Aveva Pi Server 2023 Pi Smt User Guide En
Aveva Pi Server 2023 Pi Smt User Guide En
User Guide
Contents
Overview. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
Start PI SMT. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 3
PI System Management Tools
Contents
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 4
PI System Management Tools
Contents
Archive Editor. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Search for archived events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Use Tag Search. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95
Define a time, event count or event range. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Define a time range. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 96
Define an event range. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Protect existing archive values. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97
Define a boundary type. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
Filter search results. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98
View and edit archived event values. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Edit an archived event value. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
Refresh the list of archived events. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Add an event to the archive. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Delete an archive event. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
Annotations in PI SMT. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
Add or edit annotations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Import a file to an annotation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
Export a file from an annotation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 5
PI System Management Tools
Contents
Backups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
View backup history of a Data Archive server. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Data Archive backup types. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
Change the number of backups shown in the Backup History table. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
View backup information summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118
View backup details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Backup details summary. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Backed up file list. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120
Troubleshooting Data Archive backups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
View Data Archive backup logs and messages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Common issues with backups. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121
Data Archive backup failure due to offline subsystem. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122
Perform an on-demand Data Archive backup. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
Export Data Archive backup history. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 6
PI System Management Tools
Contents
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 7
PI System Management Tools
Contents
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 8
PI System Management Tools
Contents
Firewall. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 9
PI System Management Tools
Contents
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 10
PI System Management Tools
Contents
IT Organizer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
Configuring the IT Organizer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
Data Archive configuration node. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 200
Connect to a Data Archive configuration node. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
Set up your PI Interface information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
.........................................................................................
Assign a role to a device. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 202
Add device roles. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
Add images to the icon list. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
Managing devices and tags. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
Update points. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Monitored device list. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
Modify a monitored device. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
View point and device role details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
View point details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
View device role details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Manage the navigation tree. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Add a group to the navigation tree. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Add a device to the navigation tree. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
Device identification. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
Interface definition file. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
Interface instances. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
Clear configuration node settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
Licensing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
View point and module statistics. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
Monitor point and module count together. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
View licensing information. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
License icons. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
View connection limitations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
View licenses for Data Archive collective nodes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
Check licensing for PI BatchView. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
Check whether you are licensed to use PIBatch. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
Check licensing for SQC. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 11
PI System Management Tools
Contents
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 12
PI System Management Tools
Contents
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 13
PI System Management Tools
Contents
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 14
PI System Management Tools
Contents
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 15
PI System Management Tools
Contents
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 16
PI System Management Tools
Contents
PI Services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
View PI services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
PI process list. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
Add processes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 371
View thread details. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372
Determine service startup type. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
Service startup types. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
Start PI services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374
Stop PI services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374
PI Service display options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374
Export a list of PI services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375
Remote login. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375
PI services quick reference. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 17
PI System Management Tools
Contents
PI Version. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378
Ping. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379
Managing PI Ping points. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379
PI Ping interfaces. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 379
PI Ping point configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380
Best practices for PI Ping points. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380
Configure default point properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380
Point attribute values for PI Ping. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
Create PI Ping points. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382
Copy or move PI Ping points. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
Rename a PI Ping point. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
Delete a PI Ping point. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
Search for PI Ping points. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
View and edit PI Ping properties. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 383
Import lists into the PI Ping tool. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384
Create an interface list batch file. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384
Import an interface list batch file for editing. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385
Create a CSV file interface list. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385
Export the network node list to a CSV file. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385
Add points from the network node list. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 18
PI System Management Tools
Contents
SNMP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411
Information provided by SNMP. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411
SNMP information exchange. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 411
COUNTER values. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 412
Build SNMP points. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 412
Select a PI SNMP interface and configure tag settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413
SNMP agent configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
Create SNMP agent profile. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
Select a saved agent profile file. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 19
PI System Management Tools
Contents
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 20
PI System Management Tools
Contents
Totalizers. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445
Search for a PI totalizer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445
Types of summary calculations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445
Edit an existing PI totalizer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446
Create a new PI totalizer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446
PI totalizer configuration. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447
Specify the sampling. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447
Specify how to write results. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448
Set archive attributes. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449
Step. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449
Shutdown. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450
Compression. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 450
Deviation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
Exception deviation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451
Compression deviation. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452
Define security settings. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452
Configure optional functions. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
Turn off character validation in the Totalizer tool. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 453
Copy a PI totalizer to another Data Archive. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 454
View information about a PI totalizer. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 454
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 21
PI System Management Tools
Contents
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 22
PI System Management Tools
Contents
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 23
PI System Management Tools
Overview
Overview
PI System Management Tools (PI SMT) is an easy-to-use graphical user interface application that provides tools
you can use to perform many Data Archive administration tasks, including configuring security settings,
managing archives, building and configuring points, and viewing message logs.
PI SMT is included in the Data Archive installation, but you can get the latest version of PI SMT on our customer
support Web site.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 24
PI System Management Tools
Start PI SMT
Start PI SMT
From the Windows Start menu, choose All Programs > PI System > PI System Management Tools.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 25
PI System Management Tools
PI SMT behaves differently on different versions of Data Archive
• PI Server 2015 and later versions include archive management for future archives that are used for forecast
data.
• PI Server 2010 and later includes PI AF. Objects in PI Module Database are automatically synchronized with PI
Asset Framework. The MDB to AF Synchronization tool in PI SMT allows you to monitor this synchronization.
• PI Server version 3.4.380 represents a significant change in security configuration. You might need to manage
PI Server instances that use the old security model along with servers that use the new model. Using PI SMT
helps you do that seamlessly.
Note: If you are installing, or upgrading to PI Server version 3.4.380, refer to the Data Archive Security
Configuration section in the AVEVA PI Server Installation and Configuration guide for the security model and
implementation options.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 26
PI System Management Tools
Select a Data Archive server
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 27
PI System Management Tools
Add a Data Archive server
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 28
PI System Management Tools
View or save the session record
• To hide or show the Session Record pane, choose View > Session Record.
• To save the session record data to a text file, choose File > Save Session Log.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 29
PI System Management Tools
View Data Archive connection credentials
• If multiple Data Archive servers are selected, you will see Multiple. Your Windows account is always
displayed, even if you are not connected to the Data Archive server through a mapping.
• When you double-click, you can see the full connection information for each connected Data Archive server.
For example, if you are connected to MyDataServer1 through a mapping and to MyDataServer2 through a
default user account, the information would look something like this:
MyDataServer1 via mapping: PIEngineers, PIWorld
MyDataServer2 via default user: pidemo
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 30
PI System Management Tools
Set Windows or PI Time format
1. To select a format for displaying timestamps in the plug-ins, choose View > Settings.
2. In the Settings dialog box, click the Time Format tab.
3. Select a time format.
The options are:
• Windows Format
When selected, shows the default setting for the currently selected regional setting. A sample of the
timestamp format appears in the Windows Format field. To specify another format for the date and
time, select Custom and select from the Date and Time lists.
• PI Time Format
When selected, time stamps are formatted using PI Time format. A sample of the time stamp format
appears in the PI Time Format box. You can also select the format for subseconds.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 31
PI System Management Tools
AF Link for migration to AF
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 32
PI System Management Tools
AF Link for migration to AF
1. For each Data Archive server that you plan to migrate, take an inventory of the current sources and
consumers of PI batch data.
Sources of batch data might include:
• PI Event File (EVT) interfaces
• PI BaGen (PI Batch Generator interfaces)
• Batch interfaces 1.x, 2.x, 3.x, and 4.x
• Your proprietary interfaces
• PI Batch Subsystem
Consumers of batch data might include:
• PI BatchView PI ProcessBook add-in
• PI BatchView Microsoft Excel add-in (used with PI DataLink)
• RtReports
PI WebParts Batchview Control
• PI OLEDB
• Your in-house PI-SDK batch applications
• Code you have implemented within PI ProcessBook displays
• Third-party applications
2. Prepare your batch data sources. Your site will be ready to migrate to event frames after you prepare each
batch data source and consumer, as described here.
Caution: When you start the migration, the Batch Database becomes read-only, therefore do not proceed
with migration until you have identified effective ways of adapting each data source and consumer for event
frame data, or devise alternate solutions for supporting your batch needs using PI Event Frames.
After you initiate migration, most batch interfaces fail to create further PI batch database data. To continue
generation of event frames after the migration, you must identify and update all data sources that support
generating event frames. Newer versions of some interfaces, specifically batch interfaces version 4.0,
automatically cut over from writing batch data to writing to the event frame database. For other interfaces,
you must switch manually. Go to the OSIsoft Customer Portal for interfaces that are not listed here for which
you need more information.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 33
PI System Management Tools
AF Link for migration to AF
Batch interfaces 1.x, 2.x, 3.x See Batch interfaces 1.x 2.x 3.x.
Consumer Actions
PI BatchView Microsoft Excel add-in (used with PI See PI BatchView Microsoft Excel add-in (used with
DataLink) PI DataLink)
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 34
PI System Management Tools
AF Link for migration to AF
If you want to use a different interface, you must upgrade it to version 4.0, or later.
See the OSIsoft Knowledge Base article Migration from Batch Event File (EVT) Interface to Batch Interface
Framework, DeltaV Batch Interface, or RtReports.
When a batch interface version 4.0 is running and you initiate migration, the following actions occur:
1. The migration process takes existing batches and writes them to event frames using templates in the
OSIBatchMigration category.
2. The interface detects that the Batch Database is locked and switches to generating event frames. It writes
any currently running batches to event frames using templates in the OSIBatch category.
3. The interface then loads any EVT files in the source folder that fall within the ABTO (abandoned batch time
out) range into its cache. The interface reprocesses these batches to event frames using the OSIBatch
templates.
4. From that point forward, the interface writes new batches to event frames using the OSIBatch category
templates.
If you have batch applications you have customized in-house, be aware that with PI batch interfaces, version 4.0,
PI Batch Properties might reside at different levels in event frames. Refer to your interface documentation for
details about where these properties will be located. Consequently, you might need to upgrade any dependent
client applications and reports to use the PI batch data created by these newer interfaces.
Note: The migration process will migrate existing EVT Interface data, but only PI batch interfaces, version 4.0, or
later, support automatically switching from the PI Batch Database to event frames, after migration.
PI BaGen interface
Note: We recommend you install the latest version of PI EFGen (4.0.11.104, or later) before migrating, because
4.0.11.104, or later, have significant migration-related improvements.
You cannot use PI BaGen after migrating. Therefore, before you migrate, make PI EFGen (PI Event Frames
Generator) ready to generate batch data in event frame format (but do not turn it on until after migration).
Note: PI EFGen has additional functionality compared to PI BaGen, so you might want to explore those features
before you migrate to see if you want to take advantage of them.
Test using PI EFGen to produce data that is consistent with your existing PI BaGen interfaces. You can use the
Converter tab in PI EFGen to migrate existing PI BaGen configurations to PI EFGen. Be certain to set PI BaGen
compatibility mode. For more information, see PI Event Frames Generator.
Stop PI BaGen. Confirm that PIBaGen batches are completed and not open. If there are batches open, determine
the best approach for closing these open batches.
After you have migrated your batch data, enable PI EFGen to generate batch context data in event frame format.
If you cannot find a time when you can run migration without in-progress batches, you can use a feature of PI
EFGen to recover your in-progress batches. After migration, use PI EFGen historical recovery to recover these
batches:
1. Note the date and time that you stop the PI BaGen Interface, just prior to migration.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 35
PI System Management Tools
AF Link for migration to AF
• Units that are mapped to the Module Database, those batches will be migrated.
• Units that are not mapped to the Module Database, if you want this data migrated to event frames, you
must map these units to the Module Database.
To map PI Batch Subsystem units to the Module Database, follow the instructions in the Batch Database Support
of the PI Batch Subsystem, available on the OSIsoft Customer Portal Products page.
For each PI Batch Subsystem unit, only Batch Subsystem batches before the cutoff date will be migrated to event
frames. Therefore, if there is no cutoff date, or if the cutoff date is set to Current, all Batch Subsystem batches for
that unit will be migrated to event frames.
After migration, the PI Batch Subsystem no longer generates batch data. Therefore, you must install a new
interface to generate event frame data.
Note: To migrate to event frames, you do not have to move your PI Batch Subsystem data to the Batch Database,
but you must create mappings in the Module Database for any PI Batch Subsystem unit that you want to migrate.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 36
PI System Management Tools
AF Link for migration to AF
RtReports
Use RtReports, Version 4.x, which supports event frames.
PI OLEDB
Explore implementing equivalent functionality using SQL to access PI OLEDB Enterprise.
If you are running PI Server 2010 or later, with no data in the Module Database
If you are running PI Server 2010 or later and the following conditions apply, you must perform some tasks
before migration:
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 37
PI System Management Tools
AF Link for migration to AF
If you have no Module Database and do have PI Batch Subsystem batches that you want to migrate to event
frames, perform these steps before migration:
1. Migrate the Module Database to AF. Use the PI MDB to AF Preparation Wizard, which is included in PI AF Link
in PI SMT.
2. Map PI Batch Subsystem units to the PI Module database. For information about how to do this, see Prepare
batch data sources and consumers for migration.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 38
PI System Management Tools
AF Link for migration to AF
1. In PI AF Link in the Operations section of PI SMT, select the Data Archive server for which you want to
migrate batch data.
Note: The field Batch database status indicates whether analysis has already been run, or if migration is
complete.
2. Click Analyze to find potential incompatibilities with AF in your batch data.
The Analyze function checks that the user running PI AF Link has appropriate permissions (read-write
permissions on the PI SMT AF Link Security database are required).
Analysis might take a few minutes, depending on the size of your online archives.
3. Click View report to obtain a list of issues.
The report summarizes the number of batch records analyzed and issues encountered, shows if there are
any gaps in your archives, and provides details about issues such as missing links between batch objects, and
any PI identity mappings that need to be created.
• Issues marked with a yellow bell warning icon are recommended to be resolved before migration.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 39
PI System Management Tools
AF Link for migration to AF
control list (ACL) on any Batch Database record, if the mapping does not already exist. Click Create mapping
and enter required information for each new mapping.
The mappings created for the Module database to AF synchronization are still valid for batch to event frame
migration, but there might be some additional mappings needed.
Note: After migration, users who had read and write permissions to PI Batch data should have read and
write access to event frames. However, in some situations, batch to event frame migration will not be able to
set the security on event frames. If this happens, a message to that effect is recorded in the list of migration
errors shown in AF Link. In such cases, the event frames will either inherit permissions from the parent or be
assigned default permissions (defined by event frame templates).
6. There are some characters that are valid for names in the Batch Database but are not valid in AF. Before
migration, you can modify these names in the Batch Database, or they will be replaced with a default
character in AF (only) during migration.
For example, a semicolon (;) is replaced with a comma (,) and square brackets are replaced with parentheses.
After migration, you can view the original character before it was replaced in the event frame's Extended
Properties.
For further details about migration issues, see Analysis error report.
7. The maximum length of an object name in AF is 259 characters. You can shorten long names, for example
Batch IDs, before migration, or allow them to be truncated during migration.
After migration, the full original name is stored in the event frame Extended Properties.
8. If you made any changes, click Rerun analysis to re-analyze the Batch Database.
9. After you have fixed essential issues and have made all desired optional changes, follow the steps in Migrate
batch data to event frames.
Note: When you start the migration, the Batch Database becomes read-only, therefore you need to prepare
thoroughly before migration. See Prepare batch data sources and consumers for migration if you have not
already done so.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 40
PI System Management Tools
AF Link for migration to AF
Batch Database Not Error The batch database Analysis is only Error detected while
Supported is not supported in allowed for analyzing Batch
future archive sets, historical archive Database records,
so no analysis can sets. Batch Database is
be done. only supported in
Historical Archive
Set
Point Error Error Failed to get the If the analysis fails Failed to get points
point IDs for batch to get point IDs for for PIUnitBatch and
(PIBatch, batch points, there PI Batch Subsystem
PICampaign, is a serious issue in
PIUnitBatch), Data Archive. Check
analysis stops. if the Data Archive
server is functioning
properly.
Unable to Get Event Warning An error occurred None. Failed to get first
while getting an event
event for a batch
database point. If
this event is the first
event of this point,
analysis skips all
events for this point
and continues with
the next point.
Otherwise, analysis
skips this event and
continues with the
next event.
Invalid UID Warning Failed to read UID None. Failed to get UID
for a batch database from the annotation
record.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 41
PI System Management Tools
AF Link for migration to AF
Invalid BatchID Warning Failed to get Batch None. Failed to get PIBatch
ID for a batch name
database record.
UID Mismatch Warning The UID stored in None. The UID stored in
the event does not the event does not
match the UID match the one
stored in the stored in annotation
annotation.
Invalid Child Warning The child reference None. Failed to get child
Reference of a Batch Database collection
record cannot be
found or verified.
The message logged
in the analysis
report shows details
about the failure. If
a child reference is
not accessible due
to an archive gap, it
is logged under the
"Archive Off-line"
category.
The child's stored
parent UID might
not match the
actual parent UID,
or the system may
have failed to get
the child's:
• collection
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 42
PI System Management Tools
AF Link for migration to AF
• point ID
• UID
• effective date
• object
• Batch ID
• stored child
collection
• stored child UID
• collection
• point ID
• UID
• effective date
• object
• Batch ID
• stored child
collection
• stored child UID
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 43
PI System Management Tools
AF Link for migration to AF
Archive Off-Line Warning Failed to get a child Bring the archive Failed to get object
or parent object due back online. of child PIUnitBatch
to the target archive because the target
being offline. archive is off-line.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 44
PI System Management Tools
AF Link for migration to AF
• For a
PIUnitBatch, the
procedure name
is used as the
element name
in the event
frame.
If the procedure
name is null, the
BatchID is used.
If the Batch ID
and the
procedure name
are both null,
this message is
logged in the
analysis report.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 45
PI System Management Tools
AF Link for migration to AF
Note: When the Possible action is None, you do not need to do anything before migration because the batch
data is not migrated. This generally occurs when those unit batches or batches are either deleted or missing.
You can try to recover the batch data by reloading the data through the interface. Not all interfaces can recover
partial batches or unit batches. Even after recovery, these same warnings are reported. Before proceeding,
migrate into a test system and evaluate the specific migrated unit batch data.
We do not recommend manually altering PI Event Frames after migration, other than deleting verified duplicates
(as can be encountered, for example, when moving from PIBaGen to EFGen).
Test migration and cut over from current sources and consumers
We recommend that you test both of the following procedures, unless you have non critical migration
requirements or a very simple environment:
We recommend you copy your production Data Archive server to a test environment. Go to OSIsoft Customer
Portal for support on how to clone your production system. You clone your environment utilizing Data Archive
documented procedures.
Ensure that the test includes:
• A thorough review of the pre-migration analysis report, see Analyze batch data before migration.
• Verification that after migration, batch type event frame data is populated and properly presented from all
data sources and by all consumers. See Prepare batch data sources and consumers for migration and Verify
your event frame data.
• Verification that after migration, all configured instances of PI batch interfaces, version 4.0, have switched
over automatically, and manual interfaces, such as PI EFGen (PI Event Frames Generator), correctly populate
data and properly present it for all consumers. See Prepare batch data sources and consumers for migration
and Verify your event frame data.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 46
PI System Management Tools
AF Link for migration to AF
If you have upgraded to the latest PI batch interface, version 4.0, or later, and it is running when migration starts,
it goes into a wait state and before resuming, adds the required AF settings to the initialization (.ini) file. To avoid
inadvertently overwriting these settings, close the Event Frame Interface Configuration Manager before starting
migration.
After migration, you can review the results. If you chose to utilize PI EFGen in Recovery mode (as explained in
Prepare batch data sources and consumers for migration, you might need to delete duplicate batches. You
should delete in-progress batches that belong to Category OSIBatchMigration, as long as there are completed
and correct batches belonging to the Category OSIBatch. For more information, see Event frame templates for
batch data.
Note: You do not have to migrate while the batch is running, but it is perfectly alright to do so. Your batch
interface log will record when it detects the start of migration, while it is waiting for migration to complete, and
when it starts generating event frame data.
1. Using the PI AF Link tool in PI SMT, after you have obtained an analysis report that contains no must-fix
issues, and you have resolved all desired optional issues, click Migrate (available at the end of the Analysis
report).
The Migrate function checks that the user running PI AF Link has appropriate permissions (read-write
permissions on the PI SMT AF Link Security database are required).
Migration progress is shown, and the Batch database status field indicates when migration is complete.
Migration can take a while, depending on the amount of PI batch data online. As a guideline, on average,
migration can take approximately 1 hour for each year of PI Batch data. To obtain a better estimate, use the
information provided when you clicked Analyze about the number of event frames you will be generating.
Allow approximately 90 minutes per million event frames, bearing in mind that this time will vary greatly
depending on network, hardware and other factors.
2. After migration completes, click View migration report to open the Migration report.
3. Click View errors to see information about any errors that occurred during migration.
Informational messages are also shown, for example about the following actions:
• Automatic name modification (truncation of names longer than 259 characters, and replacement of any
characters that are invalid in AF).
• Event frames named with the string <undefined>. You can update this string to give the event frame a
meaningful name. This might occur with batch data created by PIBaGen that is migrated to PI Event
Frames.
• The Procedure name of a PI Unit Batch is used as the name of the event frame. If the Procedure
name is blank, the Batch ID is used as the event frame name. If both are blank, the event frame is
given the name <undefined>.
• The Batch ID of a PI Batch is used as the event frame name. If the PI Batch has no Batch ID, the event
frame is given the name <undefined>.
Note: The Details tab shows the path to the file containing the migration error report.
For a list of migration messages, see Migration error report.
4. You now have event frames in AF that represent your batch data. See Verify your event frame data for
information about confirming the migration has gone smoothly and has resulted in event frame data in your
desired format.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 47
PI System Management Tools
AF Link for migration to AF
For example, when you view an event frame's properties, click Extended Properties to see information such
as an original object name before truncation or character replacement took place.
Note: After you have migrated your batch data to event frames, you will no longer be able to re-migrate the
Module Database to AF. Remigration used to be a workaround when the Module Database had lost
synchronization with the AF database. The recommended workaround is to reset the Module Database from
the AF database; in the AF Link tool in PI SMT, on the Details tab, click Reset MDB.
Batch Database event Error Failed to get points for Contact OSIsoft Technical
generation: Migration fails PIUnitBatch and PI Batch Support at +1
Subsystem 510-297-5828 or through
OSIsoft Customer Portal
Failed to add Unit Batch Contact Us page
point ID to list
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 48
PI System Management Tools
AF Link for migration to AF
Batch Database event Warning Cannot get first BDB event None
generation: Migration
continues Cannot get first BSS event
InsertChildEventFrames:
BDB event frame, EFID
event frame UID, not
found: exception
description
CreateEventFrameForCam
paign, Set event frame
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 49
PI System Management Tools
AF Link for migration to AF
CreateEventFrameForPIBa
tch, Set event frame
security failed: <exception
text>
1. Confirm that PI batch interfaces, version 4.0, or later, have automatically switched to event frames.
The interfaces log file PIPC.Log will include messages about migration and cutover:
• When the interface fails to write to the PI Batch Database, because batch to event frame migration is
occurring:
PI Batch Database to event frames migration is in progress.
• When migration is complete:
PI Batch Database is read-only because it has been migrated to event frames.
Interface will create event frames in the PI Asset database: AFserver\
\AFdatabase
Where AFserver is the name of the PI AF server, and AFdatabase is the name of the AF database, to
which Data Archive is migrating batches.
2. Confirm that the PI Batch Database is read-only.
The AF Link tool shows you if the Batch Database is read-only. Also, if you attempt to edit batch data the edit
will be rejected.
3. Enable or start up any PI EFGen (PI Event Frames Generator) or non-Batch Framework interfaces that create
PI Event Frames data.
4. Confirm that event frames were properly migrated by looking at the Batch database status field in the AF
Link tool and by checking the Migration errors report.
You might also want to perform a random check of a few event frames in PI System Explorer. To look at an
individual event frame, right-click it and choose Properties, you can verify that the start time and end time
make sense and use the Attributes tab to check values such as Batch ID, Procedure, and Product. You might
also want to look at the overall event frame hierarchy in PI System Explorer to check it looks as expected.
Note: You can click Extended Properties to see information such as the original object name before any
truncation or character replacement took place during migration.
5. In any reporting tools you use, confirm that batch data is being presented properly in event frame format to
your end users.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 50
PI System Management Tools
AF Link for migration to AF
OSIBatchDB is a generic event frame category for batch data that contains parent templates for the other batch
event frame template categories. The following categories of event frame templates derive from OSIBatchDB:
PI batch interfaces, version 4.0, or later, create event frames that derive from PICampaign, PIBatch, PIUnitBatch
and PISubBatch. Due to how the templates derive, by searching against these templates attributes (Product,
Recipe, BatchID, Procedure and Product), you can quickly find common event frames created by the migration
process or PI batch interfaces, version 4.0.
Note: Transfer records are not migrated to AF. After the migration of batch data is initiated, PI transfer records
become read-only and no new transfer records are generated.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 51
PI System Management Tools
AF Link for migration to AF
In the PI Batch Subsystem there is just one type of object, called a Batch.
PI Campaigns are migrated to event frames as an instance of the PICampaign_Migrated template. Event frames
that are derived from the PICampaign_Migrated template include a collection of event frames based on the
PIBatches_Migrated template. For any given PI Campaign, the PI Batch collection should match the event frame
collection in the corresponding event frame for that PICampaign, assuming all those PI Batches exist in Data
Archive at the time of migration.
PIProperties AF attributes
PI Batches are migrated to event frames as an instance of the PIBatch_Migrated template. Event frames derived
from the PIBatch_Migrated template include a collection of event frames based on the PIUnitBatch_Migrated
template. For any given PI Batch, the PIUnitBatch collection should match the event frame collection in the
corresponding event frame for the PIBatch, assuming that all those PIUnitBatches and the referenced PIUnit exist
in Data Archive at the time of migration.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 52
PI System Management Tools
AF Link for migration to AF
PIProperties AF attributes
PIUnitBatches are tied to a PIUnit in the Module Database. PI UnitBatches are migrated to event frames as an
instance of the PIUnitBatch_Migrated template. Event frames based on the PIUnitBatch_Migrated template also
have a reference to the Element that represents the PIUnit in the Module Database. PI Unit Batches include a
collection of PISubBatches. Event frames derived from the PIUnitBatch_Migrated template include a collection of
event frames based on the PISubBatch_L1_Migrated template . For any given PIUnitBatch, the PISubBatch
collection should match the child event frame collection in the corresponding even tframe for the PIUnitBatch,
assuming that all those PISubBatches exist in Data Archive at the time of migration.
PISubbatches are associated with a PIUnitBatch. PISubBatches can be nested any number of levels deep.
PISubBatches at level 1 are migrated as event frames derived from the PISubBatch_L1_Migrated template.
PISubBatches at level 2 are migrated as event frames derived from the PISubBatch_L2_Migrated template.
PISubBatches at level 3 are migrated as event frames derived from the PISubBatch_L3_Migrated template.
PISubBatches at level 4 and greater are migrated as event frames derived from the PISubBatch_L4_Migrated
template.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 53
PI System Management Tools
AF Link for migration to AF
The PI Batch Subsystem is an older database than the PI Batch Database. Data in PI Batch Subsystem is different
than PI Batch database data and the units referenced in the Batch Subsystem data are also different from the
PIUnits in the Module Database. There is a way to "link" a Batch Subsystem unit to a PIUnit in the Module
Database, but the two databases remain different (for information about how to set this up, see Prepare batch
data sources and consumers for migration. Batch Subsystem data that is linked in this way is also migrated with
PI Batch Database data to event frames. PI Batch Subsystem data has no hierarchy, however, it is functionally
equivalent to PIUnitBatches. Therefore, Batch Subsystem batches are migrated as event frames derived from the
PIUnitBatch_Migrated template.
Product Product
• The AF attribute name is the same as the name of the corresponding batch property.
• The batch property hierarchy, if any, is preserved in the hierarchy of the AF attributes.
• The type of the AF attribute, as shown in the Value Type field in PI System Explorer, is shown in the following
table.
Boolean Boolean
Byte Byte
Date DateTime
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 54
PI System Management Tools
AF Link for migration to AF
Double Double
Float Single
Long Int32
PIProperty PIProperty
PIUnitBatch PIUnitBatch
PIValue PIValue
Server PIServer
Short Int16
String String
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 55
PI System Management Tools
AF Link for migration to AF
When you migrate to event frames, the ACLs on the batch objects are translated into a Windows security
descriptor for the event frame. The migration process takes any PI Identities that are mapped to the users and
groups in the ACL, and uses them to define the Windows security descriptor. This security descriptor is used
within AF to control access to the event frame.
Migration process
When you initiate batch to event frame migration, the conversion follows this outline:
1. The archive subsystem walks through all the archives and generate events. PIUnits are explored first, and
within each PIUnit the walk starts from the most recent PIUnitBatch and proceeds backwards in time.
2. The events for PI UnitBatches are posted to an event queue.
3. The archive subsystem generates events for all PIBatches, starting with the most recent and proceeding
backwards in time. These events are posted to the queue.
4. The archive subsystem generates events for all PI Campaigns, starting with the most recent and proceeding
backwards in time. These events are posted to the queue.
5. The AF Link tool starts reading these events and generating event frames.
MDB to AF Synchronization
The MDB to AF Synchronization tool shows you the synchronization status between PI MDB and PI AF.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 56
PI System Management Tools
AF Link for migration to AF
This diagram shows the content of PI MDB on a Data Archive server called PI_Server3 with the corresponding
Data Archive element in PI AF. Only the highlighted content is synchronized between the two.
A single PI AF server can be synchronized with multiple Data Archive servers. Each Data Archive server that is
synchronized with PI AF has its own corresponding Data Archive element in PI AF. The PI AF content under each
Data Archive element is synchronized only with PI MDB on the corresponding Data Archive server, as indicated in
the following illustration.
One PI AF server synchronized with multiple Data Archive servers
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 57
PI System Management Tools
AF Link for migration to AF
When multiple Data Archive servers are synchronized with a single PI AF server, it is important to choose
descriptive names for each Data Archive element. For example, in the preceding illustration, the Data Archive
elements are called PI_Server1 ModuleDB, PI_Server2 ModuleDB, and PI_Server3 ModuleDB.
To see the migrated properties and aliases, you need to look at the attributes for the element. In PI System
Explorer, click to select the element and then click the Attributes tab from the set of tabs to the right. PI aliases
are represented as attributes that have a data reference to a PI point; these attributes are marked with a tag
icon.
Aliases shown as attributes in PI AF
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 58
PI System Management Tools
AF Link for migration to AF
In PI AF, all objects under a Data Archive element are synchronized with PI MDB on the corresponding Data
Archive server. Any content that is not under a Data Archive element is not synchronized with PI MDB.
• You cannot create an PI MDB object with a name longer than 259 characters. PI AF limits the length of object
names to 259 characters. If you try to create a module with over 259 characters, you get an error message.
Note: For PI property names, the maximum length is 259 characters minus the length of the replacement
suffix (for more information, see Replacement suffix). For example, if the replacement suffix has 5 characters,
then the maximum length of a property name is 254 characters.
• You cannot grant access permissions to an PI MDB object for a PI identity (or PI user or PI group) that does
not have a mapping.
• You cannot edit properties or aliases on a PI Module if the corresponding PI AF element is based on a PI AF
template. PI AF templates impose restrictions on the elements that use them. MDB allows no edits on
properties or attributes of the corresponding modules.
• You cannot create links into or out of %OSI, %OSI_MCN or %OSI_ManagedPI. The same is true for
%OSI_MCN and %OSI_ManagedPI hierarchies. You can create links only if both objects are under the %OSI,
%OSI_MCN or %OSI_ManagedPI hierarchies or if neither object is under the %OSI, %OSI_MCN or
%OSI_ManagedPI hierarchies.
• When multiple versions of a module exist, you cannot change the effective date of an existing version to be
inconsistent with dates on other versions.
• Specifically, the effective date cannot be modified such that it is older than the previous version (if it exists)
and newer than the next version (if it exists). The obsolete date for any of these versions cannot be older
than the effective date for that version.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 59
PI System Management Tools
AF Link for migration to AF
• There are no restrictions on adding new versions and what effective date is used for these new versions.
• Create a PI property or alias name that contains any of the following characters:
; { } [ ] \
• The above characters are not valid in PI AF. PI AF Link uses replacement characters (see Replacement
characters) when it creates the objects in PI AF. In some rare cases, it is possible to name objects in MDB
such that the substitution of the replacement character would create a naming conflict in PI AF. It is safest to
avoid illegal characters in new MDB object names.
• Create a PI property name that ends in the replacement suffix (for more information, see Replacement
suffix). In rare cases, it is possible to name objects in MDB such that the substitution of the replacement
suffix would create a naming conflict in PI AF. It is safest to avoid using the replacement suffix in new MDB
object names.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 60
PI System Management Tools
AF Link for migration to AF
c. After you complete the wizard, PI AF Link Subsystem starts the synchronization between MDB and AF.
3. Using the PI System Explorer, identify the elements that you want to access through PI MDB. Paste
references to these elements under the Data Archive element. PI AF Link will create the corresponding
objects in PI MDB.
Note: Under the Data Archive element, place only the content that you need to access in PI MDB. Everything
you place under the Data Archive element is synchronized with PI MDB.
4. To see the objects in PI MDB, open the Module Database tool in SMT (Operation > Module Database).
Enable PI MDB
If you chose to disable PI MDB during upgrade or installation, then PI MDB is read-only. You cannot edit it. To
enable PI MDB at any time after installation:
After you complete the wizard, AF Link Subsystem starts the initial migration. When the migration is complete, PI
MDB will be unlocked.
• Health Status Problems: The PI MDB to AF Synchronization tool shows the synchronization health status of
each connected Data Archive server. When you show the detailed view on a particular Data Archive server,
you see a more complete health status message. See Health status for an explanation of the messages and
instructions for handling them.
• Security Problems: PI AF and Data Archive use different mechanisms for authentication and access
permissions. Because of the differences in the two systems, some security settings cannot be synchronized.
This can lead to inconsistencies in MDB and AF access permissions. See Checking security synchronization for
more information.
When synchronization problems arise, users typically experience the problem as a restriction in the ability to
view or edit MDB. Another common symptom is that a user cannot view or edit the same content both in MDB
and AF. See Troubleshooting synchronization for common symptoms and possible causes.
Health status
The AF Link tool shows a health status message for each connected Data Archive server that runs PI Server 2010,
or later.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 61
PI System Management Tools
AF Link for migration to AF
Performance Counter
Message in List View What it Means What to Do
Value
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 62
PI System Management Tools
AF Link for migration to AF
7 The MDB to AF migration You ran the PI MDB to AF Complete the preparation
wizard has not yet been preparation wizard on this wizard.
completed. Data Archive server but
you have not yet
successfully completed it.
8 WizardNotRun You have not yet run the Run the PI MDB to AF
PI MDB to AF preparation preparation wizard on this
wizard on this server. server.
• Read access on AF
Databases collection
and AF Elements
collection on the
target database.
• Read-write access on
the target AF
Database, Data
Archive Element, and
AF Categories
collection on the
target database.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 63
PI System Management Tools
AF Link for migration to AF
13 Failed to Reset MDB from Failed to reset MDB from Try to reset MDB. If it
AF Database AF Database. continues to fail, contact
OSIsoft Technical Support.
None Health status is bad for The PI AF Link Subsystem On the details pane, find
the Base subsystem status and the PI Base the health status for PI
Subsystem status do not Base Subsystem. Take the
match. appropriate action for
that health status
message.
None Health status is bad for PI The PI AF Link Subsystem On the details pane, find
AF Link Subsystem status and the PI Base the health status for PI AF
Subsystem status do not Link Subsystem. Take the
match. appropriate action for
that health status
message.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 64
PI System Management Tools
AF Link for migration to AF
None Migration preparation is The Data Archive server is Upgrade the server.
complete, upgrade to PI running a version earlier
Server 2010 to enable PI than PI Server 2010 and
AF Link. you have successfully run
the preparation wizard on
this Data Archive server.
Depending on the type of error, a button might appear at the bottom of the report, allowing you to fix the
problem. In the example illustrated above, the fix is to create the missing mapping.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 65
PI System Management Tools
AF Link for migration to AF
• The Data Archive server and PI AF server must either be in the same domain, in trusted domains, or in a
trusted forest.
• Make sure the access permissions on PIModules in PI Database security are the same as the access
permissions on the Data Archive element in PI AF. You can edit the access permissions on PIModules using
the Database Security tool in PI SMT (Security > Database Security).
• Use Windows authentication on the Data Archive server for all PI MDB access. All the PI identities, users, and
groups that have access to Modules must have explicit mappings. Furthermore, the Windows accounts from
these mappings must be used directly in the PI AF permissions.
For example, suppose the Windows user Bob belongs to a group BobGroup, and BobGroup is mapped to a PI
identity called ModuleAccessIdentity. ModuleAccessIdentity has access to a module on the Data Archive
server. When modifying the security of the corresponding element in PI AF, you should use BobGroup – not
Bob itself – because BobGroup is the Windows account specified in the mapping.
• Do not delete mappings that are needed by module security. If you delete a mapping that is needed by a
module, then the access permissions for PI AF and PI MDB will no longer be synchronized, and you will not
be able to edit the security of the affected module.
• Make sure that no users rely on PIWorld for PI MDB access. PIWorld cannot be mapped, and access
permissions defined for PIWorld are not reflected to PI AF.
• Make sure that no users rely on piadmin for PI MDB access. The piadmin PI user has unrestricted read and
write access to everything on the Data Archive server. Thus, we recommend that you do not map piadmin
and do not use it for routine access to the Data Archive server. Reserve piadmin exclusively for the very few
and rarely executed administrative tasks that no other PI identity can perform.
• In PI AF, do not use deny access for any element under the Data Archive element. PI AF allows you to
explicitly deny access, but Data Archive does not. If you use deny on an element in PI AF, then everyone
except piadmin will lose all access to the corresponding module.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 66
PI System Management Tools
AF Link for migration to AF
• A PI AF element is added to PI AF with only one of those principals on the security descriptor.
• One of those principals was removed after PI AF and PI MDB were in synchronized state.
This problem will not arise for a one-to-one mapping between a PI identity and a Windows principal unless there
are some major synchronization errors between MDB and PI AF (for example, they might be out of sync already
for other reasons).
Consequences: The access permissions might not be the same for PI MDB and PI AF. This could be a problem if
users are trying to work with objects in both PI MDB and PI AF.
Fixes (in order of preference):
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 67
PI System Management Tools
AF Link for migration to AF
Note: AF Link does not automatically pick up changes in mappings. The change does not take effect until you
edit the element in some way; this triggers AF Link to update the settings in PI MDB.
This problem will not arise for a one-to-one mapping between a PI identity and a Windows principal unless there
are some major synchronization errors between MDB and PI AF (for example, they might be out of sync already
for other reasons).
Troubleshooting synchronization
This section describes common problems that might occur during PI MDB to PI AF synchronization.
• The PI AF server is unavailable. Check your connection to the PI AF server. If AF Link cannot connect to the PI
AF server, then PI MDB becomes read-only until the connection is restored.
• AF Link is not running. If AF Link is not running, MDB is read-only. Check the PI Services tool in SMT
(Operation > PI Services).
• You are trying to make an edit that is no longer permitted in PI MDB (PI MDB edits that are not allowed).
• If you are trying to edit access permissions, then the PI MDB security might be out of sync with PI AF
security. View the security synchronization report to identify the problem.
• There could be a synchronization error. Check the synchronization status in the AF Link tool in SMT
(Operation > AF Link).
• MDB is not enabled. You can enable MDB by running the MDB to AF preparation wizard from the AF Link tool
in SMT (Enable PI MDB).
• You specified Deny access on an AF element for a Windows user. Data Archive does not support Deny access.
• None of the Windows accounts that have access permissions on an AF element have mappings on the Data
Archive server.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 68
PI System Management Tools
AF Link for migration to AF
• You are trying to add access for a PI user, identity, or group that does not have an associated mapping. You
need the mapping in order to associate the PI identity or account with a Windows account. Create the
mapping and then try the edit again.
For example, suppose a module has the following access rights:
PIOperators: A(r,w) | piadmins: A(r) | PIWorld: A(r,w)
PIOperators and piadmins both have associated mappings (PIWorld does not need a mapping). Suppose you
have an unmapped PI identity, called PIEngineers. You cannot add access permissions for PIEngineers until
you create a mapping for that identity.
• You deleted a mapping that the module required to associate access permissions with a Windows account.
Now, in MDB, you can still edit the module itself, but you cannot edit the access permissions for the module,
except to delete the identity associated with that mapping. Create a new mapping for the relevant identity,
user, or group. Now you can edit access permissions for the module.
Note: AF Link does not automatically pick up changes in mappings. The change does not take effect until you
edit the element in some way; this triggers AF Link to update the settings in MDB.
For example, in the previous example, if you deleted the mapping for piadmins, you would not be able to
edit access permissions on the module, except to remove all access permissions for piadmins. To fix this, you
would have to create a mapping for piadmins.
Note: In both these cases, you can continue to edit the elements directly in PI AF.
• Element attributes can be hierarchical, meaning that you can nest them inside each other. Module properties
are also hierarchical, however aliases are not. If you nest attributes in a way that is not compatible with
aliases, then you might not be able to see all the objects in PI MDB. See Attribute to property and alias
conversion.
• The PI AF security settings might not be compatible with PI MDB (Element does not appear in PI MDB)
• PI MDB clients and PI AF clients determine parents in a different way.
• In PI MDB, the parent list is always the current parent list; it does not take query date into account.
• In PI AF, the parent list depends on the query date.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 69
PI System Management Tools
AF Link for migration to AF
By default, the query dates are set to retrieve the latest versions of the assets (both in PI MDB and in PI
AF). With the default query dates, there will be no differences in the parent list between the two
versions of a client.
• If you changed the access for the PI AF element such that Everyone has Deny access, the element would not
appear in the PI AF element hierarchy. However the module might still be visible in PI MDB. This is because
when Everyone is denied, AF Link cannot read the element and therefore cannot synchronize it to PI MDB. To
correct this, remove the Deny setting on the element.
Note: You must be an Administrator to make changes to the element when Everyone is set to Deny.
