Uniformance Tools
Uniformance Tools
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
1 9/2/2014
Lesson Objective Honeywell
• Objective
– Identify features and use of Client Tools
• Topics
– IE plug-in
– Tag Explorer
– OLE DB provider
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
2 9/2/2014
IE Plug-In Toolbar functions Honeywell
• Overview
– Starting from PHD R300, a new IE tool bar was introduced
• Easy to use
• Installed as part of the Uniformance PHD Client Interfaces component
• Serves as a functional replacement of ModTag on PHD servers
• IE plug-in requires IE 7 or later version of Internet Explorer application
• The functions of the IE plug-in are as follows:
– Connects to local or remote PHD server
– Uses APIServer or RemoteAPI components
– Obtains output in HTML or XML
– Shows RDI list
– Retrieves tag list (with filtering)
– Retrieves data from PHD tag
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
3 9/2/2014
Starting Internet Explorer Plug-in Honeywell
• Launch Internet Explorer and browse to Tools Manage Add-Ons
Enable or Disable Add-Ons
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
4 9/2/2014
Starting Internet Explorer Plug-in (Contd.) Honeywell
• Select Uniformance PHD and click OK
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
5 9/2/2014
Display IE Toolbar – W2003 Honeywell
• Windows 2003 default
installation includes IE
Enhanced Security
Configuration
– This blocks access to the
PHD Protocol Adapter
and would need to be
removed to allow access
to work
• Removal is performed
under the “Add or
Remove Programs”
selecting Windows
Components, removing
the check and selecting
Next to proceed
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
6 9/2/2014
Display IE Toolbar – W2008 Honeywell
• On Windows 2008 with IE8:
– need to turn off IE Enhanced Security Configuration (ESC)
• control panel>administrative tools>server manager
• select “Configure IE ESC” under “Security Information”
• turn off ESC for Administrators (and optionally for Users)
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
7 9/2/2014
Display IE Toolbar Honeywell
• To enable the IE toolbar
– Right-click on IE toolbar, and select “Uniformance PHD”
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
8 9/2/2014
IE Toolbar for Uniformance PHD Honeywell
• IE Toolbar
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
9 9/2/2014
Reviewing PHD310 Plug-in Menu Honeywell
• Enter the following syntax in the Browser.
– phd://(username:password@hostname (:port)/command?(options)
• The following IE tool bar is displayed
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
10 9/2/2014
Reviewing PHD310 Plug-in Menu - Help Honeywell
• Click Help and the following page opens
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
11 9/2/2014
Reviewing PHD310 Plug-in Menu, continued Honeywell
• Click Options and the following dialog opens
– In the Connection Options dialog box, complete
the following information:
• PHD Server – Enter the PHD host name or
IP address
• Use Remote API – Select or clear the Use
Remote API check box to indicate that your
account belongs to a different domain
• Username – Enter the user account and
user name in the box provided
• Password – Enter the password in the box
provided
• Port number – Enter the port number in the
box provided
– For API Server - Port # 3100
– For remote API Server – Port # 3150
• Connection Timeout – Enter the connection
timeout in the box provided
• Output Type – Select the output type from
the list provided
• Auto Disconnect After Each Request –
Select or clear the Auto Disconnect After
Each Request check box
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
12 9/2/2014
Reviewing PHD310 Plug-in Menu – Data Query Honeywell
• Click Get Data the following dialog box is displayed.
– In the Get Data Query dialog box, complete the following information
• TagName/Number – Enter the tagname/number in the box provided
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
13 9/2/2014
Reviewing PHD310 Plug-in Menu – Data Query, continued Honeywell
• In the Absolute Time section,
– Enter the information shown below & click OK to enter the Start Time
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
14 9/2/2014
Reviewing PHD310 Plug-in Menu – Data Query, continued Honeywell
• At the Get Data Query click on End Time
• Review Slide 13 and similarly fill out the end time details
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
15 9/2/2014
Reviewing PHD310 Plug-in Menu – Data Query, continued Honeywell
• Returning to the Get Data Query dialog
– Enter these details:
• Engineering Units - Enter the
engineering units in the box provided
• Request type - Enter the request type
in the box provided
• Sample Interval - Enter the sample
interval in the box provided
• Maximum Rows - Enter the maximum
number of rows to be returned
(default is 0) in the box provided
• Minimum Confidence - Enter the
minimum confidence in the box
provided
• Resample method - Enter the
resample method in the box provided
• Data type - Enter the data type in the
box provided
• Select the Reverse Order check box
– Click OK to view the Uniformance PHD
tag details for a particular tag or click
Cancel to abort the action
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
16 9/2/2014
Reviewing PHD310 Plug-in Menu – Tag List Honeywell
• To view the Tag List
– Click Tag List
– The following Tag List Query dialog box is
displayed
• In the Tag List Query dialog box,
complete the following information
– TagName – Enter the tag name in
the box provided
– Source TagName – Enter the
source tag name in the box
provided
– Collector Name – Enter the
collector name in the box provided
– Description – Enter the description
in the box provided
– Data type – Enter the data type in
the box provided
– Data Length – Enter the data length
in the box provided
– Starting At Tag – Enter the tag
number in the box provided
– Return Maximum – Enter the return
maximum in the box provided
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
17 9/2/2014
Reviewing PHD310 Plug-in Menu – Tag List, continued Honeywell
• Other Tag List Options
– Select any of the check boxes
(These are optional items):
• Include System Tags
• Only Remote Tags
• Collected Tags
• Calculated Tags
• Manual Input Tags
• Download Enabled Tags
• Full Details
– Click OK to view the Uniformance
PHD tag list or click Cancel to
abort the action
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
18 9/2/2014
Reviewing PHD300 Plug-in Menu – Tag List , continued Honeywell
• The Tag List page is displayed
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
19 9/2/2014
IE Plug-in Other Useful Commands Honeywell
• List of RDIs:
– phd://localhost/RDIList?
• List of Links:
– phd://localhost/LinkList?
• List of Parent Tags
– phd://localhost/ParentTagList?
• See help information for more details
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
20 9/2/2014
Tag Explorer Honeywell
• Overview
– Tag Explorer is a Uniformance Client Tool
– This Tool can be used by other Uniformance client tools and applications to
gain access to all the PHD tags in the database
– Tag Explorer provides standard folders for group tags based on different
criteria
• The groupings make it easier to search and find the tags you need. For
example, you can search for all tags based on the following criteria:
– Unit
– Collector (RDIs and PHD Links)
– Tag collections (apply to Uniformance 210 or later)
– Parent tag
– Custom Directory
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
21 9/2/2014
Tag Explorer, continued Honeywell
• Features of Tag Explorer
– You can use Tag Explorer to do the following:
• Search for tags using a filter
• Copy and paste tags into custom directories or other applications
• Drag tags into other applications
• Organize tags into custom directories
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
22 9/2/2014
Tag Explorer, continued Honeywell
• NOTE:
– Tag Explorer capability is included in the client installation of PHD 310
Server which provides similar functionality to what was available in the
legacy (210/215 versions) desktop
• SQL Client Licenses
– It should be noted that the program does access the SQL Server database
and the usage of this utility does count against the SQL Server client
licenses
• Tag Explorer included on the 210/215 media will not work with the PHD
300/310 Server because it was designed to work with primarily with
Oracle as the database source
• R310 Tag Explorer will work with PHD300/310 SQL Server database or
PHD210/215 Oracle Database
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
23 9/2/2014
Tag Explorer, continued Honeywell
• Starting Tag Explorer
– You can start Tag Explorer from:
• The Windows taskbar
• A shortcut on the desktop
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
24 9/2/2014
Tag Explorer, continued Honeywell
• NOTE: If you need to locate Tagexplorer.exe, a typical location will be found at
– C:\ProgramFiles(x86)\CommonFiles\Honeywell\Uniformance\TagExplorer.exe
• Create shortcut to desktop if required by right-clicking TagExplorer.exe and select
Send To> Desktop (create shortcut)
• Note that if the PHD Server is setup on 32-bit operating system. This path will be
different.
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
25 9/2/2014
Tag Explorer, continued Honeywell
• Connecting to a Data Source
– When you start Tag Explorer, the data source used during the previous
session is the default
• You can change the data source
• To add a new Datasource Configuration
– On the File menu, choose Datasource Configuration to display Configuration
Screen
– On the left pane, Right-click and click New from the list of options
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
26 9/2/2014
Tag Explorer, continued Honeywell
• Configuring a Data Source
– The following screen is displayed
– In the General section, complete the
following details
• Name - Type the name that can
uniquely identify the data source
• DataSource - Type the name or IP
address of the server for UDB server
and SQL server, or type the TNS name
for Oracle data source
• Description - Type the description of the
data source
• Type – Specify the type of Data Source,
that can be SQL server, UDBServer or
Oracle
– On the left pane, right-click and click Save to
save the data source
– For Oracle connectivity only, in the Oracle
section, complete the following detail
• Type the username in the box provided
– Click Save to save the data source
configuration
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
27 9/2/2014
Tag Explorer, continued Honeywell
• Tag Explorer Screen
– Connect to the data source you want to use
• Datasource selection can be done through the datasource dropdown
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
28 9/2/2014
Tag Explorer, continued Honeywell
• For Oracle connections only:
– The log on dialog box is shown for Oracle data source when you click a
folder for the first time:
• To log on to Oracle Data source
– On the File menu, choose Login
– You can in addition right-click the tree view (left pane), and then select Login
Complete the
following details to
login
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
29 9/2/2014
Tag Explorer, continued Honeywell
• Oracle Data Source Login dialog:
– The log on dialog box is shown for Oracle
data source when you click a folder for the
first time:
– To log on to Oracle Data source
• On the File menu, choose Login
• You can in addition right-click the tree
view (left pane), and then select Login
• In the Login dialog box, complete the
following details
– Data source - Type the data
source name in the box provided
– User Name - Type the user name
you want to use to log on to the
database in the box provided
– Password - Type the password in
the box provided
– Click OK to log on to Tag Explorer or click
Cancel to abort the action
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
30 9/2/2014
Tag Explorer, continued Honeywell
• Connect to a different data source
– On the Tag Explorer window, click the data source list available on the tool
bar to display available Data Source Names
• From the data source list, you can select the Data Source Name you
want to use
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
31 9/2/2014
Tag Explorer, continued Honeywell
• Tag Explorer Screen will appear, once logged in to the data source
– On the tree view (left pane), click a folder to expand the directory
– You can view tags in the standard directories in Tag Explorer and copy or
drag them into other applications
– To create or modify directories you must log in with a user name that has full
read/write permissions
List View
Tree View
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
32 9/2/2014
Tag Explorer, continued Honeywell
• Tag Explorer Properties
– On the File menu, choose Properties
• The following screen is displayed
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
33 9/2/2014
Tag Explorer, continued Honeywell
• View Properties
– CopyMode – A flag to indicate if the
copied/dragged context is a delimited string or a
Honeywell Context XML string
– TagDelimiter – Delimiter to be used in delimited
DragDrop text
– In the Tag Filter section, the following details
are displayed
– ActiveTagsOnly – A flag to indicate whether or
not non-active tags must be returned with the
active tags
– MatchString – Tag name or description pattern,
for example, Tag%
– MatchType – A flag to indicate to match the tag
name or description or both
– MaximumTagCount – Maximum number of tags
to be returned. 0 indicates “return all tags”
– In the TagExplorer Datasource section, the
following detail is displayed
– Datasource – Uniformance TagExplorer Data
Source Name
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
34 9/2/2014
Tag Explorer, continued Honeywell
• Selecting Tags from Tag Explorer
– In the Tag Explorer, you can search for tags using search criteria and then
drag these tags into your own directories or into other Uniformance
applications
• Searching for Tags from Tag Explorer
– The Match String filter limits the selection of tags, helping you to locate the
tags you need
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
35 9/2/2014
Tag Explorer, continued Honeywell
• To search for tags
– In the Tag Explorer window, double-click the Tag Filter
box, located below the change datasource list
• Note: You can, in addition, access the Match String
window by clicking Filter from the View menu
• Browse Criteria
– Match String - Type the character string that matches the
tags you want to find in the box provided
• Wildcard Searches
– You can use Wildcards
• % for multiple characters
• ? or _ for single characters
– With Match Type you can use the following options:
• Tagname Only
• Description Only
• Tagname and Description
– To search active only
• select the Active
• Note:
– Use the % wildcards on both ends of the character string if
the character string appears anywhere in the name or
description field
– To search for all tags, leave the Match box empty
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
36 9/2/2014
Navigating Tag Explorer Honeywell
• Menus in Tag Explorer:-
– Main Menu Bar
– Tree view context menu Main Menu Bar
Tree View
Context Menu List View
Context Menu
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
37 9/2/2014
Navigating Tag Explorer Honeywell
• Main Menu Bar
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
38 9/2/2014
Navigating Tag Explorer, continued Honeywell
• Tree view context menu Click To
– On the tree view, click any Option, Login Log in as a user with read/write permission to modify
directories
• Right-click to view the
Properties View the properties of a directory
Context Menu
Reset Reset a string that all tags displayed
Copy Copy the path of a directory, a delimited list of tags or a
list of tags in the form of Honeywell Context XML on to
the clipboard
Paste Paste a directory tree or delimited list of tags from the
clipboard into a directory
This option is available only within the Directory folder
Add Directory Create a new directory
This option is available only within the Directory folder
Add Tag Add a tag to a directory
This option is available only within the Directory folder
Data Source Add a new data source configuration
Configuration
Delete Delete a tag or directory.
