Professional Documents
Culture Documents
User's Manual
MatrikonOPC Desktop Historian
User's Manual
Phone : +1.780.448.1010
Fax: +1.780.448.9191
www.matrikonopc.com
Document
Date Description Author
Version
2003-08-06 1.0 Initial document. THN
2003-09-15 1.1 – 1.7 Updated for distribution. Changes to GUI. Excel THN,
2005-10-18 Plug-in section added. Branding fixes. SML, IMF,
Screenshots updated. Updated with latest EJM, EW
screenshots for tag attributes. Updated with latest
screenshots. Updated data collection
management. Added OPC Client configuration.
DOCUMENT VERSION
Version: 19.0
COPYRIGHT INFORMATION
© Copyright 1997 - 2017, Matrikon International, a business unit of Honeywell Limited (“Matrikon International” or
“Matrikon”). All rights reserved. No part of this document may be reproduced, stored in a retrieval system, translated, or
transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without prior
written permission of Matrikon International.
CONFIDENTIAL
The information contained herein is confidential and proprietary to Matrikon International. It may not be disclosed or
transferred, directly or indirectly, to any third party without the explicit written permission of Matrikon International.
IMPORTANT NOTICE
Although every endeavor has been made to ensure that the information contained within this document is up
to date and accurate, Matrikon cannot be held responsible for any inaccuracy or error in the information
contained within this document. Matrikon makes no warranty of any kind with regard to the information
contained within this document and Matrikon shall not be liable for any direct, indirect, incidental or
consequential damages which may arise in connection with the furnishing, reliance, or use of the information
contained within this document.
Specifications and statements as to performance in this document are Matrikon estimates, intended for general
guidance. Matrikon reserves the right to change the information contained within this document and any
product specification without notice.
Statements in this document are not part of a contract or program product license insofar as they are
incorporated into a contract or license by express preference. Issue of this document does not entitle the
recipient to access or use of the products described, and such access or use shall be subject to separate
contracts or licenses.
The receiving party shall not disclose, publish, report, communicate, or otherwise transfer any information in
this document to any third party, and shall protect all information contained herein from unauthorized
disclosure. The receiving party shall permit access to this document only to its employees, agents,
subcontractors, and affiliates who reasonably require access to such information contained herein, have been
made aware of the confidential nature of this document and have executed a written employment or other
confidentiality agreement party to maintain the confidential status of this document.
LICENSE AGREEMENT
This document and the software described in this document are supplied under a license agreement and may only be used
in accordance with the terms of that agreement. Matrikon reserves the right to make any improvements and/or changes to
product specifications at any time without notice.
TRADEMARK INFORMATION
The following are either trademarks or registered trademarks of their respective organizations:
Matrikon and MatrikonOPC are trademarks or registered trademarks of Honeywell International Inc.
Table of Figures
Figure 1 - Configuration Window .................................................................................... 24
Figure 2 - Windows Services Panel................................................................................. 29
Figure 3 - Log Settings Tab ............................................................................................ 31
Figure 4 - Version Information Tab ................................................................................ 32
Figure 5 - Data Storage Management Page .................................................................... 33
Figure 6 - FF7R Configuration Options ........................................................................... 36
Figure 7 - Backup Utility ................................................................................................. 38
Figure 8 - Create New Scheduled Backup Wizard: Backup Name .................................... 39
Figure 9 - Create New Scheduled Backup Wizard: Backup Operation ............................. 40
Figure 10 - Create New Scheduled Backup Wizard: Destination ..................................... 41
Figure 11 - Create New Scheduled Backup Wizard: Select Files ..................................... 42
Figure 12 - Create New Scheduled Backup Wizard: Select Files By Date ........................ 43
Table of Tables
Table 1 - Terms and Definitions...................................................................................... 20
Table 2 - Configuration Window Components ................................................................. 24
Table 3 - Toolbar Items .................................................................................................. 25
Table 4 - File Menu Commands ....................................................................................... 26
Table 5 - Edit Menu Commands (Alias Group) ................................................................ 27
Table 6 - View Menu Commands ..................................................................................... 27
Table 7 - Window Menu Commands ................................................................................ 28
Table 8 - Help Menu Command ....................................................................................... 28
Table 9 - General Logging Options Settings Tab ............................................................. 32
Table 10 - FF7 Configuration Options ............................................................................. 34
Table 11 - FF7R Configuration Options ........................................................................... 35
Table 12 - Select Files Options ....................................................................................... 42
Table 13 - Select Files By Date Options .......................................................................... 44
Table 14 - Daily Schedule Options .................................................................................. 46
Table 15 - Weekly Schedule Options .............................................................................. 47
Table 16 - Monthly Schedule Options ............................................................................. 48
Table 17 - One Time Only Schedule Options ................................................................... 49
Table 18 - Logging Options Components ........................................................................ 63
Table 19 - General Options ............................................................................................. 65
Overview of Manual
This document uses icons to highlight valuable information. Remember these icons and what they
mean, as they will assist you throughout the manual.
The User’s Manual has been designed as such so that you can click on references in the document
to jump to that referenced point without having to scroll through several pages (in some cases).
For example, if you were to see the sentence “Refer to Figure 1 for more information”, pressing the
CTRL key and clicking your mouse on the text “Figure 1” automatically takes you to the location of
Figure 1 within the document.
Document Terminology
The following terms are used interchangeably throughout this document:
screen and window
tab and panel
Table 1 provides a list of definitions for terms used throughout this document.
Term/Abbreviation Description
A&E OPC Alarms and Events. Provides access to process alarm and event data.
Component Object Model. A method for organizing software, specifying how to
COM
build components that can be dynamically interchanged.
DA OPC Data Access. Provides access to real-time process data.
Distributed Component Object Model. An extension of COM that allows
DCOM
communication between COM components over a network.
Dynamic Data Exchange. Allows the transfer of data between two running
DDE
applications.
HDA OPC Historical Data Access. Provides access to historical process data.
Human Machine Interface. Device that allows interaction between the user and
HMI
machine. Typically used in process control applications.
Matrikon Matrikon International.
MatrikonOPC Matrikon’s brand name for its OPC servers and clients.
ODH MatrikonOPC Desktop Historian.
OPC A communication standard. Refer to www.opcfoundation.org for more
System Requirements
The software has minimum Software and Hardware system requirements. These requirements
must be met for the software to function properly.
Software Requirements
At the minimum, the product requires the following software:
Microsoft Windows 7 or
Microsoft Windows Server 2008 R1 32Bit or
Microsoft Windows Server 2008 R1 64Bit or
Microsoft Windows Server 2008 R2 64Bit or
Microsoft Windows 10, or
Microsoft Windows Server 2012, or
Microsoft Windows Server 2016
Internet Explorer 6.0 (or better)
Microsoft .NET Framework 2.0
Desktop Historian needs to be run as a Windows service.
Note: Changing the service to start as a specific user restricts access to Desktop Historian.
Note: Tag Manager works with only 32-bit Microsoft Excel and it is
recommended that the most current service packs are installed.
Hardware Requirements
The product requires the following hardware:
Intel CORE i5 Processor
4 GB RAM
80 GB 7200 RPM Hard Drive
The software requires the following additional hardware to make use of the corresponding
functionality:
IP compatible network – for remote OPC server access.
Free Hard Disk Space – at least 200 MB of free disk space is recommended for the Historical
Data files. See Appendix H – File Formats for specific size requirements, as most
installations will require more than 200 MB of free disk space.
Configuration Window
The Configuration window is used to configure the tool. It displays the current configuration and
allows users to change configuration parameters.
To view the Configuration window:
1. From the Windows Start button, access MatrikonOPC Desktop Historian (for assistance,
refer to Launching MatrikonOPC Desktop Historian.
2. The Configuration window appears and the Start Page is displayed (Figure 1).
Component Description
Main Menu Provides access to the File, Edit, View, Window, and Help menus.
Provides items that make navigation within a configuration easier. Refer to
Toolbar
Table 3 for more information.
Location Bar Allows you to track the current configuration’s location.
Displays a tree of configuration objects currently defined in the application.
Navigation Panel Select an object to display its current settings in the right-hand panel. This
panel is also referred to as the tree-view pane.
Displays the current settings of the item presently selected in the tree-view
Settings Panel
pane.
Table 2 - Configuration Window Components
The following sections describe the menus available from the Configuration window, and what
they are used for.
Command Description
Returns you to the previous configuration.
Back
Moves you to the next configuration history.
Forward
Selects the node in the navigation pane that is above the currently-
Up selected node.
New Configuration Note: This option does not apply to MatrikonOPC Desktop Historian.
Selecting this item (when it is enabled) allows you to create a new Alias
Group by accessing the New Alias Group window (Figure 113).
New Group This toolbar item is available only when you have selected either the Alias
Configuration node, or an existing Alias Group, in the Configuration
window’s navigation pane.
Selecting this item (when it is enabled) allows you to create a new Alias
by accessing the Alias Configuration Wizard (Figure 115).
This toolbar item is available only when you have selected either the Alias
New Alias
Configuration node, an existing Alias Group, or an existing Alias, in the
Configuration window’s navigation pane.
Select this item to display the Alias Configuration Wizard (Figure 115),
allowing you to edit an Alias Group or Alias.
Edit This toolbar item is available only when you have selected an existing
Alias in the Configuration window’s settings pane (i.e., pane on the right
side of the window).
Select this item to display the Alias Configuration Wizard (Figure 115),
allowing you to clone the selected Alias.
Clone This toolbar item is available only when you have selected an existing
Alias in the Configuration window’s settings pane (i.e., pane on the right
side of the window).
Selecting this item (when it is enabled) allows you to delete the selected
Delete node or item.
Select this item to display the Import Alias File window which allows you
Import to select the .csv file you wish to import.
Select this item to display the Export Alias File window which allows you
Export to select the .csv file you wish to export.
Table 3 - Toolbar Items
File Menu
Table 4 describes the File menu commands.
New Configuration This option does not apply to MatrikonOPC Desktop Historian.
Import Configuration This option does not apply to MatrikonOPC Desktop Historian.
Export Configuration This option does not apply to MatrikonOPC Desktop Historian.
Exit Selecting this menu option hides the main Configuration window.
Table 4 - File Menu Commands
Edit Menu
The Edit menu options are determined by the item selected in the navigation pane.
Table 5 describes the Edit menu commands that are available when an Alias Group is selected in
the navigation pane.
Command Description
Selecting this option allows you to create a new Alias Group by
accessing the New Alias Group window (Figure 113).
This menu option is available only when you have selected either the
New Group
Alias Configuration node in the Configuration window’s navigation
pane, or an existing Alias in the settings pane (i.e., pane on the right
side of the window).
Selecting this option allows you to create a new Alias by accessing the
Alias Configuration Wizard (Figure 115).
New Alias This menu option is available only when you have selected either the
Alias Configuration node in the Configuration window’s navigation
pane, or an existing Alias in the settings pane.
Select this option to display the Alias Configuration Wizard (Figure
115), allowing you to edit the selected Alias.
Edit This menu option is available only when you have selected either the
Alias Configuration node in the Configuration window’s navigation
pane, or an existing Alias in the settings pane.
Select this option to display the Alias Configuration Wizard (Figure
115), allowing you to clone the selected Alias.
Clone This menu option is available only when you have selected either the
Alias Configuration node in the Configuration window’s navigation
pane, or an existing Alias in the settings pane.
Selecting this option allows you to delete the selected Alias in the
Delete Configuration window’s settings pane.
Select this option to display the Import Alias File window which allows
you to select the .csv file you wish to import.
Import From CSV
This menu option is available only when you have selected either the
Alias Configuration node or Alias Group in the Configuration
View Menu
Table 6 describes the View menu commands.
Command Description
Toolbar When selected, the Toolbar appears below the Main Menu.
When selected, displays the Location Bar below the Main Menu and above
the navigation pane. The Location Bar allows you to track the current
configuration’s location. By clicking on each segment of the Location Bar,
you can easily navigate to the required configuration screen.
Location Bar
Each segment of the Location Bar also provides a drop-down menu that
allows you to browse to the next available configuration. To access the drop-
down menu, click on the arrow on the right side of the required Location
Bar segment.
When selected, displays the navigation pane including the navigation tree.
Navigation Tree Allows you to efficiently browse through the available configuration of the
current product.
When selected, shows the available windows tabs at the bottom of the
Configuration window. Allows you to view all currently-open configurations.
Window Tabs The currently-open configurations may be organized with options offered in
the Windows menu from the Main Menu.
Note: This option is not selected by default.
Start Page When selected, shows the current product Start Page.
Command Description
Tile Vertically Vertically arranges the currently-opened windows within the configuration.
Help Menu
Table 8 describes the Help menu command.
Command Description
Displays an About screen, which includes information about the Integrated
About iC
Configuration (iC) configuration management system version.
Table 8 - Help Menu Command
Log Settings
The Log Settings screen allows for the editing of general logging options. The log files will be
contained within the following location ([ ] indicates the default installation path):
[C:\Program Files\Matrikon\OPC\Desktop Historian\Core\Log
To view the General Logging Options:
1. From the Desktop Historian Options panel described above, select the Log Settings tab.
2. The Log Settings panel is displayed (Figure 3).
Command Description
Log File Locations
Displays the default location where the system activity log file is
Diagnostic
saved. To save the log file in a different location, click Browse.
Displays the default location where the configuration activity log file
Configuration
is saved. To save the log file in a different location, click Browse.
Displays the default location where the log action file is saved. To
Audit
save the log file in a different location, click Browse.
Log Detail Level
Log system activity at the specified detail level (High, Medium,
Diagnostic
Low, or None). Higher log levels include lower-level activities
Log configuration activity at the specified detail level (High,
Configuration Medium, Low, or None). Higher log levels include lower-level
activities.
Audit Log actions committed by users at the specified detail level (Data
Note: For the General Logging Options Settings to take effect, the Apply button
MUST be selected.
Version Information
Desktop Historian is composed of several components, each of which controls a different task. The
version number of each component used can be found under the Version Information tab (Figure
4) of the Desktop Historian Options panel. This information may be required when contacting
MatrikonOPC Support.
The file format type (Desired file format field) and configuration settings (Configuration screen
section) for the selected file format can be selected on this tab.
Note: To change the Data Storage Management configuration setting for another
instance, select the appropriate instance under Data Storage Management (as shown in
Figure 5), then click on configure.
Item Description
The directory in which to store the files. Defaults to
Historical data file directory
c:\Matrikon Data.
Indicates how much data should be stored in each
Store no more than [count] [units] of
file. Select the count and the units (weeks, days,
history in each file.
hours or minutes). Defaults to 2880 minutes.
When checked, and the Apply button is selected,
Desktop Historian will close all open file handles, and
ensure that the current file has an accurate header.
Close and finalize the active data file This item will automatically return to unchecked
when the operation is complete. After completion,
Desktop Historian opens a new file to store further
history.
Select this button to apply any changes made in the
Apply
current page.
Select this button to cancel all changes that have
Cancel
been made in the current page.
