in the panels, which receive the values, and load them to the Eagle tables. The panels typically include additional business checks.

Prices are then loaded to both the SECURITYDBO.PRICE_EXCHANGE and RULESDBO.PRICE_STATUS tables. The PRICE_EXCHANGE table is an intermediary table, referred to as such because these prices are not final Gold Copy prices that would be used for accounting/valuation and the prices by various types across multiple vendors reside here. After files are loaded from the vendor, the final validation status is modified to ‘5-Price Received not validated’ in the PRICE_STATUS table.

Prices only load to the PRICE_STATUS table if demand had been generated

Within EagleML, there is a flag required to route to the RDC process defined as useRdcPricing which must be set to Y on the record or a global value W_USE_RDC_PRICING that may be set as part of the system configuration. Global parameters should be specified in the /eagle_ml-2-0_custom_cm/w_config_custom.inc.

Validate Prices

In this stage, the prices that were received from various vendors are then checked against pre-determined rules contained in the Price Data Strategies. These rules are set to catch any discrepancies, or large price movements. When a Price Data Strategy is submitted for the validation phase, validation test results post to the RULESDBO.PRICE_VALIDATION_STATUS_DETAIL table.

Based on Data Strategy release logic and the results of the individual test, the PRICE_STATUS.FINAL_VALIDATION value updates. This result determines whether the price record has a proper value to composite, if it is the highest record in the hierarchy. The system value for this column joins to the RULESDBO.PRICE_EDIT table to display the description such as Released to determine whether it should be composited.

See

Review Exceptions

Once prices have been loaded, analysts typically review the exceptions, and decide to override data, or release exceptions. Users can review data, approve validation edits, and make any necessary price changes. Pending User Entitlements, when applying overrides, Comments and a Reason for the Override may be required as well as the ability to add attachments.

Hierarchy Determination

At this point in the process, prices from various vendors have been loaded for each security. Now vendor hierarchy rules are run to determine final prices for a security and Gold Copies are created. The Gold Copy prices are loaded to the PRICE table.

Different funds can have different rules in terms of vendors. As a result, there can be multiple Gold Copies per security and there may be multiple Data Strategies. For example, both Fund A and Fund B hold Apple stock, but Fund A wants to use Bloomberg prices, and Fund B wants to use IDC prices. As a result, the PRICE table stores both the Bloomberg and IDC prices.

Composite Gold Copy Prices

The final phase is the Composite/Enrichment phase.  Post the validation phase, a composite of the data strategies needs to be executed to produce the best of breed price.  The composite phase identifies the highest price record in the data strategy’s source rule in a validation status allowed to composite for each security.  During this phase, enrichments are also applied to the relevant records.  When a Price Data Strategy is submitted for the Composite Price phase, the RULESDBO.PRICE_RULE_SECURITIES, RULESDBO.PRICE_WIP, and SECURITYDBO.PRICE tables are updated with successfully composited prices. If setup in the source rule and defined within the hierarchy, if no Vendor Price is Released for validation, a security may be Priced at Cost. Complete records flow downstream once this phase is complete.