This option is available only within the Directory folder
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
39 9/2/2014
Navigating Tag Explorer, continued Honeywell
• List View Context Menu
– In the List view (right pane), click any option
• Right-click to view the context menu
– To select multiple tags, you can use SHIFT-click or CTRL-click to select
multiple options
Click To
Cut Cut a tag
This option is available only within the Directory
folder
Copy Copy a tag to the clipboard
Paste Paste a tag into a subdirectory
This option is available only within the Directory
folder.
Delete Delete a tag
This option is available only within the Directory
This menu is folder
context sensitive,
Insert Insert a new tag name or subdirectory
Some commands This option is available only within the Directory
are folder
available only for Select All Select all tags in the list
Specific options Invert Clear the selected tags and select the tags currently
Selection not selected.
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
40 9/2/2014
Tag Explorer, continued Honeywell
• Understanding Directories
– The directories in the tag explorer include all the tags organized in the database into
logical groupings to facilitate searching
– The directories appear on the left pane or the tree view of the Tag Explorer window
– When you click a directory folder, the tags and subdirectories within that directory
appear on the right pane, or List view of the window
• Understanding Lists/Views
– When you click a directory in the Tree view, the subdirectory names or tag names
appear in the List view
• The following views are available within the List view:
– List View-The subdirectories and tag names of the selected directory
– Details view-The subdirectories and tag names of the selected directory,
their descriptions, and sequence numbers (when in the Directory folder)
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
41 9/2/2014
Tag Explorer, continued Honeywell
• Understanding Directories
– There are six directories in the Tag Explorer
• The first five are standard and allow read-only access
• The sixth directory is provided to provide the user with read and write
permissions to create subdirectories for tags that are frequently used
and organize them into logical hierarchies
• You can add tags from other directories into your own subdirectories, but
you cannot add tags into the root of the directory
All 5 Directories
except the last
directory named
“Directory” are read
only accessible
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
42 9/2/2014
Tag Explorer, continued Honeywell
• Understanding Directories
– Each directory in the Tag Explorer contains tags grouped by the following:
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
43 9/2/2014
Tag Explorer, continued Honeywell
• Dragging Tags or Directories
– After you find the tags you need, you can drag them into your own Tag
Explorer directories, or you can drag them into other applications
• This is the same as copying them, but much easier than copying
– Inside Tag Explorer
• You can drag tags and directories from anywhere in Tag Explorer to
your own directories or to any directories with public access
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
44 9/2/2014
Tag Explorer, continued Honeywell
• To drag tags and directories within Tag Explorer
– On the tree view, open the directory you want to add tags or directories
• In the List view, click Tag or directory you want to drag
– While holding the left mouse button, drag your selections to the
destination directory in the Tree view & release the left mouse
button
• The destination directory lists the new items
• Dragging Tags into other applications
– You can drag tags from anywhere in Tag Explorer to other Uniformance
applications that accept Drag/Drop such as:
• Uniformance Process Studio
• Uniformance PHD Configuration Tool
• WordPad
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
45 9/2/2014
Tag Explorer, continued Honeywell
• Drag Tags into other applications
– On the Edit menu, choose Copy Mode, and then click Tag Names
• A delimited list of tag names can be copied to the clipboard
• On the Edit menu, choose Tag Delimiter
• Select the delimiter you want to use as a separate individual tag name
– The following options are available
• Tab
• New Line
• Comma
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
46 9/2/2014
Tag Explorer, continued Honeywell
• Drag Tags into other applications
– Open the application into which you want to drag tags
– On the View menu of Tag Explorer, click Always on Top
• The Tag Explorer window remains on top of all other open windows on
your desktop, even if it is not the current window
– Note: Click Always on Top to make it easier to drag tags into other
open windows
– In the List view, click the tag you want to drag
• Note: Press SHIFT and click or CTRL-click to select multiple tags
– While holding the left mouse button, drag your selections to the appropriate
area in the other application
– Release the left mouse button
– The tag names are displayed in the open application
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
47 9/2/2014
Tag Explorer, continued Honeywell
• Managing Directories
– You manage your tags in directories and subdirectories
– You can add tags to your own directories, or to public directories, by
• Dragging
• Copying and pasting
• Typing the tag name in the Add Tag window
– Note: You cannot add a tag to a directory if it is already in the directory.
• Creating a Personal Directory
– You can create your own directory of frequently used tags in the Tag Explorer
Directory
– If you want to organize your tags into directories and folders, ensure that you create a
directory
– If you do not intend to create subdirectories, you can create a list
• Creating a Directory
– When you create a directory, you can add subdirectories to further organize your tags
• Creating a List:- You can also create a list instead of subdirectories
– Create a list when you want to add only tags and not subdirectories
• You cannot add subdirectories to a list
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
48 9/2/2014
Tag Explorer, continued Honeywell
• Exercise 1
– Managing Directories
• Open Tag Explorer
• Using navigation tree Right-click Directory
• Select Add Directory
• In Add Directory Dialog enter Directory Name MYDIRECTORY and
Description
• In Type select Directory
• In Ownership select Public
• Click OK to confirm and save
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
49 9/2/2014
Tag Explorer, continued Honeywell
• Exercise 2
– Adding Tags to a Directory or List
– Provided you have permissions to see the tag or tags and have access to
the directory or list you can add tags by dragging
• Search for TAG01
• Select TAG01
• Drag and drop TAG01 to MYDIRECTORY
• Note the tag is now in MYDIRECTORY
• Right Click on MYDIRECTORY
• Select Add Tag
• Enter Tag Name: TAG02
• Leave Description: blank it will self populate
• Click OK
• Observe the TAG list under MYDIRECTORY
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
50 9/2/2014
PHD OLE DB Provider Honeywell
• Overview
– The PHD OLE DB provider is a set of objects that expose data from PHD by
using the Microsoft Component Object Model (COM)
– PHD OLE DB provides applications with uniform access to data stored by
Uniformance
– The COM interfaces support the amount of DBMS functionality appropriate
to the PHD data store, enabling PHD to share the data
– Users can employ any standard OLE DB methods to retrieve data from the
PHD OLE DB Provider
– PHD R310 onwards, Enhanced OLE DB Provider is available to retrieve
data for multiple tags from a single data request
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
51 9/2/2014
Honeywell
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance PHD310 Client Tools
52 9/2/2014
PHD Configuration Tool Introduction
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. PHD Configuration Tool Introduction
53 9/2/2014
Lesson Objective Honeywell
• Objective
– Identify the Honeywell PHD R310 Configuration Tool (PCT)
– Work with the ribbon and PHD Configuration Tool menu structures
– Understanding basic data entry
• Topics
– Starting PHD Configuration Tool
– Understanding the Ribbon Bar menu
– Working with Multiple Document Interface
– Navigating records
– Data entry basics
– PHD Configuration Tool application button
– Create dData-on-the-fly
– Short cut keys
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. PHD Configuration Tool Introduction
54 9/2/2014
Introduction to PCT Honeywell
• Using the application
– Note: In the previous releases (PHD R202 and earlier), the PHD
Configuration Tool was named TPI
– Uniformance PHD Configuration Tool includes a series of forms bound
inside the Honeywell Common Desktop Framework
– Forms enable you to manually enter data into the system, and to query
(retrieve) information back from the system
• Some additional features include:
– Validation of entered information
– List of values and drop down lists that are context sensitive
– Context sensitive status messages
– Keystrokes and mouse actions used for operating the menus, forms, and
reports are consistent with Microsoft Windows standards
• This leverages existing knowledge and training efforts
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. PHD Configuration Tool Introduction
55 9/2/2014
Introduction to PCT Honeywell
• Overview of the user interface
– PHD Configuration Tool enables you to configure data used by the
Honeywell Process History Database (PHD)
• Ribbon Bar menu
– PHD R300 onwards, a new menu system has been provided
• This menu system is based on the Microsoft Office 2007 style guidelines
and features a Ribbon Bar at the top of the application
• Ribbon bar displays the application commands in an easy-to-browse
format
• It organizes these commands by utilizing multiple tabs on the ribbon bar
and by grouping related tasks on a tab
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. PHD Configuration Tool Introduction
56 9/2/2014
Ribbon Bar Menu Start Screen Honeywell
• Starting PHD Configuration Tool
– Home tab
• Provides access to all the available PHD configuration forms
• Some forms are accessed by clicking the icon on the Home tab
• Other forms are accessed by selecting the list from dropdown menu
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. PHD Configuration Tool Introduction
57 9/2/2014
Context Sensitive Ribbon Bar Menu Honeywell
• This example shows the Interfaces> Interfaces (RDIs and Links) form
menu
• Home tab is available for access but remains in the background to the
configuration form tab
• Clicking the Home tab brings it to the front and places the configuration
form menu tab in the background
• Toggle the tabs on the ribbon bar as required to accomplish your tasks
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. PHD Configuration Tool Introduction
58 9/2/2014
Multiple Document Interface (MDI) Honeywell
• Honeywell Common Desktop Framework is an MDI application that
displays the various PHD configuration forms all within the same
container
• When you start the PHD Configuration Tool:
– The Honeywell Common Desktop Framework (CDF) application is launched
and the Home tab is displayed
– Opening multiple configuration forms instructs the CDF to arrange the
configuration forms like worksheet tabs in a Microsoft Excel workbook
Select appropriate
PCT Forms tab to toggle
arranged like Excel between associated
workbook forms
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. PHD Configuration Tool Introduction
59 9/2/2014
Navigating Records Honeywell
• Each data entry form contains a grid that displays a list of configured data entry
records
– The grid is initially populated when you open the configuration form and can be
updated when you conduct searches or when you add and delete records.
