Documente Academic
Documente Profesional
Documente Cultură
Contents
1 lntroduction .............................................................................................................. 1
1.1 ABB Service Products Data Collector (SPDC).............................................. 1
1.2 Scripted tests (legacy) .................................................................................. 1
1.3 Executing the scripts (legacy) ....................................................................... 2
2 Software version check ........................................................................................... 3
2.1 Microsoft software check ........................................................................... 4
2.2 ABB software check .................................................................................. 5
2.3 System Extensions check............................................................................. 5
2.4 Configure System task check (only applicable in SV 6.0) .......................... 6
Open the System Configuration Console, then open System Setup
Configure System ......................................................................................... 6
3 Computer hardware check ...................................................................................... 7
4 Network hardware check ......................................................................................... 7
4.1 RNRP check................................................................................................. 8
4.1.1 RNRP Network Status Tool (SV 6.0) ........................................... 8
4.1.2 RNRP Monitor ................................................................................ 9
4.1.3 RNRP Fault Tracer ......................................................................... 9
4.1.4 RNRP Log .................................................................................... 10
4.1.5 The “hosts” file .............................................................................. 11
4.1.6 RNRP Response Time check ....................................................... 12
4.2 System 800xA System Network Settings check ......................................... 12
4.3 Network Adapter Bind Order vs Network Metric ......................................... 13
4.4 Network Management check ...................................................................... 14
4.4.1 Port speed and duplex .................................................................. 15
4.4.2 Port statistics ................................................................................ 16
4.4.3 Uptime .......................................................................................... 17
4.4.4 IGMP ............................................................................................ 17
4.4.5 Spanning Tree (STP/RSTP) ......................................................... 18
4.4.6 Ring redundancy (or Layer 2 redundancy) active by default ......... 18
4.5 Simple network bandwidth and roundtrip time check ............................... 19
5 Domain Controller nodes ...................................................................................... 20
5.1 Active Directory and domain controller redundancy health check ............ 20
5.2 Flexible Single Master Operation (FSMO) roles check ............................... 20
5.3 Global Catalog check ................................................................................. 20
5.4 Active Directory replication test .................................................................. 21
5.5 DNS check ................................................................................................. 21
5.5.1 Windows Event Log DNS ......................................................... 21
5.5.2 Zone type and deployment ........................................................... 21
5.5.3 Forward zone................................................................................ 22
5.5.4 Reverse zone, primary plant network ............................................ 22
5.5.5 Reverse zone, secondary plant network ....................................... 22
5.5.6 Standalone domain controllers ..................................................... 22
5.5.7 Forwarders ................................................................................... 22
5.5.8 DNS self-test ................................................................................ 23
5.6 Windows Event Log check ...................................................................... 23
5.7 Hard disk check ..................................................................................... 24
5.8 Login environment .................................................................................. 24
5.9 Network Adapter Bind Order, DNS settings and name lookup ................. 24
6 Computers with System 800xA ............................................................................. 25
6.1 Aspect Servers ........................................................................................... 25
6.1.1 Windows Event Log check ........................................................ 25
6.1.2 Hard disk check ......................................................................... 25
6.1.3 User and System locales (Regional Settings) ............................ 26
Copyright 2018 ABB. All rights reserved.
6.1.4 Network Adapter Bind Order, DNS settings and name lookup
................................................................................................... 26
6.2 Connectivity Servers .................................................................................. 27
6.2.1 Windows Event Log check ........................................................ 27
6.2.2 Hard disk check ......................................................................... 27
6.2.3 User and System locales (Regional Settings) ............................ 27
6.2.4 Network Adapter Bind Order, DNS settings and name lookup
................................................................................................... 28
6.2.5 Connected controllers ................................................................... 28
6.3 Application Servers .................................................................................... 28
6.3.1 Windows Event Log check ........................................................ 28
6.3.2 Hard disk check ......................................................................... 28
6.3.3 User and System locales (Regional Settings) ............................ 29
6.3.4 Network Adapter Bind Order, DNS settings and name lookup
................................................................................................... 29
6.3.5 Application Server specific tasks................................................... 29
6.4 Clients ........................................................................................................ 30
6.4.1 Windows Event Log check ........................................................ 30
6.4.2 Hard disk check ......................................................................... 30
6.4.3 User and System locales (Regional Settings) ............................ 30
6.4.4 Network Adapter Bind Order, DNS settings and name lookup
................................................................................................... 30
7 Application check .................................................................................................. 31
7.1 Process Portal A – System Event List ........................................................ 31
7.2 Process Portal A – Operator Message List ................................................. 31
7.3 Service Structure ........................................................................................ 31
7.4 Data Source Definition aspects .................................................................. 32
7.5 Graphic Performance ................................................................................. 33
7.5.1 Diagnostics Window ..................................................................... 33
7.5.2 New Graphics (PG2) graphics checks .......................................... 34
7.5.3 Visual Basic (VBPG) graphics checks .......................................... 35
7.5.4 Workplace memory usage ............................................................ 37
7.6 User roles and security permissions ........................................................... 38
7.7 Objects in Lost and Found.......................................................................... 39
7.8 Consistency Check..................................................................................... 40
7.8.1 Consistency Check – User defined object type libraries................ 41
7.8.2 Consistency Check – Library Aspect check .................................. 42
7.8.3 Consistency Check – Control Structure ........................................ 42
7.8.4 Consistency Check – other structures........................................... 43
7.8.5 Consistency Check – internal data structures ............................... 43
7.9 System NLS check ..................................................................................... 44
7.9.1 Test of Control Builder Name aspects .......................................... 44
7.9.2 Test of Plant Explorer Name aspects ............................................ 44
8 Other tests .............................................................................................................. 44
8.1 Affinity ........................................................................................................ 44
8.2 Aspect Directory service health .................................................................. 45
8.2.1 Aspect Directory synchronization .............................................. 45
8.2.2 Master vs slave ............................................................................. 45
8.2.3 Frequency of transactions............................................................. 46
8.3 Alarm Manager service health .................................................................... 46
8.4 OPC DA Connector service health ............................................................. 47
8.4.1 OPC DA analysis .......................................................................... 47
8.4.2 Recovery Items............................................................................. 49
8.5 Basic History service health ....................................................................... 50
8.6 Event Collector service health .................................................................... 52
8.6.1 Discarded alarm/events ................................................................ 52
8.6.2 Source Object Handling ................................................................ 52
8.7 General process health .............................................................................. 53
Copyright 2018 ABB. All rights reserved.