Table 10 - FF7 Configuration Options
Item Description
The directory in which to store the files. The default
Historical data file directory
directory is c:\Matrikon Data.
Enter the number of 25 MB rolling history buffer files
to use. When all of the files have been used, the
oldest is erased and a new one is created.
Store the history in [count] 25MB files
Maximum value = 15000 25 MB files (assuming
sufficient hard drive space exists). Defaults to two 25
MB files.
This field reports the amount of space available in 25
Maximum number of files for available
MB files. It is updated automatically when you change
space on hard drive
the Historical data file directory.
This field allows you to specify the maximum amount
of future timestamps allowed. This restricts invalid
Do not store values with timestamps future timestamps so that files no longer become
greater than corrupted and data loss is minimal.
Default = 10080 Minutes (1 Week)
Select this button to apply any changes made in the
Apply
current page.
Select this button to cancel all changes that have
Cancel
been made in the current page.
Table 11 - FF7R Configuration Options
Backup Utility
MatrikonOPC Desktop Historian includes a utility to configure and schedule backup procedures.
WARNING: The Backup Utility can cause data loss to occur if used
incorrectly.
To prevent this from occurring, the backup command should be
written to only those backup files that are older than the possible
range of insertions, and should not include the active file.
The Backup Utility locks the data files, one at a time, while it is
copying them. While a file is locked, it cannot be written to, and
therefore writes will fail. This means that if data is being archived by
the ODH OPC client with timestamps that fall within the locked file, or
if an OPC HDA client is pushing data into the historian through the
OPC server for ODH with timestamps in the past, those data points
may not be written.
If you need assistance regarding these issues, please contact
MatrikonOPC Support.
The Backup Utility makes use of the Windows Task Scheduler built into the Microsoft Windows
operating system to schedule the tasks. Scheduled backup operations created by the Backup
Utility are visible in the Microsoft Windows Scheduled Tasks control panel, and can be edited
there as well. However, the Backup Utility provides an easier-to-use means of configuring the
options to the command-line tool that performs the backup operation.
To access the Backup Utility configuration settings:
1. From the Configuration window, in the tree-view pane (navigation pane on the left side of
the screen), select and expand the following nodes:
Desktop -> Localhost -> OPC Desktop Historian -> Backup Utility
2. Click on the Configure item displayed under the Backup Utility node. Figure 7 displays
the navigation pane and the Backup Utility pane.
2. Enter a Backup Name and Comment to identify and describe the task being created.
3. Click on the Next button to go to the backup operation selection screen (Figure 9).
6. From the Destination screen, select the destination to which you want the backup files
sent. The backup can either place the files in a folder, or it can compress the files into a ZIP
file. In either case, a copy of the current tag database files will be included in the folder or
compressed file. The Overwrite existing file(s) option is selected by default. With that
option selected, the Backup Utility overwrites existing data files in the selected folder, or
overwrites the entire compressed backup file. If the Overwrite existing file(s) option is
not selected and the backup operation runs and determines that the files already exist in
the selected destination, the backup operation fails without backing up the data.
7. Click on the Next button to proceed to the Select Files screen (Figure 11).
8. The Select Files pane is used to set the criteria by which the Backup Utility will choose
which files are to be included in the backup. See Table 12 for a description of each of the
options. See Figure 12 and Figure 13 for more details about the Select Files By Date
option.
Option Description
Selecting this option instructs the Backup Utility to choose all of the data files
All Non-Active Files in the data directory, except for the one file that is considered the “active” file.
The active file is the file to which new data points are being written.
Selecting this option selects just the active file.
The Active File
Note: If the Move or Delete command is selected, this option is not available.
Selecting this option includes all files in the directory.
All Files
Note: If the Move or Delete command is selected, this option is not available.
Selecting this option allows for the selection of data files according to the date
Select Files By Date range of data that they contain. Selecting this option causes the Select Files
screen to display the date selection options (Figure 12).
Table 12 - Select Files Options
Figure 13 - Create New Scheduled Backup Wizard: Select Files By Date (Move or Delete Operation Selected)
9. If the ellipsis button for a time expression is selected, the Date Editor window appears.
Select either a Fixed Date or a Relative Time Expression, and fill out the associated
fields. Click on the Ok button to return to the Select Files by Date screen of the Create
New Scheduled Backup Wizard, with the selected date or date expression in the date
expression field. Clicking on the Cancel button discards any changes made in the form and
returns you to the Select Files by Date screen.
11. Select one of the scheduling options and click on the Next button to proceed to the specific
configuration panel for the selected schedule type (listed below). The When my computer
starts option does not have any additional configuration options. Clicking on the Next when
that option is selected will skip ahead to the applicable Credentials screen (Figure 20).
Daily Schedule
Weekly Schedule
Monthly Schedule
One Time Only Schedule
12. The Daily Schedule type (Figure 16) configuration screen has the options described in
Table 14.
Option Description
The time of day to run the backup. The time of day will be formatted
Start Time according to the computers configured regional settings. Seconds, if
displayed, are ignored in the schedule.
The default option. When selected, the backup is performed every day at the
Every Day
selected Start time.
When selected, the backup is performed only on weekdays (Monday through
Weekdays
Friday), at the selected Start time.
When selected, the numeric selection box is enabled. Enter the period in days
Every [x] days
after each scheduled run before the next run should occur.
Start Date The date at which the schedule becomes active.
Table 14 - Daily Schedule Options
13. Click on the Next button to go to the Credentials screen (Figure 20).
14. The Weekly Schedule type configuration screen (Figure 17) has the options described in
Table 15.
Option Description
The time of day to run the backup. The time of day
will be formatted according to the computers
Start Time
configured regional settings. Seconds, if displayed,
are ignored in the schedule.
Defines whether the backup should be run every
Every [x] Weeks
week, every other week, every third week, etc.
Monday, Tuesday, Wednesday, Thursday, Select which day or days of the week on which the
Friday, Saturday, Sunday backup should run.
Table 15 - Weekly Schedule Options
15. Click on the Next button to go to the Credentials screen (Figure 20).
16. The Monthly Schedule type configuration screen (Figure 18) has the options described in
Table 16.
Option Description
The time of day to run the backup. The time of day
will be formatted according to the computers
Start Time
configured regional settings. Seconds, if displayed,
are ignored in the schedule.
The day of the month on which the backup should
Day
run.
Select which week of the month and day of that week
The [ordinal] [weekday] on which the backup should run. For example, the
First Sunday, or the Second Tuesday.
Select which months in which the backup should run.
Jan, Feb, Mar, Apr, May, Jun, Jul, Aug, Sep,
The Select All and Clear All buttons will check or
Oct, Nov, Dec
uncheck, respectively, all of the months.
Table 16 - Monthly Schedule Options
17. Click on the Next button to go to the Credentials screen (Figure 20).
18. The One Time Only schedule type configuration screen (Figure 19) has the options
described in Table 17.
Option Description
Date The date on which the backup should be run.
The time of day to run the backup. The time of day will be formatted according
Time to the computers configured regional settings. Seconds, if displayed, are
ignored in the schedule.
Table 17 - One Time Only Schedule Options
19. Click on the Next button to go to the Credentials screen (Figure 20).
20. The Credentials Panel (Figure 20) requires the entry of a user name and password for a
Windows account that has privileges to connect to the Desktop Historian service, read
from the data and database directories, and write to the selected destination directory. If
the account selected does not have sufficient permissions for those tasks, the backup
operation is not able to execute or complete. Enter the full DOMAIN\Username and enter
the Password for the account. You need to enter the password a second time to confirm it
was typed correctly.
21. Click on the Next button to continue. The Wizard tests the user name and password to
ensure that it is a valid combination. If the user name and password combination do not
work, a warning is displayed and you are returned to the Credentials panel. If the user
name and password are valid, the Summary screen is shown.
Notes:
The check performed does not ensure the user has adequate permissions to perform
the operation, only that the password is correct for the provided user name.
It is recommended that the user that is used (i.e., entered) does not change the
password. If the password is changed then each configured backup task must be
updated with the new password.
22. The Summary screen (Figure 21) is displayed which provides a textual summary of the
scheduled backup item to create. If any of the settings need to be changed, the Back
button can be used to go backwards through the Wizard sequence to reach the appropriate
screen where the settings can be changed.
2. The Modify Scheduled Backup screen lists all of the scheduled backup operations. Each
operation can be enabled or disabled by toggling the Enabled checkbox. A disabled backup
will not be run. Selecting the Back button returns you to the Backup Utility configuration
screen (Figure 7). Selecting the Modify button on any of the listed backups opens the
Modify Scheduled Backup Wizard on the Backup Name panel (Figure 24).
Note: The Backup Name cannot be changed when modifying a task.
3. Modify the task as required. The Modify Scheduled Backup Wizard uses the same
sequence of panels as the Create New Scheduled Backup Wizard. Use the Next and
Back buttons to navigate through the Wizard screens. Use the Cancel button at any time
to discard any changes made and return to the Modify Scheduled Backup list (Figure 23).
When you reach the Summary panel (Figure 25), the Finish button is available. Click on
the Finish button to commit the changes and return to the Modify Scheduled Task list
(Figure 23).
2. Click on the Remove button associated with the backup you wish to remove. A confirmation
message (Figure 27) appears. Click OK to confirm the task deletion, or click on Cancel to
return to the Remove Scheduled Backup list (Figure 26).
3. If the OK button was selected, the task is removed and the Remove Scheduled Backup
list is shown with a confirmation message. If the last task was removed, the Backup Utility
configuration screen (Figure 7) is displayed with a confirmation message.
2. The Custom Backup entry on the list can be used to configure the backup and run it right
away. Select the Create and Execute button to build a backup operation. Each of the
configured scheduled backups is also listed. If you select the Execute button on one of the
scheduled backups, the settings for that scheduled backup are used to set the options for
the backup operation.
Note: Changing the settings for an existing backup for the Backup Now operation will not
change the settings for the scheduled backup. Those changes apply for the immediate
backup operation only.
3. If the Custom Backup item’s Create and Execute option was chosen, the Backup Now
Wizard is displayed showing the Backup Operation panel (Figure 29).
4. The Backup Now Wizard uses the Backup Operation, Destination, Select Files,
Credentials, and Summary screens in the same way as the Create New Scheduled
Backup Wizard and the Modify Scheduled Backup Wizard. Clicking on the Finish
button on the Summary screen executes the backup.
5. If the Execute button on one of the existing Scheduled Backup operations is selected, the
Backup Now Wizard will skip to the Summary screen. The Back button can be used to
access the other portions of the Wizard.
Note: The credentials stored for a scheduled task are lost if you click on the Back button
(from the Summary screen in this case). You are required to re-enter the password for the
account to execute the backup.
Restore Backup
The Restore Backup Operation is used to get data files stored in a backup location and add them
to the live system.
To restore data files from a backup:
1. Click on the Restore Backup icon from the Backup Utility configuration panel (Figure 7).
2. The Restore Backup screen (Figure 30) appears.
3. Select the applicable option indicating either a folder source (Folder) or zip file
(Compressed ZIP file) from which the backup is to be restored.
4. Click on the Next button to proceed to the Select Files screen (Figure 11).
Note: The Select Files pane is used to set the criteria by which the Backup Utility
chooses which files from the backup set are to be restored to the live system. See Table 12
for a description of each of the options. See Figure 12 and Table 13 for more details about
the Select Files By Date option.
Note: Logging Options settings are saved once the Apply button is
selected. However, they do not take effect until the back-end server is
re-started.
Command Description
Selecting this checkbox enables general activity logging. If this
Enable server activity checkbox is not selected (i.e., the checkbox is cleared), none of the
logging fields on the Logging Options page are available.
By default, this checkbox is selected.
Activity Log Settings
If this field is enabled, allows you select from the drop-down list, the
amount of detail to be provided in the log file:
None
Low – Errors (default setting)
Log Level Medium – Errors and Warnings
High – Errors, Warnings, and Information
If the Enable server activity logging checkbox is not selected
(i.e., the checkbox is cleared), this field is not available.
Default = Low.
Version
This page is display only and shows OPC product version information.
To view Backup Utility version information:
1. On the navigation pane of the Configuration window, select and expand the following
nodes:
Desktop -> Localhost -> OPC Desktop Historian -> Backup Utility
2. Click on the Version item displayed under the Backup Utility node. Figure 33 displays the
Version page.
Commands
Only one command may be used at a time.
Command Description
-L Lists selected files. If no selection is made, all files are listed.
-C "destination path" Copies selected files to the destination path.
Moves selected files to the destination path. Selected files will not be
-M "destination path"
available in the historian following this command.
Copies selected files to the destination zip file. The destination file should
-CZ "destination file" end in the extension .zip, If it does not, .zip will be added to the end of
the provided name.
Moves selected files to the destination zip file. Selected files will not be
available in the historian following this command. The destination file
-MZ "destination file"
should end in the extension .zip, If it does not, .zip will be added to the
end of the provided name.
-U Unlocks all files. The selection is ignored. This is intended to help recover
Valid Selections
Only one selection command may be used.
Command Description
-S "NONACTIVE" Select all non-active files (default).
-S "ALL" Select all files.
-S "ACTIVE" Select only the active file.
Select files by date or date range.
<timetype> is one of:
STARTS: The earliest possible timestamp in the file.
ENDS: The latest possible timestamp in the file.
MODIFIED: The system last modified time for the
file.
-S "<timetype> <timecomp> <timecomp> is one of:
<dateexpr>[ AND <dateexpr>][ ACTIVE]"
BEFORE: Where the selected <timetype> comes
before the <dateexpr>.
AFTER: Where the selected <timetype> comes after
the <dateexpr>.
BETWEEN: Where the selected <timetype> falls
between the two date expressions. When BETWEEN is
used, two date expressions must be entered with AND
in between them. The date expressions may be in any
Selection Examples
All files that start prior to one week before this week began.
-S "STARTS BEFORE WEEK-1W"
All files that start sometime in the last month. Include the active file if it is in that time range.
-S "STARTS AFTER NOW-1MO ACTIVE"
All files that end more than three full calendar months ago.
-S "ENDS BEFORE MONTH-3MO"
All files last modified during January 2008.
-S "MODIFIED BETWEEN 2008-01-01 00:00 AND 2008-02-01 00:00"
The Data Collection Management tab consists of the following sections which are described in
more detail below:
Tag Browser
Tag Workspace
Data Collector
Filter and Sort
Scheduled Transfer
Component Description
Enter the name of a data server in this field, or if required, use
Source Data Server the ellipsis button adjacent to this field to select a server from a
list of installed data servers.
Tag Name Filter If required, enter a server-specific filter string.
Select this checkbox to enable flat browsing, or clear the
checkbox to use hierarchical browsing. If required, use flat
Flat Browse
browsing mode to view all items on a server without the branch
structure.
Use this button to return a list of branches and items available in
Browse
the server.
Item Display Displays the applicable items allowing you to select those to be
Server Browser
The Server Browser (Figure 36) locates OPC classic servers.
Figure 37 displays the Advanced Tag Options window which is accessed via the Advanced
button on the Tag Browser (). The window components are described in Table 23.