• NOTE:
– By default, opening a form helps you to retrieve and display all the records
for that form
– The exception to this rule involves Tag Configuration
• Opening Tag Configuration helps you to retrieve and display the first
1000 Tag records like an Excel workbook
Current selected record is
indicated with focus colour
on the selected row/field
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. PHD Configuration Tool Introduction
60 9/2/2014
Navigating Records, continued Honeywell
• This example shows the Source Systems Form
Current List of
Records pane
Current selected
Record Entry Sheet(s)
will be displayed in the
Selected Record
Viewing pane
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. PHD Configuration Tool Introduction
61 9/2/2014
Navigating Records, continued Honeywell
User Role
Indicator
Primary PHD
Numeric list server details
location and
records count Database server
name
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. PHD Configuration Tool Introduction
62 9/2/2014
PCT Button Menu Functions Honeywell
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. PHD Configuration Tool Introduction
63 9/2/2014
PCT Common Icons Honeywell
Context Menu Type Icon Notes
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. PHD Configuration Tool Introduction
64 9/2/2014
PCT Specialized Icons Honeywell
Context Menu Context Menu Type Icon Notes
Icon(s)
Tags, Calculations & Tag Send to PHD Tag data sent to PHD database
Security
System Data Move Engineering Type This option is used for moving an
engineering unit to a different
engineering unit type
Verifying Engineering Unit This option is used for verifying an
Conversion engineering unit conversion
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. PHD Configuration Tool Introduction
65 9/2/2014
PCT Specialized Icons, continued Honeywell
Context Menu Context Menu Type Icon Notes
Icon(s)
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. PHD Configuration Tool Introduction
66 9/2/2014
Using Shortcut Keys Honeywell
• Keyboard shortcuts, such as CTRL + S to invoke the Save command,
remain the primary mechanism for accessing commands from the
keyboard
• PHD Configuration Tool enables shortcut keys to gain quick access to
forms and to execute specific commands
• From any menu, press the ALT key and the letters appear on the
accessible ribbon tabs and ribbon buttons
– Pressing a letter executes the task or displays an additional set of letters
associated with other tasks
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. PHD Configuration Tool Introduction
67 9/2/2014
Using Shortcut Keys, continued Honeywell
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. PHD Configuration Tool Introduction
68 9/2/2014
Using Shortcut Keys, continued Honeywell
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. PHD Configuration Tool Introduction
69 9/2/2014
Using Shortcut Keys, continued Honeywell
Press this… To do this…
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. PHD Configuration Tool Introduction
70 9/2/2014
Performing Queries Honeywell
• Queries are questions asked about information in the database
• You perform queries by selecting specific information of interest
• For example, you can query the database for all tags configured with a Bailey
source system
• There are two methods of performing a search to retrieve records from the
database related to configuration forms
– They are categorized as the following search methods
• Basic search
– Basic search method enables you to perform a query using a field name that
identifies the records in the database
• For example, Tag Name, Collector Name, Unit Type, and so on
• Advanced search
– Advanced search method enables you to choose multiple fields and enter
additional criteria to identify and filter records in the database
• When you open a configuration form, the available tasks are grouped by
category and displayed on the ribbon bar
– First category available is “Search by XYZ”, where XYZ is search option specific to
that tab
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. PHD Configuration Tool Introduction
71 9/2/2014
Performing Queries, continued Honeywell
• Basic Search:
– Basic Search criteria is context sensitive:
• For example:
– Search tags via Tag Ribbon
– Search for RDIs via Interfaces Ribbon Click Go
Enter search Tag after search has been
name or appropriate entered in the Search
search criteria in this Name field
field
Search results
(advanced also)
shown in the grid
pane
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. PHD Configuration Tool Introduction
72 9/2/2014
Performing Queries, continued Honeywell
• Advanced Search:
– Search criteria is context sensitive
• Advanced Search Actions:
1
2
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. PHD Configuration Tool Introduction
73 9/2/2014
Performing Queries, continued Honeywell
To add search
3 criteria, click on Add
Criteria
Select criteria
fields that apply Selected criteria
fields will be
5 6 displayed ere
7 Click OK to accept or
cancel to reject
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. PHD Configuration Tool Introduction
74 9/2/2014
Performing Queries, continued Honeywell
• Advanced Search;
The Save Query button
is very useful if you
To run query, click
want to save your
search query design for later
use
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. PHD Configuration Tool Introduction
75 9/2/2014
Additional References Honeywell
• Further discussions on PHD Configuration Tool will be covered in these
sections of this training:
– Tag Configuration
– Manual Input, Data Put, Routing
– Real Time Data Interface Management
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. PHD Configuration Tool Introduction
76 9/2/2014
Uniformance System Monitor
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
77 9/2/2014
Lesson Objective Honeywell
• Objective
– To become familiar with the configuration and use of USM in PHD310
• Topics
– Overview of USM
– USM Functionality in PHD R310
– USM Functionality not in PHD R310
– USM101 and PHD R310
– USM Security
– USM Components
– USM Configuration
– USM RDI
– Debugging
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
78 9/2/2014
Overview of USM Honeywell
• Uniformance System Monitor is a system monitoring application
– automates many repetitive tasks commonly performed by a PHD system
administrator
– monitors health of PHD system and operating system
– alerts system administrator if an issue is detected
– can take action (run script, send email, manipulate variables) when an issue
is detected
• USM permits modification of monitored and condition items from local or
remote locations by authorized personnel
• Starting from PHD R310, USM is integrated and not available as a
separate tool but is available along with PHD R310 package
• USM can be configured to start applications
– The logic behind USM is to start non-interactive services
• You may start interactive applications like notebook.exe, but this is not
the USM intended purpose
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
79 9/2/2014
PHD Server System Monitors Honeywell
• USM is most powerful when used to monitor the status of PHD R201
through PHD R300 or PHD R310 servers
– Uniformance-specific monitoring agents provide more than basic Windows
monitoring; they provide visibility to Uniformance application-specific values
• Tag monitoring provides the ability to ensure that data is being updated
correctly, and on a timely basis
– For example, by monitoring the timestamp of a key manual input tag,
reminders can be sent to the data owners to notify them that their inputs are
due
• PHD R310 embedded USM version is different. You don’t get the
network monitoring capability and your system cannot be master to other
USM installations it is by default a slave agent
• PHD R310 as a slave maybe remotely controlled by USM R101 or
higher master installs with appropriate authorization
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
80 9/2/2014
USM functionality in PHD310 Honeywell
• PHD R300 includes a subset of USM functionality:
– monitor items
• does not include all types available, but includes:
– Lookup value
– Performance Value
– PHD Server Command
– RDI Server Command
– System Time
– Tag Confidence
– Tag Status
– Tag Sync Command
– Tag TimeStamp
– Tag Value
– Working Variable
– condition items
• configuration and monitoring console in Uniformance System Console
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
81 9/2/2014
USM functionality fully included in PHD310 Honeywell
• This additional functionality and full version of USM is now available with
PHD R310:
– master / slave relationships and communication
– templates
– ability to use plugins
– additional monitor items:
• condition state
• file size
• monitor item value
• network ping
• SNMP
• WMI
– system summary display
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
82 9/2/2014
USM101 and PHD310 Honeywell
• USM is now provided with PHD310:
– full functionality available
• for sites with a full USM license:
– WARNING:USM101 agent or console should NOT be installed on any
PHD310 servers
– install the USM101 console on desktop/laptop and connect to USM on the
PHD310 servers for full USM functionality
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
83 9/2/2014
USM Components Honeywell
• Two components:
– agent (PHDStart service)
– console (USC)
• USM agent (phdstart):
– connects to all other services
– monitors inputs
– evaluations conditions
– executes actions
• Console (USC):
– view USM configuration
and status
– configure USM
• USM RDI
– allows USM data to be historized
to PHD tags
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
84 9/2/2014
USM Security Honeywell
• Windows group membership determines privileges a user has when
connecting via USC:
– Product Administrators
• full control over all USM configuration
– Local Engineers
• read-only access
• can enable/disable conditions
– Local Operators
• read-only access
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
85 9/2/2014
Understanding Categories of Monitoring Honeywell
• The monitoring requirements of a Uniformance system largely fall into
the following categories:
– System Monitoring
– Application Monitoring
– Application Processing
– Data Process Monitoring
– Infrastructure Monitoring
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
86 9/2/2014
Understanding Categories of Monitoring Honeywell
• System Monitoring
– More detailed monitoring of the data being collected, calculated, and
generated by applications allows possible issues with the operation of the
application to be identified
• Application Monitoring
– Application monitoring includes monitoring the status of applications on each
server, primarily to determine if the application is running, as well as
detecting the status of the application, or application component, if possible
– This includes checking the existence of specific processes, as well as the
status of RDIs, RDC (USM101+Only), and PHD global section parameters
• Application Processing
– More detailed monitoring of the data being collected, calculated, and
generated by applications allows possible issues with the operation of the
application to be identified
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
87 9/2/2014
Understanding Categories of Monitoring Honeywell
• Data Process Monitoring
– Is the monitoring of PHD data in the form of TAG data:
• For example: Timestamps, Values etc.
