Professional Documents
Culture Documents
ABB may have one or more patents or pending patent applications protecting the intellectual property in the
ABB products described in this document.
The information in this document is subject to change without notice and should not be construed as a com-
mitment by ABB. ABB assumes no responsibility for any errors that may appear in this document.
Products described or referenced in this document are designed to be connected and to communicate infor-
mation and data through network interfaces, which should be connected to a secure net-work. It is the sole
responsibility of the system/product owner to provide and continuously ensure a secure connection between
the product and the system network and/or any other networks that may be connected.
The system/product owners must establish and maintain appropriate measures, including, but not limited to,
the installation of firewalls, application of authentication measures, encryption of data, installation of antivirus
programs, and so on, to protect these products, the network, its system, and interfaces against security
breaches, unauthorized access, interference, intrusion, leakage, and/or theft of data or information.
ABB performs functionality testing on the products and updates that we release. However, system/product
owners are ultimately responsible for ensuring that any product updates or other major system updates (to
include but not limited to code changes, configuration file changes, third-party software updates or patches,
hardware change out, and so on) are compatible with the security measures implemented. The system/ prod-
uct owners must verify that the system and associated products function as expected in the environment in
which they are deployed.
In no event shall ABB be liable for direct, indirect, special, incidental or consequential damages of any nature or
kind arising from the use of this document, nor shall ABB be liable for incidental or consequential damages
arising from use of any software or hardware described in this document.
This document and parts thereof must not be reproduced or copied without written permission from ABB, and
the contents thereof must not be imparted to a third party nor used for any unauthorized purpose.
The software or hardware described in this document is furnished under a license and may be used, copied, or
disclosed only in accordance with the terms of such license. This product meets the requirements specified in
EMC Directive 2014/30/EU and in Low Voltage Directive 2014/35/EU.
TRADEMARKS
Symphony and Symphony Plus are registered or pending trademarks of ABB S.p.A.
All rights to copyrights, registered trademarks, and trademarks reside with their respective owners.
Revision: A
I N T R O D U CT I O N O VE R VI E W
Table of Contents
1 INTRODUCTION ........................................................................................................................... 2
1.1 Overview ............................................................................................................................ 2
1.2 Executive Summary .......................................................................................................... 3
1.3 Getting Access to 2.1 Service pack 1 ................................................................................ 3
1.4 License change.................................................................................................................. 3
1.5 Revision Record ................................................................................................................ 4
1.6 Compatibility.................................................................................................................... 4
1.7 Requirements ....................................................................................................................5
1.7.1 General thoughts on hardware requirements ................................................5
1.7.2 Summary Table .................................................................................................6
1.7.3 Software Requirements Details.......................................................................6
1.7.4 Hardware Serverless Configuration ................................................................ 7
1.7.5 Hardware Server based Configurations.......................................................... 7
1.7.6 Hardware clients .............................................................................................. 8
3 Virtualization.............................................................................................................................25
3.1 Number of Symphony Plus Servers to provide the required DCS
function ........................................................................................................................... 25
3.2 Redundancy architecture ............................................................................................... 27
3.3 Network connectivity .....................................................................................................28
3.4 Equipment Lifecycle .......................................................................................................28
3.5 Equipment Maintenance ................................................................................................ 29
3.6 Cybersecurity ................................................................................................................. 30
3.7 Virtual System Architectures – Matching Physical Machines Resources ................... 30
3.8 Virtual System Architectures – Resource Pooling Architecture ................................... 32
3.9 Summary and Conclusion...............................................................................................36
5 INSTALLATION ...........................................................................................................................61
5.1 Installation....................................................................................................................... 61
5.2 Upgrading ....................................................................................................................... 61
5.3 Backup and Restore ........................................................................................................ 61
8 VZ Z 0 0 12 8 8T 2 12 0 A 1
OVE RVI E W I NT RO DUC TI O N
1 INTRODUCTION
This document represents the release notes for S+ Operations 2.1 Service Pack 2. This docu-
ment provides a brief overview on functionality. It enumerates known problems encountered
in the final testing of this product release and identifies workarounds that help overcome
those problems. The document contains additional notes that may be valuable to customers
and service personnel working with the product.
1.1 Overview
Operator effectiveness is fundamental to a plant’s performance. However, with fewer plant
operators, a generational shift in the operator workforce, and increasing complexity of plant
operations, this is becoming ever more challenging, but not insurmountable. Symphony Plus,
with its intuitive, easy-to-use human machine interface (HMI), leads operators to greater
awareness, faster response and better decisions. S+ Operations is designed for high perfor-
mance in every aspect involved: human machine interface, integrated operations, seamless
life cycle management, information management, alarm management, security, process opti-
mization, and flexible, scalable fault tolerant design.
Integrated operations
S+ Operations seamlessly integrates all plant devices and systems.
2 8V ZZ 0 01 2 88T 2 12 0 A
I N T R O D U CT I O N E XE C UT I VE S U M M A R Y
Information management
S+ Operations transforms data into meaningful information and presents it in intuitive user
specific desktop displays.
Alarm management
S+ Operations superior integrated alarm management system includes the industry’s leading
EEMUA191 – compliant alarm management analysis system.
Security
S+ Operations provides users with a secure and reliable operations environment with its
built-in security features.
Process optimization
S+ Operations combined with OPTIMAX® Performance Package improves over all plant
productivity.
This release adds support for Windows 10 LTSC 2016 Operating System. It also includes reso-
lution to several known issues along with remaining bug fixes of S+ Operations 2.0.x line for
Harmony. Refer to Fixed issues section for more details.
This release supports various connectivity’s but does not include support for Melody, Con-
tronic E, CLIF function codes of Harmony, Procontrol 13 and Procontrol 14.
AC800M Connectivity is supported. This release also reintroduces the support for Freelance
Connectivity. All generic drivers of previous connectivity such as OPC, Modbus, IEC 104, IEC
61850 etc. are supported.
Applications such as the Shiftbook is reintroduced in this release, while the features GIS and
Takadu integration are not included.
This release also supports PRP Duo Driver for HMI Network redundancy. For details on Duo
Driver please refer the release note (1KHL506789).
This version can be used as an upgrade pack for existing versions of 2.x or 1.1 or as a full in-
stallation of S+ Operations where no pre-installation of previous versions of S+ Operations is
required. The full installation of 2.1 Service Pack 2 is delivered as an ISO image. Please take
into consideration that the image for download is large.
8 VZ Z 0 0 12 8 8T 2 12 0 A 3
RE VI SIO N RE CO RD I NT RO DUC TI O N
1.6 Compatibility
The compatibility related information with respect to S+ Operations software are as follows:
– This release is compatible with S+ Engineering 1.4 provided installed in different ma-
chines, and cannot be installed in the same machine
– This release is compatible with S+ Engineering 2.1 provided installed in same machine or
different machines.