1 lntroduction
The System 800xA Health Check is a procedure that has been developed with the
purpose to detect and to some extent also correct problems in System 800xA systems.
This document can be used in several ways, e.g.
• As a TODO-list when troubleshooting a system.
• As a procedure to document the health of a System 800xA installation.
Depending on the cause for the Health Check, the findings may be recorded into the
System 800xA Health Check Test record.
It is recommended that the “mission” is decided upon first before starting with the check.
Are problems to be reported only, or are problems to be resolved?
Even if this document does not require any special training apart from general skills in
Microsoft Windows and basic knowledge of System 800xA, it is recommended to attend
the ConsultIT Expert Workshop – E144 System 800xA Health Check to be able to make
the best use of the Health Check document.
When using the System Checker tool, fast and accurate comparisons can
be made from Microsoft Excel (using macros) to spot incorrect
configurations (e.g. missing or contradicting versions of software).
Expected: The AfwConfigWizard.log in the node(s) used to create the system and
load system extensions does not show any problems creating system and
loading extensions.
Expand the window’s height & width and/or rearrange the columns so that the important
columns Installed on this node and Successfully loaded are clearly visible.
Expected: All loaded system extensions should be installed and marked as loaded.
If a “x” is missing in the left column, software is missing/incorrectly installed in the local
node. If a “x” is missing in the right column, System Extension Maintenance has not been
carried out, e.g following an installation of a rollup or service pack.
Open the System Configuration Console, then open System Setup Configure System
Expected: All functions are reported with Status = Deployed
Expected: No information button icon (i) indicating a lower level installation problem.
Hover over the node to display a tooltip with more details.
Click on the Deployed text (link) of the node in concern, then on the View
details… button to see additional details about the problem.
The Configure System’s Diagnostics button or the View logs… command
on the System Installer Agent menu in the System Tray may retrieve logs
with additional information about what has gone wrong.
Alternatively logs can be manually retrieved from this folder and subfolders:
C:\ProgramData\ABB\800xA\SystemInstaller\...
In collapsed network configurations (using a single RNRP area) the test can be performed
in any node. If more than one RNRP area exist, perform the test at one of the RNRP
router nodes for each area (e.g. the Connectivity Servers when using AC 800M).
Expected: No errors reported by the Fault Tracer.
If errors are found, they should be attempted to be repaired and the error
log buffer should be reset with “4 – Change log conditions in one node (for
expters) Clear log buffers” and the test should be performed again
sometime later. The log file (see next step) can give input to when the
errors emerged.
To easily reset error logs in a complete subnet, use the command: “4. Change log
conditions in one node (for experts) Clear log buffers“ with the network’s RNRP
multicast address, e.g. 239.239.239.x
The last digit (x) is calculated as follows: RNRP Area x 4 + path (0 or 1). E.g.:
239.239.239.4 for RNRP Area 1, primary network path
239.239.239.5 for RNRP Area 1, secondary network path
239.239.239.80 for RNRP Area 20, primary network path
239.239.239.81 for RNRP Area 20, secondary network path
The “reset using multicast address trick” will only work on locally connected RNRP areas.
RNRP Log file shortcuts in RNRP Wizard and Network Status Tool
The RNRP log file paths:
Ver. Path
3.0 No log file available.
4.05.0 C:\Program Files\Common Files\ABB Industrial IT\rnrp\log\RnrpEvent.log
5.1 C:\ProgramData\RnrpEvent.log
C:\ProgramData\RnrpEventOld.log
Note: Prior version 6.0, the RNRP log needs initiation by installing the RNRP icon to the
System Tray. Multiple login sessions (e.g. a server or terminal server) may interrupt
logging. One steady logged in user offers the most reliable logging, e.g. an operation
client/workstation.
The Refresh hosts file button of the RNRP Setup Wizard tool
Local customization made to the hosts file may over time become obsolete and cause
problems, e.g. a custom entry is conflicting with an automated entry by name or by IP
address.
Note: RNRP will only register addresses if the Register this connection in DNS setting in
NIC Advanced settings is enabled. This setting is local, per computer, per NIC.
The RNRP Monitor displays the setting: h, = DNS registration enabled on NIC
Sometimes it can be useful to compare the hosts file side-by-side with the DNS contents
to identify obsolete or incorrect records.
Use RNRP filtering – one (1) area Network address(es) for the Client/Server network
Note: other networks, e.g. such as the Control Network shall not be included in the count.
The Advanced Settings… menu might not show until Organize Layout Menu Bar has
been enabled. Once called, either of the two dialogs below will be shown:
In general, auto-negotiation is preferred and recommended as a starting point for all ports.
If links known to support full duplex negotiate to half duplex or less than maximum speed
it may become necessary to take control by turning off autonegotiate and attempt a
different setting to produce the expected link results.
In most cases, use identical settings at both ends of any given communication link.
Note: Always follow up any change with checking the port statistics/counters.
Doc. no. Lang. Rev. ind. Page
Port Configuration for a Hirschmann RS-30 (half duplex ports have manual configuration)
4.4.3 Uptime
If network problems are suspected, it is recommended to check the switch uptime. Is the
reported uptime period expected, or has the switch crashed/lost power and rebooted?
4.4.4 IGMP
The RNRP protocol does not work in networks with IGMP. Verify that IGMP is disabled.
AdminEdge (Edge Port) setting in the ABB NeCo / Westermo WeConfig management
interface
Note: ports used for infrastructure (up/down) links should not be set as edge ports.
The Global Catalog setting in the Active Directory Sites and Services tool
Expected: At least one Global Catalog server exists (more than one is recommended)
Doc. no. Lang. Rev. ind. Page
Force Active Directory replication using the Active Directory Sites and Services tool
Expected: No errors reported by the Active Directory Sites and Service Tool
5.5.6.2 Missing (domain-server-self) PTR records may cause an error in nslookup and other places.
C:\> nslookup
Default Server: UnKnown
Address: 172.16.4.1
To prevent this error, add a reverse zone for the client/server-network and execute
“ipconfig /registerdns” on each domain controller. If no records appear
automatically, insert PTR records for the domain controller addresses. Verify that
nslookup launches without error.
C: \> nslookup
Default Server: servername.domainname.topleveldomainname
Address: 172.16.4.1
5.5.7 Forwarders
If name translation towards external networks is desired, one or more Forwarders should
be configured to “escalate” queries to a DNS with knowledge about these names.
5.9 Network Adapter Bind Order, DNS settings and name lookup
Expected: Note: this item does not apply to Server 2016 and later Win10 builds.
