Porovnávané verzie

Kľúč

  • Tento riadok sa pridal
  • Riadok je odstránený.
  • Formátovanie sa zmenilo.

...

The answer to this question is very factory-specific. Here, here we offer two possible configurations:

...

There are 2 basic types of D2000 users: administrators and standard users. Administrators can edit D2000 objects using D2000 CnfCNF/D2000 GrEditor tools. Selected administrators can also edit/create other users. This is how to obtain the list of users in the D2000 Cnf tool:

...

The Oracle "rman" utility is internally used to back up the whole database. The backups are then copied to the NAS server, with a 7-day retention (screenshot not included).



Please provide

...

a system-generated listing of those individuals with the ability to modify (add, change, & delete) the backup schedules supporting the D2000 system.

Scenario 1 - External backups by Windows Task Scheduler

That would be Windows users assigned to the Administrators group of individual servers (as well as Domain admins). E.g., on <D2000_server_name>:

Image Added

Scenario 2 - Backups performed by the Sysprof Backup module

That would be D2000 users with Administrator rights. They can be filtered out from the list of all D2000 users for individual D2000 applications, see file ‘D2000 list of users.xlsx’.



Please provide a system-generated log showing the history (since 1/1/2025) of D2000 system backups, including the date, time, job name, and success/failure status.

Please provide an electronic copy of the query utilized or a screenshot showing how the listing was generated.

Scenario 1 - External backups by Windows Task Scheduler

As the jobs are run by Windows Scheduler, this question should probably be answered by the administrators of AD responsible for keeping logs. The scripts, however, also contain logging of being run, which can be looked at, and the required information manually extracted. 

On application servers, logs are located in D:\_Backup\Logs\YYYY_MM directories (one log per backup).

Scenario 2 - Backups performed by the Sysprof Backup module

On application servers, logs of individual backups, performed by the Sysprof Backup module, are located in D:\_Backup\Logs\YYYY_MM directories (one log per run, plus one log per exp/rman/pg_dump).

Success/failure is reported by Sysprof, based on the return code of backup utilities used (e.g., exp/rman/pg_dump). Failure of the last backup is indicated by the red color of Sysprof Backup pictures (schemes).



Please provide documentation around a recent restore of the D2000 system. 


So far, there has been no need to perform a full system or virtual server restore. We have tested restoring a virtual machine, and it worked fine.

Sometimes it happens that we revert to the last backup of the D2000 Configuration database. This restore is usually performed on a notebook where D2000 is installed, using D2000 Application Manager. Then, we use the restored database to XML export the configuration of objects that have been deleted or modified, and to revert changes.



Please provide a list of database users used for accessing D2000 databases (Configuration, Logging, Archiving) as well as to external databases (MES)

Configuration/Logging databases: Only the D2000 Server accesses these databases. Fixed username "dba" is used for access, password is configurable.

The Configuration database is read when the D2000 Server is started. The whole contents (with the exception of object history) is read into the D2000 Server's memory. After that, all configuration changes (including startup values) are written to the Configuration database. Reading is performed only when working with the Object modification history.

The Logging database is read whenever a user/script needs logging data. Both reading and writing are performed only by the D2000 Server. Writing is performed continuously, as events in the system occur.

So, whenever a user/script needs logging data, the D2000 Server reads it. Therefore, user PCs don't need network connectivity to the configuration database, only to the D2000 Server (TCP port 3119).

Archiving database: Only the D2000 Archiv process accesses these databases. Fixed username is used for access ("dba" for PostgreSQL and Sybase SQL Anywhere, <application>_archiv for Oracle), password is configurable.

Both reading and writing are performed only by the D2000 Archiv. Writing is performed continuously, as values of D2000 objects are being changed, and values can also be written by script (or manually by users from D2000 HI processes).

Again, user PCs don't need network connectivity to the archiving database, only to the D2000 Server (TCP port 3119), which routes the read/write requests to the respective D2000 Archiv process (there can be a single one or multiple instances in redundant systems). 