4 8V Z Z 0 01 2 88T 2 12 0 A
I N T R O D U CT I O N RE Q UI RE M E NT S
1.7 Requirements
1.7.1 General thoughts on hardware requirements
The hardware requirements for S+ Operations are dependent on the following factors:
– Special applications
The table below provides a summary of hardware configurations that were found to produce
good performance during the testing of S+ Operations.
Note: It is not allowed to run any other non-Symphony Plus software packages on the below
mentioned configurations to ensure the stability, security and performance of the system.
History server:
For the History Server in large applications and in those demanding high historian perfor-
mance, it is required to use separate disks for programs, separate disks for the alarm/event
database and separate disks for real-time value database. In case a RAID is used this means 3
independent RAID 1 with at least 6 disks in total or a RAID 5 with at least 8 disks. For high
speed historians SSD disks shall be used. Further performance improvements can be archived
using separate RAID 10 for each of the databases.
8 VZ Z 0 0 12 8 8T 2 12 0 A 5
RE Q UI REM E NT S I NT RO DUC TI O N
CPU Small: Intel® Small: Intel® Intel® Xeon® Intel® I3 proces- Small: Intel®
Xeon® E3- Xeon® E3- Silver 4112, Xeon® Sil- sor Xeon® E3-
1270 v6, 1270 v6, 2.6GHz or ver 4112, 1270 v6,
3.8GHz 3.8GHz, In- Intel Xeon 2.6GHz or 3.8GHz, Intel®
Large: In- tel® Xeon® E3-1225 v5, Intel Xeon Xeon® Silver
tel® Xeon® Silver 4114 3.3Ghz E3-1225 v5, 4114 2.2GHz
Silver 4114 2.2GHz or In- 3.3Ghz or Intel®
2.2GHz or tel® Xeon® Xeon® Gold
Intel® Gold 5118, 5118, 2.3GHz
Xeon® Gold 2.3GHz
5118,
2.3GHz
6 8V Z Z 0 01 2 88T 2 12 0 A
I N T R O D U CT I O N RE Q UI RE M E NT S
– All referenced operating systems, Office, Internet Explorer and SQL Server should always
include the latest security patches and service packs as well as antivirus qualified by ABB.
Please refer to Field Alert document “2VAA001442 Security Updates Validation Status for
Symphony Plus” for the latest information on approved security patches and antivirus def-
initions. This document is accessible in ABB Solutions Bank for registered users with valid
Sentinel subscription.
Note: To prove that you are eligible to install SQL Server 2016 please make sure that you
received with your order the SQL license stickers. As a proof of legal license, you are sup-
posed to attach them to all client computers.
Workstations should have at least 4 real cores, be either a Xeon processor v5 or later with at
least 3.5 GHz. At least 8 GB RAM. Hard disks size as required for application size and history
length1.
Workstations should be using Xeon Silver processors with at least 2.6 GHz. At least 8-16 GB
RAM as required by number of tags. Hard disks as required for application size and history
length1.
Servers with Intel Xeon v6 or later with at least 2.3. At least 8 GB RAM. Hard disks as required
for application size and history length1.
Servers should be a Xeon Silver or Gold processor with at least 2.3 Ghz and 16 GB RAM. Hard
disks as required for application size1. In case of integrated history more hard disks are re-
quired. Please refer to section on historian below. But typically, such a server needs 1 system
disk and 2 separate physical (not just partitions) hard disks for historical data storage. In
case of RAID configuration disks are typically doubled.
1
See the section on Volume estimation of hard disks for History Server
8 VZ Z 0 0 12 8 8T 2 12 0 A 7
RE Q UI REM E NT S I NT RO DUC TI O N
Servers or workstations should be either a Xeon v6 processor with at least 2.4 Ghz or Xeon
Silver or Gold processors with at least 2.2 Ghz. For large Alarm/Event databases 16 GB RAM is
recommended. Hard disks as required for application size and history length 1.
For maximum performance systems should have separated disks for programs, separate
event history and separate real-time values (3 separate hard disks, not only partitions).
If a high volume of clients (office and PowerExplorer clients) or a high demand of history
functions is expected then the performance can be improved by:
Solid state disks usage: optimize on those with a high reliability and throughput (read/write).
In case a high number of alarms and events must be recorded (100k/day), it is recommended
that the event database is stored on SSD disks.
RAID usage:
RAID 1 (or RAID 10) can be applied by doubling the amount of hard disks (so min. 6 disks for
high performance historian server or RAID 10 then 12 disks). RAID 5 must use a high number
of disks to be effective in terms of performance and reliability (at least >8 disks).
The maximum possible signal-recording rate relates to the sum of all changes of all tags per
second. Typically, a power plant unit with 20k tags and well-defined dead bands (0.1%-0.5%
dead band and 0.5-1 seconds scan rate) uses about 50-200 GB/year disk space.
Event history:
As a calculation basis, S+ Operations Historian consumes approximately 1.2 GB of storage
space for every 1 million events. A typical power station with 10,000 alarm & events/ day con-
sumes about 4.4 GB of disk space per year.
Servers should be a Xeon E3 v6 with 3.6 GHz, or Xeon Silver or Gold processor with at least 2.3
GHz and 8-16 GB RAM. Processor, hard disk and memory type must be determined by applica-
tion size.
Workstations should have at least 4 real cores, be either a Xeon processor v5 or later with at
least 3.5 GHz. At least 8 GB RAM. Hard disks size as required for application size.
For high performance clients optimizing display call-up times please use processors with
high cycle speed such as Intel Core Intel Xeon E3-1225 v5, 3.3 GHz or Intel® Xeon® Gold 5122,
3.6GHz.
8 8V Z Z 0 01 2 88T 2 12 0 A
D ATA SH E E T S ER VE R LE SS A RC HI T E CT URE
2 DATA SHEET
AC800M 12 Controllers
AC800M 12 Controllers
2.3.2 AC800M
AC800M Connectivity is supported for 800xA System Version 6.0.3.2
2.3.3 Freelance
Freelance Connectivity is supported for Freelance 2016 SP1
8 VZ Z 0 0 12 8 8T 2 12 0 A 9
F E AT UR ES : SI Z E S DATA S HE E T
All facts below are as recommended, tested and rationalized during standard test proce-
dures. Exceeding requirements are sometime possible and shall be discussed with product
sales.