Refer to chapter 4.3 - Network Adapter Bind Order vs Network Metric
The network adapter connecting the system’s DNS should be listed first.
External networks should be listed last.
Singular domain controller nodes should have the Preferred DNS server
setting pointing to themselves; either directly or via the loopback address:
(127.0.0.1).
Redundant domain controllers may have the Preferred DNS server setting
pointing at the redundant peer – this often make the domain controller
services startup faster since the peer’s DNS can be queried immediately.
Expected: Unless special conditions apply, no DNS suffixes, etc. should be
configured in the Advanced DNS configuration.
If the time allows or there are suspicions that DNS may not work correctly; probe all
available DNS servers on the network (i.e. also the alternate servers) by using the
“server <IP address>” command inside nslookup to override the default Bind Order.
It is recommended (in at least one of the DNS client nodes) to verify the availability of all
zone types: forward, primary reverse and secondary reverse (if redundant network is
used).
In Microsoft Windows XP / Server 2003 and older, additional checks can (if networking
problems are suspected) be performed with the netdiag.exe tool that is part of the
Windows Support Tools (SUPTOOLS.MSI) on the operating system CDROM.
In more recent versions, the factory default nltest.exe tool can be used to query
various statuses, e.g. the computer’s DC Secure Channel status from an elevated (run as
Administrator) Command Prompt:
C:\Windows\system32> nltest /sc_verify:domain.tld
Flags: 90 HAS_IP
Trusted DC Name \\dc.domain.tld
Trusted DC Connection Status Status = 0 0x0 NERR_Success
Trust Verification Status = 0 0x0 NERR_Success
The command completed successfully
For more info issue the command: “nltest /?”
Windows 10
In older versions, there was sometimes a need to make sure internal accounts were
aligned by clicking a button “Copy to reserved accounts” present in the above dialog.
6.1.4 Network Adapter Bind Order, DNS settings and name lookup
Expected: Note: this item does not apply to Server 2016 and later Win10 builds.
Refer to chapter 4.3 - Network Adapter Bind Order vs Network Metric
The network adapter connecting the system’s DNS should be listed first.
External networks should be listed last.
Expected: Preferred and Alternate DNS server specified as recommended in the
Automation System Network Design and Configuration User’s Guide.
Expected: Unless special conditions apply, no DNS suffixes, etc. should be
configured in the Advanced DNS configuration.
Expected: DNS queries are answered immediately without time-out when attempted
with the nslookup.exe tool.
If the time allows or there are suspicions that DNS may not work correctly; probe all
available DNS servers on the network (i.e. also the alternate servers) by using the
“server <IP address>” command inside nslookup to override the default Bind Order.
It is recommended (in at least one of the DNS client nodes) to verify the availability of all
zone types: forward, primary reverse and secondary reverse (if redundant network is
used).
Windows 10
In older versions, there was sometimes a need to make sure internal accounts were
aligned by clicking a button “Copy to reserved accounts” present in the above dialog.
6.2.4 Network Adapter Bind Order, DNS settings and name lookup
Expected: Note: this item does not apply to Server 2016 and later Win10 builds.
Refer to chapter 4.3 - Network Adapter Bind Order vs Network Metric
The network adapter connecting the system’s DNS should be listed first.
External networks should be listed last.
Expected: Preferred and Alternate DNS server specified as recommended in the
Automation System Network Design and Configuration User’s Guide.
Expected: Unless special conditions apply, no DNS suffixes, etc. should be
configured in the Advanced DNS configuration.
Expected: DNS queries are answered immediately without time-out when attempted
with the nslookup.exe tool.
If the time allows or there are suspicions that DNS may not work correctly; probe all
available DNS servers on the network (i.e. also the alternate servers) by using the
“server <IP address>” command inside nslookup to override the default Bind Order.
It is recommended (in at least one of the DNS client nodes) to verify the availability of all
zone types: forward, primary reverse and secondary reverse (if redundant network is
used).
Windows 10
In older versions, there was sometimes a need to make sure internal accounts were
aligned by clicking a button “Copy to reserved accounts” present in the above dialog.
6.3.4 Network Adapter Bind Order, DNS settings and name lookup
Expected: Note: this item does not apply to Server 2016 and later Win10 builds.
Refer to chapter 4.3 - Network Adapter Bind Order vs Network Metric
The network adapter connecting the system’s DNS should be listed first.
External networks should be listed last.
Expected: Preferred and Alternate DNS server specified as recommended in the
Automation System Network Design and Configuration User’s Guide.
Expected: Unless special conditions apply, no DNS suffixes, etc. should be
configured in the Advanced DNS configuration.
Expected: DNS queries are answered immediately without time-out when attempted
with the nslookup.exe tool.
If the time allows or there are suspicions that DNS may not work correctly; probe all
available DNS servers on the network (i.e. also the alternate servers) by using the
“server <IP address>” command inside nslookup to override the default Bind Order.
It is recommended (in at least one of the DNS client nodes) to verify the availability of all
zone types: forward, primary reverse and secondary reverse (if redundant network is
used).
6.4 Clients
Windows 10
In older versions, there was sometimes a need to make sure internal accounts were
aligned by clicking a button “Copy to reserved accounts” present in the above dialog.
6.4.4 Network Adapter Bind Order, DNS settings and name lookup
Expected: Note: this item does not apply to Server 2016 and later Win10 builds.
Refer to chapter 4.3 - Network Adapter Bind Order vs Network Metric
The network adapter connecting the system’s DNS should be listed first.
External networks should be listed last.
Expected: Preferred and Alternate DNS server specified as recommended in the
Automation System Network Design and Configuration User’s Guide.
Expected: Unless special conditions apply, no DNS suffixes, etc. should be
configured in the Advanced DNS configuration.
Expected: DNS queries are answered immediately without time-out when attempted
with the nslookup.exe tool.
If the time allows or there are suspicions that DNS may not work correctly; probe all
available DNS servers on the network (i.e. also the alternate servers) by using the
“server <IP address>” command inside nslookup to override the default Bind Order.
It is recommended (in at least one of the DNS client nodes) to verify the availability of all
zone types: forward, primary reverse and secondary reverse (if redundant network is
used).
7 Application check
The application check is to be performed once for each system. The node used for the
tests can be chosen arbitrarily.
Hint: Use the Find Tool to search for these aspects. Sometimes, additional
(erroneous) Data Source Definition aspects have been created and
prevents data subscription, history logging, etc.
