SLX System Requirements
Shoplogix Collector Software and 3rd Party Solutions System Requirements
SLX Data Collector Software/Service
Company: Shoplogix Inc.
Author: Austin Kwok, C.E.T.
Revision: 1.01
Date: 2023/04/24
Table of Contents
- 1 Table of Contents
- 2 Summary
- 3 Shoplogix System Requirements
- 3.1 Local Collector System
- 3.2 Operating Requirements
- 3.3 IT Security and Policies
- 3.4 Remote Access and Virtual Private Network (VPN)
- 3.4.1 Implementation Phase
- 3.4.2 Support Phase
- 3.5 Web Portal Access
- 3.5.1 Browsers
- 3.5.2 IP Address/Uniform Resource Locator (URL) Whitelisting
- 3.5.3 User Access
- 3.5.3.1 Basic Authentication
- 3.5.3.2 OAuth Authentication
- 3.5.3.3 Active Directory Authentication
- 3.6 Ancillary Hardware
- 3.6.1 Operator Data Entry
- 3.6.1.1 Workstations
- 3.6.1.2 Tablets
- 3.6.2 Facilities Data Visualization
- 3.6.2.1 Televisions
- 3.6.3 Barcode Scanners
- 3.6.1 Operator Data Entry
- 3.7 Ancillary Software
- 4 iNTERFACEWARE Iguana
- 1 Table of Contents
- 2 Summary
- 3 Shoplogix System Requirements
- 3.1 Local Collector System
- 3.2 Operating Requirements
- 3.3 IT Security and Policies
- 3.4 Remote Access and Virtual Private Network (VPN)
- 3.4.1 Implementation Phase
- 3.4.2 Support Phase
- 3.5 Web Portal Access
- 3.5.1 Browsers
- 3.5.2 IP Address/Uniform Resource Locator (URL) Whitelisting
- 3.5.3 User Access
- 3.5.3.1 Basic Authentication
- 3.5.3.2 OAuth Authentication
- 3.5.3.3 Active Directory Authentication
- 3.6 Ancillary Hardware
- 3.6.1 Operator Data Entry
- 3.6.1.1 Workstations
- 3.6.1.2 Tablets
- 3.6.2 Facilities Data Visualization
- 3.6.2.1 Televisions
- 3.6.3 Barcode Scanners
- 3.6.1 Operator Data Entry
- 3.7 Ancillary Software
- 4 iNTERFACEWARE Iguana
Summary
The Shoplogix Data Collector software is designed to work in conjunction with an Open Platform Communication (OPC) server (ex. Kepware’s KEPServerEX) on the same local system to extract data from manufacturing production equipment including but not limited to Programmable Logic Controllers (PLC), Robotic Logic Controllers (RLC), Process Automation Controllers (PAC), and other I/O devices and sensors on an existing ethernet-based machine network. Machine data is aggregated and encrypted by the Shoplogix Data Collector software before pushed up to Shoplogix’s Amazon Web Service (AWS) Elastic Compute Cloud (EC2) web host, where it is decrypted and parsed for analytics and metric calculations. Although rare, any configuration change to the interaction between the web host and the Shoplogix Data Collector software are pulled down. Metrics are then retrievable by accessing the Shoplogix web portal. As the Shoplogix interface is a hosted web-based system, per-station external network accessible web-browsing is required.
This document will outline the system minimum and recommended requirements of each software component and their respective services, network topology, and data flow diagrams. Furthermore, the document will outline best practices with regards to ancillary hardware.
Shoplogix System Requirements
Local Collector System
Shoplogix requires a dedicated Windows-based system to operate. It is recommended that the system be either a virtual machine (VM) hosted on the customer’s server-farm, or that it be hosted on a physical desktop PC. All software components, required or optional, listed in this document must be installed on the same system. The system must also have network access, whether through virtual or physical Network Interface Cards (NICs), to the internal machine network where the production equipment to be monitored resides and to the external Internet network to push/pull data from the web portal hosted by Shoplogix.
Note: The necessary tasks of sourcing, installing, configuring, and maintaining a local collector PC, and ensuring the requisite features and services are available are the sole responsibility of customer. Maintaining a persistent routine backup of the local collector PC is highly recommended as the Shoplogix Data Collector software and other component software as outlined in this document require applied licensing, and the loss of the license will result in billable work to reinstall and configure said software.
Below are the minimum and recommended system requirements for the local PC taking into consideration the subsequent section outlines of individual software component system requirements to run efficiently:
| Minimum | Recommended |
CPU*: | 4 cores 3.0 GHz, or higher | 4 cores 3.0 GHz, or higher |
Memory*: | 8 GB, or higher | 12 GB, or higher |
Free Disk Space*: | 80 GB, or higher | 120 GB, or higher |
Operating System: | Windows 10, or 11 (Professional or Enterprise Editions) Windows Server 2019, or 2022 Professional, or higher | |
Features and Services: | .NET Framework 3.5 and .NET Framework 4.8 Windows Imaging Component and Windows Installer 3.1, or later |
Table 1: Recommended System Requirements
*Note: be aware that any IT policy required software including but not limited to security and intrusion detection software may affect the system requirements listed above.