Architecture Recommended
and tested con-
figurations
Application 0 1 2
Server
Composite
Clusters 1 2 4
Hierarchical
Clusters 1 2 4
10 8V Z Z 0 01 2 88T 2 12 0 A
D ATA SH E E T FE AT UR ES : SI Z E S
Hardware
Database
8 VZ Z 0 0 12 8 8T 2 12 0 A 11
F E AT UR ES : SI Z E S DATA S HE E T
Alarm Handling
RT Calculations
12 8V Z Z 0 01 2 88T 2 12 0 A
D ATA SH E E T FE AT UR ES : SI Z E S
S+ Calculations
Operator Inter-
face
8 VZ Z 0 0 12 8 8T 2 12 0 A 13
F E AT UR ES : SI Z E S DATA S HE E T
Pocket Portal
Security
14 8V Z Z 0 01 2 88T 2 12 0 A
D ATA SH E E T FE AT UR ES : SI Z E S
Harmony Pro-
cess Events
Summaries
8 VZ Z 0 0 12 8 8T 2 12 0 A 15
F E AT UR ES : SI Z E S DATA S HE E T
OPC
OPC HDA
Server
16 8V Z Z 0 01 2 88T 2 12 0 A
D ATA SH E E T FE AT UR ES : SI Z E S
SQL Transmit-
ter
Printing
Communication
8 VZ Z 0 0 12 8 8T 2 12 0 A 17
F E AT UR ES : SI Z E S DATA S HE E T
Information
Management
18 8V Z Z 0 01 2 88T 2 12 0 A
D ATA SH E E T FE AT UR ES : D ETAI L S
Database
Alarm Com- Standard Format Win Tools (CF File), Excel (XLSX)
ments
Alarm Handling
8 VZ Z 0 0 12 8 8T 2 12 0 A 19
FE AT UR ES : D ETAI L S DATA S HE E T
Tones Types of Audible Tones Beep, Wave file (one shot or continu-
ous), Horn (via external activation).
20 8V Z Z 0 01 2 88T 2 12 0 A
D ATA SH E E T FE AT UR ES : D ETAI L S
Human Interface
Security
8 VZ Z 0 0 12 8 8T 2 12 0 A 21
FE AT UR ES : D ETAI L S DATA S HE E T
Process Events
Summaries
Online Hist.
22 8V Z Z 0 01 2 88T 2 12 0 A
D ATA SH E E T FE AT UR ES : D ETAI L S
SOE Sequence of Events Logging SQL DB, Standard Text File, Custom Ex-
cel Work-sheet
Ext. Interfaces
OPC OPC Interface OPC Server and OPC Client (DA 1.x, 2.0,
AE1.x, HDA 1.x)
Hardware
Host PC Custom
(Dell and HP suggested).
8 VZ Z 0 0 12 8 8T 2 12 0 A 23
FE AT UR ES : D ETAI L S DATA S HE E T
Communication
24 8V Z Z 0 01 2 88T 2 12 0 A
VI RT UA LIZ AT I O N N UM B E R O F S YM PH ON Y P LU S SE RVE R S T O P RO VI D E T HE R E Q UI R E D D CS F U NC TI O N
3 Virtualization
When planning to run S+ Operations in a virtual environment, the following sizing of servers
and network components that will provide the underlying foundation to run the application is
required.
– Redundancy architecture
– Network connectivity
– Equipment Lifecycle
– Equipment Maintenance
– Cybersecurity
This section provides information and guidelines for engineers designing a S+ Operations
system in a virtual environment. Due to the dynamic nature of virtualization, evolving tech-
niques for its deployment and the special requirements imposed by a Distributed Control
System that at its core has personnel and equipment safety embedded at the forefront, it is
highly recommended that ABB be engaged early on in any virtualization design.
The number of Symphony Plus servers is typically determined by the functionality required to
monitor and control the process. As such, typically the following servers are used:
– S+ Operations
– S+ Operations Historian
– At times, these functions may be combined into a single server, such as:
The benefits are obviously a reduction in the number of physical machine components, at the
expense of increasing its computing resources. Similarly, this also has an impact on the virtu-
alization architecture, which would run a reduced number of virtual machines, but each de-
fined with an increased set of resources.
When configuring and defining physical machines to run these functions, the capabilities and
limitations of the physical sub-systems in a server are taken into account. In a virtual environ-
ment, however, it is the performance of the virtual machine's resources which are used. To
properly account for such, it is advisable to list all the Symphony Plus servers and note their
8 VZ Z 0 0 12 8 8T 2 12 0 A 25
N UM BE R O F S YM P H ON Y P L US S E RVE R S TO P RO VI D E T HE R E Q UI R ED DC S F U NC TI O N VI RT UA LI Z ATI O N
functionality. This will account for the resources required by each of the Operating Systems,
plus the resources required by each of the Symphony Plus servers for their intended function.
Actions:
– Count number of Symphony Plus Servers
– From the appropriate Symphony Plus manual determine what resources are needed if
they are to be satisfied by a physical machine.
This refers to determining the degree to which the plant will require resources of the Sym-
phony Plus system. Although determining system sizing is beyond the scope of this manual,
some examples are shown below:
S+ Operations Server:
– Number of tags
Calculation Engine:
– Number of calculations
– Scanner Servers:
Operations Workstations:
– Number of monitors
From this plant characterization, a given set of physical resource requirements will be deter-
mined. These requirements are to be added to the requirements for each of the nodes deter-
mined in step one.
26 8V Z Z 0 01 2 88T 2 12 0 A
V I R T UA LIZ AT I O N RE DUN DA N CY A RC HI T E CT URE
From the appropriate Symphony Plus manual, determine what resources are needed, as if
they are to be satisfied by a physical machine.
– These include:
Duplicating the system in a virtual architecture is akin to duplicating the number of physical
servers, should have the system been designed as a physical system in which all server func-
tions are carried out by individual physical machines. It must be noted that Symphony Plus is
not only a highly available system, but also a real-time redundant system in which a single
failure does not cause loss of data, even in the face of real-time operation.
This design requirement has been thoroughly tested within the redundancy mechanisms of
the Symphony Plus application, in a design that is either entirely physical, or which mimics
the physical deployment. In other words, real-time redundancy via mechanisms other than
those provided by Symphony Plus are not supported, such as vMotion, High Availability or any
other similar technologies.
This does not mean that vMotion, High Availability or other techniques cannot be applied to
further increase the resiliency and availability of the system. It means that these technolo-
gies are to be thought of for different reasons, such as increasing the system availability, eas-
ing maintenance, or other non-real-time requirements.
Based on Symphony Plus documentation, determine what resources are needed to imple-
ment the desired redundancy. Some redundancy schemes are N+1, N+2, etc.
