PI System Administration Basics
PI System Administration Basics
OSIsoft, the OSIsoft logo and logotype, Analytics, PI ProcessBook, PI DataLink, ProcessPoint, Asset
Framework (AF), IT Monitor, MCN Health Monitor, PI System, PI ActiveView, PI ACE, PI AlarmView, PI
BatchView, PI Vision, PI Data Services, Event Frames, PI Manual Logger, PI ProfileView, PI
WebParts, ProTRAQ, RLINK, RtAnalytics, RtBaseline, RtPortal, RtPM, RtReports and RtWebParts are all
trademarks of OSIsoft, LLC. All other trademarks or trade names used herein are the property of their
respective owners.
Use, duplication or disclosure by the U.S. Government is subject to restrictions set forth in the OSIsoft,
LLC license agreement and as provided in DFARS 227.7202, DFARS 252.227-7013, FAR 12.212, FAR
52.227, as applicable. OSIsoft, LLC.
2|Page
PI System Administration: Basics
Table of Contents
1. Introduction .......................................................................................................................................... 6
1.1 Overview of the Course ................................................................................................................ 6
1.2 PI System software........................................................................................................................ 7
2. [Optional] Preparing for a PI System .................................................................................................... 8
2.1 Background: What Preparation is Needed?.................................................................................. 8
2.2 Background: Hardware Sizing ....................................................................................................... 8
2.3 Background: Software Prerequisites........................................................................................... 11
2.4 Background: Service Accounts and Certificates .......................................................................... 11
2.4.1 Service Accounts ................................................................................................................. 11
2.4.2 Group Managed Service Accounts ...................................................................................... 12
2.4.3 Certificates .......................................................................................................................... 12
2.4.4 Service Principle Names ...................................................................................................... 13
2.5 Background: Firewall Port Requirements ................................................................................... 13
2.6 Background: PI Data Archive License File Activation .................................................................. 13
3. PI Server Installation ........................................................................................................................... 16
3.1 Hands-On: PI Server Installation ................................................................................................. 16
3.2 Hands-On: Post-Install - Backup.................................................................................................. 17
3.3 Hands-On: Post-Install - Security ................................................................................................ 17
3.4 Knowledge Check: Final Post-Install Tasks .................................................................................. 19
3.4.1 Exercise - Create a Mapping ............................................................................................... 20
4. PI Interface Installation ....................................................................................................................... 21
4.1 Background: How Does the PI System Connect to Data Sources? ............................................. 21
4.1.1 PI Interfaces ........................................................................................................................ 21
4.1.2 PI Connectors ...................................................................................................................... 22
4.1.3 PI Adapters .......................................................................................................................... 22
4.1.4 Custom Applications ........................................................................................................... 22
4.2 Hands-On: PI Interface Installation ............................................................................................. 23
4.3 Knowledge Check: Confirming Connectivity ............................................................................... 24
4.4 Hands-On: PI Interface Configuration ......................................................................................... 24
4.5 Knowledge Check: The PI Data Archive Message Log ................................................................. 34
4.5.1 Exercise - Explore the PI Data Archive Message Log........................................................... 34
3|Page
4.6 Knowledge Check: Confirming Interface Operation ................................................................... 32
4.6.1 Part 1: Check that you are receiving data for all points belonging to the interface in the PI
Data Archive ........................................................................................................................................ 32
4.6.2 Part 2: Check that data is flowing through the buffer ........................................................ 32
4.7 Knowledge Check: The Bufferer, the Betterer ............................................................................ 26
5. PI Point Management ......................................................................................................................... 28
5.1 Hands-On: Creating Points for Interfaces ................................................................................... 28
5.2 Background: Explore PI Points and Interfaces ............................................................................ 29
5.3 Background: Compression and Exception .................................................................................. 29
5.4 Reference: The Interface User Manual ....................................................................................... 29
5.5 Knowledge Check: Creating Digital Points .................................................................................. 30
5.5.1 Introduction to Digital Points .............................................................................................. 30
5.5.2 Digital State Sets ................................................................................................................. 30
5.5.3 Exercise: Create a Digital State Set and Point ..................................................................... 31
5.6 Hands-On: Creating Points in Bulk .............................................................................................. 32
5.7 Knowledge Check: Creating More Points.................................................................................... 34
5.7.1 Exercise - Create Points for Pump Current ......................................................................... 37
5.7.2 Exercise Solution ................................................................................................................. 37
6. Improving Interface Reliability ............................................................................................................ 39
6.1 Background: Interface Redundancy ............................................................................................ 39
6.2 Knowledge Check: Preparing a Second PI Interface ................................................................... 39
6.2.1 Exercise: Configure an OPC Interface on PIINT02 ............................................................... 39
6.3 Hands-On: Configure UNIINT Failover ........................................................................................ 40
6.3.1 Part 1: Prepare the shared folder ....................................................................................... 40
6.3.2 Part 2: Configure failover on one interface ........................................................................ 40
6.3.3 Part 3: Fix security for UFO status tags ............................................................................... 41
6.4 Knowledge Check: Interface Health Points ................................................................................. 43
6.4.1 UniInt Health Points ............................................................................................................ 43
6.4.2 Exercise - Create UniInt health points for both of your Interface instances ...................... 44
7. Managing User Access ........................................................................................................................ 45
7.1 Hands-On: Data Archive Security ................................................................................................ 45
7.2 Background: What is Asset Framework? .................................................................................... 46
7.3 Hands-On: Asset Framework Security ........................................................................................ 47
4|Page
PI System Administration: Basics
5|Page
1. Introduction
Before reading this section, please refer to the following course YouTube
video: https://youtu.be/yJgPct6gAtg
Video
This course will teach new PI System Administrators to install, configure, secure and manage the core
components of a PI System, including:
During the class we'll cover best-practise configuration only, but will link out to documentation covering
older practises and methods when necessary. No matter if you're about to administer a new PI System or
are maintain an established one, you'll get a lot out of this class.
Throughout this class we will assume you have already completed the free PI System Basics class. We will
not cover any background or content that has already been covered in this class.
The course consists of text-based lessons, and video lectures. You are encouraged to follow along with all
video lectures using your Learning Cloud Environment. It is intended that you follow the video lectures in-
order, as a lot of configuration depends on prior lessons. Text-based lessons contain background theory,
documentation and other useful information.
