WSP Install Guide
WSP Install Guide
WSP Install Guide
Installation Guide
No part of this documentation shall be reproduced, stored in a ret rieval system, or transmitted by any
means, electronic, mechanical, photocopying, rec ording, or otherwise, without the prior written
permission of AVEVA. No liability is assumed with respect to the use of the information contained herein.
Although precaution has been taken in the preparation of this documentation, AVEVA assumes no
responsibility for errors or omissions. The information in this documentation is subject to change without
notice and does not represent a commitment on the part of AVEVA. The soft ware described in this
documentation is furnished under a license agreement. This soft ware may be used or copied only in
accordance with the terms of such license agreement.
ArchestrA, Aquis, Avantis, Citect, DYNSIM, eDNA, EYESIM, InBatch, InduSoft, InStep, Int elaTrac,
InTouch, OASyS, PIPEPHASE, PRiSM, PRO/II, PROV ISION, ROMeo, SIM4ME, SimCentral, SimSci,
Skelta, SmartGlance, Spiral Software, Termis, WindowMaker, WindowViewer, and Wonderware are
trademarks of AVEVA and/or its subsidiaries. An extensive listing of AVEVA trademarks can be fou nd at:
https://sw.aveva.com/legal. All other brands may be trademarks of their respective owners.
Publication date: Monday, April 22, 2019
Contact Information
AVEVA Group plc
High Cross
Madingley Road
Cambridge
CB3 0HB. UK
https://sw.aveva.com/
For information on how to cont act sales, customer training, and technical support, see
https://sw.aveva.com/contact.
System Platform Installation Guide
Contents
Chapter 1 System Platform Installation .............................................................................. 7
Preparing for System Platform Installation .................................................................................. 7
Important Notice for for Highly Secured Environments (TLS 1.2 Exclusively) ........................... 7
License Installation and Activation ........................................................................................ 8
Sentinel Manager and Agent Installation ............................................................................... 9
Operating System Minimum Requirements ......................................................................... 10
System Sizing Guidelines .................................................................................................. 10
Supported and Recommended Node Hardware Types ........................................................ 11
Required Installation Order of Additional Products ............................................................... 12
Common Components ....................................................................................................... 13
Windows Network Configuration......................................................................................... 13
System Platform Prerequisites ........................................................................................... 14
About SQL Server Requirements.................................................................................. 17
Selecting a Type of Installation........................................................................................... 17
About Product-Based Installation .................................................................................. 18
About Role-B ased Installation ...................................................................................... 20
ArchestrA User Account..................................................................................................... 22
About ArchestrA Us er Account Privileges ...................................................................... 23
Installing System Platform ....................................................................................................... 23
Configuring System Platform Components................................................................................ 32
Configuring the AVEVA Enterprise License Server Location ................................................. 33
Configuring the System Management Server ...................................................................... 34
Import a Certificate ...................................................................................................... 38
User Credentials for Configuring the System Management Server .................................. 38
Configuring the Sentinel System Monitor ............................................................................ 38
Sentinel Manager Configuration ................................................................................... 39
Email Server Configuration........................................................................................... 41
Advanced Sentinel System Configuration ...................................................................... 42
Configuring Databases and Dat a File Locations .................................................................. 43
Configuring the InTouch Web Client ................................................................................... 47
System Restart after Configuration ..................................................................................... 49
Installing InTouc h Access Anywhere ........................................................................................ 49
Install InTouch Access Anywhere S erver ............................................................................ 50
Secure Gateway Installation............................................................................................... 51
Install the Secure Gateway and Aut hentication Server Separately or Together ...................... 52
Install All Components on a Single Server ........................................................................... 54
Modifying an Installation .......................................................................................................... 55
Repairing an Installation .......................................................................................................... 56
Uninstalling System Platform ................................................................................................... 57
Uninstalling System Platform Uninstall a System Platform Component ............................... 57
Uninstall All Components ................................................................................................... 57
Upgrading System Platform ..................................................................................................... 58
C HAPTER 1
System Platform Installation
You can use the System Platform installation program to install the entire suite of products or any of the
components.
In This Chapter
Preparing for System Platform Installation ........................................................................................ 7
Installing System Platform ............................................................................................................. 23
Configuring System Platform Components ..................................................................................... 32
Installing InTouc h Access Anywhere .............................................................................................. 49
Modifying an Installation ................................................................................................................ 55
Repairing an Installation ................................................................................................................ 56
Uninstalling System Platform ......................................................................................................... 57
Upgrading System Platform ........................................................................................................... 58
3. Edit the system registry. The .REG file shown below sets registry keys to their safest val ues.
For additional information about these registry changes, see
https://docs.microsoft.com/en-us/dotnet/framework/net work-programming/tls#configuring-sec urity-v
ia-the-windows-registry.
Windows Registry Editor Version 5.00
[HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\.NETFramework\v4.0.303
19]
"SystemDefaultTlsVersions"=dword:00000001
"SchUseStrongCrypto"=dword:00000001
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\.NETFramework\v4.0.30319]
"SystemDefaultTlsVersions"=dword:00000001
"SchUseStrongCrypto"=dword:00000001
4. Restart your comput er to ensure that all changes take effect.
5. Install System Platform 2017 Updat e 3 SP1.
Note: If you are using a workgroup, the License Manager and License Server must be installed on the
same node.
You will need to configure the License Server and activate your product licenses before using the
products you install. For detailed information about product licensing and activation, refer to the AVEVA
Enterprise Electric Licensing Guide (SELicenseManagerGuide.pdf). You can access it after installation
is complete from the AVEVA Enterprise License Manager node, under the AV EV A start directory.
AVEVA Enterprise Licensing
The AVEVA Enterprise License Server ac quires, stores, and serves licenses for all installed AVEVA
software, including all System Platform products. The AVEVA Enterprise License Server and Manager
work together to provide centralized management of all your product licenses.
For products and roles that do not install the License Server on the same node, you will have to provide
the location (node name) of the License Server.
The basic product installation and license activation work flow is:
1. Install System Products, along with the AVEVA Enterprise License S erver and License Manager.
See Installing System Platform on page 23.
2. Configure the AVEVA Enterprise License Server (and Historian, if installed). See Configuring the
AVEVA Enterprise License Server Location on page 33.
3. Start the License Manager. The Licens e Manager is browser -based, and is located in the AVEVA
folder (Start > AVEVA > AVEVA Enterprise License Manager). The License Manager uses the
following URL:
http://localhost/AELicenseManager
Note: If you are running the Licens e Manager from a remote node (not the License Server/Galaxy
Repository node), substitute the node name for localhost.
5. Refer to the AVEVA Enterprise Licensing Help for options and procedures to activat e licenses.
Note: Changes to licensing, such as switching license servers or activating a new license, should not be
done for a product that is already running. Depending on the product, it may take up to 30 minutes to
acquire a new or changed license. To immediately acqui re a license, restart the affected product.
However, product interdependencies may require you to restart the node to force the immediate
acquisition of the license.
Both the Sentinel Manager and Sentinel Agent require configuration after installation. You must
configure the Sentinel Agent on each System Platform node to point to the Sentinel Manager. The
Sentinel Manager also requires configuration of its SMTP server and email addresses for notifications.
See Advanced Sentinel System Configuration on page 42 for additional information.
In addition to the license monitoring functionality that Sentinel provides by default, your System Platform
licenses include the ability to configure Sentinel Manager on a single node to monitor and manage the
performance and availability of the core AVEVA software, the engineered software application(s), and
the relat ed hardware and network infrastructure. To configure this additional functionality, see the
Sentinel User Guide.
Important: If you have a Sentinel license, you can configure the Sentinel Reporting feat ure. This feat ure
is only available for fully-licensed Sentinel System Monitor installations, not basic mode. If your Sentinel
installation will be fully licensed, the SQL Server Reporting Servic es (SSRS ) server shoul d be configured
and the services started before initiating installation of the Sentinel Manager. This will enable
deployment of Sentinel Reports. If SSRS is not configured before installation of the Sentinel Manager,
reports will have to be manually deployed. See the Sentinel User Guide for additional information.
Application Server
InTouch
Windows 8.1 Professional
Windows 10 Version 1607 Windows Server 2012
Historian
AVEVA Enterpris e License Platform
InTouch Access Anywhere Server OS is required
Note: System Platform 2017 Update 3 SP1 is not supported on Windows 10 prior to version 1607
(Anniversary Updat e; OS build 14393).
Pagefile.sys, the Windows paging file (also called the swap file or virtual memory file), must be
enabled. The Windows default setting is enabled.
RDP clients, ITAA Minimum 1 512 MB N/A 800 x 600 100 Mbps
browsers, mobile
devices Recommended 2 2 GB N/A 1280 x 1024 100 Mbps
Client Node
Basic RDS -
RDS, ITAA Server 8 12 GB 500 GB 1920 x 1080 1 Gbps
Recommended
Supports up to five
remote sessions Large RDS - Minimum 8 16 GB 500 GB 1024 x 768 1 Gbps
Large RDS -
16 24 GB 1000 GB 1920 x 1080 Dual 1 Gbps
Recommended
All-In-One Node
Server node type applies to Historian Server, Galaxy Repository node, and nodes hosting AppEngines.
In redundant environments, increase CPU and RAM to maintain a maximum of 40% typical resource utilization.
Application Server
Window Maker (No Modern Apps) Supported Supported Preferred RDP Supported
Window Maker (with Modern Apps) Preferred Supported Supported RDP Supported
Window Maker (with Managed Apps) Preferred Supported Supported RDP Supported
InTouch Access Anywhere Client (HTML5 Browser Browser Browser Browser Browser
Browser)
InTouch Access Anywhere Secure Gateway Supported No No No No
Historian
Support Components
AVEVA Enterpris e License Manager Client Browser Browser Browser Browser Browser
Common Components
System Platform 2017 Update 3 SP1 includes several shared modules that are needed for the products
to operate. You will see some or all of the following common components listed under Programs and
Features in the Windows Control Panel after installation is complet e, depending on your installation
selections for the node:
Note 1: The License Server is required on nodes with the Galaxy Repository.
Note 2: The Wonderware Operations Integration Supervisory Gateway is present only if InTouch was
installed, or if OI Gateway is selected as part of a custom installation. OI Gateway replaces FS Gateway
that was supplied wit h previous releases. If you are upgrading from a prior version of InTouch, or if FS
Gateway was previously installed as a standalone product, FS Gateway is deleted and replaced by OI
Gateway. See Installing OI Gat eway and Upgrading from FS Gateway on page 85 for additional
information.
Note: Do not install the Galaxy Repository on a computer that is used as a domain controller or an Active
Directory server.
Operations that rely on inter-node communications may not function correctly in a workgroup based
Application Server installation. Examples of this type operation include connecting to a remote IDE, or
viewing the status of a remote platform.
If you must use workgroup based networking, you can avoid communications issues by enabling
"everyone permissions" for anonymous users. To enable thes e permissions, go to:
Local Security Policy > Local Policies > Security Options > Network Access: Let
everyone permissions apply to anonymous.
System Platform requires two different versions of the Microsoft .NET® Framework (4.7.2 and 3.5
SP1). The two versions run side-by-side.
Microsoft .NET® Framework 4.7.2: Prior to any other installation task, System Platform checks if
.NET version 4.7.2 is installed. If it is not, you are prompted to allow its installation. A system restart
may be required when .NE T installation is complete. If the System Platform installation program
does not automatically resume after the system restart, you will need to restart it manually.
If an error occurs during setup that stops .NE T Framework 4.7.2 installation, you can try manually
installing from the System Platform installation DV D:
\InstallFiles\Redi st\DOTNET\4.7.2\NDP472-KB4054530-x86-x64-AllOS-ENU.exe
If manual installation does not succeed, the error it is likely due to a missing patch in Microsoft
Windows. For instructions on fixing the issue, refer to the following Microsoft technical not e that
discusses updating Windows 8.1 and Windows Server 2012 R2 in preparation for .NE T Fr amework
4.7.2:
https:// support.microsoft.com/en-us/help/2919355/
Microsoft .NET® Framework 3.5 SP1: This version of the .NET Framework is a default component
of Windows and is required to enable certain SQL Server functionality, even if you are not instal ling a
product or role that uses SQL S erver directly. If it is not installed, product installation will halt after the
product license agreement screen, and a message is displayed that .NE T 3.5 SP1 must be installed
manually before proceeding.
Since System Platform does not check for .NE T 3.5 SP1 until the installation process has already
begun, you may want to check if it is present prior to starting installation. However, you can activate
or install .NE T 3.5 SP1 without exiting the installation program.
To check installed .NET versions:
1. On the Start menu, choose Run.
2. In the Search box, enter regedit.exe. You must have administrative credentials to run regedit.exe.
3. In the Registry Editor, open the following subkey:
HKEY_LOCAL_MA CHINE\SOFTWARE\Microsoft\NE T Framework Setup\NDP.
4. The installed versions of .NE T are listed.
To activate or install .NET 3.5 SP1:
In Windows desktop versions, open the Control Panel and go to the Turn Windows features on or
off option.
In Windows Server versions, open the Server Manager and use the Add Role s and Features
Wizard.
You can also install .NE T 3.5 SP1 from:
https://www.microsoft.com/en-us/download/details.aspx?id=25150.
Prerequisites Automatically Installed by System Platform
The System Platform installation program analyzes the software installed on your comput er and lists any
software that is required but not currently installed, and any installed soft ware that is incompatible. The
following prerequisites are installed by the System Platform installation program, if not already present
on the system:
Microsoft .NET® Framework 4.7.2
Windows Installer 4.5
SQL Server: SQL Server is required for products or roles that you select for installation that include
GR node or Historian Server. If SQL Server is not present, you are given the option to install SQL
Server 2014 SP2 Express with Tools as part of System Plat form installation. However, SQL Server
Express supports only small installations with less than 25,000 I/O per node.
If you have a medium or large installation, a copy of SQL Server 2016 SP1 Standard Edition is
supplied with System Platform. You must install it or another supported version of SQL Server
separately, before you install System Platform. See the Technology Matrix on the AVEVA Global
Customer Support website for the current list of supported SQL Server versions.