8 VZ Z 0 0 12 8 8T 2 12 0 A 27
N E T W O RK CO NN E CTI VIT Y VI RT U A LI Z ATI O N
At other times, other ancillary functions may also be desired, such as Out-Of-Band manage-
ment or Disaster Recovery. These requirements all add to the architecture of a virtual envi-
ronment, just like it does in a physical environment. However, because of the possibility of
aggregation, it is important to define what type of network design will be implemented in
the virtual environment, and tally the traffic expected on each interface. This traffic is also
the result of the plant's characterization, discussed in the previous section.
To properly design the system, it is to be noted that some traffic which in a physical environ-
ment necessarily leaves and enters a network interface, may, in a virtual environment remain
within the host. This improves performance of the system as a whole, for some operations.
But for some operations, it places more requirements on the physical network interface, be-
cause of the aggregated traffic. Thus a tally of what traffic comes into and out of the net-
work interfaces is required:
From the appropriate Symphony Plus manual, determine network requirements and tally:
These include: |
This will determine if a single network interface is required, or whether multiple interfaces
need to be aggregated, or even if ports of high speed are needed, such as 10 Gbps, or 40
Gbps, etc.
Finally, although almost all network switches have the required fabric speeds required for
systems of the type typically deployed in a DCS, it is important to make sure the bandwidth
calculated within this section matches up with the specifications of the network switch.
In a virtual environment, there are several ways to deal with this need. One is to replace com-
ponents with more up-to-date specifications. This method, however, may require that the
virtual system be taken offline. To avoid such, another avenue is available: to have additional
resources added to the system. This is possible because in a virtual environment, the modifi-
cation of the host does not mean that any of the virtual machines is modified. In this case,
they are simply given more resources. It is the underlying hypervisor's function and ability to
treat its resources as components that can easily be added.
28 8V Z Z 0 01 2 88T 2 12 0 A
V I R T UA LIZ AT I O N EQ U I P M E N T M AI N T E NA NC E
However, resources cannot be added to a host, unless the host is prepared to receive them.
Thus, the virtual machine host must be sized properly for the desired lifecycle.
Identify long term plant requirements and determine what additional features will be re-
quired throughout the life expectancy of the system. Then determine storage, network and
memory requirements as per the sections above
Tally these requirements and add them as required resources that the Virtual Machine host
will be required to support in the future.
– These include: |
– Processors
– Memory
– Storage
In this case, one must account for the required storage to relocate the virtual machines.
From each application's specifications, determine the amount of storage required and tally
it:
8 VZ Z 0 0 12 8 8T 2 12 0 A 29
C YB E R SEC U RI T Y VI RT U A LI Z ATI O N
3.6 Cybersecurity
In particular, this section refers to Disaster Recovery. ABB's standard Disaster Recovery appli-
cation is Rapid Recovery, which creates on-line periodic backups of all nodes. This recurrent
and permanent on-line backup method relies on a reliable and agile network, which is best
served by a separate network infrastructure specifically for Disaster Recovery. Determining
the amount of data to be backed up is very complex because Disaster Recovery software pro-
vides two algorithms to reduce the amount of data being stored in their backup repositories:
Compression
Performs compression on the data being stored, by removing most redundant data and in-
stead adding error correction and data protection.
De-duplication:
Avoids having to store multiple copies of the same data from different nodes on the system.
Because of these two mechanisms, computing the amount of data to be stored is extremely
complex. At times, compression and de-duplication can achieve compression ratios close to
90% and so it is best to follow the recommendations for storage of the Disaster Recovery ap-
plication separately.
However, the main requirement for Disaster Recovery is to have a resilient and agile network,
with plenty of bandwidth to quickly supply data to the Disaster Recovery backup server. It is
this requirement which (for optimal operation) mandates the use of a separate network with
enough bandwidth to transfer data quickly. It is best to have at least a 1 Gbps network di-
rectly from the virtual machine hosts to the Disaster Recovery server.
From the previous section, determine the approximate amount of storage required and ag-
gregate it.
Affect the total storage requirement by a factor of 50%. This conservative figure is the
amount of data that will be stored in the Disaster Recovery server repository.
However, only a fraction of this data will be sent over to the Disaster Recovery server. That
is because the Disaster Recovery agent only sends the data that has changed and not every
disk sector or bit. It is this value which will determine network bandwidth requirement.
A possible architecture then is to design and apply resources based on the requirements laid
out for a physical infrastructure.
30 8V Z Z 0 01 2 88T 2 12 0 A
V I RT U A LIZ AT I O N VI RT UA L S YST E M A R CHI T EC T URE S – MAT CHI N G P H YSI CAL M A CH IN E S RE SO URC E S
The hardware resources (shown within the orange box) are identified and managed by the
Hypervisor. The configuration of each Virtual Machine (shown as vertical stacks of resources)
mimics what would be an otherwise physical system, with actual disk resources defined
within the software as individual RAID containers, each assigned to a given virtual machine.
– The same principles and calculations applied to select hardware for physical machines can
be used to design the virtual machines,
– Simple to configure the virtual host, because its specifications are the sum of the specifi-
cations of each individual physical server or workstation,
– Provides ample resources for sudden, unexpected, random and hard to determine work-
loads,
– Because no specialized hardware is used, the system is very cost effective and compact in
size, especially for small virtual deployments,
– All resources are contained in the same host, making it simple to deploy.
– Hypervisor efficiencies, are not taken into account and as a result, the system becomes
over-designed,
– The hosting server’s physical limits become a limiting factor in system growth,
– The hosting server’s physical limitations also impose an upper limit on the size of the vir-
tual infrastructure,
– The advantages of more specialized disk technologies, with higher efficiencies, reliability
and resiliency cannot be realized.
8 VZ Z 0 0 12 8 8T 2 12 0 A 31
VI RT UA L S YST E M A R CHI T EC T URE S – R E SO U RC E P O O LI N G A R CH ITE CT UR E VI RT U A LI Z ATI O N
In this approach, the virtual machine host is considered as a pool of resources, which will be
made available to each of the virtual machines. These resources are then consumed as the
virtual machines run, and as each virtual machines workload varies over time. Furthermore,
this architecture does not need to follow any particular design technique, which in an individ-
ual physical server would be considered.
Pooling resources requires then having information on the capabilities, not of each compo-
nent that makes up a sub-system, but rather of the sub-system as a whole. This approach
has the merit of using each sub-system’s state of the art performance and capabilities to the
fullest.
It also allows taking full advantage of the highly specialized capabilities of the hypervisor op-
erating system, such as overprovisioning of the system, as will be described later.
– CPUs: Processing power is pooled on the host and assigned to each virtual machine on an
as-needed basis. This sub-system is highly linear in nature and requires simply adding up
all available cores to determine available capability. As cores are utilized, they are sub-
tracted from the pool.
– Memory: Amount of DRAM and bandwidth is pooled on the host and, similarly to what
happens with the CPUs, it is assigned to each virtual machine as needed. This is a linear
resource which means that total memory on the host determines maximum capability of
the system as a whole, and as it is consumed it is subtracted from the pool.
