The default method for sending data to the Enterprise Historian is using Store and Forward (SaF) Technology. The technology consists of two web services that communicate with each other through a specified port. With SaF, each Logger is paired with a "Sender Service" that will buffer data passed into it and forward it to a specified “Receiver Service”, paired with an Enterprise Historian, when the connection is available.
Status
Purge - Clicking this can cause loss of data. If the buffered data in the Sender is no longer wanted, select a session and click the Purge button. A confirmation dialog displays to force the session to close and delete all buffered data.
Session - A unique session name made up of the computer and log session names plus an ID.
State
- Active - Sender is connected to Receiver and transferring data.
- Inactive - Connected but has not received data from the logger in the last 5 minutes.
- Connecting attempt # - The Sender will try to make a connection with a Receiver every 5 seconds.
- Waiting (send tags) - The Sender is limiting how many tags to connect at one time so as not to overload the system.
- Waiting (buffered data) - Buffered data in another session must complete before this session can send data.
- Waiting (timeout) - A timeout has occurred waiting for a response from the Receiver.
- Forward failed - Data was sent to the Receiver but the confirmation of receipt was not returned.
- Reconnect - A Receiver service is not available. Possibly the service is stopped or does not exist.
Connected - Date/Time when the session last made a connection with the Receiver or "Disconnected".
Tags - Total tags included in the session.
Store/Sec - TVQs per second being written to the Sender buffer.
Send/Sec - TVQs per second being sent to a Receiver.
TVQs - TVQs currently stored in the Sender buffer.
Properties - Tag Properties currently stored in the Sender buffer. There are usually about 6 properties per tag, sent only when the log session connects with the Sender.
Annotations - Annotations from a custom sender client currently stored in the Sender buffer. Not used by the Canary Labs Logger.
Error Count - Number of errors logged since the session was created.
Last Error - The last Sender error logged to the Message log for each session.
Status bar - Sender statistics
Sessions - Total number of current sessions.
Tags - Total number of tags from all sessions.
Buffer - Total TVQs currently in the Sender buffer from all sessions.
Store/Sec - TVQs per second for all sessions being written to the Sender buffer.
Send/Sec - TVQs per second for all sessions being sent from the Sender buffer to Receivers.
Version - Version information of the Canary SaF Sender Service.
Configuration
Endpoints - The following endpoints addresses are provided for local and remote access.
Net.Pipe - Anonymous (Local Only) - Anonymous pipes provide interprocess communication on a local computer. This endpoint is always enabled and provides any interactive user access.
Net.TCP - Username - Secure endpoint for custom applications to put data into the Historian.
Net.TCP - Anonymous - Unsecure endpoint for custom applications to put data into the Historian.
Certificate (Username) -
Info... - Launches the Certificate properties dialog.
Store Name -
Member name | Description |
---|---|
AddressBook | The X.509 certificate store for other users. |
AuthRoot | The X.509 certificate store for third-party certificate authorities (CAs). |
CertificateAuthority | The X.509 certificate store for intermediate certificate authorities (CAs). |
Disallowed | The X.509 certificate store for revoked certificates. |
My | The X.509 certificate store for personal certificates. |
Root | The X.509 certificate store for trusted root certificate authorities (CAs). |
TrustedPeople | The X.509 certificate store for directly trusted people and resources. |
TrustedPublisher | The X.509 certificate store for directly trusted publishers. |
Find Type -
Member name | Description |
---|---|
FindByApplicationPolicy | The findValue parameter for the Find method must be a string representing either the application policy friendly name or the object identifier (OID, or Oid) of the certificate. For example, "Encrypting File System" or "1.3.6.1.4.1.311.10.3.4" can be used. For an application that will be localized, the OID value must be used, because the friendly name is localized. |
FindByCertificatePolicy | The findValue parameter for the Find method must be a string representing either the friendly name or the object identifier (OID, or Oid) of the certificate policy. The best practice is to use the OID, such as "1.3.6.1.4.1.311.10.3.4". For an application that will be localized, the OID must be used, because the friendly name is localized. |
FindByExtension | The findValue parameter for the Find method must be a string describing the extension to find. The object identifier (OID) is most commonly used to direct the Find method to search for all certificates that have an extension matching that OID value. |
