Tech Note 508 - Troubleshooting App Server Processes
Tech Note 508 - Troubleshooting App Server Processes
All Tech Notes and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use for more information.
Topic#: 002234
Created: November 2007
Updated: September 2009
Introduction
A Wonderware Application Server process or file can appear to stop responding. The most common causes are:
Security Restrictions
If any of the above factors are present, they can cause unpredictable and adverse behaviors.
This Tech Note provides general guidelines for troubleshooting non-responsive Application Server processes, and providing an optimal
environment for a Wonderware Application Server implementation.
Application Versions
Industrial Application Server 2.1 and later (includes Wonderware Application Server)
Process Description
aaEngine.exe Engine Module
aaPlatformInfoSvr.exe PlatformInfoServer Module
aaBootstrap.exe Bootstrap Module
aaGlobalDataCacheMonitorSvr.exe GlobalDataCacheMonitorServer Module
aaGR.exe Galaxy Repository service that processes requests to the ArchestA
configuration subsystem.
aahSCM.exe ArchestrA Historian SCM
aaLogger.exe aaLogger Module
aaUserValidator.exe UserValidator Module
NmxSvc.exe NmxSvc Module
slssvc.exe SuiteLink Inbound Connection Service
While there is no specific error message in the SMC logger that explicitly indicates a frozen or locked process, unpredictable system
behavior can be sufficient reason to check these processes.
SMC Error Logger message, which includes component name and description.
Windows Task Manager and sorting by process name (aaEngine aaBootstrap, etc.).
Microsoft Event Viewer application and the System Logs for additional information, where applicable.
File Locking
File Locking is typically caused by such popular application types as:
Anti-Virus software
Defragmenting Software
The redundant App Engine uses all available RAM, and the system does not respond.
The status of the Standby Engine is resyncing with partner, and uses up to 100% CPU.
Perform maintenance, backups or other disk-intensive operations during a planned maintenance window with scheduled downtime (where
applicable). Files are often locked during the back or copying process. In a running App Server environment, this can cause issues with
the checkpoint files and can result in system instability.
Security Restrictions
Typical Security Restriction conditions include the following items:
Security Controls that prohibit DCOM, Shared Network Folders, or other file level security constraints imposed either by local or
remote group policies. A common example is a Group Policy Object pushed from an Active Directory implementation on the domain.
Local User-based permissions (i.e., User, Power, Administrator). Ensure the user being invoked has the matching permissions
that the application requires.
Ensure that "background" users are correctly verified for appropriate security levels. For example, users with NT
AUTHORITY\Network Service and ArchestrA Network User Account permissions.
When working with any kind of Web Services, check the IUSR and IWAM accounts.
Deploying Platforms Engines, Areas and Objects fails and generates the following errors:
Failed to deploy Platform <PlatformName>: remote node's UserID/password don't match the GR Node.
Error: Failed to deploy Platform <PlatformName>. Cannot communicate with remote node version information from bootstrap.
Error: Failed to deploy code modules to target when deploying objects to another node.
Note: If your system is part of a Window 2000 or Windows 2003 Active Directory Domain, your network administrator may need to
manually change the settings. Contact wonderware technical support for further information.
Ensure that any corporate level Group Policy Object’s are permanently configured and aligned with the required application
permissions.
Low Memory
Use diagnostic tools or information such as Microsoft Performance Monitor to trend resource utilization over time. See Tech Note
329 for details.
Refer to IAS Engine Statistics that are provided by default when an IAS engine is deployed. For example, check for Scan Overruns
or the Scheduler.CheckpointPeriodAvg attribute, viewable from Object Viewer.
When analyzing an IAS Redundant partner, ensure that it is capable of supporting two nodes in the event of a failover. A "good
rule-of-thumb" is that the CPU should average 30-40 % or less per processor on both nodes in the redundant pair.
Follow best-practices for Architecture and Plant modeling as described in the FSA2 Deployment Guide.
Leverage the Wonderware Historian by historizing Platform and Engine performance metrics for trend analysis.
As architecture requirements increase, it is more effective to have a highly-distributed network of entry level Automation Object
Servers (AOS) rather than a small number of powerful and centralized Automation Object Servers.
Keep all software running at its latest major version, patch, or service pack level.
After installing Application Server, configure your antivirus software to prevent archive files from being scanned. Also, antivirus software
should not scan files in the following ArchestrA folders (ensure subfolders of the listed directories are also excluded):
C:\Program Files\ArchestrA\
C:\Program Files\Wonderware\
C:\InSQL\Data\
Other Information
For related information, refer to the following Tech Note(s):
S. Kermani, K. Lovejoy
Tech Notes are published occasionally by Wonderware Technical Support. Publisher: Invensys Systems, Inc., 26561 Rancho Parkway South, Lake Forest, CA 92630. There is also
technical information on our software products at www.wonderware.com/support/mmi
Back to top
©2009 Invensys Systems, Inc. All rights reserved. No part of the material protected by this copyright may be reproduced or utilized in any form or by any means, electronic or
mechanical, including photocopying, recording, broadcasting, or by anyinformation storage and retrieval system, without permission in writing from Invensys Systems, Inc.
Terms of Use.