– Disks: This sub-system is significantly more complex than CPU and RAM. There are two
main specifications that must be considered: performance and storage.
• Performance: This resource determines the capability of the virtual machine to per-
form. It is the main factor that determines what workload each application can sus-
tain.
Disk performance is specified by IOPS and Mbps figures, with each of these figures being ad-
ditive to determine maximum system capabilities.
As IOPS and Mbps resources are utilized, they are subtracted from the pool.
The difficulty with this particular resource is not how much is available (because that is calcu-
lated by simple addition), but how much of it is used, how it varies over time and how much is
required to be in reserved for peak conditions.
• Storage: This resource determines amount of data that can be held and number of ap-
plications that can be installed on the virtual machines. It does not determine how well
the system operates.
32 8V Z Z 0 01 2 88T 2 12 0 A
V I R T UA LIZ AT I O N VI RT UA L S YST E M A R C HI T EC T URE S – R E SO URC E P OO L I N G A RC HI T E CT UR E
Total storage capacity is simply the sum of all available disks, and becomes the pools
total available resource. As storage is consumed by applications storing data or appli-
cations being installed, capacity is subtracted from the pool.
The disk sub-system now, can be design in such a manner as to not require any specific type
of configuration, so long as it provides the level of performance needed by the applications.
The following techniques can be used to design the disk sub-system (list is not exclusive nor
exhaustive):
– iSCSI
– Fiber Channel
It is important to note that in all cases, virtual machines are neither aware nor require to be
constrained by a particular design. All that is required is that the performance and storage
requirements be satisfied by the disk sub-system.
– Network: Because of the nature of Ethernet this is one resource that is not additive. Hav-
ing additional Network Interface Cards (NICs) does not provide additive receive or trans-
mit bandwidth. But neither is the need for this resource additive either.
Because in the virtual host all virtual machines are (or can be) “connected” via the hypervi-
sor’s virtual switch, what in a physical environment is traffic into and out of the server, be-
comes data exchanged internal in the virtual machine host – data which never leaves the
boundaries of the hosting server. The more virtual machines running in the virtual machine
host, the less traffic must traverse the physical NIC.
This does not mean there isn’t traffic into or out of the virtual machine host. Such traffic is
(or may be) traffic to thin clients, operator workstations, redundant servers or any other ma-
chine which consumes or provides data to virtual machines running in the host. It is this traf-
fic which must be accounted for when considering how much will traverse the NIC.
Latency of the network can be minimized by increasing the number of NICs, by providing mul-
tiple paths for different virtual machines to have greater access to network resources outside
of the physical host. Other network techniques such as Link Aggregation can also be used,
which will provide greater resources to the pool.
The dynamic and random nature of the utilization of Ethernet network resources means
these resources are not linear. However, techniques similar to those used for physical net-
work systems can be used to determine required network resources available to the host
pool, to be made available to virtual machines within the host.
– Power Supplies: Power supply capacity and power consumption of the system is linear,
which means the resource is additive and the consumption of each virtual machine can
simply be subtracted from the pool. However, predicting the exact power consumption of
the system is extremely complex.
8 VZ Z 0 0 12 8 8T 2 12 0 A 33
V I RT U A L S YST E M A R C HI T EC T U RE S – R E SO U RC E P O O LI N G A R CH I T E C T U R E VI RT U A LI Z ATI O N
Because this is not a sub-system than can be easily modeled, it is best to consult with the
manufacturer of the physical host, to determine power supply requirements.
– The virtual machine host architecture can be designed independently of the architecture
of each virtual machine, without regard for the requirements of early physical systems,
– Because of this independence, each virtual machine host sub-system can take full ad-
vantage of state of the art techniques for making resources available to the virtual ma-
chines,
– Without the constraints of a design philosophy, hypervisor efficiencies are fully realized,
such as the overprovisioning of any resource within its pool. This is especially useful for
improved memory, CPU and disk resource utilization,
– Designing the virtual machine host becomes more complex. This also translates to an in-
creased learning curve for maintenance,
– Care must be exercised to no overprovision the system to the point where it is not capable
of addressing sudden, increased peak workloads,
– Over the life of the system, operating and maintenance expenses are significantly lower,
but, in the short term, capital expenses may be higher.
34 8V ZZ 0 01 2 88T 2 12 0 A
V I RT U A LIZ AT I O N VI RT UA L S YSTE M AR C HI T EC T URES – R E SO URC E P OO L IN G A RCHI TE CT UR E
The above architecture shows an coupe of servers where all resources are local to the server.
However, a different architecture is also possible, where the disk resources are located out-
side of the servers, as a shared sub-system.
8 VZ Z 0 0 12 8 8T 2 12 0 A 35
S UM M A RY A N D CO N CL USI O N VI RT U A LI Z ATI O N
The above architecture shows the conceptual layout of a virtual system utilizing off-server
shared storage. The shared storage may be designed as a completely independent sub-sys-
tem, with state of the art techniques.
– Any type of RAID array, designed to meet the requirements of the application and its
workload,
– Any type of off-server storage connection, be it iSCSI, Fiber Channel or Network Attached
Storage (NAS),
– Shared storage built into converged infrastructure servers, or standalone chassis specifi-
cally for hosting disks and disk controllers.
Although many different virtualization techniques can be used, care must be exercised to re-
tain the real-time capabilities of Symphony Plus without compromised. For this reason, it is
recommended that ABB be engaged early on in the development, design and implementation
of any virtualization architecture.
36 8V Z Z 0 01 2 88T 2 12 0 A
M O DI F I C AT I O N S I N T H I S R E LE A SE NE W F UN CTI O NS
For more information on SOE Configuration Tool, refer SOE Configuration Tool section of S+
Operations Harmony Connectivity guide.
Also, Harmony Status Viewer is extended to support SPENM01 module that includes Event
resetting, loop & node topology, module status, problem report, and loop related diagnostics
such as event and error counters, exceptions statistics, and performance statistics
4.2 Improvements
Following improvements are done compared to previous release and also various Power
help/VSM cases reported to ABB’s support line are fixed in this release.
• Security Improvements
– IPSec Support
• Usability improvements
– Trend: Decimal places of value shown in the Scooter is now user defined and follows
the tag configuration
– Trend: Trend Statistics window that displays Min and Max value of tags along with
timestamps, and also displays average value.