• Knowledge check: Exercises to complete using your virtual environment, or quizzes to keep your
skills sharp. Lessons will assume you have completed prior knowledge checks. Some knowledge
checks ask you to change the configuration of your virtual environment and skipping them may
result in you being unable to complete later exercises.
6|Page
PI System Administration: Basics
• Reference: Documentation or downloads you may find useful when applying this class to your
own system. You are not expected to read through all references, and will not be examined on
any content within them, but they are included for your convenience.
In the next lesson we'll cover the Learning Cloud Environment used in class, and what we'll accomplish in
this class in detail.
Software Version
PI Asset Framework (PI AF) client (PI System Explorer) 2018 SP3
After reading this section, please refer to the following course YouTube
video: https://youtu.be/WYPOsLvogkQ
Video
7|Page
2. [Optional] Preparing for a PI System
You can consider this chapter optional. If you will never plan for or install a PI System from scratch, the
knowledge contained in this chapter is not strictly needed. If you will only ever maintain a PI System
already in place, you can skip to the next chapter.
Installation best practices are found in the PI Data Archive Install Field Service
✔ Best
Technical Standard. This document can be downloaded from the [Reference: PI
Practice
Data Archive Install Technical Standards] lesson online.
This spreadsheet gives recommendations for the following hardware resources based on current or
anticipated load and data volume.
• Storage Capacity
• CPU Count
• Memory (RAM)
• Network Bandwidth
8|Page
PI System Administration: Basics
The amount of disk space required depends primarily on the number of PI points that the PI system will
collect. See below to calculate the necessary disk space.
PI Data Archive 11 MB per 1000 points + 1 Located on the same computer as the
databases MB PI Server.
PI event queue 5 MB per 1000 points OSIsoft recommends that you place
the event queue on a different
physical drive from the PI archive files.
For PI Data Archive, PI AF server, and Microsoft SQL Server, one or more Microsoft Windows compatible
computers, with a 64-bit operating system is required.
For best performance and improved security, OSIsoft recommends that you install MS SQL Server on a
different computer from PI Server. If you plan to install MS SQL Server on the same node as the PI Data
Archive, the SQL Express Edition should be installed so that the MS SQL Server does not compete with
system resources of the PI Server. The MS SQL Express Edition is limited to using only a single physical
CPU and 1 GB of RAM.
It is recommended that the PI AF server and PI Data Archive server be installed on different computers if:
• PI AF server is configured for high availability (such as a load balanced PI AF server, PI AF servers
connected to a mirrored MS SQL Server, or PI AF servers connected to clustered MS SQL
Servers).
The number of required computers depends on the size and complexity of the PI System. The size of a PI
System depends on the number of PI points and the number of units (elements) of equipment (such as
mixers, tanks, or meters or whatever else you have added into the asset database).
A simple, small system will have the PI Data Archive, the PI AF Server and MS SQL Server (the free MS
SQL Server Express may be used) installed on the same hardware (or virtualised) server, as shown
below:
9|Page
For distributed systems with large workloads and point counts, and with multiple PI Servers or PI Data
Archive Server collectives that link to a central PI AF database, OSIsoft recommends that you install PI
Data Archive Server collectives with two PI AF Servers with a Network Load Balancer over them, and
Microsoft SQL Server on separate, redundant computers to achieve the best level of performance and
scalability. This type of system is depicted below:
10 | P a g e
PI System Administration: Basics
• Microsoft Windows
• Microsoft SQL Server
• A Data Source for Time Series Data
Except for select interfaces and adapters, all PI System software is Microsoft Windows-based. Any server
where PI System software will be installed must have Microsoft Windows installed on it.
Microsoft SQL Server is required by both PI AF Server, and PI Vision. In this class we'll be focusing on PI
AF Server - PI Vision installation is not covered in this class. To see which versions of Microsoft SQL
Server are supported, see the SQL Server Requirements documentation.
Your time-series data source will be defined by your desired project outcome. Which pieces of
equipment or data sources do you want to expose to your users? How do they expose their data now?
These topics will be covered in depth during the upcoming lesson on PI Interface Installation and
Configuration. For now, this course will assume you'll be using an OPC DA Server as your data source, as
it is by far the most common. During the upcoming lesson on PI Interface installation and configuration,
we will study this depth and cover non-OPC Server data sources. For more information on OPC DA, see
the OPC Foundation's page on the topic.
• Service accounts
• Certificates
The information below should give you a better idea on what each of what to ask your IT department for
regarding each of these topics.
You can think of a service account similarly to a user account in a domain. It is an account that has been
created for the purpose of running a specific service. Modern security best practises dictate that services
that require different levels of access to different objects should run under different accounts. The
permissions on these accounts should follow the principle of least privilege - each one should have the
minimum privileges to perform its function and nothing more.
During this class, we will be using service accounts for the following services, and configuring least-
privilege for each:
11 | P a g e
• PI AF Server
• PI Analysis Service
• PI Buffer Subsystem
In this class we build a very simple system, but in a more complex production system, you may also need
service accounts for:
• PI Notifications Service
• PI Vision
• PI Web API
• Any PI Integrators
In this class we will be using a special type of account for this job, called Group Managed Service
Accounts (gMSAs). Most of the steps we work through in this class also work with other account types,
and when there are configuration differences we'll make sure to mention them. We use gMSAs because
their passwords are automatically managed by the domain, and they align much better with what we're
trying to achieve than other account types. Once the initial setup is done, your job as an administrator is
much simpler as password changes and maintenance is automatically performed. You can read more
about using this type of account with PI System Services here and you can read about migrating to
gMSAs here (both links require a validated OSIsoft customer portal account).
2.4.3 Certificates
• PI AF Server
• PI Vision Server
There are many ways to generate these certificates, and the process you use will be decided by your IT
department. You will need to ask your IT department for certificates for these two servers, generated by
an authority that is trusted by all users that are going to be using the PI System at your organisation. For
more information on these certificates, see the PI Vision documentation here.
12 | P a g e
PI System Administration: Basics
During this course we won't be installing PI Vision, but we will be installing PI AF Server, so we will need
a certificate. We'll be using a certificate generated by our Domain's Certification Authority. The
certificate we're using in this class have similar function to certificates generated by your IT department
for use within your corporate domain, trusted by domain-joined computers and users. This is the most
common type of certificate used for PI System Services the field.