If you do not want to install SQL Server, and you have product or role selections that include the GR
node by default, you can select the Customize Installation checkbox and deselect the
Galaxy_Repository. However, this will limit any database-relat ed product functionality, such as the
Application Server IDE, that uses the Galaxy Repository.
See SQL Server Requirements on page 69 for more information about the limitations of using SQL
Server Express instead of a standard or enterprise edition.
The following tables summarize which System Platform products and roles require SQL Server.
SQL
System Platform Product Selections Required
Historian Yes
Historian Client No
Licensing No
SQL
System Platform Role Selections Required
Runtime Client No
SQL
System Platform Role Selections Required
All-In-One-Node Yes
Without Galaxy Repository and Historian Server (custom No
installation)
Note: System Platform will allow you to install an InTouch development system without a Galaxy
Repository. However, InTouch Modern Applications will not work without the Galaxy Repository.
While installing System Platform, if the logged-on user (the installer) is not a SQL S erver administrator,
the SQL Acce ss Configurator opens (the dialog box is labeled "aaConfig SQL") and requests SQL
Server administrator credentials. Enter valid SQL Server administrat or credentials when requested. For
more information about setting user privileges with the SQL Acce ss Configurator, see Setting the SQL
Server Security Mode on page 65. For more information about SQL Server installation, see About SQL
Server Requirements on page 17.
The System Platform installation program installs both system-specific and product-specific
prerequisites. It also checks for incompatible software that will prevent installation from proceeding, (for
example, if InTouch Access Anywhere was previously installed). You do not have to exit from the System
Platform installation program to install the prerequisite software, with the exception of standard or
enterprise versions of SQL Server. You will need to exit and perform any uninstall operations that are
indicated before continuing with installation.
For information on prerequisites and software requirements for the specific products, see the System
Platform Readme, the Readme files of the specific products located in your doc ument ation directory, or
the specific product information chapter in this installation guide.
Note: If you are installing a small system (less than 25000 I/O), you can use SQL Server Express instead
of a standard version of SQL Server. You can elect to install SQL Server Express as part of the System
Platform installation process; you do not have to install it separately.
For more information about SQL Server prerequisites, see SQL Server Requirements on page 69.
Important: Product-bas ed installation includes an option to install the InTouch Access Anywhere Sec ure
Gateway. This option can only be installed on a computer running a supported version of the Windows
Server operating system (minimum: Windows Server 2012). No other System Platform components can
be installed with it.
In the table below, components that are selected by default when you select the corresponding product
are indicated by the letters R (for required), and O (for optional). Required means that the component
must remain selected to install the product. Optional means that you can deselect the component and
retain the remaining product functionality. Products definitions (columns 2 through 8) are as follows:
AS + GR: Application Server (with Galaxy Repository)
AS no GR: Application Server (wit hout Galaxy Repository)
IT: InTouch (HMI)
ITAA: InTouch Access Anywhere
ITAA SG: InTouch Access Anywhere Secure Gateway
ITAA AS : InTouch Access Anywhere Aut hentication Ser ver
HS: Historian Server
HC: Historian Client
System Platform
ASB Runtime R R R R R
ASB Service Repository R O R
Application Server
Bootstrap R R R R
IDE O O R
Galaxy Repository O O O
InSight Publisher R R
InTouch HMI
Runtime R R
Development O
Alarm DB Logger R R
Demo Apps O
Recipe Manager O R
SQL Access O R
16 PenTrend
O R
Symbol Factory
R R
InTouch Web Client
R R
OI Gateway
InTouch Acce ss Anywhere
ITAA Server R
ITAA Authentication R
Hi storian
Historian Server R
IDAS R
Active E vent R
Configuration Tools R
Historian Extensions R
Hi storian Client
Trend/Query Clients R R R R R
Microsoft Add-Ins
Licensing
License Manager R O R O
License Server R O R O
Client Components R R R R
Server Components R R R R
OI Server Simulator R R R R
Sentinel
Sentinel Manager R
Sentinel Agent R R R R O O R R
R = Required
O = Optional
Important: Role-based installation includes an option to install an InTouch Access Anywhere Secure
Gateway node. This option can only be installed on a computer running a supported version of the
Windows Server operating system (minimum: Windows Server 2012). No other System Platform
components can be installed wit h it.
In the table below, components that are selected by default when you select the corresponding product
are indicated by the letters R (for required), and O (for optional). Required means that the component
must remain selected to install the product. Optional means that you can deselect the component and
retain the remaining product functionality.
Note: In some cases, you can still deselect a product category to remove all components under it, even
if components are marked as required. For example, if you are installing a System Platform Development
Server, and will be using the InTouch OMI run time only, you can deselect the InTouch HMI category to
remove all the components listed under it, including components that are marked as required. As anot her
example, if you are installing Security Server, it is possible to deselect the ASB Management Server, but
the resulting installed product will not result in a Security Server.
Snt Mgr: Sentinel Manager. Installs the Sentinel Manager and Agent components. The Sentinel
Manager monitors the License Server. It also includes a single node license to monitor the health o f
the computer on which it is installed.
Note: The Sentinel Manager is automatically selected for installation whenever the Galaxy
Repository component is selected. You use the "Customize Installation" dialog to deselect it.
Not Listed: The following roles are not defined in the table below:
All-in-One Node: All products, except InTouch Any where, are installed on a single node.
Custom: Allows you to customize the components that are installed. No components are selected
by default; you must select any component that you want to install.
System Platform
ASB Runtime R R R R R R
ASB Service Repository R
Application Server
Bootstrap R R R O O
IDE R R
Galaxy Repository O
InSight Publisher R R R
InTouch HMI
Runtime R R R R
Development O O
Alarm DB Logger R R R R
Demo Apps O O
Recipe Manager O O O R
SQL Access O O O R
16 PenTrend
O O O R
Symbol Factory
R R R R
InTouch Web Client
InTouch Acce ss Anywhere
ITAA Server
ITAA Secure Gateway R
ITAA Authentication
Hi storian
Historian Server R
IDAS R
Active E vent R
Configuration Tools R
Historian Extensions R
Hi storian Client
Trend/Query Clients R R R R R R
Microsoft Add-Ins
Licensing
License Manager O O R O
License Server O O R R
Operation Integration
Client Components R R R R R
Server Components R R R R R
OI Server Simulator R R R R R
OI Gateway R R R R
Sentinel
Sentinel Manager R R
Sentinel Agent R R R R R R R R R
R = Required
O = Optional
WARNI NG! The Arche strA User Account i s a Windows operating system account located on the
local computer or on a domain. Do not delete this account with operating system account
management tools. If you do, ArchestrA-enabled software may stop functioning properly.
If no other ArchestrA-enabled software is installed on the computer, you are prompted to create a
new A rchestrA User Account or specify an existing user account during the System Platform
installation.
If y ou use an existing user account, it must have a permanent password that does not expire, and the
password cannot be changed. By default, the local machine name is displayed. To use a domain
user account, enter the short domain name. Do not use the fully qualified domain name (FQDN). For
example, use "DomainName" and not "DomainName.com" or " DomainName.local."
Important: To enhance security, the ArchestrA User Account is blocked from logging on to the Galaxy
locally or through Remote Desktop Services by default. This is configured in the operating system user
rights management.
Note: Members of the aaAdministrators group do not have system admin privileges.
See Modif ying an ArchestrA User Account on page 63 if you need to change or recreate the ArchestrA
User Account.
If you use a standard user account with temporary administrator credentials instead of an administrator
account to run setup.exe, a registry flag associated with the temporary administrator account may
remain after the system prompts for a mid-installation restart. This flag is used to notify the operating
system that setup should resume the next time that particular us er logs into the system. Since product
installation may have already completed the next time the user logs in, the "modify" setup screen
appears instead. If this occurs, simply cancel the modify setup screen. This scenario, if it occurs, will only
happen once, since the registry flag will be cleared. This will not affect the products or their installation.
You can select a product-based or a role-based installation for your comput er.
Note: Prerequisites are installed as part of product installation and not in a separat e workflow.
Note: Y ou are prompt ed to restart your c omput er after the .NE T framework is installed. Y ou may
need to manually restart the setup program. If the .NE T Framework does not install successfully,
see System Platform Prerequisites on page 14 for additional information.
2. After some automatic configuration occurs, the select installation mode dialog box appears.
3. Select whether you want a product-based or a computer role-based installation, and then click Next.
The select options dialog box appears. Its appearance will vary, depending on whether you chose
product-based or role-based installation.
For information about product-based installation, see About Product-Based Installation on page
18.
For information about role-based installation, see About Role-B ased Installation on page 20.
If you are installing any of t he InTouch Access Anywhere options available under P roduct-Based
Installation, see Installing InTouch Access Anywhere on page 49.
If you select the Product Ba sed Selection option, the product based installation dialog box
appears.
If you select the System Platform Computer Roles option, the role based installation dialog box
appears.
You can select multiple products or roles. All the selected components will be i nstalled together. If
you are installing InTouch Access Anywhere Secure Gateway, it must be installed by itself, without
any other System Platform components.
When you select the Galaxy Repository for installation, the following components are automaticall y
selected for installation and cannot be deselected:
o ASB Service Repository. The ASB Service Repository includes a System Management
Server, used for establishing a trust relationship bet ween machines. See Configuring the
System Management Server on page 34for additional information.
o AVEV A Enterpri se License Server and Manager. Every node should be configured to point to
a single License Server. See Configuring the AVEVA Enterprise License Server Location on
page 33 for additional information.
o Sentinel Manager. Every node should be configured to point to a single Sentinel Manager. See
Configuring the Sentinel S ystem Monitor on page 38 for additional information.
Note: If you have multiple Galaxy Repository nodes, the Configurator lets you select which node(s)
to use for the above components at the end of installation. See Configuring System Platform
Components on page 32 for more information.
4. Select the check boxes to indicate whic h products or roles you want to install, and then click Next.
The verify selection dialog box appears.
5. To proceed with your selections without making any changes, click Next. To change your
configuration, select the Customize Installation check box before clicking Next. Use the Customize
Installation to make modifications to add or remove optional components for the products you have
selected for installation. For example use Customize Installation to:
Remove components from a node in multi-node Application Server configurations, such as the
IDE or Galaxy Repository.
Add components, such as the InTouch 16 -Pen Trend Wizard supplementary component.
Note: The ASB Service Repository is automatically selected when you select the Application Service
Galaxy Repository. It cannot be deselected, unless you first deselect the Galaxy Repository
component. However, you can choose not to use it when you configure security. See Configuring the
System Management Server on page 34 for details.
6. Optional: Complete the following installation steps to install InTouch HMI supplementary
components and make other changes:
a. Select Customize Installation.
c. Scroll through the list of System Platform products to be installed to the InTouch
Supplementary Components section.
d. Select InTouch 16 PenTrend from the list.
– You can make ot her product and component selections.
– You can click Browse on the customize installation dialog box to change the program
installation destination folder.
e. Click Next to continue the remainder of the installation procedure.
7. If you have selected an InTouch HMI features, the language selection dialog box appears. Select
the language for your InTouch HMI installation. The InTouch language versions are supported only
for the matching operating system language. For example, the German version of the InTouch HMI
is only supported on the German operating system.
8. Click Next. The End User License Agreement dialog box appears.
9. Review the license(s). Click I have read and accept the terms of the license agreement(s), and
then click Agree.
10. If the products or roles you selected require it, the Arche strA User Account dialog box appears.
Note: If an Archestra Us er Account is NOT required (for example, if you are only installing Historian
Client ), you will be prompted to click Install. If this is the case, skip to step 12.
11. Specify an ArchestrA User Account. You can specify an existing user account, or creat e a new
ArchestrA User Account if no ot her Arc hestrA-enabled software is installed on the computer. The
ArchestrA User Account is used for encrypted communication between different ArchestrA nodes
and software components.
To select an existing user account:
a. Clear the Create Local Account check box. When you clear the check box, the Domain/Local
Machine text box displays the default domain name. Specify a different domain/local machine
name if necessary.
b. Type the user name and password for t he existing account. The account must meet the following
requirements:
– The account must have a permanent password that does not expire.
– The account must have a password that cannot be changed.
c. Click Next to complete the User Account setup.
12. If the products or roles you selected require Microsoft SQL Server, and a supported version of SQL
Server is not already installed, you will be prompted to select either automatic installation of SQL
Server Express, or to exit and manually install a full version of SQL Server.
Caution: If you s elect SQL Server Express, System Platform will automatically grant you (the logged
in user) SQL sysadmin privileges. This level of access is required to proceed with SQL Server
Express installation. Y ou will retain sysadmin privileges even after installation. If you need to remove
sysadmin privileges from the logged in account, be sure to create a sysadmin account first.
Click Yes to use SQL Server Express. SQL Server Express is adequate for systems with less
than 25000 IO. It will be installed automatically along with the other prerequisites and the
selected System Platform components.
Click No to skip SQL Server Express installation. Then, click Exit and manually install SQL
Server. System Platform for medium and large installations includes a separate DV D with a full
version of SQL Server 2016 SP1 Standard. However, you can install any supported version of
SQL Server. See the A veva Global Customer Support (GCS ) Technology Matrix for a list of
supported SQL Server versions.
When you have finis hed SQL Server installation, restart the System Platform installation
program.
13. A list of missing prerequisite components (if any) and the System Platform products to be installed
are displayed.
Note: Any prerequisites required for the products selected for installation will be listed above the list
of products and components. The prerequisites will be installed first, and the product and
components will be installed immediately after installation of the prerequisites has finished. If you
elected to install SQL Server Express, it will be installed along with any other prerequisites.
15. After the installation is over, the installation completed dialog box appears.
Select View Readme for important information, including hardware and software requirements,
new features, and known and resolved issues.
Select Configure to continue. See Configuring System Platform Components on page 32 for the
final steps to complete installation .
The status of each item in the Configurator is displayed when the Configuration opens and as items are
configured. The status indicators are:
o Error - Indicates that an error occurred during configuration.
o Not Configured - Indicates that the feat ure is installed, but not configured.
Note: To see if the license server can be found after entering the Server Name and Port, you can
press Test Connection.