• Infrastructure Monitoring
– Infrastructure monitoring includes monitoring of server status and network
connectivity (USM101+ Only), to allow determination of server failures and
network failures
– Basic monitoring of server load (namely CPU usage and memory usage) is
also recommended, with this information being historised into PHD tags
through Put commands
– This historical information that relates to the baseline load on the server,
allows you to correlate it with specific events, such as slow application
response time
– The monitoring and rotation of log files based on file size also is included in
this category (USM101+ Only)
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
88 9/2/2014
Performance Constraints Honeywell
• Although the following are not hard limits, performance may deteriorate
if the suggested limits are exceeded – particularly for 32bit OS:
– USM Monitor Agent is able to monitor 1024 local Condition Items
– USM Monitor Agent is able to check all Condition Items at least once every
30 seconds
– The Management Console is able to monitor at least 100 nodes ( USM101+
only)
– USM Monitor Agent does not adversely affect the performance of the system
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
89 9/2/2014
USM Configuration Honeywell
• In USC, Right-Click on “System Monitoring”
– Select “Properties”
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
90 9/2/2014
USM Configuration Honeywell
• Properties dialog:
– To ensure that you can run a condition(s) item enter your service account
here to execute programs
– Check the box to save user details
– TIP: Why do you need to set “Execute Programs As This User Account?”
• Because USM Agent runs as local machine account and has no rights to
execute or run services
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
91 9/2/2014
USM Configuration Honeywell
• Configurable Options:
– SMTP Port
• TCP port used to connect to mail server (default is 25)
– SMTP Server
• hostname or IP address of mail server
– PerfMon Frequency
• frequency at which USM reads PerfMon data
– Status Frequency
• frequency at which USM reads PHDServer and RDIServer status data
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
92 9/2/2014
USM Configuration Honeywell
• Configurable Options:
– Tag Read Frequency
• frequency at which USM reads tag values
– Tag Sync Server
• hostname or IP address of server where TagSync is executing
– Tag Sync Port
• TCP port used to connect to TagSync (default is 3110)
– Execute Programs as this User Account
• programs specified in condition items will be executed as this user
– Connect to PHD as this User Account
• user account used by USM to connect to PHD
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
93 9/2/2014
USM Items Honeywell
• Monitor Items
– a parameter, counter, status, size, or other value from various sources, to be
used in event detection
• Condition Items
– the logic to detect specific events and the action to be taken in response
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
94 9/2/2014
USM Configuration – Lookup Value Honeywell
• Lookup Value - Monitor Item
– Lookup values can be used in USM to allow values to be easily re-used in
multiple places (i.e., in condition definitions, alert emails, etc), without having
to configure those values in each location
– The lookup values can easily be updated in a single location, without having
to edit every condition and/or monitor item which uses it
– Note: That lookup values are treated as strings internally by USM, and as a
result, lookup values cannot be used in numerical comparisons in a
condition item
– Multiple lookup values will be used to specify email addresses for alerts, and
no email addresses will be hard-coded into any configuration items
– The following email lookup values are recommended:
• Email.PHDAdministrator
• Email.IS
• Email.SitenameContact
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
95 9/2/2014
USM Configuration – Lookup Value Honeywell
• Lookup Value - Monitor Item (continued…)
– Lookup values are used to specify various log files directory, PHDServer
directory, Windows directory, etc.
Name Value
UniformanceBasePath HKLM:Software\Honeywell\Uniformance\BasePath
UniformanceLogFiles HKLM:Software\Honeywell\Uniformance\LogFiles
Path.BCMLogFiles HKLM:Software\Honeywell\ServerLogger\LoggerDirectory
Env.WinDir %WINDIR%
Name Value
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
96 9/2/2014
Monitor Item Default Values Honeywell
• A monitor item which is failing to retrieve a value from its source will be
assigned a value of -1 or -1.000 by the USM Monitoring Agent
– This allows condition items to identify when the USM Monitoring Agent is
failing to retrieve data
– NOTE: Generally, USM uses -1 to indicate that the agent was unable to
successfully retrieve the Monitor Item value from the source system
however, it is not a guarantee of error, since some items will return a -1
value from the source system
Type Description
PHD Server Command Accesses a specific piece of internal PHD Server data. The available data are listed
under PHD Server Command Parameters in the USM help file.
For more information, refer to the following Uniformance documents:
• Process History Database System Manual (pim0301.pdf)
• PHDMAN User Guide (pim0221.pdf)
• PHD Administration API Programming Guide (pim3901.pdf)
RDI Server Command Accesses a specific piece of internal RDI Server data. The available data are listed
below under RDI Server Command Parameters. For more information, refer to the
following Uniformance documents:
• Process History Database System Manual (pim0301.pdf)
• PHDMAN User Guide (pim0221.pdf)
• PHD Administration API Programming Guide (pim3901.pdf)
Tag Status PHD status code of last attempt to read PHD tag. 0 - Ok, Not 0 - Error code
Tag Value Current value of a PHD tag - Only holds numeric data types.
Tag Sync Command Accesses a specific piece of internal Uniformance Tag Synchronization Server data.
The available data are listed below under Tag Sync Command Parameters. The
function of the Uniformance Tag Synchronization Server is to obtain point
configuration from a source system server and export the configuration to the
Uniformance SQL Database, based on user-configured rules.
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
98 9/2/2014
USM Advanced Logic Monitors Honeywell
• Advanced logic items are used to perform calculations based on the
status of various conditions, perform logic including data from multiple
monitored nodes, and parameterize actions like:
– Lookup Value
– Working Variable
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
99 9/2/2014
Windows Monitors Honeywell
• USM provides the ability to monitor the Windows operating system
environment in addition to monitoring PHD-specific parameters
– By providing the ability to monitor both Uniformance and operating system
health, USM 310 provides a full view to a variety of issues that may impact
system reliability such as:
– Performance value
– Log System Time
– Hostname
• Hostname is an item that can be selected from the monitored itemslist
by using the Monitored Items button when the Conditions Item form is
open
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
100 9/2/2014
USM Configuration Honeywell
• Configuration of USM is done via Uniformance System Console
• Select “System Monitoring” in USC
– “Reload System” must be performed for changes to monitor items and
condition items to take effect
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
101 9/2/2014
Monitor Item Configuration Honeywell
• Type:
– Parameters depend on monitor item
type
• Prevent Loading:
– Prevents USM agent from loading
this monitor item
• Frequency:
– Specifies the frequency at which the
USM agent will update the value of
this monitor item
– Actual rate at which USM agent
queries source for updates depends
on PerfMon / Status / Tag Read
frequencies configured in PHDStart
properties
• Description :
– Free-form text entry to describe the
monitor item
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
102 9/2/2014
Frequency Settings Monitored Items Honeywell
• Frequency
– The frequency for updating monitor items and condition items depends on
the category of monitoring being performed
• If it is set to 0 then the item has no frequency and will not collect
• Recommended Frequency for Application Monitoring
– Applications monitoring is typically done at a rate of 1-5 minutes
– The frequency of monitor items and condition items related to application
processing is dependant on the application being monitored, and the rate at
which it makes changes to data
• Recommended Frequency for Infrastructure Monitoring
– Monitor items and condition items related to infrastructure monitoring are
typically updated at a relatively slow rate - that is, 5 minutes or more
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
103 9/2/2014
Condition Item Configuration Honeywell
• Frequency:
– Frequency at which the USM agent will
evaluate the condition
• Repeat Frequency:
– Time between action executions while the
condition stays true
• default value is 0, which specifies that the
repeat frequency is the same as the
condition frequency
• Maximum Repeat:
– Maximum number of times that the actions will
be executed while the condition remains true
• Severity Level:
– Specifies the alarm level for this condition item
that will be logged into the Uniformance Event
Log
• Sequence Order:
– In which the condition should be evaluated in
relation to other conditions
• default value is 0
– a value > 0 causes the condition to be
evaluated after all conditions with a
sequence order of 0
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
104 9/2/2014
Condition Item Configuration Honeywell
• Disable Condition:
– Disables this condition from being
evaluated
• Wait for EXE’s To Complete
– Causes USM agent to wait for
launched programs to terminate before
executing any other programs
• Prevent Loading:
– Prevents USM agent from loading this
Condition Item item
• Condition:
– Statement defining the event to be
detected
• Example:
– RDI.MYTEST.InterfaceState <> 3 AND
RDI.MYTEST.InterfaceState <> 2 AND
ConnectedToPHDServer = 1
• Description :
– Free-form text entry to describe the
Condition Item
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
105 9/2/2014
Condition Settings Backgrounder: Honeywell
• Let us now look what setting these items Frequency, Repeat Frequency,
Sequence Order and Minimum True actually do
– These settings could vary to some extent depending on what you are trying
to do with your condition settings
• Frequency
– The frequency at which the condition is evaluated
• Repeat Frequency
– The interval at which the actions are executed while the condition is true
• A value of zero will cause the actions to be executed at the condition
frequency
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
106 9/2/2014
Condition Settings Backgrounder: Honeywell
• Maximum Repeat
– The maximum number of times the actions are executed while the condition
remains true
• A value of zero will cause the actions to be executed (at the repeat
frequency) each time the condition is evaluated as true
• NOTE: If the maximum repeat is set to 1, the repeat frequency has no
effect, and should be left at the default value of 0
• Minimum True
– The number of times the condition must be true before the actions are
executed
– This option provides a way to prevent spurious results from causing alerts,
by allowing the condition item to be configured to ensure it must be true for a
specified duration before the actions will be executed by the USM Monitoring
Agent
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
107 9/2/2014
Condition Settings Backgrounder: Honeywell
• Severity Level
– Alarm Severity Level of the Condition's alarm event
– Default labels:
• Information
• Low
• Medium
• High
• Level 4
• Level 5
• Level 6
• Level 7
• Disable Condition
– Deactivate this Condition Item
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
108 9/2/2014
Condition Settings Backgrounder: Honeywell
• Log Action Execution
– Enables/disables the "debug tracing" of this Condition
• If enabled, then the Condition logs every activity
– This includes internal activities (such when it ran a program or did a
Net Send) and user-defined event log messages
• If disabled, then it logs only the Condition going true
• Wait for EXE's to Complete
– Enables/disables waiting before continuing with other actions of the
condition and before processing other conditions
• During execution of conditions, if any programs are to be launched, then
by default they are launched and left to run
– If this flag is set, then execution of any other action is delayed until
the program completes
• Prevent Loading:
– If enabled, the Condition Item will not be loaded to the local node
• This helps reduce resource loading on the memory and CPU
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
109 9/2/2014
Condition Settings Backgrounder: Honeywell
• Read Only Information:
– Current State
• Current evaluated state of the Condition:
– Alarmed = TRUE
– Ok = NOT TRUE
– Last Changed
• Time of last transition of the Condition from TRUE to FALSE, FALSE to
TRUE, or first evaluation when agent started, or "Never"
– Currently Loaded
• Indicates that the Condition Items has been loaded and, unless disabled,
is being evaluated by the agent
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
110 9/2/2014
Condition Settings Backgrounder: Honeywell
• Condition
– Statement defining the event to be detected
• Description
– Free form description of the Condition Item
• Time Calculator
– This button displays the window for the Time Calculator utility
• Monitor Items
– This button displays the Monitor Item Browser window, showing the existing
Monitor Items available for use in the Condition and Variable statements
– The Monitor Item name can be copied from the Monitor Item Browser to the
Condition and Variable statements
– Monitor Items to be used in the Condition Item must exist in this list
• Accessed Items
– This button displays the list of Monitor Items currently used by the Condition
Item
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
111 9/2/2014
USM Configuration Honeywell
• Condition Item example:
– This example uses two Monitored Items
• RDI.MYTEST.InterfaceState
• ConnectedToPHDServer
– And three different states that if they prove
true the condition Action will run
– The condition
• RDI.MYTEST.InterfaceState <> 3 AND
RDI.MYTEST.InterfaceState <> 2 AND
ConnectedToPHDServer = 1
– Detects if RDI.MYTEST is not
ACTIVE, is not in STARTUP and
USM is connected to PHD
• TIP: You can create a
Condition Item before you
create a Monitored Item
recommended best practice is
to create Monitored Items first
then apply them to the
condition item - this saves
double handling
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
112 9/2/2014
USM Actions Configuration Honeywell
• Condition item configuration dialog for actions
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
113 9/2/2014
USM Actions Configuration Honeywell
• Actions can be configured on condition item
– actions can be executed when condition is true
– actions can be executed when condition clears
– available actions include:
• email
– USM agent requires access to SMTP mailserver
– email subject is fixed
• execute program
– multiple programs can be executed
– attempt to take corrective action to resolve issue
• broadcast message (Uses NetSend not possible on MS Server 2008)
– send a network broadcast message to users / PCs
– requires Windows Messenger service to be enabled on receiving PCs
• event log
– configure a message to be written to the Uniformance Event Log
• variable manipulation
– perform calculations and manipulate working variables
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
114 9/2/2014
USM Actions Configuration Honeywell
• Agent Action Execution Order
– An agent executes condition Actions and Clear All Actions in the following
order:
• Variables
• Event Log
• Broadcast (Uses NetSend not possible on MS Server 2008)
• Execute
• Email
– You don’t have to setup any of the actions if you don’t want or you have the
freedom (within plant specifications) to have all of the actions switched on by
entering appropriate data
– It is not the purpose of this document or course to teach you how to write
variables for further information on variables and variable syntax review the
USM help file
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
115 9/2/2014
Planning USM Utilization Honeywell
• Backgrounder _ Big Picture
– Planning any implementation of USM is essential
– You will need to work closely with the naming convention that complies with
your Plant Reference Model (PRM) or plant naming standards
• If you don’t have any naming conventions use the USM Implementation
Guide Naming Conventions as a working reference
– TIP: It is a good idea to document your naming convention structure
and recommendations so that others can work with or understand
the naming structure
– Information on next few slides are extracted form the USM Implementation
Guidelines
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
116 9/2/2014
Naming Convention and Guide Lines Honeywell
• Monitor Items
– Monitor items will be named as follows:
• Subsystemname.objectname.description
– where subsystemname will be one of the following:
• Email
• Env
• Flag
• OS
• Path
• PHD
• RDI
• RDC
• Process
• TagValue
• TagConf
• TagTime
• Tag Store
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
117 9/2/2014
Naming Convention and Guide Lines Honeywell
• Monitor Items(continued..)