• Workplace Mode
To make best use of the available screen area, it’s recommended to enable Full
Screen or Operator Workplace Mode for the operator users. Operator Workplace
mode will imply Full Screen and prevent minimizing, stacking and off screen
placement of overlapping windows.
When the desktop environment has been configured (taskbar, start menu, etc) it’s time to
measure the effective size of the workplace graphics panel).
Start a workplace (preferably in Operator Mode) and call up the Size Display (it’s placed
on the “Special” object in the Graphics Structure).
• EnableBlink = False
(or use an expression that enables blinking only when needed)
• Backstyle = Transparent
Windowless = True
- or -
Backstyle = Opaque
Windowless = False
• EnableInput = False
(or use an expression that enables input only when needed)
More information is to be found in the Graphic Engineering User’s Guide and some FAQ
documents on ABB Library, e.g. How to decrease Graphic Display call up time
(3BSE034711Rxxxx).
Lowering the CPU load will increase performance and cut back on display exchange
times.
The Display Tool has found one display in need of a “Deploy” in the Functional Structure
Displays requiring deploy may show incorrect values, indications, etc. and should be
reported in the test protocol as a possible problem.
Alarm and event lists filtering on Objects and Descendants will in most
cases exclude objects in Lost and Found which can lead to lack of alarm
presentation, etc.
During troubleshooting, pay attention to the Creation Time of the Lost & Found objects. It
indicates when in time there was a need to create that particular object.
In most cases a controller “upload” or “download” is required to synchronize the HMI and
PLC environments. After the Control Structure has been synchronized with the controller,
the Lost and Found objects should be deleted.
Instead of deleting the Lost and Found object it is possible to remove the unwanted child
objects by exporting the Lost and Found object without children, delete it (incl. children)
and finally import Lost and Found again.
SV5.x hint All L&F objects can be deleted with the AfwSCT.exe tool:
C:\> afwsct –lf -q
If L&F objects return the root cause could be relocated and corrected, e.g:
1. Application not uploaded or downloaded properly…
Upload/Download
2. Obsolete alarms lingering in the Alarm & Event (SV3) or Event Collector services
(SV4)
Restart Alarm & Event or Event Collector services
3. Obsolete alarms lingering in the OPC AE server…
Restart OPC AE Server
4. Obsolete alarms lingering in the controller…
Restart controller (first warm, then possibly also cold)
The choice in Source Object Interceptor (see chapter 8.6.2) is influencing if a restart of
the Event Collector is required or not after removal of lost and found objects.
Run the check from the consistency tab of the library’s Library Version Definition aspect or
from the Consistency Check tool (available in SV5 and forward). Be sure to enable all
checkboxes except for “Verbose” if using the aspect checker variant.
Expected: No consistency errors
SV4.0: Check failed. The library have consistency issues where some may be possible to
repairable by the tool itself
SV5.x: Check failed. The library have consistency issues where some may be possible to
repairable by the tool itself
Expected: No unassigned aspects = nothing in the right list box after the
search with Aspects not included in any library checked is finished.
The above is valid in most configurations, but exceptions do exist – e.g. in
systems using Function Designer some aspects may be kept unassigned.
8 Other tests
8.1 Affinity
The affinity configuration should be controlled in all systems with redundant servers.
It’s recommended that no pair of adjacent operator clients should share the same server
(its better if they use separate servers in case one server should fail, operate slowly,
deliver corrupt data, etc.).
Redundant application servers (e.g. IM) should be configured to collect data from different
servers within redundant service groups for History, Data Access and Event Storage.
Load balancing is automatic even without using affinity, but should be considered since
large clients may inadvertently gather on the same server causing an uneven load
situtation.
Doc. no. Lang. Rev. ind. Page
Select the Service Group Definiton aspect and the Configuration tab.
The first listed service provider is “master” – the order may be influenced by Restore
System, Add/Remove Node, etc. It is recommended to have the lowest numbered node
(etc) as master. Reorder the service providers necessary.
In 1oo2 aspect server operation, the first listed service provider will overwrite the second
provider in case they individually become updated during a communication break. Any
work that has been made in clients of the secondary will then go lost.
Select the Service Provider Status aspect, select the Property View tab and enable
Subscribe for live data and verify the following items:
Item Description and expected value
ClientConnectionCount Number connected client processes. An uneven distribution can
be tweaked using affinity.
ClientNodeCount Number of connected client nodes. Redundant providers should
not deviate too much, or else affinity might need adjustments.
TransactionRateCurrent Number of aspect directory transactions (writes) per second.
Should be zero (0), or very close during normal operation. Bad
practice, e.g. frequent writing to General Properties drives this
number.
The Alarm Manager service default setting is to not create new entries for repeating
alarms and that all alarm categories share 10.000 queue slots in First-In-First-Out (FIFO)
manner, regardless of the alarm category (origin).
When the FIFO storage is depleted the following system message is emitted and possible
to view in the [Workplace Structure]Web System Workplace:System Event List:
To eliminate the risk that less important (and often frequently reoccurring) system alarms
flood the alarm manager and pushes the (often) more important process alarms out of the
FIFO storage it is possible (and recommended) to:
1. Keep the Make new alarm entry each time a condition gets active at its default
“Disabled” setting. This prevents repeating alarms from occupying the alarm
storage.
2. Define a dedicated storage queue for system alarm and/or process alarm
categories.
At the bottom of the Special Configuration tab, click the Edit button.
Save the operation results, wait one hour and repeat the operation and save the results
again using a new file name.
For each OPC Server, record the following in the test protocol:
1. Total number of clients (if found appropriate, also record client details)
Using Excel and simple math, the above data can easily be converted into KPIs and used
to baseline a system for later comparisons, etc.
• Number of item changes per second
• Number of read operations per second
• Number of write operations per second
Expected: The application load related figures shall not be skewed too much within a
redundant pair of connectivity servers. Unbalanced figures may indicate a
need of adjustment (or even deployment) of Affinity. Unusually low (or
zero!) figures may indicate configuration errors or lack of communication.
The OPC Adapter statistics operation lists the number of times a recovery item has been
added or removed and ends with a sum of OPC items presently in recovery state.
Expected: Zero (0) items in recovery state (at present, but preferably also in the past)
A Recovery Item is proof of an attempt to subscribe for a non-existent OPC item.
Typically, they originate from erroneous or obsolete configurations, e.g. older (obsoleted?)
process graphics or Log Configurations.
Recovery items add extra burden to the OPC server since they are perpetually retried
every 30 seconds.