Force a remigration
When you remigrate from PI MDB to PI AF, you overwrite everything under the Data Archive element in PI AF
with the contents in PI MDB. Remigrate only if you need to change the settings for the PI AF server, the
replacement characters, or the replacement suffix.
Note: A remigration is different from a reset. When you reset, you copy from PI AF to PI MDB.
Reset PI MDB
When you reset PI MDB, you recreate the PI MDB from the corresponding Data Archive element in PI AF. This
means that you completely overwrite the entire contents of the existing PI MDB (excepting %OSI, %OSI_MCN, &
%OSI_ManagedPI) and recreate it based on the current contents of the Data Archive element in PI AF.
Note: A reset is different from a remigration. When you remigrate, you copy from PI MDB to PI AF.
2. Select and show the details pane for the Data Archive server you want to reset (use to toggle the details
pane).
3. Click the Details tab.
4. Click the Reset MDB button at the bottom of the pane.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 70
PI System Management Tools
AF Link for migration to AF
2. Select and show the details pane for the Data Archive server you want to reset (use to toggle the details
pane).
3. Click the Settings tab.
The PI AF server, Database, and Data Archive elements are listed at the top of the tabbed pane.
Replacement characters
PI MDB property and alias names can contain characters that are not valid in PI AF object names. When AF Link
creates objects in PI AF, it substitutes invalid characters with replacement characters in the PI AF object name.
Each character that is valid in PI MDB but not valid in PI AF has an assigned replacement character.
You can change the assigned replacement characters, but you need to force a re-migration for your changes to
take effect (see Force a remigration).
Default replacement characters
This table shows characters that can be used in PI MDB, but not in PI AF. It also shows the default replacement
character.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 71
PI System Management Tools
AF Link for migration to AF
; ,
{ (
} )
[ <
] >
\ /
Replacement suffix
In PI MDB, an alias and a property in the same module can have the same name. In PI AF, aliases and properties
are both represented as attributes on an element. In PI AF, no two attributes on the same element can have the
same name.
If an alias and property are at the same level and have the same name, then AF Link automatically appends a
replacement suffix to the property name in PI AF. This substitution is only in the PI AF name. The PI MDB name
does not change.
For example, suppose a module contains a property and an alias, both named temp. During migration, AF Link
creates the following attributes in PI AF:
The Substitutions screen lists the PI AF names that will end in the replacement suffix. If PI MDB contains an alias
or property name ending in the replacement suffix, you get a suffix error.
Note: If you have a tree of hierarchical properties, then only the first level of property names must be distinct
from alias names in that module. For example, a property nested five levels down can have the same name as an
alias on that module.
Enable tracing
If you are having severe problems with MDB and AF synchronization, a Technical Support engineer might request
that you turn on tracing in the AF Link tool.
Tracing runs for a set (configurable) period of time and you can specify where to send the output, either to the PI
Message log or to a separate file in the PI\Log directory (same directory as the PI message log).
2. Select and show the details pane for the Data Archive server you want to reset (use to toggle the details
pane).
3. Click the Details tab.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 72
PI System Management Tools
AF Link for migration to AF
About tracing
Tracing runs for a configurable period of time. You can specify where to send the output, either to the PI
Message log or to a separate file in the PI\Log directory (the same directory as the PI message log).
Creation Date Date that AF Link created the element. Not copied
from the module.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 73
PI System Management Tools
AF Link for migration to AF
Attribute value type Attributes have an associated value type. The attribute
value type in PI AF is determined based on the PI point
referenced by the alias. See Alias to attribute type
conversion for details.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 74
PI System Management Tools
AF Link for migration to AF
Blob Anything
Digital Anything
Float16 Single
Float32 Single
Float64 Double
Int16 Int16
Int32 Int32
String String
Timestamp DateTime
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 75
PI System Management Tools
AF Link for migration to AF
Boolean Boolean
Byte Byte
Date DateTime
Double Double
Float Single
Long Int32
Short Int16
String String
Some property data types convert to an attribute value type of <Anything>. If the attribute value type is
<Anything>, then the property type also determines the attribute value in PI AF, as shown in the following table.
<Anything> value type conversions
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 76
PI System Management Tools
AF Link for migration to AF
Creator piadmin
Creation Date The date that AF Link created the module. Not copied
from the element.
Modifier piadmin
Modified Date Initially, the date that AF Link created the module. Not
copied from the element.
• If you nest attributes below an alias attribute, then the child attributes are not visible to PI MDB clients.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 77
PI System Management Tools
AF Link for migration to AF
• If you nest property attributes below other property attributes, then that hierarchy is carried over to the
property hierarchy in PI MDB.
• If you nest alias attributes below property attributes, then those alias attributes are represented as PI
properties of string type. The string value is a message that says that the data reference is not supported by
PI MDB at this level.
Boolean Boolean
Byte Byte
DateTime Date
Double Double
Int16 Short
Int32 Long
Single Float
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 78
PI System Management Tools
AF Link for migration to AF
String String
AF attributes can have a value type <Anything>. When <Anything> is the value type, then the PI property data
type is determined by the attribute value, as shown in the following table.
Note: The PI properties listed as Not Supported are represented in MDB as a String Type PI property with the
following value: Data Reference is not supported by PI Module Database at this level.
• On the Data Archive server, PI AF Link runs as a Windows service called PI AF Link Subsystem. The account
that the PI AF Link service runs under on the Data Archive server requires:
• Read and write access to the Data Archive dat and log folders
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 79
PI System Management Tools
AF Link for migration to AF
1. Create identical user accounts on the Data Archive server and AF Server.
• The accounts must have the same password, as well as the same user name.
• The Data Archive account requires read and write access to the Data Archive dat and log folders.
2. On the Data Archive server, set the PI AF Link service to run as the account you just created.
3. On the AF Server, add the account to the Windows group that the PI AF to MDB Preparation Wizard
automatically created during the preparation process.
The name of this group is:
AF Link to PI – MyDataServerHostname
where MyDataServerHostname is the host name of the Data Archive server.
For example, if the host name is MyDataServerComputer, then the Windows group on the AF Server is
named:
AF Link to PI – MyDataServerComputer
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 80
PI System Management Tools
AF Link for migration to AF
• Read and write access to the Data Archive PI\dat and PI\log directories
• Member of the AF Link to PI Windows group on the PI AF server
Note: If you have multiple AF Link services synchronizing different Module Databases to the same PI AF
database, you must run each of them under a different Windows user account.
• On the Data Archive server, you need write access on the PIBACKUP and PIModules table in Database
Security (in PI SMT, choose Security > Database Security).
If you don't have the correct access permissions, a pop-up dialog box appears showing a -10401 (no write
access) error.
Note: On PI Server versions 3.4.370 or earlier, PIBACKUP is not required, but piadmin privileges are required.
If necessary, the preparation wizard prompts you for the elevated credentials.
• When running the wizard remotely, you need the access permissions listed above, and you also need to be
an administrator on both the remote Data Archive server and the local client. If necessary, the preparation
wizard prompts you for the elevated credentials.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 81
PI System Management Tools
AF Link for migration to AF
Error messages
This table lists error messages that are related to migration and synchronization.
MDB Object Name exceeded You tried to create an MDB object For Properties, the allowed length
maximum allowed length with a name longer than 259 is 259 characters minus the length
characters. of the replacement suffix.
For example, the default
replacement suffix is _Prop, which
has 5 characters. With this setting,
the maximum length of a Property
name is 254 characters.
Linking these modules is prohibited In MDB, you cannot create links You cannot perform this action.
between objects that are under the
%OSI hierarchy and objects that are
not under the %OSI hierarchy.
New effective date is inconsistent Effective dates and obsolete dates Choose a date that is consistent
with effective dates on existing have to be consistent with dates on with other versions.
versions or it is newer than other versions.
Obsolete Date
At least one PI identity on the PI This means that PI MDB has access Create a new mapping for the
Module has zero mapped Windows permissions for a PI identity (or PI relevant identity, user, or group.
principals user or PI group) that does not Alternatively, delete the MDB
have a PI mapping. Every PI access permissions for that identity,
identity, user, or group that has user, or group.
MDB access permissions must have
at least one PI mapping. If you
delete the last mapping, you create
a security conflict between MDB
and AF.
At least one Windows principal on This means that you added AF On the error messages that are
AF Element is not mapped to any PI access permissions for a Windows related to migration and
identity account that does not have a PI synchronization server, add a
mapping. This creates a security mapping for the Windows account.
conflict between MDB and AF. Alternatively, in PI AF, remove
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 82
PI System Management Tools
AF Link for migration to AF
At least one Windows principal is This means that the PI module To fix (in order of preference):
mapped to a PI identity on the PI specifies access for a PI identity (or
Module but does not exist on AF user or group) that is mapped to • Add the missing principal(s) to
Element security two or more Windows accounts; the AF element.
and one of those principals is not • Remove the remaining
on the AF element security. This principal(s) from the AF
can happen if: element.
An AF element is added to AF with • Edit the access permissions on
only one of those principals on the the module to remove access
security descriptor for the PI identity. This will
or remove the remaining
One of those principals was principals from AF element.
removed after AF and MDB were in Note: PI AF Link does not
synchronized state. automatically pick up changes
in mappings. The change does
not take effect until you edit
the element in some way; this
triggers PI AF Link to update
the settings in MDB.
Permissions for one or more This means that the AF element Manually edit the access
Windows principals on the AF uses AF security options that are permissions to match or reset the
Element do not match permissions not reflected on the Data Archive MDB.
on the PI Module server.
Using default Acl for PI Module. This means that PI AF Link is now If the problem is deny access in AF,
using the default Access Control remove the deny access. If the
List (ACL) to control access to the problem is no mappings, create a
Module. Two possible reasons: mapping.
Failed to Connect to AFServer For some reason, PI AF Link was Check that the AF Server is up and
unable to connect to the AF Server. that the Data Archive server can
connect to it. Check Windows
EventViewer. It has a separate entry
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 83
PI System Management Tools
AF Link for migration to AF
Module not yet created in AF. Added module but it’s not yet in AF. Retry the operation.
Retry. This could happen if you added If the problem doesn’t resolve itself
many modules and PI AF Link is within five minutes, contact OSIsoft
trying to create them all in AF. It Technical Support.
might take a while to process all
the changes in AF.
Failed to edit MDB-AF mapping You were running the offline Wait a minute and retry the
table piaflink mapping table command command.
and the operation failed for some If the problem doesn’t resolve itself
reason. within five minutes, contact OSIsoft
Technical Support.
Failed to read module ids from AF You were running the offline Retry the command. Wait a minute
piaflink mapping table command and retry the command.
and the operation failed for some If the problem doesn’t resolve itself
reason. within five minutes, contact OSIsoft
Technical Support.
Error during remigration. Current PI When you did the remigration, you Delete the mapping file from the
Server Element is different from neglected to delete the mapping PI\Dat directory (the file is
the previous run. Perform the re- table. This old mapping table has pimdbafmapping.dat) and then
migration steps again. configuration information that is no restart PI AF Link.
longer current.
AF Link subsystem is not ready to PI AF Link does not allow an MDB If PI AF Link or PI Base Subsystem
allow module edits edit at this time. This could happen just started, then wait a few
for any number of reasons, such as seconds after both are up and
PI AF Link not running, unable to running, then retry.
connect to AF Server, and so on. If that is not the problem, then in
This state always occurs when you the PI SMT AF Link tool, check
start PI Base Subsystem or PI AF synchronization status to find out
Link. It will take about 15-30 what the problem is.
seconds after the later of the two
subsystems starts before module
database can be edited even if
there are no problems.
Attempted to connect to an Specified an AF Server and for Use the PI System Explorer to add it
unknown AF Server some reason not found in the list of to the list:
AF Systems.
• Click Database.
• Click …
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 84
PI System Management Tools
AF Link for migration to AF
AF and MDB are out of sync You cannot edit MDB when AF and In the PI SMT AF Link tool, check
MDB are out of sync. synchronization status to find out
what the problem is.
Handshake already in progress. Will AF Link connects to the AF Server Wait a while if possible. PI AF Link
retry. every 5 seconds (handshake), but will re-try, so the error might go
can only do this once at a time. away with time.
If that does not work, try to restart
PI AF Link Subsystem (you can do
this in Windows Services)
If the problem persists, contact
OSIsoft Technical Support.
Checkout of AF Object failed. You are trying to edit an object in Wait and then retry. If you still have
MDB but PI AF Link is not able to a problem, look at the suggestions
check out the corresponding AF for the following three errors in this
Object. Someone else might have it table.
checked out, or the same user has
another version checked out, or the
AF Object type is not supported for
checkout. Could also be a
connection or access permissions
problem. If you get this message,
then PI AF Link cannot determine
the exact problem.
AF Object checked out by another You are trying to edit an object in Wait until the AF object is checked
user MDB but PI AF Link is not able to in and then retry.
check out the corresponding AF
Object; someone else might have it
checked out.
Another version of AF Object You are trying to edit an object in Wait until the AF object is checked
already checked out MDB but another version of the in and then retry.
object is already checked out.
AF Object type is not supported for You are trying to edit an object in You cannot perform this type of
checkout MDB but PI AF Link is not able to edit in the MDB.
check out the corresponding AF
Object because it is not supported
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 85
PI System Management Tools
AF Link for migration to AF
Required configuration is missing or The preparation wizard says that it Try again in five minutes. If that
incorrect is complete, but PI AF Link cannot doesn’t work, check the message
find some required configuration log to find out what is missing.
information. Run the wizard again.
Note: If you can figure out what is
missing, you might be able to
manually fix it.
AF Database CheckIn Failed PI AF Link could not check in to the Do nothing. PI AF Link will retry the
AF Database. check in. The error should go away
in time.
Complete the PI MDB to AF You ran the preparation wizard but Run the preparation wizard and
Preparation Wizard to initiate it is not complete. Either you didn’t make sure the wizard is complete.
migration put in all the information, or you You should see a success message
need to analyze the Data Archive on the final screen.
server again.
PI Server was moved from one Data Archive was moved from one If you intentionally moved the Data
machine to another. machine to another. Archive server, and you want to
keep the same target AF Server,
then be sure to disable PI AF Link
on the original Data Archive server.
You can do this by disabling the PI
AF Link Subsystem Windows
service.
If you intentionally moved the Data
Archive server, but you want to
change the target AF Server, then
re-migrate.
MDB AF synchronization This could be for any number of Do nothing. PI AF Link will retry.
encountered an error. reasons. The error should go away in time. If
not, look in the PI message log and
in the Details tab of the AF Link tool
in PI SMT for more information.
MDB migration in progress. MDB PI AF Link is migrating MDB to AF. Wait until the migration is
cannot be edited complete and try again.
Processing changes made in AF A large number of changes were You should retry the operation
Database. Retry later. made in AF and PI AF Link is busy later.
processing the changes for MDB.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 86
PI System Management Tools
AF Link for migration to AF
Another thread is still reading AF An internal error. Do nothing. PI AF Link will retry.
Changes. Will retry. The error should go away in time. If
not, contact OSIsoft Technical
Support.
AF Link is busy making other AF PI AF link is busy making other Retry the operation later.
changes. Retry later. changes in AF and cannot process
this operation.
MDB cannot be reset from AF. Run The system is in a state where a re- Run the migration wizard to re-
the migration wizard to re-migrate migration is not allowed. migrate MDB to AF.
MDB to AF.
Failed to add AF Element PI AF Link tried to add an element Retry the operation. If that doesn’t
in AF and the operation failed. work, look in the message log for
more information.
Failed to edit AF Object You added or edited something in This is not an error you can fix.
MDB but PI AF Link could not Retry the operation later. If that
create or edit the corresponding doesn’t work, look in the message
object in AF. The health goes out of log for more information. The
sync when this happens and the reason for this failure will contain
error code for it will be this error information on exactly which
number. element failed and maybe why it
failed.
Does not have required privileges PI AF Link does not have the Restart PI AF Link. If that does not
on AF Object necessary privileges to edit the work, then make sure that the AF
object in AF. Link to PI Windows group on the AF
Server has the necessary
permissions and that the account
under which PI AF Link is running is
a member of that group.
Target AF Database or the PI Server The Data Archive element or the The best solution is to run the MDB
Element was deleted or not found. database to which it belongs, was to AF preparation wizard. If you do
deleted; or the configuration file not want to do that, you can:
doesn’t match.
• Manually recreate the database
or element, then restart PI AF
Link.
• Restore the database or
element from a backup, then
restart PI AF Link.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 87
PI System Management Tools
AF Link for migration to AF
Target AF Database was not found. The database to which the Data The best solution is to run the MDB
Archive element belongs was to AF preparation wizard. If you do
deleted or PI AF Link can’t find it. not want to do that, you can:
AF Element was derived from a You are trying to edit properties or You cannot perform this operation.
template. PI Properties and PI aliases on a module, but the If an AF element is derived from a
Aliases cannot be edited in MDB. corresponding AF element is template, then you cannot edit the
Edit the attributes in AF. derived from a template. properties or aliases on the
corresponding module in MDB.
Your only option is to remove the
template from the element in AF.
MDB and AF Database are not MDB and AF Database are not Restore MDB and the AF Database
restored from the same backup restored from the same backup. from same backup or reset MDB.
PI_MDBAFPREP_COPYANDLOADFAI This indicates that we were unable Contact OSIsoft Technical Support.
LED to successfully make a backup copy
of the files that the validation uses
(pimoduledb.dat, piacl.dat,
piidentity.dat, etc) and/or we were
unable to load these files (possibly
indicating they are corrupt).
PI_MDBAFPREP_VALIDATIONFAILE This indicates that the validation of Contact OSIsoft Technical Support.
D the module database unexpectedly
quit. At this point, we don’t know if
the MDB is actually ready or not for
migration.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 88
PI System Management Tools
AF Link for migration to AF
CheckinFailure There was a check-in failure when Do nothing. PI AF Link will retry the
checking in changes to the AF check in. The error should go away
Server. Most likely another user has in time.
the object checked out.
PI AF Link Subsystem is not running. This means that PI Base Subsystem Start the PI AF Link Subsystem
is running but that PI AF Link is not. Windows service.
Health status is bad for the Base The PI AF Link subsystem status and On the details pane, find the health
subsystem the PI Base Subsystem status do status for PI Base Subsystem. Take
not match. PI Base Subsystem has the appropriate action for that
bad health status. health status message.
Health status is bad for the PI AF PI AF Link Subsystem status and PI On the details pane, find the health
Link subsystem Base Subsystem status do not status for PI AF Link Subsystem.
match. PI AF Link Subsystem has Take the appropriate action for that
bad health status. health status message.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 89
PI System Management Tools
AF Link for migration to AF
DBAFRestoreInconsistent MDB and AF Database are not Restore MDB and the AF Database
restored from the same backup. from same backup or reset MDB.
FailedToReadMDBEvents Failed to read MDB Events from Do nothing. PI AF Link will retry and
update queue. this error should go away with
time.
Failed to Reset MDB from AF Failed to Reset MDB from AF Try to reset MDB again. If it
Database Database continues to fail, contact OSIsoft
Technical Support.
GenericBadState An error exists that does not fall Wait five or ten minutes if possible.
into any category in this table. PI AF Link will retry, so the error
might go away with time.
Otherwise:
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 90
PI System Management Tools
AF Link for migration to AF
InsufficientPermissionsToAF PI AF Link Subsystem does not have Check that the PI AF Link
enough permissions on AF Subsystem service has the
Database to continue. following access permissions:
This PI Server is running a version This means that you have not yet If you want to upgrade this Data
earlier than PI Server 2010. The run the PI MDB to AF preparation Archive, you must first complete
MDB to AF migration wizard has wizard on this Data Archive server. the preparation wizard. The wizard
not yet been run. is included in PI SMT 2010 and later
versions, which you can download
from the OSIsoft technical support
Web site.
This PI Server is running a version This means that you have run the PI If you want to upgrade this Data
earlier than PI Server 2010. The MDB to AF preparation wizard on Archive, you must first complete
MDB to AF migration wizard has this Data Archive server but that the preparation wizard.
not yet been completed. you have not completed it.
This PI Server is running a version This means that you have Upgrade when you are ready.
earlier than PI Server 2010. successfully run the preparation
Migration preparation is complete, wizard on this Data Archive server
upgrade to PI Server 2010 to and it is ready for upgrade.
enable PI AF Link.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 91
PI System Management Tools
Alarm Groups in PI SMT
Each alarm point is listed in the Alarm Point list. The alarm point name and descriptor appear in columns.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 92
PI System Management Tools
Alarm Groups in PI SMT
Icon Status
PI alarm group
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 93
PI System Management Tools
Alarm Groups in PI SMT
Note: You cannot place alarm groups on secondary nodes of a Data Archive collective. You can only add alarm
groups to primary servers.
Note: Right-click and toolbar options are enabled based on the item selected in the Alarm Groups window and
its current status.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 94
PI System Management Tools
Archive Editor
Archive Editor
Use the Archive Editor tool to view, edit, insert, and delete values for PI point events in a PI archive. To manage
archive files, use the Archives tool.
The list refreshes when you select an item in a drop-down list, enter a value in a text field, or click Get Events
.
To look at values for other points without clearing the currently displayed values, click New Tab .
Note: When adding values to an archive, you can protect existing event values by specifying the Merge Type. For
details, see Protect existing archive values.
• Basic Search allows you to create a tag mask by specifying PI point attributes. The mask is used to find a list
of PI points on the server with matching attributes.
• Advanced Search provides a query-building interface with access to more point attributes for complex
searches.
• Alias Search provides a logical tree view of a Data Archive through the PI Module Database, which you can
use to select tags by their descriptive aliases.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 95
PI System Management Tools
Archive Editor
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 96
PI System Management Tools
Archive Editor
After a time range is set, you can scroll to change the times for the range with the arrow buttons to the right
of the End Time and Event count fields.
For example, with a time range set between 6:00 AM and 8:00 AM, click the left arrow to shift the time range
between 4:00 AM and 6:00 AM. Click the right arrow to shift to 8:00 AM to 10:00 AM.
Note: The latest time you can use is 10 minutes ahead of the current time. If you enter a later time, Archive
Editor changes it to the current time plus 10 minutes, and shifts the other time string as needed to maintain
the time range you specified.
Use negative numbers to show events that count back in time from the start time, and positive numbers to
count forward. Use the arrow buttons to change the reference time by the number of events.
• Replace Duplicates
Replaces an existing event with the same timestamp (if present) and sets its Substituted attribute to True.
Otherwise, adds a new event.
• Insert Duplicates
Adds a new event, but does not affect existing events with the same timestamp (if present).
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 97
PI System Management Tools
Archive Editor
• Inside (default)
Returns events at start and end times, if they exist, or the nearest events occurring within the range.
• Outside
Returns the closest events occurring immediately outside the range.
• Interpolated
Returns interpolated events at start and end times.
• Auto
Interpolated, but using Inside behavior for tags with step attributes set on Windows-based Data Archive
servers.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 98
PI System Management Tools
Archive Editor
• Each row contains five columns, including the event Value and matching Event Time, and three attribute
columns.
• Events are listed chronologically unless the search is a negative event count (see Define a time, event count
or event range).
• All events occurring within the specified range appear unless the results are filtered (see Filter search
results).
• The following attributes may be flagged by edits to an archived event:
• Questionable
The event value is unreliable or the circumstances under which it was recorded are suspect.
• Annotated
An annotation has been made to the event to include further information or commentary.
• Substituted
The event value has been changed from the original archived value.
Across the top, the Archive Editor tool displays these statistics:
• Event Count
The full count of events that match the search criteria.
• Retrieved
The actual number of events retrieved and displayed, excluding filtered events.
• Row
The number of the currently-selected row.
Note: The Archive Editor tool can appear in a host application such as PI ProcessBook in read-only mode, in
which case all edit features are disabled.
• Right-click a value that you want to edit, then select Edit Value. Once you save the updated value, Data
Archive flags the updated event in the Substituted column.
• Select the check box in the Questionable column to flag a questionable event.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 99
PI System Management Tools
Archive Editor
• The Event Time for an archived value cannot be changed. If an event is needed for a certain time, add a new
event instead. (See Add an event to the archive.)
• Data Archive flags an event in the Annotations column once an annotation is saved for the event. Click the
Annotations button to annotate an event in the PI Annotations Maintenance dialog box.
• If you change Start Time or the End Time or Event count parameters, the archived events list does not
refresh. Click the Get Events button or press ENTER.
• If you change the Server parameter, both the Tagname field and the archived events list are cleared. Specify
search criteria, then click the Get Events button or press ENTER.
• If you change Tagname, Boundary Type, or Show Filtered parameters, the archived events list refreshes
automatically.
1. Scroll down to the first empty row (containing the * character) and enter event attributes.
• Enter an event value in the Value column.
• Enter a matching timestamp in the Event Time column.
• Select the check box in the Questionable column to denote the event as questionable.
2. Click the Save button to save event updates to the PI archive.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 100
PI System Management Tools
Archive Editor
Annotations in PI SMT
Use annotations to associate arbitrary information, such as text comments and other binary data, with a PI
archive value.
Use the PI Annotations Editor in the PI SMT Archive Editor to view, edit, insert, and delete annotations to PI point
values. Annotations can include comments, notes, supplementary values with specified data types, and files.
Every value in the snapshot or the archive may be annotated. Annotated events always bypass compression. An
annotation can be of any binary data type. The size of an annotation is controlled by the
Snapshot_AnnotationSizeLimit tuning parameter.
Each archive file has a single associated annotation file, with an .ann extension. The annotation file is created if it
does not exist. It is important to store archive and annotation files together, especially when a backed up archive
file is restored.
Note: Any operation on an annotation translates into an actual I/O, bypassing archive caching. Annotated events
are less efficient than non-annotated events.
You can use the following modes to maintain annotations.
• Standard/Default mode
Provides a table format that can include alternate values with assigned data types. Use this mode for
annotation data that is structured, read programmatically, or exported for use by another application.
• String/VARIANT mode
Stores annotation data as an unspecified VARIANT data type. Use this mode for simple string annotations,
annotations that do not require structured data, and to conform with legacy annotations from earlier
versions of Data Archive.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 101
PI System Management Tools
Archive Editor
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 102
PI System Management Tools
Archive Editor
1. Select an event in the archived events list and click the Annotations button , or right-click the value and
select Annotations.
2. In the PI Annotations Maintenance window, select the annotation with the file and click the Export button
, or right-click the annotation and click Export.
3. Navigate to the folder where you want to save the file.
4. Click Save.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 103
PI System Management Tools
Archives tool
Archives tool
The Archives tool lets you administer PI archive files and manage how Data Archive uses archive files.
To edit the data contained in the archive files, use the Archive Editor tool.
Note: The Archives tool can only display archives for Windows-based Data Archive servers.
Archives tool
The Archives tool displays a list of registered archives for each connected Data Archive server. Historical and
future archives are listed under separate tabs.
To change the location where Data Archive creates archive files, whether historical or future, select the Review
and update parameters tab.
The archive list contains columns that describe the status and properties of each archive. Toolbar functions and a
context menu allow you to monitor and manage archive use. Right-click any file in the archives list to display the
following actions.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 104
PI System Management Tools
Archives tool
Note: The archive file that you select determines which options are available; some may be enabled or disabled.
Archives toolbar
Most archive management tasks can be completed using the toolbar. Toolbar icons are enabled or disabled
according to the item selected and its current state.
The toolbar contains the following command buttons:
Icon Meaning
Register an archive.
Reprocess an archive.
Archive properties
Right-click an archive and choose Properties to see a list of the following information for an archive:
• Archive File name, which includes the full path and drive letter relative to the server machine.
• The Data Archive network name or IP address.
• The name of the Collective, if applicable, that the Data Archive belongs to.
• The current Status of the archive, either Primary, Has Data, or Empty.
Note: Each server has one primary archive where data is currently collected. Only historical archives can be
primary archives; future archives used for forecast data cannot be primary archives.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 105
PI System Management Tools
Archives tool
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 106
PI System Management Tools
Archives tool
Archive names
Use a naming convention for your PI archives that is valid for the underlying operating system and ensure that
the file location has sufficient disk space. There are no other limitations to name PI archives.
The default archive file names are piarch.xxx, where xxx is 001, 002, 003, and so on.
The associated annotation file has the same full path name as its archive file with .ann appended. For example,
the annotation file for the piarch.001 archive file would be piarch.001.ann.
Create an archive
1. Select Start > PI System Management Tools > Operation > Archives.
2. Click the Create a New Archive button ( ).
3. In the Create a New Archive dialog box, select Single archive.
4. Click the browse button to change the archive path, if desired.
You can store an archive in any local or network directory that is accessible by Data Archive. Local storage
with other archives provides a convenient option for managing archives.
5. If you do not want to use the chronologically numbered default name, enter a name in Archive name.
If the text field is yellow, then the archive name is already in use by another file, possibly an unregistered
archive. You may want to cancel the procedure and use the existing archive, if empty.
6. Select a source option to create the archive:
• Clone primary archive fixed size: creates an empty archive of fixed type that's based on the size of the
current primary archive.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 107
PI System Management Tools
Archives tool
• Create archive with a custom fixed size: creates an empty archive with a different size (typically larger)
than the current primary archive. In the accompanying field, specify the size in megabytes (MB). The size
must be equal to or greater than the size of the current primary archive, up to a maximum of 2 TB.
• Create archive with fixed start and end time: creates an empty archive to be used only for a specified
time period. If you select this option, for the Type option, select Fixed.
Note: Start and end times cannot overlap an existing archive.
7. Click OK.
The Archives tool creates and registers the archive.
1. Select Start > PI System Management Tools > Operation > Archives.
2. Right-click an archive file from the target Data Archive server and choose Create New.
3. In the Create a New Archive dialog box, select Multiple archives for backfilling.
4. Click the browse button to change the archive path, if desired.
5. Enter a prefix for the file in Archive name, or accept the default prefix.
The start time and end time will be automatically appended to the archive name depending on the archives
being created.
6. Define the Maximum archive duration for each new archive file.
7. Enter Start time and End time for the new archive files using PI time format.
Note: Start and end times must not overlap an existing archive.
8. Click OK.
The Archives tool registers the newly created archives automatically.
Register archives
To register an existing archive for use with a particular server, use the PI SMT Archives tool.
1. Select Start > PI System Management Tools > Operation > Archives.
2. Right-click an archive file from the target Data Archive server and choose Register Archive.
3. Browse to the archive file you want to register and click Open.
The list of archives is refreshed.
To register multiple archives at once, press Ctrl and click or press Shift and click to select the files and click
OK.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 108
PI System Management Tools
Archives tool
Unregister archives
To move or reprocess an archive file, you must unregister the archive, make your changes, and then re-register
the file. You cannot unregister a primary archive. If the Data Archive server is not on the local machine, this task
requires read and write access on the PIARCADMIN database.
1. Select Start > PI System Management Tools > Operation > Archives.
2. Right-click an archive file from the target Data Archive server and select Unregister Archive.
3. Click Yes.
1. Select Start > PI System Management Tools > Operation > Archives.
2. In the toolbar, click Display Unregistered Archive .
3. Browse to the correct directory, select the unregistered archive file, and click Open.
PI SMT adds the unregistered archive to the list of archives.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 109
PI System Management Tools
Archives tool
Note: If the following message is displayed: Warning: This shift will clear data from the target archive. Are you
sure you want to force an archive shift on serverName to a new archive?, you can ignore it, if Auto Archive
Creation is enabled (Archive_AutoArchiveFileRoot is set to a value). A new archive will be generated and no data
will be cleared.
Use this procedure to force a server to shift from one historical archive to another.
1. Select Start > PI System Management Tools > Operation > Archives.
2. Right-click the server's primary archive in the list and select Force Shift.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 110
PI System Management Tools
Archives tool
Force shifts
When scheduled shift is configured, if a force shift is issued within 10 minutes of the next scheduled shift time,
the shift will happen, the new primary archive's start time will be set to the next scheduled shift time, and the
next scheduled shift will be skipped.
1. Select Start > PI System Management Tools > Operation > Archives.
All the archives registered on the selected Data Archive server are listed. Any archive gaps are labeled and
highlighted in red.
2. Right-click the line displaying the archive gap and select Create New.
The Create New Archive dialog box appears. The dialog box is already populated with the correct start and
end times to fill the archive gap.
3. Click OK.
The new archive is created and registered, and an archive gap no longer appears in the archive list.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 111
PI System Management Tools
Archives tool
Reprocess an archive
Using the Archives tool you can reprocess archives while they are online. Reprocessing archives repairs corrupt
archives, and for archives that are not corrupt, reprocessing can potentially recover disk space or improve the
speed of certain transactions.
Note: You have the option to automatically delete archive files, after they have been successfully reprocessed. To
set this behavior as the default, inOperation > Archives click the Options icon in the toolbar and select the
check box Automatically delete input archive after reprocessing. Even when this check box is selected, you can
still choose to reprocess without deleting the original archive file.
1. In PI SMT, choose Operation > Archives. If you have any corrupt archive files, PI SMT prompts you to
reprocess them.
2. Select the archives you want to reprocess and click Reprocess Selected.
You can initiate reprocessing for multiple archives, but they will be processed sequentially. The status of the
reprocessing operation, and the list of archives queued for reprocessing, will be shown in the Online
reprocessing pane, in the lower half of the window.
Note: If you do not have any corrupt archives, you can initiate reprocessing by right-clicking any archive and
choosing Reprocess archive.
3. Monitor the progress of the reprocessing job in the Online reprocessing pane.
From this pane, you can view the queue of archives to be reprocessed and cancel active and pending jobs.
For example, to stop the current reprocessing job, right click it and choose Cancel.
4. Check the Status column to see when the reprocessing job finishes and to verify that it completes without
error.
For more information about reprocessing archives online, see Archive reprocessing.
1. Select Start > PI System Management Tools > Operation > Tuning Parameters and click the Archive tab.
2. Select the Archive_Enable_AutoDynamic parameter and set the Value to 1.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 112
PI System Management Tools
Archives tool
PI Server PR1 SP1a (3.4.375.59) Beginning with PI Server PR1 SP1a (3.4.375.59),
auto-dynamic archives preserve their shift flag and
turn into fixed size archives again if they become
primary archives. The Archive_Enable_AutoDynamic
tuning parameter is enabled by default.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 113
PI System Management Tools
Archives tool
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 114
PI System Management Tools
AutoPointSync List
AutoPointSync List
The AutoPointSync List tool displays PI interfaces that write to selected Data Archive servers and are configured
to use PI Auto Point Sync (PI APS), a powerful tool for maintenance of the AVEVA™ PI System™. PI APS
automatically synchronizes the PI points an interface or COM Connector uses with the tag definitions on the DCS.
It also locates points on the DCS that do not yet exist in Data Archive and creates those points.
The AutoPointSync List tool derives its list of interfaces from a server's PI Module Database, a hierarchical
information store that organizes an enterprise’s information streams into logical sub-areas, or modules.
Use this tool to enable or disable synchronization of selected interfaces.
• Interface
The name of interface configured to use PI APS.
• Point Source
The point source used by the interface.
• ID
The ID number assigned to points belonging to this interface.
• Server
The host Data Archive for the interface.
• APS Node
The computer where the interface points are synchronized by PI APS.
• Sync Status
The sync status for the interface, either Enabled or Disabled.
• Sync Period
The frequency of synchronization for the interface.
• Create Rule
The creation rule used for synchronization, either Create automatically, Store as Available Tags, or Discard
new Points.
• Edit Rule
The editing rule used for synchronization, either Edit automatically, Store to PIConfig file, or Discard edits.
• Delete Rule
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 115
PI System Management Tools
AutoPointSync List
The deletion rule used for synchronization, either Turn scan off, Delete PI Points automatically, Do nothing,
Remove from interface by changing PS and/or ID, or Store to PIConfig file.
• Debug Level
The APS debug level set for the interface.
Click columns to sort interface listings in ascending or descending order. Click the Refresh button to refresh
the display.
Note: For selected non-Windows servers, messages are written to the Session Record pane of the PI SMT host.
Synchronization status
Synchronization is the process that compares PI points for an interface with data source tags and either changes
Data Archive to resolve any differences or logs the differences.
The Sync Status column in the AutoPointSync List window indicates the synchronization status of an interface:
• Enabled
Synchronization is enabled for the interface.
• Disabled
Synchronization is currently disabled for the interface.
You can activate or deactivate synchronization for each interface included on the list:
• To activate the synchronization status for an interface, right-click the interface and select Enable Sync.
• To deactivate the synchronization status for an interface, right-click the interface and select Disable Sync.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 116
PI System Management Tools
Backups
Backups
The primary purpose of the Backups tool is to view the backup history of a Data Archive. You can also use the
Backups tool to run unscheduled, or on-demand, backups for troubleshooting, data mining, or testing. On-
demand backups do not interfere with your regularly scheduled backups.
Note: Do not use on-demand backups to substitute regularly scheduled Data Archive backups.
Column Data
Status Status code and the status code description for each
backup.
File Copy Failures Number of files for which the backup failed.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 117
PI System Management Tools
Backups
Initialization Duration Time elapsed before the backup began after the
backup request.
Note: Right-click a column heading to see a complete list of columns you can display.
• Copy
The backup type for unscheduled backups, that is, those run with the Backups tool.
• Incremental
The backup type for the regularly scheduled Data Archive backups.
• Differential
A backup type if you are using third-party backup software to back up Data Archive.
• Full
A backup type if you are using third-party backup software to back up Data Archive.
• Numarch/Cutoff
The backup type for regularly scheduled backups that were configured on PI Server versions 3.4.370 or
3.4.375.
Note: For more information on Data Archive backup types, see https://customers.osisoft.com/s/
knowledgearticle?knowledgeArticleUrl=KB01032.
1. Open PI SMT.
2. Under Collectives and Servers, select the server you want to check.
3. Under System Management Tools, select Operation > Tuning Parameters.
4. In the Tuning Parameters tool, click the Backup tab.
5. Double-click Backup_MaxHistory and set the parameter value.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 118
PI System Management Tools
Backups
Select a backup in the Backup History table to view information about the backup in the Summary fields below
the table:
• Status
The status code of the backup: either Success or an error code for the error that occurred.
• Method
Information about the backup method:
• Type
Backup types include incremental, copy, full, differential, or Numarch/Cutoff (see Data Archive backup
types).
• VSS/non-VSS
True for VSS backups; False for non-VSS backups.
• Component Mode
Meaningful only for third-party backups. Some third-party backup applications cannot do component
mode backups and do not provide information to Data Archive about the success or failure of the
backup.
• Third party
Appears if PI Backup Subsystem is not the application used to perform the backup.
• Start Time
The time the backup started.
• Duration
The time taken for the backup to complete.
The Summary tab displays all the information that is included in the Summary area under the main Backup
History table. See View backup information summary for more on these fields. The Summary tab also provides:
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 119
PI System Management Tools
Backups
• The following backup statistics for each subsystem and archive included in the backup:
• Freeze Start Time
The time at which all subsystems entered a frozen state; if the backup is successful, the last backup time
of archive files is updated with this time stamp.
• Freeze Duration Time
Maximum amount of time that the databases could have been frozen (to writes) for a subsystem that
was backed up.
• Freeze Transition
Time spent for all subsystems to go from an unfrozen to frozen state.
• Initialization Duration
Time elapsed between the issue of the backup request and the start of the backup.
• A list of the subsystems that were available for backup at the time the backup was executed.
• Total Files
Number of files selected for backup.
• File Copy Failures
Number of files that should have been backed up and were not.
• Files Backed Up
Number of files that were backed up.
• Unchanged Files for Incremental Backup
Number of files that were not backed up because they were unchanged since the last backup. This field
appears only if the selected backup was an incremental backup. See Data Archive backup types.
The table at the bottom of the tab shows lists the backed-up files:
Column Description
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 120
PI System Management Tools
Backups
You can:
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 121
PI System Management Tools
Backups
• Sometimes the system can get into a state where the ole32.dll becomes unregistered. If ole32.dll is
unregistered, backups do not work. To resolve this issue, re-register ole32.dll with the following command:
regsvr32 ole32.dll
• Backups can fail if either of the following services is disabled:
• Microsoft Software Shadow Copy Provider
• Volume Shadow Copy
• COM+Event System
• Typically, the Volume Shadow Copy service should not be running. It is started on demand whenever it is
needed. If the service is running, it may be stuck in a bad state. To stop the service, enter the following
command:
net stop "Volume Shadow Copy"
If this command does not work, use Windows Task Manager to end the VSSVC.exe process.
• Backups of Data Archive have been known to fail when the OfmProvider from St. Bernard software is
installed on the Data Archive computer. To determine if this software is installed, run the vssadmin list
providers command and look for OfmProvider in the output.
• All archives to be backed up must be on the Data Archive computer. If the archive to be backed up is on a
remote drive, such as a UNC path, the backup will fail unless the file is marked read only, and the pibackup
service is configured to run as an account that has appropriate permissions.
• Backups require at least one NTFS partition on the machine where Data Archive is installed.
1. Run the command piartool -backup -query and make note of the subsystems that are currently registered
for backup.
2. Restart PI Backup Subsystem.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 122
PI System Management Tools
Backups
3. Wait for the previously registered subsystems to register for backup again, with the exception of the
problematic subsystem. Subsystems may take up to 5 minutes to re-register for backup after the backup
subsystem has been restarted.
1. In the Backups window, select the data server from the PI Server list.
2. Click Backup Now .
3. In the server Backup window, select the Data Archive components to back up.
As you make a selection, the right side of the window shows the list of files that will be backed up.
4. In the Backup Location field, enter or browse to the target directory path.
You can specify a UNC or a local path on the server that you are backing up.
Note: If you are not running PI SMT on the same Data Archive server that you are backing up, then you
cannot use the browse button unless you have Windows administrator access to that server.
5. Click Backup.
The Backup History window shows the backup details, including a backup's progress and whether it was
successful or aborted.
1. Click the Export Backup Reports button to open the Save Backup History As window.
2. Browse to the save location.
3. Enter the file name.
4. Click Save.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 123
PI System Management Tools
Batch Custom Names
1. In the pane on the left side of the Batch Custom Names tool, expand the server to view custom name sets
defined on that server.
2. Select a custom name set to view or edit the customized names in that set.
3. Use the toolbar to add, delete, copy, paste, import, or export sets.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 124
PI System Management Tools
Batch Custom Names
Properties
The top section of the Batch Custom Names tool shows two properties about the selected name set:
The left column lists the batch terms that can be renamed and is read-only. The right column contains a name
that can be edited. If you do enter a custom name, the name in the left column is used. To enter custom names,
enter or paste a new name in the corresponding field. Batch terms with blank custom names are considered
undefined.