Backup: If you have configured a backup server (sec ondary server), select the checkbox to
enable backup. Then, enter the secondary server name.
Note: If you are prompted for user credentials for the System Management Server, use the following
format to enter the user name: DomainName\UserName. The prompt for user credentials may be
displayed if you have domain admin privileges but are not an admin on the local machine. You must
be a member of the Admini strators or aaAdministrators OS group to configure the System
Management Server. For more information, see User Credentials for Configuring the System
Management Server on page 38.
Note: The Configurator is automatically invok ed when installation completes. You can also start the
Configurator at any time after from the Windows Start menu on any System Platform node.
By establishing trust between machines, communications can pass freely. This will be a security
concern if you are not sure of the identity of the remote computer. If you have any doubt about the
computer you are connecting to, verify the security code and certificate details by selecting the
Details... button in the Advanced Configuration dialog to open the certific ate.
5. Select the next item in the left pane that requires configuration. When all required items have been
configured, press the Close button to complete installation. See System Restart after Configuration
on page 49.
Import a Certificate
To import a signed CA certificat e, select the Provided by IT option from the Certificate Source drop
down menu. The Import Certific ate dialog wi ndow opens.
1. Navigate to the Certificate file by pressing the browser button. Select the Certificate file and
press Open. The Certificate file must have a .PFX extension.
2. Select the Certificate Store in which to save the Certificate, as directed by your IT department.
3. Enter the Certificate password.
The email server sends email alerts generated by the Sentinel Monitor to notify personnel that an issue
has been det ected and may require attention.
If the System Platform node includes Historian or MES, the initial Sentinel Manager
Configuration window contains additional fields to define credentials for MES and/or the
Historian.
2. In the Sentinel Manager Name field, enter either the computer name (preferred) or IP address of
the node that will act as the Sentinel Manager. If you are configuring the current node as the
Sentinel Manager, enter its name or IP address. If you have configured secure communications for
the Common Platform, the machine name must be used (IP address is not supported for secure
communications). See the Sentinel Us er Guide for additional information.
Note: TCP/IP is used for communications bet ween Sentinel Agents and the Sentinel Manager. Use
the Advanced settings configuration dialog to configure the TCP/ IP port numbers. See Advanc ed
Sentinel System Configuration on page 42 for additional information.
3. If either Historian or MES is installed on the node, the Configurator detects the installation. It allows
you to specify credentials for these programs to use to increase security. If MES or Historian is not
installed, credential fields are not displayed a nd you can skip this step.
If MES i s installed on the node: To enable secure communication between MES and Sentinel
Manager, select the checkbox next to "Enter the MES credentials." If you do not select the
checkbox, communication between MES and Sentinel Manager is unsec ured.
If you selected the checkbox, enter the user name and password of a configured MES user. The
Sentinel Manager uses the configured user to communicate with MES.
If the Historian is installed on the node: To enable secure communication between the
Historian and Sentinel Manager, select the checkbox next to "Enter the Historian credentials." If
you do not select the checkbox, communication between the Historian and Sentinel Manager is
unsecured.
If you selected the checkbox, enter the user name and password that was configured for the
Arche strA User. The Sentinel Manager uses the ArchestrA User Account to communicate with
the Historian. See ArchestrA User Account on page 22 for more information.
4. You can use the Te st Connection button to check that the node you are configuring can reach the
Sentinel Manager node.
5. Press the Configure button.
6. Select the next item in the left pane that requires configuration. When all required items have been
configured, press the Close button to complete installation. See System Restart after Configuration
on page 49.
Note: You must have SQL Server sysadmin rights to configure the email server. No warning will be
displayed, but without the proper user rights, configuration changes you make to the Alert Email Server
in the Configurator will not be accepted.
1. In the Configurator, select Alert Email Server, under Sentinel System Monitor.
To skip email server configuration, choose the option to enter email server details later.
To configure the email server, choose the option to "Enter Email server details now."
3. In the SMTP Server Name or IP field, enter either the computer name or IP address of the email
server to be used for Sentinel alerts.
4. In the SMTP Server Port field, enter the port number of the email server (default: 25).
Use port number 25 for an unsecured SMTP server.
Use port number 465 for a secured SMTP server.
See the Sentinel User Guide for additional configuration information.
5. In the SMTP Server Secured field, enter ye s if the server is secured, or no if it is not.
6. If you are using a secured email server, enter the user name and password to access the server.
The user name and password field are only applicable to a secured email server.
7. In the From Email ID field, enter the email address that will be used to send system alerts from the
Sentinel System Monitor.
8. In the Default Recipient Email ID field, enter the email address(es) that will receive system alerts
from the Sentinel System Monitor.
9. Press the Configure button.
10. Select the next item in the left pane that requires configuration. When all required items have been
configured, press the Close button to complete installation. See System Restart after Configuration
on page 49.
1. In the Configurator, select the Sentinel Manager entry, under Sentinel System Monitor.
2. Click the Advanced button. The Advanced Configuration dialog window opens.
3. Set the port number. Unless you changed default port numbers, no changes should be needed.
If System Platform is configured to use a secure mode of operations, that is, if the System
Management Server option is configured, set the SSL port to the same number that was
configured for Common Plat form communications. The default SSL port is 443.
If security is not configured for System Platform, that is, if no System Management Server option
is configured, set the HTTP port to the same number that was configured for Common Platform
communications. The default HTTP port is 80.
4. Press OK, and then Close to exit Advanced Configuration.
5. Select the next item in the left pane that requires configuration. W hen all required items have been
configured, press the Close button to complete installation. See System Restart after Configuration
on page 49.
Note: Before running the Configurator, be sure SQL Server is installed and running. Also, be sure you
have SQL Server administrator rights.
You can start the Configurat or at any time from the Windows Start menu on the Historian computer.
To configure ArchestrA Service Bus settings, see Configuring the System Management Server on
page 34.
To configure licensing, see Configuring the AVEVA Enterprise License Server Location on page 33.
To configure the databases and data file folders
1. Start Configurator from the Start menu.
2. In the left pane, click Server. Then configure the databases as follows.
a. Under Database Information, specify the SQL Instances and database path.
– SQL Instance
Name the SQL Instance associated with this historian.
– Database Path
Unless you have specific requirements, keep the default SQL Server database path. This is
the path where the configuration database is deployed. Click the ellipsis button to specify a
different directory in which to install the historian databas e files.
b. Under Existing Databa se Conflict, read any notices.
If the database is created for t he first time, then this option is not available. When reconfiguration
is done, then the Drop and Create New Database option is available. If you select this check
box, then the existing database is dropped and a new dat abas e is created. If this check box is
cleared, then the database is not dropped, but configured for changes, if any.
c. Under Alarms & Events Storage, configure how you want to store alarm and events.
Important: If you want to change this setting later aft er the Historian is running, you must first
shut down and disable the historian using the Management Console. Then, after making the
change, you can restart and enable the historian.
– High-speed (default/recommended)
The high speed setting for storing alarms and events in history blocks provides several
advantages. You can manage the data using simple operations such as moving, copying, or
deleting folders, instead of using database management software.With this storage method,
you no longer need to purge to sustain storage. This method offers significantly higher
storage rates. Also, the capacity for alarm and event storage is only limited by disk space,
not by insertion rate.
– Traditional
The traditional setting stores alarms and events in the A2ALMDB SQL Server database.
This works well for smaller applications. Alarm and event data stored in the A2ALMDB
database can be retrieved using SQL queries. You can also use SQL Server tools, such as
Reporting Services, to query alarm and event history.
d. Under Network, accept the default ports or change these settings. The ports you specify are
added to the exclusions list of Windows Firewall.
– Hi storian TCP port is used for replication data.
If you are configuring a tiered historian server, specify the port number for tag replication
between the tier-1 and tier-2 servers. You must use the same port for all the tier-1 and tier-2
systems working together in the tiered configuration.
– InSight/REST TCP port is used for data queries via InSight or the Historian RES T AP I to
the Historian Server.
Type the number for the port used by InSight and RES T interface queries.
– Search port is used for data searches. This field is for reference only.
e. Under Security, Check the box if you want to allow remote access of this server's System
Management Console (SMC).
When you check Allow Remote Acce ss for SMC, Historian allows remote connection to the
SMC. Specifically, this allows remote launch and remote activation permissions for the
aahCfgS vc and aahE ventS vc Historian COM services. (By default, these are set to local launch
and local activation. ) The permissions are limited to the aaAdministrators, aaPowerUsers, and
aaUs ers groups. Anyone who is not a member of thes e groups on the server will not see that
Historian remotely via SMC.
3. In the left pane, click Security. Configure the security options as follows.
a. Under Hi storian Users, review the existing users and roles for this server. Make adjustments to
the list as needed:
– To create a new user account, click Create Users and then specify account details.
– To add existing user accounts to this list, click Add Users and then select the account
criteria to use.
– If you don't need this account anymore, mark the Delete Account check box.
b. Under SQL Logins, do one of the following to ensure your SQL Server logins are secure:
– If you want to keep using a default account listed, type a new password.
– If you don't need this account, mark the Delete Account check box.
Note: Secure Development Lifecycle (SDL) guidelines recommend against using automatical ly
created users like aaUser and aaAdminUser with well-known or publicly documented
passwords.
When you migrate from an older version of the Historian Server, this area is populated with all
preexisting SQL Server accounts and gives you the option to cha nge account password and to
delete unused accounts to ensure strong security for your system.
4. In the left pane, click Search. Then configure the search options as follows.
5. In the left pane, click Reporting. Then mark the appropriate check boxes to configure OData
extensions for SQL Reporting Studio or Visual Studio Report Designer on your system.
6. In the Configuration Message s area, read messages regarding prerequisite checks, current
configuration state, and configuration activities that are logged.
7. Click Configure. The Proc essing SQL Script dialog box appears. You can see the historian
database configuration scripts running. Multiple scripts run during the configuration.
8. After the system finishes running the SQL scripts, the Historian node and Historian Server node are
shown with a green status indicator if the databas e is successfully configured.
9. Click All Messages to see all the configuration messages.
Note: If a System Management Server is configured, the InTouch Web Client will use the security
certificate and utilize the HTTPS protocol for secure communications. See Configuring the System
Management Server on page 34 for additional information.
2. Under Graphic Refre sh Rate, set the screen refresh interval. This determines how frequently the
web browser will query the web server for graphic data. A longer interval reduces network traffic and
may be needed for very low-bandwidth networks or intermittent connections.
Default: 1000 ms (1 second)
Minimum: 250 ms
Maximum: 60000 ms (60 seconds)
Note: The Graphic Refresh Rate cannot be less than the Alarm Refresh Rate. If you lengthen the
Graphic Refresh Rate, the Alarm Refresh Rate will automatically synchronize with the Graphic
Refresh Rat e.
3. Under Alarm Refresh Rate, set the alarm refresh interval. This det ermines how frequently the web
browser will query the web server for alarm data. By default, the Alarm Refresh Rate is the same as
the Graphic Refresh rate. You can make the refres h interval longer for alarms than for graphics, but
the Alarm Refres h Rate cannot be shorter than the Graphic Refresh Rat e. A longer interval may be
needed for very low-bandwidth net works or int ermittent connections.
Default: 1000 ms (1 second)
Minimum: Graphic Refresh Rat e
Maximum: 60000 ms (60 seconds)
4. Press the Configure button.
5. Select the next item in the left pane that requires configuration. When all required items have been
configured, press the Close button to complete installation. See System Restart after Configuration
on page 49.
Note: The installed programs may not function properly until you restart the system.
After the system restarts, and before you start using System Plat form, make sure that you have activated
your product licenses. See License Installation and Activation.
Note: Embedded operating systems are not supported by InTouc h Access Anywhere Server.
.NET Framework 4.7.1 or later must be installed on the computer that will host the InTouc h Access
Anywhere server. You can allow the setup program to install it automatically if it is not present. See
System Platform Prerequisites on page 14 for detailed information.
InTouch applications must be built with version 10. 6 or later to be viewed through InTouch Access
Anywhere
The InTouch Access Anywhere server must be installed on the same computer that hosts InTouch
WindowViewer.
Remote Desktop Servic es must be configured on the host computer.
Important: InTouch Access Anywhere leverages RDP and translates RDP to WebSockets. RDS
access must be enabled on the comput er hosting InTouch Access Anywhere.
Make sure the anticipat ed users of InTouch Access Anywhere are members of the Remote Desktop
Users group to be grant ed the right to log on to the Access Anywhere server remot ely.
The host computer’s firewall is configured to permit inbound and outbound network traffic on port
8080.
Make sure no other application installed on the InTouch Access Anywhere server also uses port
8080.
On host comput ers running Windows Server 2012, the InTouch WindowViewer executable file
(view.exe) must be added to the host comput er’s RemoteApp list and configured to support
command-line arguments.
The corresponding TSE (RDS ) Concurrent license is activat ed on the host comput er.
If upgrading to a newer version of InTouc h Access Anywhere, first back up any custom components
of the existing installation, then uninstall the existing version before installing the new version.
InTouch Access Anywhere Server cannot be installed on computers in whic h the host name contains
non-English characters.
InTouch applications cannot be listed by InTouch Access Anywhere if application names or folder
paths contain an ampers and (& ) character.
5. Click Next on the dialog box that shows the components to be installed.
6. Select the check box that acknowledges you have read and accepted the terms of the license
agreement and select Agree.
7. Click Install to begin installing InTouch Access Anywhere and InTouch Runtime.
8. A horizontal bar shows the progress of the installation.
9. Click Finish to complet e the installation.
10. Configure (or disable) the Windows Firewall for use with InTouch Access Anywhere. For details, see
Configuring a Firewall Program Exception in the InTouch Access Server Administrator Manual.
Note: Secure Gateway cannot be upgraded by installing a newer version on a computer hosting an
existing version. The existing version of Secure Gateway must be uninstalled first before attempting to
install another version on the same computer. To uninstall Sec ure Gateway, see Uninstall a Wonderware
System Platform Component (see "Uninstall a System Platform Component" on page 57).
4. A checkbox appears that lets you customize installation. Select this if you wish to change the default
installation folder.
Otherwise, the Secure Gat eway is installed to the default installation folder, C: \Program Files (x86).