Use the DumpRecoveryItems operation to produce a list of all items in recovery state.
Select the Service Provider Status aspect, select the Property View tab and enable
Subscribe for live data and verify the following items:
Periodic LogMgrQueueLength peaks seen when 2500 one-second IM logs collect at once
During the peaks (that coincides with IM-collection), trend callup takes several seconds.
After defragmenting the Basic History data disk and applying stagger to the IM
The queue peaks are removed and overall Basic History performance is improved
Trend callup time is significantly improved (typically less than a second) while IM retrieves
the same amount of raw data (but in smaller chunks well spread over time).
Select the Service Provider Status aspect, select the Property View tab and enable
Subscribe for live data and verify the following items:
Item Description and expected value
DiscardedAlarms Number of alarm or events that has been discarded
(suppressed). Should be zero. Examples reasons to discard:
• Unknown category
• SourceName cannot be found (no matching object in system)
• Bad timestamp
AfwApplogViewer has an operation that can be used to list the
last 50 discarded events: AdvAeEventCollectorEvent Collector
ServerDump Discarded Events.
The Tracking variant automatically purges old alarm references once a proper source
object has been, e.g. uploaded and the temporary object removed from Lost & Found.
The Default variant also require a restart of the Event Collector Service group. Old alarm
references may confuse operators when alarms do not associate where expected.
Other OPC AE servers dependent on the automatic creation of objects for missing
SourceNames (=Lost & Found) should have the same setting.
Doc. no. Lang. Rev. ind. Page
Most of the System 800xA binaries are still compiled for 32-bit architecture or in some
cases WOW64 architecture limiting their maximum virtual memory usage to 2.0
respectively 4.0 GB.
Expected: 32-bit processes below 1.5 GB (=500 MB left over)
64-bit (WOW64) processes below 3.5 GB (=500 MB left over)
Some processes, e.g. oracle.exe may max out its usage (e.g. very near 2.0 GB) without
causing any issue. Pay attention to growing processes, or processes with large deviations
between nodes of the same type, e.g. afwworkplaceapplication.exe among client nodes.
System 800xA firewall handling tools add exceptions valid for “all” network profiles:
domain, private and public. An “unidentified” network connection may block valid traffic.
Expected: For proper firewall operation, the Network Interfaces must belong to the
correct Network Category: Domain, Private or Public.
StartRun… ncpa.cpl
One method to identify problems with the firewall is to enable Firewall Logging – blocked
telegrams will then be logged to a logfile (separate log setting for each profile).
Average transfer rate: 186 MB / second Average transfer rate: 1086 MB / second
Average seek time: 0.1 ms Average seek time: 0.1 ms
Unless specially required, it is also recommended to disable the Clients allowed to set
time setting on the AfwTime Service Special Configuration tab.
9 Backup strategy
11 AC 800 Connect
• Compilation warnings
It is recommended to show warnings for “Changes application” and present
warnings for “Compilation”, “Change analysis” , “Task Collisions” and “Others”.
11.2.2 Tools
• Task analysis tool (Version 5.1 )
It is recommended to have “EnableTaskAnalysisTool” set to true. (Tools Setup
Station Application Download). This tool makes the task tuning easier.
• Clock Synchronization SNTP/CNCP
Verify clock synchronization (Tools Maintenance Clock Synchronization
Status.)
11.2.5 Setup Wizard - Heap setting (In systems prior to version 5.1)
Use Help About… window to examine the Memory Free value. A too low value may
cause the Control Builder to crash. Ensure that the Heap Size is large enough to fit the
application. It’s recommended to keep 30-50 % of the memory free after some downloads
since application download allocates additional memory. A too large Heap Size (800-
900MB) occupies unnecessary RAM and closes in on the 2 GB per process maximum
limit of Windows. Change heap size at Start All Programs ABB Industrial IT 800xA
Engineering Utilities Setup Wizard.
Ask the customer/application engineer if they have problem with the Control Builder,
suggest the customer to adjust the settings. Note this setting is for each Control Builder, if
using terminal server it only needs to be set once.
• Startlog.txt
The file contains all logging from Offline to Online mode (Test mode or Download
Project Going Online). Check for error for the latest downloads, is there any errors
that the application engineer needs to take care of? Document in the record.
• Session.log and Session.log_bakX
Check for errors.
• ControlBuilderPro Date and Time Session.LOG (and .dmp)
These files are generated when the Control Builder crashes. If those files are in
the folder, check the date and time for the file. If they are recent and someone
knows the circumstances around the crash, the files and a description of the
problem can be reported to the regional Support Center.
Note! Report always a crash when it happens and you know the circumstances.
In the above dialog a number of controller diagnostics is made available. Most of them are
described in the sections below.
The firmware information is also in the controller log file, how to verify that read the
Firmware session in this document.
The second part is part is "alive" and starts with “===Log fetched at date and time ===”.
New information is added in the bottom (that pushes older information away, but not the
information in the startup part).
Most of the information in the second part of the controller log file can also be found in the
[Workplace Structure]Web System Workplace:System Event List. If the time slot in the
controller log file is shorter than a month check the System Event List.
The rows are starting with the letters I (Information), W (Warning) or E (Error) and date
and time for the event. Check for rows starting with E, investigate if an action for the error
is needed. Don’t forget to check all of the log files (primary, backup, CI-log).
Consider reporting errors that cannot be explained by the customer, e.g. a power failure.
Example of warnings that should be reported in the health check report even though they
have an old date:
W 2012-09-17 16:49:30.261 Unit= _SWFirmware ContrName 1011 AlmDefErr ObjectName
The alarm condition is not created successfully, the alarm will not work. Solution:
Search for the alarm object, it may be a parameter that is wrongly configured in
the 1131 application code (typically, the alarm’s SourceName + Condition name
have not been uniquely defined in the application)
W 2012-05-09 18:04:06.033 Unit= _SWFirmware ContrName 1012 Undeclared external event 0.11.206.15 true
The IO channel is configured for SOE, but the signal is not connected to an alarm
object. Solution: Create an alarm block or configure the channel as DI (not
DI+SOE)
W 2012-07-06 16:18:06.345 Unit= _SWFirmware ContrName 1030 AE setting NamValItem LogStrings to low
If this is seen during download it can be ok, but if seen without download the
controller has too high load. Solution: Recommend task tuning.
W 2012-03-14 14:45:52.504 Unit= _SW1131Task TaskName 2001 Interval time in ordinary tasks inc 15.