You can organize the list in one of three ways: categorized, sorted by batch term, and sorted by custom name:
Icon Description
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 125
PI System Management Tools
Batch Custom Names
Note: The options you select are saved with each custom name set; reloaded name sets retain previously
selected options. Therefore, each custom name set may have different settings.
Description
The bottom of the Batch Custom Names tool shows a description of the currently selected combination of batch
term and custom name set:
This description provides a context within which the custom name is used. You can use the description to ensure
that the correct custom name is used. For example, if you select the batch term Active, the description indicates
that it is the activity state of the Time Range component.
Note: You can copy text from this box; select the text to be copied and press Ctrl+C.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 126
PI System Management Tools
Batch Custom Names
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 127
PI System Management Tools
Batch Custom Names
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 128
PI System Management Tools
Batch Custom Names
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 129
PI System Management Tools
Batch Custom Names
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 130
PI System Management Tools
Batch Custom Names
3. In the Custom Names Set: pane, click Show Only Batch Terms with Custom Names Defined .
• Sort by Batch Term sorts the batch terms by the batch-term name.
• Sort by Custom Name sorts the batch terms by the customize name for the batch term.
Button Goal
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 131
PI System Management Tools
Batch Custom Names
Paste a copied set into the list under the selected Data
Archive or Data Archive of the selected custom name
set.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 132
PI System Management Tools
Batch Database
Batch Database
Use the Batch Database tool to view, create, edit, and delete batch items from the PI Batch Database. Batch
items include PIBatches (including PIProperties), PIUnitBatches, and PISubBatches.
Note: This utility does not support creating or editing batch items from PI Batch Subsystem.
To view the hierarchy of PIModules for a selected server, click to open the branch. PIAliases and PIProperties are
not shown in this tree and the PIModules are read-only.
Use this view to create new batch items and search for existing batch items. The results of a search are displayed
in the search results list from which you can view, edit, and delete existing batch items.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 133
PI System Management Tools
Batch Database
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 134
PI System Management Tools
Batch Database
1. Click Search for PIBatch or right-click the PIModule or PIUnit icon and then click Search for PIBatch.
2. In the Search window, enter the criteria to limit your search.
Note: The PI Server field is automatically set to the server selected at the time you opened the window. The
window will open with the same search criteria as was specified for the previous search.
3. Click OK to search the database.
The batches that match the specified criteria appear in the search results list.
1. Click Search for PIUnitBatch button, or right-click the server or PIUnit and then click Search for
PIUnitBatches.
2. Enter search criteria in the Search window.
When the window opens, the PI Server and PIUnit fields are pre-populated, depending on how you opened
the window:
• If you select Search for PIUnitBatches while a server icon is selected, the PI Server field will contain the
name of the selected server and the PIUnit field will contain the default mask of *.
• If you select Search for PIUnitBatches while a PIUnit icon is selected, the PI Server field will be blank and
the PIUnit field will contain the fully qualified path of the selected PIUnit.
3. Use one of two different methods to indicate which PIUnits to search against:
• Enter a mask to the PIUnit field. For example, type R-4* to search all PIUnits that begin with R-4. When
you click Search, the search is executed on the selected server for all PIUnits that have names that match
the entered PIUnit mask.
• Enter the fully qualified path to a specific PIUnit in the PIUnit field to search that PIUnit. This takes the
form of \\Server\PIModule\PIModule\.... The window automatically recognizes the \\ and expects the
PIUnit field to contain a path to a PIUnit. At the same time, the window clears and disables the PI Server
field because the server is provided by the PIUnit path.
4. Click Search to execute the search.
If the search succeeds, the window closes and the results are displayed in the Search results list in the Batch
Database tool.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 135
PI System Management Tools
Batch Database
If your search results include PI Batch Subsystem batches, they will be represented as disabled PIUnitBatches;
the PIUnitBatch title at the top of the panel will be appended with "(BSS Batch)", and all fields will be read-only,
indicated by a dimmed state. Although you cannot make changes to these batches, you can select and copy the
text in these fields. Furthermore, you can copy the batch as a whole to the clipboard, and use the Paste button
to copy it to another PIUnit (See Paste PIBatches).The copy will result in a valid PIUnitBatch.
Use the Paste command to create a new batch item from the copy. The Paste command is available if the task is
appropriate for the type of batch item on the clipboard.
Paste PIBatches
You can paste PIBatches if the clipboard contains a PIBatch item and if a server, PIModule, or PIUnit node is
selected in the Module Database tree.
Note: The paste function is intended to be equivalent to the ability to create a new PIBatch based on the PIBatch
in the clipboard, because it is not possible to make an exact copy of a PIBatch; a new PIBatch will always be a
unique ID and will not include any references to PIUnitBatches.
Paste PIUnitBatches
You can paste PIUnitBatches if the clipboard contains a PIUnitBatch item and if a server, PIModule, or PIUnit
node is selected in the Module Database tree.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 136
PI System Management Tools
Batch Database
Note: PI Batch Subsystem Batches can be copied and pasted as described above. The result of the paste
is a PIUnitBatch, not a PI Batch Subsystem batch.
Paste PISubBatches
You can paste PISubBatches if the clipboard contains a PISubBatch item and you select a PIUnitBatch or a
PISubBatch in the search results list.
Note: The paste function is intended to be equivalent to the ability to create a new PISubBatch based on the
PISubBatch in the clipboard, because it is not possible to make an exact copy of a PISubBatch; a new PISubBatch
will always have a unique ID.
1. Select a PISubBatch item and a PIUnitBatch or a PISubBatch in the search results list.
2. Click the Paste button on the toolbar above the search results list which is located in the bottom-left of
the Batch Database tool.
3. Remove the New PISubBatch to edit the Name, PIHeading, Start Time, and End Time fields.
The New PISubBatch window appears with most of the fields already populated with the values from the
PIUnitBatch in the clipboard. The PI Server field will indicate the server that was selected in the Module
Database tree and the PIUnit field will indicate the PIUnit that the new PISubBatch will be created under
(even if the PIUnit is not the immediate parent).
4. Click OK to create the new PISubBatch.
If the PISubBatch being copied contains any PISubBatches, you are asked whether you want to also copy the
PISubBatches:
• Click No to create only the PISubBatch.
• Click Yes, to create the PISubBatch and a copy of all of the PISubBatches.
Note: You can copy a PISubBatch (including child PISubBatches) as a child of itself; this does not pose a
recursion problem.
• n is a sequential number that usually represents the number of searches executed this session.
• BatchItemType is the type of batch item searched for and returned.
• count is the number of batch items actually returned.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 137
PI System Management Tools
Batch Database
If a search was done against a specific PIUnit, the results list will also have the name of the PIUnit inserted before
the count:
Searchn: BatchItemType (PIUnitName)(count)
1. In the search results list, expand any node to see all of the batch items from that search, including each
item's hierarchy (collapsed).
Batch items in the list are displayed in the following formats:
PISubBatch: Name
2. Click any batch item in this list to view details about that item in the panel on the right side of the Batch
Database tool.
3. Edit details about the batch item.
The toolbar located above the panel contains options available to the selected batch item.
4. Click Save Changes to save your edits.
5. If you edit a batch item without saving your changes and then select a different batch item in the results list,
PI SMT prompts you to save the changes:
• Click Yes to save your changes and add view the selected batch item to the display.
• Click No to cancel your changes for the newly selected item.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 138
PI System Management Tools
Batch Database
• Click Cancel so that the batch item in the panel remains intact (unsaved) and the selected item in the
results list does not change.
PIBatch details
If you select a PIBatch in the search results list, the right panel shows the properties of that PIBatch.
PIBatch properties
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 139
PI System Management Tools
Batch Database
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 140
PI System Management Tools
Batch Database
PIBatch edits
You can edit every PIBatch property field that is not read-only, or disabled, with the exception of copy and paste.
You can select and copy every field to the clipboard, except PIProperties. See PIBatch properties.
When you change the value of a field, the text of the field turns bold and blue. Multiple fields can be in this
state:
When the text of a field is bold and blue, the panel is changed, but not saved. To save the changes to the PIBatch,
click Save Changes in the toolbar above the edit panel, or press Enter on your keyboard. When the new
PIBatch values are saved to Data Archive, the text returns to black and appears in regular typeface. If the PIBatch
could not be saved successfully, the panel reports the error and remains in its changed state.
If you want to cancel your unsaved changes, you can click Revert in the toolbar above the edit panel, or press
Esc on your keyboard, to revert the changed fields back to the previous values.
Note: Changes made to PIProperties tree are effective immediately and cannot be reverted. You will not see bold
blue text in the tree or any of its items.
PIProperty updates
The PIProperties of the PIBatch are displayed in a tree at the bottom of the PIBatch panel:
Note: Changes take effect immediately when you use the buttons to the right of the PIProperties field.
Use the buttons to the right of the tree to create, change, and delete PIProperties.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 141
PI System Management Tools
Batch Database
PIUnitBatch details
If you select a PIUnitBatch in the search results list, the right panel shows the properties of that PIUnitBatch.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 142
PI System Management Tools
Batch Database
PIUnitBatch properties
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 143
PI System Management Tools
Batch Database
PIUnitBatch edits
You can edit every PIUnitBatch property field that is not read-only, or disabled, with these exceptions:
• You can edit the PIBatch field, although it is disabled, using the buttons to the right of the field.
• You can select and copy every field, except PIProperties, to the clipboard. See Copy batch items.
• You cannot edit PI Batch Subsystem batches. See Results from PI Batch Subsystem batches.
When you change the value of a field, the text of the field turns bold and blue. Multiple fields can be in this
state:
When the text of a field is blue, the panel is changed, but not saved. To save the changes to the PIUnitBatch, click
the Save Changes button in the toolbar above the panel, or press Enter on your keyboard. When the new
PIUnitBatch values are saved to Data Archive, the text returns to black. If the PIUnitBatch could not be saved
successfully, the panel reports the error and remains in its changed state.
If you want to cancel your unsaved changes, you can click Revert in the toolbar above the panel, or press Esc
on your keyboard, to revert the changed fields back to the previous values.
1. In the search results list, click a PIUnitBatch to view details about that PIUnitBatch on the right side of the
Batch Database tool.
The PIBatch field shows the PIBatch linked to the selected PIUnitBatch.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 144
PI System Management Tools
Batch Database
2. Use the buttons to the right of the PIBatch field to add or remove a link:
To: Do this:
PISubBatch details
If you select a PISubBatch in the search results, the right panel shows the properties of that PISubBatch.
The panel contains fields for all of the properties of a PISubBatch. Each field can be selected and copied (to the
clipboard), even the disabled (read-only) fields.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 145
PI System Management Tools
Batch Database
PISubBatch properties
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 146
PI System Management Tools
Batch Database
PISubBatch edits
You can select and copy all properties of a PISubBatch, to the clipboard, including those in the read-only, or
grayed fields. See Copy batch items.
When you change the value of a field, the text of the field turns bold and blue. Multiple fields can be in this
state:
When the text of a field is bold and blue, the panel is changed, but not saved. To save the changes to the
PISubBatch, click Save Changes , or press Enter on your keyboard. When the new PISubBatch values are saved
to Data Archive, the text returns to black and a regular typeface. If the PISubBatch could not be saved
successfully, the panel reports the error and remains in its changed state.
If you want to cancel your unsaved changes, you can click Revert , or press Esc on your keyboard, to revert the
changed fields back to the previous values.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 147
PI System Management Tools
Batch Database
Note: A PISubBatch may contain one or more PISubBatches but creating these cannot be accomplished from
this window. This must be done after the PISubBatch is created.
1. Select a batch item (PIBatch, PIUnitBatch, or PISubBatch) in the search results list.
2. Click the Delete button on the toolbar above the search results list, or select a batch item in the list and
press the Delete key.
3. Click Yes to verify that you want to delete the batch item.
Note: When you delete a PIUnitBatch or PISubBatch, any child PISubBatches that it has will automatically be
deleted at the same time. When you delete a PIBatch, it does not delete its child PIUnitBatches. The reason
for this is because a PISubBatch is wholly owned by its PIUnitBatch/PISubBatch parent, whereas a PIBatch
has only references to PIUnitBatches; it does not own them.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 148
PI System Management Tools
Batch Generator
Batch Generator
Generation of PI Batches with the PIBaGen (PI Batch Generator) Interface requires a PIUnit, some setup
information, and PI point data. The setup information determines which points are retrieved from the PI archive;
PIUnits are specialized modules that are objects, or units, that represent processing equipment capable of
making a batch; the PIUnit provides a context, such as active.
Use the Batch Generator tool to configure the PIBaGen (PI Batch Generator) Interface to the Data Archive and
create and configure PIUnits, PIUnitBatches, PISubBatches, PIBatches, PI points, and other information that
allows the PIBaGen Interface to gather and store the batch data on Data Archive. The Batch Generator tool also
provides a view of PI Module Databases on multiple Data Archive servers.
When the Batch Generator tool is connected to a secondary server in a Data Archive collective, you can view but
not edit configuration information. To make configuration changes, the Batch Generator tool must be connected
to the primary server of a Data Archive collective.
Note: To migrate from Batch Generator Interface 1.x version to PI Batch Generator Interface 2.x, use the
Migration Note that is provided with the Batch Generator tool.
Migration Note
The configuration required for PI Batch Generator Interface 2.x is slightly different from the configuration
required for Batch Generator Interface 1.x version. For this reason, a migration utility is provided with the Batch
Generator tool. This utility can be launched from the toolbar menu of the Batch Generator tool. After selecting
the PIUnits to be migrated, the migration utility converts the configuration so that the batch data is generated on
those PIUnits just like PIBaGen 1.x was generating batch data with one exception. The recovery done by PIBaGen
1.x interface was only for PIBatches and PIUnitBatches. However, when the PIUnit is migrated, the recovery
option is set so that PIBatches, PIUnitBatches and PISubBatches are recovered.
Configure PIUnits
Select the Data Archive node in either the Registered Units only view or MDB View tab. The Configuration for
page appears on the right side.
PIUnit configuration involves PIUnitBatch Configuration, PIBatch Configuration and PISubBatch Configuration.
The PIUnitBatch Configuration means setting up the PI points and the attributes necessary to create
PIUnitBatches. The PI points should be specified for Active Point, Unit Batch ID, Product Name and Procedure
Name. The other PIUnitBatch attributes that can be configured are Active Point behavior, PIBatch/PIUnitBatch/
PISubBatch recovery option, Recovery time, Evaluation Delay for PIUnitBatches, Merge Consecutive and PIUnit-
specific Debug messages. These attributes will take default values if they are not specified. The entire
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 149
PI System Management Tools
Batch Generator
configuration information is saved as PIAliases and PIProperties in the Configuration module Name sub-module
under the PIUnit.
Most of the PIUnit configuration properties concern the start and stop times of such batches.
A PIUnit is monitored by the PIBaGen interface only if the PIUnit is Registered (see Register or Unregister
PIUnits). A PIUnit can be Registered or Unregistered at any time using the Batch Generator tool. This is similar to
turning the Scan option ON or OFF for a traditional PI point.
• Turn this option ON to print additional interface-specific messages useful for debugging.
• Turn this option OFF to send standard error messages to log file.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 150
PI System Management Tools
Batch Generator
Retry Timeout
Use this option to set the time in minutes that the interface will retry certain failed calls to the Data Archive
server. After this timeout, the interface prints an error message and continues. The timeout applies to the
following error messages for this version of the interface:
• If No Data value is received when the interface is looking for tag values
• Server error number is -15003, Server error description is Generic Item Not Found--when editing batch data
• Server error description is End Time Access Failed--while closing any of the batch objects
• Server error description is Batch ProcedureName access failed--when setting the Procedure Name
• Server error description is Insert failed--when inserting a PIUnitBatch in a PIBatch
All of the above errors typically occur when the Data Archive server is not accessible or if it is in a backup state.
The errors are resolved with time but to avoid being stuck in an infinite number of retires, the timeout
parameter can be used.
Select No Timeout if you do not want to use a timeout. This is the default setting.
Configure PIUnitBatches
To configure a PIUnit to generate batch data, first configure a PIUnitBatch to specify all the necessary
information to generate PISubBatches on the PIUnit.
1. Select the PIUnit to be configured and use the fields in the PIUnitBatches tab to configure the PIUnitBatch.
2. Click Save to save any configuration changes and make them effective. Configuration changes are saved in
the PI Module Database.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 151
PI System Management Tools
Batch Generator
ActivePoint Behavior
Use the ActivePoint Behavior option to determine how the transitions in Active Point values are interpreted.
There are three possible ways the start and end of a PISubBatch can be determined: Pulse, Step, and Include
zeroth state (Continuous). The default value is Step.
• Step: Step type behavior of Active Point will cause a PISubBatch to start if there is a non-zero state and a
PIUnitBatch is not currently running. If a PIUnitBatch is currently running when the non-zero state occurs,
the PIUnitBatch will stop and a new PISubBatch will be started.
• Pulse: Pulse type behavior of Active Point means that transitions from zeroth state (or value 0 for integer
type or the string that indicates zeroth state) to any other state to start a PISubBatch and transition from any
other state to zeroth state to end an existing PISubBatch. All other transitions are ignored.Zeroth state is
what you assign a value to - mostly strings, either a digital state or integer point are used. For example, 0,1,2.
• Continuous: Continuous type behavior of Active Point means that all transitions result in ending the current
PISubBatch and starting a new PISubBatch. This option is available only when Step is selected.
• Strings Indicating ZerothState: For string type active points, if Step or Pulse option is selected, the string or
strings indicating the zeroth state must also be specified. These strings are case-sensitive and they should be
separated by a comma. For example if the strings Inactive,Off and an empty string indicate a zeroth state,
then this parameter should be Inactive, ,Off. The space between the two commas is interpreted as an empty
string. Double quotes are not required. If this string is not specified, then a Pulse or Step for a string type
active point is equivalent to a Continuous type.
• For string type active points, if Step or Pulse option is selected,any string change to the string will cause the
PIUnitBatch to stop and start new PIUnitBatch.These strings are case-sensitive and they should be separated
by a comma. For example, if the strings Inactive, Off and an empty string indicate a zeroth state, then this
parameter should be Inactive, ,Off. The space between the two commas is interpreted as an empty string.
Double quotes are not required. If this string is not specified, then a Pulse or Step for a string type active
point is equivalent to a Continuous type.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 152
PI System Management Tools
Batch Generator
Evaluation Delay
Use the Evaluation Delay to specify the time that the interface should wait before it evaluates the values from
the PI points specified above. The PIUnitBatch starts at the time the Active Point indicates the start of the
PIUnitBatch. However, other attributes of PIUnitBatch - Unit Batch ID, Product Name, Procedure Name, PIBatch,
PIBatch Product Name, and PIBatch Recipe Name are evaluated after waiting for the number of seconds
specified in Evaluation Delay.
If a PIUnitBatch end event is received while the interface is waiting for the evaluation delay to elapse, the
PIUnitBatch properties are evaluated at the end event time and the PIUnitBatch is started and stopped. If the
option Evaluate at the end of each UnitBatch is selected, then the attributes are evaluated at the end of the
PIUnitBatch and the Evaluation Delay value specified is ignored. The default value for Evaluation Delay is 0
seconds.
Recovery Options
Use this option to indicate whether the PIUnitBatches, PIBatches, and/or PISubBatches are recovered for each
PIUnit in case the interface is shut down and restarted.
• The default option Recover all PIBatch objects recovers PIBatches, PIUnitBatches, and PISubBatches on the
selected PIUnit.
• The Recover only PIBatches and PIUnitBatches option recovers only the PIBatches and PIUnitBatches on
the selected PIUnit. The PISubBatches are not recovered.
• The Do not recover anything option will not recover any PIUnitBatches and PISubBatches on the selected
PIUnit. During recovery, if there is a running PIUnitBatch, the recovery starts from the start time of that
running PIUnitBatch irrespective of the Recovery Time specified. If there is no running PIUnitBatch, the
interface searches for PIUnitBatches on the PIUnit up to Recovery Time into the past. If the search finds
PIUnitBatches within that period, recovery is done from the end time of the last PIUnitBatch. If there are no
PIUnitBatches in the search results, then recovery is done for Recovery Time into the past. This option helps
in reducing the time it takes to recover if the recovery for that PIUnit is deemed not important.
Note: If PISubBatches are recovered, the PISubBatches on the running PIUnitBatch are removed and
recreated based on the archive events. Since the interface depends on snapshot events during real-time
operation and looks at archive events during recovery, it is possible that some of the SubBatches that are
generated during real-time operation might be missing after recovery. This condition occurs only under
certain circumstances. If there is a running PIUnitBatch at the time of recovery and if that PIUnitBatch has
PISubBatches (running or not), those PISubBatchesare removed during recovery. If the start events for those
SubBatches were not archived, then those PISubBatches will be missing after recovery. This occurs only for
that one PIUnitBatch. This situation can be avoided by setting the compression parameters on the Active
Point for the SubBatches such that all the start and stop events for the PISubBatches are archived.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 153
PI System Management Tools
Batch Generator
Recovery Time
Recovery Time is the time into the past starting from current time that the interface should attempt to recover
events for each PIUnit.
When the interface is shutdown for a certain period of time and restarted, it attempts to recover batches
occurred during the shutdownperiod. The recovery is done by checking the archivedvalues for the Active Points.
Recovery Time is the time that the interface looks back into the past from the restart time of the interface for the
archived events. Some batch data may not be generated if the Recovery Time is shorter than the shutdown
period.
During recovery, if there is a running PIUnitBatch, the recovery starts from the start time of that running
PIUnitBatch irrespective of the Recovery Time specified.
If there is no running PIUnitBatch, the interface searches for PIUnitBatches on the PIUnit up to Recovery Time
into the past. If the search finds PIUnitBatches within that period, recovery is done from the end time of the last
PIUnitBatch.
If there are no PIUnitBatches in the search results, then recovery is done for Recovery Time into the past. For
example, if the Recovery Time is 4 days, and if the shutdown period is less than 4 days and the last PIUnitBatch
on a PIUnit was 2 days ago, then the recovery for that PIUnit is done only for the past 2 days. In this case, the
recovery for each PIUnit depends on when the last PIUnitBatch started.
If the shutdown period is 7 days, then PIBaGen will recover batch data only for the past 4 days. There will be no
batch recovery for the first 3 days of the shutdown period. This option helps in reducing the time it takes to
recover if the shutdown time is long and recovery during the entire shutdown time is not critical. The default
recovery time is 4 days.
• Turn this option ON to print additional interface-specific messages useful for debugging.
• Turn this option OFF to send standard error messages to log file.
PI SubBatch Configuration
The PISubBatch Configuration specifies the necessary PI points and attributes to generate PISubBatches. It
involves creating the SubBatch hierarchy. The important nomenclature to understand the PISubBatch
configuration is defined here.
• SubBatch
Represents one item in the SubBatch Hierarchy. Each SubBatch has its own SubBatch Active Point which acts
as a trigger for PISubBatches. Each SubBatch does not necessarily represent only one PISubBatch. The
number of PISubBatches will depend on the SubBatch Active Point and the Active Point Behavior chosen for
that SubBatch.
• SubBatch Title
The name given to represent a SubBatch in the hierarchy. Two SubBatches at the same level cannot have the
same SubBatch Title.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 154
PI System Management Tools
Batch Generator
• SubBatch Hierarchy
The tree-like structure to represent all the SubBatches. Each SubBatch can have only one parent SubBatch
but can have many child SubBatches.
• SubBatch Level
Represents the depth in the hierarchy where the SubBatch belongs. The first Level is the topmost level.
SubBatches at the first level do not have a parent SubBatch.
Each SubBatch defined in the hierarchy requires a SubBatch Title and SubBatch Active Point. Active Point
Behavior option should also be specified. The name for the PISubBatch can be simply the SubBatch Title or the
value of the active point itself or a separate PI point can be specified whose value at the start time of the
PISubBatch is used. PISubBatch Configuration also involves setting an optional PIHeading set for the entire
SubBatch hierarchy.
Delete SubBatch
1. Select the SubBatch to be deleted and click the Delete button. This SubBatch and its children are deleted.
2. It is important to save these changes to the PI Module Database.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 155
PI System Management Tools
Batch Generator
ActivePoint Behavior
Use the ActivePoint Behavior option to determine how the transitions in Active Point values are interpreted.
There are three possible ways the start and end of a PISubBatch can be determined: Pulse, Step, and Include
zeroth state (Continuous). The default value is Step.
• Step: Step type behavior of Active Point will cause a PISubBatch to start if there is a non-zero state and a
PIUnitBatch is not currently running. If a PIUnitBatch is currently running when the non-zero state occurs,
the PIUnitBatch will stop and a new PISubBatch will be started.
• Pulse: Pulse type behavior of Active Point means that transitions from zeroth state (or value 0 for integer
type or the string that indicates zeroth state) to any other state to start a PISubBatch and transition from any
other state to zeroth state to end an existing PISubBatch. All other transitions are ignored.Zeroth state is
what you assign a value to - mostly strings, either a digital state or integer point are used. For example, 0,1,2.
• Continuous: Continuous type behavior of Active Point means that all transitions result in ending the current
PISubBatch and starting a new PISubBatch. This option is available only when Step is selected.
• Strings Indicating ZerothState: For string type active points, if Step or Pulse option is selected, the string or
strings indicating the zeroth state must also be specified. These strings are case-sensitive and they should be
separated by a comma. For example if the strings Inactive,Off and an empty string indicate a zeroth state,
then this parameter should be Inactive, ,Off. The space between the two commas is interpreted as an empty
string. Double quotes are not required. If this string is not specified, then a Pulse or Step for a string type
active point is equivalent to a Continuous type.
• For string type active points, if Step or Pulse option is selected,any string change to the string will cause the
PIUnitBatch to stop and start new PIUnitBatch.These strings are case-sensitive and they should be separated
by a comma. For example, if the strings Inactive, Off and an empty string indicate a zeroth state, then this
parameter should be Inactive, ,Off. The space between the two commas is interpreted as an empty string.
Double quotes are not required. If this string is not specified, then a Pulse or Step for a string type active
point is equivalent to a Continuous type.
SubBatch Name
When a PISubBatch is added, the name of the PISubBatch is obtained either from a PI point that is configured in
the SubBatch Name section or it is the same as the SubBatch Title. A PISubBatch cannot be created without a
name. Therefore, if a separate PI point is specified then it should be a valid PI point and that PI point should have
good values at the start time of the PISubBatch.
• Use ActivePoint Value: Selecting this option will result in using the value of the ActivePoint for the SubBatch
at the start time of the SubBatch as the name of the new PISubBatch.
• Use SubBatch Title: Selecting this option will result in using the SubBatch Title (the name used to represent
this SubBatch in the SubBatch hierarchy) as the name of the new PISubBatch.
• Use This PI Point Value: Selecting this option will result in using the value of the specified PI point for the
SubBatch at the start time of the SubBatch as the name of the new PISubBatch.
PIHeading Set
A PIHeadingSet can be selected from the available PIHeading Sets in the PIHeading Set combo box.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 156
PI System Management Tools
Batch Generator
A PIHeading Set is optional and provides a collective name for each level of PISubBatches defined in the
SubBatch Hierarchy. For example, according to the S88 standards, the first level of PISubBatches is called
Operations and the second level is called Phases. To provide flexibility in naming these levels, PIHeading Sets are
used.
A PIHeading Set consists of PIHeadings and a level corresponding to the PIHeading. There can be only one
PIHeading at each level. Therefore, if a PIHeading Set consisting of PIHeadings called Operations, Phases, and
Steps at levels 1, 2, and 3 respectively is specified for a particular PIUnit, it means that all the PISubBatches
defined at the first level are Operations, all the PISubBatches defined at the second level (it does not matter
which PISubBatch is their parent PISubBatch) are Phases, and all the PISubBatches defined at third level are
Steps. If there is no PIHeading Set specified or if there is no corresponding PIHeading for any level, this attribute
of the PIHeading Set is left empty.
PIBatch Configuration
The PIBatch configuration includes specifying PIBatch Index point, PIBatch Product Name point, PIBatch Recipe
Name point, and PIBatch Search Time.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 157
PI System Management Tools
Batch Generator
If a PIBatch with the search criteria is found in the PI Batch Database, then the PIUnitBatch will be added to the
PIUnitBatches collection in that PIBatch or else a new PIBatch will be created. If the search results in more than
one PIBatch, then the following rulesare used to select the PIBatch.
• If there is only one running PIBatch in the search period, then that PIBatch is selected irrespective of the start
time of the PIBatch.
• If there is more than one running PIBatch, then the one that has the start time between (PIUnitbatch start
time + Evaluation delay - PIBatchSearchTime) and (PIUnitbatch start time + Evaluation delay +
PIBatchSearchTime) is selected. If there is more than one running PIBatch in this range, then the one with
the latest start time is selected.
• If there is no running PIBatch but the search results in PIBatches, then the one that has start time between
(PIUnitbatch start time + Evaluation delay - PIBatchSearchTime) and (PIUnitbatch start time + Evaluation
delay + PIBatchSearchTime) is selected. If there is more than one PIBatch with start time in this range, the
one with the latest start time is selected.
• If there is no running PIBatch but the search results in PIBatches and there is no PIBatch that has start time
between (PIUnitbatch start time + Evaluation delay - PIBatchSearchTime) and (PIUnitbatch start time +
Evaluation delay + PIBatchSearchTime) then the one that has the latest start time is selected.
• If no PIBatch is found with the search criteria, then a new PIBatch is added.
The PIBatch Search Time can be seen as the approximate duration of the PIBatch to which the PIUnitBatches in
this PIUnit belong. The default value is 4 hrs. It is recommended that this value be slightly greater than one batch
duration and less than twice the duration of a typical batch. If the search time is large and if the PIBatch IDs are
not unique, then there is a possibility of having multiple results during the search and the PIUnitBatch may not
end up in the right PIBatch.
Save Configuration
Any changes made to the configuration should be saved before they can be effective. The Save button saves
the changes in the configuration in the PI Module Database.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 158
PI System Management Tools
Batch Generator
Migration
To launch the migration utility, select a server node and click on the toolbar. A new window called Migration
Chart is displayed if there are any PI points belonging to PIBaGen 1.x on that Data Archive server and if they are
not yet migrated. If the userint1 attribute for a PI point belonging to PIBaGen 1.x is set to 1, it is considered that
the corresponding PIUnit is already migrated and is not loaded into the Migration Chart. The migration utility
sets the userint1 to 1 during the migration process. Only those PIUnits that do not have the Error icon next to
the configuration point can be migrated. If there is an error sign, the Migration Status column explains why the
PIUnit cannot be migrated. See Migration errors in PI SMT for common errors that arise before and during
migration. While the selected PIUnits are migrated, the migration utility follows these steps for each PIUnit:
• Rename the configuration module used by PI-BaGen 1.x to PIBaGen 1.x Configuration-Migrated.
• If the renaming process is successful, the PIUnit is considered to be migrated and userint1 for the PIBaGen
1.x PI point is set to 1.
• A new module is then added under the PIUnit with the name as Configuration Module Name.
• All the PIUnitBatch and PISubBatch configuration is then copied to the newly added Configuration Module.
• If PISubBatches are configured in PIBaGen 1.x, then each PIAlias in each PIModule under SubBatchSupport
module represents one SubBatch in PIBaGen 2.x configuration. Therefore, one PIModule with the name
format as H:P is added, where H stands for the PIHeading name and P stands for the PI point name (data
source for that PIAlias). The same PI point is also used for deriving the PISubBatch name.
• The ActivePoint Behavior is set to Continuous because the Step behavior for SubBatches in PIBaGen 1.x is
now behaved like the new Continuous option.
• The PIUnit is registered if the corresponding PIBaGen 1.x PI point had the Scan attribute set to 1. In such a
case, the PI point Scan attribute is set to zero after registering the PIUnit.
• If there are any errors during the migration process, the corresponding row is highlighted and the error
messages are shown at the bottom of the Migration Chart and are also sent to the log file. If the migration is
successful, the Migration Status column shows Migration Completed.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 159
PI System Management Tools
Batch Generator
Cannot Migrate: Error Retrieving The PIUnit cannot be found at the Check the path in the ExDesc
the PIUnit specified location. attribute for the PIPoint
Cannot Migrate: Invalid Module Path in ExDesc does not start with \ Modify the ExDesc for the
Path \ corresponding PIPoint
Cannot Migrate: PIModule is not a PIModule does not have IsPIUnit IsPIUnit should be set to true for
PIUnit set to true the interface to generate batch
data
Cannot Migrate: Configuration PIUnit is probably not configured Configure this PIUnit for PIBaGen
module not found for PIBaGen 1.x 2.x. There is no need to migrate
this PIUnit
Cannot Migrate: Already has PIUnit has second level SubBatches This PIUnit is probably migrated.
SubBatch Hierarchy already defined. Use the Batch Generator Plug- in
2.x to make configuration changes.
Cannot Migrate: Does not contain This PIUnit has SubBatch This PIUnit is probably migrated.
PIBaGen1.x configuration configuration that is not Use the Batch Generator Plug- in
compatible with PIBaGen 1.x 2.x to make configuration changes.
Migration completed but with There were errors while migrating. Check the Error Messages box at
errors: See below for details the bottom of the Migration Chart
Error Registering the Unit PIUnit was migrated but not Register using the Batch Generator
registered Plug- in
Error changing attributes for Error setting either the Scan to zero Use DataLink or Point Builder to
configuration point or userint1 to 1 for the change those two parameters for
configuration point. that PIPoint.
Error renaming configmodulename Error renaming the PIBaGen 1.x Check if a PIModule named
configuration module to PIBaGen configuration module. PIBaGen 1.x Configuration-
1.x Configuration- Migrated Migrated doesn’t exist already. If it
did, probably the PIUnit is already
migrated. Change the userint1
attribute to 1 for the corresponding
PIPoint.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 160
PI System Management Tools
Batch Generator
Text Description
Add New PIModule Add a new PIModule under the selected node.
Migrate PIBaGen1.x to 2.x Launch migration utility for PIBaGen 1.x PIUnits.
Right-click on the SubBatch Hierarchy icons in the PISubBatches tab to get these options:
Text Description
Add New SubBatch Add a new SubBatch under the selected SubBatch
node.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 161
PI System Management Tools
Current Values
Current Values
Use the Current Values tool to view data for all requested tags, respective servers, and Data Archive collectives,
event values and timestamps, and the point descriptor and engineering units.
1. Click the Tag Search button in the Current Values tool to display the Tag Search dialog box, or right-click
the data and select Tag Search.
2. Enter Tag Mask field information and click Search to search for matching points.
3. Select the desired points in the list and click OK. Ctrl-click or Shift-click to select multiple points and move
them to the Current Values tool.
4. Right-click on column headings and select or de-select the column names to customize the display.
1. Click the Start button in the Current Values tool to retrieve continuously updated event values for listed
tags.
2. Click the Stop button in the Current Values tool to freeze the display with current event values. Tag data is
not updated to reflect current values in Data Archive.
1. To remove a single point, select a point in the Current Values tool and click , or right-click the data and
select Remove.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 162
PI System Management Tools
Current Values
2. To remove all listed points, select a group of points in the Current Values tool and click , or right-click the
data and select Remove All.
Help Help
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 163
PI System Management Tools
Database Security
Database Security
The Database Security tool controls read and write access to Data Archive administrative functions, such as the
ability to create and edit PI points, run backups, create new PI identities, and so on. Permissions for specific
points and modules are configured on the objects themselves. (Default access settings for points are determined
by the Database Security tool.)
• For Data Archive version 3.4.380 and later, the dialog box shows access permissions like this:
• For Data Archive versions earlier than 3.4.380, the dialog box shows access permissions like this:
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 164
PI System Management Tools
Database Security
1. Select the point in Point Builder, then click the Security tab.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 165
PI System Management Tools
Database Security
2. Use the drop-down lists to choose an owner and a group and to specify access permissions for the owner
and group. The possible levels of access are read and write. The possible access rights string can be "r", "w",
"r,w" or "" (null). Note that there is no level for deny, as there is in Windows.
• The server
• The owner and group
• An access string specifying the permissions for owner, group, and world
• The access permission model (Data Archive version 3.4.380 and later)
• A description of the entry (Data Archive version 3.4.380 and later)
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 166
PI System Management Tools
Database Security
The older owner/group/world access information is included for backward-compatibility with older versions of
SMT and other administrative tools. These tools cannot interpret the new ACLs.
The owner and group might be listed as PIUserIncompatible and PIGroupIncompatible. These identities are
displayed as the owner and group when the server cannot translate new-model access permissions into the
owner/group/world model. For more information, see PIUserIncompatible user and PIGroupIncompatible group.
If any of these conditions is not met, Data Archive cannot determine an owner and group and it uses the
PIUserIncompatible user and PIGroupIncompatible group instead. Therefore, these names are displayed as the
owner and group in older tools. You can change the names to something more descriptive, if you want.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 167
PI System Management Tools
Digital States
Digital States
Use the Digital States tool to view, create, edit, and delete digital states on a Data Archive server. Digital states
translate numeric PI point values into string data and allow you to associate PI points with a discrete status or
state. For example, you can create PI points to monitor the temperature of a tank and configure those points to
show a state of Red for temperatures exceeding 120 degrees, Green for temperatures below 88 degrees, and
Yellow for temperatures between 88 and 120 degrees.
The points that reflect digital states are known as digital points. They are organized into groups known as digital
state sets.
The Digital States tool displays digital state sets for each connected Data Archive. Connected servers and
collectives are listed in the pane to the right of the Data Archive list and list associated digital state sets under
each respective server nodes. The types of digital state sets are: system, built-in, and custom.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 168
PI System Management Tools
Digital States
• BatchAct
• InterfaceStatus
• Modes
• Phases
Status Icon
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 169
PI System Management Tools
Digital States
1. Click Search , or right-click and choose Search from the context menu to display the Search dialog box.
2. Enter characters from one or more digital states or digital state sets as search criteria.
3. Choose Retrieve sets that have the specified states in consecutive order to display only digital sets that
contain specified states in the order listed, with Digital State 1 first, followed by State 2, and then State 3.
4. Click Search.
5. Click Find Next to continue searching.
6. Double-click on a set name to close the Search dialog box and select the set in the Digital States tool.
7. Click Close.
1. Right-click the digital state set icon in the tree control and click Check System State Set.
2. Review the message:
• If the digital state set is up to date, a System Set Check Complete dialog box appears indicating that the
set is up to date.
• If the digital state set is not up to date, the Check Results dialog box appears. Click Update states to
update the selected states.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 170
PI System Management Tools
Digital States
2. Select the New Set icon and enter a name for the digital state set.
Names that are used for digital states will be truncated to 79 characters and are not case-sensitive. Digital
set names cannot have the prefix "DIGSET_". The DIGSET_ prefix is reserved for deleted digital state sets.
3. Press Enter.
4. Click Save .
1. Create a digital state set named ValvePosition with two states: CLOSED and OPEN.
2. Use the PI SMT Point Builder tool to configure the point or points that will use the CLOSED and OPEN states:
a. Create a point with Point type set to Digital.
b. Set Digital set to the ValvePosition.
c. Configure other point attributes and settings as needed.
3. Create points that use the states ON and OFF.
4. Create a digital state set named SwitchPosition with two states: ON and OFF.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 171
PI System Management Tools
Digital States
5. Use the PI SMT Point Builder tool to configure the point or points that will use the ON and OFF states:
a. Create a point with Point type set to Digital.
b. Set Digital set to SwitchPosition.
c. Configure other point attributes and settings as needed.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 172
PI System Management Tools
Digital States
Note: Previously archived events can be displayed correctly in PI API-based clients. You can continue to see the
archived events using apisnap, ProcessBook 2.x and DataLink 2.x. Internally, Data Archive does not remove
deleted digital state sets; it renames the deleted digital state set to DIGSET_##, where ## is the set number, and
they can be accessed only through piconfig.
If you do delete a digital state set, reconfigure points and events that use the deleted digital state set. For more
information, see Reconfigure points that use a deleted digital state set and Reconfigure events that use a deleted
digital state set.
The easiest way to delete a digital state set is to use the Digital States tool in PI SMT.
1. Select the state set icon in the tree control and click the Copy button or press Ctrl+C. You can also right-
click the node and choose Copy Set from the context menu.
2. Select the Data Archive node where you want to copy the set and click the Paste button or press Ctrl-V.
You can also right-click the node and choose Paste Set.
You might want to rename the digital state set, because by default it will be named the same as the set you
copied.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 173
PI System Management Tools
Digital States
• Column-based CSV, where the Data Archive server name, digital state set name, and each individual state are
represented by separate columns. For example:
server name,state set,state1,state2...
rex,CHIPALARM,No Alarm,C alarm,B alarm,A alarm,D alarm
rex,CHIPMODE,Off,On
• Row-based CSV, where the server name, digital state set name, and each individual state are represented by
separate rows, with the state index comma-separated to the left of the state. For example:
* PI Server rex
CHIPALARM
0,No Alarm
1,C alarm
2,B alarm
3,A alarm
4,D alarm
rex
CHIPMODE
0,Off
1,On
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 174
PI System Management Tools
Digital States
• Do not overwrite existing sets aborts the import of a state set if another already exists with the same
name.
• Import set with a different name if set already exists renames a new state set if another already exists
with the same name.
• Prompt before overwriting existing sets prompts you to overwrite the old state set if a new set has the
same name.
• Automatically overwrite existing sets automatically overwrites old state sets if new sets have the same
names.
4. Select the Data Archive server where you want to import the state sets, if it is not already selected, and click
Create Sets.
5. Import the sets to different servers if necessary, or click Close to close the dialog box.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 175
PI System Management Tools
Digital States
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 176
PI System Management Tools
Firewall
Firewall
Use the Firewall tool to create, view, and edit a PI Firewall. The PI Firewall is a security feature that allows the PI
Network Manager to control access to Data Archive at the IP network address level. System administrators can
use the PI Firewall to allow or deny specific computers to connect.
You can use the PI Firewall to temporarily deny all access to a Data Archive server. For example, you might want
to use the PI Firewall when you upgrade a primary Data Archive server within a collective. In this case, you can
ensure that users and applications will connect to a secondary member within the collective, not the primary,
while you upgrade and test the Data Archive server.
Note: In the default Data Archive configuration, the PI Firewall allows connections from all possible client
addresses. Create a PI Firewall to control access to a specific computer.