– An objectname is the name of the object or parameter being monitored (ie,
an RDI name, hostname, PHD tagname, etc)
• For Example:
– RDI.GYO30B_2C2.InterfaceState
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
118 9/2/2014
Naming Convention and Guide Lines(continued…) Honeywell
• Condition Items
– Condition items will be named as follows:
• Subsystemname.objectname.description where objectname is the name
of the object or parameter being monitored.
– For Example;
• RDI.GYO30B_2C2.InActive
• Network.ServerName.Down
– Typically, a single condition item will be used to perform data storage to
PHD tags, and will be named as follows:
• Store.PHDTags[.description]
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
119 9/2/2014
Naming Convention and Guide Lines Honeywell
• Condition Items(continued..)
– Multiple storage condition items will be used if data needs to be stored at
differing intervals, with the description being used to provide an indication of
the interval
– Similarly, a single condition item can be used to perform multiple
calculations
• While each USM node may only require a single calculation condition
item, multiple may be created, to allow calculations to be grouped,
and/or to allow different calculation intervals
– The naming convention for these will be:
• Calcs.description
– Condition Items used for performing calculations and data storage will be
configured with a severity level of “Information”
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
120 9/2/2014
USM RDI Honeywell
• USM RDI:
– allows USM information to easily be historised into PHD tags:
• value of monitor item
• value of condition item
– data collection is by exception
– USM RDI can also write values to USM working variables
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
121 9/2/2014
Overview USM RDI Utilization Honeywell
• Create USM RDI in PCT
– We will cover RDI in a later section in more detail
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
122 9/2/2014
USM RDI Honeywell
• RDI parameters:
– Hostname = name of server where RDI will execute
– RDI Type Name = USM
– Source System = LOCAL
– command line parameters:
• debug level
• disable insertion of 0/-1 values during RDI Startup/Shutdown/Resync
• name or IP address of host to communicate with
– name of server where USM is running (default = localhost)
• port number
– only required if USM is listening on a non-standard port
• username for authentication
• password for authentication
– if specified here, username and password will be in clear text in
registry
– recommendation is to specify username and password via USC
instead of in PCT
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
123 9/2/2014
USM RDI Honeywell
• Use RDISetup to build configuration
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
124 9/2/2014
USM RDI Honeywell
• Execute interfaces.dat from phdman prompt
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
125 9/2/2014
USM RDI Honeywell
• Configure RDI user account
– RDI must be running as a user with read access to PHD (member of “Local
Operators” group)
– if writing to USM working variables through RDI, then user must be member
of “Product Administrators” group
– set user account for RDI through USC
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
126 9/2/2014
USM RDI Honeywell
• Tag Configuration
– for polling monitor items:
• source tagname = m:<monitor item name>
– ie, m:CommittedBytes
or just CommittedBytes
– for polling condition items:
• source tagname = c:<condition item name>
– ie, c:HighCPUUsage
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
127 9/2/2014
USM Debugging Honeywell
• Debug info written to files in Log Files directory:
– PHDStart.log
• contains service-level information
– PHDStartEvent.log
• contains details of monitor items and conditions as they are processed
• Can add debug parameter to registry
– HKLM\System\CurrentControlSet\Services\
PHDStart\Parameters\InformationLevel
• DWORD
– default value is 1, can be set up to 10
• requires service restart to take effect
• Debug level can be set dynamically via USC or via phdctl
– phdctl debug phdstart 10
– phdctl debug phdstart off
• takes effect immediately
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
128 9/2/2014
Think Ahead Honeywell
• What Am I trying to Achieve with USM?
– Some basic questions you need to understand before you configure USM:
– What do I need to monitor?
• Is it a PHD or OS System monitored Item ?
– What happens if the monitor item is identified by the condition item as true?
• What rules will apply?
• What actions need to take place?
– How many times will the Monitored item be permitted to remain it
the condition state before action is taken?
– Do you need to execute an action? (for example; like restart an RDI)
– Do you need to email, sms, network broadcast what has happened?
– Who needs to be informed?
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
129 9/2/2014
Lab Exercises Honeywell
• Objective of USM Lab exercise is to familiarize you with USC/USM
interface and basic USM functionality
• Start Lab Exercise USM001
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Monitor
130 9/2/2014
Monitor and Troubleshoot PHD Operation
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
131 9/2/2014
Lesson Objective Honeywell
• Objective
– Monitor and control the operation of the PHD Server through the PHDMAN, USC and
PHDCTL utilities
• Topics
– PHD System Tasks
– PHDMAN Utility
– PHD Server Directory Structure
– Global Section Files
– PHDCTL Utility
– Command Files
– Named Parameters
– Interface Control
– PHD Services
– Logs
– Transparent Data Access
– Test OLE DB Provider
– Hands-on Exercises
– Honeywell Diagnostics
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
132 9/2/2014
PHD Services - PHD Server and RDI Server Honeywell
• The RDI Server manages up to 50(32bit) or 100(64bit) Real-time Data
Interfaces and 7 PHD/Experion Links (for 32bit & 64bit), performing data
collection through dlls
• The PHD Server controls the memory regions used by PHD
– It uses a connection to the Uniformance Database Server, which supports
large block transfers of configuration data, as required when building the
TDEF memory section
• PHD Services:
– PHD Startup
– RDI Server
– PHD Server
– API Server
– Remote API Server
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
133 9/2/2014
PHD Services - PHD Server and RDI Server Honeywell
• The PHDStartup is the very first Uniformance service to start
– PHDStartup Service controls automatic startup of components in the
following logical order:
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
134 9/2/2014
PHD Services – API and Remote API Server Honeywell
• API Server
– API Server provides an interface for application access and all user
interaction with the PHD Server
– PHD OPC Server, PHD OLE DB Provider, and Legacy API Server provide
interfacing capabilities
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
135 9/2/2014
PHD System Tasks Honeywell
• CONSTORE
– PHD Continuous Store Process moves collected data from memory and stores it to
the PHD archive system
• PHDMAN SHO SYS
– To view status and configuration
• USC
– USC is a MMC (Microsoft Management Console) snap-in console added to manage
the PHD system
– It is used for monitoring and viewing the system status
– The intended use of the Uniformance System Console is centralized monitoring of
processes, services, and applications on multiple servers
– The intended audience includes system administrators, network administrators, and
Uniformance PHD (Process History Database) administrators
– References:
• Course Module: PHD R310 Uniformance System Console
• Uniformance System Console User Guide (pim0241)
• PHD System Manual (pim0301.pdf), Monitoring PHD Integrity
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
136 9/2/2014
PHDMAN System Control Honeywell
• PHDManager> SHO SYS or MON SYS
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
137 9/2/2014
PHDMAN Mon Sys = USC Monitor System Honeywell
• Monitor System
– Automatically refreshes
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
138 9/2/2014
PHDMAN System Control, continued Honeywell
• PHDMAN Show and Monitor commands
– SHOW (show archives, logical archives, interfaces, system status, all named
parameters, tag data queues, tag configuration, tag routing, shared memory
sections)
– MONITOR (monitor continuous refresh of system, interface, queues, tag,
shared memory sections)
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
139 9/2/2014
PHD Directory Structure Honeywell
• PHD is installed in the following major
directories:
– Archive
• Default location for PHD archives files
– Can be moved to another disk
– GblSect
• Location of PHD global section paging
files
– NtSite
• Site-specific procedures and
parameters
– RDI
• RDI executables and dll files
• NOTE (Log file location):
– Windows Server 2003: C:\Program
Files\Common Files\Honeywell\Uniformance
– Windows Server 2008:
C:\ProgramData\Honeywell\Uniformance\Lo
g Files
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
140 9/2/2014
PHD Global Section Files Honeywell
• GblSect Directory:
– PHDCUR.GBL - Current Queues
– PHDPRC.GBL - Virtual Calculations and Functions
– PHDSCON.GBL - System Control for PHD configuration and inter-process
communication. Holds information about RDIs, connected archive files and
logical archives and named parameter values.