This section relates specifically to the PI Vision and PI Web API components of the PI System. SPNs are
used by Kerberos authentication to associate a service instance with a service logon account. If you'll be
installing PI Vision and/or PI Web API, you'll need your IT department to set up SPNs for these services
before users are able to connect to them. For more information start reading the PI Vision
documentation from the chapter on Kerberos Delegation here.
A quick summary of inbound ports that must be open for each service:
Service/Product Port
PI Notifications 5468
A full list of knowledge base articles on this topic can be found here.
A simple way of checking if a port is open from one machine to another is to take advantage of the Test-
NetConnection PowerShell cmdlet. Running the following command will attempt a connection to
MACHINE on port 5450.
If you see an error, the port is blocked. If you don't see an error, the port is open.
13 | P a g e
applications can run on the PI Data Archive Server and displays running parameters, such as the point
count limit.
When the license file is generated, view the PI Server Manifest to verify the server details.
In order to generate license file, a Machine Signature File (MSF) is required. The PI Server install kit is
capable to generate the MSF by itself, you must copy the install kit to a local disk on the PI Data Archive
Server computer and then run the kit.
The kit will generate the MSF file to Documents folder of user running it.
i.e. C:\Users\<username>\Documents
If the PI Data Archive Server is on a virtual machine (VM), run the utility on the VM. If you generate the
MSF on the wrong computer (on your laptop, for example) then the license activation file will match the
14 | P a g e
PI System Administration: Basics
laptop computer. If you install PI Data Archive Server on a different computer or VM, the server will not
run as expected. The license file must be present during the installation. It can be on a flash drive, CD, or
any media that can be read by PI Data Archive Server during installation. The setup program copies the
license file to the %PISERVER%\dat directory during installation; the original file will no longer be used.
For more information, see the PI Data Archive Installation and Upgrade documentation here.
15 | P a g e
3. PI Server Installation
16 | P a g e
PI System Administration: Basics
6. Click Next
7. Click Next on the SQL Server Connection page without making any changes
8. Click Select under the HTTPS section
9. Click OK
10. Click Next
11. Change the PI AF Application Service to run under PISCHOOL\SVC-PIAF$
12. Change the PI Analysis Service to run under PISCHOOL\SVC-PIANALYT$
13. Change the PI SQL DAS to run under PISCHOOL\SVC-PIRTQP$
14. Click Next
15. Click Install, and wait until it finishes.
D:
cd %piserver%\adm
pibackup E:\PIBackup -install
17 | P a g e
In this lesson we assume you will exclusively use the modern method to authenticate
services and users that connect to the PI Data Archive; PI Mappings. We switch off PI Trusts
completely as they're not being used by our system. If your organisation still uses legacy PI
Trusts for authentication, we recommend reading the documentation for configuring PI
Interface connections using PI Trusts to fully understand how these work. Even if your
organisation has existing trusts, we do not recommend creating any new trusts for new
interfaces or services in your system.
Below is a step-by-step walkthrough on changes that are made to our virtual environment
during this lesson:
Part 1: Create a Mapping for your administrator user
1. Connect to PISRV01
2. Through the Start menu, open PI System Management Tools
3. Navigate to Security → Mappings and Trusts
4. Click New Mapping in the top left corner
5. Enter the following
o Windows Account: PISCHOOL\student01
o PI Identity: piadmins
6. Click Create
7. Close and reopen PI System Management Tools
8. Navigate back to Security → Mappings and Trusts
9. Ensure the account name in the bottom left hand corner says
"PISCHOOL\student01 | piadmins, PIWorld". If it still says piadmin (without the s
on the end) go back and begin these steps again.
Part 2: Create an Identity and Mapping for the Analysis Service
1. Navigate to Security → Identities, Users and Groups inside PI System
Administration Tools on PISRV01
2. Click the New Identity button in the top left of the window
3. Type the name SVC-PIANALYT
4. Click Create
5. Navigate to Security → Database Security
6. Double click on PIPOINT
7. Click Add
8. Select SVC-PIANALYT
9. Click Add
10. Check the box next to Write
11. Click OK
18 | P a g e
PI System Administration: Basics
19 | P a g e
3.4.1 Exercise - Create a Mapping
Follow the steps below to create the mapping for our RTQP Engine service:
1. Connect to PISRV01
2. Open PI System Management Tools (SMT)
3. Use PI SMT to create an identity for the service, and a mapping for the account to the
new identity. During installation of the AF Server we specified PISCHOOL\SVC-PIRTQP as
the account to run the RTQP Engine Service.
20 | P a g e
PI System Administration: Basics
4. PI Interface Installation
4.1.1 PI Interfaces
OSIsoft has over 450 different interfaces in it's library of software, and their reliability and
resiliency has made them an industry standard for decades. They do not automatically
synchronise data streams or asset hierarchies from a data source to a PI System. Configuration
and maintenance must be manually done by the administrator for the most part.
We will focus on interfaces in this class because:
• They are by far the most common method of connecting a PI System to a data source that
you will find in the wild
• They require far more maintenance and setup by PI System Administrators than other
connection technologies - if you are a PI System Administrator in the early 2020s in almost
any organisation that uses the PI System, you must be familiar with interface configuration
and maintenance
So even though they are the oldest technology we list on this page - and we recommend using
any of the more modern methods below where possible, we'll still focus on Interfaces in this
course.
21 | P a g e
4.1.2 PI Connectors
PI Connectors follow a much more modern design and architecture, and require considerably
less maintenance and management than interfaces. Their features most notably include
automatic point creation - normally a very time consuming task for PI System Administrators
that manage interfaces. If you can find a PI Connector that supports your data source using the
aforementioned interface list search, you should use it over an equivalent interface in almost
every case. The technologies may not completely overlap and you may need to reconsider your
architecture, but it will be a worthwhile exercise.
For example, you'd like to read from a data source that supports several different OPC
standards. The source is capable of being both an OPC UA and OPC DA server. Is this case you
would most likely be much better off using the PI Connector for OPC UA over the PI Interface
for OPC DA. Before making a choice between connection technologies, thoroughly read the
documentation for each.