5. Accept the license agreement by selecting the I have read and accept the terms of the license
agreement option, and then click Agree.
The Ready to Install the Application screen appears.
6. Review the installation details and click Install.
7. Click Finish after the installer indicates that the Installation has completed succe ssfully.
The Secure Gat eway and Authentication servers can be installed separately or together on one of the
supported Windows Server operating systems, or on a Windows workstation running 32-bit or 64-bit
versions of Windows 10 Professional or Enterprise, Build 1607 and later. Follow these requirements
when installing the Authentication server:
The Authentication Server must be installed on a computer that is a member of the domain that it will
use to authenticate users.
The Authentication server can only be configured for one domain at a time.
The Authentication server should be installed on the safe side of a firewall rather than the DMZ for
best security practice.
To install the Secure Gateway and Authentication server on the same or separate
computers
1. Log on as a Windows administrator of the computer that will host either the Secure Gateway, the
Authentication server, or both.
2. Insert the System Platform DVD in your computer and run setup.exe.
3. Select Product-Ba sed Selection.
4. Determine how you want to install the Secure Gateway and the Authentication server.
Install the Secure Gateway and the Authentication server on separate computers
o Install the Secure Gateway by following the steps described in Secure Gateway Installation on
page 51. The Authentication server must be configured by setting options from the Secure
Gateway Configuration portal.
o Install the Authentication server on another computer that meets the requirements listed above
this procedure.
Install the Secure Gateway and the Authentication server together on the same computer
o Select the Secure Gateway and Authentication server options from the installation dialog box
and following the installation instructions.
5. After installing the Authentication server and the Secure Gateway, see the section, Built-In
Authenti cation Server, in the InTouch Access Anywhere S ecure Gateway A dministrat or Manual for
descriptions of the options to configure the Secure Gateway to work with an Authentication server.
4. Click Next on the dialog box that shows all components have been select to be installed.
5. Select the check box that acknowledges you have read and accepted the terms of the license
agreement and select Agree.
6. Click Install to begin installing the InTouch Access Anywhere components.
A horizontal bar shows the progress of the installation.
7. Click Finish to complet e the installation.
Modifying an Installation
You can change the System Platform components installed on your computer. You can add new
components or remove the existing ones. You can modify any component of System Platform.
You must have the installation DV D insert ed in the DVD -ROM drive before you can modify a program.
To modify an installation
1. Select the Modify option from the System Platform Modi fy, Repair or Remove Installation dialog
box. You can open the dialog by doing either of the following:
Run Set up.exe from the System Platform installation DVD.
Navigate to Uninstall or Change a Program in the Windows Control Panel. Then, select any
System Platform component and then click the Uninstall/Change button.
Note: The name of the Uninstall/Change option may vary depending on which Windows
operating system is installed on your computer.
2. Click the Modify option, and then click Next. The list of System Platform components appears.
3. Select or clear the components that you want to add or remove, and then click Next. The verify
change dialog box appears.
4. Click Modify. The selected components are added or removed. If the added components require
configuration, the Configurator opens. If not, the complete modification dialog box appears. See
Configuring System Platform Components on page 32 for information about the Configurator.
5. Click Finish.
Note: The system may not prompt you to restart the system after Modify is successful. However, if
you have added a new product or feature, a system restart is recommended.
Repairing an Installation
You can repair the installation of any System Platform component to fix missing or corrupt files, registry
keys or shortcuts. You can also reset the registry key to the default value.
Note: You must insert the installer DVD in the DVD -ROM drive before you can repair a program.
To repair an installation
1. Click the Uninstall or Change a Program option in Windows Control Panel. The list of software
installed on your computer appears.
2. Select the System Platform component that you want to repair, and then click the Uninstall/Change
button. The Modify Repair or Remove Installation dialog box appears.
Note: The name of the Uninstall/Change button varies depending on the Windows operating
system installed on your computer.
3. Click the Repair option, and then click Next. The Confirm Repair dialog box appears.
4. Click Repair. The complete repair dialog box appears.
5. Click Finish.
3. Click the Remove option, and then click Next. The confirmation dialog box appears.
4. Click Uninstall. The component is uninstalled and the complete uninstallation dialog box appears.
5. Click Finish.
Note: Ignore components that are listed below if they have not been installed on your system.
Note: The Galaxy Repository node is the default installation location for the License Server. You
can, however, select a different node, or install the License Server on a standalone node, depending
on your system size and archit ecture.
Sentinel Manager: Sentinel is related to the new licensing system. The Sentinel Manager monitors
License Server and provides email notification of its status, while the Sentinel Agent monitors the
connection between each System Platform node and the License Server. The Sentinel Manager is a
new component and is not automatically added during the upgrade process. To add the Sentinel
Manager, upgrade the Galaxy Repository node first, and then use the Modi fy work flow to add the
Sentinel Manager when the upgrade completes. The Sentinel Agent is automatically added to each
upgraded node. Configure the S entinel Agent on each remote node to point to the Sentinel Manager.
See Sentinel Manager and Agent Installation on page 9 for additional information.
Only one Sentinel Manager is required.
InTouch Acce ss Anywhere: If you plan to upgrade Wonderware System Platform on a computer
that has InTouch Access Anywhere Server or InTouc h Access Anywhere Gateway installed, you
must first uninstall the InTouch Access Anywhere Server or Gateway. Then, upgrade Wonderware
System Platform and finally, reinstall InTouch Access Anywhere.
Machine Trust: System Platform Update3 includes the System Management Server, a new s ecurity
component that must be configured for all upgraded nodes to allow secure communications and
single sign-on (SS O). There should be only one System Management Server in your System
Platform topology, and every node should be configured to point to it. The System Management
Server is automatically added to the GR node. See Configuring the System Management Server on
page 34 for additional information. If some nodes will not be upgraded, communication with
non-upgraded nodes will continue to us e legacy communication protocols.
In multi-galaxy environments, configure only one GR node as the System Management Server, and
configure the other nodes to point to it.
About the Modify Workflow
The upgrade process can only upgrade System Platform components that are already installed on your
system. Since upgrading may introduc e new components that were not part of prior releases, you need
to run setup. exe and launc h the Modify option to install new components that are new in this release of
System Platform. New components that you may need to install through the Modify option include:
Sentinel Manager
License Server
To add new components through the Modify option
1. Upgrade the node and configure it.
2. Run the installation program again from the installation DVD (setup.exe).
3. Select the Modify option.
4. Select the component(s ) you want to install.
To upgrade a System Platform component
1. Insert the DVD into your DVD-ROM drive. Run setup.exe to start the set-up program. The startup
screen appears, followed by the upgrade feature dialog box that lists any prerequisites and products
to be upgraded. If new version of the .NE T Framework is required, it is installed first and then setup
resumes after a restart.
Note: You c an only upgrade the products that are already installed, and you will not be able to install
additional products during the upgrade process.
2. Click OK to proc eed, then wait for configuration to complete. If there are any recommended steps
that should be performed before continuing, they will be displayed.
3. Follow the instructions given and click Next. A list of all System Platform components appears. The
installed components that need to be upgraded are selected and disabled. You cannot clear these
check boxes or select more components during the upgrade.
4. Click Next. You may get a message to stop one or more running processes or services before
proceeding, such as the ArchestrA Watchdog Service. If this occurs, follow the on -screen
instructions, then click Retry. The upgrade dialog box appears.
5. Click Upgrade to proceed with the upgrade. The progress bar appears.
6. After the installation is over, the installation completed dialog box appears.
Select View Readme for important information about System Platform 2017 Update 3 SP1,
including hardware and soft ware requirements, new features, and known and resolved issues .
Select Configure to continue. You may see a Cybersecurity Notice.
For information on removing MSMXML 4.0, see the Microsoft Support web page:
https://support.microsoft.com/en-us/help/925672/ms06-061-security-update-for-microsoft-xml-c
ore-services-4-0-sp2
7. GR Node Upgrade: Always upgrade the GR node first. After upgrading the GR node, configure
licensing, ASB Security, and any other installed features that require configuration E XCEP T the
ArchestrA Service Bus. When you upgrade the GR node, a new ASB security framework is added.
This framework includes the AS B Management Server, which requires configuration. It is listed
under Arche strA Service Bus > Machine Setup in the Configurator. Do not attempt to configure
the ArchestrA Service Bus until you have run the Modify work flow. See Upgrading a Galaxy
Repository Node on page 76 for more information.
IDE and Run-Time Node Upgrade: Upgrade remote IDE nodes after upgrading the GR node, and
then upgrade run-time nodes. If you are upgrading either an IDE node or a run-time node, use the
Configurator to configure licensing, ASB Security, and any other installed features that require
configuration. See Upgrading an IDE -only Node on page 78 and Upgrading Run-Time Nodes on
page 79 for additional information.
If you are upgrading from a prior version of Application Server, and a galaxy is deployed, the Galaxy
Patcher will start as soon as you connect to the galaxy from the Application Server IDE. Undeployed
galaxies are not patched until you connect to them.
Important: Galaxy patching may take several minut es. Do not shut down the node while the patching
operation is in progress.
If you are upgrading from System Platform 2014R2 SP1, a new icon for the Wonderware Application
Manager is installed on the desktop.
Use Application Manager to select and run deployed InTouch OMI ViewApps.
C HAPTER 2
Security and Permissions
In This Chapter
Enhanced Security for Connecting to a Galaxy ............................................................................... 63
Modifying an ArchestrA User Account ............................................................................................ 63
SQL Server Rights Requirements .................................................................................................. 64
Setting the SQL Server Security Mode ........................................................................................... 65
Restoring Required SQL Server Accounts ...................................................................................... 66
Setting the FIPS Security Policy Option .......................................................................................... 67
Important: When you change or recreate the ArchestrA User Account, a system restart is required.
Close all applications and click OK to proceed.
Note: If you recreate the user account using the Change Network Account utility, the Microsoft Windows
security component on the computer can take several minutes to update this information on the
ArchestrA Galaxy Repository node. Until that occurs, the ArchestrA component may not function
properly. Restarting the Galaxy Repository node updates this information immediately.
Note: As is the case for the Change Network Account utility, you must have system administrator
privileges to run aaAdminUser.exe from the command prompt.
Caution: aaGalaxyOwner and ASBService are reserved OS user names. aaAdministrators and
ASBSolution are res erved OS group names. Do not creat e users or groups with these names.
Note: The aaGalaxyOwner account is the owner (dbo) of all Galaxy databases in your system. It does
not have a system login.
If you accidentally delete the aaAdministrators group or the ArchestrA User Account from the
Windows operating system, you can run either the Change Network Account utility or the SQL
Acce ss Configurator to restore it. You can access these utilities from the Start Menu, under the
Wonderware Utilities folder.
If you accidentally delete the aaGalaxyOwner account from the Windows operating sys tem, you
must run the SQL Acce ss Configurator to restore it.
If you accidentally delete the aaAdministrators group, ArchestrA User Account, or aaGalaxyOwner
from the SQL Server security logons, you must run the SQL Acce ss Configurator to restore it.
o <NodeName>aaAdminstrators (local security group that contains the ArchestrA Network User)
To change the SQL security mode with the SQL Access Configurator
WARNI NG! The SQL Acce ss Configurator automatically restarts the computer to ensure system
stability. If you press OK, you will not be able to cancel the restart.
Note: The system performs a check prior to changing to Enhanced Security Mode. This is to ensure
that at least one account will exist with the SQL sysadmin privilege after the change. If the system
check determines that no accounts with the SQL sysadmin privilege will remain after changing
modes, an error message will be displayed and security will remain in Legacy Mode.
C HAPTER 3
Configuring SQL Server
In This Chapter
SQL Server Requirements............................................................................................................. 69
Working with SQL Server Versions ................................................................................................ 70
Using a Non-Default Port for SQL Server ....................................................................................... 71
Note: SQL S erver Express is limited for use with small installations only (25,000 I/O per node or less).
For information about the versions of SQL Server supported by Application Server and other System
Platform products, see the System Platform Readme.
For more information about specific requirements for SQL Server configuration, see SQL Server Rights
Requirements on page 64, or see Microsoft document ation available online.
A support ed version of SQL Server must be installed on the computer designated as the ArchestrA
Galaxy Repository (GR) node before you install Application S erver. If you select a product or role
that requires the Galaxy Repository, and SQL Server is not installed on the computer, the installation
program will install SQL Server 2014 Express with Tools SP2.
You cannot install and use a GR on a computer that has both Micros oft SQL Server 2000 and
Microsoft SQL Server 2008 or later versions installed.
The GR locks the SQL Server maximum memory usage to 65% of the computer's physical memory.
TCP/IP must be enabled on the computer hosting a SQL Server database. The TCP/IP protoc ol
setting can be verified from the SQL Server Network Configuration under SQL Server Configuration
Manager. Do the following steps to enable TCP/IP.
To enable the TCP/IP protocol for the SQL Server database instance
1. Open the SQL Server Configuration Manager.
2. In the tree pane, click SQL Server Services.
3. If any servic es are displayed in the results pane, verify that each service under is in the Running
state.
If a service is Stopped, right-click the name of the service, and click Start.
4. In the tree pane, click SQL Server Network Configuration to expand it, and then click Protocol s
for MSSQLServer/<InstanceName>.
If you specified the default instance during installation, the instance name will be MSSQLS ERVER.
5. In the results pane, verify that each protocol is Enabled:
Shared Memory
Named Pipes
TCP/IP
If Di sabled appears, right-click on the protocol name and enable it.
6. In the tree pane, click SQL Native Client Configuration to expand it, and then click Client
Protocol s.
7. In the results pane, verify that each client prot ocol is Enabled:
Shared Memory
Named Pipes
TCP/IP
If Di sabled appears, right-click on the protocol name and enable it.
8. If you had to enable any services:
a. Start Task Manager.
b. Go to the Services tab.
c. Restart MSSQLServer/<InstanceName>.
Note: Nodes are defined as follows: Small = up to 25,000 I/O per node; Medium = 25,000 to 50,000 I/O
per node; Large = 50,000 to 400,000 I/O per node.
