Data and events recorded by the devices in your system are regularly transferred by the
The Data Log Viewer displays data logs from all devices represented in the active user diagram. You can use the Data Log Viewer to display waveform and trend data in tabular format. You can also select a range of logs from the viewer and display the data graphically in the log view plotter.
The
The
Use a
You can select any data displayed in a Data Log Viewer and plot it as a graph or copy it to another application (for example, Microsoft Excel) where you can perform advanced calculations or include it in a report.
See
Click on a Data Log Viewer object in your user diagram. The Data Log Viewer appears.
Each Data Log Viewer displays data as a table of columns and rows. Each labeled column contains a single type of data and each numbered row represents a single data record.
You can plot data from a Data Log Viewer in the Log View Plotter.
Highlight the cells containing the data that you want to plot. The range of data can be selected in one of three ways:
To graph trends for all parameters over a particular time span, select a group of rows.
To graph the trend for a specific parameter using all available records, select the entire column.
To graph multiple parameters over a specific time span, click on the first cell in the desired range then drag to highlight the last cell of the range.
Select Edit > Plot Selected Data or click
.
The Log View Plotter window appears, displaying a graphical representation of the selected data. See
Tip
To quickly plot a single waveform, double-click on its waveform symbol in the Data Log Viewer.
Highlight the cells containing the data that you want to copy.
Select Edit > Copy or click
. This copies the selection to the Windows Clipboard. Switch to another application and paste the selection.
Events and alarms that occur in your system are recorded by the meter and transferred via
The Event Log Viewer displays events and alarms from the device(s) represented in the active user diagram. Use it to monitor low-priority events and alarms associated with the active user diagram. The Event Log Viewer is associated with a single user diagram, so alarms only update when the user diagram is open.
The Global Event Log Viewer displays events and alarms for your entire system. Use it to monitor high-priority events and alarms for the entire system. The Global Event Log Viewer operates independently of any user diagram. The Global Event Log Viewer does not require a user diagram and updates as soon as you start
See
Tip
To quickly display the user diagram for any device represented in a Global Event Log Viewer, double-click on the node name (in the node column) of a device to display its user diagram.
Click an Event Log Viewer object in your user diagram to open the Event Log Viewer.
The
Typically, Event Log Viewers display the following information:
Timestamp: This indicates the event’s date and time.
Priority: This determines the relative significance of the event. Each type of event has a numeric value assigned to it that represents its relative priority level.
Cause: This is the label and value describing the cause of the event. For example, if the label is “Setpoint #1” and the value is “Active,” then the event was caused by setpoint #1 changing to an active state.
Effect: This is the label and value describing the effect of the event. For example, if label is “Relay #1” and the value is “Forced On,” then the effect of the event was to force relay #1 on.
Ack Time: This is the date and time that an alarm was acknowledged.
Note
Because Event Log Viewers are associated with a single user diagram, they only update when the user diagram is open. All Event Log Viewers need to be re-opened if a diagram is closed or the software is shut down.
The
Note
It is recommended that you do not delete the Global Event Log Viewer. If the pre-configured Global Event Log Viewer is deleted, a new one must be created and configured. If one user deletes it, the Global Event Log Viewer is automatically deleted from all workstations. Only a user with supervisor-level access can delete a Global Event Log Viewer.
You can add multiple Global Event Log Viewers (if you have sufficient authority). You can change each viewer's filter criteria to query the database for events from a specific node or group of nodes or for events with a certain priority level.
Select
The new Global Event Log Viewer is preconfigured with default link and query information. However, you can link the viewer to another log server using the procedure described in
If you want to reconfigure a Global Event Log Viewer, ensure that the Toolbox is open (Options > Show Toolbox) then right-click the viewer window to display the Event Log Viewer Configuration dialog. You can edit the Caption,
Note
When you add a Global Event Log Viewer to your workstation, it is automatically added to all
Select Window > Global Event Viewer to open the Global Event Log Viewer.
Tip
To temporarily “hide” the Global Event Log Viewer, clear View > Show Global Event Viewer.
Every type of event has a prioritized value that identifies its relative significance on a scale of 0 (zero) to 255. By default,
The event record is highlighted in red, and identified under the Ack Time column as "ALARM". The Cause column lists the source of the alarm and the Effect column describes the event.
By default,
When you acknowledge an alarm,
The alarm acknowledgement function is also available in the
Note
In some cases, your access level may not be sufficient to acknowledge an alarm; for example, a critical alarm may require Supervisor access. This is a user-configurable option. See
Open an Event Log Viewer or Global Event Log Viewer, then do one of the following:
To acknowledge a single alarm, click the word ALARM in the Ack Time column or highlight the row containing the alarm.
To acknowledge all alarms to date, click the Ack Time column heading.
A confirmation box appears, asking if you want to acknowledge the selected alarms.
Select Yes to acknowledge the alarms or No to cancel.
If you acknowledge the alarm but do not have a sufficient access level, the alarm remains unacknowledged and the message "Insufficient Authorization" appears in the status line.
Note
When an alarm has been acknowledged in the Web-based
If you are not ready or able to acknowledge an alarm, you can silence it until it can be acknowledged by selecting Options > Silence Outstanding Alarms.
Note
Acknowledging an alarm does not change the operating condition that caused the alarm. You must ensure that the cause is corrected to remove the alarm condition.