W 2012-03-14 14:46:02.562 Unit= _SW1131Task TaskName 2002 Interval time in ordinary tasks dec 13.
This controller has Load balancing enabled and the controller will adjust the task
interval time to keep the cyclic load to 70%. Solution: Recommend to adjust the
task interval time so that the cyclic load will be lower than 70%.
More system events and alarms are found in 3BSE035980*; AC 800M Configuration;
“Appendix B System Alarms and Events”.
Controller crash:
A controller crash is recognized as in the example below:
Starting with System Version 5.0, controller crash logs are automatically transferred to the
MMS Server working folder at all computers running an MMS Server. Those files are not
translated but it can be done by Supportline. Network switches must be configured so that
multicasting is enabled; otherwise will the log distribution to MMS server not work. See
Product Bulletin System 800xA - RNRP Network Configuration Requirements
3BSE066739.
The file will be saved in folder C:\ABB Industrial IT Data\Control IT Data\MMS Server for
AC 800M. It is preferred to collect the files from the connectivity server.
If crash logs are found, check with customer if it is desired to have the crash investigated.
If so submit a support case to the regional Support Center, do not forget to add the
circumstances from around when the crash occurred. Note: inform the customer to always
report a controller crash directly when it happens and they know the circumstances.
Note: it is recommended to fetch all controller logs before starting with the Controller
Analysis functions since they output their results to the controller’s RAM based log which
is very limited in size (or else, other important information in the log may go lost).
Some of the analysis will generate dedicated files that are saved in C:\ABB Industrial IT
Data\Engineer IT Data\Control Builder M Professional\LogFiles.
If any counters have increased, those modules should be put under observation.
It is possible to get the Modulebus I/O Revision from the Controller Analysis dialog, the
preferred version can be found in the System 800xA Release Notes for each version and
for HI IO in TÜV certificate report 3BSE054957 (SV4.0, SV4.1 and SV5.0 SP1) and
3BSE054960 (SV 5.0 SP2 and SV5.1).
For implementations with Inter Application Communication (IAC) from the Control
Builder’s Tools Maintenance Remote System dialog, press the button Show
Diagnostic for Communication Variables.
Start with performing a reset, then wait some minutes and check the result.
There should be no unresolved variables. If there are unresolved use Show Unresolved
Variables to find out the variable names and document in the record.
11.3.7 Tasks
It is recommended to have time gap between task executions to avoid that other lower
prioritized functions in the system such as communication (for example MMS) will be
disturbed/starved.
The task overview (with Control Builder in online mode, right click on tasks Editor) is
good to use to analyze if the controller is task tuned.
There are many parameters to explain how to tune the tasks, but some check can be
made:
Priority
Different priorities should be used. A task with higher priority can interrupt a task with
lower priority. In the example above it can be latency for one of the tasks 2-4 during
download, because of same priority and long First Scan Execution Time.
Task Interval Time
Compare Interval time with Actual Interval Time, they should be nearly the same.
Hint! To ease performance tuning, it is recommended to configure the interval time as a
multiple of the task with the shortest interval , e.g.
• 50, 100, 200, 400, 800, 1600, … ms.
• 125, 250, 500, 1000, … ms
Actual Execution time
Recommended maximum Actual Execution time is for a PA controller 200ms and for a HI
controller 100 ms. If the execution time is longer than recommended is the solution to
create more tasks to the application or split it into two applications.
Offset
Shall be > 0. Compare Offset with Actual offset. For example MMS task above should not
have offset set to 100ms. 120ms had been a better value to avoid latency when VMT is
executed. If offset is not configured you will get a message during compilation that there
are Colliding Start Times for the tasks. Use an Offset value of at least 5 or 10ms (better)
or even more.
Accepted latency (HI controllers)
The default latency limit is 10%, if this is used ask if the process really require that low
latency. Low latency limit can result in a shut down during download, especially if the
controller not is task tuned. More details found in AC 800M HI Controller Firmware 4.1 and
5.0, Configuration considerations AC 800M High Integrity controller - 3BSE047421D0025.
First Scan Execution Time
If this time is high it can cause that other task will be late during download. See Accepted
latency.
More information about task tuning can be found in AC 800M Configuration -
3BSE035980* and AC 800M Planning 3BSE043732*.
As from SV5.1 Task Analysis tool is available to make task tuning easier. The tool assists
with a graphical representation.
There will be a warning if the time gap is <= 5ms or < 20% of previous execution time and
error if the time gap is < 10% of previous execution time.
If high load discuss how to reduce the load by for example increase module bus scan time
or/and increase task interval time.
The reason for the reset from IOC frameworks needs to be investigated.
The above is normally caused by something that is wrong with the Profibus
communication quality, e.g. bad HW installation.
Webserver Service file
How to use the CI854 WebServer see the manual: AC 800M PROFIBUS DP
Configuration 3BDS009030*.
• Enter the IP address of the controller in the address bar of the browser, default
user is “service” and default password is “ac800m”.
• Create the service file select “Create CI854 service file“ in the upper left corner of
the browser window. A dialog opens to select the CI854 you would like to collect
the data for. To have all information in place always select all modules.
• Cross-check the Profibus Slave configuration in CBM hardware configuration with
the live list in the service file.
With the CI854 web server it is possible to detect Profibus communication retransmitting
on a low level, at an earlier stage then reported at Unit status in AC 800M.
Here is a typical example how it could look like when communication retransmitting on a
low level occurs at Profibus Master pos. 2. The slave address is marked with bold,
extracted info from the file: (CI854 web server service file):
--DMJ Buffer--
Current entry: 56 of 62
Fcode Code Info1 Info2 Date Time
4451 0002 00010007 47444353 .... SCDG Tue Oct 25 12:20:53 2011
4451 0002 0001000D 47444353 .... SCDG Tue Oct 25 12:20:53 2011
4451 0002 0001000E 47444353 .... SCDG Tue Oct 25 12:20:53 2011
5608 002F 0000000E 43454E53 .... SNEC Tue Oct 25 12:20:53 2011
5608 002E 00000002 47454E53 .... SNEG Tue Oct 25 12:20:53 2011
5608 002E 00000007 47454E53 .... SNEG Tue Oct 25 12:20:53 2011
If the DMJ Buffer is continuously reporting new events in a normal running Profibus line,
it is an indication of communication problems. It is suggested to document in the test
record that you suspect Profibus communication/installation problems.
If the Dint variable contains values out of range -32768 to 32767 this error code is
displayed and the write operation is not effectuated. Document the problem in the
health check test record as an application error.