Component Description
Timestamp Processing
Select this checkbox to replace the server-provided timestamp
with one from the system clock on the Desktop Historian
computer, for the selected items.
Use System Timestamp If this checkbox is not selected, and the Enable Tag Lifetime
checkbox is selected, a warning is displayed stating: “The
lifetime feature will not record tag values correctly unless the
OPC server provides updated timestamps, or the Use System
Timestamp option is selected.”
Enter or select a value (in milliseconds) to adjust the timestamp
for the selected tags before storing them. The Timestamp Bias
is added to the timestamp provided by the server, or if Use
Timestamp Bias
System Timestamp is selected, then the bias is added to the
system timestamp for this value. The bias may be positive or
negative.
Tag Lifetime
Select this checkbox to enable the Tag Lifetime feature for the
selected tags. Tags using the feature are periodically polled
according to the Lifetime Update Rate when values have not
changed in that time period.
Enable Tag Lifetime Selecting this checkbox enables the Lifetime Update Rate and
Units fields. If this checkbox is selected, and the Use System
Timestamp checkbox is not selected, a warning message is
displayed. See Use System Timestamp for message
information.
Tag Workspace
The Tag Workspace (identified as Tag Management screen section) contains all tags in Desktop
Historian. Each tag (row) represents a piece of data to be archived. Each tag consists of several
attributes (cells) that include a unique display name, matching data item, and several data update
parameters.
The Tag Workspace can be used to add new tags, remove tags, or modify the update behavior of
a tag.
The Apply button (located in the bottom right corner of the tab) synchronizes Desktop Historian
with the workspace by adding, removing, and modifying tags to match the contents of the
Workspace.
The Cancel button (located in the bottom right corner of the tab) resets the workspace with the
last known configuration. This effectively ignores any changes to the Workspace since the last time
the Apply button was used, or since the tab was opened.
The workspace cells change colour based on the expected action to be performed, and the results
of an action. Refer to Colour Legend for more information.
Component Description
Marks all selected tags for deletion. Tags will be deleted with the
Mark Items for Deletion Commit button has been pressed.
Unmarks all selected tags for deletion. This may be used after
Unmark Items for Deletion tags have been marked for deletion, but before the Commit
button has been pressed.
Opens the Preferences window which allows the user to select
Visible Attributes which attributes should be displayed in the Tag Workspace. For
more information, refer to Visible Attributes.
Set Default Visible Attributes Resets the visible attributes to only those displayed by default.
Refreshes the tag list from the tag database. This will cause all
Refresh Tags pending changes to be lost.
Shows/hides the Colour Legend window. Refer to Colour
Show Legend Legend for more information.
Component Description
Mark Tag For Deletion Marks all selected tags for deletion.
Unmark Tag For Deletion Unmarks all selected tags for deletion.
Set to Default Visible Resets the visible attributes to only those displayed by default.
Attributes
Refreshes the tag list from the tag database. This will cause all
Refresh Tag List pending changes to be lost.
Shows/hides the Colour Legend window. Refer to Colour
Legend Legend for more information.
Table 25 - Tag Management Context Menu Options
Tag Status
The Tag Status (Figure 41) is found at the bottom of the Tag Workspace and displays the
following:
Total number of tags
Number of marked, deleted tags
Number of modified tags
Number of tags with invalid attributes
Number of tags which are not committed after importing the tags using Import option.
Note: When the Data Collector is stopped, the OPC client configuration node will go offline.
To sort a column in an ascending order, click on the column header. Another click on the header,
will sort the column in a descending order.
Notes:
The tags should be added to the grid and can be
modified as required.
While importing the tags, a window Import tags from
file appears which shows the progress of the operation.
Adding a Tag
Tags can be added using the Tag Browser (Figure 35). A data server may provide a list of item
IDs contained in the server. Retrieving this list is referred to as “browsing”. The Tag Browser can
be used to find and select data items to archive.
To add a tag:
1. In the Tag Browser, enter or select the source data server you want to browse in the
Source OPC Server field.
2. If required, enter a filter string in the Tag Name Filter field.
3. If required, select the Flat Browse checkbox.
Note: Leaving this checkbox cleared will mean that hierarchical browsing will occur rather
than flat browsing. Refer to Figure 35 which shows how the Tag Browser screen section
appears when the Flat Browse checkbox is cleared, and when it is selected.
4. Click on the Browse button. This will retrieve the list of OPC items available in the selected
OPC server.
5. Select the tag or tags you wish to add.
Note: Typical Windows functionality can be used to select multiple items. To select non-
adjacent items, select one item and then hold down the CTRL key and click on each
additional item. To select adjacent items, select the first item in the sequence and then hold
down the SHIFT key and click on the last item in the sequence.
6. If required, make changes to the following fields: Enable Archiving of these Tags, Default
Update Rate, Default Data Type.
7. If required, click on the Advanced button.
8. The Advanced Tag Options window (Figure 37) appears.
9. Enable and define the Timestamp Processing and Tag Lifetime options as necessary.
10. Click on the Accept button to close the Advanced Tag Options window and return to the
Tag Browser.
Note: Any changes you made in the Advanced Tag Options window and then accepted
will be reflected in field below the Advanced button in the Tag Browser.
11. Click on the Add Selected Tags button (which is now enabled) to create the new Desktop
Historian tags in the workspace.
Note: The tags are added to MatrikonOPC Desktop Historian immediately after the Add
Selected Tags button is pressed.
Select the Mark Items for Deletion button on the Tag Management toolbar.
Notes:
Once the Mark Items for Deletion button has been selected, the selected tag or
tags appear highlighted in red to acknowledge the request (Figure 46).
If required, you can unmark those tags marked for deletion by selecting Unmark
Tag for Deletion from the context menu, or by selecting the Unmark Items for
Deletion button from the toolbar. For more information refer to Tag Management
Context Menu.
The Mark Tag For Deletion and Unmark Tag For Deletion context menu options
are enabled only when rows have been selected.
3. Click on the Commit button. The selected tag or tags are removed.
Renaming a Tag
A tag’s display name can be modified just like any other attribute. For more information, refer to
Changing a Tag Attribute.
Note: Deleting a tag and then creating a new tag with the same name
will not recover old tag data.
To rename a tag:
1. In the Tag Workspace, click in Item Name field you want to change.
2. Make the required name change.
Note: If a tag’s Update Rate is 0, the tag disables all point updates
including Lifetime updates. This setting does not prevent OPC clients
from writing to the tag via the OPC server.
Invalid Attributes
Invalid attributes are highlighted in yellow with a red triangle displayed in the top right corner of
the cell, as show in Figure 49. When your cursor is moved over the red triangle, a comment
window is displayed with a detailed explanation of why that particular attribute is invalid.
Note: Tags are updated only once all invalid attribute fields are
corrected.
Figure 51 - Lifetime and Timestamp Processing Attributes (with Lifetime Update Rate Field Options Displayed)
Attribute Description
If this checkbox is selected, lifetime processing is enabled. A tag
with lifetime processing enabled will be demand-read from the
OPC server if the lifetime expires without an update from the
Tag Lifetime Enabled data server.
Note: If the tags Update Rate is set to 0 then this setting is
ignored and Lifetime updates will not occur.
The amount of time to wait after the last updated value from the
data server before attempting a demand-read to refresh the tag
Lifetime Update Rate
value and timestamp.
Clicking on the down arrow displayed on the right side of this
Notes:
As per all other attributes, changes to those items listed in
Table 26 will take effect only once the Commit button is
selected.
If the configured tag does not have an external source
configured, then configuring Lifetime Processing will have no
effect.
Adding Instance
To add a new instance:
1. Enter the name of the new instance in the New Instance field.
2. Click on the Add button.
Removing Instance
To remove an existing instance:
1. Select the instance in the Existing Instances list.
2. Click on the Remove button.
Notes:
Each instance can be distinguished by a numerical identifier.
Each instance has its own OPC server identified by a version dependent ProgId based on
its numerical identifier. For example, an instance named “Second Storage” that has 2 as
identifier will have the ProgId Matrikon.OPC.Desktop.Historian.2.
The table below describes the components of the History Transfer Configuration toolbar.
Start History Transfer Starts a history transfer that has been stopped.
The table below describes the components of the History Transfer Properties dialog.
Component Description
Description Enter a description for the history transfer.
History transfer data source. Click the browse button to use
Data Source
the Browse for HDA Servers screen.
Select a History transfer source type from the drop-down. The
Type
options available are OPC HDA Server and CSV file.
3. In the Browse Filter window, users can apply a filter to the tag browser and choose the
maximum number of items in the Max Items field. The source list will be populated with
the tags retrieved from the source OPC server. If the user chooses to proceed without
entering the number of items, then by default, 100 items are returned.
4. Click on the Browse button in the Destination area. The Browse Filter window appears.
5. Similarly, in the Browse Filter window, users can apply a filter to the tag browser and
choose the maximum number of items in the Max Items field. The destination list will be
populated with the tags retrieved from the source OPC server. If the user chooses to
proceed without entering the number of items, then by default, 100 items are returned.
6. From the populated source and destination list, select the source tag to be transferred and
the corresponding destination tag where the source data is to be sent.
Component Description
Transaction Buffer Size Limits the total amount of data that will be copied from the
source to destination per buffer. It is recommended to keep this
number smaller than the amount of memory available on your
computer. The available range is 0.01 through 128 MB.
Default = 0.11 MB
Reconnection Attempts If either the data source or data destination becomes
disconnected during a transaction, this is the number of
attempts that are made before the transaction is deemed a
failure.
Default = 1
Reconnection Delay The total time that is delayed (in seconds) in between
reconnection attempts. This gives the disconnected
source/destination time to ‘become available’.
Default = 5 seconds
Buffer Transfer Retries If a problem occurs during a transaction, this number will set
how many attempts will be made before the transaction is
Redundancy Overview
History Transfer Redundancy is used for increasing data availability. In a redundancy setup, there
is a Primary History Transfer and a Backup History Transfer. A typical deployment with
History Transfer Redundancy is illustrated in Figure 68.
Historian
Primary Backup
History History
Transfer Transfer
Historian Historian
The system is usually deployed with the Primary History Transfer residing on the primary source
node and the Backup History Transfer residing on the backup source node. The Historians on
both the Primary and Backup History Transfers collects the same data from the same data
sources. The data destinations for the Primary and Backup History Transfers are the same.
The Primary History Transfer will be responsible for data transfer as long as it is alive. The
Backup History Transfer will take over the data transfer when it detects that the Primary
History Transfer is not running any more. Increased availability of historical data is achieved.
The following points will explain how the Primary History Transfer and Backup History
Transfer will behave under different situations:
If the Primary History Transfer starts up with the Backup History Transfer not running, the
Primary History Transfer will be responsible for data transfer.
If the Backup History Transfer starts up with the Primary History Transfer running, the
Backup History Transfer will standby. The Primary History Transfer will update its
transaction execution status (transaction data window and next schedule time) to the
Backup History Transfer so that their transaction statuses are synchronized (transactions
are identified by the Transaction ID). This way, when the Backup History Transfer takes
over data transfer, it will continue from where the Primary leaves off.
If the Backup History Transfer detects the Primary History Transfer is no longer running and
cannot connect to the Primary within a certain timeout, the Backup History Transfer will
take over the data transfer responsibility.
If the Backup History Transfer starts up without detecting the Primary History Transfer
running within the timeout period, the Backup History Transfer will be responsible for data
transfer.
Configuration Settings
There are three redundancy settings: No Redundancy, Primary History Transfer, and Backup
History Transfer (Figure 69).
The appearance of the Scheduled Transfer Redundancy page depends on which Redundancy
Setup option is selected. If No Redundancy is selected, then the page displays only a
Redundancy Setup screen section. When either the Primary Node or Backup Node option is
selected, the Redundancy Configuration page displays three screen sections: Redundancy
Setup, Parameters, and Status. However, the parameters are different. For more information,
refer to Primary Node Configuration and Backup Node Configuration.
No Redundancy
If the History Transfer is configured to have no redundancy, it executes the configured transactions
without worrying about any peer History Transfers.
Table 30 describes the settings available for the Primary Node configuration.
Component Description
The port to listen on for the Backup History Transfer’s
Port connection.
Default = 20006
The delay to wait for Backup History Transfer connection before
Startup Delay starting to transfer data.
Default = 120 seconds
Timeout for receiving message responses.
Message Response Timeout
Default = 10000 milliseconds
The rate to send heartbeat message to the Backup History
Heartbeat Rate Transfer.
Default = 5000 milliseconds
If the Primary History Transfer does not receive any message
from the Backup History Transfer for this timeout period, it will
Connection Timeout consider the Backup History Transfer to be in failure.
Default = 60000 milliseconds
The rate to update the transaction execution status to the
Transaction Status Update Rate Backup History Transfer. Setting this value to 0 will trigger the
update whenever the status is changed.
Table 31 describes the settings available for the Backup Node configuration.
Component Description
The Primary History Transfer node to which to connect. This is
Primary Node the network name of the machine that the Primary History
Transfer node is running on.
The port on the Primary History Transfer node to which to
Port connect.
Default = 20006
The delay to wait to connect before starting to transfer data.
Connection Delay
Default = 120 seconds
The delay to wait before retrying to connect to the Primary
Connection Retry Delay History Transfer.
Default = 10000 milliseconds
Timeout for receiving message responses.
Message Response Timeout
Default = 10000 milliseconds
The rate to send heartbeat message to the Primary History
Heartbeat Rate Transfer.
Default = 5000 milliseconds
Connection Timeout If the Backup History Transfer does not receive any message
Note: Data Transfer validates the Primary History Transfer node. If it detects that it is an invalid
node name, a warning message is displayed.
Redundancy Status
The Redundancy Status screen section is shown in Figure 73.
If redundancy is configured, the status will be displayed at the bottom of the Scheduled Transfer
Redundancy page in the Status screen section (Figure 69). There are two statuses available:
Connectivity to the peer History Transfer – this is either Not connected or
Connected.
Data Transfer State – this status reflects whether this History Transfer is actually
Transferring data or Standing-by.
The status is automatically updated periodically. The Refresh button is available for an on-demand
update, if required.
Adding Instance
To add a new instance:
1. Enter the name of the new instance in the New Instance field.
2. Click on the Add button.
Removing Instance
To remove an existing instance:
1. Select the instance in the Existing Instances list.
Renaming Instance
To rename an existing instance:
1. Enter the new name of the instance in the New Instance field.
2. Select the instance that you want to rename in the Existing Instances list.
3. Click on the Rename button.
Notes:
Each Instance has its own separate set of window services.
Figure 80 shows the connected configurable parts of the solution. To access the application
functionality, you must navigate the tree-view (i.e., navigation) pane.
The Event Transactions node can be expanded allowing you to view other related screens (Figure
81
Management configuration screen allows you to manage transactions.
Options screen provides an interface to which you can customize the functionality of the
application.
The Event Transactions component is responsible for the migration of historical data from a
historical data source to a historical data destination using data event detection.