8 VZ Z 0 0 12 8 8T 2 12 0 A 37
I M P RO V E M E NT S M O DI FI CAT I ON S IN T HI S R EL E A SE
– N90STA Tags alarm messages now includes the status bytes as well
In previous release of S+ Operations, when extended redundancy feature is ON, the command
mastership as well as the mastership of data transfer is demanded to the server that owns
the connection with a specific connect (e.g a controller) since longer. This is to avoid sending
double command to the field, that according to the type of command could create unwanted
and inconsistent behavior (e.g Toggle commands or inc\dec percentage)
So, it is possible that a client connected to SPO-B trying to issue a command will be routed to
another server like SPO-A in order to be executed.
38 8V Z Z 0 01 2 88T 2 12 0 A
M O DI FI CAT I ON S I N T HI S R E LE A SE I M P RO V E M E NT S
This create a possible issue in command availability if for any reason ever the communication
between SPO-A and SPO-B is unreliable, moreover even into normal working situation it intro-
duces a delay into executing the command due to the propagation between the two servers
when in theory the command could have been sent from SPO-B directly.
This behavior is changed in order to let the connected server to execute the command if pos-
sible (e.g. the connected server have connection with the device).
Note:
– in case of clients connected to remote servers that do not have connection to the field,
the command will move to a server with longer valid connection
– the new algorithm will be applied to commands only not on data transfer (that will keep
current algorithm)
The command propagation will not happen until absolutely necessary and the local server will
execute the command. If the local server is unable to execute the command because either is
not enabled by the architecture or by a fault, then extended redundancy will find the “best in
class” for executing the required command e.g. the server that have a stable connection to
the device since longer will execute the command.
Scenario 1: Client connected to SPO-C server that have no connection to device in this case,
Command is sent to all servers, but only one will execute which have longer period of connec-
tion to device, the others will drop it.
8 VZ Z 0 0 12 8 8T 2 12 0 A 39
I M P RO V E M E NT S M O DI FI CAT I ON S IN T HI S R EL E A SE
Scenario 2: Client is connected to a server with device connection failure, the command is
propagated to another server
40 8V Z Z 0 01 2 88T 2 12 0 A
M O DI FI CAT I ON S I N T HI S R E LE A SE FI XE D P R OB L E M S
Thin client
Thin client graphics goes out of alignment if
graphics resolu-
20170724-193182 viewed in lesser resolution than the designed
tion management
one
issue
PowerExplorer
Client is switched to full screen; any additional
20170816-218607, does not work
tabs open aside from primary tab cease work-
20180129-405406 properly in Full
ing.
Screen
Solution:
8 VZ Z 0 0 12 8 8T 2 12 0 A 41
FI XE D P R OB LE M S M O DI FI CAT I ON S IN T HI S R EL E A SE
Modbus RTU
if configured with more than one device, discon-
Scanner: CF issue
20170907-241157 nection of the device does not lead the tag qual-
when configured
ity to Channel Failure
with multidevice
Modbus RTU
Scanner: datatype Scanner does not support data type 4
20170920-254588
4 is not sup- (FIELD_AD4)
ported
Mismatch of ex- The Tag values exported from trend into CSV
20170929-285079 ported trend val- format does not match with the trace values
ues shown in trend
Unable to com-
municate few sig-
20171004-288998 nals from third Unable to communicate few signals from third
party IED’s using party IED’s using IEC61850 connectivity
IEC61850 connec-
tivity
Legends are
empty beneath
Legends are empty beneath the embedded
20171220-369560 the embedded
trends in Web portal
trends in Web
portal
No SOE report
can be created af-
No SOE report can be created after an ICI dis-
20180124-399793 ter an ICI discon-
connect and ICI reconnect
nection and re-
connect
42 8V Z Z 0 01 2 88T 2 12 0 A
M O DI FI CAT I ON S I N T HI S R E LE A SE FI XE D P R OB L E M S
Solution:
Printscreen: In-
20180129-404472 verted color does
not work properly Select Advanced tab and then click Settings in
Performance. Select Visual Effects, and uncheck
Smooth edges of screen fonts and then Apply
8 VZ Z 0 0 12 8 8T 2 12 0 A 43
FI XE D P R OB LE M S M O DI FI CAT I ON S IN T HI S R EL E A SE
Modbus TCP
Issues related handling of word/bytes of Mod-
20180222-434624 Scanner: Commu-
bus pocket handling
nication issues
TntXmlVwr re-
20180313-455825 TntXmlVwr returns error
turns error
Sometimes Pow-
erexplorer
Sometimes Powerexplorer crashes during visual-
20180313-455877 crashes during
ization of historical trends
visualization of
historical trends
44 8V Z Z 0 01 2 88T 2 12 0 A
M O DI FI CAT I ON S I N T HI S R E LE A SE FI XE D P R OB L E M S
Solution:
Note:
This is not a mandatory configuration, however if pro-
ject experiences slow execution of commands from 3rd
party OPC client to S+ Operations OPC DA OPC
Server, it might be possible this problem exists and
timeout expressed by OPC Client must be realized. The
above stated system settings must be configured ac-
cordingly.
Connections is-
sues between Op- Connection issue with S+ Operations Server and
20180530-555740 erations Server Operations History servers leading to data
and Operations losses on the Operations History
History
Task Moni-
tor/PwMoni-
torSrv - does not Task Monitor/PwMonitorSrv - does not restart
190349
restart the com- the computer on a process crash
puter on a pro-
cess crash
8 VZ Z 0 0 12 8 8T 2 12 0 A 45
FI XE D P R OB LE M S M O DI FI CAT I ON S IN T HI S R EL E A SE
AC800MImporter
doesn’t support AC800MImporter doesn’t support System
ABB2015111500014
System 800Xa 5.1 800Xa 5.1 FP4 and 6.0.3
FP4 and 6.0.3
Node database
alarm does not
Node database alarm does not show proper cur-
ABB20160202E0304 show proper cur-
rent value when Return to Normal
rent value when
RTN
ApmsNetworker
ABB2016030200067 ApmsNetworker crashes at startup
crashes at startup
Improper shut-
Reboot of computer without proper shutdown
down of S+ Oper-
of S+ Operations server leads data difference
ABB2016031100008 ations server
between playback and Operations History, thus
causes trend
trend curve zooming problems realized.
curve problems
Bad Quality
alarms are never Bad Quality alarms are never get set to
ABB20160517E0191
get set to unacknowledged
unacknowledged
N90STA diag tag N90STA diagnostic tag of PNI800 does not re-
ABB2016060300192 of PNI800 related port alarm/warning when one of the ethernet
problem cable is disconnected
Solution:
Status byte of
ABB2016060800326 N90STA tag into This release captures status bytes received from
alarm message modules are captured as part of alarm message
of the status tag
46 8V Z Z 0 01 2 88T 2 12 0 A
M O DI FI CAT I ON S I N T HI S R E LE A SE FI XE D P R OB L E M S
Solution:
“AlarmPageAutoScrollUpOnNewAlarm”
Alarm page scroll (DWORD), YES/NO
ABB2016102800025 down related is- In case there are more alarm in alarm page than
sue visible ones, scroll bar is enabled. If the user in-
specting alarms in the list by scrolling down, and
meanwhile a new alarm arrives causing alarm
page to automatically scroll up to first line.