CI log:
Buffer full:
E 2012-02-16 17:53:32.623 PHMODBUSTCPTelegram.cpp, Line:377, ProcessResponseMsg: Pending queue
full response recieved from CI867. ErrorCode = 100
This error shows when trying to read data, but the data is not available.
Doc. no. Lang. Rev. ind. Page
Network loop:
I 2012-04-10 12:29:38.182 (tNspTask)[SYS] NSP: tNetTask running without delay
I 2012-04-10 12:29:38.827 (tNetTask)[SYS] NSP: High Ethernet load generated from addr 0:7:32:19:64:2b
I 2012-04-10 12:29:39.183 (tNspTask)[SYS] NSP: Network Storm Protection is delaying tNetTask at limit
1000 packets/s
This occurs if a Master connected to the CI867 which act as slave has
disconnected the connection before CI867 has finished the transaction.
Duplicate IP address:
0x1f10940 (tNetTask): duplicate IP address 64646401 sent from ethernet address 00:00:54:14:f3:6f
There are more than one slave with the same IP address connected on Modbus
TCP network.
Note: there must be variables connected to the channels otherwise there will be no
values.
If you suspect any problem you can fetch the controller log files and check the information
for CI868 in the CI log.
Starting with System Version 5, the RTA CPU Load can be monitored and logged within
the 800xA System itself by adding & configuring* an RTA Load objects below each RTA
board/PU410 unit in the Control Structure
*) The Control Connection aspect’s MB300 tab must be updated with the RTA’s net and
node numbers (default values are 0).
Note:
The following RTA Board (PU410) system messages relate to the above counters:
DCXA1280 24 5 H’xxxxxxxx H’xxxxNENO
= Unable to send sub. request to controller NENO (receive channel is full)
NE = network (in hexadecimal). NO = node (in hexadecimal)
1. The accumulated number of times the OPC server has been forced to attempt to
restart a subscription. The value is the integrated value of item 4. below.
Subscription restarts are triggered by loss of expected input, which may be due to:
• Too many subscriptions
• Controller overload
• RTA Board (PU410) overload
• CPU overload in 800xA for Advant Master Connectivity Server (Windows)
2. The number of OPC items for which the OPC server must emulate a cyclic
subscription for by sending repeated and perpetual “read once” requests.
A rule of thumb is to keep this value below 100 as this emulation creates significant
overhead along the whole communication chain and should thus be avoided.
Items capable of cyclic subscription are listed in Appendix E of the 800xA for Advant
Master Configuration User’s Guide, 3BSE030340.
Doc. no. Lang. Rev. ind. Page
Example: The MB300 AI faceplate, extended view, AI. Limits tab creates one (1)
Execution timer by subscribing for the ALARM_DELAY_COUNTER property.
In fact: all such properties (lacking cyclic support) have an Update Rate of 20.000
milliseconds in the Control Connection aspect.
5. Dummy subscriptions are created when a process object only have subscriptions on
items not part of the list of cyclically subscribed properties.
E.g. when only subscribing to the ALARM_DELAY_COUNTER property of an MB300
AI object.
13 PLC Connect
PLC Connect does not have any hard-coded limitations; the performance depends on the
computer performance.
Select each operation marked in the above picture and press the Invoke button to
execute it.
Expected: The sum of Controllers, Types, Objects and ObjectItems should not
exceed 25000 (which is a license limit) and 10000 in a combined
Aspect/Connectivity server.
Expected: No “odd” values (e.g. excessive CPU or memory usage). After an upgrade,
adding a new controller, etc. the values should only change in reasonable
way.
The AdsCsCommServer.exe process on the slave does typically have
higher CPU usage than the master.
Hint: Keep a record of the values to be able to draw better conclusions.
Doc. no. Lang. Rev. ind. Page
14 Information Manager, IM
Information Manager is mostly used to host secondary and hierarchical logs. It can also
archive log data to secondary media and act as an information gateway to office
applications and report packages.
Hint: each time a trend presentation attribute (min, max, unit, fraction) is changed in the
process, or is statically redefined (overridden) in the 800xA system the IM will require a
manual synchronization to adopt the new values. This is considered “normal operation”.
Expected: Total:
Percent Good near 100% (or else, find root causes for bad/missing data)
Logs With Errors = 0 (or else, perform database/synchronization check)
For each log:
End time = close to present time (or else log is not collecting data)
Ratio of BadDt (Bad data) / GoodDt (Good data) close to 0 (=100% good)
Ratio of NoDt (No data) / GoodDt (Good data) close to 0 (=100% good)
To ease the analysis, the report can be imported to Excel and the ratios be calculated with
formulas and the result be sorted with % bad/missing data in descending order.
thus also SBR) will take place at the same time. This is known to cause temporary high
load in Basic History especially in larger configurations. To make better use of system
resources, it is recommended to stagger the collection of data, i.e. to split large blocks into
several smaller pieces and spread them over time.
To view the current collection queue and block sizes, issue this command at a Command
Prompt:
C:\Users\800xaadmin> rtstest -p 3
rtsMain.c @ 1074 | sending 17 to 3
Next, open the output file (c*.stats) at the %HS_TMP% folder with e.g. notepad:
C:\Users\800xaadmin> notepad %HS_TMP%\c1.stats
Skip down to the “SECONDARY LOG QUEUE STATS” section and examine the table of
next upcoming data collections.
====== ===== === === ===== ========== ========================
#Entrs #Logs Ack Msd Fails B-Rate Next Collection Time
------ ----- --- --- ----- ---------- ------------------------
The table starts here…
If this table is long and having only small figures in the leftmost column (#Entrs), the
configuration is well spread over time and no further adjustments are necessary. The
remaining part of this check item can be skipped.
The effect can sometimes be seen on the LogMgrQueueLength property (see chapter 8.5
Basic History service health)
On the other hand, if the table is only few rows long and having large numbers in the
leftmost column, the configuration is NOT staggered and should be addressed. Run the
hsdbmaint command and select item 8 See example below
C:\> hsdbmaint
As shown in the above example, the average requests per minute from OPC HDA were
redunced from 100 down to 13 per minute. This since the SBR for the 1s logs were
adjusted from 60 to 240 seconds. The “stagger = x” number indicates how many
smaller pieces the larger blocks of logs were broken down into.
In some cases, it may become necessary to enter other settings for SBR than what the
tool suggests, i.e. if collection cannot be delayed too much (which, is exactly what the
SBR is doing).