4.1.3 PI Adapters
PI Adapters are a newer technology, designed for fast deployment on low-power equipment.
They are not managed through user interaction, but through programmatic service calls.
Configuring PI Adapters are beyond the scope of this course, but if you have a scenario where
there is highly distributed equipment and must extract that data using low-power consuming
devices that must be managed in bulk, you may want to look into PI Adapters. You can find out
more on PI Live Library under the "Edge" subheading.
Many organizations develop their own applications to both read from and write to the PI
System using technologies such as PI AF SDK, PI Web API, or OMF. The use of these
22 | P a g e
PI System Administration: Basics
technologies is beyond the scope of this course, but as a PI System Administrator, you should
know that programmatically accessing or writing to the Data Archive and Asset Framework
components is always an option if you can't find an out-of-the-box method of integrating
systems together.
23 | P a g e
4.3 Knowledge Check: Confirming Connectivity
This step should have been done during prerequisites, but it's usually a good idea to make sure
the interface machine can connect to the correct port on the Data Archive machine before even
getting started installing. This way, if the port is blocked you can contact your IT department
and make sure the issue is resolved before you need to configure the system.
This command will attempt to initiate a TCP connection on port 5450 to PISRV01, our Data
Archive. If successful, it means that we should be able to proceed with our configuration of our
interface. If the command gives an error, it means you need to talk to your IT department about
allowing a connection from your interface machine through to your PI Data Archive on port
5450.
24 | P a g e
PI System Administration: Basics
25 | P a g e
9. Click Exit new installation wizard
Part 4: Configure Service Accounts
1. On PIINT01, open Computer Management with the shortcut in the taskbar
2. Navigate to System Tools → Local Users and Groups → Groups
3. Double Click on PI Buffering Administrators
4. Click Add
5. search for the account svc-piint and click Check Names, then OK
6. Click OK
7. Open the Windows Services applet with the shortcut in the taskbar
8. On the PI Buffer Subsystem service right click → Properties
9. Go to the Log On tab
10. Change it to run under This account and fill in PISCHOOL\SVC-PIINT$ as the name,
and leave the passwords blank
11. Click OK, and OK again until you are brought back to the services console
12. Repeat steps 8 through 11 for the PI-opcint_ReadOnly1 service, making it also run
under the PISCHOOL\SVC-PIINT$ account
13. Right click and restart the PI Buffer Subsystem service
14. Close all ICU and Buffer Manager windows
Part 5: Configure Dependencies and Start the Interface Instance
1. On PIINT01, open the ICU
2. Select opcint_ReadOnly1 -> PISRV01 from the large drop down select box at the top
of the window
3. Click the Service menu in the side-bar down the left hand side
4. Click Yes
5. Click the play ► button at the top of the window to start the interface
We have configured an interface, configured buffering for it, and confirmed that everything is
working. But, there's another opportunity to configure buffering in our system.
The PI Analysis service, which we installed on PISRV02, also writes data to the PI Data Archive.
The Analysis service is in charge of watching the Asset Framework server for calculations and
analytics it should run, running the analytics, and writing the results to PI Points. Actual
configuration of these calculations is done in other training classes and we won't configure
them here, but it's our responsibility to make sure things work reliably once analytics start
26 | P a g e
PI System Administration: Basics
running. Because the analysis service needs to write to PI Points, it also benefits from buffering
being configured. Follow the below steps to configure buffering for this service.
Note: When performing most actions in this course in a production environment, you should
not be logging directly into the server machines. This activity is on exception, however. You
must configure buffering while being logged in to the machine itself.
1. Connect to PISRV02
2. The Interface Configuration Utility isn't installed on this machine - but that's ok. We can
access the buffer manager from PI System Explorer (PSE) too. Open PSE by clicking Start
> PI System > PI System Explorer.
3. Select Tools > Buffering Manager
4. Click Yes to the question asking if you'd like to configure buffering
5. Click Continue with Configuration
6. Change the Buffer location to D:\Buffer
7. Click Next
8. Exit the Wizard
Now we've configured buffering, we need to make sure it connects to the PI Data
Archive using an account that can write to analysis points. In an earlier exercise, we
configured the SVC-PIANALYT group managed service account to have these privileges.
9. Open the Windows Services panel by clicking on the icon for it in the taskbar
10. Modify the PI Buffer Subsystem service so it logs in as the PISCHOOL\SVC-PIANALYT
account (hint: this account is a group-managed service account so you may need to do
special things with dollar signs and passwords. If you don't know what to do, the
configuration is very similar to the configuration we did in the interface buffering video,
but with a different account this time).
11. Create a service dependency for PI Analysis Service on PI Buffer Subsystem to ensure
that PI Buffer Subsystem starts first on machine start. To do this, run Windows
command prompt with the icon in the taskbar and execute the following command:
12. Open Computer Management from the Windows Start menu. Navigate to System Tools
→ Local Users and Groups → Groups
13. Double click on the PI Buffering Administrators group, and add the SVC-PIANALYT
account to the group
14. Use the Windows Services panel to restart the PI Buffer Subsystem service. It should
warn you that it will restart the PI Analysis service as well.
15. Close and reopen Buffering Manager. The status indicator should be green if you have
configured buffering correctly.
27 | P a g e
5. PI Point Management
28 | P a g e
PI System Administration: Basics
o Security
▪ Data Security → Add... → SVC-PIINT → Check both the Read and
Write boxes
5. Click Save in the top left
6. Wait for at least 2 minutes
Part 2: Confirm the new tag is receiving new data
1. On PISRV01 inside SMT, navigate to Data → Current Values
2. Click the Tag Search in the top left corner
3. Enter a Point Source of opc
4. Click Search
5. Click Select All
6. Click OK
7. Click the play ► button at the top of the window to start updating values
8. Ensure your tag's value changes every few seconds
This is a background chapter with video content only. It is recommend that you
watch the video for this chapter: https://youtu.be/Yleu86Y3SH4.
Video
This is a background chapter with video content only. It is recommend that you
watch the video for this chapter: https://youtu.be/6-scv3oQ7Kk.
Video
Exception and Compression for points is controlled on a point-by-point basis. The Excdev,
Excmax, Compdev and Compmax explained in the video are in the "archive" tab on Point
Builder in PI System Management Tools. Go ahead and look at the settings on the points you
already have set up.