Solution:
Note:
8 VZ Z 0 0 12 8 8T 2 12 0 A 47
FI XE D P R OB LE M S M O DI FI CAT I ON S IN T HI S R EL E A SE
New SOE Report SOE report missing when Max Xrp time is
ABB2016113000001
issues greater than SOE signal change frequency
Solution:
Compatibility of
Freelance 2016 SP1 with latest rollup under Win-
ABB2016120200163 S+ Operations
dows 10/Windows Server 2016 as Operating Sys-
with Freelance
tem is supported. The required package can be
downloaded from respective location of ABB Li-
brary
Missing docu-
mentation about Missing documentation about Timer ON and
ABB2016120600025
Timer ON and Timer OFF alarm
Timer OFF alarm
Solution:
Millisecond reso-
By default, when the trend area shows less than
lution is not avail-
ABB2017012700023 30 seconds as the threshold, the scooter in-
able in the trend
cludes millisecond in time indication.
view
The threshold seconds can be configured using
following system setting under APPS\TREND
ScooterMsecMoveThresholdInSec (DWORD)
Solution:
Power explorer
crashes while us- To avoid any crash on Power Explorer while
ABB20170201E0039 ing mouse scroll scrolling a system setting introduced and can be
wheel in alarm configured using following system setting under
groups APPS\PowerExplorer
WatchdogMsgBoxAlarmGroup_msec" (DWORD)
and by default 0 which keeps this functionality
diabled. Recommended value is “500” msec.
48 8V Z Z 0 01 2 88T 2 12 0 A
M O DI FI CAT I ON S I N T HI S R E LE A SE FI XE D P R OB L E M S
Solution:
Solution:
OPC AE Server:
ABB2017032700053 Wrong event type OPC AE Server: Wrong event type for RTN
for RTN
Enhanced Analog
Enhanced Analog and Digital faceplate’s User in-
and Digital Face-
put enable/disable command buttons works
ABB2017032900100 plates: User ena-
only with master nodes, and doesn’t work non
ble/disable re-
master nodes
lated issues
8 VZ Z 0 0 12 8 8T 2 12 0 A 49
FI XE D P R OB LE M S M O DI FI CAT I ON S IN T HI S R EL E A SE
Solution:
XmlCurvesExportingServerTimeout (DWORD),
default 6000.
Trend scooter
value does not Trend scooter value does not show decimal
ABB2017042600082
show decimal places
places
Unable to save
ABB2017071400006 print preview as Unable to save print preview as BMP from client
BMP from client
50 8V Z Z 0 01 2 88T 2 12 0 A
M O DI FI CAT I ON S I N T HI S R E LE A SE K NO W N P RO B LEM S A N D W O R K A R OU ND S
ABB2016081 User input For enhanced analog and digital tags, faceplate's enable user
6E0365 disable/ena- input/disable user input command buttons work only on cli-
ble command ents connected to the “Master” server. The redundant serv-
buttons do ers which are not “Master” do not receive the enable/disable
not work button command when issued from clients.
from non-
master S+ Workaround:
Operations
Server Set the weight of ServerA to be 1 Higher than the ServerB
(For example ServerA node weight = 10 and ServerB node
weight = 9), and then just operate with clients connected to
ServerA (With reconnection connection policy of always con-
necting back to ServerA in case of Online), This way if Serv-
erA goes down, ServerB would be the “Master” and there
would be no Issue, and if ServerA is back to online, all the cli-
ents would connect back to it so they can remain connected
to the “Master” server.
170347 Auto log out In case Auto logout is configured, after defined timeout log-
does not out does not work successfully.
work
8 VZ Z 0 0 12 8 8T 2 12 0 A 51
K NOW N P RO B LEM S A N D WO RK AR OU NDS M O DI FI CAT I ON S IN T HI S R EL E A SE
123225 Engineering Off alarm check and Off Scan do not work for Engineering
Role unable Role even with privileges enabled.
to request
Off Scan or
Off Alarm
Check
117052 Bad Quality S+ Operations Server reports Bad quality alarm for all INFI
alarms are tags when S+ Operations servers loses its connection with
not cleared ICI (In redundant environment both Server losing connection
from Alarm with ICI). When Server ICI connection is restored, INFI tags in
List when Servers directly connected to ICIs are back to good quality
tags are back but S+ Operations servers which receives the same INFI Tags
to Good through network communication remains with bad quality
Quality. alarms status.
Workaround:
52 8V Z Z 0 01 2 88T 2 12 0 A
M O DI FI CAT I ON S I N T HI S R E LE A SE K NO W N P RO B LEM S A N D W O R K A R OU ND S
APPS\INFINET INTERFACE\PropagateSpecsOnlyIfMaster =1
108157 Menu Icons On a quad view monitor, when client switches from the
missing stopped server to the available running server, power ex-
when Client plorer does not display menu icons.
automatically
switches be- Workaround:
tween Serv-
ers. No of items that are supported in Menu database is 1000.
Problem occurs if number of displays are configured in fly-
out is more than < 150 Nos. It is recommended to size the
menu items considering above stated figures and also
based on the size of the menu, adjust the TcpIp-
CallTimeoutSec setting
102556 Extended Re- At ICI restart, ICI comes online prior to the establishment of
dundancy for all tags. The server in which ICI is restarting (Not the server
Harmony Not restart) may report quality as bad for tags, causing unavaila-
working bility of control from the connected clients. Commands on
Properly those clients are not available if data is bad, but is available
on another client connected to a different server where qual-
ity is good.
Workaround:
8 VZ Z 0 0 12 8 8T 2 12 0 A 53
K NOW N P RO B LEM S A N D WO RK AR OU NDS M O DI FI CAT I ON S IN T HI S R EL E A SE
105946 Alarm Portal Graphs in Alarm Portal are not displayed in Internet Explorer
Graphs are while they work fine in Operations Explorer.
not displayed
in Internet Workaround:
Explorer 11
Enable Compatibility view settings in Internet Explorer.
105817 Power Ex- If a new display is created with a XYPlot object and another
plorer display with Horizontal Bar object with same tag assigned
crashes if a then at runtime while using reference from the display
reference Power Explorer crashes.
from a XY
plot display
is used.
102655 Alarms not In case of very high number of active alarms (>2000) in an
aligned be- alarm group, it may happen that they are not propagated
tween serv- properly to other servers. There might be misalignment is-
ers sues.
Workaround:
106042 Composer Full deploy using wizard (Single Server Configuration) for the
Operations first time fails.