Inserting alternate values into the stagger tool requires some level of experience and
training of using the hsDBMaint tool.
Note: To activate the new settings, the IM must be rebooted or the IM History services
be restarted with the PAS tool (StartRun… pasgui) Stop All Start All.
Unless overwritten (for some reason…) the last run of the IM backup can be viewed at
%HS_LOG%\historyBackup.log. Take notice of the timestamp of the log file itself:
…
Database backed up by exp utility
…
Export terminated successfully without warnings.
…
Files backup up by hsZip utility
…
Successfully zipped all files on drive C
…
Look for error messages other than the above indicating a successful backup. Notice, any
remaining item(s) from the IM log database consistency tests will tarnish the backup.
The IM Backup tool can be invoked from the IM System Tray icon.
The History Backup program (hsBAR.exe) can also be scheduled using the Scheduler
Service. Refer to Information Manager Configuration User’s Guide, 3BUF001092.
Doc. no. Lang. Rev. ind. Page
VMware: https://kb.vmware.com/s/article/2143832
Expected:
1) All hosts should run the same and appropriate version of ESXi.
2) Essential patches (builds) should be installed.
(download the most recent ESXi release notes and verify)
3) In some cases, hardware specific patches must be applied.
(e.g. ESXi v6.0 have problems with early LSI disk drivers)
15.5 Network
It is recommended to restrict each virtual switch to one single port group only, and assign
it with a dedicated physical adapter (1:1).
If the number of virtual networks are large and the number of available physical adapters
low, the total number of required physical adapters can be reduced by using VLAN
tagging and truncing the traffic over the same physical connection.
Make sure to assign dedicated physical adapters for RNRP areas with redundant
connection. The primary (path0) and secondary (path1) connections must not share same
physical adapter.
The adapter types suitable for a given version of System 800xA is listed in the designated
System 800xA Virtualization with VMware vSphere ESXi, 3BSE056141-xxx document.
Some combinations of adapter type and OS version are known to cause issues.
ESXi System OS version Recommended adapter type and comments
version version
<= 5.1 <= 5.1 Server 2003 E1000 is required to prevent issues with RNRP.
Server 2008
However, it is suspected that later ESXi builds
Windows XP
(patches) has resolved the problem.
Windows 7
5.1, 5.5 6.0 Server 2012 Any of E1000, E1000E* or VMXNET 3 can be used.
6.0.1 Windows 8
There is a potential risk of Purple Screen of Death
6.0.2
(PSOD) with Windows 2012 Server and E1000
6.0.3
unless ESXi 5.5 Update 2 or later is installed.
5.1, 5.5, 6.0.3-1 Windows 10 Either E1000E* or VMXNET 3 (=avoid E1000)
6.0
5.1, 5.5, 6.0.3-2 Server 2016 Either E1000E* or VMXNET 3 (=avoid E1000)
6.0 Windows 10
*) For systems with 800xA for DCI, E1000E must be avoided.
Expected:
All network adapters are of the required type.
To properly verify accuracy (as the GUI is only displaying whole minutes), login with SSH
and issue the command: watch ntpq -p
# watch ntpq -p
Every 2s: ntpq -p 2018-08-09 11:40:44
remote refid st t when poll reach delay offset jitter
The offset and jitter indicate the deviation (in milliseconds). The currently in use reference
is marked with an asterisk (*). The value of reach indicates the result of the last eight (8)
consecutive polls. 377 (octal) = 255 (decimal) = 11111111 (binary) = 100% successes.
The individual startup order and delay between each virtual machine may need to be
tested & evaluated a few times until found appropriate and working.
• A domain controller might need a few minutes extra before it start accepting logins
in case it is the primary domain controller (e.g. measure the time from boot until
the “Press Ctrl+Alt+Del to sign in.” message is presented on the console).
• Once the first aspect server has started and the System 800xA services have
reached “Service” state the remaining servers can be started in rapid succession.
15.9 Snapshots
Snapshots is a powerful feature of VMware, but combined with Thin Provisioning and
limited disk space snapshots can cause severe problems when disk space run out.
Expected: Snapshots and thin provisioning should be avoided in production
environments.
In large configurations, snapshots can be listed via CLI (SSH Service must run in ESXi)
1. List all virtual machines
# vim-cmd vmsvc/getallvms
Vmid Name File Guest OS Version
19 DC1 [datastore2] Servers/DC1.vmx windows8Server64Guest vmx-08
22 AS1 [datastore2] Servers/AS1.vmx windows8Server64Guest vmx-08
24 CS1 [datastore2] Servers/CS1.vmx windows8Server64Guest vmx-08
3. A one-liner to list all snapshots for an entire host (enter all text on a single row)
# for vm in $(vim-cmd vmsvc/getallvms | cut -d ' ' -f 1 | grep -v Vmid); do
echo -n $vm: ; vim-cmd vmsvc/snapshot.get $vm; done
It’s even possible to remove snapshots via CLI, just substitute snapshot.get with
snapshot.removeall in the above examples. Be careful when deleting!
Batch Management
To be defined later.
16 Asset Optimization
To be defined later.
23 Script reference
The following section describes a number of tests that can be performed system wide
using scripts. In some situations it may not be possible to run scripts, e.g. due to security
policies enforced by the customer. In such cases manual checking may be required to
complete the Health Check Test Record.
Obtain a copy of the scripts, login to Windows using an administrator account
(membership of the DomainAdmins group is recommended) and unpack the scripts in a
temporary folder somewhere on the local computer’s hard disk.
All the scripts will attempt to automatically populate the \Results\_Nodes.txt file with
all computers found in the workgroup or domain. The script is using NetBIOS technique
(net view) and if NetBIOS is not available/properly working some or all nodes may fail to
be added to the _Nodes.txt. In such cases, attempt to check/repair NetBIOS settings,
possibly reboot the computer and try again. As a last resort, configure the _Nodes.txt
file manually – insert one row per computer listing its name (or IP address).
Be sure that the _Nodes.txt file is correct (does not list any non-existing nodes, etc.) as
this may cause unexpected timeouts or errors during script execution.
Note: Before starting any script, ensure that Excel’s Macro Security Level is set
to Medium or Low.
Hover with the mouse pointer above the cell to display the comment.
Server: KVVASCS2
Time: 01/25/11 10:44:15
This script can provide useful information when e.g. investigating display driver
related issues, etc.
This script collects the Windows registry size from all computers.
This script collects a list of automatically started applications from all nodes. Some
applications are less desired in Process Control equipment.
REVISION