FindByIssuerDistinguishedName | The findValue parameter for the Find method must be a string representing the issuer distinguished name of the certificate. This is a more specific search than that provided by the FindByIssuerName enumeration value. Using the FindByIssuerDistinguishedName value, the Find method performs a case-insensitive string comparison for the entire distinguished name. Searching by issuer name is a less precise search. |
FindByIssuerName | The findValue parameter for the Find method must be a string representing the issuer name of the certificate. This is a less specific search than that provided by the FindByIssuerDistinguishedNameenumeration value. Using the FindByIssuerName value, the Find method performs a case-insensitive string comparison using the supplied value. For example, if you pass "MyCA" to the Find method, it will find all certificates with the issuer name containing that string, regardless of other issuer values. |
FindByKeyUsage | The findValue parameter for the Find method must be either a string representing the key usage or an integer representing a bit mask containing all the requested key usages. For the string value, only one key usage at a time can be specified, but the Find method can be used in a cascading sequence to get the intersection of the requested usages. For example, the findValue parameter can be set to "KeyEncipherment" or an integer (0x30 indicates "KeyEncipherment" and "DataEncipherment"). Values of the X509KeyUsageFlags enumeration can also be used. |
FindBySerialNumber | The findValue parameter for the Find method must be a string that represents the serial number of the certificate as displayed by the certificate dialog box, but without the spaces, or as returned by theGetSerialNumberString method. |
FindBySubjectDistinguishedName | The findValue parameter for the Find method must be a string representing the subject distinguished name of the certificate. This is a more specific search than that provided by the FindBySubjectNameenumeration value. Using the FindBySubjectDistinguishedName value, the Find method performs a case-insensitive string comparison for the entire distinguished name. Searching by subject name is a less precise search. |
FindBySubjectKeyIdentifier | The findValue parameter for the Find method must be a string representing the subject key identifier in hexadecimal, such as "F3E815D45E83B8477B9284113C64EF208E897112", as displayed in the UI. |
FindBySubjectName | The findValue parameter for the Find method must be a string representing the subject name of the certificate. This is a less specific search than that provided by the FindBySubjectDistinguishedNameenumeration value. Using the FindBySubjectName value, the Find method performs a case-insensitive string comparison using the supplied value. For example, if you pass "MyCert" to the Find method, it will find all certificates with the subject name containing that string, regardless of other subject values. Searching by distinguished name is a more precise search. |
FindByTemplateName | The findValue parameter for the Find method must be a string representing the template name of the certificate, such as "ClientAuth". A template name is an X509 version 3 extension that specifies the uses of the certificate. |
FindByThumbprint | The findValue parameter for the Find method must be a string representing the thumbprint of the certificate. |
FindByTimeExpired | The findValue parameter for the Find method must be a DateTime value in local time. For example, you can find all the certificates that will be valid until the end of the year by eliminating the results of a Findoperation for FindByTimeExpired of the last day of the year from the results of a Find operation forDateTime.Now. |
FindByTimeNotYetValid | The findValue parameter for the Find method must be a DateTime value in local time. The value does not have to be in the future. For example, you can use FindByTimeNotYetValid to find certificates that became valid in the current year by taking the intersection of the results of a Find operation forFindByTimeNotYetValid for the last day of last year with the results of a Find operation forFindByTimeValid of DateTime.Now. |
FindByTimeValid | The findValue parameter for the Find method must be a DateTime value in local time. You can useDateTime.Now to find all the currently valid certificates. |
Subject Name - Name of the certificate subject.
Credentials - Credentials used to identify the "Sender Service" when it connects
to a "Receiver Service" using the "Net/TCP - Username" endpoint.
Identity: - Name associated with this Sender credential.
GUID: - Unique identifier value for the credential.
Access
Allow - The Allow panel displays client credentials of users or groups granted access to connect to the Sender through the Net.TCP - Username endpoint.
Add... - Click to add users or groups to Allow access to the Sender.
Remove - By selecting an existing user or group from the list an Administrator can Remove them from the Allow list.
Deny - The Deny panel displays client credentials of users or groups specifically denied access to connect to the Sender through the Net.TCP - Username endpoint.
Add... - Click to add users or groups to deny access to the Sender.
Remove - By selecting an existing user or group from the list an Administrator can Remove them from the Deny list.
Comments
0 comments
Article is closed for comments.