Full Deploy
fails for the Workaround:
first time
with default Do not set HSIServer property in CO before a full deploy.
wizard con-
figuration Leave it blank, do a full deploy and then set it afterward either
manually or using CO with an action set including the follow-
ing two actions:
54 8V Z Z 0 01 2 88T 2 12 0 A
M O DI FI CAT I ON S I N T HI S R E LE A SE K NO W N P RO B LEM S A N D W O R K A R OU ND S
89841 Partial Re- Bulk edit operation is carried out for changing Alarm Priority,
place option Alarm High Priority and Alarm Low Priority using Partial Re-
for Tags with place option with System Setup does not work properly.
System
Setup does Workaround:
not work
properly. For such a bulk operation, it is required to re-initialize the
whole Tag DB using System Setup in order to apply the
changes correctly.
102132 Harmony DANG tag type does not update Alarm Active Time when go-
DANG tag ing from H to HH/HHH or from L to LL/LLL. This is to con-
type does form the Industry Standards.
not update
Alarm Active
Time when
going from H
to HH/HHH
or from L to
LL/LLL.
102009 PNI Shows When S+ Operations loses connection to the IET/PNI and re-
Online prior stores the connection again, SPO Server goes online without
to all Points all points being established with good quality. So, Clients at-
being estab- tached to Server may show Bad Quality until established.
lished
Workaround:
After the start-up of PNI, wait until all the points are not es-
tablished.
Additionally, value of
“\APPS\PwMonitor\DelayExtRedMonitoring_sec” setting
can be tuned higher number (for e.g. 600 sec from 300 sec),
if there are high number of tags connected to SPO Server.
This setting introduces the delay before SPO Server shows
online status.
8 VZ Z 0 0 12 8 8T 2 12 0 A 55
K NOW N P RO B LEM S A N D WO RK AR OU NDS M O DI FI CAT I ON S IN T HI S R EL E A SE
46232 Login of win- If Windows User is logged in to another user without logging
dows user off from the current session using Switch User functionality
into S+ dif- then the behavior of the users are not deterministic.
ferent for cli-
ents with dif- Workaround:
ferent higher
priority serv- This behavior is not supported by design. To avoid prob-
ers lems disable Switch User functionality of windows. Refer to
configuration guide for detailed steps.
56 8V Z Z 0 01 2 88T 2 12 0 A
M O DI FI CAT I ON S I N T HI S R E LE A SE K NO W N P RO B LEM S A N D W O R K A R OU ND S
51097 Power Explo- Power Explorer freezes if system is used with 16 bpp color
rer Frozen depth.
Workaround:
ABB20120718 Additional There are always some additional thick line frame in blue on
-0052 Thick line the graphic. It covers some display area, may cover useful in-
frame in blue formation.
around the
graphic ob- Workaround:
jects
The feature can be disabled setting the registry
APPS\PowerExplorer\SelectedFrame=NO
54508 Historian Historian Server diagnostic web page can only be accessed
Web page is using (http://localhost:89). This is default configuration.
only accessi-
ble from local Workaround:
machine
In case it is required to access the diagnostic page from re-
mote machine, an RDP connection to host machine can be
used.
recreatetags=1
ABB2012092 History Sys- On RDP connection Historian Server shows in “System Diag-
8-0126 tem Diagno- nostic ": "Check Failed Code: Dongle_Not_Installed".
sis shows
Failed license Workaround:
check: “Don-
gle Not In- Validate license directly on the history server, not using re-
stalled” mote connection (RDP)."
8 VZ Z 0 0 12 8 8T 2 12 0 A 57
K NOW N P RO B LEM S A N D WO RK AR OU NDS M O DI FI CAT I ON S IN T HI S R EL E A SE
51384 General It may happen that after running general setup from system
Setup proce- setup utility, S+ Operations HSI Service gets removed.
dure removes
Operations Workaround:
HSI service
There are two ways to install the service again:
OR
ABB20150112 Alarm List In Alarm Group database, Primary display field supports
-0367 Primary Dis- only 18 characters.
play Limited
to 18 Charac-
ters
163932 Unable to In case of standard menu database file is used to build the
open user menu and toolbar of the PowerExplorer, It is not possible to
documenta- launch User Documentation from PowerExplorer toolbar but-
tion ton.
Workaround:
Edit the command line for the program of menu label “User
Documentation” to “$Documents\2VAA001150-210_-
_en_S+_Operations_2.1_Operations_User_Guide.pdf”
58 8V Z Z 0 01 2 88T 2 12 0 A
M O DI FI CAT I ON S I N T HI S R E LE A SE K NO W N P RO B LEM S A N D W O R K A R OU ND S
166525 System Set- System settings tool doesn’t show sizes related registry keys
tings Tool while comparing loaded registries and REGCONF.xml
doesn’t show
sizes Workaround:
In the node where system settings tool is being used, edit the
REGCONF.xml file and remove “Install=NO” flag from follow-
ing,
<REGENTRY path="Startup\<ProgramName>"
name="CommandLine" descr="##internal## Command line
for the defined program" type="STRING" server="Y" install
="NO"/>
169346 OPC Client OPC client running under low privilege doesn’t work
running un-
der low privi- Workaround:
lege user
Refer to Operations Configuration Guide in section 3.8 and
configure the DCOM settings as mentioned in the table, then
Add/Update the registry key called AppID (Type = REG_SZ)
with the value of “{F5A1DB28-D938-4E0A-9A1E-
65658D093CA8}” in the following path,
Com-
puter\HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Wow64
32Node\CLSID\{E39AEE68-B6A3-4FBE-BBF0-
2B7666EC7F13}
8 VZ Z 0 0 12 8 8T 2 12 0 A 59
K NOW N P RO B LEM S A N D WO RK AR OU NDS M O DI FI CAT I ON S IN T HI S R EL E A SE
169823 Server In case of ABB S+ Operations HSI service running under SPlu-
doesn’t work sOServiceUser, some of the feature\application doesn’t
properly in- work properly.
case HSI ser-
vice running Workaround:
under SPlu-
sOServiceUs It necessary to grant DCOM permissions to SPlu-
er sOServiceUser for the OpcNodeServer and IciServer applica-
tions as follows,
Local Launch
Remote Launch
Local Activation
Remote Activation
60 8V Z Z 0 01 2 88T 2 12 0 A
I N STA L L ATI O N I N STA L LATI ON
5 INSTALLATION
5.1 Installation
Please follow the detailed instructions mentioned in installation section of configuration
guide
5.2 Upgrading
Please follow the detailed instructions mentioned in configuration guide
8 VZ Z 0 0 12 8 8T 2 12 0 A 61
Revision History
www.abb.com/powergeneration