– PHDTDEF.GBL - Tag Definitions, User Definitions, and R210+ Digital
Enumeration tables
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
141 9/2/2014
Stop and Start PHD System Honeywell
• The PHDCTL command line utility is used to control the PHD Server
• Valid PHDCTL commands are:
– PHDCTL STOP
– PHDCTL START
– PHDCTL START COLD (New in R200+)
• Note: By default PHD on most starts will endeavor to warm start even if
power is lost
– A Cold Start causes PHD to delete its local configuration files (global section
files) and reload its entire configuration from the configuration database
– Use PHDCTL STOP to warm shutdown the PHD system.
– Use PHDCTL START to warm start the PHD system.
– Use PHDCTL START COLD to cold start the PHD system
• The global files are recreated and all data buffered in the memory
queues will be lost
• NOTE: The simplest way to start and stop PHD is through USC
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
142 9/2/2014
PHD Cold Startup Command Honeywell
• There is a COLD START initialization and
startup of the PHD system when a previous
system context cannot be restored
• COLD START is a complete initialization and
configuration of the PHD system
– Used primarily for initial hardware startup or
upgrades
• COLDSTART.DAT- PHDMAN commands
– INITIALIZE CONTROL - Initializes the PHD
system control (SCON) - (system is left in the INIT
state)
– INITIALIZE SYSTEM - Initializes the system by
creating online tag definitions (TDEF section) and
current value database (CUR section)
– INITIALIZE PROCEDURES - Initializes the PRC
section (calculated tag procedures)
– Uses the system parameters MAX_PRCMODULE,
MAX_PRCFUNC, and MAX_PRCPOOLKB to size
the section areas
• PHDPARAMS.DAT- Named parameters
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
143 9/2/2014
USC PHD – Start-Stop Honeywell
• Select PHD server
(localhost) Right Click >All
Tasks>Start Uniformance or
choose Stop Uniformance
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
144 9/2/2014
USC – Start Honeywell
• Uniformance Start Dialog
– Selecting Perform Cold Start causes PHD to
delete its local configuration files (global section
files) and reload its entire configuration from the
configuration database
– De-selecting Perform Cold Start causes PHD to
Warm Start
– Starting the Uniformance PHD Startup service
implicitly executes the WARMSTART command
procedure
– Warm Start is a faster startup for PHD because
it uses previous references stored in the global
section files
– Note: Warm Start option may be noticeably
quicker start if your Uniformance solution has a
large number of tags
– Warm Start is also a useful method of starting
Uniformance server if SQL server is not
available
– Note: If a Warm Start fails PHD will force a Cold
Start
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
145 9/2/2014
USC PHD – Stop Honeywell
• Uniformance Stop Dialog
– Selecting Shutdown All Services
option shuts down:
– API Server
– PHD Server
– Remote API Server
– RDI Server
– DB Security Server (optionally)
– Database Server (optionally)
– Note:
• Using Stop the Uniformance
PHD Server option will stop
Uniformance server and its Selecting Perform Cold
directly associated services in Start causes PHD to
the correct order delete its local
configuration files (global
• Optionally, this command will section files) and reload
also shutdown the Uniformance its entire configuration
Database services if they are from the configuration
database
installed using all the Shutdown
All Services option
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
146 9/2/2014
PHD Named Parameters Honeywell
• A primary method of configuring PHD for particular site requirements is
by using Named Parameters
• The file PhdParams.Dat specifies the Named Parameter values
• The file PhdParams.Dat is located in this
directory:_________________________________
• PHD Command to show parameters:
– sho param
– sho par all
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
147 9/2/2014
PHD Named Parameters - USC Honeywell
• PHD Command to show parameters via USC:
– USC>localhost> Uniformance PHD Server>Show Parameters
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
148 9/2/2014
PHDMAN Interface Control - USC Honeywell
• RDI Show and Monitor
commands:
– SHO INT ifname or SHO INT
– MON INT ifname or MON INT
• NOTE: PHDMAN 210+
supports partial wildcards and
regular expressions, such as
SHO INT T*, which will match
all RDIs whose names start
with "t"
• To continuously monitor the state
of an RDI named “MYTEST”, you
would type this command:
____________
• USC: You could also use
USC>localhost> Uniformance PHD
Server>Monitor Interface then use
the Command Parameters link -
enter RDI name in dialog
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
149 9/2/2014
PHDMAN Interface Control or USC, continued Honeywell
• Start and shutdown interface
commands:
– START INT ifname
• Initiates startup of specified
interface(s)
– The Interface is placed
in the START state and
goes to the ACTIVE Various condition
state once active indicators
– SHUTDOWN INT ifname
• Initiates a shutdown of
specified interface(s)
• The interface is
placed in the
SHUTDOWN state
then goes to the
INACTIVE state
when all processes
terminate
• Review USC Module of this Commands that you can
course for more details on apply to interface (RDI)
stopping and starting RDI’s
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
150 9/2/2014
Hands-on Exercise Honeywell
• Exercise 1
– In this exercise you will view status and configuration of the system tasks
CONSTORE
• Using PHDMAN, display the current status of the continuous store
process (CONSTORE): SHO SYS
• What is the storage interval on this system? Interval =
___________________
What is the offset of the storage interval to the system clock (seconds)?
off = _____
• Using USC, display status of system:
• USC>localhost>Uniformance PHD Server>Monitor System
• Compare differences between PHDM MON SYS and USC Monitor
System presentations of data (Review Module 10 (this Module)
Slide/Page 12)
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
151 9/2/2014
Hands-on Exercise, continued Honeywell
• Exercise 2
– In this exercise you will stop and restart the PHD system
• Shutdown the PHD system: From the Administrator command prompt, enter
PHDCTL STOP
• From the Administrator command prompt, attempt to check the status of the
system, enter PHDMAN SHO SYS
• NOTE: Error message will appear confirming can not connect
• From the Administrator command prompt Restore the PHD system and restart it
(warmstart):
– PHDCTL START
• Using PHDMAN, monitor the status of the system: MON SYS.
• After the warm startup completes, use PHDMAN SHO QUE TAG01 to verify that
the data in the memory queue for your tags was saved and restored
• Using USC check the startup messages in the PHD_EVENT LOG file
• Using Windows Explorer, examine in detail using notepad.exe the Coldstart,
Warmstart, Warmshut and PhdParam.DAT files
• Close the .DAT files
• Using USC:
– Stop Uniformance
– Attempt to review Uniformance PHD Server> Monitor System
– Start Uniformance – Perform COLD START
– Review PHD_EVENT LOG file
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
152 9/2/2014
Hands-on Exercise, continued Honeywell
• Exercise 3
– In this exercise you will stop and start RDIs
• Using PHDMAN, monitor the status of all interfaces on your system:
MON INT *
• Open a second PHDManager window and stop and restart one of the
interfaces – use the other window to monitor the RDI state transition:
– SHU INT <rdi_name>
– START INT <rdi_name>
• Use the PHDMAN command SHO INT linemode to show all RDIs
• Use USC to Stop and Start a RDI (See Exercises USC001 and section
Using USC in this training manual)
– Hint: Refresh
• Review PHD_EVENT.LOG
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
153 9/2/2014
PHD Services – Startup Requirements Honeywell
• PHD Services run as
either:
– Network Service
– Local Service
• You can use USC to
check what Account
a service runs under
and edit if directed
by GTAC
For Uniformance
Services: Use either Local
Service or Network
Service Accounts
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
154 9/2/2014
PHD Logs Honeywell
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
155 9/2/2014
PHD Logs, (continued) Honeywell
• At any time, PHDCTL,
PHDMAN commands can be
used to save old log files and
create new logs
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
156 9/2/2014
PHD Logs, (continued) Honeywell
• Whenever there is a problem with the startup of a service or the startup of PHD,
check with USC>Event Viewer first or you may use the default Windows Viewer
for the Event Log
– The messages for PHD reside in the Application log under the PHD application name
• PHD Logs:
– Messages are logged when the PHD system is started and shutdown
– Messages are logged when each real-time interface and instance is started and
shutdown
– Messages are logged during the execution of each interface with codes and text
specific to each error type supported by the real-time system vendor
– Messages are logged from the PHD Monitor process when an interface or system
process is no longer functional
• NOTE:
– On your installation you may have more or less log files depending upon installation
and configuration of your system
– Expect to see RDI log files on your installation
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
157 9/2/2014
PHD Logs, (continued) Honeywell
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
158 9/2/2014
Enable Logging of Debug Messages Honeywell
• Use the log Debug Level (also referred to as Log Level and Information
Level) to increase the amount of information provided in a PHD log
– Typically, this should be done only at the request of Honeywell personnel
who are troubleshooting a PHD problem
– The higher the debug level (0-10), the more detail is output to the log
• Off = debug level 1
• On = debug level 2
• Any time a service is active, its debug level can be changed dynamically
by entering the following command at a Command Prompt (or use USC
much easier):
– PHDCTL DEBUG <service> n
– PHDCTL DEBUG <service> on
– PHDCTL DEBUG <service> off
• Troubleshooting can be aided by creating a registry DWORD entry
called InformationLevel for each PHD service
• When needed, you can use the registry entry to setup the service’s
debug level that will then be used on startup of the service
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
159 9/2/2014
Connect to PHD Honeywell
• Remote PHDMAN and Telnet Access to PHD
– Telnet not available in 2008 Server by default
• Remote PHDMAN: PHDMAN /s<RemoteHostname>/3100
– APIServer default port: 3100
– Remote PHDMAN can be run from any Windows-based platform connected
to the network
– All PHDMAN commands except Execute are available if connected as a
user that is a member of the Product Administrators group on the remote
host
– The Procedure to install PHDMAN on a remote machine is on the Honeywell
SSOL website in the Uniformance Knowledge Base, and it is included in this
course material
• Support for Windows Terminal Server
– PHD 210+ supports use of Microsoft Windows Terminal Server as a tool to
remotely administer a PHD system
– This support applies to desktops and stand-alone PHD servers only
– Other Honeywell products, such as APP nodes, may not support the use of
Windows Terminal Server in their installations
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
160 9/2/2014
PHDMAN Security Honeywell