For more information, see the Knowledge article Questions and answers on the PI Firewall table.
PI Firewall database
PI Firewalls allow you to block connections from certain addresses. If a PI Firewall exists, it takes precedence over
a trust; that is, before an application can connect to Data Archive, it must first pass the PI Firewall before it
attempts a trust logon. Data Archive recognizes modifications to PI Firewalls within 15 minutes, or upon
restarting Data Archive, whichever comes first.
When you add a PI Firewall you are adding an entry to the PI Firewall database, which is maintained by the PI
Net Manager subsystem. The process manages all connections to Data Archive, including subsystem connections
and TCP/IP applications. When Data Archive receives an incoming connection, pinetmgr first checks the PI
Firewall Database for partial or complete IP host names or addresses.
Use the PI Firewall to allow or disallow connections from designated workstations or subnets. If there is no entry
in the PI Firewall database that would allow an incoming connection, the connection will be terminated
immediately.
Requests from the local host, that is, the same computer on which pinetmgr is running, are always allowed. So,
in effect, the firewall does not apply to the local host.
1. If the connection originates from the local host, the connection is always accepted.
2. The PI Firewall database is searched for an exact match of IP address entry or host name entry. The search
stops when Data Archive finds an entry and processes the connection according to that entry.
3. The PI Firewall database is searched for a wildcard match, for example, the connecting address of
192.168.168.22 matches a host mask of 192.168.*.*. A matching DISALLOW has precedence over an ALLOW.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 177
PI System Management Tools
Firewall
Here is an example of the data entered into the PI Firewall tool for two PI Firewalls. In this example, only hosts
within the 192.168.168.0 subnet are allowed connections. 192.168.168.67 is not allowed to connect even
though it matches the first host mask.
Host/Mask Value
192.168.168.* ALLOW
192.168.168.67 DISALLOW
Create a PI Firewall
You can use IP addresses, IP address masks, or host names to limit connections with a PI Firewall. You can restrict
connections only from those from the subnets defined for your users. To allow users to create PI Firewalls for
Data Archive, use the Database Security tool to grant write access for the PITUNING entry to the appropriate PI
identities or PI users. Data Archive recognizes modifications to PI Firewalls within 15 minutes or upon restarting
Data Archive, whichever comes first.
View PI Firewalls
Existing PI Firewalls appear in the upper right pane of the Firewall tool:
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 178
PI System Management Tools
Firewall
Edit a PI Firewall
Note: After you edit the PI Firewall, it can take as long as 15 minutes for your changes to take effect.
Double-click the name of a PI Firewall in the Firewall tool, or select the name of a PI Firewall and click .
Delete a PI Firewall
Select the name of the PI Firewall in the Firewall tool and click .
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 179
PI System Management Tools
Identities, Users, and Groups
• Authentication
Who is the user, and how do we confirm that users are really who they say they are?
• Authorization
Once we know who the user is, what is that user allowed to do? Authorization is synonymous with Data
Archive access permissions.
Data Archive access permissions (authorization) can be defined for PI identities, PI users, and PI groups. The
differences arise in the authentication configuration.
You can use these authentication methods for Data Archive:
• Windows authentication
• PI trusts (only with PI API 1.6.8 or earlier)
• PI user account logins (only with PI API 1.6.8 or earlier)
The following table shows which components you can use for which types of authentication. See also Data
Archive authentication methods.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 180
PI System Management Tools
Identities, Users, and Groups
When configuring Data Archive authentication, we recommend that you use PI identities and authenticate
through Windows security. PI identities do not imply individual user accounts or groups on the Data Archive
server.
PI users and PI groups are legacy components. When you use them for Windows authentication, you might
create some confusion about the role of the PI user or the PI group on the Data Archive server. Are these
components being used to manage actual PI user accounts, are they used only for trusts and mappings, or are
they used for both?
If you are creating a new component to use in a mapping or a trust, use a PI identity to avoid confusion. If
Windows authentication is not possible and you need to authenticate your users directly on the Data Archive
server, then you must use PI users and PI groups.
piadmin user A PI user with super privileges. The piadmin user has
complete read/write access to all Data Archive
resources. You cannot modify the access
permissions for piadmin. In most cases, do not map
piadmin to any AD group or user. At most, map
piadmin to a small group of administrators. Though
you cannot delete the piadmin user, you can disable
it to varying degrees.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 181
PI System Management Tools
Identities, Users, and Groups
Note: There is also a hidden user and a hidden group: PIUserIncompatible and PIGroupIncompatible. Data
Archive uses them to display an owner and group in older administrative tools that do not support Windows
authentication. They do not appear in the list of identities by default. To show them, use the Options button.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 182
PI System Management Tools
Identities, Users, and Groups
If the access permissions for the object meet the following format, then Data Archive can determine an owner
and group for the object:
If any of these conditions is not met, Data Archive cannot determine an owner and group and it uses the
PIUserIncompatible user and PIGroupIncompatible group instead. Therefore, these names are displayed as the
owner and group in older tools. You can change the names to something more descriptive, if you want.
• Windows authentication
You can set up Data Archive to automatically grant access to authenticated Windows users. To do this, you
create mappings between PI identities (or PI groups or PI users) and Windows groups or users (AD principals
or local Windows security). This is the recommended method.
• PI trusts
PI trusts work by comparing the connection credentials of a connecting application to criteria you specify
when you create the trust. For applications that cannot use Windows authentication, PI trusts are the
recommended authentication method. See Create a PI trust.
• User accounts on the Data Archive server
Each PI user account has an associated password. Nest PI users inside PI groups to manage access
permissions.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 183
PI System Management Tools
Identities, Users, and Groups
Note: This method is not recommended. Recently upgraded servers might use Windows for authentication
but still have some individual PI user accounts and PI groups. However, for the best security, retire individual
PI user accounts as soon as possible.
Manage PI identities
The PI Identities tab lists all the PI identities from each of the selected servers.
PI identities
PI identities are the link between Windows authentication and Data Archive authorization (access permissions).
Each PI identity represents a set of access permissions on the Data Archive server. For example, one PI identity
might be allowed to create points, while another PI identity could be allowed to read point data but not create
new points.
When a mapping exists between a PI identity and a Windows group, all the users in the Windows group are
automatically authenticated on the Data Archive server and granted the access permissions defined for that PI
identity.
Create a PI identity
When you create a new identity, the identity name is required. Note the following restrictions on identity names:
1. Under the Servers panel (or if you have a collective deployment, Collectives and Servers), select a server.
2. Under System Management Tools, select Security > Identities, Users, & Groups.
3. Select the PI Identities tab.
4. Click the New Identity button to open the New Identity dialog box, where you can create and configure a
new PI identity.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 184
PI System Management Tools
Identities, Users, and Groups
Delete a PI identity
Caution: When you delete a PI identity, Data Archive automatically deletes any PI mappings or PI trusts that
reference it. Access permissions that depend on a deleted identity are automatically reset on next access
attempt. Before deleting, consider how that change will impact the rest of your security configuration. In most
cases, renaming or disabling PI identities is preferable to deleting them.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 185
PI System Management Tools
Identities, Users, and Groups
Disable a PI identity
When you disable a PI identity, you also disable all PI trusts and PI mappings based on that identity. This means
that Data Archive can no longer authenticate using that identity. Any users who have already been authenticated
on the Data Archive server will retain their access until they log off.
Data Archive does not delete access permissions for a disabled identity. If you re-enable the identity, then you do
not need to reconfigure the access permissions.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 186
PI System Management Tools
Identities, Users, and Groups
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 187
PI System Management Tools
Identities, Users, and Groups
• Application Information: Specify the Name of a trusted application. Enter the name differently for API
and SDK connections.
• API connection: Enter an identifier called an application process name, or procname. This is a four-
character string with an E appended (for example, PIPeE for the Perfmon Interface).
• SDK connection: Enter the full name of the connecting application, including the extension, but not
the path (for example: PI-ICU.exe).
8. Click OK to create the new trust.
Manage PI users
The PI Users tab lists all the PI users from each of the selected servers.
• Names must be unique. They cannot match the name of an existing PI user, PI group, or PI identity.
• Names cannot include the vertical pipe (|) character or the colon (:) character.
• Names cannot be a positive integer, although they can contain numbers. For example, the name 329 is not
valid, but the name Admins329 is valid.
• Names are not case sensitive.
You can change a PI user or group name any time after creation.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 188
PI System Management Tools
Identities, Users, and Groups
5. Type in the old password and the new password. Assuming you have administrator permission for PI users,
you can use an exclamation mark (!) as the old password.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 189
PI System Management Tools
Identities, Users, and Groups
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 190
PI System Management Tools
Identities, Users, and Groups
7. In Windows Account, enter the account you want to map to. This can be an AD principal or a local Windows
group or user. To select the account either:
• Click the browse button to browse for the account.
• Type in the account name. If you choose to type in the account name, click the resolve SID button to
verify that this is a valid account. If the account is valid, a SID appears in the field. Otherwise, a dialog
box with an error message opens.
8. In Description, enter a description of the mapping, if desired. There are no restrictions on the contents of
this field.
9. Click OK to create the new mapping.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 191
PI System Management Tools
Identities, Users, and Groups
• Application Information: Specify the Name of a trusted application. Enter the name differently for API
and SDK connections.
• API connection: Enter an identifier called an application process name, or procname. This is a four-
character string with an E appended (for example, PIPeE for the Perfmon Interface).
• SDK connection: Enter the full name of the connecting application, including the extension, but not the
path (for example: PI-ICU.exe).
8. Click OK to create the new trust.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 192
PI System Management Tools
Identities, Users, and Groups
Manage PI Groups
The PI Groups tab lists all PI groups from each of the selected servers.
• Names must be unique. They cannot match the name of an existing PI user, PI group, or PI identity.
• Names cannot include the vertical pipe (|) character or the colon (:) character.
• Names cannot be a positive integer, although they can contain numbers. For example, the name 329 is not
valid, but the name Admins329 is valid.
• Names are not case sensitive.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 193
PI System Management Tools
Identities, Users, and Groups
Delete a PI group
If you delete a PI group, Data Archive automatically deletes any PI mappings or PI trusts that reference that
group. Before deleting a group, consider how that change will impact the rest of your security configuration. To
simulate this, disable the group first. If the change causes problems, you can then restore the group.
Disable a PI group
When you disable a PI group, you also disable any trusts and mappings for it. This means that Data Archive can
no longer authenticate using that group. Any users who have already been authenticated on the Data Archive
server will retain their access until they log off.
Data Archive does not delete access permissions for a disabled PI group. If you re-enable the group, then you do
not need to reconfigure the access permissions.
Note: You can disable a PI group only on Data Archive versions 3.4.380 or later; earlier versions do not have this
feature.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 194
PI System Management Tools
Identities, Users, and Groups
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 195
PI System Management Tools
Identities, Users, and Groups
• Network path: Fully-qualified domain name of the trusted computer, such as an interface node (for
example, my_laptop.my_company.com).
• IP Address: The IP address of the trusted computer, such as the interface node.
• Net Mask: The netmask of the trusted computer (for example, 255.255.255.255).
• Windows Account Information: For SDK trusts only, specify a trusted Windows domain and account:
• Domain: Windows domain of the user who runs the trusted application (for example: osi).
• Account: Windows user name of the user who runs the trusted application (for example: my_account).
• Application Information: Specify the Name of a trusted application. Enter the name differently for API
and SDK connections.
• API connection: Enter an identifier called an application process name, or procname. This is a four-
character string with an E appended (for example, PIPeE for the Perfmon Interface).
• SDK connection: Enter the full name of the connecting application, including the extension, but not the
path (for example: PI-ICU.exe).
8. Click OK to create the new trust.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 196
PI System Management Tools
Interface List
Interface List
Use the Interface List tool to view, start, and stop PI interfaces on connected Data Archive servers that are
managed through the PI Interface Configuration Utility (ICU). The list of interfaces is read from the PI Module
Database, where PI ICU stores interface configuration information.
• Interface name
• Optional User Set Name configured in ICU
• Host PI Server
• Interface Node computer that runs the interface
• Point Source used by the interface
• ID number assigned to points belonging to the interface
• Interface Type
• Current Status of the interface service (Running, Stopped, Not a service, Unknown)
• Startup Type used for the interface (Auto, Manual, Disabled)
• Service Display Name, if the interface is installed as a service
• Interface Version
• APS Connector, if Auto Point Synchronization is used
• APS Node that runs PI APS for synchronization
• Description of the interface entered in ICU
You can click individual column headings to sort the list view.
• An interface is accessible
• An interface runs as a Windows service and is presently Running or Stopped
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 197
PI System Management Tools
Interface List
• If the interface Status is listed as Stopped, select the interface service and click the Start button or
right-click the interface service and choose Start from the menu.
• If the interface Status is listed as Running, select the interface service and click the Start button or
right-click the interface service and choose Start from the menu.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 198
PI System Management Tools
Interface List
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 199
PI System Management Tools
IT Organizer
IT Organizer
The IT Organizer tool helps you manage your IT Monitor deployments. In a typical IT Monitor deployment, the
System Manager builds many tags belonging to many different interfaces, sometimes on multiple Data Archive
servers. The following diagram illustrates some of the management difficulties in a distributed data collection
environment:
The IT Organizer tool helps you group your tags by monitored device. This allows you to act on all the tags
belonging to one device. Some of the operations you can perform on a device level are:
• Change the IP address for all the tags (if the device’s IP address changes)
• Change the PI point attributes of many tags at once
• Show how many tags are not collecting data per device
• Add an entire device to the Module Database
You can also assign each group of tags a role that describes the type of device or application you are monitoring.
Once you have assembled and labeled the device groups, you can organize them in a device tree.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 200
PI System Management Tools
IT Organizer
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 201
PI System Management Tools
IT Organizer
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 202
PI System Management Tools
IT Organizer
• Exchange Servers
A role designates a context and corresponds to a point template used to create the data collection tags on the
Data Archive server. For example, you can assign the Data Archive role to a computer to indicate that you are
monitoring Data Archive performance.
A device can have multiple roles. Roles are associated with the device and are used by IT Overview to build
displays.
The server must be on the device list, before you can assign a role to it.
From this window you can also delete a device from the list, clear all devices from the list, and refresh the
point count.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 203
PI System Management Tools
IT Organizer
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 204
PI System Management Tools
IT Organizer
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 205
PI System Management Tools
IT Organizer
Update points
This section describes how to see which interfaces are selected and to add or remove interfaces from the list.
1. In the main panel of IT Organizer, click Update List. This opens the Review your Point Selection Criteria
window.
2. Click Interfaces to open the Store your PI Interface Information window. There you can choose other
interfaces and add them to the update the list Managed Interfaces.
3. Select the Automatically add new points as Aliases. This creates aliases that IT Overview requires for any
point to be monitored without any further user action. This is the default for this option.
4. Select interfaces and click Scan Selected Interfaces. This scans each Data Archive server associated with
Managed Interfaces for points whose point source and interface ID match the interfaces that you selected.
When the scan finishes, you see the devices from which the interface is gathering performance data listed in
your Monitored Device List on the main pane of IT Organizer.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 206
PI System Management Tools
IT Organizer
You can use the toolbar buttons to manage your device list:
• Refresh ( ): Refresh the Percent Reporting column for each of the monitored devices.
• Device Name
• Last Update Date: The last time the tag list for this device was updated.
• Percent Reporting: The percentage of tags for this device which do not have a digital state from the system
digital state set as a current value. Such states, including INTF_SHUT, BAD VALUE or PT_CREATED, indicate
that data is not being properly collected for that point.
• Total Points: The total number of points discovered for this monitored device.
• Comment: A comment you can enter for this device.
• Assign Role: Create a role for this device so that it can be represented in the device tree.
• Add Comment: Add a comment for this discovered device.
• Change IP Address: Change the IP address in every tag in this device’s tag list.
• Resolve IP: If the device is listed by its IP address but you would prefer to browse by a DNS host name,
choose this action to attempt to resolve the host name.
• Refresh Percent Reporting Column: Refresh the tag list for this device. When you invoke this operation, the
servers will again be mined for points, but only points monitoring this device will be refreshed. To refresh the
entire tag list, press the Update Device List button.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 207
PI System Management Tools
IT Organizer
• Show Points: Show the points for this device in the point list below.
• Show Bad Points: Show all digital-state points that have current values in the system digital state set.
• Synchronize Aliases to Points: Rebuild the alias structure for this monitored device
Note: If you make any administrative changes that require changes to the tags (for example, you change the
IP address or change SNMP values), you will need to have write permissions to that tag.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 208
PI System Management Tools
IT Organizer
• Refresh Selected Points: Get the most recent point information for the selected points
• Properties: See the attributes for tag(s)
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 209
PI System Management Tools
IT Organizer
1. To add a group, right-click on the tree location where you want to add your placeholder, and select Add
Branch from the resulting pop-up menu.
The Add a Branch dialog box appears.
2. Name your placeholder and select a registered icon to represent it on the device tree.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 210
PI System Management Tools
IT Organizer
• In addition, you can perform the following actions on the device tree by right-clicking a tree node:
• Add a Placeholder: Add a placeholder at this node
• Change Tree Image: Change the image used for this node in the navigation tree
• Show Points for Device: Show the points associated with this device role
• Delete Site Map Entry: Remove this entry from this list
• Auto Refresh: If this option is selected, the Site Map will be scanned for changes every 5 seconds.
When you drag a device from the Device List to the Site Map, or when you add a Role to the device, the
points for that device are added to the Module Database (MDB) as aliases. These aliases create a context
which could be used in automatic display building.
Device identification
Organizing points into different device buckets is done in a couple of steps. Device buckets are collections of
points which are all monitoring the same device, regardless of interface type. For example, a Dell Server may
have PerfMon, SNMP, and Ping points. Organizing the points based on device rather than interface type allows
the user to see all the points monitoring a particular device. This device-centric view is the standard method for
representing the IT assets rather than the point-centric view.
The IT Organizer accomplishes this task in a number of steps. The IT Organizer is a plug-in which may run on a
number of client machines. Because of this distributed architecture, we require a centralized data store to keep
track of our configuration files. The sections that follow describe some of these configuration files, along with
partial schemas.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 211
PI System Management Tools
IT Organizer
Interface instances
In order to sort points into device buckets, you must set up your PI Interface information to indicate which points
you would like to sort.
The interfaces dialog asks you to select which points (that is, points that share the same PI Server/Location1/
Point Source combinations) to examine for sorting. You might choose to search all selected Data Archives for
interfaces registered via the ICU or enter an Interface ID/Point Source combination manually. The resultant
configuration information is stored in the Module Database as an XML file. A snippet of this file is shown here:
<CinterfaceEntry>
<m_sInterfaceName>piperfmon</m_sInterfaceName>
<m_sInterfaceType>piperfmon</m_sInterfaceType>
<m_sInterfaceID>1</m_sInterfaceID>
<m_sPointSource>#</m_sPointSource>
<m_sServerName>dusty</m_sServerName>
<alPointIndices />
<alScanClasses>
<string>00:00:05</string>
<string>00:01:00</string>
</alScanClasses>
</CinterfaceEntry>
Note that for interfaces which are registered with the ICU (as shown here) the scan classes are stored as well.
This information will be displayed to the users on a per point basis in the point organizer.
The configuration files mentioned above are enough for the IT Organizer to get started; the IT Organizer uses the
SDK’s GetPoints queries to find all the points on a server that fulfill the interface instance and point source
criteria stored by the point selection wizard. The queries look like this:
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 212
PI System Management Tools
IT Organizer
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 213
PI System Management Tools
Licensing
Licensing
The Licensing tool displays license activation status, availability, and restrictions for connected Data Archive
servers. The most common task in the Licensing manager tool is to check your point count and module count
limitations. If you exceed these limitations, Data Archive does not allow you to create new points.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 214
PI System Management Tools
Licensing
It is best to monitor your point and module count together (pibasess.MaxAggregatePointModuleCount). Total
shows you how many data streams (points and modules together) you are licensed for, Amount Used shows you
how many data streams you are using, and Amount Left shows you how many data streams you have left.
To find a specific item that does not appear in the drop-down menu, type a search term in the text field. License
Manager icons indicate the status of your license.
License icons
This icon is a warning that indicates you are either close to the maximum limit of points/connections
allowed, or in the case of a demo product, you are close to expiration.
The Licensing tool displays information about each server that is selected in the Collectives and Servers pane.
The information is grouped under two headings: Programs and Resources.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 215
PI System Management Tools
Licensing
• Programs
Under Programs you can check the maximum number of anonymous connections allowed
(pinetMgr.AnonymousConnectionsAllowed). An anonymous connection is a connection from something
that has not identified itself with a known GUID (Globally Unique Identifier). Products are assigned a GUID
that is stored in the license activation file. However, some custom applications might not have a GUID.
• Resources
Under Resources you can check limitations on API (pinetMgr.MaxAPIConnections) and SDK connections
(pinetMgr.MaxSDKConnections). For example, if you reach the maximum number of SDK connections, you
get a message that looks something like this:
>> License Error: [-12212] Maximum licensed SDK Application connections exceeded.
Connection refused. Maximum allowed: 5. Process name: (calling process name) ID:
(process ID)
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 216
PI System Management Tools
Licensing
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 217
PI System Management Tools
Mappings and trusts
Manage mappings
You manage PI mappings from the PI SMT Mappings & Trusts tool. The Mappings tab shows you all the mappings
defined for the selected Data Archive server. The Mappings tab does not appear unless you are connected to at
least one Data Archive server version 3.4.380 or later. Earlier versions do not support mappings.
PI mappings
PI mappings create an association between a PI identity, user or group to one of the following:
A role is a group of users with similar job functions and access permissions. Roles are stored and managed by the
Identity Management service. Role members that are mapped to a PI identity inherit the same access
permissions as the PI identity.
Note: The AVEVA Identity Manager is the provided identity service for PI Server 2023.
OpenID Connect (OIDC) can be used to map a role to a PI identity. OIDC provides a secure way to map roles to PI
identities through claims, and then grant members of the role the same level of access to PI Server resources.
To view or edit the mappings for a particular PI identity, PI user, or PI group, use the Identities, Users, and Groups
tool.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 218
PI System Management Tools
Mappings and trusts
If you use local Windows security, then the Windows user accounts on Data Archive must exactly match the
Windows user accounts on each client workstation. The account names, and also the passwords must be
identical on the server and all client machines. When a password changes for a Windows user account, you must
make that change on Data Archive and all participating client machines.
Local Windows authentication is not as secure as AD authentication. If at all possible, use Active Directory (AD)
rather than local Windows security. Local Windows authentication is still far more secure than individual PI user
accounts.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 219
PI System Management Tools
Mappings and trusts
We recommend choosing a PI identity. PI users and PI groups represent an older security model that involves
managing individual user accounts on Data Archive. PI user accounts and passwords are not as secure as
Windows accounts.
11. Click OK to create the mapping.
Pre-requisites:
• Your AIM Server account must be a member of the Application Access (AA) administrator group on the AIM
server. If you try to sign on to the AIM server during this procedure using an account that is not a member of
the AA administrators group, you cannot complete the procedure.
• Before you can map a role to a PI identity, Data Archive and the AIM server must be configured. See Data
Archive installation and upgrade.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 220
PI System Management Tools
Mappings and trusts
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 221
PI System Management Tools
Mappings and trusts
8. Type the role name or part of the name in the Filter text box.
9. To select a role, do one of the following:
• Double-click the role in the list.
• Select the role and click OK.
The role is added to the Role text box in the Add New Mapping dialog. The Role ID is a system generated
ID: you do not need to create it.
10. In the Description text box, enter a description for the new PI identity mapping.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 222
PI System Management Tools
Mappings and trusts
12. Select the PI Identity that you want to map the role to by taking one of the following actions:
• Double-click the PI Identity in the list.
• Select the PI Identity and click OK.
13. Click Create.
The new PI Identity mapping is automatically added to the Mapping tab in PI SMT.
Manage trusts
You manage PI trusts from the PI SMT Mappings & Trusts tool.
Alternatively, you can manage trusts from the Identities, Users, & Groups tool. Open the Properties dialog box
for an identity, a user, or a group and then click the Mappings & Trusts tab. Here you can create, edit, or delete
PI trusts that are defined against that identity, user, or group.
PI trusts
A PI trust compares the connection credentials of a connecting application to criteria specified in the trust. Each
PI trust is defined against a PI identity, a PI group, or a PI user. The trust gives the connecting application the
same access permissions as the associated identity, group, or user.
Before Data Archive 2016 R2, trusts were typically used to authenticate PI interfaces. Windows authentication
extends to PI interfaces through PI API 2016 for Windows Integrated Security.
Using PI trusts or explicit logins for authentication is not recommended. For a more secure environment, OpenID
Connect (OIDC) or Windows Integrated Security (WIS) is recommended.
Note: PI API 2016 for Windows Integrated Security extends Windows authentication to API-based client
applications. If you choose to install PI API 2016 for Windows Integrated Security, you can use only Windows
Integrated Security for authentication. Both trusts and explicit logins will fail. For more information, see
Overview of Data Archive security.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 223
PI System Management Tools
Mappings and trusts
1. When an application attempts to connect, it sends some connection information to the Data Archive server.
The connection information includes the application name, and some information about the computer that
the application is running on.
The connection information is different depending on whether it is a PI API connection or a PI SDK
connection. You need to know the type of connection in order to configure the PI trust. See Connection
types.
2. The Data Archive server compares the connection information sent by the application to each PI trust
defined on the Data Archive server. Each PI trust is defined by a trust record in the trust table. Each field in
the PI trust record is compared to the corresponding field in the connection credentials. You can leave some
fields blank when you define the PI trust. Blank fields are not compared to the connection credentials. Every
field that is not blank in the trust record must exactly match the passed credentials. Otherwise, the
authorization is not granted. The more information you enter in the PI trust definition, the more difficult it is
for an interface or client application to match the trust.
3. The Data Archive server compares connection credentials to each trust record. If only one record matches
exactly, that record is used to grant login. If more than one record contains matching fields, then the record
that matches most closely is used.
4. If a match is found, the connection is granted the same access permissions as the PI user, group, or identity
defined in the trust.
Default trusts
Data Archive includes default trusts that guarantee access to all applications running on the local machine. These
default trusts are automatically recreated every time the system starts, to ensure that they are always configured
in their default state. Different versions of Data Archive have different default trusts. The following list includes
default trusts for PI Server 3.4.375 and later.
!PIServerName_FQDN! Used for communication between Not needed for Data Archive
primary and secondary servers in a versions 3.4.380 and later.
Data Archive collective.
Data Archive versions 3.4.380 and later do not need the FQDN trust and it is not included in new installations.
However, that trust is not removed if Data Archive is upgraded from an earlier version.
PI SDK trusts
PI SDK 1.3.6 and later supports Windows authentication, which is more secure than PI trusts. On Data Archive
versions that support Windows authentication (3.4.380 and later) you should use Windows authentication (PI
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 224
PI System Management Tools
Mappings and trusts
identity and PI mapping) instead of a PI trust. If you create a trust, application users might still be authenticated
through Windows and not the trust (see Windows authentication versus SDK trusts).
The first method that succeeds defines the access permissions granted to the connecting application. After an
authentication method succeeds, no other methods are tried. By default the SDK (1.3.6 and later) tries to
authenticate first through Windows.
You can use PI SMT to configure the methods the SDK tries first:
Create a PI trust
To create a PI trust, you need to know connection types (API or SDK). The type of connection determines what
information you can use to define the trust. At a minimum, for a new PI trust you have to specify the following:
• The name of the trust (must be unique on the Data Archive server)
• The name of the PI identity, PI group, or PI user against which this trust is defined (this determines the
access permissions granted to the connecting application)
• One optional specification from the following list:
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 225
PI System Management Tools
Mappings and trusts
• Application name
• IP information as a network path or IP address and netmask for the connecting computer
• Windows account information (SDK only) (only for SDK applications)
Connection types
When you configure a PI trust, you need to know the type of connection the trust will be used for. There are two
different Data Archive connection types. Each PI interface and client application is configured to use one or the
other. (There are also a few interfaces that use both.) The two mechanisms are:
• PI API Connection: Most PI interfaces use the PI API to connect to the Data Archive server.
• PI SDK Connection: Most client applications use the PI SDK to connect to the Data Archive server.
The PI API and PI SDK connections both support Windows authentication, which is the most secure
authentication method available for the Data Archive server. We recommend that you always use Windows
authentication when possible.
For more information about configuring security, see Overview of Data Archive security.
Application name
A PI trust can require a specific application name. When you specify an application name in a trust, you have to
use the appropriate format for the connection type:
• Applications that connect through the API Connecting PI API applications send an identifier called an
application process name, or procname. This is a four-character string with an E appended. For example, the
procname for the Perfmon Interface is: PIPeE
Note: PI API versions before 1.6.0 always send a five-character string: 4 characters plus a capital E. For PI API
versions 1.6.0 and later, the name can be up to 8 characters, without a trailing capital E.
• For applications that connect through the SDK, use the full name of the connecting application, including the
extension, but not the path. For example, the application name for the ICU is: PI-ICU.exe
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 226
PI System Management Tools
Mappings and trusts
If you are running the same PI interface on another Data Archive server, then you can use PI SMT to determine
the correct application name. Select Operation > Network Manager Statistics. Find the interface in the list. The
application name is listed in the Name field.
See also: Connection types
• Windows Domain: the Windows domain of the user who is running the application.
• Windows Account: the Windows user name of the user who is running the application.
It is possible to use a dollar sign ($) for the user name for a particular domain; then users on that domain can
connect through this trust to existing PI users of the same name as the Windows user running the application.
This is called a dollar-sign trust. To configure a dollar-sign trust, you typically first import your Windows
usernames and passwords as PI users. See Import Windows users. (The dollar sign is a valid value for the domain
as well as the user name.)
Note: A PI mapping serves the same purpose as a trust based on OS user name and Windows domain
membership. With Data Archive version 3.4.380 and later, you should use PI mappings instead of dollar-sign
trusts.
Remove a PI trust
1. Under Collectives and Servers, select the server or collective.
2. In the System Management Tools pane, select Security > Mappings and Trusts.
3. Select the Trust tab.
4. Select the trust you want to delete and click the Delete button .
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 227
PI System Management Tools
Mappings and trusts
Edit a PI trust
1. Under Collectives and Servers, select the server or collective.
2. In the System Management Tools pane, select Security > Mappings and Trusts.
3. Select the Trust tab.
4. Select the trust you want to edit and click the Properties button .
The Trust Properties dialog box appears.
5. Edit the properties and click OK.
Copy a PI trust
Caution: The PI trust name must be unique on the Data Archive server. This means that when you copy a PI trust
you have to change either the name of the trust or the name of the Data Archive server.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 228
PI System Management Tools
Mappings and trusts
2. In the System Management Tools pane, select Security > Mappings and Trusts.
3. Select the Trust tab.
4. Click the Import button .
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 229
PI System Management Tools
Message Logs tool
Note: are enabled only when the Server & SDK Logs tab is selected, and at least one Data Archive server is
selected.
Filter messages
When you choose a time range, the Message Logs tool shows all the messages that occurred in that time range.
Depending on the time range, this might be a long list. You can filter the list to show only the messages you are
interested in.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 230
PI System Management Tools
Message Logs tool
This menu is populated with the source programs for all currently displayed messages.
Severity levels
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 231
PI System Management Tools
Message Logs tool
• Host
Name of the host computer that prompted the message
• OSUser
Authenticated user or application that sent the message to the log
• PI User
Name of the PI identity or PI user that sent the message to the log
• ID
Message ID
• Host
Name of the server from which the message originated
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 232
PI System Management Tools
Message Logs tool
• OSUser
Authenticated user or application that sent the message to the log
• PI User
Name of the PI identity or PI user that sent the message to the log
• Click or press Enter to find the next message that matches the search criteria.
• Click to redisplay the messages that fit the current criteria.
• Name and location of the message file, for example, C:\Program Files\pipc\dat\pipc0000.log.
• File start time
• File end time
Message details are displayed both in a tabular format, and in the Message Details tab at the bottom of the
active pane. Details include:
• Server
The source of the message
• Collective
For the server, if applicable
• ID
The message ID, if applicable
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 233
PI System Management Tools
Message Logs tool
Note: All messages created prior to the introduction of the PI Message Database have an ID 0. In most cases,
the higher the ID number, the greater the message severity.
• Time
The time when the message was sent
• Severity
Indicates the seriousness of the message. See Message severity levels for definitions of the severity levels
used in the default Data Archive configuration.
• Message Source
Shows:
• The Program that generated the message
• View message source fields
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 234
PI System Management Tools
Message Logs tool
3. In the table, view a list of messages in the selected file, ordered by the Time that the message was sent and
the Program that generated the message.
By default:
• The oldest timestamp in the log file is the start time of the display, and the newest timestamp in the log
file is the end time of the display.
• All text filters are set to *, to show everything without filtering. However, if you specify a filter before
opening the file, the tool applies that filter to the displayed messages.
4. Select a message in the table to view information about the message in the details pane.
Note: Alternatively, you can double-click the message to open the Message Detail dialog box, which shows
the same information as the details pane.
Details include:
• The Message box, which shows the text in the message.
• The Message details tab, which shows information about the time and source of the message, as well as
the Data Archive server, if appropriate.
• The Identity tab, which shows information about the originating identity and the process identity.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 235
PI System Management Tools
Message Logs tool
• LOG files are present on client nodes in the default location (..\PIPC\Dat subfolder), or the user specified
location, if a pipc.ini file is found on the local computer
• DAT files belong to the Data Archive or PI SDK and are present on server nodes (..\PI\Log subfolder)
• TXT, XML and CSV formats generated by PIPC.LOG, pigetmsg, or exported from the Message Logs tool.
Export messages
These file formats are supported for export:
• XML (XML)
• Text (TXT)
• Comma-Separated Value (CSV)
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 236
PI System Management Tools
Message Logs tool
• XML
• Text
• Comma-Separated Value (CSV)
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 237
PI System Management Tools
Message Logs tool
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 238
PI System Management Tools
Module Database Editor
• The root level shows the connected Data Archive servers. Each Data Archive server contains one Module
Database.
• Each Data Archive server may have two types of branches: PI heading sets and PI modules. Each PI module
can be associated with a PI heading set and a corresponding PI heading.
Note: Heading set and heading objects are not migrated to AF, and AF elements are not assigned a PI
heading even if the corresponding PI module references a PI heading.
If you don't see all expected objects, right-click in a blank space around the Module Database tree and click
Show, then click additional data types you want to display (for example, Properties or Headings).
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 239
PI System Management Tools
Module Database Editor
Heading Sets
The HeadingSets branch contains PI heading sets, which contain PI headings. PI headings are used to promote
common naming conventions for modules, for example, equipment. They can also be associated with sub-
batches in the PI Batch Database.
For example, a PI heading object may be used to categorize a sub-batch, such as a Phase, or a position in a plant
layout, such as a Line.
Each PI heading has two attributes: Description and Level. Description is a text string and Level is an integer. PI
headings are for descriptive or informational purposes only, and no hierarchical rules are enforced.
Modules
The Modules branch contains top level PI modules. PI modules can represent various types of information. For
example, a module could be used to group PI points that are related to a particular control loop, or PI points
used to calculate yield efficiency. Each PI module may contain:
• Child modules
• PIUnits , a special type of PI module specifically used for batch tracking
• Optional Aliases, , used to associate common names with PI points
• Optional Properties , which store information related to a module
Modules and Properties can be expanded to show individual items. Below is an example of a Module Database
tree containing heading sets, headings, modules, aliases, and properties.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 240
PI System Management Tools
Module Database Editor
You can update the view by right-clicking in a blank space around the Module Database tree and then clicking
Refresh or Reset. Refresh updates the view as currently shown, including any expanded objects. Reset collapses
the tree to the top level (servers) and updates the view.
Keyboard Commands
As an alternative to the mouse, you can use the following keyboard commands to work with the Module
Database tree.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 241
PI System Management Tools
Module Database Editor
Invoke menu Alt F10, Menu key Invokes the context menu for the
selected object.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 242
PI System Management Tools
Module Database Editor
• When a copied entity represents a collection of modules, PIUnits, aliases or properties, all items in the
collection are copied to the clipboard.
• To paste a copied entity below it, right-click the entity in the target database.
• Pasting an entity with a duplicate name prompts you to confirm the replacement of the existing entity.
• Pasting a heading into a set with a heading of the same level number prompts you to confirm the
reassignment to a different level.
• Module links are maintained in all cases. Pasting a linked module creates a new copy of the module.
• Hierarchical relationships are maintained. You cannot make a parent a child of any of its children.
• Modules can be copied, but you cannot insert or link modules between servers.
• Module links are maintained within branches that are copied.
• Heading sets and headings are automatically created on the target server if headings of copied modules do
not exist. If local headings with the same name already exist on the target server, they are used even if their
heading level is different.
• To copy an object and its value without the tree structure, drag the object to a new location.
• To copy the entire tree branch structure, press and hold CTRL and drag. To copy values as well, press
CTRL+ALT.
• To move the tree branch structure, press and hold SHIFT and drag. To copy values as well, press SHIFT+ALT.
• To insert and link a module, Press and hold ALT and drag.
• To show options for copying and moving, right-click and drag.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 243
PI System Management Tools
Module Database Editor
Copy Copy the selected item and its associated values, but
not child items
Paste Values Paste only the item and associated values (the item's
effective dates), and not child items
Paste Value Hierarchy Paste the item, child items, and associated values
(effective dates)
Insert Link Insert a link to the copied item below the selected
item
Delete Delete the item. If the item is linked, all instances are
deleted from the module database.
View All Parents View all parent relationships for a selected linked item
Make Root Node Create a link to the item making it the root node for
the current server
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 244
PI System Management Tools
Module Database Editor
1. Right-click the object in the tree, and then click Edit to open the Edit/View dialog box for the selected object.
2. Next to the Access Rights field, click to open the Edit/View Security Attributes dialog box. This dialog
box is different for different versions of Data Archive:
• For Data Archive versions 3.4.380 and later it shows the list of identities/users/groups that have defined
access permissions for the selected object. Select an identity, user, or group to see its access
permissions. You can add or remove identities, users, and groups using the Add and Remove buttons.
• PI Server versions earlier than 3.4.380 use the owner/group/world model for access permissions. Each
object can have an owner, which must be a PI user and a group, which must be a PI group. You can set
access permissions for the owner, access permissions for the group, and the access for everyone else
(called world access). You can also change the owner or group assigned to that object.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 245
PI System Management Tools
Module Database Editor
The following table lists Data Archive access permissions required for module-related tasks.
Modules: Edit – Link / Unlink PIModules (r) new parent module (r*,w)
module (r*,w)
• Modules
• Aliases
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 246
PI System Management Tools
Module Database Editor
• PIUnits
• Properties
• Headings
• Heading Sets
Users who add or modify PI Module Databases and Module Database objects require read/write permissions to
the Database Security entries PIHeadingSets and PIModules (see Set security attributes). To update these
Database Security entries, use the Database Security tool in PI System Management Tools.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 247
PI System Management Tools
Module Database Editor
Set user access permissions for the module. (See Set security attributes.)
3. Click OK.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 248
PI System Management Tools
Module Database Editor
3. Click OK.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 249
PI System Management Tools
Module Database Editor
2. Select an existing Data Type for the property value, or enter one directly in the field. Array types are denoted
by square brackets [] following the data type name.
3. Enter a value for the property using the provided tools (not all tools are available for all data types):
a. Enter a value in the field for property types that take a single value.
For information about array types, see the next step.
b. Click Browse to select an entity from the module database as a property value for PIModule,
PIProperty, PIAlias and PIHeading data types.
c. Click Edit to update attributes of the referenced property.
d. Use the controls to the right of the value panel to size an array for array data types and then use the
value panel to enter array values separately.
e. Click OK to save property values as entered.
Note: For objects and other non-displayable data types, the data type name appears in the value field.
4. Array controls (LBound, Elems) are enabled when you select an array data type, which is shown in the list
followed by square brackets []. For array data types only:
a. Set LBound and Elems values to set the lower boundary and number of elements, respectively.
b. Click Resize Array to create the array in the value panel.
c. To define the contents of the array, select a placeholder in the panel, then enter a value in the field and
click Update. Use the Add and Delete buttons to add and remove selected array values or placeholders.
5. Click OK.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 250
PI System Management Tools
Module Database Editor
5. Click OK.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 251
PI System Management Tools
Module Database Editor
Heading attributes include the heading level and name, which must be unique within a heading set, as well as
the heading level, description, and access rights.
Note: You can also add or edit headings while editing a heading set. See Add or edit heading set
attributes for details.
2. Use the Edit/View PIHeading Attributes dialog box to update the heading.
• Heading Name
Enter or edit the name of the heading node.
• Levels
Specify the hierarchical level of the heading node.
• Description
Enter a contextual description for the heading.
• Access Rights
Click Edit to update user access permissions to the heading. See Add or edit heading set attributes for
details.
3. Click OK.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 252
PI System Management Tools
Network Manager Statistics
Statistics in PI SMT
The following statistics may appear in the Network Manager Statistics list depending on the version numbers of
connected servers and the availability of the information from the parent Data Archive server:
Field Description
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 253
PI System Management Tools
Network Manager Statistics
LastCall The timestamp for the time that the connection made
its last call to the server
PeerPort The port being used by the remote process for the
connection to the PI Network Manager; this
information is especially useful when troubleshooting
firewalls and network routing
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 254
PI System Management Tools
Network Manager Statistics
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 255
PI System Management Tools
Network Manager Statistics
• Display PI Services
• Display PI Server Applications
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 256
PI System Management Tools
Performance Counters tool
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 257
PI System Management Tools
Performance Counters tool
4. Optional: Enter a prefix for the point names in the Point Name Prefix text box.
This option allows you to add a prefix string to all point names that you create. If you change the Point Name
Prefix while points are in the Build Tags tab, the tag names of those points change accordingly.
Note: When an existing server is selected, you cannot change the point source or interface instance, and the
Performance Counters tool selects a scan rate from the available scan rates configured for the interface.
To perform a variety of tasks related to clearing, checking, and highlighting entries, right-click a performance
counter in the Tag Preview pane and select the appropriate task from the drop-down list.
Use the PI Builder application to build Performance Monitor points if you want to perform complicated tag
manipulations, such as renaming or making other point attribute changes.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 258
PI System Management Tools
Performance Counters tool
1. Select the point or points you want to edit in the pane on the right side of the Build Tags tab, and then right-
click and select Properties.