4. In the list of protocol names to the right, select and open TCP/IP Properties.
6. Change the TCP Port number from 1433 to the desired number.
7. Click OK or Apply to commit the changes.
8. Reboot the GR node.
C HAPTER 4
Application Server Upgrade
Direct upgrade to Application Server 2017 Update 3 SP1 is supported from:
Application Server 2017 Update 3
Application Server 2017 Update 2
Application Server 2017 Update 1
Application Server 2017
Application Server 2014 R2 SP1 Patch 02 (Patch 01 was for Historian)
Application Server 2014 R2 SP1
In This Chapter
About Upgrading Application Server............................................................................................... 73
Basic Upgrade S equence .............................................................................................................. 76
Upgrading a Galaxy Repository Node ............................................................................................ 76
Upgrading an IDE-only Node ......................................................................................................... 78
Migrating the Galaxy Database ...................................................................................................... 78
Upgrading Run-Time Nodes .......................................................................................................... 79
Upgrading Redundant Pairs .......................................................................................................... 80
Upgrade Considerations for Multi-Galaxy Communication ............................................................... 84
Issues with Legacy Common Components ..................................................................................... 84
Note: The Galaxy Repository node is the default installation location for the License Server. You
can, however, select a different node, or install the License Server on a standalone node, depending
on your system size and archit ecture.
Sentinel Manager: Sentinel is related to the new licensing system. The Sentinel Manager monitors
License Server and provides email notification of its status, while the Sentinel Agent monitors the
connection between each System Platform node and the Licens e Server. The Sentinel Manager is a
new component and is not automatically added during the upgrade process. To add the Sentinel
Manager, upgrade the Galaxy Repository node first, and then use the Modi fy work flow to add the
Sentinel Manager when the upgrade completes. The Sentinel Agent is automatically added to each
upgraded node. Configure the S entinel Agent on each remote node to point to the Sentinel Manager.
See Sentinel Manager and Agent Installation on page 9 for additional information.
Only one Sentinel Manager is required.
InTouch Acce ss Anywhere: If you plan to upgrade Wonderware System Platform on a computer
that has InTouch Access Anywhere Server or InTouc h Access Anywhere Gateway installed, you
must first uninstall the InTouch Access Anywhere Server or Gateway. Then, upgrade Wonderware
System Platform and finally, reinstall InTouch Access Anywhere.
Machine Trust: System Platform Update3 includes the System Management Server, a new s ecurity
component that must be configured for all upgraded nodes to allow secure communications and
single sign-on (SS O). There should be only one System Management Server in your System
Platform topology, and every node should be configured to point to it. The System Management
Server is automatically added to the GR node. See Configuring the System Management Server on
page 34 for additional information. If some nodes will not be upgraded, communication with
non-upgraded nodes will continue to us e legacy communication protocols.
In multi-galaxy environments, configure only one GR node as the System Management Server, and
configure the other nodes to point to it.
About the Modify Workflow
The upgrade process can only upgrade System Platform components that are already installed on your
system. Since upgrading may introduc e new components that were not part of prior releases, you need
to run setup. exe and launc h the Modify option to install new components that are new in this release of
System Platform. New components that you may need to install through the Modify option include:
Sentinel Manager
License Server
To add new components through the Modify option
1. Upgrade the node and configure it.
2. Run the installation program again from the installation DVD (setup.exe).
3. Select the Modify option.
4. Select the component(s ) you want to install.
If you plan to upgrade system components in addition to Application Server, keep the following in mind:
After Application Server is installed, operating system migration is not supported, with the following
upgrade exceptions:
o Windows 8 to Windows 8.1
o Windows 8.1 to Windows 10
o Windows Server 2012 to Windows Server 2012 R2
Other than the above exceptions, System Platform products must be uninstalled prior to upgrading
the operating system.
You can upgrade SQL Server after Application Server is installed. Refer to Microsoft’s SQL Server
resources for guidelines and procedures.
To upgrade SQL Server aft er Application Server is installed, we recommend that you undeploy any
galaxies deployed on the relevant comput er, and that you undeploy all ArchestrA Service Bus (ASB)
services. For more information, see the Application Server User Guide.
You can upgrade the following Application Server components:
Bootstrap
You will see a warning message if you attempt to upgrade a comput er with a deployed WinPlatform.
You have the choice to continue with the upgrade or to cancel. If you continue with the Bootstrap
upgrade, the deployed WinPlatform object is removed from run time and upgraded.
If an InTouchViewApp instance is deployed for a managed InTouch application, the folder is
undeploy ed and deleted. You are prompted to stop InTouch WindowViewer from running the
managed application.
IDE and Bootstrap
You will see a warning message if you attempt to upgrade a comput er with a deployed WinPlatform.
You have the choice to continue with the upgrade or to cancel. If you continue with the upgrade, the
current IDE and Bootstrap are removed and the new versions are installed.
If an installed InTouchViewApp instance is deploy ed for a managed InTouch application, the folder is
undeploy ed and deleted. You are prompted to stop InTouch WindowViewer from running the
managed application.
Galaxy Repository (GR) and Bootstrap
You will see a warning message if you attempt to upgrade a computer with a deployed WinPl atform
or a client application is connected to the GR node. You can choose to continue wit h the upgrade or
to cancel. If you continue, the components are removed and upgraded.
Upgraded IDE/Client nodes cannot connect to a non-upgraded GR node. The GR node is
undeploy ed before it is upgraded.
IDE, GR, and Bootstrap
A warning message is displayed if you attempt to upgrade a computer with a deployed WinPlatform
or if a client application is connected to the GR node. You can choose to continue with the upgrad e or
to cancel. If you continue, all components are removed and upgraded.
Run-time node
Upgrading the Bootstrap on any comput er removes the running WinPlat form and AppEngine. Both of
these system objects are marked as undeployed if they are running on any Galaxy node.
Note: No system objects are removed on non-GR nodes when migrating from earlier versions of
Application Server.
If a remote node is disconnected from the GR node, or if you upgrade the remot e node before you
upgrade the GR node, the remote Plat form is not marked as undeployed. You must undeploy and
redeploy the Platform.
The run-time functionality of Application Server continues throughout the upgrade process, except
during a run-time node upgrade. Configuration, however, must be done using components that are at the
same version level. For example, you cannot use the Galaxy Brows er in the InTouch HMI on a
non-upgraded node to view or select attributes from an upgraded Galaxy. You can, though, view or
modify run-time dat a using an InTouch window or the Object Viewer.
Special considerations apply if you are upgrading both the Application Server and the Historian. For
more information, see Upgrading from a Previous Version on page 125.
.NET 4.7.2 is installed if it or a later version is not already present. You will be prompted to restart your
computer aft er the .NE T framework is installed.
The basic upgrade steps are:
1. Upgrade your hardware and prerequisite software such as the operating system or Microsoft
SQL Server to the required versions. For information on hardware and soft ware requirements, see
the System Platform Readme file.
If you are upgrading the SQL Server database on the GR node, you must undeploy the GR node
before starting the SQL Server upgrade.
2. Upgrade and configure the GR node. To add the ASB Management S erver to the GR node, do not
Configure ASB Security at this time. Run Setup.exe after upgrading the node and use the Modify
option to add the Management Server, then configure ASB Security. For more information, see
Upgrading a Galaxy Repository Node on page 76.
3. Upgrade and configure at least one IDE installation. If you upgrade the GR node, that IDE
installation is upgraded. However, if you have any IDE-only nodes, you will have to upgrade them
separately. For more information, see Upgrading an I DE-only Node on page 78.
4. Migrate the Galaxy database. Connect to the upgraded GR node from the upgraded IDE to migrate
the galaxy to the new version automatically.
5. Deploy the GR Platform.
6. Upgrade and configure run-time nodes.
Upgrade non-redundant run-time nodes one at a time and redeploy them. For more information,
see Upgrading Run-Time Nodes on page 79.
Upgrade redundant pairs one at a time. For more information, see Upgrading Redundant Pairs
on page 80.
If you upgrade a remote Platform node before you migrate the Galaxy database, the remot e Platform and
hosted objects show the software upgrade pending icon after you migrate and deploy the Galaxy. To
resolve this, undeploy and redeploy the remote Plat form.
Important: After you have upgraded the GR node to Application Server 2017 Update 3 SP1, you will not
be able to deploy or undeploy from the GR node to non-upgraded remote nodes. Also, an IDE node that
has been upgraded will not be able to connect to a GR node that has not been upgraded.
Note: As long as the operating system and SQL requirements are met, upgrade is supported. During
software installation, operating system upgrade is not supported.
When you upgrade a GR node, the local Platform and all hosted objects are undeployed and the
database schema is migrated from the existing schema to the Application Server 2017 Update 3 SP1
schema. Existing data from the GR is also migrat ed to the new schema.
You must upgrade all Application Server components (IDE, Bootstrap, and GR) to the same version that
are installed on the GR node.
Important: In multi-galaxy environments, add a Management Server to only one GR node, and
configure the other nodes to point to it.
5. Close the Configurator. When you see the prompt to restart the computer, select Restart Later.
6. Run setup.exe again. The Modify, Repair, Remove dialog box is displayed.
7. Select Modify, then click Next.
8. Select any new components that you want to add to the Galaxy Repository node, such as
License Server
Sentinel Manager
9. When the Modify process completes, click Finish to close the Modify dialog box. The Cybers ecurity
notice may be displayed (see Upgrading System Platform on page 58, step 6).
10. From the Windows Start menu, open the Configurator.
11. Configure any new components that require configuratio n, then close the Configurator. See
Configuring System Platform Components on page 32 for additional information.
12. Follow the prompts to complete the upgrade.
13. When the GR node has been upgraded, open the IDE and connect to the galaxy. The galaxy will be
automatically migrated to System Platform 2017 Update 3 SP1.
Note: If you are using a remote IDE node to connect to the galaxy, make sure that you have
upgraded the IDE node before connecting to the galaxy.
If you have IDE -only installations on nodes other than the GR node, you need to upgrade them
separately.
Important: An IDE node that has been upgraded will not be able to connect to a GR node that has not
been upgraded. Conversely, an IDE node that has not been upgraded cannot connect to a GR node that
has been upgraded.
After you upgrade the GR and IDE, all run-time nodes continue to run. This enables you to upgrade the
run-time nodes individually when it is convenient.
Important: After you have upgraded the GR node, and you have migrated the galaxy, you will not be
able to deploy or undeploy from the GR node to remote nodes. Also, an upgraded IDE node will not be
able to connect to a GR node that has not been upgraded.
Upgrading a run-time node will remove (undeploy) any deployed Platforms from that node.
After you upgrade and then deploy a run-time node, it continues to function with other run-time nodes as
long as the ot her nodes are the current version or from the previous version.
The run-time node does not function while you are upgrading it. You cannot roll back the upgrade.
After you upgrade the run-time node and all hosted objects, you need t o redeploy the WinPlat form and all
hosted objects to the node.
The GR node migration fails if the GR node is used as a run-time node for another GR.
1 Upload Changes
run-time made at
changes run-time now
stored in the
database.
5 Optional: InTouch
Open and ViewApps
migrate now at v2.
InTouch
ViewApps
8 Cascade E1b
Deploy P2 becomes
active;
E1 becomes Note: This hosted
undeploy ed. action results objects are
E1 shows as in a brief now running
undeploy ed, downtime for under v2.
but objects objects on
under E1 E1 and E1b Note: E1b
show as as E1 does NOT
deployed. becomes start from the
undeploy ed check-
(a few pointed state
seconds to a of non-
few minut es, upgraded
depending E1.
on number of
objects).
9 Upgrade P1 becomes
(with undeploy ed.
AppServer
deployed but
shut down)
10 Cascade E1 is No down-
deploy P1 deployed as time for
part of P1 objects on
deployment. E1b as E1b
continues to
E1 starts as
run as active.
standby and
fully syncs
with active
engine.
--- Final state Deployed. E1 Deployed E1b
– Standby. Deployed –
Active.
After you have upgraded to System Platform 2017 Updat e 3 SP 1, you can enable CPU load balancing to
improve the performance of redundant AppE ngines during failover. See the Application Server User
Guide, Working with Redundancy, for additional information.
The following table describes the behaviors associated with specific upgrade actions and states.
Cascade deploy a Platform If the upgraded platform hosts a backup redundant engine with a
after upgrade partner in the SUP state, then during the deploy operation, it will
extract the hosted objects from the partner and deploy them
along with the backup redundant engine.
Multi-selection for a cascade The cascade deploy operation skips the redundant engine in
deployment includes a SUP state and logs a message.
redundant engine with a
partner in S UP state
Select a backup redundant The backup redundant engine extracts the hosted objects from
partner engine for deployment the primary redundant engine and deploys them along with the
backup redundant engine.
The hosted objects are under the primary redundant engine on a
partner platform which is in S UP state. The hosted objects will be
forced to deploy with the newer software version during the
deployment of the backup redundant engine.
A dialog displays with the option to continue deployment or to
cancel.
Setting up a multiple galaxy environment requires a unique name for each galaxy in the environment.
This may require you to rename one or more galaxies if you plan to include galaxies with the same name
in your multi-galaxy communication environment. We recommend performing all necessary renaming
prior to upgrading System Platform. This will prepare your galaxies for use in a multi -galaxy environment
without disrupting the upgrade workflow.
Important: It is very import ant that you follow the galaxy name change procedure provided in the
following steps and in the Application Server User Guide. You must create a new galaxy with a new,
unique name, from a backup .cab file rather than creating a galaxy and performing a restore of the
backup .cab file.
For more information about creating and backing up galaxies, see "Getting Start ed with the IDE," and
"Managing Galaxies," in the Application Server User Guide.
To rename a galaxy for use in a multi-galaxy environment
1. Select a galaxy with a duplicate name, undeploy it and back it up to create a .cab file.
2. Use the .cab file as a "template" by placing it in \Program
Files\ArchestrA\Framework\Bin\BackupGalaxies.
3. Create a new galaxy with a new name, based on the backup .cab file. The name must be uni que, not
in use anywhere else in the multi-galaxy environment.
4. Repeat the preceding steps for each galaxy to be renamed with a unique name.
5. Redeploy each newly creat ed galaxy.
6. Delet e the original galaxy from the GR node.
7. Upgrade to Application Server 2017 Update 3 SP1.
Your galaxy can now be configured for use in a multi-galaxy environment.