For more details on how Exception and Compression works, see the full details video.
29 | P a g e
More" button below to see the whole list). In this class we're using the PI Interface for OPC DA,
who's documentation can be found here.
As a PI System Administrator, you'll become very familiar with the documentation for the
interfaces your organisation uses. The most common places you'll refer to are the sections for
PI Point Configuration. We recommend reading through some of this section now and growing
accustomed to it, now you know the basics of creating points in the PI Data Archive. Every
interface has a similar section, and most interfaces have different requirements when it comes
to point configuration - you'll need to read this section of the documentation each time you're
configuring a new interface type.
When creating a PI Point, you must specify a Point Type. So far we've only used the default float32 point
type, which allows a point to store single-precision floating-point numbers. The PI Data Archive also
allows you to store a few other types of data, most notably digital data.
PI Points of type Digital are used to store data values that have discrete states exemplified above.
Example of typical states are Open/Closed for a valve or On/Off for a switch. While the user is interested
in the actual state, PI Data Archive stores this information as an integer. This integer is then associated
with a Digital State Set; a grouping of these states. Whenever the value is requested, PI Data Archive
30 | P a g e
PI System Administration: Basics
retrieves the integer value, does a lookup in the Digital State Set, and then presents the associated text
value.
Digital Sets are kept in a common table for all points of type Digital to access. The Digital State Set must
exist prior to the creation of the digital point. When defining a point use the DigitalSet attribute to store
the associated Digital Set name. The digital states are case preserving, but not case sensitive, so you can
refer to them with upper and lower case, but any display will show the configured upper or lower case.
There is a large default set called System that contains system error messages and other information. All
points, including non-digital points, can receive and archive a state from the System digital states set
(Shutdown, PtCreated, Over Range, Under Range, I/O Timeout, etc.).
One of the tags on our OPC Server is a digital tag. It has an itemID of Sample Process/Pump1/Status.
The tag sends through integers 0 through 4, and you've asked the operations team what these numbers
correspond with. You'd like your users to see the name of the state rather than just the number when
they're looking at the tag's value in the system.
Off 0
Startup 1
Running 2
Warning 3
Error 5
We'd like to create a point to archive this controller’s mode of operation. However, in order to build the
point, you will first need a digital state set.
1. On PISRV01 open the PI SMT and navigate to Points → Digital States plug-in.
4. Save it and restart PI SMT. We need to do this for the Point Builder to pick up the new state set.
o General Tab: Name: pump1.status; Description: Status of Pump 1; Point Source: OPC;
Point Type: Digital; Digital Set: PumpStatus
31 | P a g e
o Classic Tab: Location 1: 1; Location 3: 1; Location 4: 1; Instrument Tag: Sample
Process/Pump1/Status
o Security Tab: Add the SVC-PIINT identity to Data Security, and give it Read/Write
permission
8. Wait for the PI Interface to start collecting data for the new point.
5.6.1 Part 1: Check that you are receiving data for all points belonging to the interface
in the PI Data Archive
You should now have a working interface. This exercise will guide you through some checks to
confirm its operation.
Part 1: Check that you are receiving data for all points belonging to the interface in the PI Data
Archive
1. Connect to PISRV01
2. Open PI System Management Tools (SMT)
3. Navigate to Data > Current Values
4. Search for all points that share a point source with your interface, and add them to the
list of tags in the Current Values plugin
5. Ensure all points have recent timestamps (note that the virtual environment is in UTC,
and may have a different timezone to your own), and click the Start Updating button.
You should see new values come through every now and again.
Note: It is possible for an interface to be sending data to the PI Data archive without it travelling
through the buffer - but this is not what we want. Follow these steps to ensure that your data is
being properly buffered by the PI Buffer Subsystem before being sent on to the PI Data Archive
1. Connect to PIINT01
2. Open the PI Interface Configuration Utility (ICU)
3. Navigate to Tools > Buffering
32 | P a g e
PI System Administration: Basics
4. Ensure that the X total events sent is greater than zero, and you are getting a non-zero
number of events per second. The number of total events sent should be increasing
over time.
5. Ensure that the X events in queue settles at around zero events. Every now and again it
may increase to a number greater than zero, then settle down again. You can use these
numbers to diagnose issues. If the X events in queue number is going up, it means that
the buffer is having trouble connecting to the PI Data Archive or does not have
adequate bandwidth to send all the data it needs to. If the X total events sent number
is not increasing, it means that the interfaces on this machine are not generating and/or
sending data through - this is most likely a problem with the interface configuration and
the interface message log should point you in the right direction.
33 | P a g e
7. Click OK
8. If you receive any errors about digital state sets, see the previous lesson Creating
Digital Points.
(In the video we specifically say NOT to use create and edit mode. This is specifically aimed
at those modifying production systems. In this case, because we're applying a solution, it
doesn't matter much and we do want to overwrite all current configuration)
1. Connect to PISRV01
2. Open PI System Management Tools{ (SMT) and navigate to Operation > Message Log
3. Click the Retrieve Messages button in the top left. It is shaped like a magnifying glass. If
no messages are returned, you may need to modify the "End:" entry and search for
messages over a larger time range.
4. Scroll through the log, and modify the start and end times where needed. Try to find
messages similar to the following:
[Server] PISRV01 [ID] 7082 [Time] 10/16/2020 2:59:19 AM [Program] pinetmgr [Priority] 10
[ProcessOSUser] pinetmgr [ProcessID] 3252 [Severity] Debug
Successful login ID: 16. Address: . Name: SMTHost.exe. Identity List: piadmins | PIWorld. Environment
Username : PISCHOOL\student01. Method: Windows Login (SSPI,NTLM,HMAC-MD5,RSADSI RC4,128)
This message indicates that a successful connection was made from SMThost.exe (the
name for the PI System Management Tools application), by PISCHOOL\student01 (the
Windows account we are logged in with). This is the confirmation message that
appeared in the log just now when we opened up SMT and connected. Every connection
attempt is logged in the PI Server message log. This makes it an incredibly useful tool for
34 | P a g e
PI System Administration: Basics
troubleshooting security problems. In the next few steps, we're going to create own
security problem and see what the log files look like throughout.
