10g:
D:\OracleBI\server\Bin\nQLogViewer.exe -u ppice.chen -f D:\OracleBI\server\Log\NQQuery.log -o D:\querylog.log
11g
Use the Oracle Business Intelligence Log Viewer utility (or a text editor) to view thequery log. Each entry in the query log is tagged with the name of the user who issuedthe query, the session ID of the session in which the query was initiated, and therequest ID of the individual query.
To run the Log Viewer utility (which is located on Windows in \MW_HOME\ORACLE_HOME\bifoundation\server\bin\nqlogviewer.exe), open acommand prompt, and enter nqlogviewerwith any combination of its arguments.The syntax is as follows:
nqlogviewer [-u user_name] [-flog_input_filename][-ooutput_result_filename]
[-s session_ID] [-rrequest_ID]
where:
-
user_name is the name of a user in the Oracle Business Intelligence repository.This parameter limits the scope to entries for a particular user. If not specified, allusers for whom query logging is enabled are displayed.
-
log_input_filename is the name of an existing log file from where the contentis taken. This parameter is required.
-
output_result_filename is the name of a file in which to store the output ofthe log. If the file exists, then the results are appended to the file. If the file doesnot exist, then a new file is created. If this argument is not specified, then output issent to the monitor screen.
-
session_ID is the session ID of the user session. The BI Server assigns eachsession a unique ID when the session is initiated. This parameter limits the scopeof the log entries to the specified session ID. If not specified, then all session IDsare displayed.
-
request_ID is the request ID of an individual query. The BI Server assigns eachquery a unique ID when the query is initiated. This parameter limits the scope ofthe log entries to the specified request ID. If not specified, then all request IDs aredisplayed.
The request ID is unique among the active requests, but not necessarily uniqueduring the session. Request IDs are generated in a circular manner, and if a requestis closed or if the session is long enough, then a request ID is reused.
You can also locate user names, session IDs, and request IDs through the SessionManager. See Oracle Fusion Middleware Security Guide for Oracle Business IntelligenceEnterprise Edition for information.
Administrators can view the query log using the Manage Sessions option in thePresentation Services Administration page.