A transaction is the specification of a data transfer event, or series of data transfer events. Data is
moved from a data source to a data destination. A data window is the specific interval of stored
data that is to be moved from the data source, to the data destination. Each transaction can be
configured to trigger on a unique set of events.
An Event Source is a logical condition that can be tested against and if true, then a transaction
can be triggered. An example of an event source would be if an OPC value exceeds a user-defined
threshold or if communication with an OPC server is lost.
The Transactions screen section of the Event Transaction Management page (Figure 82) lists
the transaction users have created.
Table 32 describes the functionality of the buttons on the Transactions screen section.
Component Description
Select this button to define new event sources using the Event
Event Sources
Source Configuration screen.
Select this button to create a new transaction using the Transaction
New Transaction
Configuration screen.
Select this button to modify the selected transaction using the
Transaction Configuration screen. You must first click on an item
Edit Selected
in the Transactions list. Double-clicking on an item in the
Transactions list will also perform this action.
Selecting this button permanently removes the currently selected
Remove Selected
transaction.
Table 32 - Transaction Buttons
The Selected Transaction History screen section shows results from transactions that have
already run. To display the results for a particular transaction, select the appropriate transaction
from the Transactions screen section. Table 33 describes the functionality of the buttons on the
Selected Transaction History screen section.
3. Right-click your mouse anywhere in the panel on the left and select Add Event Source
from the displayed menu.
Or,
Select Add Event Source from the Edit menu. A new event source will be added in the left
panel (Figure 84).
Note: Event triggers are only calculated on leading edge events. This
means that the conditions used to detect a trigger must go from a
false state to a true state for a trigger to be detected.
8. Click on the Add a Condition to this Event Source button (see the top-right corner of the
screen) to create a new condition for this event.
9. A new condition appears in the left panel and the panel on the right displays configuration
options for the new condition (Figure 85).
The technique used in this example is based on timestamp comparisons and this example will
trigger an event if it has not changed in at least 30 seconds.
1. From the Event Source Configuration (see Figure 86) add a new Event source by clicking
Edit -> Add Event Source or by right clicking the left area of the window and selecting
Add Event Source.
3. Create a new Condition by clicking the button labelled Add a Condition to this Event
Source or by right clicking the new Event Source in the left tree and selecting Add
Condition.
4. Configure the condition to subscribe to the point of interest in your OPC server and to
evaluate to true when the timestamp does not change (see Figure 88).
This configuration will cause a DA subscription to be created with an update rate of one second.
The condition is configured to calculate to true if the timestamp has not changed since the last
calculation. The condition will be recalculated every 30 seconds as set in the Event Source.
Notes:
Since conditions are calculated every 30 seconds and the
condition looks for a timestamp change of exactly 0, it can take
up to 60 seconds to detect that the monitored tag has not been
changing.
Conditions use DA subscriptions to gather tag data. If a tag in
the OPC Server receives an updated timestamp, the Server will
not send the timestamp change to the subscriber unless either
the value or quality has changed. The condition will therefore
not be notified of the timestamp change and will trigger after
30 to 60 seconds.
3. In the Transaction Type field, select Batch Capture from the drop-down list.
4. In the Start Event Options screen section, select whether to use the first or last
occurrence of the start event as the start time for the historical data transfer.
5. In the Transaction Delay field, enter the applicable value, or use the increase or decrease
buttons to select the necessary value.
6. Select the required event sources from the drop-down lists in the Start and End Event
Source fields, for the transaction.
7. Enter or select the required Pre-Event and Post-Event Times for the transaction.
8. In the Retrigger Delay field, enter or select a value to define the minimum amount of time
that must pass after the end of a transaction before a new transaction can be triggered.
9. Map items as required. For detailed item mapping information, refer to the Mapping Tags
section in this manual.
10. On the Transaction Configuration screen, click on the Apply button.
11. The Transaction Configuration screen closes and you are returned to the Event
Transaction Management screen which now displays the newly created transaction in the
Transactions screen section (Figure 90).
Transaction Options
You have the option of configuring a transaction to be a Batch Capture or a Trip Capture. For
detailed instructions on how to configure a Batch Capture event transaction, refer to Creating and
Configuring an Event Transaction.
Table 35 describes the components of the transaction types.
Component Description
A Batch Capture transaction transfers historical data which occurs
Batch Capture
between two events.
A Trip Capture transaction transfers historical data which occurs within a
Trip Capture
time window around an event.
Table 35 - Event Transaction Types
1. If the First Occurrence option button is selected in the Start Event Options section, then
the time stamp of the first occurrence of the Start Event will be used as the start time for
the historical data transfer. If Last Occurrence is selected, then the time stamp of the last
occurrence of the Start Event before the End Event will be used.
2. The Transaction Delay is the amount of time after the data transfer window has passed
before the data transfer should actually be started.
3. The Start Event Source is the Event Source which when triggered will be the source of the
start timestamp for the historical data transfer.
4. The End Event Source is the Event Source which when triggered will be the source of the
end timestamp for the historical data transfer.
5. The Pre-Event Time is an offset used to calculate the actual start time of the data transfer
using the timestamp of the Start Event Source. The start time of the transaction is
calculated as [Start Event Time minus Pre-Event Time].
1. The Transaction Delay is the amount of time after the data transfer window has passed
before the data transfer should actually be started.
2. The Event Source is the Event Source which when triggered will cause a historical data
transfer to occur.
3. The Pre-Event Time is an offset used to calculate the actual start time of the data transfer
using the timestamp of the Event Source. The start time of the transaction is calculated as
[Event Time minus Pre-Event Time].
4. The Post-Event Time is an offset used to calculate the actual end time of the data transfer
using the timestamp of the Event Source. The end time of the transaction is calculated as
[Event Time plus Post-Event Time].
5. The Retrigger Delay is the amount of time that must pass before another instance of this
transaction can be triggered.
Tag Mapping
The data source and data destination can be configured in the Tag Mapping section (Figure 95) of
the Transaction Configuration screen.
Data Source
The data source where a user’s data is to be retrieved from is an OPC HDA server or a Comma
Separated Value (CSV) file. Clicking on the ellipsis button next to the Name field allows you to
browse to the HDA server or the CSV file to use as the data source.
1. OPC HDA Server Data Source – the HDA Read Properties window (Figure 97) is
accessible when OPC HDA Server is selected in the Type field. You can then click on the
HDA Read Properties ( ) button adjacent to the tag list below the Name field. This
properties window enables the user to configure whether or not the bounding data at the
start of the transaction window is included in the read results from the OPC HDA server.
Selecting this option will cause the HDA reads to include the nearest data value before the
start of the transaction window if such a value exists.
Data Destination
The Data Destination is the server or file that is to receive the transferred data values. These
controls are manipulated in the same fashion as the Data Source.
1. OPC HDA Server Data Destination – the HDA Write Properties window (Figure 99) is
accessible when OPC HDA Server is selected in the Type field. You can then click on the
HDA Write Properties ( ) button adjacent to the tag list below the Name field. This
properties window enables the user to configure the insert methods: either Insert or
InsertReplace.
If you are working with a CSV file, you will need to enter the tag names manually. Right-click on
the list in which you want to enter the tag to display a context menu. Select the Add Item menu
option. This will insert a new tag named New Item0. (Performing this process again will create
tags named New Item1, New Item2, New Item3, etc.)
To rename this tag to something more meaningful select the item by clicking on it. Then click the
tag again and wait approximately one second. A solid rectangle should now be drawn around the
item. This rectangle indicates you are now in edit mode. You may type the new name of the tag to
replace the old name.
If you wish to remove a tag from a list, select the tag you want to remove. Right-click your mouse
inside the tag list and select Remove Selected Items from the displayed menu. You may also
remove many tags at once by holding the SHIFT or CTRL keys on your keyboard while clicking on
multiple items. The Delete key on your keyboard will also remove selected tags from a list.
You can also copy all source tags to destination by selecting the Copy All Source Tags to
Destination option from the context menu, or copy all destination tags to source by selecting
Copy All Destination Tags to Source.
Mapping Tags Together
Because tags from the data source and data destination sometimes may not have the same name,
you must specify the source and destination for each applicable tag. This process is called
“mapping”.
Select a tag from the source list and then select a tag in the destination list. Click the Map
Selected button. Data Transfer will now copy values from the tag selected on the left to the tag
selected on the right when the transaction is executed.
If you want to map several tags at once, you may select multiple tags in each Unmapped list
above and then hold the SHIFT or CTRL keys while clicking. You may also drag and drop tags
from one list to another to map them. Tags can also be dragged from Microsoft Excel into the tag
windows.
Saving a Transaction
Once you have entered all information correctly and mapped all necessary tags, you can click on
the Apply button. The transaction will then execute at the time specified in the Scheduled Start
field. If the scheduled start time is before the current time, the transaction will execute
immediately.
Note: Clicking on the Apply button when editing a One Time Transaction that has already
executed will cause the transaction to execute again.
If you wish to discard all current changes on the Transaction Edit screen, select the Cancel
button.
Options
To configure event transaction options, access the Event Transaction Options page (Figure 105)
through the navigation pane.
Options Settings
Table 36 describes the Event Transaction Options page components. For more information, refer
to Accessing Event Transaction Options.
Component Description
Limits the total amount of data that will be copied from the source to
destination per buffer. You should keep this number smaller than the
Transaction Buffer Size amount of memory available on your computer. The available range
is 0.01 through 128 MB.
Default = 10 MB
If either the data source or data destination becomes disconnected
during a transaction, this is the number of attempts that are made
Reconnection Attempts before the transaction is deemed a failure.
Default = 5
The total time that is delayed (in milliseconds) in between
reconnection attempts. This gives the disconnected
Reconnection Delay source/destination time to ‘become available’.
Default = 5000 milliseconds
Buffer Transfer Attempts If a problem occurs during a transaction, this number will set how
many attempts will be made before the transaction is deemed a
Version Information
Figure 106 displays the tree-view pane outlining the access to the version information and the
Event Transaction Version page.
You also have the option of “floating” the Tag Browser window by clicking on the Tag Browser
screen section title bar, and dragging it anywhere on the screen (Figure 109). To return the Tag
Browser to its locked-in position, double-click your mouse on the Tag Browser title bar.
Visible Attributes
Note: For a detailed list of all attributes, refer to Appendix I – Attributes.
When the Tag Workspace is initially displayed, only the attributes for an OPC tag are displayed.
There are two methods by which to display select attributes.
1. First Approach:
1. Right-click your mouse anywhere in the Tag Workspace.
2. From the displayed menu, select the Set Visible Attributes (Shortcut) menu option
(Figure 110).
3. A sub-menu is displayed listing the available attributes. The currently visible attributes
are checked.
4. Click on an attribute to make it visible (checked) or invisible (not checked).
2. Second Approach:
The Preferences window can also be used to select which attributes are visible in the Tag
Workspace. This window provides detailed information (Name, Data Type, and Description) for
each attribute and allows you to perform multiple changes at once.
1. Right-click your mouse anywhere in the Tag Workspace.
2. From the displayed menu, select the Set Visible Attributes menu option.
3. The Preferences window (Figure 111) is displayed.
4. Click on an attribute to make it visible (checked) or invisible (not checked).
5. Click on the Apply button to accept the attribute selection, and to close the
Preferences window to return to the Tag Workspace.
Colour Legend
The Legend window illustrates the different colors used for different information, including deleted
tags, changed attributes, invalid attributes, etc.
To display the Legend window:
1. Right-click anywhere in the Tag Workspace.
2. From the displayed menu, select the Legend menu option.
Or,
Click on the Show Legend button on the Tag Management toolbar.
3. The Legend window appears.
Alias Configuration
MatrikonOPC servers, including this one, provide the ability to create user-defined aliases that can
be used in place of regular OPC items. This feature is particularly useful when the item path for a
given server is very complex or difficult to remember, for example: Com1.Radio1.Unit1.41.4.123.
Servers can also be configured so that client applications have access to configured aliases only,
rather than every available item.
This section of the manual describes how to create and edit aliases using the Configuration
window.
Note: It is not necessary to define aliases before accessing server data items from an OPC client.
Component Description
This Alias type is used to rename an item in this server. Basic Aliases also
Basic provide basic scaling options. Refer to Basic Alias Configuration for more
information.
Use this Alias type to define an Alias that is the result of a mathematical
Calculation equation involving one or more data items in the server. Refer to
Calculation Alias Configuration for more information.
Use this Alias type to create a brand new data item not associated with any
Holding item in the server. This type of item is useful for temporary items and
testing. Refer to Holding Alias Configuration for more information.
Table 37 - Alias Configuration Wizard - Alias Type Components
Component Description
Displays the path where the new Alias item will reside once created.
Alias Group
This field is read-only.
Allows you to enter a name for the Alias you are creating. This name
Alias Name
must be unique within the Alias Group.
Allows you to enter or select a fully-qualified item ID for the OPC
item to which the Alias refers. Click on the Browse OPC Tag button
to display the Browse OPC Tag window which can be used to select
an existing OPC item on the server.
OPC Tag Alternatively, leave the item path blank to use the Alias as a general
in-memory variable. When doing so, either define the data type for
the Alias point as something other than Default, or have the Alias
set for reading and define the data type while writing values to the
Alias from an OPC client.
Table 38 - Alias Configuration Wizard - Step 2: Alias Identity Components
Figure 117 shows the Browse OPC Tag window which allows you to browse for tags on existing
OPC servers.
Component Description
Browser Allows you to browse the OPC servers available on your system.
Available Tags Displays the tags available in the selected OPC server.
Refresh Click on this button to refresh your browser.
Allows you to filter available tags using a string pattern. For example,
*a will display all tags starting with the letter a. Enter a string pattern
Filter in the field to the left of the Filter button. Select the Filter button,
and all applicable tags are listed in the Available Tags screen
section.
Click on this button to confirm the tag you have selected, and to close
OK
the Browse OPC Tag window.
Click on this button to cancel your selection and return to the previous
Cancel
window.
Table 39 - Browse OPC Tag Window Components
Component Description
From the drop-down list, allows you to set the value of the OPC item
Data Type to the specified type unless Default is selected. Also serves as the
“canonical” data type for the Alias.
When this checkbox is selected, OPC clients are prevented from
Read-Only
writing values to the Alias.
Select whether to continue polling for data even if the connected
Poll when Inactive
client sets the alias to an inactive state.
The rate at which alias will update its value. Set to 0 for the fastest
Update Rate
client update rate.
Table 40 - Alias Configuration Wizard - Step 3: Alias Properties Components
Figure 119 shows the Scaling Algorithm configuration step when the Basic Alias configuration
option has been selected.
Component Description
Allows you to select, from the drop-down list, the required scaling
Scaling
option for the Alias.
Table 41 - Alias Configuration Wizard - Step 4: Scaling Algorithms Component
Figure 120 shows the Linear Scaling configuration step when the Basic Alias configuration option
has been selected.
Component Description
Raw High Maximum expected raw value of the OPC item.
Raw Low Minimum expected raw value of the OPC item.
Maximum desired scaled value for the Alias (corresponds to Raw
Scaled High
High).