• The PHD setup installation
program adds one Windows local
group for each of these:-
– Local Operators
– Local Engineers
– Product Administrators
• Members of Product
Administrators group are
allowed to perform all
PHDMAN commands,
including system
management functions that
modify server configuration or
operation
• The PHD_EVENT.log tracks the
following changes made through
PHDMAN: Starting/Stopping
system, Starting/Stopping
interfaces, Changing parameter
values
Command
performed using
PHDMAN
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
161 9/2/2014
Hands-on Exercise - Services Honeywell
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
162 9/2/2014
Hands-on Exercise – Logs Working with Debug Level Honeywell
• Exercise 7
– In this exercise you will change the debug level of log files for PHD services
– Typically, you would need to do this only when requested by Honeywell personnel
• Review the log content for Uniformance APIServer.LOG your machine by file or
via USC
• NOTE: Using the command line method you could change the debug level to 10
for one of your PHD service logs:
– PHDCTL DEBUG <ServiceName> <DebugLevel>
• Valid ServiceName: apiserver, rapiserver, rdiserver, PHDServer,
nsserver, tagsync, and remote RDIs
• DebugLevel: The initial default debug level is 1
• Valid debug level numbers are from 0 (disabled) to 10
– Using the registry editor in USC review:
• System\CurrentControlSet\Services\APIServer\Parameters
• NOTE: Most of the configuration settings for APIServer resides here
– In USC select Uniformance APIServer>+Debug Level
• Set it to maximum of 10
– In USC review APIServer.LOG notice it is collecting more data in greater detail
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
163 9/2/2014
Hands-on Exercise – Logs Working with Debug Level Honeywell
• Exercise 7
– In USC
• Stop the Uniformance APIServer using the stop service link or right clicking on
Uniformance APIServer and select All Tasks>Stop Service
• Review data collected in APIServer.Log
• Restart Uniformance APIServer review APIServer
• Log while in USC
– Navigate to actual log file or use USC and record size of file has now increased from
0kb to __________
– Reduce debug level down to 1, from USC select Uniformance APIServer> in the right
hand lower pane select link+Debug Level enter “off “in debug dialog
– Review data collected in APIServer.Log confirm the debug level has reduced to 1
– Try using 0 as the debug level and review APIServer.Log record the debug level is
now set to ____
– NOTE: To permanently set the debug level to a set debug setting you could edit the
Windows Registry Microsoft Regedit.exe:
• Browse to the following:
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\APIServer\Param
eters
• Add InformationLevel REG_DWORD
• Set the value to 10 decimal
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
164 9/2/2014
Hands-on Exercise - Logs, continued Honeywell
• Exercise 8
– In this exercise you will save existing logs and create new log files
– NOTE: The simplest way to backup log files and clear all logs is to copy
them from their directory and rename them if required
• Save and clear one of the PHD service logs using Command Prompt:
– PHDCTL CLEAR /SAVE <ServiceName>
• Where:/SAVE specifies that existing log file(s) be saved
• <ServiceName>: Enter APIServer, RAPIServer, RDIServer,
PHDServer
– RESULT: The old log is saved and a new log created
• Example: For APIServer - TimeStamp.LOG is created with old
log saved and the default log file is cleared
• Save and clear all of the service logs:
– PHDCTL CLEAR /SAVE
• Use PHDMAN to create a new version of PHD_Event.log and save the
previous version:
– PHDMAN CREATE LOGFILE
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
165 9/2/2014
Hands-on - Test OLE DB Provider Honeywell
• Exercise 9:
– The SQL Server OLE DB Provider
functions in communication between PHD
Server and SQL Server
• In this exercise you will test the
communications using the Microsoft
Data Link test utility:
– Create a blank file TEST.UDL in
any directory on the PHD Server
• Create a blank text file and
rename it to TEST.UDL
ignoring all messages
– Double click the file to launch the
Microsoft Data Link test utility
– The Data Link Properties dialog
will appear
– On the Provider Tab, Microsoft
OLE DB Provider for SQL Server
is selected
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
166 9/2/2014
Hands-on - Test OLE DB Provider Honeywell
• Exercise 9:
– In Connection tab, enter
Machine name of the server
where SQL Database is
located in Server Name Field
– Ensure that you select : “Use
Widows NT Integrated security”
– Select the Database on the
server: PHDCFG
– Click Test Connection
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
167 9/2/2014
HwlDiag – Honeywell Diagnostics Utility Honeywell
• Utility for collecting and viewing configuration details from servers
• Saves configuration info into compressed and encrypted file
• Used regularly by Honeywell support personnel
– GTAC may require that you run diagnostics
• Included on PHD R310 DVD
• Suggested usage:
– Put a copy of hwldiag on every PHD server
– Capture configuration of each server before and after making changes
– Maybe run hwldiag on a regular basis
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
168 9/2/2014
Using HwlDiag Honeywell
• Included on PHD310 DVD
– Note: Uniformance Installation Utility will not run from a UNC, but works from
a mapped drive
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
169 9/2/2014
Using HwlDiag – Collecting Data Honeywell
• Run “Honeywell Diagnostics” from UIU
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
170 9/2/2014
Using HwlDiag – Collecting Data Honeywell
• Hit “Collect” to start data collection
– Data collection may take several minutes
– Prompted to specify additional info (site name, etc)
– Prompted for filename
– Prompted to also save log files
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
171 9/2/2014
Using HwlDiag – Viewing Data Honeywell
• Run “view data” shortcut from UIU
– Can also run from a command prompt or shortcut:
• hwldiag /eng
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
172 9/2/2014
Using HwlDiag – Viewing Data Honeywell
• Load .Hdg data file
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
173 9/2/2014
Using HwlDiag – Viewing Data Honeywell
• Lots of detailed configuration information available
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
174 9/2/2014
Using HwlDiag – Comparing Data Files Honeywell
• Hwldiag can identify differences between two hwldiag data files
• Run “compare results” shortcut from UIU
• Can also run from a command prompt or shortcut:
– hwldiag @compare /eng
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
175 9/2/2014
Using HwlDiag – Comparing Data Files Honeywell
• Load two data files
• Hit “compare”
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
176 9/2/2014
Using HwlDiag – Comparing Data Files Honeywell
• Select sections to compare
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
177 9/2/2014
Using HwlDiag – Comparing Data Files Honeywell
• Will show number of differences identified
• Details of differences available on “comparison results” tab
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
178 9/2/2014
Using HwlDiag – Comparing Data Files Honeywell
• Hwldiag will highlight differences
• Many failures are caused by configuration changes
• Hwldiag allows differences to be quickly identified
• Note:
– You may need to load individual data files in hwldiag to see actual
differences, i.e. contents of interfaces.Dat
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
179 9/2/2014
Diagnostics Exercise Honeywell
• Exercise 10
– Double click on the HwlDiag.exe –shortcut on the desktop (If not locate the
file C:\HwlDiagx86\HwlDiag.exe and open it)
– Default Honeywell Diagnostics dialog will be presented
– Click on each header tab and review what is presented
– Return to the Collect Information Tab
– Select Collect button
– Once the Diagnostic tool has run you will presented with User Details form
fill in details as required
– Click OK
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
180 9/2/2014
Diagnostics Exercise Honeywell
• Exercise 10
– Then you will presented with a save file or Select File For Collected
Information dialog
– Save file as Collection001
– Leave file location at C:\HwlDiax86
– Ensure that you save it as a Honeywell Diagnostic file the application will
then automatically apply the correct file extension
– Note: Should Honeywell request a diagnostics report you would email this
file to support when requested for them to do further investigation and report
back on their recommendations or findings
– Now navigate to C:\HwlDiagx86 and see if you can locate your file
• It should be called Collection001.hdg
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
181 9/2/2014
Diagnostics Exercise Run with/ Eng Honeywell
• Exercise 11
– Using Command Prompt enter :
• C:\HwlDiagx86\Hwldiag.exe /eng
– Note: There is a space between .exe and /eng
– Enter
– The Engineers Diagnostic Tool opens note you now have a lot more tabs to
work with (Review Module 10 Slide/Page 55)
– Open each Tab and review contents
– Note: That some Tabs have vertical tabs on the right hand side as well like
the Files tab
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
182 9/2/2014
Diagnostics Exercise Run with/ Eng Honeywell
• Exercise 11
– Return to the Collect Information tab
– Click on Load Button
– Navigate to where you saved Collection001.hga
– Select Collection001.hga
– Review each tab and read the information presented in each tab
– Select Registry tab
– Navigate through the Registry items
• HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\RDISer
ver\Parameters\RDI List\MIRDI
– Click on each registry item below MIRDI and review changes in the right
hand pane
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
183 9/2/2014
Honeywell
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Monitor and Troubleshoot PHD Operation
184 9/2/2014
Uniformance System Console Introduction
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
185 9/2/2014
Lesson Objective Honeywell
• Objective
– Build familiarity with Uniformance System Console, demonstrating how to
configure and utilize the tool
• Topics
– What is Uniformance System Console (USC)
– USC security
– How to set up USC
– Understanding how to utilize USC
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
186 9/2/2014
USC Description Honeywell
• Uniformance System Console (USC) was introduced in PHD R300
• USC is a MMC (Microsoft Management Console) snap-in console
added to manage the PHD system
– It is used for monitoring and viewing the PHD system status
– The intended use of the Uniformance System Console is centralized
monitoring of processes, services, and applications on multiple PHD servers
• The intended audience includes system administrators, network
administrators, and Uniformance PHD (Process History Database)
administrators
• USC is a graphic replacement for PHDMAN – has far greater
functionality than was available through PHDMAN
• USC provides access to all PHD server services, their settings and
ability to control the system remotely from the physical computer
• Appropriate access privileges are required to control system and alter
configuration settings
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
187 9/2/2014
USC Security Requirements Honeywell
• Which windows groups have access to USC?