C HAPTER 5
InTouch HMI Requirements and
Prerequisites
You need to meet the requirements and prerequisites for products.
In This Chapter
Installing OI Gateway and Upgrading from FS Gateway ................................................................. 85
After upgrading from InTouc h 2014 R2 SP1, two new Gat eway servers are installed. The first OI
Gateway is installed under Operations Integration Supervisory Servers as OI.GA TEWAY.n. A
second instance replaces the existing FS Gateway instance, but preserves the existing configuration
and name, even though FS Gateway has been delet ed and the new OI Gat eway has been installed
in its place. Since the new gateway instance is in a deactivated state, you must activate it (select the
instance, right-click, and select "Activat e Server").
Note that the component names are changed from "FSGateway" to "Gateway." This does not affect
references or change the behavior of the gateway.
C HAPTER 6
Historian Server Requirements and
Recommendations
For the Historian to achieve maximum performance, make sure your hardware and soft ware meet the
following requirements. Because the Historian is a high-performance relational dat abas e, it is also
important to size your system to handle the level of data that you expect to store.
The Historian is tightly integrated with Microsoft products, and a working knowledge of both Microsoft
SQL Server and Microsoft Windows operating systems is required. For more information on Microsoft
SQL Server or Windows operating systems, see your Microsoft documentation.
In This Chapter
Server Requirements .................................................................................................................... 91
Requirements for Historian Management Tools .............................................................................. 93
Remote IDAS Requirements.......................................................................................................... 93
Disk Sizing and Data Storage ........................................................................................................ 94
Performance Considerations ....................................................................................................... 100
Networking Rec ommendations .................................................................................................... 102
Client Access ............................................................................................................................. 103
Support for Non-English Operating Systems................................................................................. 103
Integration with Other Wonderware Products ................................................................................ 104
System Sizing Examples ............................................................................................................. 104
Server Requirements
The minimum hardware and software requirements for the Historian are based on the tag count and the
anticipated data throughput rate. These requirements are divided int o four levels, which are outlined in
this section.
The recommended memory configuration for SQL Server (32 -bit) is to clamp memory consumption to 50
percent of the amount of physical memory installed on the server or 512 MB, whichever is larger. For
SQL Server Standard and Enterpris e editions (32 -bit), the recommended physical memory configuration
is 1 GB. The recommended Windows virtual memory setting is twice the amount of physical RAM
installed on the server. For installation requirements for SQL Server versions, see the Microsoft
documentation.
You need to ens ure that the memory that SQL Server res erves for the Historian is adequate for the
expected load. Based on your particular environment, you may need to adjust the SQL Server
MemToLeave allocation. For more information on MemToLeave, see the Microsoft documentation.
You can install the Historian on operating systems that have the User Account Control (UA C) turned on.
If you are running the Historian on a virtual server, the historian must ha ve an adequate CPU, adequate
network memory, and disk I/O resources at all times. Overloading the virtual server leads to
unpredictable behavior. See System Sizing Guidelines on page 10 for general hardware requirements.
Operating Systems
Any support ed operating system. See the AVEVA Global Customer Support (GCS ) Technology Matrix.
Note: The Historian Data Importer is installed as part of the server installation.
The IDAS computer does not necessarily have to be as powerful as the server computer, because it will
not be performing all of the same functions (for example, processing SQL Server transactions), but it
should be powerful enough to handle the tag load that you expect.
The amount of free disk space required depends on whether or not you will have store-and-forward
enabled for the IDAS. If store-and-forward is enabled, you need to make sure that the disk space on the
remot e IDAS computer is sufficient to store cached data if the network connection to the historian fails.
Estimate the disk space requirements for a remote IDAS as that of the historian. For more information,
see Disk Space Requirements for Historical Data Files on page 96.
A remote IDAS configured for store-and-forward has more stringent requirements on memory to ens ure
that the IDAS local storage engine has sufficient res ources to run properly. In general, estimate memory
requirements for a remote IDAS configured for store-and-forward the same as you would for a historian
having the corresponding tag count.
Note: A remote IDAS only requires the same administrative account to exist on the local comput er and
the historian. It is not required for you to log on to the remote IDAS computer using the administrator
account.
If you change the Windows login using the System Management Console, after installing the historian,
make sure that the user account change is reflected on the remote IDAS computer.
If you are running the historian in a domain environment (recommended), you can create the
administrative user account on the domain controller and add the account to the Administrators group on
the historian computer and the remote IDAS computer. Do not create a local user on any comput er with
the same name and/or password as the administrative us er account.
If you are running a remote IDAS in a workgroup environment, there is no centralized management and
authentication of user accounts (no domain controller). Create the same administrative user account on
each individual computer running a historian component. For example, if you have a computer running
the historian and plan to install remote IDASs on t wo other computers, creat e the user account (that is,
matching user nam es and passwords) on all three computers.
For information on work groups, domains, creating user accounts, and adding accounts to the
Administrators security group, see your Microsoft operating system documentation.
How much is the SQL Server component of the historian expected to be used (for example, for the
event system)?
How long can the system be off-line because of a component failure?
What happens if the system stops storing dat a?
What happens if stored data is lost because of a hard drive failure?
Can the server equipment be taken off-line to perform repairs ?
Ask yourself questions like these to help you determine disk space requirements and how you should
plan to protect your data.
A performance report for different historian systems is provided in S ystem Sizing E xamples on page 104.
Note: Historical plant data is not stored in the database files. This type of data is stored in special files
called history blocks.
The Runtime database stores all historian configuration data and classic event data. The information
in the Runtime database is stored to disk as a databas e file named
RuntimeDat_116_<server_name>.mdf. Its associated log file is
RuntimeLog_116_<server_name>.ldf.
The configuration data in the dat abase file remains relatively static and usually never causes the file
size to go above 20 MB. However, if you set up classic events, records of event detections and the
results of any data summaries or snapshots increas e the size of the Runtime database file because
the tables are filling up. Also, entries are created in the log file for event -relat ed transactions. If the
database files are set to auto-size, the Runtime database file expands to accommodate
event-related dat a until the hard drive is full.
Note: In a 2, 000, 000 t ag system, 2.5 GB of space should be preallocated for data files when modification
tracking is not used. When modification tracking is used, 20 GB should be preallocated.
The Holding dat abas e temporarily stores tag definitions being imported from InTouc h® HMI
software. The information in the Holding database is stored to a database file named
HoldingDat_116_<server_name>.mdf. Its associated log file is
HoldingLog_116_<server_name>.ldf.
The A2ALMDB database stores alarm and event data. The information in the A2ALMDB databas e is
stored to a database file named A2LMDat _115_<server_name>.mdf. Its associated log file is
A2ALMDB _LOG.ldf.
The Runtime and Holding databases are set to automatically expand at a 10% rate (the default).
You cannot change these defaults during the installation. The dat abas es can be resized later using
Microsoft SQL Server utilities. For more information on sizing databases, see your Microsoft SQL Server
documentation for guidelines.
Note: If you are upgrading a previous version of the Historian, the installation program needs space to
save a copy of the old Runtime database while it creates the new one. To upgrade, the database space
required is twice the size of the old database, plus the database size for the new install.
Important: You must have sufficient disk space in the circular storage area to hold at least two full
history blocks, plus the space specified for the minimum thres hold for the circular storage area. Use the
System Management Console to view or change the minimum threshold value.
A performance report for different historian systems is provided in S ystem Sizing E xamples on page 104.
Analog - Integer 8 34
Analog - Double 12 38
Discrete 5 31
Analog Summary 37 63
The storage size is used for estimating the space required for storage.
The network transmission size is used for calculating the net work bandwidt h required between HCA L
and the historian.
If you enable compression on the AppEngine from which events are originating, then the net work size is
reduced by approximately 80%.
For alarms and events, the network transmission size assumes that the average name length for each of
the alarm properties is 20 characters.
The following table provides some sizing examples.
Note: Current space calculations are different than the calculations used by the classic storage system.
For retrieval performance, it is better to have longer block durations. However, if the incoming data rate is
too high during a 24-hour period, the Original.dat file in which data collects may grow so large that issues
occur for history block management and ot her aspects of the storage subsystem.
We recommend that you tune the history block duration so that the size of the Original.dat file does not
exceed 8 GB per history block.
You can estimate how many bytes this data rate generates in one hour by using the following formula:
N kbps = (N / 8) bytes per second = (450 * N) bytes per hour
Where N is the transmission item size for the type of data that you are storing. For information on
calculating this number, see Storage and Net work Transmission Sizes for Tags on page 96.
If you multiply this by the history block duration, you can get an estimate of the biggest data file
containing streamed and forwarded data, Original.dat.
If that estimate is larger than 8 GB, keep reducing the history block duration until the estimate is under
the 8 GB limit.
Discrete Tags 5
State Summary for String (10 states and 32 byte string) (1 + 32) * 10 = 330
Performance Considerations
For a complete Historian system, the following components put a demand on memory.
Internal historian subsystems, such as the Configuration Manager, data acquisition, and data
storage
The associated Microsoft SQL Server
The operating system
Client access (data retrieval), whic h includes caching
When det ermining the amount of memory to purchase, remember that adding more memory is the
cheapest and easiest thing that you can do to improve performance. Increasing the amount of memory
reduces the amount the server has to use virtual memory, thus lowering the load on the storage
subsystem. Even if you have a large amount of memory, additional memory is used as additional disk
cache, speeding up disk access and therefore file service. Also, processes needed by the server
become faster because they are memory-resident.
A major factor in system performance is the amount of plant dat a you anticipat e storing in the system,
including considerations about how oft en that data is stored and retrieved. In general, the more you
store, the more often you store it, and the more you retrieve it, the slower the system. The major storage
factors affecting the performance of the system are:
Effective anal og flow rate (analog updates per second).
Period of online data storage required.
Effective discret e variable flow rate.
Server Loading
When a user connects to the Historian wit h a client, configuration information is immediately requested
from the historian. This information includes the tags that the server stores, their descriptions,
engineering units, and ot her tag data. SQL Server reads this information from the database (stored on
disk) and places it in memory.
As the user selects time periods to trend, the historian reads data from files located on the disk and
prepares the res ults of the client's data request to be transmitted back to the client. The ability of the
server to quickly handle subsequent requests for data from the same client and others is dependent on
the server's ability to keep as much information in memory without having to again access data from the
disk.
As a higher load is placed for memory, a higher load is placed on the disk I/O system as the s erver has to
use disk caching and read from the data files.
The following table summarizes the loading for various systems.
Acquisition and Base load of the historian. This load exists as long as the system is running.
storage However, this load is not affected by client activity.
Retrieval Variable loading caused by data ret rieval from client applications. When the
client initially connects, the data requested is configuration data, which is
stored in SQL Server. The historian requests data from SQL Server, causing
its loading to increase. As the client requests historical data, the disk time
increases as information from the data files is transferred to memory. This
continues as the client requests additional data. If the client application
requests data that has already been transferred to memory, there is no
associated disk activity and trans fer of data to memory.
The server must be able to adequately handle the variation on loading caused by the client applications.
To accomplish this, make sure that your hardware is sized so that it can handle the base load creat ed by
the acquisition and storage systems and that there are adequate resources still available for the retrieval
system.
IDAS Performance
An IDAS can ac quire an unlimited number of real -time data values, from an unlimited number of I/O
Servers, each with an unlimited number of topics. However, IDASs are subject to the following
limitations.
The maximum sustained data throughput for any single IDAS is 30,000 items per second for
real-time dat a. For late or old data, the maximum throughput is 9,000 items per second. The total
combined throughput (real-time data plus late or old data) cannot exceed 30,000 items per second.
For higher-volume applications, you can set up multiple IDASs to serve a single storage subsystem.
Tiered Historians
If you are installing a tiered historian, tier-1 nodes use the same basic configuration for the number and
types of tags and data collection rates.
The tier 1 configuration should be "delta" data collected and stored:
12,000 analog tags every 2 seconds
2,900 discrete tags every 2 seconds
100 32-character string tags every 30 seconds
For the analog and discrete tags, the averages and value state aggregates are:
6000 tags with an hourly calculation performed at the top of each hour
6000 tags with 1-minute calculations performed at the top of each minute
plus
1500 tags replicated (not aggregat ed) in tier 2
1500 tags stored only in tier 1 (no aggregates or replication)
Networking Recommendations
The Historian is a highly configurable package that can be set up in many different ways depending on
your needs.
The Historian can use any prot ocol currently supported by Microsoft SQL Server 2012. You can use the
default Microsoft SQL Server 2012 protoc ol (named pipes) with TCP/IP. TCP/IP is required if S uiteLink™
is used.
Do not use the historian computer as a domain controller.
It is highly recommended that you run the historian on a dedic ated computer. For example, running the
historian on a mail server or an Internet server may impact performance.
Generally, it is recommended that you split the process and IS networks to ensure that the process
network does not become overloaded. The following illustration shows one possible network architecture
where the historian is the link between the process net work and the business LAN/WAN
For this architecture, install two network cards on a server computer and configure them to segment the
IS network from the process network.
Note: All tags to be stored in historian are on "advise" all the time. This may cause heavy load conditions
on the process network. Before you install the historian, investigate the possible load impact of installing
the historian on your net work.
Client Access
All clients should connect to the Historian using the default Microsoft SQL Server connection. Usually,
this means using the name of the computer on which the historian is running as the server name when
logging on.
To change the default network prot ocol used by Microsoft SQL Server to somet hing ot her than named
pipes, configure the client network access using the SQL Server Client Network Utility. For more
information, see your Microsoft SQL Server documentation.
German
Frenc h
Japanese
Simplified Chinese
The following entities are not supported in double-byte languages:
Domain names, user names, and passwords (including SQL Server login names and passwords).
Names of I/ O Server host machines, I/O Server application names, topic names, and item names.
Any text associated with licensing.
Important: The information presented here is a guideline only. The actual results in your environment
may vary.
Tag Information
Tag count (total) = 5,187
Analog tags = 2,607
Discrete tags = 2,285
String tags = 295
Manual tags = 17
Update rate of +/- 5,000 updates/second
Remote IDAS
None.