Minimum desired scaled value for the Alias (corresponds to Raw
Scaled Low
Low).
Clamp the scaled value at the high limit to prevent it from going out
Clamp High
of range.
Clamp the scaled value at the low limit to prevent it from going out
Clamp Low
of range.
Table 42 - Alias Configuration Wizard - Step 4: Scaling Algorithms (Linear Scaling)
Figure 121 shows the Square Root Scaling configuration step when the Basic Alias configuration
option has been selected.
Component Description
Raw High Maximum expected raw value of the OPC item.
Raw Low Minimum expected raw value of the OPC item.
Maximum desired scaled value for the Alias (corresponds to Raw
Scaled High
High).
Minimum desired scaled value for the Alias (corresponds to Raw
Scaled Low
Low).
Clamp the scaled value at the high limit to prevent it from going out
Clamp High
of range.
Clamp the scaled value at the low limit to prevent it from going out
Clamp Low
of range.
Table 43 - Alias Configuration Wizard - Step 4: Scaling Algorithms (Square Root Scaling) Components
Figure 122 shows the Gain/Offset configuration step when the Basic Alias configuration option
has been selected.
Component Description
Gain Scaling factor. (No limits are assumed.)
Offset Scaling offset.
Table 44 - Alias Configuration Wizard - Step 4: Scaling Algorithms (Gain/Offset Scaling) Components
Figure 123 shows the Expression Scaling configuration step when the Basic Alias configuration
option has been selected.
Component Description
Simple text equation to apply to incoming values (reads). Click on the Editor button
Input to display the Expression Wizard screen used to help build a formula. For more
information, refer to the Expression Wizard section in this manual.
Simple text equation to apply to outgoing values (writes). Click on the Editor button
Output to display the Expression Wizard screen used to help build a formula. For more
information, refer to the Expression Wizard section in this manual.
Table 45 - Alias Configuration Wizard - Step 4: Scaling Algorithms (Expression Scaling) Components
Figure 124 shows the Expression Wizard that is used to configure the input and output
expressions.
Notes:
The Expression Wizard appears and functions the same for an input expression as it does
for an output expression. The differences being the expression field label: Input
Expression, Output Expression, and that one is for reads and the other for writes.
If you are expecting to read a particular alias, create an Input Expression. If you are
expecting to write to a particular alias, create an Output Expression.
Please refer to the Expression Wizard section in this User’s Manual for examples.
Component Description
Displays the expression as it is created. This field is free-form which allows you to
Input/Output manually enter or edit information. This field reads Input Expression when
Expression creating an input or “read” expression. It reads Output Expression when
creating an output or “write” expression.
Select this button to display the Select Function window which allows you to
Function
select the necessary function from those available.
Select this button to display the Select Variable window which allows you to
Variable
select the necessary variable from those available.
Select the applicable button to add the corresponding operator or operators to the
Operators
expression.
Clear Select this button to clear the Input/Output Expression field.
OK Select this button to accept changes to (or the creation of) the expression.
Select this button to discard changes to (or abandon the creation of) the
Cancel
expression.
Table 46 - Expression Wizard Components
Figure 125 shows the Select Function options of the Expression Wizard.
Component Description
Displays the available categories for selection. Allows you to select the
Category
required category.
Displays the available functions associated with the selected category.
Available Functions
Allows you to select the required function.
Select this button to accept the selections made and return to the
Continue
initial Expression Wizard window.
Select this button to disregard the selections made and return to the
Cancel
initial Expression Wizard window.
Table 47 - Select Function Window Components
Figure 126 shows the Select Variable window of the Expression Wizard.
Component Description
Displays the available variables for selection. Allows you to select the
Select variable
required variable.
Select this button to accept the selection made and return to the
OK
initial Expression Wizard window.
Select this button to disregard the selection made and return to the
Cancel
initial Expression Wizard window.
Table 48 - Select Variable Window Components
Figure 127 shows the Alias Events configuration step when the Basic Alias configuration option
has been selected.
Component Description
Enable events Select whether to generate an event each time when the value of this alias changes.
for this Alias
Source The name of the source for the event.
Severity Severity of the alarm ranging from 1 to 1000.
Category The event category this event is registered to.
Table 50 describes the components of Alias Identity step when the Calculation Alias
configuration option has been selected.
Component Description
Displays the path where the new Alias item will reside once created. This field is
Alias Group
read-only.
Allows you to enter a name for the Alias you are creating. This name must be
Alias Name
unique within the Alias Group.
OPC Tag OPC tags name
Browse OPC Tag Opens a dialog used to browse server address space and select desired tag.
Table 50 - Alias Configuration Wizard - Step 2: Alias Identity Components
Component Description
From the drop-down list, allows you to set the value of the OPC item
Data Type to the specified type unless Default is selected. Also serves as the
“canonical” data type for the Alias.
Select whether to continue polling for data even if the connected
Poll When Inactive
client sets the alias to an inactive state.
The rate at which alias will update its value. Set to 0 for the fastest
Update Rate
client update rate.
Table 51 - Alias Configuration Wizard - Step 3: Alias Properties Components
Figure 130 shows the Alias Calculation configuration step when the Calculation Alias
configuration option has been selected.
Component Description
Alias Calculation Allows you to enter a calculation equation.
Select this button to display the Insert OPC Tag window (i.e., Tag
Insert OPC Tag Browser –Figure 117) allowing you to insert OPC tags as part of the
calculation formula.
This field lists a wide selection of mathematical functions that can be
used as part of your Alias calculation configuration. Double-click your
Insert Function
mouse on the required function and it appears in the calculation
equation displayed in the Alias Calculation screen section.
Table 52 - Alias Configuration Wizard - Step 4: Alias Calculation Components
Figure 131 shows the Alias Events configuration step when the Calculation Alias configuration
has been selected.
Component Description
When this checkbox is selected, Alias events are enabled for this
Enable events for this Alias
Alias item.
Source Allows you to enter the name of the source of the event.
Allows you to enter or select a value defining the severity of the
Severity
alarm. The allowable range is 1 through 1000.
Allows you to select, from the drop-down list, the event category
Category
under which the event is to be registered.
The Manage Categories button launches the Manage Events
Manage Categories Categories window (Figure 132) where you can create new
categories, as well as edit or delete existing categories.
Allows you to select, from the drop-down list, how the Alias event is
Trigger Condition
to be triggered: Value Change, Positive Edge.
Allows you to select, from the drop-down list, whether the
Timestamp Source timestamp for the Alias event is retrieved from the Server or the
Device (if it is different).
Allows you to enter a message that is to appear in the posted event.
This message can contain references to data items in the server.
Message
These references are replaced with the values of those items at the
time the event was generated.
Component Description
Select this button to access the New Event Category window (Figure 133) and
New
create a new category.
Select this button to edit the currently selected category.
Edit Note: This button is available only if at least one event category has been created
and selected.
Select this button to delete the selected category.
Delete Note: This button is available only if at least one event category has been created
and selected.
Select this button to close the Manage Event Categories window and return to
Close
Step 5 of the Alias Configuration Wizard.
Table 54 - Manage Event Categories Window Components
Component Description
This is an automatically-assigned field that identifies the newly-
Category ID
created category.
Name The name of the newly-created category.
Description A description of the newly-created category.
Table 55 - New Event Category Window Components
Table 56 describes the components of Step 2: Alias Identity when the Holding Alias
configuration option has been selected.
Component Description
Displays the path where the new Alias item will reside once created.
Alias Group
This field is read-only.
Allows you to enter a name for the Alias you are creating. This name
Alias Name
must be unique within the Alias Group.
OPC Tag OPC tags name
Opens a dialog used to browse server address space and select
Browse OPC Tag
desired tag.
Table 56 - Alias Configuration Wizard - Step 2: Alias Identity Components
Figure 135 shows the Alias Properties configuration when the Holding Alias configuration option
has been selected.
Component Description
From the drop-down list, allows you to set the value of the OPC item
Data Type to the specified type unless Default is selected. Also serves as the
“canonical” data type for the Alias.
When this checkbox is selected, OPC clients are prevented from
Read-only
writing values to the Alias.
Default Value The default value of the holding Alias item created.
Table 57 - Alias Configuration Wizard - Step 3: Alias Properties Components
Editing Aliases
To edit an Alias:
1. From the Alias Configuration panel, select the Alias item you wish to edit.
Removing Aliases
Note: Any Alias that was created can be removed.
To remove an Alias:
1. From the Alias Configuration panel, select one or more Aliases you wish to remove.
Exporting Aliases
Note: Use the Export Alias File window to export all currently configured Aliases to a CSV file.
To export all currently configured Aliases:
1. From the navigation pane, select the Alias Configuration node.
Importing Aliases
Note: Use the Import Alias File window to clear all Aliases and import new ones from a CSV file.
To import Aliases from a CSV file:
1. From the navigation pane, select the Alias Configuration node, and either:
Expression Wizard
The Expression form of scaling uses an Expression Wizard to build formulas. The created
formula is a simple text equation that is applied to either incoming values (i.e., reads), or outgoing
values (i.e., writes).
Examples
Example 1:
The following turns any number into a Boolean value. Any non-zero value shows up as a 1.
IF(INPUT = 0,0,1)
OUTPUT
Example 2:
The following takes the text out of SAMPLE and converts it to ON. All other values show as OFF. If
OUTPUT is specified in the Output field, then the value is transferred to the end OPC item. Using
this alias, you can write SAMPLE or any other value to the Alias to get the display to change from
OFF to ON.
String comparisons are case-sensitive.
IF(INPUT = ‘SAMPLE’,’ON’,’OFF’)
OUTPUT
Table 58 describes the Expression Wizard fields.
Component Description
Displays the expression as it is created. This field is free-form which
allows you to manually enter or edit information. This field reads Input
Input/Output Expression
Expression when creating an input or “read” expression. It reads
Output Expression when creating an output or “write” expression.
Select this button to display the Select Function window which allows
Function
you to select the necessary function from those available.
Select this button to display the Select variable window which allows
Variable
you to select the necessary variable from those available.
Select the applicable button to add the corresponding operator or
Operators
operators to the expression.
Clear Select this button to clear the Input/Output Expression field.
OK Select this button to accept changes to (or the creation of) the
Notes:
The Expression Wizard appears and functions the same for an input expression as it does
for an output expression. The differences being the expression field label: Input
Expression, Output Expression, and that one is for reads and the other for writes.
If you are expecting to read a particular Alias, create an Input Expression. If you are
expecting to write to a particular Alias, create an Output Expression.
To create an Input or Output Expression:
1. When the Expression Wizard (Figure 124) is displayed, manually enter your new
expression in the Input Expression field and proceed to step 7.
Or,
Perform steps 3 through 7 using a combination of the Function, Variable, and Operators
buttons to create your expression, which will be displayed in the Input/Output
Expression field as you build it.
2. Click on the Function button to go to the Select Function (Figure 125) window. After
selecting the required function, click on the Continue button to bring up the Function
Parameter (Figure 136) window.
7. Click on the OK button on the Expression Wizard screen to close the wizard and display
the expression in either the Input or Output field, depending on which expression you
defined.
Logging Options
The Logging Options page allows you to customize the way error and debug information is
recorded by the server.
Note: Logging Options settings are saved once the Apply button is
selected. However, they do not take effect until the back-end server is
re-started.
Command Description
Selecting this checkbox enables general activity logging. If this
Enable server activity checkbox is not selected (i.e., the checkbox is cleared), none of the
logging fields on the Logging Options page are available.
By default, this checkbox is selected.
Activity Log Settings
If this field is enabled, allows you to select from the drop-down list,
the amount of detail to provide in the log file:
None
Low – Errors (default setting)
Log Level Medium – Errors and Warnings
High – Errors, Warnings, and Information
If the Enable server activity logging checkbox is not selected
(i.e., the checkbox is cleared), this field is not available.
Default = None.
If this field is enabled, allows you to enter a full path for the activity
log file. The default path is: C:\Program Files\Common
Files\MatrikonOPC\Common\
Filename PSTCFGMatrikon.OPC.DesktopHistorian.1.log.
If the Enable server activity logging checkbox is not selected
(i.e., the checkbox is cleared), this field is not available.
Select this button to access the Open window which allows you to
Browse locate and select the necessary log file. The selected file is displayed
in the Filename field.
If enabled, selecting this checkbox ensures that the old log file is
overwritten each time the server starts up. Otherwise, the old log file
Overwrite old log is renamed with an underscore (_) prefix.
information If the Enable server activity logging checkbox is not selected
(i.e., the checkbox is cleared), this field is not available.
By default, this checkbox is cleared.
If enabled, selecting this checkbox ensures that the file buffer is
flushed after each message logged, in case the server is crashing.
This checkbox is available only if the:
Commit all log file writes
Wrap log file if it exceeds checkbox is cleared, and
Enable server activity logging checkbox is selected
By default, this checkbox is neither enabled nor selected.
If enabled, selecting this checkbox specifies that the log file is
wrapped when it exceeds the defined value (in MB).
If this checkbox is selected, the Commit all log file writes
Wrap log file if it exceeds
checkbox is unavailable.
If the Enable server activity logging checkbox is not selected
(i.e., the checkbox is cleared), this field is not available.
Version
This page is display only and shows OPC server version information.
To view OPC server version information:
1. On the navigation pane of the Configuration window, select and expand the following
nodes:
Desktop -> Localhost -> OPC Desktop Historian -> Options -> OPC Server ->
Main Storage -> General
2. Click on the Version item displayed under the OPC Server node. Figure 139 displays the
Version page.
Server Options
Note: Server Options settings take effect only once the Apply
button is selected.
2. Click on the Configure item displayed under the Server Options node. Figure 140 displays
the navigation pane and Server Options page.
Command Description
Allows you to set a maximum number of values that can be returned
from an HDA ReadRaw request. If an HDA client makes a request
which exceeds this value, then no data is returned and the client
receives an error code indicating that they exceeded the server’s
limit. Setting this value to 0 means that no limit is enforced on the
number of items returned.
Default value = 0.
Notes:
Maximum Return Values
This limit is not enforced for Browsing operations.
This limit is only enforced for the number of data points
returned to the OPC HDA Client making the read request. The
number of data points retrieved in internal Read Raw
operations (performed to gather the data needed to make
aggregate calculations) is not limited. Therefore, load issues
can still occur when a Maximum Return Values limit is in
place.
Client Settings tab variables (i.e., fields) and functions are described in Table 61.
The Data Buffer Settings manage how the OPC client will buffer the received data before sending
it to the core. The OPC client will first store data (buffer) in the memory. When the amount of
buffered data in memory exceeds certain limits, the OPC client will start buffering data in files. All
of these operations are transparent to the user, but you can customize how much data is to be
buffered in memory and in the data files.
The Data Buffer Settings variables and functions are described in Table 62.
Command Description
Allows you to enter the directory where the data files will be created.
Data buffer directory By default, this directory is: C:\Program Files\Matrikon\OPC\Desktop
Historian\OPC Client\Data Buffer\.