All points, except string and digital state points, are displayed on the General tab in the Properties dialog
box.
2. Click the Advanced tab to view all of the point attributes.
The point attributes that are different among the selected tags are highlighted.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 259
PI System Management Tools
Performance Counters tool
3. To see the value of a selected point attribute for each of the points, right-click the attribute, such as Typical
Value, and select Details.
4. Optional: To change the values displayed in the Point Attribute Values for <attribute> dialog box, select
Change Value and change the values in one of the following ways:
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 260
PI System Management Tools
Performance Counters tool
• Select To Selected Value. Select one of the attribute values displayed. The selected value is applied to all
the tags in the list.
• Enter a new attribute value in To Other Value. The value you entered is applied to all the tags in the list.
Note: To leave the values unchanged, select Do not change.
5. Click OK to close the dialog box and enter your change into the Advanced tab of the Properties dialog box.
6. Click Apply or OK in the Properties dialog box to propagate the change to the selected points.
If necessary, you can use the Performance Counters tool to rename the Performance Monitor points.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 261
PI System Management Tools
Performance Counters tool
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 262
PI System Management Tools
Performance Counters tool
A digital state on the Data Archive server. This field is active only if Digital Point? is selected.
• Display Digits
An optional number of display digits to determine the display precision of point values.
• Convers
• Step
See Step.
• Shutdown
See Shutdown.
4. Use one of two options to save your changes:
• To save changes to the template and apply the changes to the selected points, click Save.
• To apply changes to the selected points, but not save the changes to the template, click Apply.
Deviation
Exception and compression deviation algorithms can be used to filter erroneous and redundant data before it is
recorded in the archive.
Note: By default, future PI points have excmin, excmax and excdev turned off (set to 0).
Each algorithm is based on three specifications:
Compression deviation
Once events are sent to the PI Snapshot subsystem, a compression algorithm can further filter data and reduce
storage to only significant values as they are moved into the archive. An event is recorded:
• After a specified minimum duration of time since the previous event, if it exceeds a specified deviation in
value from that event.
• After a specified maximum duration of time since the previous event.
• When activated, compression reporting filters events and stores only periodic values (including duplicates),
unless an event represents a significant change in the short-term trend of values.
To turn off compression and archive every event that passes exception reporting, disable the Compressing
attribute.
Compression Deviation — Enter the deviation in value required to record an event, either as a number of
engineering units, or as a percentage of the point's Span value.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 263
PI System Management Tools
Performance Counters tool
For most flows, pressures, and levels, use a deviation specification of 1 or 2 percent of Span. For temperatures,
the deviation should usually be 1 or 2 degrees.
Min Time —Enter the minimum time that must elapse after an event before a compressed value can be
recorded. The minimum time should be set to 0 if exception reporting is activated for the same point.
Max Time — Enter the maximum time that can elapse after an event before automatically recording the next
event as a compressed value. The recommended maximum time is one work shift (for example, 8 hours). If this
value is too low, the compression effects are too limited to save significant archive space. If this value is too high,
useful data may be lost. Events that reach the Data Archive server in asynchronous order bypass the
compression calculation and are automatically recorded to the archive.
The compression specifications consist of a deviation (CompDev), a minimum time (CompMin), and a maximum
time (CompMax).
Events are also archived if the elapsed time is greater than the maximum time. Duplicate values will be archived
if the elapsed time exceeds CompMax. Under no circumstances does this cause Data Archive to generate events;
it only filters events that are externally generated.
The most important compression specification is the deviation, CompDev. For non-numeric tags, CompDev and
CompDevPercent are ignored. They will be displayed by applications as zero.
Note: CompDev specifies the compression deviation in engineering units; CompDevPercent specifies the
compression deviation in percent of Span. If you change one, the other is automatically changed to be
compatible. If you try to change both at once, CompDevPercent takes precedence.
Exception deviation
Exception reporting is used to define the precision of a data stream, and the amount of deviation that
constitutes a significant change. Most interface programs can execute an exception-reporting algorithm to
determine when to send a point value to the PI Snapshot subsystem. An exception is an event that occurs either:
• After a specified minimum duration of time since the previous event, while exceeding a specified deviation in
value from that event.
• After a specified maximum duration of time since the previous event.
This means that when activated, exception reporting filters events and stores only periodic values, including
duplicates, unless an event represents a significant change in the short-term trend of values. An exception event,
both timestamp and value, is sent with the previous event to the Snapshot.
• Exception Deviation
The deviation in value required to store an event, either as a number of engineering units, or as a percentage
of the point's Span value. The exception deviation should be less than the compression deviation by at least
a factor of 2, and is ignored for digital, string and BLOB data type points.
• Min Time
The minimum time that must elapse after an event before an exception value can be stored.
• Max Time
The maximum time that can elapse after an event before automatically storing the next event as an
exception value.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 264
PI System Management Tools
Performance Counters tool
Set the minimum and maximum time values to 0 to turn off exception reporting.
Step
Enable the Step attribute to treat archived point values as discrete units that would appear stepped on a chart.
An archived value is assumed constant until the next archived value, and adjacent archived values are not
interpolated. For example:
Disable Step to treat archived point values as a continuous signal, and linearly interpolate adjacent values. For
example:
The Step attribute also affects compression calculations. When enabled, a linear change of value greater or equal
to the compression deviation allows the point to pass compression.
The Step attribute is relevant only to numeric points. In general, data from continuous signals such as
thermocouples and flow meters should be archived without stepping. Data from discrete measurements such as
lab data and batch charge weight should be stepped.
To access the Step attribute setting:
1. Open PI SMT.
2. Navigate to Points > Point Builder.
3. Search for and select the point for which you would like to check the step attribute.
4. In the Archive tab, you can view/change the step attribute.
Shutdown
Use the Shutdown attribute to determine whether shutdown events are written. The timestamp of Shutdown
events normally represents the actual shutdown time of the Data Archive server as recorded by the Snapshot
Subsystem.
Beginning with PI Server PR1 SP1, shutdown events for most points are disabled. Unless you configure points to
receive shutdown events, only test points such as sinusoid and sinusoidu will receive shutdown events.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 265
PI System Management Tools
Performance Counters tool
• Enable Shutdown to record server shutdown events as point values with the timestamp of the server
shutdown. If data is collected on the Data Archive server, shutdown events are helpful to clearly indicate
gaps in data collection.
• Disable Shutdown when point data is collected on a distributed collection nodes, as buffering services
collect, manage and retain the data until the server is up and running again. Disabled Shutdown PI points
have a configurable attribute to determine whether shutdown events are written.
Note: The default behavior of Data Archive is to write the SHUTDOWN digital state to all PI points when Data
Archive is started. The timestamp that is used for the SHUTDOWN events is usually updated every 15
minutes, which means that the timestamp for the SHUTDOWN events will be accurate to within 15 minutes
in the event of a power failure.
Compression
Enable compression to apply compression algorithms and save only event values that indicate a change in point
value. When disabled, all values collected and sent to the snapshot, including redundant values, are saved in the
PI archive.
Note: By default, future PI points have compression turned off (set to 0).
Enable compression for all real-time points. Digital, BLOB and string data type values pass through compression
only when the value changes. Compression is typically turned off for points that collect sample data, such as lab
data, or other sparse data streams.
To remove the selected template from the Template Management pane, click the Unload button.
• Every time you build a point the Lookup Table or Substitution Table is scanned.
• If any of the strings in the lookup table exist in the Original Name field for the point you are creating, they
are replaced with the New Name for that string.
• To configure the entries of the table, click See Table on the Tag Settings tab.
• If you do not want to use the Lookup Table, uncheck the box Use tag name substitution table? on the Tag
Settings tab.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 266
PI System Management Tools
Performance Equations
Performance Equations
Use the Performance Equations tool to create and maintain PI Performance Equation (PE) calculations. These
calculations allow you to use PI System data to program complex calculations such as the sum of two flows, the
difference between two temperatures, and the simple mass balance on a process unit.
PE calculations can be used in other calculations, graphed in trend displays, and included in reports. These real-
time calculations are generated by the Performance Equations Subsystem.
You can also use the Performance Equations tool to build and maintain the PI points you use to store data from
the results of PE calculations. PI points that use PE calculations are known as PE points.
Note: Future PI points cannot be used as output, input, or trigger tags in Performance Equations.
• The Data Archive server that stores the Performance Equation (PE)
• The point source for the PI point that uses the PE
• The name of the PI point that uses the PE
• the PE point calculation logic, shown in the Extended Descriptor field
Note: By default, Data Archive assigns C as the Point Source for PE Points.
Create a PE point
1. Select the Performance Equations tool.
2. Enter point attributes on the General tab. See Enter general point attributes.
3. Define a PE calculation on the Calculation tab. See Define a PE calculation
4. Schedule the PE calculation on the Scheduling tab. See Schedule a PE calculation.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 267
PI System Management Tools
Performance Equations
• Name
Enter a point name.
Note: The name text appears blue if the point does not exist on the selected Data Archive server. The text
appears black if the point exists, or a server is not selected, preventing validation.
• PI Server
Select a Data Archive from the list of connected servers in the Collectives and Servers pane.
• Descriptor
Enter an optional description of the point to describe the underlying intention or performance equation
used.
• Point Class
For PE points, the point class is a read-only field set to classic.
• Point Source
Select the correct point source.
The point source should correspond to the Performance Equation Scheduler instance that the point belongs
to.
Multiple instances of the PE Scheduler can be created, registered with PI Interface Configuration Utility (PI
ICU), and read from the Module Database. If no instances are registered with PI ICU, the default point source
used by the Scheduler is C.
• Point Type
Select the point type for the point. A Performance Equation can use Point Types Digital, Float64, Float32,
Int32, Int16 and String.
• Digital Set
Choose a digital set from the Data Archive. This menu is activated only if the selected Point Type is Digital.
The System digital set is otherwise used.
• Engineering Units (Eng Units)
Optional: Enter engineering units to describe the default unit of measurement for the point.
• Display Digits
Enter an optional number of display digits to determine the display precision of point values.
• Extended Descriptor (Exdesc)
For PE points, this field is read-only and displays the PE point calculation logic.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 268
PI System Management Tools
Performance Equations
Define a PE calculation
When you define a PE calculation, use the single- and double-quotes as indicated. For a complete guide to PE
syntax, see the Data Archive Applications User Guide, available at the OSIsoft Technical Support website: OSIsoft
Customer Portal Contact Us page.
Equation fields
• Event Tag
For event-based calculations, the event tag appears in the read-only Event tag field.
• Equation
Enter an equation using PI Performance Equation syntax:
Enter point names in single quotes. For example, to simply add the current value of the sinusoid point to the
current value of the ba:level.1 point:
Enter timestamps in single quotes. To calculate the total time during the past hour where the sinusoid point
had a value between 30 and 70:
To calculate the time-weighted average value of the sinusoid point for the last hour:
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 269
PI System Management Tools
Performance Equations
Calculation expressions longer than 300 characters are difficult to work with. If longer expressions are
required, consider breaking down an equation into parts handled by individual PE points, and then use those
points in equations for other points.
Note: It is important that you use scan class offsets to schedule point calculations in the correct order.
• Evaluate
Click Evaluate to test an equation. If evaluation is disabled, be sure a Data Archive server is selected on the
General tab.
• Snapshot
Click Evaluate to test an equation. If evaluation is disabled, be sure a Data Archive server is selected on the
General tab.
See also:
• Event-based scheduling
• Schedule a PE calculation
• Scan class offsets
Schedule a PE calculation
Two types of scheduling are available to calculate PE point values.
Event-based scheduling
Event-based scheduling triggers calculations when a specified point is updated with a new event value (based on
snapshot events).
• Event Tag
Enter the name of a PI point to act as the trigger tag for calculation, or click to search for tags on the
Data Archive server. The event tag must be selected from the same server as the PE point being created.
Whenever the event tag receives a new value, the PE subsystem performs a calculation and updates the
value of the PE point. For example, you might want a calculation performed whenever the point sinusoid
gets a new value.
• Set timestamp of resulting expression to
Select one of two options to determine the source of the timestamp associated with each calculated PE
value. In both cases the expression is computed based on current snapshot values:
• Set the PE point timestamp to the time at which the expression is evaluated.
• Set the PE point timestamp to match the time of the triggering event.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 270
PI System Management Tools
Performance Equations
Clock scheduling
Clock scheduling uses scan classes to calculate values at regular intervals, such as every hour, five seconds, or 20
minutes.
• Scan Class
Choose a scan class to schedule calculations based on the scan frequency of an available scan class.
Note: All available scan classes are listed in the Scan Class menu. If the menu does not appear, make sure the
pipeschd.bat file is registered in the PI Interface Configuration Utility (ICU).
• Start Time field
Specify an optional initial start time and offset for the calculation interval. For equations that use more than
one point, use scan class offsets to perform calculations in a specific order.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 271
PI System Management Tools
Performance Equations
Note: *Scheduling is synchronized with UTC means that the scan occurs based on the count of UTC seconds. To
clarify, if you implement the scan class 02:00:00,13:00:00,U what will happen is at 1 PM clock time of your PI
Server time the first scan will occur. It will then scan every 2 hours according to UTC seconds passed, not the
difference between the last scan time and the current clock time.
Here is an example scan class:
This scan class uses the hh:mm:ss format and specifies a period, offset, and UTC time.
When you specify a scan class in the ICU, you can use any of the following formats:
ss
ss,ss
hh:mm:ss
hh:mm:ss,hh:mm:ss
hh:mm:ss,hh:mm:ss,t
where hh is hours, ss is seconds, mm is minutes, and t is either a U (for UTC Time) or an L (for Local Time).
Note: In PI ICU, scan class specifications cannot contain spaces.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 272
PI System Management Tools
Performance Equations
For example, points A, B, and C each represent PE points. Point C is calculated as A divided by B, so point C
should be calculated after points A and B. If A = Sinusoid and B = Sinusoid + 1, then C = Sinusoid/ Sinusoid + 1.
Since all three points have the same scan class, the one second delay is needed to ensure that the data has had
time to update, thus preventing old data from being used.
The following table shows the syntax to calculate points A and B every hour on the hour, and point C one second
later:
A TagVal('sinusoid') /f=01:00:00,01:00:00
B TagVal('sinusoid')+1 /f=01:00:00,01:00:00
• Typical Value
Enter a reasonable sample value for the point. For a numeric tag, a typical value must be greater than or
equal to the Zero, and less than or equal to the Zero plus the Span.
• Zero
Enter the lowest possible value for the point, as the bottom of the range used for scaling float16 values and
trends. Recorded values lower than the Zero value are recorded in the Data Archive server with the digital
state Under Range.
A Zero value is required for numeric data type points, but not for non-numeric points. The instrument zero is
a logical zero value, and certain interfaces require that Zero and Span values match the instrument system
range. See your interface documentation for details.
• Span
Enter the maximum difference between the top and bottom of the point range, as a positive value. The Span
value is used for scaling float16 values and trends and is required only for numeric data type points.
Recorded values above the sum of the Zero and Span values are recorded in the Data Archive server with the
digital state Over Range.
• Scan
Enable Scan if an interface that supplies data to the point requires a scan flag. Interfaces that require a scan
flag do not update points when the flag is disabled. See your interface documentation for Scan attribute
requirements.
• Archiving
Enable Archiving to store point values in the Data Archive server.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 273
PI System Management Tools
Performance Equations
Step
Enable the Step attribute to treat archived point values as discrete units that would appear stepped on a chart.
An archived value is assumed constant until the next archived value, and adjacent archived values are not
interpolated. For example:
Disable Step to treat archived point values as a continuous signal, and linearly interpolate adjacent values. For
example:
The Step attribute also affects compression calculations. When enabled, a linear change of value greater or equal
to the compression deviation allows the point to pass compression.
The Step attribute is relevant only to numeric points. In general, data from continuous signals such as
thermocouples and flow meters should be archived without stepping. Data from discrete measurements such as
lab data and batch charge weight should be stepped.
To access the Step attribute setting:
1. Open PI SMT.
2. Navigate to Points > Point Builder.
3. Search for and select the point for which you would like to check the step attribute.
4. In the Archive tab, you can view/change the step attribute.
Shutdown
Use the Shutdown attribute to determine whether shutdown events are written. The timestamp of Shutdown
events normally represents the actual shutdown time of the Data Archive server as recorded by the Snapshot
Subsystem.
Beginning with PI Server PR1 SP1, shutdown events for most points are disabled. Unless you configure points to
receive shutdown events, only test points such as sinusoid and sinusoidu will receive shutdown events.
• Enable Shutdown to record server shutdown events as point values with the timestamp of the server
shutdown. If data is collected on the Data Archive server, shutdown events are helpful to clearly indicate
gaps in data collection.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 274
PI System Management Tools
Performance Equations
• Disable Shutdown when point data is collected on a distributed collection nodes, as buffering services
collect, manage and retain the data until the server is up and running again. Disabled Shutdown PI points
have a configurable attribute to determine whether shutdown events are written.
Note: The default behavior of Data Archive is to write the SHUTDOWN digital state to all PI points when Data
Archive is started. The timestamp that is used for the SHUTDOWN events is usually updated every 15
minutes, which means that the timestamp for the SHUTDOWN events will be accurate to within 15 minutes
in the event of a power failure.
Compression
Enable compression to apply compression algorithms and save only event values that indicate a change in point
value. When disabled, all values collected and sent to the snapshot, including redundant values, are saved in the
PI archive.
Note: By default, future PI points have compression turned off (set to 0).
Enable compression for all real-time points. Digital, BLOB and string data type values pass through compression
only when the value changes. Compression is typically turned off for points that collect sample data, such as lab
data, or other sparse data streams.
Deviation
Exception and compression deviation algorithms can be used to filter erroneous and redundant data before it is
recorded in the archive.
Note: By default, future PI points have excmin, excmax and excdev turned off (set to 0).
Each algorithm is based on three specifications:
Compression deviation
Once events are sent to the PI Snapshot subsystem, a compression algorithm can further filter data and reduce
storage to only significant values as they are moved into the archive. An event is recorded:
• After a specified minimum duration of time since the previous event, if it exceeds a specified deviation in
value from that event.
• After a specified maximum duration of time since the previous event.
• When activated, compression reporting filters events and stores only periodic values (including duplicates),
unless an event represents a significant change in the short-term trend of values.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 275
PI System Management Tools
Performance Equations
To turn off compression and archive every event that passes exception reporting, disable the Compressing
attribute.
Compression Deviation — Enter the deviation in value required to record an event, either as a number of
engineering units, or as a percentage of the point's Span value.
For most flows, pressures, and levels, use a deviation specification of 1 or 2 percent of Span. For temperatures,
the deviation should usually be 1 or 2 degrees.
Min Time —Enter the minimum time that must elapse after an event before a compressed value can be
recorded. The minimum time should be set to 0 if exception reporting is activated for the same point.
Max Time — Enter the maximum time that can elapse after an event before automatically recording the next
event as a compressed value. The recommended maximum time is one work shift (for example, 8 hours). If this
value is too low, the compression effects are too limited to save significant archive space. If this value is too high,
useful data may be lost. Events that reach the Data Archive server in asynchronous order bypass the
compression calculation and are automatically recorded to the archive.
The compression specifications consist of a deviation (CompDev), a minimum time (CompMin), and a maximum
time (CompMax).
Events are also archived if the elapsed time is greater than the maximum time. Duplicate values will be archived
if the elapsed time exceeds CompMax. Under no circumstances does this cause Data Archive to generate events;
it only filters events that are externally generated.
The most important compression specification is the deviation, CompDev. For non-numeric tags, CompDev and
CompDevPercent are ignored. They will be displayed by applications as zero.
Note: CompDev specifies the compression deviation in engineering units; CompDevPercent specifies the
compression deviation in percent of Span. If you change one, the other is automatically changed to be
compatible. If you try to change both at once, CompDevPercent takes precedence.
Exception deviation
Exception reporting is used to define the precision of a data stream, and the amount of deviation that
constitutes a significant change. Most interface programs can execute an exception-reporting algorithm to
determine when to send a point value to the PI Snapshot subsystem. An exception is an event that occurs either:
• After a specified minimum duration of time since the previous event, while exceeding a specified deviation in
value from that event.
• After a specified maximum duration of time since the previous event.
This means that when activated, exception reporting filters events and stores only periodic values, including
duplicates, unless an event represents a significant change in the short-term trend of values. An exception event,
both timestamp and value, is sent with the previous event to the Snapshot.
• Exception Deviation
The deviation in value required to store an event, either as a number of engineering units, or as a percentage
of the point's Span value. The exception deviation should be less than the compression deviation by at least
a factor of 2, and is ignored for digital, string and BLOB data type points.
• Min Time
The minimum time that must elapse after an event before an exception value can be stored.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 276
PI System Management Tools
Performance Equations
• Max Time
The maximum time that can elapse after an event before automatically storing the next event as an
exception value.
Set the minimum and maximum time values to 0 to turn off exception reporting.
• For a Data Archive versions 3.4.380 or later, the Data Access and Point Access lists specify the PI identities
that are granted access to the PE point's data and configuration, respectively.
Click Add or Remove to update the PI identities lists for PI Totalizer and select or clear the Read and Write
check boxes to update the permissions associated with each PI identity.
• For a PI Server versions 3.4.375 or earlier, the Security tab displays Data Access and Point Access settings for
the PE point. The user and groups available for access assignments are determined by the Data Archive
connection specified on the General tab.
Use the menus to specify permission levels for each user and group account such that only the correct
individuals can use or edit PE point settings.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 277
PI System Management Tools
Performance Equations
• Location1 (ID)
Enter an ID for the point. The point ID is referenced by PE Scheduler instances that use the point source, and
the PI Recalculator module. The Recalculator adjusts PE point values automatically when the underlying PI
point values are changed by another application, or out-of-order values are received by the snapshot.
Rename PE points
1. Under Collectives and Servers, select the server or collective.
2. In the System Management Tools pane, select Points > Performance Equations.
3. Select the point in the Performance Equations tool, right-click, and choose Rename.
4. Enter a name in the New name field and click OK.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 278
PI System Management Tools
Performance Equations
Note: If an error occurs with the rename, OK is disabled and a appears. Hover your cursor over it to view
the error message.
• To create calculated points that have the PE subsystem as their source. The PE subsystem determines the
value of these points by performing a PE calculation that the user specifies when creating the calculated
point. You can use PI SMT to create calculated points (Points > Performance Equations).
• To add calculations programmatically, through PI SDK or PI DataLink and PI ProcessBook client applications.
For more information on these products, refer to the documentation included with each.
For detailed information regarding the PE functions, see Alphabetical reference for PE functions.
Note: Client applications may not support all existing PI performance equations offered by the PE Subsystem.
For more information, see the OSIsoft Knowledge Base article PI Performance Equation (PE) Tips and Tricks.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 279
PI System Management Tools
Performance Equations
You can construct more complex performance equation expressions, just as you can in arithmetic. The PE
Scheduler performs most operations in the same order as they would be performed in a mathematical
expression.
Use parentheses to group together expressions you want to evaluate first.
The following example evaluates as the sum of the values of 'TagA' and 'TagB', divided by the difference of 3
minus 'TagC':
('TagA' + 'TagB')/(3 - 'TagC')
This next example is TagA divided by the sum of TagA and TagB:
'TagA'/('TagA' + 'TagB')
This next example is 3 plus the product of 7 and the square root of TagD:
3 + (7 * Sqr('TagD'))
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 280
PI System Management Tools
Performance Equations
Number operands
You can use numbers in performance equations. The PE Scheduler processes all numbers as floating point
numbers. Examples of numbers are:
3.14159
299792458
299792458.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 281
PI System Management Tools
Performance Equations
0.671
.671
6.71e-1
Note: The second and third examples are equal, as are the fourth, fifth, and sixth.
Tagname operands
You can use tagnames in performance equations to represent values from the Snapshot. You must put the
tagname in single quotes, unless you are using the tagname as a string, in which case you must enclose it in
double quotes. The PE Scheduler evaluates the tagname according to its use it in an expression: as a function
argument, or as a time expression.
Tagnames in expressions
If you use the tagname in a performance equation expression, the tagname is evaluated as that point's value at
the current time. For example:
3 + 'sinusoid'
is equal to the value of sinusoid at the current time (see note), plus three. The same value results from the
expression:
3 + TagVal('sinusoid', '*')
Note: The exception is when this expression is used in a PE point, the PE point is event-based, and the Location3
attribute is set to one.
Tagnames as function arguments
If you use the tagname as an argument in one of the performance equation built-in functions, then the
Performance Equation Scheduler evaluates the tagname according to the type of value expected by that
particular function.
For example, if the function expects a tagname, then the performance equation passes a tagname to the
function. If the function expects any other data type such as a string or a number, PE Scheduler gets the current
value of the point and passes that to the function—as whatever data type is expected.
For example, the Concat function expects two or more strings as arguments. It concatenates all the arguments
into a single string:
Concat('sinusoid', 'ba:level.1')
To evaluate this expression, the PE Scheduler takes the current value of the sinusoid point and the ba:level.1
point and passes these to the Concat function as strings. Concat then returns a string that is composed of the
value of the sinusoid point followed by the value of the ba:level.1 point. If the current values of these points are,
respectively, 85.329 and 30.478, Concat returns the following string:
85.32930.478
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 282
PI System Management Tools
Performance Equations
To the PE Scheduler, an expression within single quotes can correspond either to a time or a tagname. The PE
Scheduler treats expressions in single-quotes as tagnames for all the built-in functions that take a point as the
first argument (examples include TagVal, TagAvg, and AlmCondition).
In all other cases, the PE Scheduler first attempts to resolve the expression as a time. If the expression is not a
valid time, then the PE Scheduler tries to resolve it to a tagname. If the point does not exist, the subsystem
returns the error Calc Failed.
For example, TagVal('t-151d') returns the Snapshot value for the point t-151d, if it exists. However, the expression
t-151d returns the date corresponding to 151 days before today—because it is a valid time expression.
String operands
Strings are sequences of any printable characters. Strings are always enclosed in double-quotes. Some examples
are:
"This is a string"
"sinusoid"
"14-Dec-97"
Note: Character strings might look like tagnames or time expressions, as in the second and third examples above.
In some cases, the string in the third example might be interpreted as a time. The difference is that a character
string is enclosed in double quotes (for example, "string") while a tagname must be enclosed in single quotes (for
example, 'tagname') and a time expression may be enclosed in either single or double quotes.
Time as strings
You can also pass a time expression as a string to a function that expects a string. In this case, enclose the time
expression in double quotes, rather than single quotes.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 283
PI System Management Tools
Performance Equations
Arithmetic operators
Performance Equation operators include the following simple arithmetic operators:
Operator Meaning
+ Add
- Subtract
* Multiply
/ Divide
^ Raise to a power
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 284
PI System Management Tools
Performance Equations
• Timestamp
A date and time in the PI timestamp format. For example: 25-aug-02 12:00:00.
• Period
A number of seconds.
• Number
A numerical value.
The following table shows valid operations and results, where N represents a number, T represents an absolute
or combined time expression, and P represents a period.
T+N T '*' + 10
T-N T '*' - 10
- (prefix) -P P -('*'-'y')
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 285
PI System Management Tools
Performance Equations
Note: The timestamp returned is the result of T mod P or T mod N added to January 1, 1970 Universal
Coordinate Time (UTC). So depending on the time zone, different results are expected; in some case, even an
error value is returned. In PI for OpenVMS systems, the use of T mod P or T mod N returns P.
Relational operators
A relational operator returns a value of 0 for false or 1 for true. You can use these operators to compare
numbers, times, digital states, or character strings. With relational operators, you can compare bad values, or
values of different types without generating an error. The relational operators in performance equations are:
Operator Meaning
= Equal to
Time comparisons
You can perform all comparisons, including the in operator, on times.
'*+20m' >= '*+300s'
PrevEvent('tag1', '*') > PrevEvent('tag2', '*')
If a comparison is true, the result is 1; otherwise, it is 0.
Prefix operators
A prefix operator is simply an operator that appears to the left of its operand, for example, - x.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 286
PI System Management Tools
Performance Equations
Operator Meaning
- Negation
The expression following a prefix operator should be numeric. If you use a tagname as the operand, make sure
that the point returns a number. Note, too, that even points that typically return a number sometimes return a
digital state, such as Shutdown. Valid examples include:
-3
Not 7
-TagVal ('sinusoid')
Not Cos('ba:level.1')
-StateNo('DigitalTag')
Not TagBad('StringTag'))
The last two examples use digital and string points (DigitalTag and StringTag) but these are used as arguments to
functions that return numbers (StateNo and TagBad).
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 287
PI System Management Tools
Performance Equations
If-then-else expressions
The if-then-else operator is a compound operator whose operands are used as follows:
if expr0 then expr1 else expr2
where expr0, expr1, and expr2 are expressions. If expr0 is true (nonzero), this operator returns the value of
expr1; if expr0 is false (zero), it returns the value of expr2.
Here are some examples:
if 'tag1' > 50 then "overlimit" else "good"
if 'tag1'= 1 then Sin('tag2') else if 'tag1'= 2 then Cos('tag2') else Tan('tag2')
if 'tag3'<> "shutdown" then (if 'tag1' > 'tag2' then 'tag1' else 'tag2') else "error"
'*' + (if 'tag2' = 0 then 3600 else 0)
Note: You must include the if, the then, and the else. Nested operations are supported.
Operator priority
The PE Scheduler executes operators in order of priority, from highest to lowest. When multiple operators have
the same priority, the order of execution is either from left-to-right or right-to-left, depending on the operator, as
listed in the following table.
Post 8 L-R
^ 8 R-L
Not 7 R-L
UMINUS
) 6 L-R
( 6 R-L
* 5 L-R
/
mod
in .. in() 5 R-L
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 288
PI System Management Tools
Performance Equations
+ 4 L-R
-
> 3 L-R
>=
=
<>
<=
<
Else
And 2 L-R
Or 1 L-R
You can use parentheses to specify the order of calculation. Regardless of operator priority, operations within
parentheses are evaluated before operations outside those parentheses. For example:
(2 + 3) * 5 equals 25
while
2 + 3 * 5 equals 17
Data types
The PE Scheduler recognizes these data types:
• Number
• Character string
• Tagname
• Time
• Period
Every variable has one of these data types; every function returns one of these data types. The PE Scheduler
cannot typically use one data type where another is expected. For example, you cannot add two character
strings, or multiply two times together. Additionally, the built-in functions might require particular data types for
particular arguments.
Type checking
At compile time, the PE Scheduler checks type compatibility as far as is possible. This process catches some
errors, such as trying to add a number to a character string.
However, not all type compatibility errors can be detected at compile time. The expression
'sinusoid' / 2.0
works well if sinusoid has a numeric value. However, if sinusoid is equal to the digital state Shutdown the
expression returns an error (Calc Failed).
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 289
PI System Management Tools
Performance Equations
Note: Comparisons (expressions using relational operators) are an exception to this rule. Every comparison is
valid, regardless of its operand types.
Error values
When the PE Scheduler cannot perform a calculation during runtime, it returns the error value Calc Failed. Error
values propagate through most calculations. For example, an error value plus one is an error value. Exceptions to
this rule are:
To check for compile time errors on Windows-based computers, check the PI SDK logs.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 290
PI System Management Tools
Performance Equations
Each input line in turn is echoed and the evaluated result is displayed.
PE functions by type
Note: For more information on how PE functions help to perform calculations on PI data, see Alphabetical
reference for PE functions.
Math functions
Name Description
Cos Cosine
Exp Exponential
Sin Sine
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 291
PI System Management Tools
Performance Equations
Tan Tangent
Aggregate functions
Name Description
Avg Average
Max Maximum
Min Minimum
Total Sum
Miscellaneous functions
Name Description
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 292
PI System Management Tools
Performance Equations
Name Description
Name Description
Name Description
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 293
PI System Management Tools
Performance Equations
Name Description
Time functions
Name Description
Bonm Timestamp for first of the next month for given time
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 294
PI System Management Tools
Performance Equations
Name Description
Name Description
String functions
Name Description
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 295
PI System Management Tools
Performance Equations
Name Description
Syntax
Abs(x)
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 296
PI System Management Tools
Performance Equations
Arguments
x
Must be an integer or real number.
Returns
The absolute value of x.
Exceptions
If x is not an integer or real number, returns an error value.
Example
Abs(1)
Abs(-2.2)
Abs('tag1')
Abs('tag1'- 'tag2')
Syntax
Acos(x)
Arguments
x
Must be a real number between -1.0 and 1.0, inclusive.
Returns
The inverse cosine of x, in radians.
Exceptions
If x is not a number, or is less than -1.0 or greater than 1.0, returns an error value.
Example
Acos(-0.5) [Returns 2.0944]
Acos(0.75) [Returns 0.72273]
AlmAckStat
Return the acknowledgment status code for an alarm point.
Syntax
AlmAckStat(alm)
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 297
PI System Management Tools
Performance Equations
Arguments
alm
An alarm tagname.
Returns
The acknowledgement status code for the given Alarm State. Possible values are:
0 - acknowledged (or no alarm)
1 - unacknowledged
2 - missed alarm
Exceptions
If the argument is not a digital state tagname, an error condition is returned.
Example
AlmAckStat('alarmtag')
AlmCondition (page ), AlmCondText (page ), AlmPriority (page )
Syntax
AlmCondition(alm)
Arguments
alm
An alarm tagname.
Returns
The code number of the condition for the alarm tagname.
Exceptions
If the argument is not a digital state tagname, an error is returned.
Example
AlmCondition('alarmtag')
AlmAckStat (page ), AlmCondText (page ), AlmPriority (page )
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 298
PI System Management Tools
Performance Equations
Syntax
AlmCondText(alm)
Arguments
alm
An alarm tagname.
Returns
The condition text for the condition represented by the alarm status.
Exceptions
If the argument is not a digital state tagname, an error condition is returned.
Example
AlmCondText('alarmtag')
AlmAckStat (page ), AlmCondition (page ), AlmPriority (page )
Syntax
almPriority(alm)
Arguments
alm
A digital state value from a PI Alarm State Set.
Returns
The priority of the given alarm. Priorities are small positive integers. Priority 0 is an alarm that is never
unacknowledged.
Exceptions/Errors
If the argument is not from a valid Digital State Set for alarms, an error condition is returned.
Example
almPriority('alarmtag')
almpriority(digstate("__ Lolo"))
AlmAckStat (page ), AlmCondition (page ), AlmCondText (page )
Arma
Calculate dynamic response for Auto Regressive Moving average model as shown in Examples.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 299
PI System Management Tools
Performance Equations
Syntax
Arma(in, runflag, (a1, a2, … aN),(b0, b1, b2, … bN))
Arguments
The denominator and numerator coefficient series are enclosed in parenthesis with a comma between the two.
There must be only one more term (b0) in the numerator than denominator. Both in and runflag may be any
expression that evaluates to a number.
in
Must be an integer or real number.
runflag
Non-zero enables filter to run.
a1, a2, ...
Coefficients of past output terms.
b0, b1, b2 ...
Coefficients of the present and past input terms of the model.
Returns
The next output value in time series response to past and present input.
ut = a1 * ut-1 + a2 * ut-2 + … + an * ut-n + b0 * yt +
b1 * yt-1 + b2 * yt-2 + … + bn * yt-n
Where ut is model output at time t, now. ut-1 is output one sample interval in the past. yt is the input signal at
time t. If runFlag expression result is 0, the model is reset. Depending on the number of coefficients used, Arma
stores the inputs and outputs until an evaluation of the model is available. For example, in
Arma( 'input_tag', 1, ( 0. ,1), ( 1, -1 ,1))
Arma stores two previous values of the input and output. Hence when the point is first created, no good results
are returned until two prior values of the input are stored. From then on, the two most current previous values
are stored.
Exceptions
Arma gives different results depending on which type of scheduling is used. In scan class scheduling, the interval
between time series values depends on the scan class and gives values at evenly spaced time intervals.
Event-based scheduling is dependent on a trigger from another point. With event-based scheduling, Arma
sometimes gives results that are not trustworthy. Use Arma with event-based scheduling only:
Arma is intended for the PE Scheduler only. Use of Arma in client applications might produce unexpected results.
If the input point is not a real number or integer, Arma returns an error.
Example
Derivative: Arma('input_tag', 1, (0.), (1, -1))
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 300
PI System Management Tools
Performance Equations
Syntax
Ascii(s1)
Arguments
s1
Any expression evaluating to a string
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 301
PI System Management Tools
Performance Equations
Returns
The character code of the first character of the string
Exceptions
If the argument is not a string, an error value is returned
Example
Ascii("D") [Returns 68]
Ascii("Program") [Returns 80, the ASCII character code for the first letter of the
string]
Syntax
Asin(x)
Arguments
x
Must be a real number between -1.0 and 1.0, inclusive.
Returns
The inverse sine of x, in radians.
Exceptions
If x is not a number, or is less than -1.0 or greater than 1.0, returns an error value.
Example
Asin(-0.5) [Returns -0.5236]
Asin(TagVal('att1','y'))
Asin('att1')
Syntax
Atn(x)
Arguments
x
Must be an integer or real number
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 302
PI System Management Tools
Performance Equations
Returns
The inverse tangent of x, in radians.
Exceptions
Returns an error if x is not an integer or real number.
Example
Atn(1) [Returns 0.7854]
Atn(-2.2) [Returns -1.1442]
Atn('att1')
Atn('att1' - 'att2')
Syntax
Atn2(x, y)
Arguments
x
An integer or real number
y
A non-zero integer or real number
Returns
The inverse tangent in radians of the tangent value x/y.
Exceptions
Returns an error if x or y is not an integer or real number.
Example
Atn2(1,2) [Returns 0.46365]
Atn2('att1', 'att2')
Atn2(TagVal('att1','y'), TagVal('att2', 'y'))
Syntax
Avg (x1,[...])
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 303
PI System Management Tools
Performance Equations
Arguments
x1, [...]
May be numbers, times, or periods but all must be the same data type.
Returns
The average of the arguments. The result is the same data type as the operands.
Exceptions
Arguments whose run-time values are character strings or digital states are not included in the average. If all
values are character strings or digital states, Avg returns an error value.
Example
Avg(TagVal('tag1','y'),TagVal('tag2', 'y'),1,2)
• The average of the value of tag1 at time y, tag2 at time y, and the values 1 and 2.
Avg('y', 't', '14-Dec-97', '14 8:00')
• The average of four different time values.
Avg('tag1', 'tag2')
• The average of the current values of tag1 and tag2.
Syntax
Badval(x)
Arguments
x
A value to be tested.
Returns
1 if the value is bad
0 if the value is not bad
Exceptions
Returns 1 for blob points. Returns 0 for character strings.
Example
BadVal('tag1')
BadVal('digitaltag')
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 304
PI System Management Tools
Performance Equations
Syntax
Bod(t1)
Arguments
t1
A time expression, enclosed in single quotes
Returns
Timestamp for the start of the day
Exceptions
None
Notes
This function is useful for establishing a time at a unique clock time independent of the length of particular days.
Example
Bod('*')
Syntax
Bom(t1)
Arguments
t1
A time expression
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 305
PI System Management Tools
Performance Equations
Returns
Timestamp for the start of the month.
Exceptions
None
Notes
This function is useful for establishing a time at a unique clock time independent of the length of particular days.
Example
Bom('*')
Syntax
Bonm(t1)
Arguments
t1
Time expression, enclosed in single quotes
Returns
Timestamp for the start of the next month.
Exceptions
None
Notes
This function is useful for establishing a time at a unique clock time independent of the length of particular days.
Example
Bonm('*')
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 306
PI System Management Tools
Performance Equations
Char
Build a string from ASCII character codes.
Syntax
Char(x1, ... xn)
Arguments
• x1, ... xn
Integers
Returns
A string built from the 80 character codes
Exceptions
Returns an error if an argument is not a number
Example
• Char(80, 73)
[Returns "PI"]
• Char(65)
[Returns "A"]
• Char(5 * 10)
[Returns "2"]
Syntax
Compare(s1, s2 [,caseSensitive])
Arguments
s1, s2
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 307
PI System Management Tools
Performance Equations
Returns
1 if s1 = s2
0 otherwise
Exceptions
Wildcard characters in s1 are treated literally and not as wildcards.
Example
compare("What","what",True) = 0
compare("b","a") = 0
compare("What","wha?") = 1
compare("What","wh") = 0
Syntax
Concat(s1, s2[, ... sn])
Arguments
s1, s2, sn
Must be character strings, or expressions yielding character strings.
Returns
The character strings, concatenated together. This function does not insert blanks between its arguments. To
include a space in the concatenated string, add an argument consisting of a string that is a single space enclosed
in double quotes..
Note: Consider using Text, which is more general and more precise in many cases than Concat.
Example
Concat("shut", "down") = "shutdown"
Cos
Return the trigonometric cosine of an integer or real number.
Syntax
Cos(x)
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 308
PI System Management Tools
Performance Equations
Arguments
• x
Must be an integer or real number, which represents an angle in radians
Returns
The cosine of x
Exceptions
If x is not an integer or real number, returns an error value
Example
• Cos(1.1)
[Returns 0.4536]
• Cos(1)
[Returns 0.5403]
• Cos('att1')
[Return the trigonometric cosine of the value of 'att1' at trigger time]
Cosh
Return the hyperbolic cosine of a number.
Syntax
Cosh(x)
Arguments
• x
Must be an integer or real number
Returns
The hyperbolic cosine of x
Exceptions
If x is not an integer or real number, returns an error
Example
• Cosh(1)
[Returns 1.5431]
• Cosh(-1)
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 309
PI System Management Tools
Performance Equations
[Returns 1.5431]
• Cosh('att1')
[Return the hyperbolic cosine of the value of 'att1' at trigger time]
Syntax
Curve( x, (x1,y1) (x2,y2) … (xn,yn) )
Arguments
x
Expression evaluating to a number
x1, y1
The first point on the curve. The xi's and yi's are numeric constants evaluated at compile time. The values set for
xi's must be in ascending order.
Returns
Returns the y value on the curve corresponding to the value of x. Linear interpolation is used between points
defining the curve. If the value of x is less than x1 then y1 is returned and if it is greater than xn, yn is returned.
The points are assumed to be ordered in the x direction from smallest to largest.
Exceptions
If the value of x is not an integer or real number, an error value is returned
Example
Curve(3, (0,100) (100,0) )
• [Returns 97]
Curve('tag1', (25,25) (75,75) )
Day
Extract the day of the month from a time expression.