External databases (e.g., MES): Connectivity to external databases is handled by the D2000 DbManager process. It uses DSN/username/password configured in the Database object. Non-administrators don't have access to the configuration of these objects, so they don't know these parameters.

Again, user PCs don't need network connectivity to the external databases, only to the D2000 Server (TCP port 3119), which routes the read/write requests to the respective D2000 DbManager process.

Note 1: Sometimes, however, users have, e.g., Microsoft Excel reports that directly read data from these databases; in these cases, network connectivity is required, but not because of the D2000 system, but because of these reports. Best practice is to use a dedicated, read-only user for these reports, who has strictly limited access rights for specific database tables only.

Note 2: Sometimes, external systems read/write data from/to these databases; in these cases, network connectivity is required from these systems. Best practice is to use a dedicated (if possible, read-only) user for these reports, who has strictly limited access rights for specific database tables only.



Please describe how the communication of D2000 clients with the D2000 Server is secured

Client processes (both user processes D2000 HI, D2000 CNFD2000 GrEditor, and system processes e.g., D2000 Kom, D2000 Calc, D2000 DbManager) communicate with the D2000 Server using TCP, by default connecting to the TCP port 3119 (although also reverse connection of the D2000 Server to processes located, e.g., in low-level DMZ can be configured). On Windows, the local D2000 processes  (running on the same computer as the D2000 Server) use shared memory, which is faster than TCP.

Scenario 1 - Default configuration

By default, proprietary compression and encryption are used in the communication channel.


Scenario 2 - TLS configuration

A standard TLS (version 1.3 in D2000 version 25) is used. Clients verify the validity of the D2000 Server's certificate. It is necessary to regenerate and redistribute the server certificate before it expires. More information on configuration and certificate generation can be read in the documentation.




Please describe which OS accounts and elevated privileges are used for the D2000 system

Scenario 1 - D2000 on Linux

On Linux, the D2000 runs under a user specified during installation. The default user is D2000. The D2000 application is started as a service using systemd. Most of the D2000 processes run with basic privileges; there are several exceptions, which are described in the documentation:

  • D2000 Server process requires special capabilities to create multicast sockets: 
    setcap cap_net_raw=pe kernel
  • D2000 Kom process may require special capabilities to work with raw sockets, to bind to privileged ports, and to work with GPIO and serial ports (usage depends on used protocols):
    setcap cap_dac_override,cap_sys_rawio,cap_net_bind_service+ep kom
  • D2000 Wssc process requires access to privileged port (port<1024):
    setcap cap_net_bind_service+ep wssc


Scenario 2 - D2000 on Windows

On Linux, the D2000 runs as a service under a LOCAL SYSTEM user. Individual processes may, however, be run under specific users for multiple reasons:

  • D2000 Event Handler: If the Sysprof module is deployed, to access other computers with D2000 (to monitor disk/CPU usage, free memory, etc). Also, if the process accesses remote file shares (e.g., to read/create TXT, XML, or CSV files), a dedicated user is needed, as network services are not available under a LOCAL SYSTEM user.
  • D2000 Kom: If the OPC DA or OPC HDA protocols are used to connect to the remote OPC DA/HDA server, the same user with an identical password has to be configured on both computers.
  • D2000 DbManager: If Kerberos authentication is used for some ODBC connections, this process may have to be run under a specific user.

In the configuration of individual processes, when Autostart is enabled, a specific Windows user can be configured (together with the password). In this case, the D2000 Server process creates a Windows service under this user and starts the service. The specified user has to have a "Log on as a service" right, so that a service can be started impersonating the specified userSo far, there has been no need to perform a full system or virtual server restore. We have tested restoring a virtual machine, and it worked fine.Sometimes it happens that we revert to the last backup of the D2000 Configuration database. This restore is usually performed on a notebook where D2000 is installed, using D2000 Application Manager. Then, we use the restored database to XML export the configuration of objects that have been deleted or modified, and to revert changes.