Allows you to enter a value to define the maximum number of data to
be buffered in memory. By default, this value is 5,000,000. The OPC
Maximum number of data in
client will make an intelligent judgement as to when to start buffering
cache
data to files, based on the current number of data in cache and this
maximum value.
Allows you to enter the maximum number of files to be created. By
Maximum number of files
default, this value is 20.
Allows you to enter the maximum file size (in MB) for each file. By
Maximum file size
default, this value is 25 MB.
Use this button to commit any changes made on the Client Settings
Apply
tab.
Use this button to discard any changes made on the Client Settings
Cancel
tab.
Table 62 - Client Settings (Data Buffer Settings) Tab Components
The Logging Settings tab (Figure 142) allows you to edit OPC client general logging options. The
log files will be contained in the following location ([ ] indicates the default installation path):
[C:\Program Files\Matrikon\OPC\Desktop Historian\OPC Client\Log]
The Logging Settings tab variables (i.e., fields) and functions are described in Table 63.
Command Description
Log file directory Displays the log file directory (read-only).
Allows you to select from the drop-down list, the amount of detail to
provide in the log file:
None
Log level Low – Errors (default setting)
Medium – Errors and Warnings
High – Errors, Warnings, and Information
Default = Low.
Allows you to define the maximum size of the log file (in MB). Once
this size is reached, the oldest data in the file is erased at the same
Log file size
rate that new information is written to the log file. This value will be
ignored if Forced writing is activated.
Indicates how often the log is to be written to. If the checkbox is
Commit all log file writes selected, statements must be written to the log file as soon as they
are reported. No caching may be used.
Use this button to commit any changes made on the Logging
Apply
Settings tab.
Use this button to discard any changes made on the Logging
Cancel
Settings tab.
Table 63 - Logging Settings Tab Components
3. From the Excel Tools menu, select the Add-Ins menu option. The Add-Ins window
appears.
4. From the Add-Ins window, click on the Browse button. The Browse window appears.
5. In the Browse window, navigate to [C:\Program Files\Matrikon\OPC\Desktop
Historian\Utils].
6. Note: [ ] indicates the default installation path.
7. Click on the TagMgr.xll file.
8. The entry Matrikon Desktop Historian – Tag Manager should now appear selected in
the list of add-ins. Click on the OK button to close the dialog box.
CAUTION: You may NOT change any of the default OPC attributes.
Note: Use the existing Excel worksheet complete with loaded default OPC tag attributes and the
new attribute you added above.
1. Click in the Action column for the row you want to change, and type MOD.
2. Change the existing information in the same row under any of the following columns: Attr
Name, Data Type, Description.
3. Click your mouse anywhere outside of the changed row.
4. From the Excel Desktop Historian menu, select the Commit Changes menu option.
5. A message appears stating that all changes were committed successfully.
6. Click on the OK button.
CAUTION: You may NOT delete any of the default OPC attributes.
Note: Use the existing Excel worksheet complete with loaded default OPC tag attributes and the
new attribute you added and then changed, previously.
1. Click in the Action column for the row you want to delete, and type DEL.
2. Click your mouse anywhere outside of the row.
3. From the Excel Desktop Historian menu, select the Commit Changes menu option.
4. A message appears stating that all changes were committed successfully.
5. Click on the OK button.
Renaming an Attribute
To rename a tag attribute:
1. Using the Excel worksheet, in the Attr Name column, select the name you want to change.
2. In the Action column, type MOD next to the name to be changed.
3. In the Excel formula bar, type REN before the existing name, place quotation marks
around the existing name, add a space and type in the new name surrounded by quotation
marks. For example, REN “Existing Name” “New Name”.
4. Click your mouse anywhere outside of the row.
5. From the Excel Desktop Historian menu, select the Commit Changes menu option.
6. A message appears stating that all changes were committed successfully.
7. Click on the OK button.
8. From the Excel Desktop Historian menu, select the Load Tags menu option.
9. The Load Tags window appears listing all selected tags (refer to Figure 145).
10. Click on the OK button to add all tags and tag attributes.
11. The worksheet refreshes and the change is displayed.
Filtering Tags
Note: Data Type and Name filters may be combined.
To filter tags by name:
1. On the Load Tags window, in the Name Filter field, enter the tag name (or part of tag
name) that you want to match. Use an asterisk as a wildcard character.
And/or,
7. In the pane on the right side of the window, double-click your mouse on the tag you want to
add. The tag is added to the Excel worksheet.
Note: Tags can also be added by right-clicking your mouse on the tag you want to add and
selecting Add Selected from the menu that appears. This is particularly useful when adding
multiple tags.
8. From the Excel Desktop Historian menu, select the Commit Changes menu option.
9. A message appears stating that all changes were committed successfully.
10. Click on the OK button.
2. In the Connect to Instance field, select an instance from the drop-down list.
3. Click OK.
Logging
All MatrikonOPC servers produce log files that record errors and debugging information. The log
files can be extremely valuable for troubleshooting. As such, it is important to note that the default
log level is set to low. The General Logging tab on the Options window in the main configuration
screen contains settings to control server logging.
General Activity Logging records information about the internal workings of the OPC server. It is
useful for troubleshooting problems with configuration and device communication. Interface
Activity Logging records information about the client/server OPC communication. It is useful for
troubleshooting compliance issues.
For General logging, the higher the log level, the more information that is recorded. However,
server performance may decrease at higher log levels. The recommended operating level is
Medium. More log levels are available for both types of logging which record more detailed
information, as well as the ability to output log statements to a console window at run time.
Contact MatrikonOPC support for further instructions on how to enable the higher log levels and
console logging.
For Interface logging, the log level can be considered very high and therefore should never be used
during normal operation of the OPC server unless specifically working on problems related to
interfacing.
MatrikonOPC Sniffer is a useful tool for logging OPC client/server communication. It enhances
the Interface Activity Logging by recording the client-side transactions. It can also be used with
other OPC servers. MatrikonOPC Sniffer is a utility used to troubleshoot OPC client/server
interoperability issues. Contact the MatrikonOPC Sales department for further information about
this product, or use the following link to access the MatrikonOPC Sniffer Download.
In general, the server logs all errors and other information of immediate importance to the user at
the low detail level, all warnings and other information of moderate importance to the user at a
medium detail level, and additional information concerning the normal functioning of the software
at a high detail level. The server also logs further information of concern to support personnel at
the debug log level.
Note: The higher the log level, the slower the performance of the
server. It is recommended that the log level be left at the default,
unless troubleshooting needs to be performed.
12. Communication failure - if communication failure occurs with a source OPC server,
Desktop Historian records a bad quality point in history. When communication is re-
established, Desktop Historian does not record a good quality point until the point value at
the data source changes.
Workaround: Enabling the lifetime functionality for tags that rarely change prevents
points from appearing bad in history for extended periods.
Refer to the MatrikonOPC Desktop Historian Release Notes for known issues.
Problem: My OPC client stops receiving item values after two hours.
Solution: The OPC server is licensed with a hardware or software key, and the demonstration
period for the server has expired.
Problem: A third-party OPC client does not provide a means to configure access paths, making it
difficult to correctly specify the data acquisition options for the items.
Solution: The server provides a global parameter for configuring an escape character to allow
users to append communication options to the end of an Item ID to accommodate
those clients that do not support access paths.
Perform the following steps:
1. Create a string value named ItemIDEscapeCharacter in the following
location: HKEY_CLASSES_ROOT\CLSID\{20DE4721-17CD-4912-AD78-
B3702370B733} \Options.
2. To create a new value, select the Options key and then choose New String
Value from the Edit menu.
3. Set the value of ItemIDEscapeCharacter entry a single character such as “|”
(pipe).
4. To edit the value, select the entry and choose Modify from the Edit menu.
5. Shut down the server and restart it for the change to take effect.
6. Configure the ItemIDEscapeCharacter Item ID in the OPC Client with the
access path appended to the end with the configured escape character (e.g.,
ITEMID|ACCESSPATH).
More than one HASP attached to parallel port, but only first one is recognized
Problem: There is more than one HASP hardware key from MatrikonOPC attached to the parallel
port, but the software only recognizes the first one.
Solution: HASP keys from the same vendor cannot be chained together. Contact your Account
Manager to obtain a HASP key containing the combined codes of all installed
MatrikonOPC servers.
Problem: The OPC server does not show up in a list of locally available program IDs in a third-
party OPC client application.
Solution: Make certain that a user with local administrative rights installs the OPC server so that
it can create the necessary entries in the registry.
Also, particularly for older OPC clients that do not use the OPC Server Browser, make
certain that the client is running as a user that has Read access to the registry.
In addition, make sure that Microsoft Execution Prevention (DEP) is not on during
installation.
Problem: The OPC server does not report any new data for tags that should be updating.
Solution: Check that the Data Collector (Desktop Historian OPC Client Service) has been started,
and that the Archiving attribute for the tags of interest is set to True, or
There may be a problem with either the tag configuration, or communication to the
OPC server. Both of these conditions will be reported in the OPC client log file. This
may include incorrect parameters (such as invalid Item IDs, or an unknown OPC
Server Program ID), as well as communication failure codes (such as a failure to
connect to a remote OPC server), or
If an OPC server is not active when the OPC client attempts to connect, the OPC server
may not have sufficient time to configure itself for proper use. To avoid this, the OPC
client has the ability to pause during the connection operation at several stages and
retry communication if a full or partial communication failure is encountered. Contact
MatrikonOPC Support for instructions on customizing the connection behavior of the
OPC client.
Problem: Installation stops and an error message indicating that a Microsoft update is not
present, is displayed.
Solution: The installation stops as it cannot find the necessary Microsoft hotfixes. Install the
KB973687-64 and msxml6_x64.msi updates from the Microsoft website and then
install ODH again.
Problem: During Upgrade, user gets an error (Service could not be deleted). This issue occurs
when Windows does not release lock on the service resulting in service not getting
deleted from registry and Service Control Manager. In such cases re-registration of
service fails. A reboot is required to release OS lock on the old service entry, before
service can be re-registered again.
Solution: This issue can be resolved either by manual action or by running
ODHServiceUtility.exe
In the install path, locate ODHServiceUtility.exe under Util folder. For example if the
install path is C:\Program Files (x86)\Matrikon\OPC , ODHServiceUtility.exe can be
found under C:\Program Files (x86)\Matrikon\OPC\Desktop Historian\Util
Double click to run ODHServiceUtility.exe (needs Admin Privileges)
Exe Path and Name for ‘Main Storage’ instance of Desktop Historian
For ‘Main Storage’ service instance the .exe is located in Core folder in the installation
path. For eg if the installation path is C:\Program Files (x86)\Matrikon\OPC\Desktop
Historian the exe path is C:\Program Files (x86)\Matrikon\OPC\Desktop Historian\Core
EXE name is Archiver.exe
Verify that service is showing in Service Control Manager and is running. Verify that
Dependent services MatrikonOPC Desktop Historian - OPC Client(2) and MatrikonOPC
Server for Desktop Historian(2) are also running. Start the services manually if
required.
Exe Path and Name for ‘Main Transfer’ instance of History Transfer
For ‘Main Transfer’ service instance the .exe is located in Historical Data
Verify that service is showing in Service Control Manager and is running. Start the
services manually if required.
Problem: How is the Pi OPC client to be used with MatrikonOPC servers, if applicable?
Solution: When using the Pi OPC client with MatrikonOPC servers, please go into the OPC server
Question: How is the OPC HDA ReadProcessed INTERP Aggregate function implemented in the
MatrikonOPC Server for Desktop Historian?
Answer: This varies depending on whether the stepped attribute for a particular item is set to
True or False within Desktop Historian. In the case where the stepped attribute for
an item is set to True, stepped interpolation is used between data points. In the case
where the stepped attribute for an item is set to False, linear interpolation is used
between data points. In both cases, stepped extrapolation is used at end boundary
conditions.
Lifetime Enabled tags do not receive new timestamps at every lifetime interval
Question: How can I configure lifetime tags to properly apply updated timestamps?
Answer: Tags that are configured to use the Lifetime feature must have the Use System
Timestamp option configured properly for the system that is being read from.
If Use System Timestamp is disabled, then MatrikonOPC Desktop Historian will
always use the timestamp that is provided by the OPC Server that is providing the
data. This behavior is desirable if the data source updates its timestamps frequently
but does not send new data to MatrikonOPC Desktop Historian unless the value
changes.
If Use System Timestamp is enabled, then MatrikonOPC Desktop Historian will use
the current time from the computer on which it is installed to timestamp all data
points that are read for the configured tag. This is the desired setting when using
Lifetime configuration on tags that do not get updated timestamps on the OPC server.
Problem: What is the safe mode of migrating from Matrikon Desktop Historian 5.0.x.x. to 5.1.x.x
version?
Search the MatrikonOPC Support Knowledge Base at www.opcsupport.com to find the answers
to other commonly-asked MatrikonOPC Desktop Historian questions.
Licensing
Most MatrikonOPC products require that some form of licensing criteria be met for it to function
correctly. A license is required to enable the server’s functionality.
The MatrikonOPC Desktop Historian supports both software and hardware licensing.
Feature Licenses
Default License
Featured Component
State
AliasEvents 30-Day Demo
MatrikonOPC Desktop Historian 30-Day Demo
Desktop Historian Instances 30-Day Demo
Desktop Historian Tags 30-Day Demo
Note: MatrikonOPC Desktop Historian, Security, Excel Reporter, and Easy Trender need to be
licensed separately, and by default, are delivered with only a 30-day demo. To purchase a full
license for any or all components, please contact your MatrikonOPC Account Manager.
Contacting Support
The MatrikonOPC Customer Services department (www.opcsupport.com) is available 24 hours a
day, seven days a week. Contact MatrikonOPC Support using the information below, or send an
email (support@MatrikonOPC.com).
For Monday to Friday daytime support requests, contact MatrikonOPC Support using the regional
phone numbers provided in Table 65.
For after-hours support in all regions, please use the following number. There is no extra charge
from MatrikonOPC for calling their after-hours support number.
Notes:
The following steps are suggestions only. Ask your Windows
Network Administrator for more information about the settings
that you should use, especially between different domains.
The steps provided in this appendix apply to Windows NT
operating systems only. For information on how to configure
DCOM settings for newer Windows operating systems, please
refer to the MatrikonOPC Online Support page on DCOM
Settings.
Note: DCOM settings are stored in the registry and loaded by COM
(and OPC) servers at start-up. Therefore, server processes must be
shut down and re-started for these changes to take effect.
Default Properties
The Default Properties tab contains settings that affect all DCOM communication on the machine.
First of all, ensure that the Enable Distributed COM on this computer is selected in
so that the machine is available to others via DCOM.
Select the Enable COM Internet Services on this computer to allow DCOM access to
the machine from the Internet (check with your administrator).
In general, the other settings do not need to be changed.
The Authentication Level specifies when COM should authenticate the identity of calling clients
(each call, each packet, etc.).
Normally, it should be set to Connect, indicating that COM should authenticate clients
when they first connect to a server. If it is set to None, then COM performs no
authentication and ignores any access permission settings.