Syntax
Day(t1)
Arguments
• t1
time expression enclosed in single quotes
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 310
PI System Management Tools
Performance Equations
Returns
The day of the month of a time expression in the range 1 through 31
Exceptions
None
Example
• Day('*')
[Return what day of the month today is]
• Day('y')
[Return what day of the month yesterday was]
• Day(FindEq('att1', '-28d', '*', 50))
[Return what day of the month it was when the value of 'att1' was first equal to 50 in the past 28 days]
DaySec
Return the total time in seconds between the start of day (midnight) and the time denoted in the argument.
Syntax
DaySec(t1)
Arguments
• t1
A time expression, enclosed in single quotes
Returns
Total seconds since the start of day (midnight) till t1, in the range 0-86399
Exceptions
None
Example
• DaySec('*')
[Return the number of seconds from the start of day (midnight) until now]
Delay
Delay line, the output tracks the input. For use in real time calculations, in pipeschd.exe for example, this
function might be a better choice than PrevVal.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 311
PI System Management Tools
Performance Equations
Syntax
Delay( x, runflag, n )
Arguments
x
Must be an integer or real number.
runflag
Non-zero enables filter to run.
n
Length of the delay, integer.
Returns
The input signal delayed by n calculation intervals. For scan class scheduling, the calculation interval is based on
the scan class. For event based scheduling, the calculation interval is dependent on the trigger and the exception
deviation.
Exceptions
Delay is not supported in the pipetest utility or in PI DataLink. If the input point is not a real number or integer,
Delay returns an error. Delay returns Calc Failed until n scans have elapsed after startup.
Example
Delay('tag1',1,2)
Syntax
DigState(s1 [, x])
Arguments
s1
A character string representing a digital state.
x
(Optional) A digital point in which the character string represents a digital state. If omitted, all digital state sets,
starting with the system digital set, are searched for the given string.
Returns
An enumeration value. (For PI PE calculations, a digital state is returned.)
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 312
PI System Management Tools
Performance Equations
Exceptions
If the character string does not represent a digital state in the digital state set of the specified digital point, the
function returns Calc Failed. If digital point is omitted and character string does not represent a digital state in
any of the digital sets, Calc Failed is returned.
Example
DigState("digitalstring", 'digitaltag')
StateNo(DigState("digitalstring", 'digitaltag'))
Syntax
DigText(tagname)
Arguments
tagname
A tagname that represents a digital state variable.
Returns
The text for the digital state.
Exceptions
If the argument is not a digital state tagname, an error condition is returned.
Example
DigText('alarmtag')
DigText('cdm158' )
DigText('nondigitaltag') would not compile and returns an error message
Syntax
EventCount(tagname, starttime, endtime [, pctgood])
Arguments
tagname
A tagname, enclosed in single quotes. This point must represent a continuous variable.
starttime
A time expression representing the beginning of the time range to search.
endtime
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 313
PI System Management Tools
Performance Equations
A timestamp that is greater than starttime; the end of the time range to search.
Note: When endtime is a future time (such as '*+1h'), TagCount might include the system digital state No Data
and thus is larger than the number of events stored in the PI Archive. Avoid using a future time if possible.
pctgood
Optional. Minimum time percentage, over the given time range, that the point's archived values must be good.
Returns
Number of Archive events for the point within the specified interval.
Exceptions
If the point has no good values or the pctgood minimum is not reached for the given time range, returns an error
value.
Example
EventCount('tag1', 'y', '*')
EventCount('tag1', '14-Dec-97', '+1d',70)
EventCount('tag1', '14-Dec-97', '15-Dec-97')
Exp
Return the exponential of an integer or real number. This is the number ex, where e = 2.7182818...
Syntax
Exp(x)
Arguments
• x
Must be an integer or real number
Returns
The exponential of x
Exceptions
If x is not an integer or real number, returns an error value
Example
• Exp(11)
[Returns 59874]
• Exp('att1')
[Return the exponential of the value of 'att1' at trigger time]
• Exp(TagVal('att1','t'))
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 314
PI System Management Tools
Performance Equations
[Return the exponential of the value of 'att1' at the start of day (12am) today]
Syntax
FindEq(tagname, starttime, endtime, value)
Arguments
tagname
A tagname enclosed in single quotes.
starttime
A time expression representing the beginning of the time range to search Relative times are relative to endtime if
endtime is not itself a relative time.
endtime
A time expression representing the end of the time range to search. Relative times are relative to starttime if
starttime is not itself a relative expression. If endtime is earlier than starttime, the range is searched backwards.
value
Must be an integer or real number or digital state (character string), the value to search for.
Returns
The timestamp closest to starttime, within the given range, for which the point was equal to the given value.
Exceptions
If the point was never equal to the given value, FindEq returns an error value.
Notes
FindEq interpolates between Archive events, if necessary, to find the value it is looking for.
Example
FindEq('tag1', 't', '*', 40.0)
FindEq('digitaltag', '-1d', '*', TagVal('digitaltag', '14-Dec-97'))
FindEq('digitaltag', '14-Dec-97', '*', "On")
Syntax
FindGE(tagname, starttime, endtime, value)
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 315
PI System Management Tools
Performance Equations
Arguments
tagname
A tagname.
starttime
A time expression representing the beginning of the time range to search or a time relative to endtime, if
endtime is a time.
endtime
A time expression representing the end of the time range to or a time (in seconds) relative to starttime, if
starttime is a time. If endtime is earlier than starttime, the range is searched backwards.
value
Must be an integer or real number or digital state (character string), the value to search for.
Returns
The timestamp closest to starttime, within the given range, for which the point was greater than or equal to the
given value.
Exceptions
If the point was always less than the given value, FindGE returns an error value.
Notes
FindGE interpolates between archive events, if necessary, to find the value it is looking for.
Example
FindGE('tag1', 't', '*',40.0)
FindGE('digitaltag', '-1d', '*', TagVal('digitaltag', '14-Dec-97'))
FindGE('tag1', '-1d', '*','tag2')
Syntax
FindGT(tagname, starttime, endtime, value)
Arguments
tagname
A tagname.
starttime
A time expression representing the beginning of the time range to search. Can be a time relative to endtime if
endtime is a time.
endtime
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 316
PI System Management Tools
Performance Equations
End of the time range to search, time expression or time (in seconds) relative to starttime if starttime is a time. If
this time is earlier than starttime, the range is searched backwards.
value
Must be an integer or real number or digital state (character string), the value to search for.
Returns
The timestamp closest to starttime, within the given range, for which the point was greater than the given value.
Exceptions
If the point was never greater than the given value, FindGT returns an error value.
Notes
FindGT interpolates between Archive events, if necessary, to find the value it is looking for.
Example
FindGT('tag1', 't', '*',40.0)
FindGT('tag1', '-1d', '*',40.0)
FindGT('digitaltag', '-1d', '*', TagVal('digitaltag', 'y'))
Syntax
FindLE(tagname, starttime, endtime, value)
Arguments
tagname
A tagname.
starttime
Beginning of the time range to search; time expression or time relative to endtime if endtime is a time.
endtime
End of the time range to search, timestamp or time (in seconds) relative to starttime if starttime is a time. If this
time is earlier than starttime, the range is searched backwards.
value
Must be an integer or real number or digital state (character string), the value to search for.
Returns
The timestamp closest to starttime, within the given range, for which the point was less than or equal to the
given value.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 317
PI System Management Tools
Performance Equations
Exceptions
If the point was always greater than the given value, FindLE returns an error value.
Notes
FindLE interpolates between Archive events, if necessary, to find the value it is looking for.
Example
FindLE('tag1', 't', '*',40.0)
FindLE('tag1', -3600, '*',40.0)
FindLE('tag1', 'Saturday', '*',40.0)
Syntax
FindLT(tagname, starttime, endtime, value)
Arguments
tagname
A tagname.
starttime
Beginning of the time range to search; time expression or time relative to endtime if endtime is a time.
endtime
End of the time range to search, time expression or time (in seconds) relative to starttime if starttime is a time. If
this time is earlier than starttime, the range is searched backwards.
value
Must be an integer or real number or digital state (character string), the value to search for.
Returns
The timestamp closest to starttime, within the given range, for which the point was less than the given value.
Exceptions
If the point was never less than the given value, FindLT returns an error value.
Notes
FindLT interpolates between Archive events, if necessary, to find the value it is looking for.
Example
FindLT('tag1', 't', 3600,40.0)
FindLT('tag1', -1h, '*',40.0)
FindLT('tag1', '14-Dec-97 01:00:00.0001, '*',40.0)
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 318
PI System Management Tools
Performance Equations
Syntax
FindNE(tagname, starttime, endtime, value)
Arguments
tagname
A tagname.
starttime
Beginning of the time range to search; time expression or time relative to endtime if endtime is a timestamp.
endtime
End of the time range to search, time expression or time (in seconds) relative to starttime if starttime is a time. If
this time is earlier than starttime, the range is searched backwards.
value
Must be an integer or real number or digital state (character string), the value to search for.
Returns
The timestamp closest to starttime, within the given range, for which the point was unequal to the given value.
Exceptions
If the point was always equal to the given value, FindNE returns an error value.
Example
FindNE('tag1', 'y', '*',40.0)
FindNE('tag1', '14-Dec-97', '*',40.0)
FindNE('tag1', '14-Dec-97', 'Monday',40.0)
Float
Convert a string to a number.
Syntax
Float(x)
Arguments
• x
A string or a number, or an attribute whose value evaluates to a number at time of evaluation
Returns
A number for a numeric string. If x is already a number, x is returned
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 319
PI System Management Tools
Performance Equations
Exceptions
If x is not a number or a numeric string, returns Calc Failed
Notes
Unit of measure of the argument, if it exists, is carried over to the result. Float also takes timespan and boolean
as argument. Note, however, that Float only converts timespan format to the number of seconds from 12:00am
Jan 1, 1970.
Example
• Float("12.3")
[Converts string to a number and returns 12.3]
• Float(12.3)
[Returns 12.3]
• Float('*')
[Return the total number of seconds passed since Jan 1, 1970]
Syntax
Format(x, format [,numType ])
Arguments
x
A numeric value (real or integer).
format
Format-control string. This is the same as that used by the C language function Sprintf.
numType
Optional. Character indicating number type, either R(eal) or I(nteger). The default is R.
Returns
A formatted string.
Example
Format('sinusoid', "%3.3f", "R") = "66.890"
Format(45, "%3.3d") = "045"
Format(45, "%3.3d", "I") = "045"
Format(45, "%3.3d", "R") = "000" (Don't do this!)
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 320
PI System Management Tools
Performance Equations
Frac
Return the fractional part of a real number. Returns 0 for integers.
Syntax
Frac(x)
Arguments
• x
Must be an integer or real number
Returns
The fractional part of x
Exceptions
If x is not an integer or real number, returns an error value
Notes
By definition: Int(x) + Frac(x) = x
Unit of measure of the argument, if it exists, is carried over to the result
Example
• Frac(1)
[Returns 0]
• Frac(1.3)
[Returns 0.3]
• Frac(TagVal('att1', '*'))
[Return the fractional part of the value of 'att1' at current time.]
Hour
Extract the hour from a time expression.
Syntax
Hour(t1)
Arguments
• t1
A time expression, enclosed in single quotes
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 321
PI System Management Tools
Performance Equations
Returns
The hour of time, in the range 0-23
Exceptions
None
Example
• Hour('*')
[Return the hour portion of current time]
• Hour('Saturday')
[Returns 0]
• Hour(FindEq('att1', '-1d', '*', 50))
[Return the hour of the time when the value of 'att1' was first equal to 50 in the past 24 hours]
Impulse
Dynamic response specified by the impulse response.
Syntax
Impulse(tagname, runflag, i1,i2 … )
Arguments
tagname
Must be a tagname for a numerical point.
runflag
Non-zero enables filter to run.
i1, i2, …
Unit impulse response specifying dynamic model, text sequence of numbers.
Returns
Dynamic model output as function of time.
u(t)=i1*u(t-1) + i2*u(t-2) + …
Where u(t) is the current output and u(t-1) is the output one sample interval in the past.
Exceptions
Impulse gives different results depending on which type of scheduling is used. In clock scheduling, the interval
between time series values depends on the scan class and gives values at evenly spaced time intervals.
Event-based scheduling is dependent on a trigger from another point. With event-based scheduling, Impulse
sometimes gives results that are not trustworthy. Use Impulse with event-based scheduling only:
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 322
PI System Management Tools
Performance Equations
• If the point used for event-based scheduling is exception-based rather than scan-based.
If the input point is not a real number or integer, Impulse returns an error. Impulse is intended for the PE
Scheduler only. Use of Impulse in client applications might produce unexpected results.
Example
Impulse('tag1',1,1,1,1)
InStr
Return the location within a string where a sub-string match is first found.
Syntax
InStr([start,] s1, s2 [,caseSensitive])
Arguments
• start
Optional: An integer specifying which character in s1 to start the comparison. Must be larger than or equal
to 1.
• s1, s2
Two strings to be compared.
• caseSensitive
Optional: A flag indicating if the comparison is case-sensitive. If 0 (the default) the comparison is case-
insensitive, if 1, the comparison is case-sensitive.
Returns
0 if s2 is not a sub-string of s1 starting from the start position; otherwise, the location of character where s2 first
matches the characters in s1 from the start position.
Exceptions
Wildcard characters are not treated as wildcards.
Example
• InStr("What", "At")
[Returns 3]
• InStr("What What What", "What")
[Returns 1]
• InStr("what", "At", 1)
[Returns 0]
• InStr(4, "what", "At")
[Returns 0]
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 323
PI System Management Tools
Performance Equations
• InStr('att1', "Error")
[Returns 1 if the value of att1 is "Error"]
Syntax
Int(x)
Arguments
x
A number or string.
Returns
The integer part of x. If x is a string, it is first converted into a number.
Exceptions
If x is not a number or a numeric string, returns Calc Failed.
Example
Int('tag1')
Int(1)
Int(2.1)
Int("2.1")
Syntax
IsDST(time)
Arguments
time
A time expression.
Returns
1 if the time is in a DST period and 0 otherwise.
Exceptions
If the argument is not a time value, an error condition is returned.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 324
PI System Management Tools
Performance Equations
Example
IsDST('*')
IsDST('*-182.5d')
IsDST('t')
IsDST('timestringtag')
Syntax
IsSet(x, select)
Arguments
x
Any value. May be an integer, real number, digital state, or character string.
select
A string but only the first character is considered. "a" for annotated; "s" for substituted; and "q" for
questionable. It is case-insensitive.
Returns
1 if true and 0 otherwise.
Exceptions
None.
Example
IsSet('sinusoid', "a")
IsSet('sinusoid', "annotated")
IsSet('sinusoid', "annotatted is mispelled")
IsSet('stringtag',"annotatiiion is mispelled but it does not matter.")
IsSet('stringtag',"A")
IsSet('alarmtag1',"q")
IsSet('stringtag',"s")
LCase
Convert a string to a lowercase string.
Syntax
LCase(s1)
Arguments
• s1
string
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 325
PI System Management Tools
Performance Equations
Returns
A string that has been converted to lowercase
Exceptions
If the argument is not a string, returns an error value
Example
• LCase("String")
[Returns "string"]
Left
Return a specified number of characters of a string from the left.
Syntax
Left(s1, len)
Arguments
• s1
String
• len
Integer
Returns
The first len characters of the string, starting from the left
Exceptions
If the arguments are not of the required types, returns an error
Example
• Left("String_att", 3)
[Returns "Str"]
Syntax
Len(s)
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 326
PI System Management Tools
Performance Equations
Arguments
s
A string.
Returns
The length of a string.
Exceptions
If the argument is not a string, returns an error value.
Example
Len("Stringtag") = 9
Len('Stringtag') = 5 if the Snapshot value for the stringtag equals "Error"
Log
Return the natural logarithm (base e = 2.7182818...) of an integer or real number.
Syntax
Log(x)
Arguments
• x
Must be an integer or real number greater than zero
Returns
The natural logarithm of x
Exceptions
If x is zero or negative, or not a number, returns an error value
Example
• Log(14)
[Returns 2.6391]
• Log(TagVal('att1', '14-Dec-16'))
[Return the natural log of the value of 'att1' at 12:00am on Dec 14, 2016]
Log10
Return the base 10 logarithm of an integer or real number.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 327
PI System Management Tools
Performance Equations
Syntax
Log10(x)
Arguments
• x
Must be an integer or real number greater than zero
Returns
The base 10 logarithm of x
Exceptions/Errors
If x is zero or negative, or not a number, returns an error value
Example
• Log10(100)
[Returns 2]
• Log10(TagVal('att1', '14-Dec-16'))
[Return the base 10 logarithm of the value of 'att1' at 12:00am on Dec 14, 2016]
LTrim
Remove the leading blanks from a string.
Syntax
LTrim(s1)
Arguments
• s1
string
Returns
A string with leading blanks removed
Exceptions
If s1 is not a string, an error value is returned.
Example
• LTrim(" String")
[Returns "String"]
• LTrim("String ")
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 328
PI System Management Tools
Performance Equations
Syntax
Max(x1, x2, ..., xn)
Arguments
x1...xn
May be numbers, times, or time periods, but all must be the same.
Returns
The maximum value of the arguments. The result has the same data type as the arguments.
Exceptions
Arguments whose run-time values are digital states are ignored. If all values are digital states, Max returns an
error value.
Example
Max('*', 'y', 'Saturday')
Max(14, 'tag1', 14.5, TagVal('tag2','14-Dec-97'))
Max('*'-'*-h', 't'-'y', TimeEq('tag1', 'y', 't',50))
Min (page )
Syntax
Arguments
x1, x2, x3, [... xn]
All arguments must be the same type. Enter at least three arguments, all of the same data type (integers and real
numbers, times, or time periods).
Returns
The median value of the input arguments. If the number of arguments is even, the average of the two middle
values is returned.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 329
PI System Management Tools
Performance Equations
Exceptions
Arguments whose run-time values are digital states are ignored. The function must have greater than two
arguments that evaluate to non-digital states; otherwise, Median returns an error value.
Notes
Median allows for mixed integer and real data types. Median follows the data type of the first argument. Hence
if the first argument is a point that evaluates to an integer then all the other entries are converted to integers by
rounding.
Example
• To find the median of these timestamps: now, 12:00am yesterday, and 12:00am last Saturday:
Median('*', 'y', 'Saturday')
• To find the median of these values: 14, the current value of tag1, 14.5, and the value for tag2 at midnight on
Dec 14, 2016:
Median(14, 'tag1', 14.5, TagVal('tag2','14-Dec-16'))
• To find the median of these time durations: from 1 hour ago to now, from 12:00am yesterday to 12:00am
today, and the total time tag1 was equal to 50 between 12:00am yesterday and 12:00am today:
Median('*'-'*-1h', 't'-'y', TimeEq('tag1', 'y', 't',50))
MedianFilt
Return the median value of the last specified number of values of a time series.
Syntax
MedianFilt( tagname, runflag, number )
Arguments
tagname
Must be a numerical point.
runflag
Non-zero enables filter to run.
number
The number of series elements to be considered. A numeric constant greater than or equal to 3.
Returns
The median value of the last number values in the series of values.
Exceptions
Arguments whose run-time values are digital states are ignored. MedianFilt is not supported in the pipetest
utility or in PI DataLink. If all values are digital states, MedianFilt returns an error value.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 330
PI System Management Tools
Performance Equations
Example
MedianFilt('tag1', 1, 3)
Mid
Return a sub-string within a string.
Syntax
Mid(s1, start [,len])
Arguments
• s1
string
• start
An integer specifying the position of the first character within the string. The first character in the string is
number 1
len
Optional: The maximum length of the returned string. The default is the length of the string
Returns
len characters of the string to the right of (and including) the first character whose position is specified by start
Exceptions
If the arguments are not of the required types, an error value is returned. The maximum number of characters
that can be returned is 999
Example
• Mid("String", 3)
[Returns "ring"]
• Mid("String", 3, 2)
[Returns "ri"]
Syntax
Min(x1, ..., xn)
Arguments
x1...xn
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 331
PI System Management Tools
Performance Equations
May be numbers, times, or time periods, but all must be the same data type.
Returns
The minimum of the arguments. The result has the same data type as the arguments.
Exceptions
Arguments whose run-time values are digital states are ignored. If all values are digital states, Min returns an
error value.
Example
Min('*', 'y', 'Saturday')
Min(14, 'tag1', 14.5, TagVal('tag2','14-Dec-97'))
Min('*'-'*-1h', 't'-'y', TimeEq('tag1', 'y', 't',50))
Max (page )
Minute
Extract the minute from a time expression.
Syntax
Minute(t1)
Arguments
• t1
A time expression, enclosed in single quotes
Returns
The minute of time, in the range 0-59
Exceptions
None
Example
• Minute('*')
[Extract the minute from current time]
• Minute(FindGT('att1', '-1h', '*', 5)
[Extract the minute from a timestamp when the value of 'att1' was first greater than 5 in the past hour.
Return error if it was never over 5]
Month
Extract the month from a given time expression.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 332
PI System Management Tools
Performance Equations
Syntax
Month(t1)
Arguments
• t1
A time expression, enclosed in single quotes
Returns
The month of time, in the range 1-12
Exceptions
None
Example
• Month('*')
[Return the current month]
• Month(FindEq('att1', '-10d', '*', 5')
[Return the month from a timestamp when the value of 'att1' was first equal to 5 in the past 10 days]
Syntax
NextEvent(tagname, time)
Arguments
tagname
A tagname.
time
A time expression.
Returns
The timestamp of the next Archive event for tagname after time.
Exceptions
If point has no Archive data after time, returns an error value.
Example
NextEvent('tag1','*')
NextEvent('digitaltag', '*')
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 333
PI System Management Tools
Performance Equations
NextEvent('tag1','*')
NextEvent('digitaltag', '*')
NextVal
Find the value of a point's next Archive event after a given time.
Syntax
NextVal(tagname, time)
Arguments
tagname
A tagname.
time
A time expression.
Returns
The value of the next Archive event for tagname after time.
Exceptions
If point has no Archive data after time, returns an error value.
Example
NextVal('tag1','*-1h')
NextVal('digitaltag', '14-Dec-97')
NextEvent (page ), PrevEvent (page ), PrevVal (page ), TagVal (page )
Noon
Return a timestamp for noon on the day of a given time expression.
Syntax
Noon(t1)
Arguments
• t1
A time expression enclosed in single quotes
Returns
A timestamp corresponding to noon of the day of the input time
Exceptions
None
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 334
PI System Management Tools
Performance Equations
Notes
This function is useful for establishing a unique clock time independent of the length of particular days.
Example
• Noon('*')
[Return the timestamp for noon of current day]
• Noon(FindEq('att1', '-3d', '*', 50))
[Return the timestamp for noon of the day when 'att1' was first equal to 50 in the past 3 days]
NoOutput
Do not write current calculation result.
Syntax
NoOutput()
Arguments
None
Notes
It is important to include the parentheses after this function (use NoOutput() instead of NoOutput as NoOutput is
an invalid syntax). This function applies only to the current calculation.
Example
• If 'att1' < 100 or 'att1' > 200 then 'att1' else NoOutput()
Syntax
ParseTime(s1)
Arguments
s1
A character string in PI time format, enclosed in double quotes
Returns
The timestamp corresponding to s1
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 335
PI System Management Tools
Performance Equations
Exceptions
If s1 is not a character string, or if there is a syntax error, returns an error value
Notes
There is no difference between ParseTime("14-Nov-92") and the time expression '14-Nov-92', except that the
ParseTime call takes more time. This is because the time expression (enclosed in single quotes) is evaluated at
compile time, not run time. Therefore it is most efficient to use a time expression (enclosed in single quotes.)
If you write ParseTime('14-Nov-92') (using single quotes, not double quotes) the parser detects an error, because
the expression in single quotes is already translated to a timestamp at compile time
The expression ParseTime(":12:00:00") is not the same as the time expression ':12:00:00'. The ParseTime
expression is evaluated at run time and translated using '*' as the relative time base, while the time expression is
evaluated at compile time and uses the time the expression is parsed as the relative time base
Example
ParseTime(Concat("12", "-31", "-16"))
Syntax
PctGood(tagname, starttime, endtime)
Arguments
tagname
A tagname.
starttime
Must be a time expression, the beginning of the time range to search.
endtime
Must be a time expression, greater than starttime; the end of the time range to search.
Returns
An integer or real number from 0.0 to 100.0: the percentage of the given time when the point had good values.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 336
PI System Management Tools
Performance Equations
Example
PctGood('tag1', 'y', '*')
PctGood('tag1', '-1h', '*')
Poly
Return the polynomial c0 + c1x + c2x2 + … +cnxn.
Syntax
Poly(x, c0 [, ... cn])
Arguments
• x
Variable. An integer or real number
• c0 [, ... cn]
Coefficients. There must be at least one coefficient. All must be numbers.
Returns
The value of the polynomial
Exceptions
If x or any coefficient is not an integer or real number, Poly returns an error value
Example
• Poly(3, 4, 5)
[Returns 19]
• Poly('att1', 2, 3)
Syntax
PrevEvent(tagname, time)
Arguments
tagname
A tagname.
time
A time expression.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 337
PI System Management Tools
Performance Equations
Returns
The timestamp of the previous Archive event for tagname before time.
Exceptions
If point has no Archive data before time, returns an error value.
Example
PrevEvent('tag1', '*')
PrevEvent('tag1','14-Dec-97')
NextEvent (page ), NextVal (page ), PrevVal (page ), TagVal (page )
Syntax
PrevVal(tagname, time)
Arguments
tagname
A tagname
time
A time expression
Returns
The value of the previous Archive event for tagname before time
Exceptions
If point has no Archive data before time, returns an error value
Example
PrevVal('tag1', '*')
PrevVal('tag1', '14-Dec-97')
NextEvent (page ), NextVal (page ), PrevEvent (page ), TagVal (page )
Syntax
PStDev(x1, x2, ..., xn)
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 338
PI System Management Tools
Performance Equations
Arguments
x1...xn
May be numbers or time expressions, but all must be the same.
Returns
The population standard deviation for the arguments. For numerical arguments the result is a number. For
arguments that are time expressions (absolute times or time periods), the result is a number indicating a time
period expressed in seconds.
The population standard deviation of a population x1...xn is
Exceptions
Arguments whose run-time values are digital states are ignored. If all values are digital states, an error value is
returned.
Notes
PStDev uses every value in a population to calculate the population standard deviation. However, it is common,
especially for a large population, to estimate standard deviation from a sample of the population. SStDev uses a
set of sample values to calculate sample standard deviation, which approximates the population standard
deviation.
Example
PStDev('att1', 'att2')
PStDev('*','14-Dec-97', 'y')
PStDev('*'-'y','14-Dec-97'-'*', '-1h')
Syntax
Range(tagname, starttime, endtime [, pctgood])
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 339
PI System Management Tools
Performance Equations
Arguments
tagname
A tagname. This point should represent a continuous variable.
starttime
Must be a time expression, the beginning of the time range to search.
endtime
Must be a time expression, greater than starttime; the end of the time range to search.
pctgood
Optional. Minimum time percentage, over the given time range, that the point's archived values must be good.
Returns
The difference between the point's maximum and minimum values during the given time.
Exceptions
If the point has no good values or the pctgood minimum is not reached in the given time range, returns an error
value.
Notes
Note: The OverRangeStat and UnderRangeStat digital states are not taken into account when calculating Range.
Example
Range('tag1', 'y', '*')
Range('tag1','-1h', 'y')
Range('tag1','y', '+1h',70)
Right
Return a specified number of characters of a string from the right.
Syntax
Right(s1, len)
Arguments
• s1
string
• len
integer
Returns
len characters of the string from the right
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 340
PI System Management Tools
Performance Equations
Exceptions
If the arguments are not of the required types, an error value is returned.
Example
• Right("String", 3)
[Returns "ing"]
• Right("String", 20)
[Returns "String"]
Syntax
Round(x [, unit])
Arguments
x
Must be an integer or real number or time expression.
unit
Optional. The size of the unit to round to. If x is a number, unit must be a number. If x is a time expression or
time period, unit must be a time period. If unit is omitted, Round rounds to the nearest integer (for a number) or
second (for a time period).
Returns
The nearest value to x which is an integer multiple of unit. Returns the same data type as x. For more details, see
the following examples.
Exceptions
If x is a string, or if unit is of the wrong data type, returns an error value.
Notes
If x is time and unit is omitted this routine has no effect: times are accurate only to 1 second.
Example
Round(12.499)
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 341
PI System Management Tools
Performance Equations
RTrim
Trim trailing blanks from a string.
Syntax
RTrim(s1)
Arguments
• s1
string
Returns
The source string with trailing blanks removed
Exceptions
If s1 is not a string, an error value is returned
Example
• RTrim("String ")
[Returns "String"]
• RTrim(" String")
[Returns " String"]
Second
Extract the second from a time expression.
Syntax
Second(t1)
Arguments
• t1
A time expression enclosed in single quotes.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 342
PI System Management Tools
Performance Equations
Returns
The second of time, in the range 0-59
Exceptions
None
Example
• Second('*')
[Return the second from current time]
• Second(FindEq('att1', '-1m', '*', 2)
[Return the second from a timestamp when the value of 'att1' was first equal to 2 in the past minute]
Sgn
Return an indicator of the numerical sign of a number.
Syntax
Sgn(x)
Arguments
• x
Must be an integer or real number
Returns
-1 if x < 0; 0 if x = 0; 1 if x > 0
Exceptions
If x is not an integer or real number, returns an error value
Example
• Sgn(1.1)
[Returns 1]
• Sgn(0)
[Returns 0]
• Sgn(-0.1)
[Returns -1]
• Sgn('att1')
[Returns 1 if the value of 'att1' is positive, 0 if it equals 0, and -1 if it is negative]
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 343
PI System Management Tools
Performance Equations
Sin
Return the trigonometric sine of a number.
Syntax
Sin(x)
Arguments
• x
Must be an integer or real number, which represents an angle in radians
Returns
The sine of x
Exceptions
If x is not a number, returns an error value
Example
• Sin(1)
[Returns 0.84147]
• Sin(1.1)
[Returns 0.89121]
• Sin('att1')
[Return the trigonometric sine of the value of 'att1' at trigger time]
Sinh
Return the hyperbolic sine of a number.
Syntax
Sinh(x)
Arguments
• x
Must be an integer or real number
Returns
The hyperbolic sine of x
Exceptions
If x is not a number, returns an error value
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 344
PI System Management Tools
Performance Equations
Example
• Sinh(1)
[Returns 1.1752]
• Sinh(1.1)
[Returns 1.3356]
• Sinh('att1')
[Return the hyperbolic sine of the value of 'att1' at trigger time]
Sqr
Return the square root of a number.
Syntax
Sqr(x)
Arguments
• x
Must be an integer or real number equal to or greater than zero
Returns
The square root of x
Exceptions
If x is negative, or is not a number, returns an error value
Example
• Sqr(2)
[Returns 1.4142]
• Sqr(2.1)
[Returns 1.4491]
• Sqr('att1')
[Return square root of the value of 'att1' at trigger time]
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 345
PI System Management Tools
Performance Equations
Syntax
SStDev(x1, x2, ..., xn)
Arguments
x1...xn
May be numbers or time expressions, but all must be the same.
Returns
The sample standard deviation of the arguments. If the arguments are numbers, the result is a number; if they
are times or time periods, the result is a time period (number of seconds).
Exceptions
Arguments whose run-time values are digital states are ignored. If there are not at least two numeric values,
SStDev returns a zero.
Notes
In the rare case where you have the entire population, rather than a sample, you might use the function PstDev,
rather than SStDev.
Example
SStDev('tag1', 'tag2', TagVal('tag1', 'y'))
SStDev('y', 't', '14-Dec-97')
SStDev(1, 2, 1.1)
Syntax
StateNo(digstate)
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 346
PI System Management Tools
Performance Equations
Arguments
digstate
An enumeration value.
Returns
The offset into the Digital State Set corresponding to digstate.
Exceptions
If a point is passed as digstate that is not a digital point, returns an error value.
Notes
A digital state may appear more than once in the digital state table. In this case, the value that StateNo returns
may vary. If digstate is the value of a digital point, StateNo returns a code number appropriate for that point.
Example
StateNo('digitaltag')
StateNo(TagVal('digitaltag', '*-1h'))
Syntax
StDev(tagname, starttime, endtime [, pctgood])
Arguments
tagname
A tagname. This point must represent a continuous variable.
starttime
Must be a time expression representing the beginning of the time range to search.
endtime
Must be a time expression, greater than starttime; representing the end of the time range to search.
pctgood
Optional. Minimum time percentage over the given time range, that the point's archived values must be good.
Returns
The point's time-weighted standard deviation over the given time.
Exceptions
If the point has no good values or the PctGood minimum is not reached for the given time range, returns an
error value.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 347
PI System Management Tools
Performance Equations
Notes
Note: If the point has few good Archive values during the time period, this function's result may not be
trustworthy. Use the PctGood function to find out what percentage of the values is good. Note, however, that
pctgood is ignored when it is passed as a string.
Example
StDev('tag1', 'y', '*')
StDev('tag1', '14-Dec-97', '+1d', 85)
StDev('tag1', '14-Dec-97', '15-Dec-97')
String
Convert any value to a string.
Syntax
String(x)
Arguments
• x
Any expression that is of normal PI value type
Returns
The string representing the value argument
Exceptions
None
Example
• String("Hello, PI user!")
[Returns "Hello, PI user!"]
• String(12.23)
[Returns "12.23"]
• String('sinusoid')
[Return current value of 'sinusoid' in string]
• String('*')
[Return the current time in string]
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 348
PI System Management Tools
Performance Equations
Syntax
TagAvg(tagname, starttime, endtime [, pctgood])
Arguments
tagname
A tagname. This point must represent a continuous variable.
starttime
Must be a time expression representing the beginning of the time range to search.
endtime
Must be a time expression, greater than starttime; representing the end of the time range to search.
pctgood
Optional. Minimum time percentage over the given time range, that the point's archived values must be good.
Returns
The point's time-weighted average value over the given time.
Exceptions
If the point has no good values or the pctgood minimum is not reached for the given time range, returns an error
value.
Notes
Note: If the point has few good Archive values during the time period, this function's result may not be
trustworthy. Use the PctGood function to find out what percentage of the values are good.
Example
TagAvg('tag1', 'y', '*')
TagAvg('tag1', '14-Dec-97', '+1d',70)
TagAvg('tag1', '14-Dec-97', '15-Dec-97')
Syntax
Tagbad(tagname [, time])
Arguments
tagname
A tagname.
time
Optional. A time expression. If omitted, the current time (*) is used.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 349
PI System Management Tools
Performance Equations
Returns
0 if the point's state at time is normal, 1 if it is abnormal.
Exceptions
If point does not exist, or has no archived value at time, returns an error value.
Notes
Badval can test any value or expression; TagBad can only test a point.
Example
TagBad('tag1', '*')
TagBad('digitaltag', '14-Dec-97')
TagBad('tag1', 'y')
Syntax
TagDesc(tagname)
Arguments
tagname
A tagname.
Returns
The point's descriptor.
Exceptions
If point does not exist, returns an error value.
Example
TagDesc('tag1')
TagDesc('digitaltag')
Syntax
TagEU(tagname)
Arguments
tagname
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 350
PI System Management Tools
Performance Equations
A tagname.
Returns
The point's engineering units.
Exceptions
If point does not exist, returns an error value.
Example
TagEU('tag1')
Syntax
TagExDesc(tagname)
Arguments
tagname
A tagname.
Returns
The point's extended descriptor.
Exceptions
If point does not exist, returns an error value.
Example
TagExDesc('tag1')
Syntax
TagMax(tagname, starttime, endtime [, pctgood])
Arguments
tagname
A tagname.
starttime
A time expression indicating the beginning of the time range to search. Relative times are relative to endtime, if
endtime is not itself a relative time.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 351
PI System Management Tools
Performance Equations
endtime
End of the time range to search. Relative times are relative to starttime, if starttime is not itself a relative time.
This time must be after starttime.
pctgood
Optional. Minimum time percentage over the given time range, that the point's archived values must be good.
Returns
The point's maximum value during the given time.
Exceptions
If the point has no good values or the pctgood minimum is not reached for the given time range, returns an error
value.
Notes
Note: The OverRange digital state is not taken into account when evaluating TagMax.
Example
TagMax('tag1', '-1h', '*',95)
• Here, the starttime is one hour before the endtime, which is now ('*'). During the time span, at least 95% of
the values must be good.
TagMax('tag1', 'y', '*')
TagMax('tag1', '-1h', '*',95)
TagMax('tag1', '14-Dec-97', '+1h')
Syntax
TagMean(tagname, starttime, endtime [, pctgood])
Returns
The point's average value over the given time. Notice that the average is not time-weighted.
Arguments
tagname
A tagname. This point must represent a continuous variable.
starttime
Must be a time expression representing the beginning of the time range to search.
endtime
Must be a time expression, greater than starttime; representing the end of the time range to search.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 352
PI System Management Tools
Performance Equations
pctgood
Optional. Minimum time percentage over the given time range, that the point's archived values must good.
Exceptions
If the point has no good values or the pctgood minimum is not reached for the given time range, returns an error
value. Unlike some other summary functions, TagMean does not interpolate any value on the boundary. Thus, if
there is no Archive event between the specified interval, an error value is returned.
Notes
Note: If the point has few good Archive values during the time period, this function's result may not be
trustworthy. Use the PctGood function to find out what percentage of the values is good.
Example
TagMean('tag1', 'y', '*')
TagMean('tag1', '14-Dec-97', '+1d',70)
TagMean('tag1', '14-Dec-97', '15-Dec-97')
Syntax
TagMin(tagname, starttime, endtime [, pctgood])
Arguments
tagname
A tagname. This point should represent a continuous variable.
starttime
Beginning of the time range to search. Relative times are relative to endtime, if endtime is not itself a relative
time.
endtime
Relative times are relative to starttime, if starttime is not itself a relative time. This time must be after starttime.
pctgood
Optional. Minimum time percentage over the given time range, that the point's archived values must good.
Returns
The point's minimum value during the given time.
Exceptions
If the point has no good values or the pctgood minimum is not reached for the given time range, returns an error
value.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 353
PI System Management Tools
Performance Equations
Notes
Note: The UnderRange digital state is not taken into account when calculating this value.
Example
TagMin('tag1', 'y', '*')
TagMin('tag1', '-1h', '*',90)
TagMin('tag1', '14-Dec-97', '+1h')
Syntax
TagName(tag)
Arguments
tag
A tagname.
Returns
The point's name.
Exceptions
If point does not exist, returns an error value.
Example
TagName('tag1')
Syntax
TagNum(string)
Arguments
string
A tagname in double quotes.
Returns
The point's number.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 354
PI System Management Tools
Performance Equations
Exceptions
If point does not exist, returns an error value.
Example
TagNum("tag1")
Syntax
TagSource(tagname)
Returns
The point's point source string.
Arguments
tagname
A tagname.
Exceptions
If point does not exist, returns an error value.
Example
TagSource('tag1')
Syntax
TagSpan(tagname)
Arguments
tagname
A tagname.
Returns
The point's span. If the point's type is Digital this is an integer whose value is the number of digital states defined
for the point.
Example
TagSpan('tag1')
TagSpan('digitaltag')
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 355
PI System Management Tools
Performance Equations
Syntax
TagTot(tagname, starttime, endtime [, pctgood])
Arguments
tagname
A tagname. This point must represent a continuous process flow.
starttime
Beginning of the time range to search. Relative times are relative to endtime, if endtime is not itself a relative
time.
endtime
End of the time range to search. Relative times are relative to starttime, if starttime is not itself a relative time.
pctgood
Optional. Minimum time percentage over the given time range, that the point's archived values must be good.
For more infomation about pctgood, see PctGood (Tag-based PE function).
Returns
The point's totalized value over the given time.
Exceptions
If the point has no good values or the PctGood minimum is not reached for the given time range, returns an
error value.
Note: If the point has few good Archive values during the time period, this function's result may not be
trustworthy. Use the PctGood function to find out what percentage of the value is good.
Notes
• The system chooses a scale factor such that the integral is correct only if the flow is expressed in units per
day. If the flow is expressed in units per hour, or per some other time unit, you must multiply this result by a
conversion factor. The conversion factor equals the number of actual flow time units in a day.
• For instance, if you totalize a point measured in gallons per minute, multiply the result of TagTot by 1440 to
get the answer in gallons. This conversion factor is not related to the time period you are totalizing over; it is
strictly a function of the point's engineering units.
• Some PI sites have the default total period configured to be per hour rather than per day. If you are at one of
these sites, your conversion factor will differ.
• When the percentage of good data is less than 100%, TagTot determines the total based on good data and
divides the fraction of good data in the interval.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 356
PI System Management Tools
Performance Equations
Example
TagTot('tag1', 'y', '*')
TagTot('tag1', '-1h', '*',85)
TagTot('tag1', '14-Dec-97', '+1h')
Syntax
TagType(tagname)
Arguments
tagname
A tagname.
Returns
The point's type character.
Exceptions
If point does not exist, returns an error value.
Example
TagType('tag1')
TagType('digitaltag')
Syntax
TagTypVal(tagname)
Arguments
tagname
A tagname.
Returns
The point's typical value. If the point's type is R or I, this is a number; if the point's type is D, this is a digital state
(character string).
Exceptions
If point does not exist, returns an error value.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 357
PI System Management Tools
Performance Equations
Example
TagTypVal('tag1')
TagTypVal('digitaltag')
Syntax
TagVal(tagname [, time])
Arguments
tagname
A tagname.
time
Optional. A time expression. If you omit this argument, '*' is used.
Returns
The archived value of tagname at time. This value is interpolated unless the point has the Step attribute of 1 (or
Resolution Code of 4 for PI2).
Exceptions
If point does not exist, or has no archived value at time, returns an error value.
Example
TagVal('tag1')
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 358
PI System Management Tools
Performance Equations
Syntax
TagZero(tagname)
Arguments
tagname
A tagname.
Returns
The point's zero value. If the point's type is R or I, this is a number; if the point's type is D, this is a digital state
(character string).
Exceptions
If point does not exist, returns an error value.
Example
TagZero('tag1')
TagZero('digitaltag')
Tan
Return the trigonometric tangent of a number.
Syntax
Tan(x)
Arguments
• x
Must be an integer or real number, which represents an angle in radians
Returns
The tangent of x.