This error indicates that the buffer attempted to connect to the Data Archive, but it was
not allowed in. A good rule of thumb is that if you see any error in a log with an error
code in the form 104XX - you should check your mappings and trusts, and make sure
that the account has the required privileges.
10. On PISRV01, in SMT, navigate back to the Message Logs and click Retrieve Messages.
Try to find some messages like the following:
[Server] PISRV01 [ID] 7138 [Time] 10/16/2020 3:20:22 AM [Program] pinetmgr [Priority] 10
[ProcessOSUser] pinetmgr [ProcessID] 3252 [Severity] Information
Unsuccessful login ID: 28. Address: 192.168.0.22. Name: pibufss(5348):remote. Credentials used:
PISCHOOL\SVC-PIINT$. Method: Windows Login (SSPI,Kerberos,HMAC-SHA1-96,Kerberos AES256-CTS-
HMAC-SHA1-96,256). Error: [-10433] No identity mapping for this request
[Server] PISRV01 [ID] 7138 [Time] 10/16/2020 3:20:22 AM [Program] pinetmgr [Priority] 10
[ProcessOSUser] pinetmgr [ProcessID] 3252 [Severity] Information
Unsuccessful login ID: 28. Address: 192.168.0.22. Name: pibufss(5348):remote. Credentials used:
PISCHOOL\SVC-PIINT$. Method: Trust. Error: [-10431] Authentication method is disabled by current
server policy
These messages indicate that the buffer attempted to authenticate to the data archive
using a Mapping, then a legacy Trust. Both have failed.
11. On PISRV01, in SMT, navigate back to Mappings & Trusts and re-enable your mapping.
Before clicking OK, change its PI Identity to piusers. This will make your interface be
given the piusers identity instead of the SVC-PIINT identity.
35 | P a g e
12. On PIINT01, restart the PI Buffer Subsystem service
13. Check your scrolling log. You should see a lot of errors similar to the following:
This error indicates that the buffer service cannot write to this point because it doesn't
have permission to. By default the piusers identity doesn't have write access to tags,
only read access. Note the 10401 error code. If we got this error in a production system,
we'd go straight for the security tabs to check configuration to try to clear this error.
14. Check your PI Server message log again, and click Retrieve messages. You should see
this message:
[Server] PISRV01 [ID] 7082 [Time] 10/16/2020 3:28:54 AM [Program] pinetmgr [Priority] 10
[ProcessOSUser] pinetmgr [ProcessID] 3252 [Severity] Debug
Successful login ID: 34. Address: 192.168.0.22. Name: pibufss(944):remote. Identity List: piusers |
PIWorld. Environment Username : PISCHOOL\SVC-PIINT$. Method: Windows Login (SSPI,Kerberos,HMAC-
SHA1-96,Kerberos AES256-CTS-HMAC-SHA1-96,256)
Our buffer subsystem has connected with the identity "piusers". When troubleshooting,
we use both the logs on the Interface, and on the PI Data Archive to identify the
problem here. We see that the interface is connecting as the identity "piusers", and it is
36 | P a g e
PI System Administration: Basics
having trouble writing to the interface's points. We can conclude that the "piusers"
identity doesn't have permission to write to the points.
15. On PISRV01, in SMT, navigate back to Mappings & Trusts and change the mapping's PI
Identity back to SVC-PIINT.
16. On PIINT01, restart the PI Buffer Subsystem service.
17. Check message logs on both the interface and the Data Archive. All errors should now
be cleared.
When going through the rest of this class, we recommend coming back to the PI Data Archive
message log and taking a look at the messages every now and then. When newly installed and
configured services connect, and when troubleshooting any issues you face, you'll find a wealth
of information in this log.
1. Connect to PISRV01
2. Open the Exercises folder on the desktop, and navigate to the spreadsheet called
"currenttags.csv".
3. Edit the file in Microsoft Excel so PI Builder can export the tags to the PI Data
Archive, then export them.
4. Use the Current Values plugin in PI SMT to ensure you're seeing new data come in
to the PI Data Archive for your new tags for pump current.
A solution spreadsheet can be found inside the Exercises folder on your virtual environment.
To skip this exercise and simply apply the solution, do the following:
1. Connect to PISRV01
2. Open C:\Class Documents\Exercise Files\Solution\Bulk Point Creation
Solution.xlsx
3. Select the PI Builder ribbon
4. Ensure the Data Server in the top left is PISRV01
5. Click the Publish button
6. Select Create
37 | P a g e
7. Click OK
38 | P a g e
PI System Administration: Basics
We'll need our PIINT02 configured in exactly the same way as our PIINT01. Follow the steps
below. You may need to refer to earlier lessons in this course if you don't remember the exact
steps. The "PI Interface Configuration" lesson earlier in the course covers steps 2 through 4 of
this exercise.
1. To save time, the PI Interface for OPC DA, the Interface Configuration Utility (ICU) and the PI API
for Windows Integrated Security are already installed on PIINT02 - there's no need to run the
installers, and no need to juggle while you wait for the install to complete. Open the ICU and
move to the next step.
2. Configure an OPC Interface Instance on PIINT02, using the same settings as on PIINT01. Do not
start the interface yet.
3. Configure Buffering on PIINT02.
4. Configure the interface instance and the PI Buffer Subsystem to run under the SVC-PIINT
account, and give the account appropriate permissions to run the buffer.
5. Connect to PIINT01 and turn off the interface with the stop button on the ICU.
6. Start the new interface instance on PIINT02. Ensure you are getting updated data by viewing the
interface's points in PI System Management Tools.
Once you have data flowing, you're ready for the next lesson.
39 | P a g e
6.3 Hands-On: Configure UNIINT Failover
This is a hands-on chapter. It is recommend that you watch the video for this
chapter and follow the steps using your own virtual environment:
https://youtu.be/hranir0BEM4. Below are the configuration steps performed in
Video the video.