Event Information
3 snapshot events, each having:
o 1 analog snapshot
o 1 discrete snaps hot
o 1 string snapshot
2 summary events, each having:
o 1 AVG calculation (1 tag every 8 hours)
o 1 MA X calculation (1 tag every 8 hours )
o 1 MIN calculation (1 tag every 8 hours)
o 1 SUM calculation (1 tag every 8 hours)
1 SQL insert every 4 hours
2 SQL multi-point updat es every hour
Query Load
For the following seven queries, each are occurring at different times in the hour:
1 query (trend):
o live mode - 1 second updat e
o 1-hour duration
o 10 tags (7 analogs, 3 discretes)
1 query: 1-hour range / hour (1 tag)
4 queries: 15-minut e range / hour (1 tag)
1 query: 24-hour report every 24 hours (25 to 30 tags)
Performance Results
Category Value
Category Value
Uncompressed hard drive disk space per history block (MB) 1002
Tag Information
Tag count (total) = 63,000
Analog tags = 39,359
Discrete tags = 19,734
String tags = 295
Manual tags = 5,057
Update rate of +/- 30,000 updates/second
Remote IDAS
One remote IDAS:
P4 1.7 GHz
1 GB RAM
34,000 tags via the rem ote IDAS and the rest via the local IDAS
Note: Because this configuration was used for performance and stress testing, the remote IDAS tag
count is more than the recommended 30,000 maximum.
Event Information
3 snapshot events, each having:
o 1 analog snapshot
o 1 discrete snaps hot
o 1 string snapshot
Query Load
For the following seven queries, each are occurring at different times in the hour:
1 query (trend):
o live mode - 1 second updat e
o 1- hour duration
o 10 tags (7 analogs, 3 discretes)
1 query: 1-hour range / hour (1 tag)
4 queries: 15-minut e range / hour (1 tag)
1 query: 24-hour report every 24 hours (25 to 30 tags)
Performance Results
Category Value
Uncompressed hard drive disk space per history block (GB) 4.12
Tag Information
Tag count (total) = 133,941
Analog tags = 73,600
Discrete tags = 53,560
String tags = 6920
Update rate of +/- 50,000 updates/second
MDAS
In the total tag count, 4009 tags originated from Application Server.
Remote IDAS
Two remote IDASs:
Remote IDAS 1: P4 1.9 GHz, 1 GB RAM
Remote IDAS 2: P4 2.5 GHz, 512 MB RAM
44,370 tags via the remote IDAS 1
45,584 tags via the remote IDAS 2
44,383 tags via the local IDAS
Note: Because this configuration was used for performance and stress testing, the remote IDAS tag
counts are more than the recommended 30,000 maximum.
Event Information
3 snapshot events, each having:
o 1 analog snapshot
o 1 discrete snaps hot
o 1 string snapshot
2 summary events, each having:
o 1 AVG calculation (1 tag every 8 hours)
o 1 MA X calculation (1 tag every 8 hours )
o 1 MIN calculation (1 tag every 8 hours)
o 1 SUM calculation (1 tag every 8 hours)
1 SQL insert every 4 hours
2 SQL multi-point updat es:
o 1 every 15 minutes
o 1 every 30 minutes
Query Load
For the following seven queries, each are occurring at different times in the hour:
1 query (trend):
o live mode - 1 second updat e
o 15-minute duration
Performance Results
Category Value
Tag Information
Tag count (total) = 2,000,000
Analog tags = 1,000,000
Discrete tags = 900,000
String tags = 100,000
Update rate of +/- 150,000 updat es/second
Query Load
The following query is occurring at different times in the hour:
1 query (trend):
o live mode - 1 second updat e
o 15-minute duration
o 500 tags (250 analogs, 225 discretes, 25 strings)
Performance Results
Category Value
The 400 Kbps data transfer limit reflects a typical data transfer speed between remote locations over the
Internet. The data transfer from each tier-1 historian to a tier-2 historian is assumed to be through a
dedicated 400 Kbps connection; multiple tier-1 historians do not share the same 400 Kbps connection. It
is assumed that the 400 Kbps is a bandwidth that can be fully used.
Loading Information
Assume that the total tag count on the tier-1 historian is 15,000.
The tier-1 historian receives 15,000 tags from I/O Servers of the following types and data rates:
12,000 4-byte analog delta tags changing every 2 seconds: (10,000 always fitting the real -time
window and 2,000 falling outside of the real-time window being 50 minutes late).
2,800 1-byte discret e delta tags changing every 2 seconds
200 variable-length string delta tags of 32-character length changing every 30-seconds
The tier-2 historian stores the following:
6,000 tags with hourly analog summary calculations performed at the top of each hour (using 6,000
4-byte analog tags as tier-1 tags)
Another 6,000 tags with 1-minute analog summary calculations performed at the top of each minute
(using 6, 000 4-byte analog tags as tier-1 tags)
1,500 tags replicated (as simple replication) to tier -2 (using 1, 400 1-byte discret e tags and 100
variable-lengt h string delta tags as tier-1 tags)
Another 1,500 tags only stored on tier-1 (using 1, 400 1-byte discrete tags and 100 variable-length
string delta tags as tier-1 tags)
Latency Results
Category Value
Category Value
Latency is the difference in time between when the value is received by the tier-1 historian and when it is
received by the tier-2 historian.
100-Base T
Tier-1 Historians
(standard configurations)
Loading Information
Assume that the total tag count on the tier-1 historian is 15,000.
The tier-1 historian receives 15,000 tags from I/O Servers of the following types and data rates:
12,000 4-byte analog delta tags changing every 2 seconds: (10,000 always fitting the real -time
window and 2,000 falling outside of the real-time window being 50 minutes late).
2,800 1-byte discret e delta tags changing every 2 seconds
200 variable-length string delta tags of 32-character length changing every 30-seconds
The tier-2 historian stores the following:
6,000 tags with hourly analog summary calculations performed at the top of each hour (using 6,000
4-byte analog tags as tier-1 tags)
Another 6,000 tags with 1-minute analog summary calculations performed at the top of each minute
(using 6, 000 4-byte analog tags as tier-1 tags)
1,500 tags replicated (as simple replication) to tier -2 (using 1, 400 1-byte discret e tags and 100
variable-lengt h string delta tags as tier-1 tags)
Another 1,500 tags only stored on tier-1 (using 1, 400 1-byte discrete tags and 100 variable-length
string delta tags as tier-1 tags)
Latency Results
Category Value
Latency is the difference in time between when the value is received by the tier-1 historian and when it is
received by the tier-2 historian.
Loading Information
In the tier-1 historian modem configuration, the tier-1 historian receives 3,000 tags from I/O Servers of
the following types with average updat e rate 300 items per second:
1,500 4-byte analog delt a tags (1,400 always fitting the real -time window and 100 falling outside of
the real-time window being 50 minutes late)
1,350 1-byte discret e delta tags
150 variable-length string delta tags of 32 bytes each
Latency Results
Category Value
Latency is the difference in time between when the value is received by the tier-1 historian and when it is
received by the tier-2 historian.
C HAPTER 7
Historian Server Installation and
Configuration
In This Chapter
Preparing for the Historian Installation .......................................................................................... 117
Microsoft SQL Server Installation ................................................................................................. 117
Historian Installation Features...................................................................................................... 118
About Historian Installation .......................................................................................................... 119
Testing the Installation ................................................................................................................ 120
Antivirus Software....................................................................................................................... 120
Historian Menu Shortcuts ............................................................................................................ 120
Repairing the Historian................................................................................................................ 120
Modifying the Historian Installation ............................................................................................... 121
Uninstalling the Historian............................................................................................................. 124
Upgrading from a Previous Version.............................................................................................. 125
Configure the following Microsoft SQL Server options before installing the historian. If you already have
Microsoft SQL Server installed, you can run the Microsoft SQL Server setup program to change these
options. Microsoft SQL Server options should only be configured by a qualified Windows or SQL Server
administrator. For more information, see your Microsoft SQL Server documentation.
Microsoft Client Utilities must be installed.
The historian must run with the Microsoft SQL Server default instance name (that is, the computer
name).
During the Database Engine Configuration step of the SQL Server installation, make sure t o add the
ArchestrA User Account and/or the local Administrators group as aut horized users.
Remote Microsoft SQL Servers are not supported by the historian.
For net working support, use named pipes and any other support required at your site. However, you
must select at least named pipes and TCP/IP sockets (the defaults). It is highly recommended that
you do not modify the default configuration for named pipes and TCP/ IP sockets.
As you select the path to the data files, you must consider that the historian Runtime database will
grow, especially if you are going to use the event subsystem (including summaries ) or storing data in
the ManualAnalog, ManualDiscrete, or ManualString tables.
The Microsoft SQL Server services should be installed using the local system account. The account
you specify should be an account that does not change oft en, if ever.
For obvious security reasons, you should not use a blank password for Microsoft SQL Server.
Both case-sensitive and case-insensitive SQL Servers are supported. However, you should avoid
mixing case-sensitive collations in tiered historian topologies.
The SQL Server e-mail functionality requires a Windows domain user account. You can change the
service account after SQL S erver is installed. However, it is highly recommended that you use an
account for which the password does not change often. For more information on SQL Server e-mail,
see your Micros oft SQL Server documentation.
Feature Description
Historian This option installs or re-installs the historian, configuration tools and
selected subcomponents.
IDAS An IDAS, which can be used remotely. The IDAS is always installed if you
select to install a complete historian.
Configuration Tools The server management tools include Historian Configuration Editor and
Historian Management Console. Both of these applications are MMC
snap-ins that are contained in the System Management Console. These
tools are always installed on the same computer as the historian and can
also be installed on a different computer on the network. The Historian
Database Export/Import Utility is also an installed configuration tool.
Feature Description
ActiveE vent ActiveE vent is an ActiveX cont rol that allows you to notify the historian
classic event system when an event has occurred in another application,
such as InTouch HMI software.
InSight Client Historian InSight is a browser client included with the Historian. It is the
on-premises version of Online InSight, and provides instant access to
production and performance dat a.
Historian This option installs historian extensions for OData and SQL Server
Extensions Reporting Services (SSRS ).
Important: Do not install the Historian on a computer named INSQL, because this conflicts with the
name of the Historian OLE DB provider and the installation eventually fails.
Antivirus Software
After installing the Historian, configure your antivirus soft ware. Be sure to exclude any folder that
contains history blocks. Refer to TechNote TN2865, available from the AVEVA Global Customer Support
(GCS ) web site, for important information about antivirus software. Enter your GCS credentials to access
the Tech Note.
https://softwares upportsp.schneider-electric.com/#/okmimarticle/docid/tn2865
Note: If you performed a complete historian installation, the System Management Console is configured
so that the local SQL Server is already registered. However, if you only installed the client tools, the
console is empty.
Using HTTPS Instead of HTTP for Historian Client, InSight, and REST
APIs
Typically, customers using the Open Data (ODat a) protocol can connect to a Wonderware Historian
server from Wonderware Historian Client or other client application using an unenc rypted (HTTP )
connection. (E ven without an encry pted connection, the user cred entials exchanged during login are still
encrypted.) It is possible to use an encrypt ed connection (HTTPS) for OData, but in that case, you must
first install and configure a TLS (transport layer security) certificate.
The following sections describe how to install and configure a TLS certificate.
Note: Remote users of InSight must use the name or IP address used in the certificate while
browsing to avoid receiving TLS warnings.
1. In Micros oft Management Console (MMC), double -click the certificate to open it.
2. Click Thumbprint.
3. Copy the thumbprint (certhash) and paste it into Notepad or other editor. Remove spaces bet ween
the hexadecimal digits.
4. Save the file in ANSI format.
5. Copy the resulting thumbprint (certhas h) for use when you bind certificates to the port.
There is no migration for the content of the Holding database, because this database is used only to
temporarily hold dat a when importing an InTouch data dictionary.
Any configuration data associated with obsolete system tags is not migrated.
For the event subsystem, all SQL-based detectors and actions are migrated to the OLE DB syntax. If you
have any custom SQL-based detectors or actions, you need to rewrite them using the OLE DB syntax.
History data that is stored in SQL Server tables (not history blocks) can be migrated after the general
upgrade has been performed.
The scripts are created when you first run the database setup utility so that you can run them at any time.
The file path is:
To migrate your database
1. On a new Historian server, use SQL Management Studio to:
a. Delet e any empty Runtime database that was created as part of the installation.
b. Restore the old Runtime dat abase from a backup.
2. Run the Configurator.
3. In the left pane, select Hi storian and then select Server.
4. Configure the server. See "Configuring Dat abases and Data File Locations on page 43" for details.
2. Shut down and disable the Historian using the Management Console. Any remote IDAS nodes will
go into store-and-forward mode.
3. Run the System Platform installation program to perform the upgrade. For more information, see
Upgrading System Platform on page 58.
4. The installation program detects the previous version of the Runtime database and prompts you to
keep the existing database or recreate the new database.
5. If you re-create the database, existing Runtime database will not be re-named but will be overwritten
with a new Runtime database. If you do not re-c reat e the database, the existing database will remain
intact.
6. Finish the installation of the Historian.
7. Restart the computer.
8. Start the Historian. The Historian will start acquiring and storing the store-and-forward data from the
existing remote IDASs.
9. After the Historian Server node is upgraded, you can upgrade any remote IDAS nodes.
Important: You MUS T perform the database migration before the server goes back into production,
because the history table content will be truncated. Be sure that you have disk space equivalent to two
times the size of the Runtime database on the drive to which the history data will be migrated; otherwise,
the migration may fail. Back up the Runtime database with the migrated config uration data before
migrating the history data.
C HAPTER 8
Historian Client Requirements
In This Chapter
About the Historian Client ............................................................................................................ 127
Historian Client Components ....................................................................................................... 127
Requirements and Recommendations .......................................................................................... 128
Support for Operating System Language Versions ........................................................................ 128
Desktop Applications
The Historian Client software includes the following stand -alone applications:
Historian Client Trend
Allows plotting of historical and recent data over time
Allows you to compare data over different time periods
Historian Client Query
Allows you to query the Historian database
Provides complex, built-in queries
Eliminates the need to be familiar with the dat abas e structure or SQL
Note: The SQL Server locale language must be the same as the operating system locale language.