Exceptions
If x is not a number, returns an error
Example
• Tan(1)
[Returns 1.5574]
• Tan(1.1)
[Returns 1.9648]
• Tan('att1')
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 359
PI System Management Tools
Performance Equations
Tanh
Return the hyperbolic tangent of a number.
Syntax
Tanh(x)
Arguments
• x
Must be an integer or real number
Returns
The hyperbolic tangent of x
Exceptions
If x is not a number, returns an error value
Example
• Tanh(1)
[Returns 0.76159]
• Tanh(1.1)
[Returns 0.8005]
• Tanh('att1')
[Return the hyperbolic tangent of the value of 'att1' at trigger time]
Text
Concatenate strings representing argument values.
Syntax
Text(x1 [, x2, … xn])
Arguments
• x1 … xn
Any expression of normal PI value type
Returns
A string that is the concatenation of strings representing the argument values.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 360
PI System Management Tools
Performance Equations
Example
Syntax
TimeEq(tagname, starttime, endtime, value)
Arguments
tagname
A tagname.
starttime
Beginning of the time range to search. Relative times are relative to endtime, if endtime is not itself a relative
time.
endtime
End of the time range to search. Relative times are relative to starttime, if starttime is not itself a relative time.
This time must be after starttime.
value
Must be an integer or real number or digital state (character string); the value to search for.
Returns
The time period in seconds within the given range, for which the point was exactly equal to the given value.
Example
TimeEq('tag1', 't', '*',40.0)
TimeEq('digitaltag', '-1d', '*',TagVal('digitaltag', '14-Dec-97'))
TimeEq('digitaltag', '14-Dec-97', '*', "On")
TimeGE (page ), TimeGT (page ), TimeLE (page ), TimeLT (page ), TimeNE (page )
Note: For more information, see TimeGT.
Syntax
TimeGE(tagname, starttime, endtime, value)
Arguments
tagname
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 361
PI System Management Tools
Performance Equations
A tagname.
starttime
Beginning of the time range to search. Relative times are relative to endtime, if endtime is not itself a relative
time.
endtime
End of the time range to search. Relative times are relative to starttime, if starttime is not itself a relative time.
This time must be after starttime.
value
Must be an integer or real number or digital state (character string); the value to search for.
Returns
The time period in seconds within the given range, for which the point was greater than or equal to the given
value.
Exceptions
None.
Notes
TimeGE interpolates between Archive events, if necessary, to find the times when the point crossed the given
value.
Example
TimeGE('tag1', 't', '*',40.0)
TimeGE('digitaltag', '-1d', '*',TagVal('digitaltag', '14-Dec-97'))
TimeGE('digitaltag', '14-Dec-97', '*', "On")
TimeEq (page ), TimeGT (page ), TimeLE (page ), TimeLT (page ), TimeNE (page )
Syntax
TimeGT(tagname, starttime, endtime, value)
Arguments
tagname
A tagname.
starttime
Beginning of the time range to search. Relative times are relative to endtime, if endtime is not itself a relative
time.
endtime
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 362
PI System Management Tools
Performance Equations
End of the time range to search. Relative times are relative to starttime, if starttime is not itself a relative time.
This time must be after starttime.
value
Must be an integer or real number or digital state (character string); the value to search for.
Returns
The time period in seconds within the given range, for which the point was greater than the given value.
Exceptions
None.
Notes
TimeGT interpolates between Archive events, if necessary, to find the times when the point crossed the given
value.
Example
TimeGT('tag1', 't', '*',40.0)
TimeGT('digitaltag', '-1d', '*',TagVal('digitaltag', '14-Dec-97'))
TimeGT('digitaltag', '14-Dec-97', '*', "On")
Note: For more information about PI time, see PI time abbreviations and PI time expressions.
Syntax
TimeLE(tagname, starttime, endtime, value)
Arguments
tagname
A PI tag.
starttime
Beginning of the time range to search. Relative times are relative to endtime, if endtime is not itself a relative
time.
endtime
End of the time range to search. Relative times are relative to starttime, if starttime is not itself a relative time.
This time must be after starttime
value
Must be an integer or real number or digital state (character string); the value to search for.
Returns
The time period in seconds within the given range, for which the point was less than or equal to the given value.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 363
PI System Management Tools
Performance Equations
Exceptions/Errors
None.
Notes
TimeLE interpolates between Archive events, if necessary, to find the times when the point crossed the given
value.
Examples
TimeLE('att1', 't', '+1h',80)
• [Find the total time between 12:00am and 1:00am today when 'att1' was less than or equal to 80.]
TimeLE('att1', '-1h', '*',TagVal('att1', 't+8h'))
• [Find the total time in the past hour when the value of 'att1' was less thank or equal its value at 8am today.
Result is in seconds.]
TimeLE('digitaltag', '14-Dec-97', '*', "On")
TimeEq (page ), TimeGE (page ), TimeGT (page ), TimeLT (page ), TimeNE (page )
Syntax
TimeLT(tagname, starttime, endtime, value)
Arguments
tagname
A tagname.
starttime
Beginning of the time range to search. Relative times are relative to endtime, if endtime is not itself a relative
time.
endtime
End of the time range to search. Relative times are relative to starttime, if starttime is not itself a relative time.
This time must be after starttime.
value
Must be an integer or real number or digital state (character string); the value to search for.
Returns
The time period in seconds within the given range, for which the point was less than the given value.
Exceptions
None.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 364
PI System Management Tools
Performance Equations
Notes
TimeLT interpolates between Archive events, if necessary, to find the times when the point crossed the given
value.
Example
TimeLT('tag1', 't', '*',40.0)
TimeLT('digitaltag', '-1d', '*',TagVal('digitaltag', '14-Dec-97'))
TimeLT'digitaltag', '14-Dec-97', '*', "On")
TimeEq (page ), TimeGE (page ), TimeGT (page ), TimeLE (page ), TimeNE (page )
Syntax
TimeNE(tagname, starttime, endtime, value)
Arguments
tagname
A tagname.
starttime
Beginning of the time range to search. Relative times are relative to endtime, if endtime is not itself a relative
time.
endtime
End of the time range to search. Relative times are relative to starttime, if starttime is not itself a relative time.
This time must be after starttime.
value
Must be an integer or real number or digital state (character string); the value to search for.
Returns
The time period in seconds within the given range, for which the point was unequal to the given value.
Exceptions
None.
Example
TimeNE('tag1', 't', '*',40.0)
TimeNE('digitaltag', '-1d', '*',TagVal('digitaltag', '14-Dec-97'))
TimeNE('digitaltag', '14-Dec-97', '*', "On")
TimeEq (page ), TimeGE (page ), TimeGT (page ), TimeLE (page ), TimeLT (page )
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 365
PI System Management Tools
Performance Equations
Syntax
Total(x1, x2, ..., xn)
Arguments
x1...xn
May be numbers or time periods, but all must be the same.
Returns
The total of the arguments. The result has the same data type as the arguments.
Exceptions
Arguments whose run-time values are digital states are not included in the total. If all values are digital states,
Total returns an error value.
Example
Total('tag1', 'tag2', TagVal('tag1', 'y'),40.0)
Total('t'-'y', '+1h')
Trim
Trim blanks on both sides of a string.
Syntax
Trim(s1)
Arguments
• s1
string
Returns
The source string with leading and trailing blanks removed.
Exceptions
If s1 is not a string, an error value is returned.
Example
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 366
PI System Management Tools
Performance Equations
Trunc
Truncate a number or time to the next lower unit.
Syntax
Trunc(x [, unit])
Arguments
• x
An integer or real number, time expression, or time period.
• unit
Optional. The size of the unit to truncate to; x will be truncated to a multiple of unit. If x is a number, unit
must be a number. If x is a time expression or time period, unit must be a time period. If unit is omitted,
Trunc truncates to the next lower integer (for a number) or second (for a time period).
Returns
The largest multiple of unit that is less than x. For a negative x, it returns the lowest multiple of unit larger than x.
The return is the same data type as x.
Exceptions
If x is a string, or if unit is of the wrong data type, an error is returned.
Notes
If x is a time, and unit is omitted, this routine has no effect, as times are only accurate to one second.
When |x| < |unit|, 0 is returned.
Example
• Trunc(12.999)
[Returns 12, truncated to the next lower integer]
• Trunc(28.75, 10)
[Returns 20, truncated to next lower multiple of 10]
• Trunc('14-Dec-16 11:47', '+1h')
[Returns 12/14/2016 11:00:00 AM, truncated to next lower hour]
• Trunc('18:47'-'15:00','+1h')
[Returns 03:00:00, truncated period to next lower hour]
Note: Truncating to the next lower day results in a timestamp of the next lower day in UTC time, not local
time.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 367
PI System Management Tools
Performance Equations
UCase
Convert a string to an uppercase string.
Syntax
UCase(s1)
Arguments
• s1
String in double quotes
Returns
s1 in uppercase
Exceptions
If the argument is not a string, returns an error value.
Example
• UCase("String")
[Returns "STRING"]
Syntax
Weekday(t1)
Arguments
t1
A time expression, enclosed in single quotes
Returns
The day of the week, in the range 1-7, where 1 represents a Sunday.
Exceptions
None
Example
Weekday('*')
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 368
PI System Management Tools
Performance Equations
Syntax
Year(t1)
Arguments
t1
A time expression, enclosed in single quotes.
Returns
The year of time, in the range 1970-present.
Exceptions
None.
Example
Year('*')
Syntax
Yearday(t1)
Arguments
t1
A time expression, enclosed in single quotes.
Returns
The day of the year of time, in the range 1-366, where 1 represents January 1.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 369
PI System Management Tools
Performance Equations
Exceptions
None.
Example
Yearday('*')
Yearday('t')
Day (page ), DaySec (page ), Hour (page ), Minute (page ), Month (page ), Second (page ), Weekday (page ), Year
(page )
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 370
PI System Management Tools
PI Services
PI Services
Use the PI Services tool to view, configure, and stop and start PI services for each connected Data Archive server.
By default, the status of each service is updated every 30 seconds; you can change this refresh rate. You can also
view the status, errors, and thread details for services used by the connected Data Archive server and export a
list of PI Services.
To open the PI Services Tool, from the System Management Tools pane, select Operation > PI Services.
View PI services
Each PI service and its status is listed by service name in the PI Services tool. One of these statuses is listed next
to each service name:
Use the check boxes next to each service to start or stop the service, configure the startup type, of export a list
of services.
You can view thread details in the Thread Details for Selection pane. Use the Session Record to view any errors
that occur when service statuses are retrieved.
PI process list
All PI processes listed in pisrvstart.bat and pisrvsvrappsstart.bat files are monitored for each connected Data
Archive server. Processes listed in pisrvsitestart.bat in either of the following formats are also monitored:
These files are located in the PI home directory under the \adm directory, for example:
c:\PI\adm\pisrvstart.bat
c:\PI\adm\pisrvsvrappsstart.bat
c:\PI\adm\pisrvsitestart.bat
Note: The pisrvstart.bat and pisrvsvrappsstart.bat files should not be modified.
Add processes
To add, run and monitor existing PI processes that are not already part of the core PI system, you can edit the
pisrvsitestart.bat file. Processes added to this file are started automatically when pisrvstart.bat is used to start
Data Archive. When a process is included in this file, the process is monitored by PI Services manager, provided it
is configured to run as a Windows service.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 371
PI System Management Tools
PI Services
• net start ServiceName, where ServiceName is the name of the service to be monitored. For example, the PI
Performance Monitor Interface basic version would use the syntax:
net start piperfmon_basic
• net start DisplayName, where DisplayName is the display name of the service to be monitored. For example
the same interface would use the syntax:
net start “PI-Performance Monitor Interface (basic version)”
• Note: Double quotes are required for pisrvsitestart.bat to function properly.
You may also add rem to either format to prevent automatic startup of the service. For example:
rem net start piperfmon_basic
rem net start “PI-Performance Monitor Interface (basic
version)”
The following is an example pisrvsitestart.bat file:
REM Non-Interactive Site Specific startup file. This file
REM should be modified to start site specific services
REM related to PI. This file will not be overwritten
REM on upgrade. Instead new versions will be written
REM as pisrvsitestart.bat.new for review and integration
REM by the PI Administrator.
REM $Workfile: pisrvsitestart.bat $ $Revision: 11$
rem
rem The following interfaces are not started by default.
rem Remove the remarks "rem" below to start the interfaces.
rem
rem net start piperfmon_basic
rem net start piping_basic
rem net start pisnmp_basic
rem net start pibagen
rem net start pirecalc
:theend
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 372
PI System Management Tools
PI Services
• Auto
Specifies that a service starts automatically with the operating system at each system startup. If an
automatically-started service depends on a manual service, that service is also started automatically.
• Manual
Specifies that a service is only started manually by a user through the Windows Service Control Manager, or
by an application.
• Disabled
Indicates that the service has been disabled and cannot be started by a user or application, unless its startup
type is changed to manual or auto.
• Set All to Auto
Specifies that the selected services start automatically with the operating system at each system startup. If
an automatically-started service depends on a manual service, that service is also started automatically.
• Set All to Manual
Specifies that the selected services are only started manually by a user through the Windows Service Control
Manager, or by an application.
• Set All to Disabled
Indicates that selected services have been disabled and cannot be started by a user or application, unless its
startup type is changed to manual or auto.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 373
PI System Management Tools
PI Services
Start PI services
1. Under Collectives and Servers, select the server or collective.
2. In the System Management Tools pane, select Operation > PI Services.
3. Select the service in the PI Services tool and click .
Note: Toolbar and right-click options are enabled or disabled, depending on the service status.
Stop PI services
1. Under Collectives and Servers, select the server or collective.
2. In the System Management Tools pane, select Operation > PI Services.
3. Select the service in the PI Services tool and click the Stop button .
Note: Toolbar and right-click options are enabled or disabled, depending on the service status.
• Error Messages
Select Suppress error messages about PI services that do not exist to stop messages from being logged
when a PI service is not found on a newly-connected Data Archive server.
• Update Rates
• Select Update service statuses every: and enter the frequency, in seconds, that the list of PI Services will
automatically update.
• Select Update thread information every: and enter the number of seconds that will lapse between the
time a user initiates a Stop and the process to stop the service will begin.
• Services
• Configure whether Start AllServices is selected in the PI Services tool will start services set to startup
type Automatic only, or both Automatic and Manual.
• Enter the wait time, in seconds for the PI Services tool display to reflect status changes for services that
are started and stopped.
• Thread information options
Select Do not query for additional information to allow the tool to retrieve and display connection and point
information for the thread requests. To view this information move the cursor over an item Thread Details
for Selection pane:
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 374
PI System Management Tools
PI Services
• Logging
Use these settings to determine which information is included in log files:
• Everything
• In use threads
• System threads
• Thread pools: Select Replication, Flush, RPC or EVQ
Note: The thread activity log is a local Comma-Separated Value (CSV) file stored locally for use with
thread information. It is automatically updated, but is not part of the PI Message or Windows log files.
Remote login
The PI Services manager uses the remote login features of the piartool utility to determine when the base PI
services have started up.
If a password is needed, you are prompted to enter a password for each connected server when accessing the PI
Services tool.
Note: The PI Services tool stores passwords only during the current SMT session.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 375
PI System Management Tools
PI Services
If the selected entry in the process Stop Service or Stop All Services
tree is a PI process, then this
means: Stop the selected PI process
on the selected server. If the
selected entry in the process tree is
a Data Archive server, then this
means: Stop all PI processes on the
selected server.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 376
PI System Management Tools
PI Services
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 377
PI System Management Tools
PI Version
PI Version
The PI Version tool lists complete version information for Data Archive subsystems on all connected Data Archive
servers. Subsystems are listed by server. Columns display the following information.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 378
PI System Management Tools
Ping
Ping
Use the Ping tool to view, create, and manage PI Ping points. PI Ping points store data about the response times
of Internet Control Message Protocol (ICMP) echo requests, or pings, between a computer where the PI Ping
Interface runs and any remote network computer. You can use PI Ping points to measure latency of a TCP/IP
network. PI Ping points can be useful when you diagnose network connection problems.
We provide the PI Ping basic interface with every Data Archive; PI Ping Interface is sold separately and allows
more points. For more information about PI Ping interfaces, see the OSIsoft Customer Portal.
PI Ping interfaces
There are three ways that interfaces are added to the Point Browser:
• The Point Browser automatically loads PI Ping Interfaces that are managed by PI ICU and displays a hierarchy
of interfaces and PI Ping points.
• You can also add interface nodes if you:
• Use the Enter Interface Information dialog provided by the Point Browser to manually enter the
interfaces, or
• Create an interface list batch file to import a list interfaces to the Point Browser.
To add an interface:
• Right-click on a Data Archive node, select Add Ping Interface, and one option:
• Select Manually Enterto enter the required information, including Interface Name, Point Source and
Interface ID into the Enter Interface Information dialog.
• Select Open Configuration File to open a batch (.bat) file containing the information needed to configure
the Ping interface.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 379
PI System Management Tools
Ping
Note: When an interface is added, PI Ping points belonging to the interface are automatically retrieved
by and visible in the Point Browser.
You can remove interfaces that users added to the Point Browser with the PI Ping tool:
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 380
PI System Management Tools
Ping
4. Change the properties displayed in the Edit Default Point Properties dialog box.
• The fields available match those provided in the Point Property pane . When entering values, the field
background turns yellow when an invalid character is entered.
• Press Enter to save or Esc to cancel all changes.
• Click the arrow to access the menu of options for properties that have a set number of choices, such as
Point Type.
• Use the Tag field to change the default format of automatically generated points. By default, PI Ping
points use this format:
[Prefix][Delimiter][Ping Source][Delimiter][Ping Target]
• where:
• Prefix is the prefix used in the name of new Ping points
• Ping Source is the name of the Ping source, either the Data Archive name or interface node name.
You can manually enter this value.
• Ping Targetis the name of the Ping target, either the host name or the IP address of the remote
machine.
• Delimiter is the delimiter used to separate each element in the name, which must be a single
character valid for the point name.
To change the format of the Tag default property:
i. Click the arrow next to the Tag field.
ii. Select the field for each default property formats and edit your changes. When entering values,
the field background turns yellow when an invalid character is entered.
You can configure whether the host name or IP address of the remote machine should be shown
in the InstrumentTag property of new PI Ping points. To change this setting, select the Ping
Target field and use the drop-down menu to select Host Name or IP Address.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 381
PI System Management Tools
Ping
• Step: 1
• Span: 10000
• Engunit: ms
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 382
PI System Management Tools
Ping
Note: To create PI Ping points for interfaces that you add to the Network Node List, see Add points from the
network node list.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 383
PI System Management Tools
Ping
• Edit properties for one or multiple points selected in the Point Browser. The number of points selected
appears in the toolbar.
• Select a property to display its description at the bottom of the pane.
• Click in a cell containing a property value to edit the value. Grayed values are not editable.
Note: You cannot edit properties of points belonging to a secondary Data Archive server. Some properties
are not editable when multiple points are selected.
• Click Sort to sort point properties in alphabetical order, or click Categorize to order them
categorically.
• Right-click a property and select an option from the context menu to Reset the property to its default value,
or to hide/display the property Description.
Note: Point properties that differ from default values are shown in bold font.
1. Click the Add New Node button or double-click an empty row to add a node to the Network Node List.
Note: The names of new points are created automatically based on the default point properties. See
Configure default point properties.
2. Click each entry in the list to edit:
• Host name
• IP address
• Tag value of the node
3. Select DNS to resolve host names or IP addresses using the default DNS server. If an address fails to resolve,
an error message appears in the Note column.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 384
PI System Management Tools
Ping
4. Select Ping Test to measure the ping value of each network node in the list and display the value in the Ping
column.
5. Enter a value in the Timeout field to set the time that ping measurement will allow before timing out. The
default value is 200ms.
To remove nodes:You can add nodes from the Network Node List to selected PI Ping interfaces in the Point
Browser.
6. Optional: Click the Delete button to remove a selected node.
1. Select the nodes you want in the Network Node List, and then either:
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 385
PI System Management Tools
Ping
• Select the desired network nodes in the Network Node List, select an interface in the Point Browser,
and then click Create .
• Drag selected nodes and drop them onto the desired interface directly.
• Drag selected nodes from the Point Browser to the Network Node List.
2. Click Save to save the points on the Data Archive server.
Note: You cannot use duplicate names for PI Ping points that exist on the same Data Archive server.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 386
PI System Management Tools
Point Builder
Point Builder
Use the Point Builder tool to view, create, and edit PI points.
View PI points
Use Tag Search to find PI points, then use the Point Builder to view a list of PI points and the Server, Point name,
Point Source, Point Class, Extended Descriptor, Point Security and Data Security for each point.
To clear the list of points in the Point Builder, right-click on the point and select Clear List.
To delete a PI point, right-click on the point you want to delete, and select Delete PI Point.
When a point is deleted, the Tag name, PointID and RecNo are logged to the local and server log files, as well as
the name of the user who is deleting the point and the machine on which PI SMT is run.
• Basic Search allows you to create a tag mask by specifying PI point attributes. The mask is used to find a list
of PI points on the server with matching attributes.
• Advanced Search provides a query-building interface with access to more point attributes for complex
searches.
• Alias Search provides a logical tree view of a Data Archive through the PI Module Database, which you can
use to select tags by their descriptive aliases.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 387
PI System Management Tools
Point Builder
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 388
PI System Management Tools
Point Builder
General attributes
To configure the Base Point Class attributes of a PI point, click the General tab. Type a point name in the Name
text box on the General tab and edit the point.
Name — Enter a name that uniquely identifies the point. Names can contain letters, numbers, certain characters,
and spaces. Names have the following constraints:
• The first character must be alphanumeric, an underscore (_), or a percent sign (%).
• Control characters, such as linefeeds or tabs, are not allowed.
• The following characters are not allowed:
* ' ? ; { } [ ] | \ ` ' "
Though you can specify any length name, some API functions truncate names to 12 or 80 characters, and PI SQL
Subsystem can only process tags with at most 1016 characters.
Note: The name text appears blue if the point does not exist on the selected Data Archive server. The text
appears black if the point exists, or a server is not selected, preventing validation.
PI Server — Select a Data Archive server from the list of connected servers under Collectives and Servers.
Descriptor—The descriptor field is optional.
Point Class—Select a point class from the list of point classes that belong to the server listed in PI Server.
Stored Values—Select "Real-time data" while configuring a historical PI point for real-time data, and "Future
data" when configuring a future PI point for forecast data.
Point Source—Specify a point source. A PointSource is an attribute that commonly specifies which PI Interface is
collecting the data for the PI Point.
Point Type — Select the point type for the point. A Performance Equation can use Point Types Digital, Float64,
Float32, Int32, Int16 and String.
Digital Set — Choose a digital set from the Data Archive server. This menu is activated only if the selected Point
Type is Digital. The System digital set is otherwise used.
Engineering Units (Eng Units) — Enter optional engineering units to describe the default unit of measurement
for the point.
Display Digits — Enter an optional number of display digits to determine the display precision of point values.
Extended Descriptor (Exdesc)— Enter an optional extended description for the point.
Source Tag — Enter a reference to the tag name of another PI point to use that point's data stream as the source
of the new PI point. A source tag is not required to create a point, but can be supplied. Click to display the Tag
Search dialog box to search for points.
Note: The Source Tag attribute cannot be used to replicate data directly from one point to another.
Archive attributes
To specify how PI point data is stored in the Data Archive server, click on the Archive tab and enter values.
Typical value — Enter a reasonable sample value for the point. For a numeric tag, a typical value must be greater
than or equal to the Zero, and less than or equal to the Zero plus the Span.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 389
PI System Management Tools
Point Builder
Zero — Enter the lowest possible value for the point, as the bottom of the range used for scaling float16 values
and trends. Recorded values lower than the Zero value are recorded in the Data Archive server with the digital
state Under Range.
A Zero value is required for numeric data type points, but not for non-numeric points. The instrument zero is a
logical zero value, and certain interfaces require that Zero and Span values match the instrument system range.
See your interface documentation for details.
Span — Enter the maximum difference between the top and bottom of the point range, as a positive value. The
Span value is used for scaling float16 values and trends and is required only for numeric data type points.
Recorded values above the sum of the zero and Span values are recorded in Data Archive server with the digital
state Over Range.
Scan — Enable Scan if an interface that supplies data to the point requires a scan flag. Interfaces that require a
scan flag do not update points when the flag is disabled. See your interface documentation for Scan attribute
requirements.
Archiving — Enable Archiving to store point values in the Data Archive server.
Step
Enable the Step attribute to treat archived point values as discrete units that would appear stepped on a chart.
An archived value is assumed constant until the next archived value, and adjacent archived values are not
interpolated. For example:
Disable Step to treat archived point values as a continuous signal, and linearly interpolate adjacent values. For
example:
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 390
PI System Management Tools
Point Builder
Note: By default, future PI points have their step attribute turned on (set to 1). This is because most future PI
Points store discontinuous signals (for example, a series of discrete predictions) for which linear interpolation
cannot be assumed. With the step attribute turned on, trends show a staircase pattern. Future PI points, by
default, also have compression, excmin, excmax and excdev turned off (set to 0).
The Step attribute also affects compression calculations. When enabled, a linear change of value greater or equal
to the compression deviation allows the point to pass compression.
The Step attribute is relevant only to numeric points. In general, data from continuous signals such as
thermocouples and flow meters should be archived without stepping. Data from discrete measurements such as
lab data and batch charge weight should be stepped.
To access the Step attribute setting:
1. Open PI SMT.
2. Navigate to Points > Point Builder.
3. Search for and select the point for which you would like to check the step attribute.
4. In the Archive tab, you can view/change the step attribute.
Shutdown
Use the Shutdown attribute to determine whether shutdown events are written. The timestamp of Shutdown
events normally represents the actual shutdown time of the Data Archive server as recorded by the Snapshot
Subsystem.
Beginning with PI Server PR1 SP1, shutdown events for most points are disabled. Unless you configure points to
receive shutdown events, only test points such as sinusoid and sinusoidu will receive shutdown events.
• Enable Shutdown to record server shutdown events as point values with the timestamp of the server
shutdown. If data is collected on the Data Archive server, shutdown events are helpful to clearly indicate
gaps in data collection.
• Disable Shutdown when point data is collected on a distributed collection nodes, as buffering services
collect, manage and retain the data until the server is up and running again. Disabled Shutdown PI points
have a configurable attribute to determine whether shutdown events are written.
Note: The default behavior of Data Archive is to write the SHUTDOWN digital state to all PI points when Data
Archive is started. The timestamp that is used for the SHUTDOWN events is usually updated every 15
minutes, which means that the timestamp for the SHUTDOWN events will be accurate to within 15 minutes
in the event of a power failure.
Compression
Enable compression to apply compression algorithms and save only event values that indicate a change in point
value. When disabled, all values collected and sent to the snapshot, including redundant values, are saved in the
PI archive.
Note: By default, future PI points have compression turned off (set to 0).
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 391
PI System Management Tools
Point Builder
Enable compression for all real-time points. Digital, BLOB and string data type values pass through compression
only when the value changes. Compression is typically turned off for points that collect sample data, such as lab
data, or other sparse data streams.
Deviation
Exception and compression deviation algorithms can be used to filter erroneous and redundant data before it is
recorded in the archive.
Note: By default, future PI points have excmin, excmax and excdev turned off (set to 0).
Each algorithm is based on three specifications:
Compression deviation
Once events are sent to the PI Snapshot subsystem, a compression algorithm can further filter data and reduce
storage to only significant values as they are moved into the archive. An event is recorded:
• After a specified minimum duration of time since the previous event, if it exceeds a specified deviation in
value from that event.
• After a specified maximum duration of time since the previous event.
• When activated, compression reporting filters events and stores only periodic values (including duplicates),
unless an event represents a significant change in the short-term trend of values.
To turn off compression and archive every event that passes exception reporting, disable the Compressing
attribute.
Compression Deviation — Enter the deviation in value required to record an event, either as a number of
engineering units, or as a percentage of the point's Span value.
For most flows, pressures, and levels, use a deviation specification of 1 or 2 percent of Span. For temperatures,
the deviation should usually be 1 or 2 degrees.
Min Time —Enter the minimum time that must elapse after an event before a compressed value can be
recorded. The minimum time should be set to 0 if exception reporting is activated for the same point.
Max Time — Enter the maximum time that can elapse after an event before automatically recording the next
event as a compressed value. The recommended maximum time is one work shift (for example, 8 hours). If this
value is too low, the compression effects are too limited to save significant archive space. If this value is too high,
useful data may be lost. Events that reach the Data Archive server in asynchronous order bypass the
compression calculation and are automatically recorded to the archive.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 392
PI System Management Tools
Point Builder
The compression specifications consist of a deviation (CompDev), a minimum time (CompMin), and a maximum
time (CompMax).
Events are also archived if the elapsed time is greater than the maximum time. Duplicate values will be archived
if the elapsed time exceeds CompMax. Under no circumstances does this cause Data Archive to generate events;
it only filters events that are externally generated.
The most important compression specification is the deviation, CompDev. For non-numeric tags, CompDev and
CompDevPercent are ignored. They will be displayed by applications as zero.
Note: CompDev specifies the compression deviation in engineering units; CompDevPercent specifies the
compression deviation in percent of Span. If you change one, the other is automatically changed to be
compatible. If you try to change both at once, CompDevPercent takes precedence.
Exception deviation
Exception reporting is used to define the precision of a data stream, and the amount of deviation that
constitutes a significant change. Most interface programs can execute an exception-reporting algorithm to
determine when to send a point value to the PI Snapshot subsystem. An exception is an event that occurs either:
• After a specified minimum duration of time since the previous event, while exceeding a specified deviation in
value from that event.
• After a specified maximum duration of time since the previous event.
This means that when activated, exception reporting filters events and stores only periodic values, including
duplicates, unless an event represents a significant change in the short-term trend of values. An exception event,
both timestamp and value, is sent with the previous event to the Snapshot.
• Exception Deviation
The deviation in value required to store an event, either as a number of engineering units, or as a percentage
of the point's Span value. The exception deviation should be less than the compression deviation by at least
a factor of 2, and is ignored for digital, string and BLOB data type points.
• Min Time
The minimum time that must elapse after an event before an exception value can be stored.
• Max Time
The maximum time that can elapse after an event before automatically storing the next event as an
exception value.
Set the minimum and maximum time values to 0 to turn off exception reporting.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 393
PI System Management Tools
Point Builder
You can have different access permissions for a point's attributes than for the point's data. For example, a user
might be allowed to edit a point's data, but not to edit that point's attributes.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 394
PI System Management Tools
Point Builder
• Data Security
To view and edit point data, you also need read access to point security. If users do not have permission to
view a point's attributes, they cannot see that point's data, in most cases. (This is because client applications
need access to the point attributes in order to get the data.)
• Point Security
To view point attributes, you need read access to PIPOINT, and read access to the point security for the point
itself. Similarly, to edit a point's attributes, you need read/write access to PIPOINT, and read/write access to
the configuration for the point itself.
The following table lists required access permissions for basic tasks.
View point data Read access to PIPOINT, data security for that point,
and point security for that point
Edit point data Read-write access to data security for that point; read
access to point security for that point and PIPOINT
View point attributes Read access to PIPOINT and to point security for that
point
Edit point attributes Read access to PIPOINT and read-write point security
for that point
Add a user to data security Read-write access to both data security and point
security
Edit a user's data security settings Read-write access to both data security and point
security
• Default access permissions for all new points (both point data and point configuration) match the access
permissions for the point database (PIPOINT). You can set permissions for PIPOINT using the Database
Security plug-in for PI SMT.
• Similarly, default access permissions for root modules match the access permissions for the module database
(PIModules). You can set permissions for PIModules in the Database Security tool. New modules below the
root level inherit from their parent.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 395
PI System Management Tools
Point Builder
Set point and data security permissions for PI Server 2010 and later
PI Server 2010 (Data Archive 3.4.380) and later versions allow you to specify different access permissions for
multiple PI identities, PI users, and PI groups. To set access permissions for a point, first select the point in Point
Builder, then click the Security tab.
Identities, users, and groups that have defined access permissions for the selected point appear in the Point
Security and Data Security lists. To see the access permissions for that identity, user, or group, select it in the list.
You can add or remove identities, users, and groups using the Add and Remove buttons.
The possible levels of access are read and write. The possible access rights string can be "r", "w", "r,w" or ""
(null). Note that there is no level for deny, as there is in Windows.
1. Select the point in Point Builder, then click the Security tab.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 396
PI System Management Tools
Point Builder
2. Use the drop-down lists to choose an owner and a group and to specify access permissions for the owner
and group. The possible levels of access are read and write. The possible access rights string can be "r", "w",
"r,w" or "" (null). Note that there is no level for deny, as there is in Windows.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 397
PI System Management Tools
Point Builder
Rename PE points
1. Under Collectives and Servers, select the server or collective.
2. In the System Management Tools pane, select Points > Performance Equations.
3. Select the point in the Performance Equations tool, right-click, and choose Rename.
4. Enter a name in the New name field and click OK.
Note: If an error occurs with the rename, OK is disabled and a appears. Hover your cursor over it to view
the error message.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 398
PI System Management Tools
Point Classes
Point Classes
Use the PI Point Classes tool to view PI attributes sets and PI point classes.
• PI attribute sets
Collections of PI point attributes that are named. One or more attribute sets are used to define point classes.
Users apply lists of attributes and attribute sets to create or modify a point within a given PI Point Class.
• PI point classes
A collection of one or more attribute sets. Examples of point classes include Base, Classic, Alarm, and
Totalizer. All point classes include the attributes from the Base attribute set. Other point classes add
attributes needed to provide functionality for certain processes. The PtClassName attribute specifies the
point class for every point.
For more information, including details on specific point classes, see the PI Server topics under Point classes and
attributes.
Results
In the attribute list, the default values for attributes are listed in the right column of the property grid. When you
select an attribute, its name and type are listed at the bottom of the property grid.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 399
PI System Management Tools
Point Source Table
Point Sources
Point sources are listed for all connected Data Archive servers in the PI Point Source Table tool, with four
columns to describe point source attributes:
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 400
PI System Management Tools
Point Source Table
9 Ramp_soak
# PI PerfMon
$ PI SNMP
@ PI Alarm
C PI Performance Equation
G Alarm group
J PI Ping
Q PI RTSQC
R Random
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 401
PI System Management Tools
Point Source Table
T Totalizer
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 402
PI System Management Tools
Reason Tree
Reason Tree
Use the Reason Tree tool to manage a structured collection of reason codes. A reason code, which consists of a
name and description, provides a convenient way to standardize operator comments in Data Archive.
Use the Reason Tree tool to view reason codes beneath a hierarchical tree view of servers. Expand the server
icons to view reason codes for that server. You can create, move, edit, and delete reason codes in the Reason
Tree tool.
To open the Reason Tree tool, select Operation > Reason Tree.
Note: If the server login fails, the server icon has a red X on it. Click the refresh button ( ), or right-click the
server and select Refresh, to attempt a re-connection. If that fails, see Connection checking.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 403
PI System Management Tools
Reason Tree
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 404
PI System Management Tools
Reason Tree
You cannot delete a reason code from a secondary server of a collective. When you select a reason code
under a secondary server, the Delete button is disabled.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 405
PI System Management Tools
Security settings
Security settings
You can make the Data Archive server more secure by disabling less secure types of authentication. If possible,
disable the least-secure authentication method, which is explicit login accounts on the Data Archive server (PI
user accounts). If you are upgrading an existing Data Archive server , you might need to upgrade your security
configuration before disabling explicit logins.
For more information about configuring security, see Overview of Data Archive security.
Before you enable this security setting, create temporary passwords for all your user accounts. Ask users to
change the passwords immediately.
On new Data Archive installations, explicit logins are disabled by default. During upgrades, you have the option
to disable them.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 406
PI System Management Tools
Security settings
When API trusts are disabled, you can only access the Data Archive server through piconfig or through
Windows authentication. The API does not support Windows authentication, so all applications that connect
through the API are locked out. This can include PI interfaces. This is not a recommended security
configuration for many Data Archive servers.
• AD Authentication (Kerberos)
• Local Windows authentication (NTLM)
• PI Trusts
When you define a PI trust, you can choose how secure the trust will be. You can create PI trusts for API
connections or for SDK connections. However, since the SDK supports Windows authentication, you should
not create PI trusts for SDK connections.
• Data Archive User Accounts and Passwords (explicit logins)
Local Data Archive user accounts are the least secure way to authenticate on the Data Archive server. We do
not recommend using this method.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 407
PI System Management Tools
Snapshot and Archive Statistics
All data passes through both the snapshot and the archive subsystems. Indicators available in the Snapshot and
Archive Statistics tool can alert you to potential data-flow problems. For example:
• Out-of-order events are events that arrive with an older timestamp than the current value. Out-of-order
events may indicate that there is a clock problem on the Interface node.
• Rising event numbers on the Snapshot Overflow Queue indicates that the archive is not accepting new data
or cannot keep up with the pace of the data transfer. This situation could have a number of causes and
should be remedied immediately.
To open the Snapshot and Archive Statistics tool, select Operation > Snapshot and Archive Statistics under
System Management Tools.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 408
PI System Management Tools
Snapshot and Archive Statistics
Note: Click Refresh to manually update the display to reflect current values.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 409
PI System Management Tools
Snapshot and Archive Statistics
• Type:
The statistical source type of the value, either archive or snapshot.
• Counter:
The descriptive name of the counter to indicate the measurement.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 410
PI System Management Tools
SNMP
SNMP
Note: This tool is no longer included with PI Server. For new PI Server installations, if you want to use this tool,
you need to download and install this interface separately.
Use the SNMP tool to build and manage points for the PI SNMP Interface. PI SNMP points enable you to monitor
IT resources.
SNMP (Simple Network Management Protocol) is a generic protocol used to make requests between an SNMP
manager and the SNMP agent, or remote device. In the case of AVEVA™ PI System™, the PI SNMP Interface is the
SNMP manager.
When you use the PI SNMP utility to associate PI Points with SNMP variables or Object Identifiers (OIDs), you can
use PI SNMP points to gain important insights into network management challenges such as port traffic, system
uptimes, and environmental statistics.
To open the PI SNMP tool, select IT Points > SNMP in the System Management Tools pane.
PI SNMP points support SNMP versions 1, 2c, and 3, excluding SHA decoding.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 411
PI System Management Tools
SNMP
.1.3.6.1.2.1.2.2.1.10
.1.3.6.1.2.1.2.2.1.16
A particular occurrence of an OID is called an instance. This instance number is added to the end of the OID.
Continuing with the examples above, you can see that the number of octets received on the first physical
interface is given by
interfaces.ifTable.ifEntry.ifInOctets.1
.1.3.6.1.2.1.2.2.1.10.1
For OIDs where there is only a single occurrence, a zero is used. For example,
system.sysUptime
is the time since the network management portion of the system was last reinitialized. Thus, the only instance of
system.sysUptime is
system.sysUptime.0
COUNTER values
Some OID values are given in terms of a COUNTER. A COUNTER is an unsigned 32-bit integer ranging from 0 to
4,294,967,295.When a COUNTER value reaches the maximum, it rolls over to 0. In particular, these OIDS are both
COUNTERS:
interfaces.ifTable.ifEntry.ifInOctets
interfaces.ifTable.ifEntry.ifOutOctets
Therefore, if the PI SNMP points use the raw values for these OIDs, such values will continuously increase
numbers up to the maximum.A graphical trend of these numbers will probably not be meaningful.
Alternatively, you can configure the PI SNMP Interface to retrieve COUNTER values per unit time. If Location2 is
set to 1, the PI SNMP Interface retrieves the difference between two successive readings divided by the scan
time. For example,
scanned value = 2000
previous value = 200
scan time = 1 minute
stored value = (2000 – 200)/60 = 30
A graphical trend of such values will be more meaningful because it provides the number of octets transferred
per second.
Note: For more detailed information on SNMP, consult SNMP, SNMPv2, SNMPv3, and RMON 1 and 2, Third
Edition, by William Stallings (Addison-Wesley, 1999, ISBN 0201485346), or your Windows help files.
The PI SNMP Interface is the network node that supplies data for PI SNMP points. You can use the PI SNMP utility
to update the PI SNMP Interface.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 412
PI System Management Tools
SNMP
Note: SNMP interfaces must be configured with PI Interface Configuration Utility (PI ICU) to be available to SNMP
point builder. Manually installed interfaces are not visible in this utility.
The PI SNMP point builder uses the following process to build SNMP points:
1. Select the PI SNMP Interface for which you will build points on the Tag Settings tab.
2. Configure the SNMP agent on the interface and select specific OIDs on the SNMP Settings tab.
3. Select OIDs and build PI points using SNMP MIBs and templates on the Build Tags tab.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 413
PI System Management Tools
SNMP
• Omit community String from Extended Descriptor — Select to exclude the community string in the
extended descriptor field. Note that the administrator then becomes responsible for maintaining a list of
community strings, as described in the SNMP Interface manual.
• Use tag name substitution table — Select to scan a substitution dictionary lookup table when building a
point. If strings in the lookup table exist in the tag name, they are replaced by the matching table entry.
1. On the SNMP Settings tab, enter an Agent Prefix to identify the interface node as the parent of SNMP PI
points built from the interface.
2. Enter the Agent IP/Hostname of the device and an SNMP Username for version 3 connections.
3. Enter credentials to connect to and poll an SNMP agent.
• For SNMP versions 1 and 2, the credential is a Read Community String, usually public.
• For SNMP version 3, you must provide a username and possibly an Authentication and Privacy
Password.
4. Click Save to File to save the information to an agent file in XML format.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 414
PI System Management Tools
SNMP
Select OIDs
Points are built for each interface-OID combination, based on the SNMP settings and the OIDs you select in the
Build Tags tab. See Map OIDs to PI Points.
1. Select the Build Tags tab to view the OID tree. Each OID is an entry in the MIB-II tree which stores definitions
for SNMP messages.
All OIDs in the interfaces branch of the MIB-II table refer to the interfaces selected in the panel. In other
words, if you select the IfIndex OID, these points are built for each selected interface:
iso.org.dod.internet.mgmt.mib- 2.interfaces.ifTable.ifIndex.ifInOctets
Typically, you want to choose a number of OIDs as the basis for a collection of PI points that communicate
detailed information about the status of the interface.