Below is a step-by-step walkthrough on changes that are made to our virtual environment
during this lesson:
1. Connect to PIINT02
2. Open Windows File Explorer using the shortcut on the taskbar
3. Navigate to D:
4. Right click in the white space and create a new folder called Interface Failover
5. On your new folder, Right click → Properties
6. Select the Sharing tab
7. Click Advanced Sharing
8. Check Share this folder
9. Click the Permissions button
10. Click the Add... button
11. Click the Object Types button
12. Check Service Accounts
13. Click OK
14. Enter the object name SVC-PIINT$ and click Check Names
15. Click OK
16. Check the Full Control → Allow checkbox
17. Click OK
40 | P a g e
PI System Administration: Basics
41 | P a g e
2. Select the interface instance opcint_ReadOnly1 -> PISRV01 from the Interface drop-
down select box
3. Select the UniInt → Failover menu on the left side of the window
4. Check the Enable UniInt Failover checkbox
5. Enter the following numbers: [NOTE: THESE ARE OPPOSITE TO THE NUMBERS IN
PART 2]
o Failover ID# for this instance: 1
o Failover ID# of the other instance: 2
6. Click the Browse button next to Failover ID# of the other instance
7. Select PIINT02 → opcint_ReadOnly1
8. Click OK
9. Under UFO Type: select HOT
10. Right click on one of the tags in the table below and click Create UFO_State Digital
Set on Server PISRV01
11. Click OK
12. Right click on one of the tags in the table below and click Create all points (UFO
Phase 2)
13. Under Synchronization File Path: click the Browse button
14. In the address bar, enter \\PIINT02\Interface Failover [NOTE: THIS IS THE SAME
LOCATION AS THAT CONFIGURED IN PART 2]
15. Click Open
16. Click Apply in the bottom right
17. Click OK
18. Restart the interface with the restart button at the top of the window
42 | P a g e
PI System Administration: Basics
UniInt Health Points are PI Points that collect information about the health of the interface.
They are created from the PI ICU, in the UniInt > Health Points section:
OSIsoft recommends that, at minimum, the following UniInt Health Points be created:
1. Heartbeat: This PI Point indicates whether or not the interface is running. The
heartbeat point is updated continuously unless the interface is shut down or in a
deadlock situation. As long as the interface is running, the value of the point cycles
incrementally from 1 to 15. The heartbeat point does not indicate whether the
interface is connected to or collecting data from a data source.
2. Device Status: This PI Point contains information about communication between
the interface and the data source. During normal operation, it contains the value
GOOD, indicating that the interface is communicating properly with the data source.
Otherwise, the point contains a string indicating status, formatted as follows:
43 | P a g e
Status code | Description | Interface-specific text.
Example:
95 | Device(s) in error
This device status means that the PI Interface cannot communicate with the data
source.
3. IO Rate: This PI Point keeps a count of all point values (inputs, outputs, triggered
inputs) being sent to the Data Archive. If the value stops updating, the interface has
stopped collecting data.
4. Scan Class Scans Skipped: This PI Point counts, for a specific scan class, “skipped
scans”, i.e the number of scans that were not performed before the scan time
elapsed and the next scheduled scan was executed, for a defined reporting period (8
hours by default)
6.4.2 Exercise - Create UniInt health points for both of your Interface instances
44 | P a g e
PI System Administration: Basics
45 | P a g e
6. Click the New... button in the top left of the window
7. Enter Windows Account: PISCHOOL\PI Users
8. Enter PI Identity: PI Users
9. Click Create
Part 4: Configure security for PI Point and Analysis Creators
1. On PISRV01, open SMT and navigate to Security → Identities, Users & Groups
2. Click the New... button in the top left of the window
3. Enter the Name: PI Point and Analysis Creators
4. Click Create
5. Navigate to Security → Mappings & Trusts
6. Click the New... button in the top left of the window
7. Enter Windows Account: PISCHOOL\PI Point and Analysis Creators
8. Enter PI Identity: PI Point and Analysis Creators
9. Navigate to Security → Database Security
10. Double click on PIPOINT
11. Click Add...
12. Select PI Point and Analysis Creators
13. Click Add
14. Click OK
15. Check the Write checkbox
16. Click OK
Part 5: Clean up unneeded identities
1. On PISRV01, open SMT and navigate to Security → Identities, Users & Groups
2. Right click → delete the following identities:
o PIEngineers
o PIOperators
o PISupervisors
This is a background chapter with video content only. It is recommend that you
watch the video for this chapter: https://youtu.be/VWrxS48PpjY.
Video
46 | P a g e
PI System Administration: Basics
This video provides some background if you are not familiar with Asset Framework. The next
lesson will go into how data flow works between Asset Framework and Data Archive, and
security on Asset Framework objects.
1. Connect to PISRV01
2. From the Windows Start Menu, open PI System Explorer
At this point, depending on what configuration you've done so far, you may be asked "There
are no PI AF Servers defined. Do you want to define one?" If you are, click Yes, then enter
PISRV02 as the host, and click OK.
If you get an error popup saying "Could not connect to net.tcp://pisrv01:5457...", this
indicates that your PISRV01 thinks that it has an AF server installed on it - which it doesn't.
To fix this and instead point at the AF server installed on PISRV02, click OK, wait for the
connection to time out, then click Select. Click the ... ellipsis next to the PISRV01 dropdown
menu, right click on PISRV01, select Properties, rename the Host to PISRV02, and click OK,
then OK, then Connect.
3. Click the Database button in the top left of the window
4. Right click on Database1 and rename it to Production (or if you don't have
Database1, click New Database and create a new one called Production)
5. Click the New Database button in the top left of the window
6. Name the new database Development
7. Click OK
47 | P a g e
7.3.2 Part 2: Configure security for PI Administrators
1. Connect to PISRV01, open PI System Explorer, and click the Database button in the
top left of the window
2. Click the small Show Properties button next to the greyed out Connect button
3. Select the Mappings tab
4. In the white space below the list of mappings Right Click → New Mapping
5. Type Account: PISCHOOL\PI Administrators
6. Select Identity: Administrators
7. Click OK
8. On the BUILTIN\Administrators mapping Right Click → Delete
9. Click OK
1. Ensure you have the Mappings tab open in the PI AF Server Properties window
2. In the white space below the list of mappings Right Click → New Mapping
3. Type Account: PISCHOOL\PI Users
4. Select Identity: World
5. Click OK
6. On the Everyone mapping Right Click → Delete
7. Click OK
1. Ensure you have the Identities tab open in the PI AF Server Properties window
2. In the white space below the list of identities Right Click → New Identity
3. Type Name: Power Users
4. Click the Mappings tab
5. Click Add...
6. Type Account: PISCHOOL\PI Power Users
7. Click OK
8. Click OK to leave the PI AF Server Properties window completely and return to the
Select Database window
9. On the Development database, Right Click → Security
10. Click Add...
11. Select Power Users
48 | P a g e
PI System Administration: Basics
12. Click OK
13. Click OK to return to the Select Database window
• Create an identity for PI Contractors on both the Data Archive using System
Management Tools (SMT), and Contractors on the Asset Framework server using PI
System Explorer (PSE). For a step-by-step on how to do this, see the respective
lessons on Data Archive security and Asset Framework security.