C HAPTER 9
Historian Client Installation and
Configuration
The System Platform installation program allows you to install the Historian Client software. The System
Platform installation program copies the files from the setup DV D to the target computer.
For more information on the components installed, see Historian Client Components on page 127.
In This Chapter
About Historian Client Installation................................................................................................. 129
Using Historian Client Software with Roaming Profiles .................................................................. 129
Repairing the Historian Client Installation ..................................................................................... 130
Uninstalling Historian Client ......................................................................................................... 130
Upgrading from a Previous Version.............................................................................................. 130
Note: In some cases, depending upon the operating system and the prerequisite, you may have to
restart the system after the prerequisites are installed. In such cases, the setup automatically continues
after the restart.
For instructions on installing the Historian Client soft ware files, see Installing System Platform on page
23.
After the Historian Client software is installed on the computer, you must install the Langu age Packs
manually.
To save software options in the roaming user's profile, add a DWORD key named "EnableRoaming" to
the user's HKEY_CURRE NT_USE R\Soft ware\ArchestrA
\ActiveFactory registry folder and change its value to 1.
Note: You can also use the standard Windows Uninstall/Change Programs feature from the Control
Panel to repair the Historian Client software installation.
Note: You can also use the standard Windows Uninstall/Change Programs feature from the Control
Panel to remove the Historian Client software installation.
5. Disable any triggers or constraints that would prevent schema changes. This prepares your
database for changes.
6. Run the scripts you need to update Historian.
If you are upgrading from a much older version, you may have to run scripts to incrementally up grade
versions.Run the scripts in the order they appear (when sorted alphanumerically).
7. Restore any changes (triggers and other constraints) that you made to settings in step #5.
8. Shut down the old server's remote IDAS.
9. From the new server, force an update to the remote IDAS configuration.
A PPENDIX A
Using Silent Installation
System Platform supports silent (command line) installation. This feature enables you to install System
Platform products without user interaction.
Important: If prerequisite software is required for the System Platform products y ou are
installing, all prerequisites must be installed before starting silent installation.
Prerequisite software includes .NE T Framework and SQL Server. Details about prerequisite software is
provided in S ystem Platform Prerequisites on page 14. See SQL Server Requirements on page 69 for
additional information about support ed versions of SQL Server.
Setup.exe is run from the command line and accepts as an argument the name and path of a response
file containing pre-scripted responses to System Platform installation prompts.
Important: Use silent installation only to install a new system or upgrade an existing one. Adding or
removing components during an upgrade is NOT supported.
In This Appendix
Starting Silent Installation ............................................................................................................ 133
Using Response Files ................................................................................................................. 135
Creating a Response File ............................................................................................................ 136
Response File Samples .............................................................................................................. 137
Response File Entries to Configure the License Server ................................................................. 141
Response File Entries to Configure the System Management Server ............................................. 142
Examples:
setup.exe /silent responsefile.txt
setup.exe /silentmodify responsefile.txt
setup.exe /silentrepair {productguid}
setup.exe /silentrepair {productguid}.{ownerguid}
setup.exe /silentuninstall {productguid}
setup.exe /silentnoreboot responsefile.txt
setup.exe /silentpatch
setup.exe /mingui responsefile.txt
setup.exe /silent responsefile.txt /nowait
setup.exe /silentmodify responsefile.txt /nowait
setup.exe /silentrepair {productguid} /nowait
setup.exe /silentrepair {productguid}.{ownerguid} /nowait
setup.exe /silentuninstall {productguid} /nowait
Silent installation syntax:
<DVD>:\setup.exe /silent "<path\response-file-name>"
Note that the full filespec of the response file (filename plus location of file) must be included. For
example:
<DVD>:\setup.exe /silent "C:\docs\WSPInstall\response.txt"
The /silent switch completely disables the graphical user interface of S etup.exe. There is no input from or
feedback to the end user. However, the installation will output progress to a log file. The log is usually
found here:
C:\Program Files (x86)\Common Files\ArchestrA\Install\
{<FolderName>}\ILog<timestamp>.log
Silent installation with minimal GUI syntax:
D:\setup.exe /MINGUI <path\response-file-name>
Running setup with the /MINGUI switch will cause setup to install wit hout any input from the end user, but
it will display the progress of the installation on screen.
Silent installation with automatic system restart di sabled:
D:\setup.exe /silentnoreboot <path\response-file-name>
Running with the /silentnoreboot switch will keep the command window open so you can preserve
messages from the installation process. A manual reboot will be required after installation completes.
Silent installation command-line help:
D:\setup.exe /?
Running setup with the /? switch will display the silent installation command-line help.
User Permissions
In addition using the Run a s administrator option to start silent installation, you should also be a SQL
Server admin. If you do not have SQL Server admin privileges, you can still use silent install if yo u
properly configure the System Platform response files to invoke the credentials of an existing SQL
Server admin. See Configure SQL S ysAdmin Permissions on page 135 for more information. For
general information about response files, see Using Response Files on page 135.
Note: If the GUI installer would install any necessary prerequisites, the command line installer will als o
install these items.
All the sample response files contain information to create the ArchestrA User Account for system
communication. If another System Platform product was previously installed and the the ArchestrA User
Account was already created, subsequent installations will not create another ArchestrA User. The
original ArchestrA User will be ret ained.
For example, under those conditions, Setup.exe ignores the following lines in the response file:
AdminUserForm.SUserName=ArchestrAUser
AdminUserForm.SPassword=<password>
AdminUserForm.SCreateLocal=true
A good approach for testing is to first run the setup.exe in GUI mode on a typical computer and confirm
that no incompatibilities exist that would stop the installation, then cancel and run by command line.
Note: If the GUI-based installation requires a system restart after the installation is complete, installing
by command line will also require a system restart. Using the / silent switch allows the system to restart
automatically. The / silentnoreboot switch suppresses the automatic restart, but will require a manual
restart.
System Platform Installs the components required to host the development server, in
Development Server.txt order to develop and test InTouch HMI and InTouc h OMI
applications.
This response file includes the Galaxy Repository, Licens e Server,
Sentinel Manager, and System Management Server.
Application Server and Installs the components needed for Application Server and InTouch
InTouch OMI.txt OMI run-time.
Application Server Installs the components needed for Application Server development.
Development.txt
Application Server Galaxy Installs components needed for the Galaxy Repository. Since this
Repository.txt response file installs the Galaxy Repository, the License Server,
System Management Server, and Sentinel Manager are also
installed.
Historian.txt Installs the components needed for the Historian.
Historian Client.txt Installs the components needed for the Historian Client.
InTouch Access Anywhere Installs the components needed to run InTouch and InTouc h Access
and InTouch Runtime.txt Anywhere.
See sample response file, below.
InTouch Access Anywhere Installs the InTouch Access Anywhere Aut hentication Server. No
Authentication Server other components are installed.
InTouch Access Anywhere Installs the InTouch Access Anywhere Sec ure Gateway. No other
Secure Gateway.txt components are installed.
Security Server Installs the ASB Management Server and ASB Runtime
components. No other components are installed.
Wonderware Application Installs the components needed for Application Server run time and
Server.txt development. Since this response file installs the Galaxy Repository,
the License Server, System Management Server, and Sentinel
Manager are also installed.
Wonderware InTouc h.txt Installs the components needed for InTouc h run time and
development. Since this response file installs the Galaxy Repository,
the License Server, System Management Server, and Sentinel
Manager are also installed.
Sample Product-Based Response File
Application Server and InTouch OMI.txt
<responsefile>
<install>
AdminUserForm.SUserName=ArchestrAUser
AdminUserForm.SPassword=Password123
AdminUserForm.SCreateLocal=true
FeatureForm.SFeatureList=Wonderware System Platform.ASBRuntime,Application
Server.Bootstrap,Application Server.AcfBaseApplication,Application
Server.AcfMobileAccess,Historian Client.Medusa,Sentinel System Monitor.SIM
FeatureForm.SInstallDir=C:\Program Files (x86)
</install>
<configurator>
AVEVA Enterprise Licensing
Platform.LicAPI2.NewServerName=SE_LICENSE_SERVER_NAME
AVEVA Enterprise Licensing Platform.LicAPI2.NewPortNumber=55555
Common Platform.ASBRuntime.HttpPort=80
Common Platform.ASBRuntime.HttpsPort=443
Common Platform.ASBRuntime.ManagementServerPort=443
Common Platform.ASBRuntime.ManagementServerName=MachineName (input the
Managment Server name if need to configure to this Community Management Server)
Common Platform.ASBRuntime.AsbManagedCertificates=true
Common Platform.ASBRuntime.BindingCertificateThumbprint=thumbprint (optional
required if AsbManagedCertificates = false, otherwise remove this parameter)
Common Platform.ASBRuntime.UserName=username
Common Platform.ASBRuntime.Password=password (UserName and Password parameters
are not required if the current logged in user is authenticated to access the
Management Server, you can remove the parameters if they are not required)
Sentinel Agent Install Manager.Sentinel Manager.AgentServerName=ServerName
</configurator>
</responsefile>
A PPENDIX B
Single Product Installation
You can create an alternative installation media source if you are installing only Historian, Historian
Client, or the Application Server runtime, and you want to reduce net work usage. This alternative
installation source will be much smaller t han t he full set of installation files, and thus will be easier to send
to remote loc ations. This is of particular value if your net work connection to the remote site is slow or
unreliable, and any of the following, or similar circumstances, apply:
You have multiple nodes at a remote site on which you want to install only Historian, Historian Client,
or the Application Server runtime.
A firewall at the remote site restricts most off-site access, and having a local copy of the installation
files is easier to manage than having to modify the firewall.
Installing from a WAN-based share is impossible due to the speed or reliability of the network
connection.
With this procedure, you will:
1. Create a new installation source that contains a subset of the installation files contained on the
System Platform installation DVD.
2. Install Historian, Historian Client, or the Application Server runtime from this subset of files.
Copying the files, rather than installing from a remote location, eliminates the possibility of a time -out
during installation.
In This Appendix
Guidelines for Creating a Compact Installation Source .................................................................. 143
Preparation for Installing a Single Product .................................................................................... 144
Creating the Installation Source and Installing the Selected Component ......................................... 146
The work flow for creating the compact installation source is:
1. Copy the entire contents of the System Platform installation DV D.
2. Delet e language and product components that are not needed.
3. Copy the directory containing the remaining com ponents to either:
To the node where you will install the product.
To a CD or DVD to be used as the installation disk.
When you run the installation program, components that were deleted will show as disabled (gray ed-out)
and unavailable for selection.
Approx InTouch
InstallFiles Folder Folder Hi storian Application (Run time only or
(Component) Size Hi storian Client Server run time and
development)
InTouch
Approx
InstallFiles Folder Folder Hi storian Application (Run time only or
(Component) Size Hi storian Client Server run time and
development)
Redist 1.3 GB See note See note See note See note
(DOTNE T) (DOTNE T) (DOTNE T) (DOTNE T)
If .NET version 4.7.2 or higher is already installed, you can remove the DOTNET folder from Redist.
InTouch
Approx
InstallFiles Folder Folder Hi storian Application (Run time only or
(Component) Size Hi storian Client Server run time and
development)
Note: The Redist folder contains SQL Server Express in folder SQL2014E XP RSP2. You can remove
this folder if:
- You are installing Historian Client. SQL Server is not required.
- You are installing A pplication Server, InTouch, or Historian, and SQL Server is already installed.
See SQL Server Requirements on page 69 for information about supported versions of SQL Server.
Note: If you are installing Historian and the CD-Intouch has been deleted, you will not be able to purge
the A2ALMDB alarm database and an error will be generated (does not apply if you are using
block-bas ed history). However, the installation will complete successfully.
Important: You must copy the entire DVD. The root directory from the DVD and all files in it must be
in place and completely intact.
2. Navigate to the location where you copied the DV D. Delete the files, components and language
folders that you do not need.
Now you are ready to install or upgrade the product(s) using either of the methods described below.
To install or upgrade a single product
Direct installation from the copy location (install locally or on a different net work node):
1. Remove the original System Platform installation DV D from the drive.
Important: When you run setup.exe, it checks for the System Platform installation DVD. If the
installation DV D is available, it will be used instead of the copy location.
Index
configuring products • 32
1
16 Pen Trend • 23 D
database
A configuring • 43
A2ALMDB database • 95 disk space requirements • 95
aaAdministrators group • 64 disk sizing • 94
aaConfigS QL • 65 disk space
aaGalaxyOwner user account • 64
history blocks • 96
acquistion
planning • 95
loading • 101
ActiveE vent • 118
ActiveX and .NE T Cont rols • 128 E
aaHistClientQuery • 128 Enhanced Security Mode • 65
event data
aaHistClient Trend • 128
Antivirus Software • 120 migrating from older versions • 126
Application Server
hardware requirements • 76 F
user account requirements • 22 fault-tolerant servers • 93
ArchestrA user account
requirements for use with Application G
Server • 22
Galaxy database, migrating • 78
ASBService • 69
Galaxy Repository
ASBSolution • 69
upgrading • 76
upgrading with the Bootstrap • 73
B
upgrading with the Bootstrap and IDE • 73
Bootstrap
upgrading • 73
building block controls
H
hardware recommendations
aaHistClient TagPicker • 128
storage • 95
aaHistClient TimeRangePicker • 128
Historian Client • 127
Historian Dat abase Export/Import Utility
C requirements • 93
Change Net work Account utlity • 63 history blocks
common components • 84, 119
disk space requirements • 96
configuration utility • 43
history data
reserved names
system • 69 T
response files • 135
TCP/IP • 102, 117
retrieval tiered historian
loading • 101
sizing • 110
roaming profiles • 129
Runtime database
disk space • 95
U
uninstall
migration • 125
Wonderware Historian Client • 130
Wonderware System Platform component •
S 57
SCSI • 95 upgrade
security
basic steps • 76
modes • 65
Galaxy Repository • 76
remot e IDASs • 94
IDE • 78
silent installation • 133
software requirements • 76 operating system • 76