Security Permissions
The most important DCOM settings for an OPC server are the security permissions. There are two
ways for you to set these:
1. Change the specific settings for the server (recommended).
2. Change the default settings (not recommended) and make sure that the OPC server will use
these.
Either way, be certain that the access and launch permissions are correct for the server.
4. Click on the Security tab to set the security for the server.
5. The Distributed COM Configuration Security tab (Figure 149) appears.
Notes:
The Access Permissions contain an Access Control List of principals that are
allowed to interact with objects supplied by a server.
The Launch Permissions contain an Access Control List of principals that are
allowed to start up a server process or service.
6. Include the names of users or user groups from trusted domains that you wish to be able to
use the OPC server on this machine. Include the Everyone group to allow access to all
users on a particular domain.
7. To set the Access permissions, click Use custom access permissions and then click Edit.
8. The Registry Value Permissions window (Figure 150) appears.
11. To add a user to the list, select the user, and then click Add. If the user, you wish to add
does not appear then click Show Users.
The Configuration Permissions contain an Access Control List of principals that are
allowed to modify the configuration information for a server. In other words, it
indicates who is allowed to alter the registry entries for installed servers as well as
who is able to access the registry for the purposes of installing new servers. It is
usually simpler to install and configure servers as a user with local administrative
rights.
13. To connect to an OPC server from outside of the domain, create a local user account on
both the server and the client machine with identical username and password. Then, add
the local user on the OPC server to the DCOM permissions. Use the local account on the
client machine to connect to the OPC server.
Server Identity
The Identity tab for a selected COM (or OPC) server specifies the user account that should be
used when COM starts up the process. The available settings are different for servers that run as
local executables as opposed to those that run as NT services.
Default Protocols
The Default Protocols tab specifies the communication protocols available to DCOM. The order
that protocols appear in the list indicates the priority in which they will be used (the topmost
having the highest priority).
The more protocols that appear in the list, the better the chances of connecting to an OPC server
on an unknown remote machine (such as at an OPC Interoperability Workshop). However, it may
also take longer for DCOM to time out if a server machine is not present since it has to try each
protocol in turn.
For most situations, it is best to remove all unused protocols from the list and only include those
that are necessary for your network. For example, on a TCP/IP network, one would include the
Connection-oriented TCP/IP protocol. Contact your IT personnel for more information about
your network.
Remote Program ID
Before the OPC Server Browser became available, OPC client applications had to search the
registry to generate a list of available OPC servers. Therefore, some older OPC clients need to have
a program ID in the local registry in order to connect to a particular OPC server.
The simplest solution is to install the OPC server software on the client machine even if it is not
used. Alternatively, use the following steps to copy a program ID to the client machine.
Note: This method may not work for every OPC client. Please check the client documentation for
more information.
Advanced Calculations
Calculations may contain references to any OPC item in the server’s syntax. However, they may
not contain references to other alias items. There are no limits on how many items can be used in
a calculation. The only limiting factor may be performance related. To reference another OPC item
in the calculation, wrap the items full item path in square brackets. For example, to add the items
Com1.Rtu.Reg1 and Com1.Rtu.Reg2 together, the correct expression would be:
[Com1.Rtu.Reg1] + [Com1.Rtu.Reg2]
Advanced alias calculations may use any of the operators listed in Table 68.
Alias scaling calculations may use any of the functions listed in Table 69.
Field Description
Name of the alias group folder where the alias belongs. Periods in the name
Alias Group indicate subfolders below the root (e.g., North.FIC101 = alias group North
under the Alias Configuration root and alias group FIC101 under that).
Name of the alias. Full alias path name composed of the alias group path, a
Alias Name
period, and the alias name (e.g., North.FIC101.CV for an alias named CV).
Fully qualified item ID for the OPC item to which the alias refers. Leave this field
Item Path
blank to specify a holding register.
Data Type Decimal number indicating the data type for the alias.
Specifies whether the alias is read-only or read-write.
Read-only 0 = read-write
1 = read-only
Specifies whether the alias is polled continuously or not.
Poll Always 0 = only poll as requested by an OPC client (normal)
1 = poll continuously at the specified update rate
Update Rate Update rate (milliseconds) to use with the Poll Always option.
Scaling type for the alias.
0 = none
Scaling type 1 = linear
2 = square root
3 = gain/offset
Scaling Option 1 High Raw, Gain, Input Expression, or Calculation, depending on the value
of Scaling.
Scaling Option 2 Low Raw, Offset, or Output Expression, depending on the value of Scaling.
Scaling Option 3 High Scaled if Scaling is 1 or 2.
Scaling Option 4 Low Scaled if Scaling is 1 or 2.
Scaling Option 5 Clamp if Scaling is 1 or 2.
Register Initial Initial value of a holding register.
Value
Event Enabled 0 if events are not to be generated, or 1 if events will be generated. If 0, all
other event fields can be left blank.
Event Source Text that appears as the data source in generated events.
Event Category ID of an event category for the generated events. If the category ID does not
exist at import time, the import will fail.
Event Severity Severity of the generated events. This can be a value from 1 to 1000.
Event Message Message to be included in generated events.
Trigger type for the alias event.
TriggerType 0 = value change
1 = positive edge
Timestamp type for the alias event.
Timestamp Type 0 = server generated
1 = device generated
Table 70 - File Import/Export Field Descriptions
When the scaling field specifies linear (1) or square root (2) scaling, the five scaling option fields
are defined in Table 71.
Field Description
High Raw Raw value range (double-precision real).
Low Raw
High Scaled Scaled value range (double-precision real).
Low Scaled
Clamp options.
0 = none
Clamp 1 = clamp low value
2 = clamp high value
3 = clamp both high and low values
Table 71 - Additional File Import/Export Field Descriptions - Linear/Square Root Scaling
When the scaling field specifies gain/offset (3) scaling, the first two scaling option fields are defined
as listed in Table 72. The other scaling option fields can be left blank.
When the scaling field specifies expression (4) scaling, the first two scaling option fields are defined
as listed in Table 73. The other scaling option fields can be left blank.
Field Description
Input Expression Simple formula applied to the value read from the OPC item.
Simple formula applied to values written to the OPC item. The
Output Expression
output formula should be the reciprocal of the input formula.
Table 73 - Additional File Import/Export Field Descriptions - Expression Scaling
When the scaling field specifies calculation (5) scaling, the first scaling option field is defined as
listed in Table 74. The other scaling option fields can be left blank.
Field Description
Input Calculation Calculation applied to the value read from the OPC item.
Table 74 - Additional File Import/Export Field Descriptions - Calculation Scaling
Scaling Algorithms
For each type of scaling, a different algorithm (Table 75) is applied to values read from the OPC
item. A reverse algorithm is applied to any values written to the OPC item.
Gain/ x Offset
Gain x Offset
Offset Gain
Expression SQRT(INPUT) + 5 (OUTPUT – 5) * (OUTPUT – 5)
Table 75 - Scaling Algorithms
Appendix Structure
This appendix is structured as follows:
Introduction – this introductory section.
OPC Security Implementation – description of user access dependencies.
MatrikonOPC Tag Security Configuration Utility – describes the utility that is used to
configure security for MatrikonOPC servers.
Security Details – describes how permissions are applied, how security settings are
stored, and other important details.
Identity
Using the IOPCSecurityNT interface for OPC Security, the identity of the OPC client is the domain
user that is running the OPC client and connecting to the OPC server. The OPC Framework will
attempt to impersonate the client that is connected to the server, and use the name from those
credentials for access control. This method does not require any implementation of OPC Security by
the OPC client, since no interface calls are necessary.
Using the IOPCSecurityPrivate interface for OPC Security, the OPC client must make a call to the
OPC server to log on with a user name and password. In this scenario, the OPC client must
implement and follow the OPC Security specification in terms of following the calls necessary to
provide credentials. The credentials provided through the private interface override those provided
from the NT interface. The OPC client may choose to log off, at which point the NT credentials are
used until the log on call is made again.
Location
Some of the interface calls made from an OPC client to an OPC server require the client to provide
an OPC item ID. The OPC Framework will take the OPC item ID provided, and determine whether
access to that location is allowed or not. A particular server installation may want to control access
to a particular device or branch in the hierarchy, and is able to do so by setting permissions for a
partial item ID or path.
Type
There are seven types of interface functionality in the OPC Framework (specifically the OPC Outer
Layer) that are controlled using OPC Security:
1. Browsing
2. Adding items
3. DA Reading
4. DA Writing
5. HDA Reading
6. HDA Writing
7. HDA Deleting
Browsing is the least intrusive, followed by adding items, reading values from the items, and finally
writing to the items being the most intrusive. There are multiple interfaces, and functions within
those interfaces, that can be used to perform the types of functionality listed above. Thus, security
control has been added to each possible entry. For example, read control has been added to group
subscriptions call-backs as well as synchronous reads and asynchronous reads – denying read
control would disable reads for the possible types.
A location that is being accessed by an OPC client may have different permissions for the different
types of access. For example, one particular item may be browse able, added, and read, but the
writing permissions might be restricted so that the user cannot interfere with the operation of the
end device.
Note: Of the seven functionality types listed above, six of them make use of the full OPC item ID
when an interface call is made from the client to the server: Adding Items, Reading, Writing, or
Deleting. When browsing, only a partial path leading to an OPC item may be known at any location
in the browsing hierarchy.
2. Enter the password created during the installation of the OPC server.
Layout
The MatrikonOPC Tag Security Configuration Utility screen displays the name of the OPC
server that is being configured for tag security. In Figure 154 above, the Utility screen shows that
the MatrikonOPC Server for Simulation and Testing tag security is being configured.
The left-hand side of the Utility screen shows a column of action icons that can be clicked upon.
These actions are further described later in this appendix. Some actions may not be applicable,
depending on the context in which they are used, and are identified by greyed-out icons.
In the center of the Utility screen there are descriptions for each of the actions that can be
performed. The appearance of these descriptions can be toggled at any time by clicking on the
Hide Help/Show Help link that exists in the bottom-right corner of the Utility screen. When the
Figure 155 - MatrikonOPC Tag Security Configuration Utility Main Screen: Users & Groups
Note: After any action is performed, the changes made do not take effect until either the OK or
Apply button has been selected. Clicking on the OK button saves the changes and closes the
Utility screen. Clicking on the Apply button saves the changes and keeps the Utility screen open.
Clicking on the Cancel button or the X button on the top-right of the screen, discards any changes
made.
Add User
There are two types of users for which security can be configured: NT Users and Private Users.
Adding a user to the configuration will allow permissions to be defined for that user. For NT users,
the IOPCSecurityNT interface is used, and for Private users, the IOPCSecurityPrivate interface is
used.
3. By default, the local machine name appears in the From this Location field. To browse to
a different location, click the Locations button.
4. The User field can be entered manually. Clicking on the Check Name button performs
validation on the entered user. The user names are the same as the Windows NT domain
names used on the network. To avoid manually entering a user, click on the Search button,
and select a user from the displayed list of users.
5. To add the selected user, click on the OK button. The user is then added to the list of users
and/or groups currently defined (refer to Figure 157 for a sample list of defined users and
groups).
6. The Edit <Username> window (Figure 162) appears. Follow the instructions in the Edit
User section for adding permissions.
Private User
Private users have names and passwords associated with them, custom to the OPC client
application, which must implement the OPC Security Private interface for this section to be
meaningful. Private users exist only in the OPC server. They are not created in any NT domains.
To add a Private user:
1. From the MatrikonOPC Tag Security Configuration Utility main screen, click on the Add
User button.
2. The Add User window (Figure 156) appears.
3. Select the Private User option button (Figure 158).
Add Group
Groups are used to group users together so that they can share common permissions. Groups are
not necessary to use OPC Security. However, they are convenient when you need to apply common
permissions to multiple users. A group must contain at least one user, and any combination of
users can be grouped together.
Note: A user can exist in multiple groups, but if two or more of the groups have the same
configured path (refer to the Edit User section), and each group defines a permission (Allow/Deny)
for the type of access, then the group whose name alphabetically comes first is used.
There are two types of groups for which security can be configured: NT Groups and Private
Groups.
NT Group
To add an NT group:
1. From the MatrikonOPC Tag Security Configuration Utility main screen, click on the Add
Group button.
3. By default, the local machine name appears in the From this Location field. To browse to
a different location, click the Locations button.
4. The Group field can be entered manually. Clicking on the Check Group button performs
validation on the entered group. The group names are the same as the Windows NT domain
group names used on the network. To avoid manually entering a group, click on the Search
button, and select a group from the displayed list of groups.
5. To add the selected group, click on the OK button. The group is then added to the list of
users and/or groups currently defined (refer to Figure 157 for a sample list of defined users
and groups).
6. The Edit <Groupname> window (Figure 169) appears (for NT Groups, there is only the
Permissions tab). Follow the instructions in the Edit Group section for adding
permissions.
Private Group
To add a Private Group:
1. From the MatrikonOPC Tag Security Configuration Utility main screen, click on the Add
Group button.
2. The Add Group window (Figure 159) appears.
3. Select the Private Group option button (Figure 160).
4. Enter a name for the group to be created. The group is private and will only exist in the OPC
server. The group cannot be created if there is already a configured user or group with that
same name.
5. Click on the OK button to create the group. It will be added to the list of users and/or
groups currently defined (refer to Figure 157 for a sample list of defined users and groups).
6. The Edit <Groupname> window (Figure 169) appears. Follow the instructions in the Edit
Group section for adding permissions.
Duplicate
Another way to create a new user or group is to duplicate an existing one.
To create a new user or group via duplication:
1. From the MatrikonOPC Tag Security Configuration Utility main screen, right-click your
mouse on the user or group you wish to duplicate.
2. From the displayed menu, select Duplicate.
3. The Enter New Name window (Figure 161) appears.
Edit
Once the desired users and/or groups are defined, they must be edited to configure their
respective permissions.
Note: Permissions can also be defined for the user Everyone, which is defined as the default user.
For every NT user not configured in the MatrikonOPC Tag Security Configuration Utility, the user
Everyone is used for determining security permissions.
Permissions for allowing/denying browsing, adding items, reading items, and writing items can be
configured. Permissions are defined for users and groups for a particular location in the server’s
address space hierarchy. A location can either be a tag (i.e., OPC Item ID) or a path leading up to
an item.
Edit User
To edit a user:
1. From the MatrikonOPC Tag Security Configuration Utility main screen, either:
Double-click your mouse on the user you wish to edit, or
Right-click your mouse on the required user and select Edit User from the displayed
menu, or
Click your mouse on the required user, and then select the Edit button.
Permissions
On the Permissions tab, the permissions associated with this user relating to browsing, adding,
reading, and writing for any specific paths or OPC items are configured. The Configured Paths
screen section lists the paths and/or OPC items for which permissions are defined. The
Permissions screen section indicates those permissions with option buttons, which can be set to
Allow, Deny, or Unspecified. Selecting Unspecified directs the OPC Framework to look for the
permission higher up in the hierarchy.
From the Permissions tab, when the Add button is selected, the Add Permission screen is
displayed. In the Server Address Space screen section, folders and items are shown as nodes are
selected and expanded.