2. Select each OID you want to build points for.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 415
PI System Management Tools
SNMP
1. Select Create tags on PI Server and select an available server from the menu.
2. Click Create Tags.
Note: If you try to name a PI SNMP point with a name that is already used by an existing PI point, you are
prompted whether to skip or overwrite the existing point.
3. To write to a CSV file:
a. Select Write tags to CSV File and navigate to the location where you want to save the file.
b. Click Create Tags.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 416
PI System Management Tools
SNMP
• General: allows you to change the sampling interval and displays fixed PI Interface information.
• Advanced: includes typical point attribute controls and highlights any attributes that differ across selected
tags in yellow.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 417
PI System Management Tools
SNMP
1. Click create in the Template Management area of the Build Tags tab.
2. Use the Template Builder to update default point attributes select templates to load.
3. Click Apply.
4. Click Save.
Option Purpose
Rename Highlighted Entries Display the Rename Tag dialog to rename highlighted
entries
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 418
PI System Management Tools
SNMP
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 419
PI System Management Tools
SNMP
compdev 250
compmax 28800
compmin 0
compressing 1
convers 1
digitalset N/A
engunits Bytes/Sec
excdev 0
excdevpercent 0
excmax 600
excmin 0
compdev 250
compmax 28800
compmin 0
compressing 1
convers 1
digitalset N/A
engunits Bytes/Sec
excdev 1
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 420
PI System Management Tools
SNMP
excdevpercent 1
excmax 600
excmin 0
compdev 0.0002
compmax 28800
compmin 0
compressing 1
convers 1
digitalset N/A
engunits Errors/Sec
excdev 0
excdevpercent 0
excmax 600
excmin 0
compdev 0.0002
compmax 28800
compmin 0
compressing 1
convers 1
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 421
PI System Management Tools
SNMP
digitalset N/A
engunits Errors/Sec
excdev 0
excdevpercent 0
excmax 600
excmin 0
compdev 0
compdevpercent 0
compmax 28800
compmin 0
compressing 1
convers 1
digitalset PortStatus
engunits N/A
excdev 0
excdevpercent 0
excmax 600
excmin 0
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 422
PI System Management Tools
SNMP
compdev 0
compdevpercent 0
compmax 28800
compmin 0
compressing 1
convers 1
digitalset PortStatus
engunits N/A
excdev 0
excdevpercent 0
excmax 600
excmin 0
compdev 2
compdevpercent 2
compmax 28800
compmin 0
compressing 1
convers 0.00000011574
digitalset N/A
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 423
PI System Management Tools
SNMP
engunits Days
excdev 1
excdevpercent 1
excmax 600
excmin 0
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 424
PI System Management Tools
SQC Alarms
SQC Alarms
Use the SQC Alarms tool to manage real-time SQC alarms, a system of related PI points that record real-time SQC
values. The alarms use real-time extensions stored in PI Alarm Subsystem.
If you run PI SQC Alarm Subsystem, a separately licensed enhancement to the standard Data Archive, your Data
Archive can evaluate SQC pattern tests and manage the alarms generated from those tests.
You can also build SQC alarms using tools like piconfig and PI Builder. Since proper operation of an SQC alarm on
the Data Archive server relies not only on the configuration of the alarm itself, but also on the order in which the
points associated with the alarm are created; you might encounter difficulties when using those tools. You
eliminate such potential problems when you create and configure SQC alarms with PI SMT.
When using the SQC Alarms tool, you should be familiar with statistical quality control (SQC) terms and principles
and understand basic PI point configuration.
• To retrieve and display SQC alarms, click the Search button . You can filter your search results and retrieve
only specific tags by entering a search mask in the Tag Mask field. For example sqc* would load all alarms
beginning with the letters sqc. The default mask is *, which loads all alarms.
• To refresh the current values of all listed SQC alarms and their associated points, click the Refresh button
or press F5.
• Note: If you have many alarm points and you want to display values more quickly, use Shift+click or Ctrl+click
to select only the alarms you want to refresh.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 425
PI System Management Tools
SQC Alarms
• Execution State: The current value of the reset point monitored by the SQC alarm, which tells SQC Alarm
Subsystem whether the alarm should be running normally, placed on hold, or whether alarm is in a
transitional state. An example of a transitional state is Alarm-On; this state indicates that the alarm had been
placed in hold, but has been turned on again and is waiting for a new source tag event.
• Description: The descriptor attribute of the SQC alarm point.
1. Click Edit SQC Alarm on the toolbar, or right click and choose Edit SQC Alarm.
The SQC Alarm wizard appears.
2. Follow the instructions on the wizard dialog boxes to make the desired changes to the alarm configuration.
For details on the parameters you specify in the wizard, see SQC Alarms wizard.
3. Click Finish to save the SQC alarm and close the wizard.
• Server: The Data Archive server where the alarm point is defined and stored. This attribute may not be
changed once the alarm point is created.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 426
PI System Management Tools
SQC Alarms
• SQC Alarm Tag Name: The tag name for the SQC alarm point. This attribute may not be changed once the
alarm point is created.
• Description: A functional description of the alarm which is used for the descriptor attribute of the alarm
point.
• Alarm Group: Select a group if you want to associate the new SQC alarm with an existing PI alarm group on
the server.
• Clear on Subsystem Startup: Select to clear existing alarm calculations on startup. When not selected, the
subsystem seeds alarm calculations with archive values from the source point.
• Clear on Control Limit Change: Select to start calculations when limit point values are changed. When not
selected, the alarm retains the existing pattern test buffers.
• Auto-Acknowledge: Select to automatically acknowledge alarms.
• SQC Alarm Priority: Specify an SQC alarm priority when not using the Auto-Acknowledge feature.
Note: If the Auto-Acknowledge check box is selected, the SQC Alarm Priority property is set to 0 and SQC
Alarm Priority is disabled.
• Position: Choose to add identifying extensions to alarm point tag names as prefixes or suffixes.
• Delimiter: Specify the delimiter to add between the SQC alarm tag name and the extension.For example, if
your alarm name is called SQCAlarmTag1 and you have a suffix extension with a . delimiter, the UCL tag
name is SQCAlarmTag1.UCL. If you have a prefix extension and a - delimiter, the tag name is UCL-
SQCAlarmTag1.
• Generate Optional Points: Check to create points that you may need for your specific implementation of
SQC. For example, if you need to see all of the pattern tests that fail in addition to the highest precedence
test, then you should create the optional status point.
• Extensions: Specify the extension to use for each related alarm tag type. The extensions are saved as default
values for future alarm points.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 427
PI System Management Tools
SQC Alarms
• Source Tag: The source tag provides data to which the pattern tests are applied. For a chart of individuals
this can be any point on the same Data Archive server. For all other chart types, the source tag is created by
the wizard and its data comprise appropriately aggregated samples of the raw data tag.
Different statistical calculations and corresponding chart types require different types of source points. An
Individuals chart allows any type of source point. EWMA chart types require a Performance Equation point.
All other chart types require a Totalizer source point.
• Chart Type: Choose a chart type. One of eight charts may be selected to define the calculations performed
and display the SQC results in PI ProcessBook SQC charts.
The configuration options provided change depending on the selected chart type:
• Raw Data Tag: If you are creating a non-individuals type SQC alarm, then enter or search for the name of the
point containing the raw data to be sampled.
• Event or Time Based Sampling: Select a sampling mode to choose how events are included in a sample
group. The sampling configuration greatly affects the behavior of the source point.
For event-based sampling, simply specify the number of Events per Sample. For time-based sampling,
specify an offset from midnight and an interval of time to define windows used for sampling.
• Filter Expression: Enter an optional filter expression using PI Performance Equation syntax to filter out any
values that you do not wish to include in sampling.
• Lambda and Scan Class: Enter values for these items when specifying an EWMA (exponentially-weighted
moving average) chart, where the source point is a Performance Equation point of the following form:
'RawDataTag' + if badval('SourceTag') then <Lambda> *
PrevVal('RawDataTag') else <Lambda> * PrevVal('SourceTag')
• The Scan Class refers to a valid scan class of the Performance Equation Scheduler.
Associated points
Associated points generally provide limit and reference values used in SQC calculations.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 428
PI System Management Tools
SQC Alarms
Perform the following steps to specify the points required for SQC calculations:
• Use the provided fields to enter or change the tag names of associated points, if necessary. You can also click
the ellipsis button to search for tags on the Data Archive server. If you are creating a new alarm using
Automatic Point Generation, the tag names are already created for you.
• Use the provided fields next to each tag name to enter initial limit values for each point.
• Check the box next to each optional point type you want to add, then enter a tag name or click to
search for a tag on the server.
The following default points must be defined for a real-time SQC alarm:
Reset Tag The point whose value sets the execution status of
the pattern test evaluation
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 429
PI System Management Tools
SQC Alarms
UCL Tag The point whose value is the upper control limit for
the chart
CL Tag The point whose value is the center line for the
chart
LCL Tag The point whose value is the lower control limit for
the chart
The following optional points can be associated with a real-time SQC alarm:
Test Status Tag The point whose value corresponds to all pattern
tests currently in alarm condition
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 430
PI System Management Tools
SQC Alarms
Perform the following steps to specify conditions for the SQC pattern tests:
• Select the checkbox next to each pattern test you want to apply in the SQC alarm. Values that reach the
specified limits of any active pattern test will place the SQC point in alarm state. By default only the 3 sigma
limit test is applied.
• For selected pattern tests, specify the number of values (X) out of a number of sampled values (Y) that are
Above or Below the corresponding pattern test limits.
• The Western Electric suggested patterns are shown by default, and by default tests are applied on both sides
of the center line.
• OutsideControl: Counts the number of samples outside the control limit on one side of the center line.
• OutsideTwoSigma: Evaluates the sample against a limit drawn 2/3 of the way between the center line and
the control limit.
• OutsideOneSigma: Evaluates the sample against a limit drawn 1/3 of the way between the center line and
the control limit.
• OneSideofCL: Counts the number of samples on one side of the center line.
• Stratification: Counts the number of samples that fall within the upper and lower One Sigma limits on both
sides of the center line.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 431
PI System Management Tools
SQC Alarms
• Mixture: This test counts the number of samples that fall outside the upper and the lower One Sigma limits
on both sides of the center line.
• Trend: Counts the number of samples which are monotonically increasing or decreasing.
Note: The term sigma generally refers to one standard deviation in a PI SQC alarm. SQC control limits are not
limited to three times the standard deviation of process measurements. Control limits may be set to other
values depending on process needs. Thus sigms, as used in the PI SQC alarm pattern tests is one-third the
difference between the value of the center line and the control limits.
• Normal: The SQC Alarm point is running and pattern tests should be evaluated.
• Hold: Evaluation of pattern tests should be suspended.
• Clear: Clear out the point's pattern test buffers (used in conjunction with the Normal state).
Delete alarms
You can delete alarm points from the system as needed. Remember that deleted points are removed
permanently. In many cases the Source Tag holds all the history for an instrument in the control system, or from
the lab data entry system. Since deleting such points deletes ALL history associated with them, be sure to verify
the value of tags before deletion.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 432
PI System Management Tools
SQC Alarms
2. In the System Management Tools pane, select Alarms > SQC Alarms.
3. Select the alarm or alarms that you want to delete in the list view.
4. Click the Delete SQC Alarm button on the tool bar.
You are prompted to delete the associated SQC alarm points.
5. Select corresponding check boxes to confirm the points you want to delete.
6. Click Delete to delete the SQC alarm point and specified associated points from the Data Archive server.
Note: Some alarms may share associated points, and deleting these points cause problems for other alarms
that reference them. Verify these connections before deleting associated points.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 433
PI System Management Tools
Stale and Bad Points
• The Stale state indicates that the PI point has not updated within a specified time. By default, a tag is stale if
the current value is over four hours in the past.
• The Bad state indicates that the current value of a PI point is a digital state from the System digital state set
in the archive. These values are inserted into the current value when an error condition occurs. For example,
a state of I/O Timeout is a common symptom when a PI interface determines it has lost contact with the
device it is configured to read.
• Not all digital states indicate errors. For example, the Scan Off digital state marks points that are no longer
used, such as points from obsolete equipment, while the PtCreated digital state indicates a new point that
has not yet begun collecting data. You can exclude specific digital states when you search for stale or bad
points.
• You cannot use the Stale and Bad Points tool to diagnose future PI points.
Note: For information on monitoring and troubleshooting Data Archive, see the Data Archive Administration
guide.
• No network connection between the Data Archive server and the interface.
• The interface computer has been shut down or has lost connection with the device.
• Someone has changed the point attributes.
If point values are stale or bad for no known reason, you should immediately determine the cause.
When you find points that are no longer useful, such as points that represent data from obsolete equipment,
decommission them.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 434
PI System Management Tools
Stale and Bad Points
Exclude tags with scan off Excludes decommissioned PI points, that is, points
that are not collecting data because their scan point
attribute is set to Off.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 435
PI System Management Tools
Stale and Bad Points
To repeat the most recent search, click the Quick or Advanced tab and then click on the toolbar.
Column Description
Note: Right-click anywhere in the point list to restart the search (Go), to Export a list of points to a CSV file, or to
Copy the point list to the Clipboard.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 436
PI System Management Tools
TCP Response
TCP Response
Note: This interface is no longer included with PI Server. If you want to use this tool, you will need to download
and install this interface separately.
Use the TCPResponse tool to measure the response time of various network services.
The TCPResponse tool can obtain the actual result (not the response time) of a DNS operation.
The TCPResponse tool facilitates the creation and maintenance of TCPResponse points. It also supports HA (High
Availability) Data Archive. Use the tool to browse TCPResponse points in primary and secondary Data Archive
servers, and create and edit TCPResponse points in primary Data Archive servers.
• Point browser
• Network Node list
• Point Property pane
Details of the layout and functions of each component are explained in the following sections.
Point Browser
The Point Browser shows the hierarchy of Data Archive servers, interfaces and TCPResponse points. Click a point
node to select a TCPResponse point, use Ctrl or Shift key to select multiple points, or use Alt key to select points
under the selected interface or server. When points are selected, you can check or edit detail properties of the
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 437
PI System Management Tools
TCP Response
selected points in Point Property Pane. In Point Browser, you can also change the name of a single point by
clicking the point or using F2 key.
When the plug-in starts up, TCPResponse interfaces that are managed by ICU will be loaded to Point Browser
automatically. For TCPResponse interfaces that are not managed by ICU, you can add the interface to Point
Browser manually. right-click on a server. A context menu appears to let you manually add an interface. You have
the following two options:
Once a TCPResponse interface is added, the plug-in will search the Data Archive server for TCPResponse points
belonging to the interface and show these points in Point Browser.
Note that the manually added interfaces have a different icon ( ) compared to the icon of interfaces that are
managed by ICU ( ).
The information of manually added interfaces are stored in local machine where SMT host is running. These
interfaces will be automatically loaded when the same Windows user starts up PI TCPResponse Plug-in in SMT
host. To remove manually added interfaces, right-click the interface node and click Remove Interface.
When you right-click an interface, you see a context menu that includes the following options:
You can right-click on a point to edit and select points. The available menu options include:
• Cut (Ctrl+X)
Cut selected points. This option will be disabled if the interface belongs to a secondary Data Archive server.
• Copy (Ctrl+C)
Copy selected points.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 438
PI System Management Tools
TCP Response
• Delete (Del)
Delete selected points. Note that this action removes the selected points from Data Archive permanently.
This option will be disabled if the interface belongs to a secondary Data Archive server.
• Rename (F2)
Rename the selected point. This option is only available when you select one point, and the point does not
belong to secondary Data Archive server.
• Select All (Ctrl+A)
Use this option to select all points in the tree.
• Search Points (Ctrl+F)
This option brings up Search Points dialog box. Its function is the same as the Advanced Search button ( ).
The key combinations shown in the bracket are the keyboard shortcuts for these functions. After you use Cut and
Copy functions, you can paste these points to an interface. Note that, a list of points’ name is also copied to the
system clipboard, so you can paste these points’ name to other tools, such as Microsoft Excel.
Save button
The Save button ( ) saves the modified or new points in the Point Browser. The modified points are
characterized by the icon ( ). The new points are characterized by the icon ( ).
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 439
PI System Management Tools
TCP Response
• Prefix
The prefix used in the name of new TCPResponse points.
• TCP Source
The name of the source that sends out the service request. You can use the Data Archive name or interface
node name as the name of the source. You can also manually enter a name of the source.
• TCP Target
The name of target that the service request is sent to. You can choose to use either the host name or the IP
address of the remote machine as the name of the target.
• Delimiter
The delimiter is used to separate Prefix, TCP Source and TCP Target. It must be a single character and valid for
point name.
The background of above four fields will turn to yellow when you type in any invalid character for a tag. After you
finish editing the tag configuration, use Enter key or click outside the tag configuration dialog to accept the
changes, or you can press Esc key to cancel all changes.
After you finish making changes on the default point properties, click the OK button or close the dialog to save
these changes, or you can click Cancel button to discard all changes. Note that these changes will be saved in
local machine once you click Accept.
Search points
The TCP response tool can search all points shown in Point browser and select the first point containing the keys
that you type in the Find text box.
You can find the next point containing the keys by clicking Find Next . If you click the drop-down button beside
the Find Next button, you can select Advanced Search which opens the Search Points dialog.
Use the Search Points dialog to browse through or select all points that match the specified search criteria.
Refresh button
The Refresh button ( ) causes the plug-in to re-load the Data Archive servers, interfaces and points listed in
Point Browser. A warning message will pop up to remind you to save the modified points. If you decide not to
save the changes, these changes will be discarded permanently.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 440
PI System Management Tools
TCP Response
name, IP address, tag and service type by clicking each entry in the Network Node list. A context menu is
available to change the service type of a collection of nodes. Select nodes in the list and right click, you will see a
context menu to change service type. If the Auto Measure box is checked, the content in the Value column is
refreshed, which may take a certain amount of time.
Delete button
The Delete button ( ) removes the selected nodes in the Network Node list.
Create button
The Create button ( ) adds the selected nodes in the Network Node list to the selected TCPResponse interface.
These points are not created in the Data Archive server until you save them.
There are two ways you can create new TCPResponse points for the selected network nodes to a desired Data
Archive server:
1. Select the network nodes that you want to create TCPResponse points
2. Select an interface or any single point under an interface in Point Browser.
3. Click the Create button ( ) to create TCPResponse points for these nodes in the server.
You can also use mouse to drag selected nodes in Network Node List and drop to the desired interface directly.
Similarly, you can drag selected points in Point Browser to Network Node List. Note that you cannot drop points
to a secondary Data Archive server in a collective.
Note: If a point already exists with the same name on the selected Data Archive server, or another new point
with the same name was already added to the Point Browser under the same Data Archive server, the new point
will not be able to add to the tree, and it will stay in the Network Node list and be highlighted. A message will
pop up and summarizes the number of network nodes that failed to create points.
Import button
The Import button ( ) brings up an open file dialog. You can select the CSV file that contains a list of targets,
which can be host names or IP addresses. During the process of importing, you can click the stop button ( ) to
stop the importing process. After the importing process is finished, a message will be shown in the Session
Record of SMT host to summarize the number of network nodes imported.
Note: Each line in the CSV file should contain only one target. You can also import a previous exported list (see
below).
Export button
The Export button ( ) is used to export the Network Node List to a CSV (comma separated values) file. You can
import this file to the plug-in again later.
Stop button
The Stop button ( ) is used to stop the process of importing a list of network nodes.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 441
PI System Management Tools
TCP Response
Resize button
The resize buttons ( and ) are used to hide or show the Network Node List. If you click the hide button
( ), the Network Node List is minimized as a title bar at the bottom of Point Browser, shown as
. Click the Show button ( ) or double click the title bar to show the
Network Node List again.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 442
PI System Management Tools
TCP Response
The Point Property Pane shows the detailed configurations of selected points. Click each property to see its
description at the bottom of the pane. You can edit its value on the right side of the property name. If multiple
points are selected, the change of a property value will be applied to all selected points. Note that all properties
will not be editable if any selected points belong to a secondary Data Archive.
The toolbar in Point Property Pane is used to sort the properties. Click the button to sort point properties in
alphabetical order, or click the button to sort them in categorized order. The label beside these two buttons
shows the number of points selected.
Right-click a property to open a context menu with two functions: reset property value, and hide/display
property description. If the value of a point property is different to its default value, the value is shown with bold
font.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 443
PI System Management Tools
TCP Response
Note: If you select multiple points, some properties are not available to edit. For example, the Tag property can
not be changed when multiple points are selected. If the selected points belong to different interfaces, the Scan
Class property is also not editable.
PI 3 PI 3.2.357.17
PI 2 Not Supported
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 444
PI System Management Tools
Totalizers
Totalizers
Use the Totalizers tool to create and edit calculations performed by the PI Totalizer Subsystem. Use PI Totalizers
to perform calculations on a PI point in the snapshot and store the results in another PI Point. Because they are
based on snapshot data before compression is applied, PI Totalizers provide the most accurate way to represent
production summary data. You can start and reset PI Totalizers based on time and event, and ensure the highest
accuracy for calculations of flow volumes and other critical variables used to monitor product transfers or
production performance.
Note: You cannot use future PI points in Totalizer calculations.
To open the Totalizers tool, navigate to Points > Totalizers in the System Management Plug-ins panel. The
Totalizers window opens.
• Total
• Average
• Minimum
• Maximum
• Range
• Standard Deviation
• Median
In addition, you can use PI Totalizers to perform these types of update event counts for a point:
• All Events
• Event Equal to a Value
• Event Not Equal to a Value
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 445
PI System Management Tools
Totalizers
For complete details on how to create summary calculations with PI Totalizers, see the Totalizers.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 446
PI System Management Tools
Totalizers
7. To complete the SourceTag field, click the Tag Search button and choose the source tag from the search
results. For additional configuration information, see PI totalizer configuration.
8. Use each tab in the Editor pane to define the appropriate sampling, reporting, and optional configurations
for the new PI Totalizer.
9. Click Save .
The new PI totalizer is created on the Data Archive server.
Note: To use an existing PI totalizer as a template for a new one, search for PI totalizers, select one from the
Search Results list, and type the name for the new PI totalizer in the Name field of the Name & Type tab.
You can also select a different server after selecting an existing PI totalizer and create the same PI totalizer on
that server.
PI totalizer configuration
After you either create a new PI totalizer (see Create a new PI totalizer) or find an existing PI totalizer to edit (see
Edit an existing PI totalizer) the configuration for the totalizer is displayed in the Editor pane.
• To create a PI Totalizer that processes the value every time there is a new event for the SourceTag, select
Whenever a new source tag event occurs (Natural).
• To create a PI Totalizer to evaluate the SourceTag whenever an expression changes, select Whenever the
event expression changes. You can test the expression by clicking the Test button.
• To create a calculation that samples the SourceTag on a timed basis (for example, every 20 minutes
beginning at midnight, select Periodically.
• Then select how the periodically sampled value is derived: Interpolate or Extrapolate. The time period
when the sample is to be taken is not guaranteed to correspond to a new event on the SourceTag (unlike
Natural sampling) so you must determine whether you will extrapolate the previously recorded value or
wait until the next value and interpolate.
• For new PI Totalizers, the Totalizer tool uses the Step attribute of the SourceTag. If Step is turned on, the
tool will default to Extrapolate. If Step is turned off, the tool will default to Interpolate. For details, see
Set archive attributes.
Caution: You may override the default, but you should use caution due to possible data representation
conflicts.
• If you edit an existing PI Totalizer with timed sampling, the tool displays the configured choice.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 447
PI System Management Tools
Totalizers
To filter the source events that the PI Totalizer uses, check the Filter source data with the following expression
option. Then enter an expression to filter incoming SourceTag events. For example, you can look at a flow only
when the fresh water valve is closed. You can test the expression by clicking the Test button.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 448
PI System Management Tools
Totalizers
• Typical value
Enter a reasonable sample value for the point. For a numeric tag, a typical value must be greater than or
equal to the Zero, and less than or equal to the Zero plus the Span.
• Zero
Enter the lowest possible value for the point, as the bottom of the range used for scaling float16 values and
trends. Recorded values lower than the Zero value are recorded in the Data Archive server with the digital
state Under Range.
A Zero value is required for numeric data type points, but not for non-numeric points. The instrument zero is
a logical zero value, and certain interfaces require that Zero and Span values match the instrument system
range. See your interface documentation for details.
• Span
Enter the maximum difference between the top and bottom of the point range, as a positive value. The Span
value is used for scaling float16 values and trends and is required only for numeric data type points.
Recorded values above the sum of the zero and Span values are recorded in the Data Archive server with the
digital state Over Range.
• Scan
Enable Scan if an interface that supplies data to the point requires a scan flag. Interfaces that require a scan
flag do not update points when the flag is disabled. See your interface documentation for Scan attribute
requirements.
• Archiving
Enable Archiving to store point values in the Data Archive server.
Step
Enable the Step attribute to treat archived point values as discrete units that would appear stepped on a chart.
An archived value is assumed constant until the next archived value, and adjacent archived values are not
interpolated. For example:
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 449
PI System Management Tools
Totalizers
Disable Step to treat archived point values as a continuous signal, and linearly interpolate adjacent values. For
example:
The Step attribute also affects compression calculations. When enabled, a linear change of value greater or equal
to the compression deviation allows the point to pass compression.
The Step attribute is relevant only to numeric points. In general, data from continuous signals such as
thermocouples and flow meters should be archived without stepping. Data from discrete measurements such as
lab data and batch charge weight should be stepped.
To access the Step attribute setting:
1. Open PI SMT.
2. Navigate to Points > Point Builder.
3. Search for and select the point for which you would like to check the step attribute.
4. In the Archive tab, you can view/change the step attribute.
Shutdown
Use the Shutdown attribute to determine whether shutdown events are written. The timestamp of Shutdown
events normally represents the actual shutdown time of the Data Archive server as recorded by the Snapshot
Subsystem.
Beginning with PI Server PR1 SP1, shutdown events for most points are disabled. Unless you configure points to
receive shutdown events, only test points such as sinusoid and sinusoidu will receive shutdown events.
• Enable Shutdown to record server shutdown events as point values with the timestamp of the server
shutdown. If data is collected on the Data Archive server, shutdown events are helpful to clearly indicate
gaps in data collection.
• Disable Shutdown when point data is collected on a distributed collection nodes, as buffering services
collect, manage and retain the data until the server is up and running again. Disabled Shutdown PI points
have a configurable attribute to determine whether shutdown events are written.
Note: The default behavior of Data Archive is to write the SHUTDOWN digital state to all PI points when Data
Archive is started. The timestamp that is used for the SHUTDOWN events is usually updated every 15
minutes, which means that the timestamp for the SHUTDOWN events will be accurate to within 15 minutes
in the event of a power failure.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 450
PI System Management Tools
Totalizers
Compression
Enable compression to apply compression algorithms and save only event values that indicate a change in point
value. When disabled, all values collected and sent to the snapshot, including redundant values, are saved in the
PI archive.
Note: By default, future PI points have compression turned off (set to 0).
Enable compression for all real-time points. Digital, BLOB and string data type values pass through compression
only when the value changes. Compression is typically turned off for points that collect sample data, such as lab
data, or other sparse data streams.
Deviation
Exception and compression deviation algorithms can be used to filter erroneous and redundant data before it is
recorded in the archive.
Note: By default, future PI points have excmin, excmax and excdev turned off (set to 0).
Each algorithm is based on three specifications:
Exception deviation
Exception reporting is used to define the precision of a data stream, and the amount of deviation that
constitutes a significant change. Most interface programs can execute an exception-reporting algorithm to
determine when to send a point value to the PI Snapshot subsystem. An exception is an event that occurs either:
• After a specified minimum duration of time since the previous event, while exceeding a specified deviation in
value from that event.
• After a specified maximum duration of time since the previous event.
This means that when activated, exception reporting filters events and stores only periodic values, including
duplicates, unless an event represents a significant change in the short-term trend of values. An exception event,
both timestamp and value, is sent with the previous event to the Snapshot.
• Exception Deviation
The deviation in value required to store an event, either as a number of engineering units, or as a percentage
of the point's Span value. The exception deviation should be less than the compression deviation by at least
a factor of 2, and is ignored for digital, string and BLOB data type points.
• Min Time
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 451
PI System Management Tools
Totalizers
The minimum time that must elapse after an event before an exception value can be stored.
• Max Time
The maximum time that can elapse after an event before automatically storing the next event as an
exception value.
Set the minimum and maximum time values to 0 to turn off exception reporting.
Compression deviation
Once events are sent to the PI Snapshot subsystem, a compression algorithm can further filter data and reduce
storage to only significant values as they are moved into the archive. An event is recorded:
• After a specified minimum duration of time since the previous event, if it exceeds a specified deviation in
value from that event.
• After a specified maximum duration of time since the previous event.
• When activated, compression reporting filters events and stores only periodic values (including duplicates),
unless an event represents a significant change in the short-term trend of values.
To turn off compression and archive every event that passes exception reporting, disable the Compressing
attribute.
Compression Deviation — Enter the deviation in value required to record an event, either as a number of
engineering units, or as a percentage of the point's Span value.
For most flows, pressures, and levels, use a deviation specification of 1 or 2 percent of Span. For temperatures,
the deviation should usually be 1 or 2 degrees.
Min Time —Enter the minimum time that must elapse after an event before a compressed value can be
recorded. The minimum time should be set to 0 if exception reporting is activated for the same point.
Max Time — Enter the maximum time that can elapse after an event before automatically recording the next
event as a compressed value. The recommended maximum time is one work shift (for example, 8 hours). If this
value is too low, the compression effects are too limited to save significant archive space. If this value is too high,
useful data may be lost. Events that reach the Data Archive server in asynchronous order bypass the
compression calculation and are automatically recorded to the archive.
The compression specifications consist of a deviation (CompDev), a minimum time (CompMin), and a maximum
time (CompMax).
Events are also archived if the elapsed time is greater than the maximum time. Duplicate values will be archived
if the elapsed time exceeds CompMax. Under no circumstances does this cause Data Archive to generate events;
it only filters events that are externally generated.
The most important compression specification is the deviation, CompDev. For non-numeric tags, CompDev and
CompDevPercent are ignored. They will be displayed by applications as zero.
Note: CompDev specifies the compression deviation in engineering units; CompDevPercent specifies the
compression deviation in percent of Span. If you change one, the other is automatically changed to be
compatible. If you try to change both at once, CompDevPercent takes precedence.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 452
PI System Management Tools
Totalizers
• Allow External Reset — If you enable this option, you can write a new value to the PI Totalizer and force final
results to be written. The PI Totalizer starts again using the newly entered value as its base.
• Use negative source values — By default, the PI Totalizer counts negative values of its SourceTag as 0. If you
select this option, you override the default behavior and count negative source values as negative numbers.
• Source tag is a DCS integrator — If the SourceTag is a DCS PI Totalizer (integrator), you can use this option.
When enabled, the PI Totalizer senses when the integrator is reset on the DCS, automatically writes its final
results, and restarts.
• Close at end of the Sampling Period — This option is valid for event driven PI Totalizers. Select this option if
you must close event driven PI Totalizers with periodic sampling at the end of their sampling period, rather
than waiting for the next SourceTag event.
• Source OverRange is ZERO + SPAN — If you enable this option, SourceTagOverRange updates will be
counted as the SourceTagZERO plus its SPAN.
• Use SourceTag BAD in place of "Bad Total" — If you enable this option, the SourceTag BAD status is used in
place of the System State "Bad Total" when the percentage of good SourceTag values is insufficient for a
valid PI Totalizer result to be generated
• Source UnderRange is: zero / bad — If you enable this option, you count SourceTagUnderRange updates as
either BAD or ZERO, depending on which option you select.
• Final Result at: start/end/both — Specify whether to have the total written at the beginning, end, or both
beginning and end of the sampling period you select.
• Conversion Factor — The number entered here is a conversion factor to scale the results of the PI Totalizer.
This is especially important for a time weighted PI Totalizer. The PI Totalizer acts as though the SourceTag is
in engineering units per day. The final result of the PI Totalizer is in engineering units. If the SourceTag has a
different time scale (for example, gallons/minute), a conversion must be made to get the engineering units
result. The conversion factor should be the time scale of the SourceTag, divided by one day, divided by the
time scale (for example, [one min / (one day/1440 min)] or 1440). The default is 1.0.
• Source = Zero below — SourceTag events with values less than the number entered here will count the as
zero for totalization.
• Pct good values needed — The number entered here is the percentage of GOODSourceTag updates required
to produce a valid PI Totalizer result.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 453
PI System Management Tools
Totalizers
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 454
PI System Management Tools
Tuning Parameters
Tuning Parameters
Use the Tuning Parameters tool to view and edit Data Archive settings for all connected Data Archive servers.
Tuning parameter settings are also known as Timeout table parameters. PI SMT displays the tuning parameter
sorted by name.
Use tuning parameters to:
To edit tuning parameters, you need read/write permissions to the PITUNING entry in the Database Security
tool. To open the Tuning Parameters tool, select Operation > Tuning Parameters in the System Management
Tools pane.
Note: If the Data Archive server is a member of a collective, any tuning parameter changes you make are not
replicated on other members of the collective.
If the tuning parameter that you want is not displayed in these lists, then you can add it.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 455
PI System Management Tools
Tuning Parameters
1. In the Collectives and Servers pane, select the Data Archive server on which you want to add the parameter.
2. Clear the check boxes for all other Data Archive servers.
3. On the toolbar, click the New Parameter icon ( ).
4. In Parameter name, select the parameter that you want to add to the list. If you know the name, you can
enter it exactly.
5. Optional: Enter a value for the tuning parameter.
6. Click OK.
The parameter is added to the list.
7. Stop and restart the Data Archive server or the subsystem associated with the updated parameter.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 456
PI System Management Tools
Tuning Parameters
2. In the System Management Tools pane, select Operation > Tuning Parameters.
3. Click Export .
4. Save the CSV file to the location of your choice.
You can view the CSV file in a text editor or in a spreadsheet.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 457
PI System Management Tools
Update Manager
Update Manager
Use the Update Manager tool for troubleshooting as directed by OSIsoft Technical Support.
Update Manager keeps track of producers of updates (such as the snapshot and archive) and consumers of
updates (such as interfaces). It lets clients and other consumers know when a specified value is updated.
1. From the System Management Tools pane, select Operation > Update Manager.
2. In the right pane, from the Server drop-down list, select the Data Archive server that you want.
3. Select the Consumers tab. The consumers for the selected server are listed in this tab. See Consumer
columns for an explanation of the columns in the output.
4. To view detailed information on a specific consumer, click the name of the consumer and view the
information in the lower pane. See Consumer details for an explanation of the columns in the output.
5. To troubleshoot, look for the following information.
• Is it the consumer registered?
• Is the consumer timed out?
• Is the consumer signed up?
• When was the last time the consumer retrieved an update?
Consumer columns
Column Description
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 458
PI System Management Tools
Update Manager
Consumer details
Column Description
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 459
PI System Management Tools
Update Manager
1. Select Operation > Update Manager from the System Management Tools pane.
2. In the right pane, from the Server drop-down list, choose the Data Archive server or collective that you want.
3. Select the Producers tab.
See Producer columns for an explanation of the columns in the output. To troubleshoot, look for the
following information.
• Is the producer connected?
• Is the producer sending updates?
• When is the last time it sent an update?
• How many sign-ups does it have?
4. To view detailed information on a specific producer, click the name of the producer and view the information
in the lower pane.
See Producer details for an explanation of the columns in the output. To troubleshoot, look for the following
information.
• Send failures
• Retrying
• Is the producer responsive?
Producer columns
Column Description
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 460
PI System Management Tools
Update Manager
Producer details
Column Description
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 461
PI System Management Tools
Update Manager
1. Select Operation > Update Manager from the System Management Tools pane.
2. From the PI Server drop-down menu, choose the Data Archive server that you want to view. This menu is
populated with all the Data Archive servers and collectives selected in the Collectives and Servers pane.
3. Select the Statistics tab. The statistics for the selected Data Archive server are listed in this tab. See Statistics
columns for an explanation of the columns in the output.
Statistics columns
Column Description
1. Select Operation > Update Manager from the System Management Tools pane
2. Click on the toolbar.
The Options dialog box appears.
3. In the auto-update rate field, type in the refresh rate, in seconds.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 462
PI System Management Tools
Update Manager
Procedure
1. Select Operation > Update Manager from the System Management Tools pane.
2. Click on the toolbar.
3. The Options dialog box appears.
4. Clear the Query for additional information check box to reduce the level of detail displayed.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 463
PI System Management Tools
SMT security requirements
The following table lists access permissions required for PI point-related tasks.
View Alarm Groups and Points Status PIPOINTS (r), PtSecurity (r), Datasecurity (r)
The following table lists access permissions required for PI point-related tasks.
Retrieve Point List PIPOINT(r); PtSecurity (r) is also required for each
point
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 464
PI System Management Tools
SMT security requirements
The following table lists access permissions required for PI point-related tasks.
Note: Archive backup is obsolete for this tool in the current version. Use the Backups tool instead.
The following table lists access permissions required for PI point-related tasks.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 465
PI System Management Tools
SMT security requirements
The following table lists access permissions required for PI point-related tasks.
The following table lists access permissions required for PI point-related tasks.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 466
PI System Management Tools
SMT security requirements
The following table lists access permissions required for PI point-related tasks.
The following table lists access permissions required for PI point-related tasks.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 467
PI System Management Tools
SMT security requirements
The following table lists access permissions required for PI point-related tasks.
The following table lists access permissions required for PI point-related tasks.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 468
PI System Management Tools
SMT security requirements
The following table lists access permissions required for PI point-related tasks.
The following table lists access permissions required for PI point-related tasks.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 469
PI System Management Tools
SMT security requirements
The following table lists access permissions required for PI point-related tasks.
Service Control Manager Requires read and service control privileges on local
and remote computers.
For Windows 7 and Windows Server 2003, and later,
you are prompted to restart SMT as an administrator
when this is attempted by the operating system.
The following table lists access permissions required for PI point-related tasks.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 470
PI System Management Tools
SMT security requirements
The following table lists access permissions required for PI point-related tasks.
The following table lists access permissions required for PI point-related tasks.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 471
PI System Management Tools
SMT security requirements
The following table lists access permissions required for PI point-related tasks.
Requires access to the Data Archive log file via the PI PIMSGSS (r)
SDK
The following table lists access permissions required for PI point-related tasks.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 472
PI System Management Tools
SMT security requirements
• On the Data Archive server, you need write access on the PIBACKUP and PIModules table in Database
Security (in PI SMT, choose Security > Database Security).
If you don't have the correct access permissions, a pop-up dialog box appears showing a -10401 (no write
access) error.
Note: On PI Server versions 3.4.370 or earlier, PIBACKUP is not required, but piadmin privileges are required.
If necessary, the preparation wizard prompts you for the elevated credentials.
• When running the wizard remotely, you need the access permissions listed above, and you also need to be
an administrator on both the remote Data Archive server and the local client. If necessary, the preparation
wizard prompts you for the elevated credentials.
The following table lists Data Archive access permissions required for module-related tasks.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 473
PI System Management Tools
SMT security requirements
Modules: Edit – Link / Unlink PIModules (r) new parent module (r*,w)
module (r*,w)
The following table lists access permissions required for PI point-related tasks.
The following table lists access permissions required for PI point-related tasks.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 474
PI System Management Tools
SMT security requirements
View Performance Monitor Interfaces PIMODULE (r), module (r) for \\%OSI\Interfaces and
its sub-modes
Note: module (r) also assumes (r) for all modules
along the hierarchy path above it.
View Existing Points PIPOINT (r), PtSecurity (r) for the individual points
Edit Points PIPOINT (r), PtSecurity (r,w) for the individual points
The following table lists access permissions required for PI point-related tasks.
View Existing Points PIPOINT (r), PtSecurity (r) for the individual points
Edit Points PIPOINT (r), PtSecurity (r,w) for the individual points
The following table lists access permissions required for PI point-related tasks.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 475
PI System Management Tools
SMT security requirements
Service Control Manager Requires read and service control privileges on local
and remote computers.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 476
PI System Management Tools
SMT security requirements
The following table lists access permissions required for PI point-related tasks.
View Existing Points PIPOINT (r), PtSecurity (r) for the individual points
Edit Points PIPOINT (r), PtSecurity (r,w) for the individual points
The following table lists access permissions required for PI point-related tasks.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 477
PI System Management Tools
SMT security requirements
The following table lists access permissions required for PI point-related tasks. There are two pieces of
information displayed in this tool: Tuning parameter, which controls API/SDK enabled, explicit login disabled, and
blank password disabled. Tuning requires PITuning database security access. The explicit login disabled for
piadmin is read directly from the PIUSER database.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 478
PI System Management Tools
SMT security requirements
The following table lists access permissions required for PI point-related tasks.
Note: module (r) also assumes (r) for all modules along the hierarchy path above it.
The following table lists access permissions required for PI point-related tasks.
View SNMP Interfaces PIMODULE (r), module (r) for \\%OSI\Interfaces and
its sub-modes
View Existing Points PIPOINT (r), PtSecurity (r) for the individual points
Edit Points PIPOINT (r), PtSecurity (r,w) for the individual points
The following table lists access permissions required for PI point-related tasks. This plug-in writes to the Module
Database to store preferences. You need PIModules (r,w) to write to the Module Database.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 479
PI System Management Tools
SMT security requirements
The following table lists access permissions required for PI point-related tasks.
For the points being displayed PIPOINT (r), DataSecurity (r) and PtSecurity (r) for each
point
The following table lists access permissions required for PI point-related tasks.
View Existing Points Requires access through a PI user that has permissions
to read existing points (through login or trust).
Create or Edit Points Requires access through a PI user that has permissions
to edit or create points (through login or trust).
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 480
PI System Management Tools
SMT security requirements
The following table lists access permissions required for PI point-related tasks.
The following table lists access permissions required for PI trust-related tasks.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 481
PI System Management Tools
SMT security requirements
The following table lists access permissions required for tasks related to tuning parameters.
©2023 AVEVA Group plc and its subsidiaries. All rights reserved. Page 482
AVEVA Group plc Tel +44 (0)1223 556655
High Cross
Madingley Road
Cambridge
CB3 0HB www.aveva.com
UK To find your local AVEVA office, visit www.aveva.com/offices
AVEVA believes the information in this publication is correct as of its publication date. As part of continued product development, such information is subject to
change without prior notice and is related to the current software release. AVEVA is not responsible for any inadvertent errors. All product names mentioned are
the trademarks of their respective holders.