• Create a mapping to the new identity for the group PI Contractors on both the Data
Archive and Asset Framework.
• On the Asset Framework Server, there is one extra configuration step that needs to
be completed to allow the contractors to connect to the server at the top level. Just
because a user has permission to see a database, it doesn't mean they're allowed to
connect to the server itself. The Contractors are not members of the PI Users active
directory group and will not be allowed in under the World identity we set up in the
previous lesson. Unlike the PI Data Archive, the World identity isn't given to all
authenticated connections automatically.
1. Connect to PISRV01, open PI System Explorer, and click the Database
button in the top left of the window
2. Click the Edit Security button at the top of the Select Database window.
This allows you to edit permissions to the server at the top level.
3. Click Add...
4. Select Contractors
5. Uncheck all Allow boxes except for Read and Read Data. This will modify all
permissions on the server, allowing contractors to connect and see all
objects. This is fine for now, don't worry - we're going to lock it down in the
next part of this exercise.
6. Click OK
49 | P a g e
7.4.2 Part 2: Satisfying a new management request
Management at our company has decided that the Status points for our pumps contain
confidential business information, It is important that our contractors cannot see these
points. In a previous exercise, we named these points with the convention PumpX.Status,
where X is the number of the pump.
• Configure the security on the Status tags so that the contractors cannot read their
data, or even see that they exist.
You've been asked to prepare a new database on Asset Framework, hosting data for Remote
Assets. The contractors have been hired to manage these assets, but as they are not
employees they are not permitted to see the Production or Development databases.
• Use PSE to create an additional database called Remote Assets, and allow your
contractors to view it, but not write to it.
• Configure the security for each of your other databases to block access to your
contractors completely.
1. Open extra copies of SMT and PSE as a contractor to check their access. To open
them as a contractor, follow these steps:
1. Right click on the application on your windows Taskbar
2. Hold the Shift key and right click on the name of the application
3. Select Run as different user
4. We'll run these applications as student04, who is in the domain group "PI
Contractors". For the credentials, enter:
▪ User: PISCHOOL\student04
▪ Password: *enter the password that was emailed to you after you
originally created your virtual machines
5. Test searching for any status tag using SMT, or opening any database apart
from the Contractor database in PSE
6. Test again using PISCHOOL\student02, who is a member of the PI Users
group. You should be able to connect to both the Data Archive and AF
Servers, but not make any changes.
50 | P a g e
PI System Administration: Basics
8. Managing Data
This is a background chapter with video content only. It is recommend that you
watch the video for this chapter: https://youtu.be/zBN5m5JM2Es.
Video
This video was originally published in the playlist "Manage Archive Files & Check Archiving
Health". You can find the full playlist here.
One of them is your new primary archive. If data is written to the Data Archive server with a
timestamp within the old archive's time range, it is written to the old one. If data comes in
within the new time range, it is written to the new one.
A small warning - the action we performed - Force shift - isn't something you need to do
often. In fact, you should never perform a Force Shift if you suspect something is wrong
with your system. It hardly ever fixes any issues, and almost always causes more problems if
your system is already in trouble.
Before the PI Data Archive to write to an archive file, it must be registered. Windows won't
let us move an archive file while it's registered - if you try you'll get an error saying "This
51 | P a g e
action can't be completed because the file is open in PI Archive Subsystem". Let's say we'd
like to move an archive file from one drive to another. We'd need to unregister the archive,
move it with Windows File Manager, then register it again. This will only work if the PI
Archive Subsystem is allowed to access the folder we move it into.
It is common to have two (or more) devices or drives hosting your archive files. You may
want your recent archives on high performance storage, and your older archives on low
performance storage as they are accessed much less frequently. We'll set up an alternate
location to store archive files, then move an old archive into the folder. The new location
we'd like to host our older archives will be D:\PI\Archives. Usually this would be a
completely separate drive, one that doesn't have any other software installed on it - but
we're starting to run out of drives to use in our learning environment.
Part 1: Prepare the new archive folder
Before an archive can be registered, the PI Archive Subsystem service must have full control
permissions over that file location.
1. Open Windows File Explorer, and navigate to a new folder at the path D:\PI
2. Create a new folder called Archives
3. On your new Archives folder, Right Click → Properties
4. Go to the Security tab
5. Click Edit...
6. Click Add...
7. Click Locations...
8. Select PISRV01
9. Click OK
10. Enter the account name NT Service\piarchss
11. Click OK
12. Check the Full Control checkbox for Allow
13. Click OK
14. Click OK
Part 2: Move an old archive into the folder
1. Connect to PISRV01 and open PI System Management Tools (SMT)
2. Navigate to Operation → Archives
3. Take a note of the name of your old archive (the archive that does not have
"Current Time" as its End Time). You're going to move this file in a few steps, so try
to remember the last few numbers in its name. Once you think you can tell your two
archives apart, Right Click → Unregister Archive
52 | P a g e
PI System Administration: Basics
4. Click Yes
5. Open Windows File Explorer
6. Navigate to E:\PI\arc
7. Select both the archive .arc file you unregistered, and its corresponding .arc.ann file.
The .ann file is an annotation file, and contains annotations to data contained in the
archive. whenever you move an archive file, you should always move both the
archive, and its annotations.
8. Move both files to the new D:\PI\Archives folder
9. Go back to SMT, and in the white space below your list of archives Right Click →
Register archive
10. Select the archive you moved to the D:\PI\Archives folder
11. Click Open
12. Your archive should appear back in the registry list, with the new path listed under
the Archive File column
If you're looking into automating this job, all of the above steps can be scripted with the
command line tool piartool. You can read about piartool here.
53 | P a g e
9. Final Exam
The final exam for this course is taken online. Please check the course listing online for more details.
54 | P a g e