Red folders indicate a null branch. This means that the item names below this branch do not
contain the branch name, so permissions set on the branch will not reflect on Add, Write, Read,
and Delete permissions for the items below the branch. To properly set permissions on the items
below the branch, they have to be set on the items themselves.
Figure 163 provides an example of a null branch and items below it, all of which are outlined in
black.
When browsing, using the example in the diagram above, Simulation Items is a null branch
(identified by the red folder), Saw-toothed Waves is a non-null branch, and Int1 is an item.
Setting permissions on the Simulation Items branch does not affect Read, Write, Delete, and
Add permissions for the Saw-toothed Waves branch of the Int1 item below that. This is because
when adding the Int1 item, the item ID of the Int1 item is actually Saw-toothed Waves.Int1
and not Simulation Items\Saw-toothed Waves.Int1.
Setting Read, Write, Delete, and Add permissions for the Saw-toothed Waves branch will
affect the items below as Saw-toothed Waves is part of the item ID of the Int1 item (Saw-
toothed Waves.Int1), and therefore the Saw-toothed Waves folder does not appear as a red
folder like the Simulation Items folder does.
Note: User permissions override group permissions. For example, if a defined group is denied
writing privileges to an OPC item, Random.Int4, while a defined user (a member of that group) is
allowed writing privilege to Random items (Random.<itemID>), then the user permissions would
take precedence for that OPC item (even though the permissions relating to the group are a better
match for the OPC item, Random.Int4).
To edit a user’s permissions:
1. Click on the Add button to begin configuring permissions for the current user.
2. The Add User Permission window (Figure 164) appears. This window allows you to browse
the OPC server address space to find either a path in the hierarchy, or a particular OPC
item.
3. Expand on the server address space’s root node and continue to browse to the desired path
in the hierarchy, or the desired OPC item.
Note: Branches (i.e., folders) that are red in color (see Figure 165) are not part of an item’s
path, but rather are used for browsing organization. Configuring permissions for adding,
reading, and writing will not affect items below it. For more information, refer to
Permissions.
On the General tab (Figure 167) of the Edit <Username> window, the name and password of
the user can be changed.
To edit a user’s name:
1. Enter a new name in the Name field.
2. Click on the OK button.
On the Permissions tab, the permissions associated with this group relating to browsing, adding,
reading, and writing for any specific paths or OPC items are configured. Refer to the Edit User
section regarding configuration on the Permissions tab. Group and user permissions are
configured in the same way.
On the Members tab (Figure 171), the users that are part of the current group are defined. By
default, the Group Members screen section is empty. In Figure 171, User1 has been added to
Group1.
2. The Members screen section lists all the defined users from which you may choose. Select
one or more desired users to become members of the group.
3. Click on the OK button. The selected user or users appear in the Group Members screen
section on the Members tab (Figure 171).
To remove a user from the group:
1. Select that user in the Group Members screen section.
2. Click on the Remove button.
Notes:
If a user name and a group name (to which the user belongs) have permissions
defined for the same location, the user name will be used. If a user belongs to two
groups that have permissions defined for the same location, the group that is
alphabetically first will be used.
The exact location (full item ID for reading, writing, deleting, and adding, or the full
path for browsing) is always looked for first when determining the permission for a
particular user. If the exact location is not found, or is found but does not contain a
defined permission, then the closest match in location is looked at next, and so on.
The root location (i.e., empty string) will always match, and is used if no partial
location match is made.
Delete
To delete a previously added user or group:
1. From the MatrikonOPC Tag Security Configuration Utility main screen, either:
Select the required user or group from the list and click on the Delete button (Figure
157), or
For a group, right-click your mouse on the required group and select Delete Group
from the displayed menu, or
Security Details
ACL File
The permissions that the MatrikonOPC Tag Security Configuration Utility creates are stored in
a file named ACL.sec that is located in the same directory as the MatrikonOPC server executable:
C:\Program Files\Matrikon\OPC\< OPC Server Name >\.
ACL.sec is encrypted with 256-bit AES using the password key that was provided during
installation (or changed in the security utility).
While the server is running, if the ACL.sec file is moved or deleted from its location above, security
functions as it did before the file was moved. If the server is re-started with the ACL.sec file
missing, no users will have permissions to do anything (i.e., browsing, adding, reading, writing)
and must re-configure their security settings.
Note: It is advised that this file is backed up and stored somewhere safe, once tag security
configuration has been completed. In the event that this file is lost or deleted by accident, simply
transfer the stored backup (if one was made) to the directory stated above. If ACL.sec becomes
deleted and no backup was made, tag security will need to be re-configured.
Determining Permission
Whenever a browsing, item addition, read, write, or delete operation is performed by the OPC
client, the OPC Framework will call a permission routine to determine if permission is allowed or
denied. Three pieces of information are always sent to this routine call:
1. Identity
2. Location
3. Type
Identity is the user name described in the previous section – either the NT domain name, a private
name, or the default user Everyone. In addition, identity includes any groups (private or NT) that
the user belongs to. Location is either the full item ID or a partial path in the server hierarchy.
Type is the access type: browsing, item addition, reading, or writing. Each piece of information is
checked in the order listed above.
The following information details the procedure used in determining permission rights:
1. Look for a permission match with the NT domain name or private name. This step occurs
only if the NT domain name or private name has been defined in the Users & Groups list.
Examples
This section contains examples of tag security settings made via the MatrikonOPC Tag Security
Configuration Utility, and the impact of these settings.
Default
The default tag security configuration provided is quite simplistic as is shown in Table 77:
As no users or groups are defined, any NT user connecting to the OPC server will use the
Everyone default user for permissions. Only the root level location is defined under the
Configured Paths list, which gives full permissions to the entire OPC server. An administrator will
want to change these default settings for the OPC server to provide more security on its tags.
At this point, more users can be added which belong to a more restricted group. This group may be
denied write capability or restricted to certain areas in the server hierarchy.
Example 2
Following is an example of a tag security configuration for the MatrikonOPC Server for Simulation
and Testing, with sample use-cases. Table 79 lists all defined users and groups and their
associated permissions. Table 80 indicates which users are members of the defined groups.
Unspec. permission indicates Unspecified. Groups in this example are Private Groups.
Case 1
User DOMAIN\no.name connects. This name is not defined, so the Everyone permissions are
used. At the root level location, the default user can browse but no more. The only other location
where permissions are defined for the default user is Configured Aliases where browsing is
Notes:
MatrikonOPC Desktop Historian may not be installed on a
computer that has MatrikonOPC Buffer installed.
As part of the installation process, the MatrikonOPC Analyzer
tool is installed and used to detect the system settings that
affect the use of this software. No information is communicated
back to Matrikon. Information is stored on this system only for
future use by MatrikonOPC Support to assist with
troubleshooting, if required.
4. Read the End-User License Agreement, using the scroll bar to view the entire message.
5. Select the I accept the license agreement option button.
6. Click on the Next button. The Product Registration screen (Figure 176) appears.
Notes:
The Next button is not available until all fields have been
entered.
Ensure the E-mail Address is valid as that is the address to
which the license file is sent.
8. Click on the Next button. The Setup Type screen (Figure 177) appears.
11. Select the folder in which to install MatrikonOPC Desktop Historian, or accept the default
location displayed in the Folder path field.
12. Click on the Next button. The Start Menu screen (Figure 179) appears.
13. Select the Start Menu group and then specify whether you want shortcuts created only for
yourself, or for all users, by selecting the applicable option button.
14. Click on the Next button. The Enter Password screen (Figure 180) appears.
15. A default password is supplied for you in the Password and Confirm Password fields.
Notes:
The default password provided for you is MatrikonOPC. Note
this password for future reference.
If you need to change the password at a later date, access the
Tag Security shortcut from the Start menu. Click on the
Windows Start button. Select Programs -> MatrikonOPC ->
<OPC Product Name> -> Tag Security. For more
information, refer to Appendix D – Security.
16. Click on the Next button to accept the default password. The Licensing screen (Figure
181) appears.
Notes:
MatrikonOPC Easy Trender, Matrikon Analytics Excel Reporter
are optional components that are installed by the typical
installation type, or if selected for a custom installation. Please
consult the User’s Manuals installed with those programs
separately for more information on how to use those products.
When these components are installed, those User’s Manuals
are available through the Start menu in the following location:
Programs -> MatrikonOPC -> Desktop Historian -> Help -
> [Product Name] Manual
19. If you would like to install a demonstration version of Matrikon Analytics Excel Reporter,
select the Yes option button. If the product is not required, select No.
Notes:
If you do not have Microsoft Excel installed on your machine, this screen is not
displayed. Instead, you are notified that your machine does not meet the
requirements needed to install Excel Reporter. You will need to exit the install, install
Excel, and then re-start the Micro Historian installation. For assistance, contact
MatrikonOPC Support.
A permanent Matrikon Analytics Excel Reporter license is not included with
MatrikonOPC Desktop Historian and must be purchased separately. Contact your
Account Manager for assistance and more information.
If you have OPC2XL installed on your machine, and you select the Yes option,
OPC2XL will be removed during the install of this demonstration version.
20. Click on the Next button. The MatrikonOPC Easy Trender screen (Figure 183) appears.
21. If you would like to install a demonstration version of MatrikonOPC Easy Trender, select the
Yes option button. If the product is not required, select No.
Notes:
If the Sun Java Virtual Machine option on your machine is enabled, this screen is not
displayed. Instead, you are notified that your machine does not meet the
requirements needed to install Easy Trender. You will need to exit the install, clear
the option, and then re-start the Micro Historian installation. For assistance, contact
MatrikonOPC Support.
A permanent MatrikonOPC Easy Trender license is not included with MatrikonOPC
Micro Historian and must be purchased separately. Contact your Account Manager for
assistance and more information.
22. Click on the Next button. The MatrikonOPC Desktop Historian - Installation Type
screen (Figure 184) appears.
23. If you would like to install the Desktop Historian only, choose the “Install as Standalone”
option. To install History Transfer along with Desktop Historian, choose “Install as Hub or
Spoke configuration”.
24. Click on the Next button. The MatrikonOPC Tunneller screen (Figure 185) appears.
26. Click on the Next button Pre-Requisites screen (Figure 187) appears. If the Pre-
Requisites screen appears, then click on the Next button to install the listed pre-
requisites.
27. The Installing MatrikonOPC Desktop Historian Pre-Requisites screen (Figure 188)
appears installation of pre-requisites.
28. Once pre-requisites are installed, the Installing MatrikonOPC Desktop Historian screen
(Figure 188) appears, installation begins, and the product files are copied to the computer.
29. Figure 188 - Installing MatrikonOPC Desktop Historian When the installation has
finished, the MatrikonOPC Desktop Historian Setup Complete screen (Figure 189)
appears stating that the MatrikonOPC server has been successfully installed.
30. At this point, you have the option of launching any or all of the following by selecting the
necessary checkbox or checkboxes:
Configuration panel
Release Notes
User’s Manual
Quick Start Guide
31. Click on the Finish button to complete the installation and exit the Wizard.
32. The necessary files have now been copied to the target computer, the software components
are registered, and shortcut icons are created in the Start menu.
The files listed in Table 82 are installed by default, in the following location:
C:\Program Files\Matrikon\OPC\Desktop Historian\Core
The files listed in Table 83 are installed by default, in the following location:
C:\Program Files\Matrikon\OPC\Desktop Historian\Database
The files listed in Table 84 are installed by default, in the following location:
C:\Program Files\Matrikon\OPC\Desktop Historian\OPC Client
The files listed in Table 86 are installed by default, in the following location:
C:\Program Files\Matrikon\OPC\Desktop Historian\Task Scheduler
The files listed in Table 91 are installed by default, in the following location:
C:\Program Files\Common Files\MatrikonOPC\Common
Note: Matrikon strongly recommends that you back up all history and
configuration files prior to upgrading or re-installing the software.
5. Click on the Remove button associated with the MatrikonOPC Desktop Historian program to
initiate the un-install process.
7. Select the Remove option button to un-install MatrikonOPC Desktop Historian entirely.
8. Click on the Next button. The Ready to Uninstall screen (Figure 192) is displayed.
11. When the un-install has finished, the MatrikonOPC Desktop Historian Setup Complete
screen (Figure 194) appears stating that MatrikonOPC Desktop Historian was successfully
un-installed.
12. Click on the Finish button to complete the un-install and exit the Wizard.
13. The program no longer appears listed in the Add or Remove Programs window.
Note: File formats are NOT interchangeable. Data stored in files that
do not conform to the current file format will not be available. It is
recommended that the file format be selected once and that is when
the product is installed. If you need to convert data from one file
format to another, contact MatrikonOPC Support.
Limitations:
The maximum string length supported in FF7 storage format is 2,033 characters. If the
input string length is longer than 2,033 characters, the string is truncated before being
stored.
The High Resolution Rolling Buffer file format supports only data insertion via the OPC Insert
method and will reject all calls to the OPC InsertReplace method.
The 25MB file size is not strictly enforced. If data is written to Desktop Historian that is
older than the latest data written (i.e., back filling), then the data files may grow to exceed
the target 25 MB.
If the .DAT file size is greater than 3.5 GB, or the data point time stamp is too far in the
future when compared to the (latest time stamp + configured offset time), the data is
rejected and recorded in a .CSV file for future use. The .CSV file is located in C:\matrikon
data\Exempt_FF7R.
Keyword Description
NOW The current time. If no keyword is supplied, NOW is assumed.
The start of the current second. For example, if the time is now 08:54:20.999,
SECOND
then SECOND would choose a time of 08:54:20.000.
MINUTE The start of the current minute.
HOUR The start of the current hour.
DAY The start of the current day.
WEEK The start of the current week.
MONTH The start of the current month.
YEAR The start of the current year.
Table 95 - Keywords
Relative time offsets consist of a sign (e.g., + or -), an integer count, and an offset unit (Table 96).
If no sign is used between offsets, then the last sign used in the offset will be used. If no sign has
been used in the relative time string yet, the assumed sign is +.
Function Description
Performs a straight line interpolation between the known data
Interpolative
points within the selected interval.
Time weighted average data over the line produced by the
TimeAverage
interpolative aggregate.
The minimum raw GOOD value that occurs within the selected
interval. This value is returned with the time stamp at which it
MinimumActualTime
occurs. If there are multiple occurrences, then the oldest time
stamp is returned.
The same as the MinimumActualTime aggregate except that
Minimum the time stamp returned is the beginning of the selected
interval.
The maximum raw GOOD value that occurs within the selected
interval. This value is returned with the time stamp at which it
MaximumActualTime
occurs. If there are multiple occurrences, then the oldest time
stamp is returned.
The same as the MaximumActualTime aggregate except that
Maximum the time stamp returned is the beginning of the selected
interval.
Interpolates both end points, divides the time between timeold
and timenew into intervals and returns the lowest or highest
MatrikonAggregate_TrendFriendly value for each interval.
* timeold and timenew are the bounds of the selected interval.
Table 98 - HDA Aggregate Functions