Modeling Service Configuration Properties
Starting in MicroStrategy ONE Update 11, you can enable HTTP Strict Transport Security (HSTS).
Settings for the Modeling service can be changed by editing the application.conf, modelservice.conf and modelservice.ini files. All parameters are case-sensitive and must be entered correctly for changes to take effect.
The application.conf and modelservice.conf files can be found in:
Windows: <INSTALL_PATH>\MicroStrategy\ModelingService\admin
Linux: <INSTALL_PATH>/MicroStrategy/ModelingService/admin
Make your configuration changes to the configuration files under the admin folder. Do not change the files under the conf folder. All files under the conf folder are overwritten when you upgrade MicroStrategy.
The modelservice.ini can be found in:
Windows: <INSTALL_PATH>\MicroStrategy\ModelingService\bin
Linux: <INSTALL_PATH>/MicroStrategy/ModelingService/bin
The application.conf file includes the following properties:
Port
|
http.port |
The communication port for HTTP. Set to disabled if you want to disable the HTTP communication channel for the Modeling service.
Default: 9500
|
Library Server HSTS Configuration |
|
redirecthttpsfilter.enabled |
Starting in MicroStrategy ONE Update 11, this property enables HTTP Strict Transport Security (HSTS).
Default: false
|
Library Server HTTPS Configuration |
https.port |
The communication port number for HTTPS.
Default: 10443
|
play.server.https.keyStore.path |
The path to the keystore containing the private key and certificate.
Default: NONE
|
play.server.https.keyStore.type
|
The key store type.
Default: JKS
|
play.server.https.keyStore.password |
The password.
Default: NONE
|
The modelservice.conf file includes the following properties:
Intelligence Server Timeout Configuration |
modelservice.iserver.requestTimeout
|
Starting in MicroStrategy ONE (March 2024), you can set the timeout value of the request sent from the MicroStrategy Modeling service to the Intelligence server.
Default: 120000
|
Library Server Support Properties
|
modelservice.identity_token.secret_key |
To establish trusted communication between the Library server and Modeling service, the value should be the same as that of identityToken.secretKey in the Library server configuration file.
This trusted communication is required for configuring the connectivity between the Modeling service and the Library server.
|
Intelligence Server TLS/SSL Configuration
|
modelserver.iserver.tlsEnabled
|
Set to true if Intelligence server is TLS enabled but with a private Root CA certificate or a self-signed certificate. In this case, a trustStore file and its passphrase must be provided. For Intelligence server that is TLS enabled with a public Root CA certificate, set to false.
Default: false
|
modelserver.trustStore.path |
If Intelligence server is TLS enabled, but with a private Root CA certificate or a self-signed certificate, a trust store file is required.
Example: trustStore.path=/path/to/truststore.pfx
Default: NONE
|
modelserver.trustStore.passphrase |
The passphrase used in the construction of the Trust Store file.
Default: NONE
|
The modelservice.ini file includes the following properties:
Memory Allocation
|
MODELSERVICE_JAVA_MAX_MEMORY
|
The configuration of the maximum memory allocation pool for Modeling service.
OS Mem |
Default Value |
2G |
-Xmx500M |
8G |
-Xmx1G |
16G |
-Xmx1G |
32G |
-Xmx1G |
64G |
-Xmx2G |
128G |
-Xmx2G |
256G |
-Xmx3G |
512G |
-Xmx3G |
1024G |
-Xmx3G |
2048G |
-Xmx3G |
|
MODELSERVICE_JAVA_INITIAL_MEMORY |
The configuration of the initial memory allocation pool for Modeling service.
Default: -Xms500M
|