– Product Administrators – Full Access
– Local Engineers – Limited Access
– Local Operators – Read Only
• Windows Security Groups
– To implement USC security between the management console and the
agent, put the appropriate global groups into USC local groups
– The group authentication applies only to the first level connection by the
management console (that is, only the connection from the console to the
agent)
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
188 9/2/2014
USC Description Honeywell
• USC provides the ability to connect via the PHDStart service on every
computer where PHD Services are installed
• Connections can utilize both trusted (automatically validating the user
account logged in with) and untrusted (when the user passes a valid
user account that can be validated) connections
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
189 9/2/2014
USC Setup Overview Honeywell
• This section covers the actions required to set up USC
• Objectives:
– Understand connection states
– Login options
– Understand how to connect to Uniformance server
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
190 9/2/2014
How to Setup USC Honeywell
• When first started USC has no information of any systems in the
environment
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
191 9/2/2014
How to Setup USC Honeywell
• To create a connection
– Right Click Uniformance System Console > All Tasks>Define Server
– Or Select Define Server link
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
192 9/2/2014
How to Setup USC Honeywell
• Define a Machine dialog opens
– Node Name: Enter the desired computer name hosting the PHD Services(or
IP Address)
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
193 9/2/2014
How to Setup USC Honeywell
• Once entered Click OK
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
194 9/2/2014
How to Setup USC Honeywell
• Should the wrong name
have been entered simply
Right Click on the name
and navigate to Remove
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
195 9/2/2014
How to Setup USC Honeywell
• To connect to the computer added in Uniformance System Console:
OR
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
196 9/2/2014
How to Setup USC Honeywell
• Trusted connection checkbox
should be selected in Logon
Dialog box, if
– Computer added under USC is
a trusted source
– Computer is a part of local
Domain
– User is a member of product
administrators or local
engineers group
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
197 9/2/2014
How to Setup USC Honeywell
• If this is going to be
a regularly used
connection, click on
“Save Details”
checkbox and then
click OK
• When Save Details
is selected, the login
dialog box will not be
displayed for
subsequent
connections to this
computer
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
198 9/2/2014
Context Menu Bar Honeywell
• The USC menu bar will change to display functional area menu icons
below are samples of four common menu bar types
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
199 9/2/2014
Show Hide Columns Honeywell
• To change the column views in the right hand viewing pane
– Select (item) in tree menu, right click >View>Add\Remove Columns
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
200 9/2/2014
USC Interface Basics - Services & Access Honeywell
• When a user with appropriate privileges is logged on to USC, using the
“Task List” option, service(s) can be forcibly killed
– Caution must be exercised while using this force kill feature, as the operating
system services can be terminated using this feature as well
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
201 9/2/2014
USC Interface Basics - Services & Access Honeywell
• Starting at the top, DCOM setting for OPC components can be seen
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
202 9/2/2014
USC Interface Basics - Services & Access Honeywell
• Ability to choose Event Logs to view
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
203 9/2/2014
USC Interface Basics - Services & Access Honeywell
• And read the contents
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
204 9/2/2014
USC Interface Basics - Services & Access Honeywell
• Registry settings can be remotely viewed
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
205 9/2/2014
USC Interface Basics - Services & Access Honeywell
• Ability to select the PHD log files
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
206 9/2/2014
USC Interface Basics - Services & Access Honeywell
• Viewing the data in the selected log
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
207 9/2/2014
USC Interface Basics - Services & Access Honeywell
• With appropriate privileges the ability to alter and create registry entries
can be performed
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
208 9/2/2014
USC Interface Basics - Services & Access Honeywell
• Note:
– All the access settings are recorded under PHDStart on the remote
computer (where USC is installed)
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
209 9/2/2014
USC Interface Basics - Services & Access Honeywell
• The ability to configure Uniformance System Monitoring is managed
under USC
– We will look at USM in more detail later in this lesson
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
210 9/2/2014
USC Interface Basics - Services & Access Honeywell
• Essentially, complete ability to view and control PHD on a remote
computer is provided by the Uniformance System Console
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
211 9/2/2014
USC Interface Basics - Services & Access Honeywell
• Interfaces running under RDIServer can be managed
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
212 9/2/2014
USC Interface Basics - Services & Access Honeywell
• Even the ability to see how RDC is working
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
213 9/2/2014
USC Interface Basics - Services & Access Honeywell
• Right Click on one of the PHD Server services and select properties
– Server Property Dialog for that particular service is available for
configuration/ viewing
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
214 9/2/2014
USC Interface Basics - Services & Access Honeywell
• While typically some settings
are not altered from defaults
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
215 9/2/2014
USC Interface Basics - Services & Access Honeywell
• There will be others
that can be adjusted
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
216 9/2/2014
USC Interface Basics - Services & Access Honeywell
• And others that a site may
need to adjust
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
217 9/2/2014
USC Interface Basics - Services & Access Honeywell
• Dependant on how much history
a site may want to retain – here
the size of the APIServer log file
has been increased to 20MB
from 10 and retaining a total of
two files
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
218 9/2/2014
USC Interface Basics - Services & Access Honeywell
• The PHDServer runs under the
Network Service Account
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
219 9/2/2014
USC Interface Basics - Services & Access Honeywell
• Default configuration has RDI command files disabled, named pipe
disabled (now using NTLM or Kerberos for authentication)
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
220 9/2/2014
USC Interface Basics - Services & Access Honeywell
• If this is the primary PHD
server that updates are
sent to, the requirement is
to add the other PHD
servers to the host listings
under the PHD Server Host
List tab
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
221 9/2/2014
USC Interface Basics - Services & Access Honeywell
• Each entry allows settings
to update the remote
system before the local
PHD system
– a delay time if needed and
should the remote PHD
system be in a different
domain or behind a firewall
• the ability to define an
authorized account
that can be used to tell
the remote system to
update it’s
configuration
Do not forget to
enable each entry
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
222 9/2/2014
USC Interface Basics - Services & Access Honeywell
• In the PHD Server configuration
the PHD_EVENT.log files are
also managed in size and
number of files
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
223 9/2/2014
USC Interface Basics - Services & Access Honeywell
• PHD Start Configuration can
be set from PHD Startup
Properties dialog, where items
such as DCOM Component
Access can be configured
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
224 9/2/2014
USC Interface Basics - Services & Access Honeywell
• RAPIServer
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
225 9/2/2014
USC Interface Basics - Services & Access Honeywell
• RDI Server
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
226 9/2/2014
USC Interface Basics - Services & Access Honeywell
• Which must also run with a user account allocated
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
227 9/2/2014
USC Interface Basics - Services & Access Honeywell
• Here the settings for the log
files of each RDI allocated
to this RDI Server are
managed
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
228 9/2/2014
USC Interface Basics - Services & Access Honeywell
• When RemoteRDI services are
installed the control of these is
also available through PHD
Start
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
229 9/2/2014
USC Interface Basics - Services & Access Honeywell
• Which ever options were
selected when performing
the installation are
available here to be
updated
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
230 9/2/2014
Lesson Topic –PHD Server Items Honeywell
• Having set up the PHD
environment through USC the
ability to manage the system is
now in place
• By utilizing the mouse Right Click
selection option on most of the
server items listed:
– The ability to start and stop
services, to adjust the debug
level, connect to the service if it
supports telnet is now available
– Under the Select View option
there are commands to view and
control the system that were
provided under the PHDMAN
utility are available
• Note: These options are Server Item
Commands similar to
context sensitive PHDMAN utility type
commands
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
231 9/2/2014
Lesson Topic –PHD Server Commands Honeywell
• By utilizing the mouse Right
Click selection option on
Uniformance PHD Server
other items become available
for use:
– PHD Commands
– PHD Utility Commands
WARNING:
Recommended only to
use if GTAC advise to
action with Kill
command to be used
as a last resort
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
232 9/2/2014
Lesson Objectives Honeywell
• Objective
– Build familiarity with USC, demonstrating how to start and stop Uniformance
PHD server
• Topics
– Startup /Shut Caution
– Warm Start /Cold Start – Which one to use and why
– Services that are shut down
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
233 9/2/2014
Caution: Uniformance – Start-Stop Honeywell
• Uniformance PHD is designed to collect data continually 24x7
– Warning: Do not stop and start Uniformance PHD on a production server
without implementing a data collection and/or backup strategy
• It is always advisable to review your site operational directives and
obtain appropriate approvals before you shutdown or restart a
Uniformance PHD server
• It is always advisable to utilize and test your development Uniformance
PHD server to ensure that you can recover data before you shutdown or
restart a production server if unsure of impact
• Possible Data Loss:
– It is possible to lose collected data during either a Windows Server or
Uniformance PHD server restart or system shutdown
• Robust Data collection:
– Uniformance PHD is designed to be self-starting and if configured history
restore may self-heal lost data if possible
• For example: Uniformance PHD is designed to obtain missing collected
and calculated data when the Windows server is rebooted if robust data
collection or clustering has been implemented
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
234 9/2/2014
Uniformance – Start-Stop Honeywell
• There are two common types of start procedures for PHD:
– WARMSTART - It is common (default) to automate the WARMSTART
procedure with normal startup procedures for the computer
• Under Windows, starting the PHD Startup service implicitly executes the
WARMSTART command procedure
– COLDSTART - Selecting Cold Start causes PHD to delete its local
configuration files (global section files) and reload its entire configuration
from the configuration database
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
235 9/2/2014
Uniformance – Start-Stop Honeywell
• PHD Server Backgrounder:
– The PHD Server service controls the memory regions used by PHD
– It uses the OLE DB connection to the SQL Server database
– When the PHD server is rebooted, a predefined startup procedure is
executed by the PHD Server service
• A warmstart is initially attempted and, if this fails, then a full cold start is
performed
• There are times that you may need to stop and start the Uniformance
PHD server like refreshing global references, updating PHD etc
– In this training environment is not as critical as a live production environment
and shortly you will be able to stop and restart your Uniformance PHD server
(during exercises)
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
236 9/2/2014
Uniformance Commands – Start-Stop Honeywell
• Select PHD server Right Click
>All Tasks>Start Uniformance or
choose Stop Uniformance
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
237 9/2/2014
Uniformance Commands – Start Honeywell
• Selecting Perform Cold Start causes PHD to delete its local
configuration files (global section files) and reload its entire configuration
from the configuration database
• De-selecting Perform Cold Start causes PHD to Warm Start
– Starting the Uniformance PHD Startup service implicitly executes the
WARMSTART command procedure
– Warm Start is a faster startup for PHD because it uses previous references
stored in the global section files
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
238 9/2/2014
Uniformance Commands – Start Honeywell
• Note:
– Warm Start option may be
noticeably quicker start if
your Uniformance solution
has a large number of tags
– Warm Start is also a useful
method of starting
Uniformance server if SQL
server is not available
– If a Warm Start fails PHD
will force a Cold Start
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
239 9/2/2014
Uniformance Commands – Stop Honeywell
• Selecting Shutdown All
Services option shuts down:
– API Server
– PHD Server
– Remote API Server
– RDI Server
– DB Security Server
(optionally)
– Database Server
(optionally)
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
240 9/2/2014
Uniformance Commands – Stop Honeywell
• Selecting Perform Cold Start
causes PHD to delete its local
configuration files (global
section files) and reload its
entire configuration from the
configuration database
• Note:
– Using Stop the Uniformance
PHD Server option will stop
Uniformance server and its
directly associated services in
the correct order
– Optionally, this command will
also shutdown the
Uniformance Database
services if they are installed
using all the Shutdown All
Services option
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
241 9/2/2014
Improve Start Time of PHD Client Applications Honeywell
• If this tweak is permitted by site
security specifications it will
speed up the application start
times of client applications like
PCT and USC that are directly
installed on the Uniformance
PHD310 server
– It turns off the OS certificate
checking option increasing from
a users perspective the
application start time
• In other words, “ it reduces
how long the user has to
wait to see the application
open like USC or PCT”
• Select Disable Certificate
Checking
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
242 9/2/2014
Improve Start Time of PHD Client Applications Honeywell
• Ensure that all certificates are disabled
• If not disabled check each item in the grid then click the Disable button
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
243 9/2/2014
Lab Exercises Honeywell
• Objective of USC Lab exercise is to familiarize you with USC interface
and its basic functionality
• Later in the course you will be using these USC primary skill-sets so that
you will be able to complete higher level tasks
• Start Lab Exercise USC001
Honeywell Confidential
Uniformance Tools Copyright © 2013 Honeywell International Inc. Uniformance System Console Introduction
244 9/2/2014