Operating Requirements
Shoplogix Data Collector
CPU: | 4 Cores, 3.0 GHz |
Memory: | 4 GB |
Free Disk Space*: | 80 GB |
Operating System: | Windows 10, or 11 Windows Server 2019, or 2022 |
Features and Services: | .NET Framework 4.8 Windows Imaging Component and Windows Installer 3.1, or later |
Table 2: Operating Requirements for Shoplogix Software
*Note: growth rate storage scales against scan rate of tags, the number of associated machine connections, and associated job transactions; average growth rate for ten (10) machines with cycle count and sparse jobs is approximately 10 MB/day.
Kepware KEPServerEX V6 OPC Server
CPU: | 1.0 GHz |
Memory: | 1 GB |
Free Disk Space: | 530 MB |
Operating System: | Windows 8, 10, or 11 (Professional or Enterprise Editions) Windows Server 2012, 2016, 2019, or 2022 |
Features and Services: | .NET Framework 3.5 |
Table 3: Operating Requirements for KEPServerEX
Note: The KEPServerEX installation and licensing are tethered to the host MAC address.
IT Security and Policies
Port Exceptions
Depending on the IT policy, exceptions may need to be made to allow for applications to communicate inside/outside the network. Below is the list of port exceptions required by the Shoplogix system:
Port Number | Description |
Shoplogix Data Collector – external communication | |
443 | HTTPS [SSL] – bi-directional TLS 1.2 encrypted data |
Shoplogix Data Collector – internal communication | |
1025 | ADAM-6XXX GCL |
5168 | ADAM-6XXX Data Stream |
Kepware KEPServerEX* – default [user configurable] – internal communication | |
102 | Siemens TCP |
502 | Modbus TCP |
2222/44818 | Allen-Bradley EtherNET/IP |
5000 | MTConnect Agent |
8193 | Fanuc FOCAS |
Vendor Specific | OPC: Unified Architecture |
*Note: the list consists of common protocols used; only the ports defined by the technical discovery process and/or otherwise stated during implementation will be required.
Application Exceptions
Depending on the IT policy, exceptions may need to be made to allow for applications to communicate inside/outside the network. Below is the list of applications and their respective file paths:
Application | File Path – default [user configurable] |
Shoplogix Data Collector Software – external/internal communication | |
Connector Runtime | %ROOT%\Shoplogix\connector\Shoplogix.Connector.exe |
OPC Runtime | %ROOT%\Shoplogix\connector\opc.exe |
Realtime Runtime | %ROOT%\Shoplogix\connector\Shoplogix.Connector.Realtime.exe |
Modbus Runtime | %ROOT%\Shoplogix\connector\Shoplogix.Connector.Modbus.exe |
Kepware KEPServerEX – internal network | |
KEPServerEX 6.xx Runtime | %ROOT%\Program Files (x86)\Kepware\KEPServerEX 6\server_runtime.exe |
Table 5: Application Exceptions List
Directory Whitelisting
Depending on the IT policy, exceptions may need to be made to allow for files and directories to be whitelisted from intrusion detect and/or malware software. Below is the list of file paths to be whitelisted:
File Path – default [user configurable] |
Shoplogix Data Collector Software |
%ROOT%\Shoplogix\ |
Kepware KEPServerEX |
%ROOT%\Program Files (x86)\Kepware\ |
%ROOT%\ProgramData\Kepware\ |
%ROOT%\Users\<username>\Documents\Kepware\ |
%ROOT%\Users\<username>\AppData\Roaming\Kepware\ |
Service and User Permissions
Depending on the IT policy, exceptions may need to be made with regards to service accounts and/or user access levels. During implementation, a local administrator with network access (ex. Active Directory domain user with local administrator rights) will be required to properly install the necessary component software for the Shoplogix system.
Below are the user access requirements list per service post-implementation:
Service | User Access |
Shoplogix Data Collector Software | |
Shoplogix.Connector | Network User with Local Administration |
Kepware KEPServerEX | |
KEPServerEX 6.xx Config API Service | Local System |
KEPServerEX 6.xx Event Logger | Local System |
KEPServerEX 6.xx Historian | Local System |
KEPServerEX 6.xx IoT Gateway | Local System |
KEPServerEX 6.xx Key Service | Local System |
KEPServerEX 6.xx OPC .NET | Local System |
KEPServerEX 6.xx Runtime | Local System |
KEPServerEX 6.xx Script Engine | Local System |
KEPServerEX 6.xx Store and Forward | Local System |
Table 7: Service and User Permission List
System and Network Architecture
The Shoplogix system requires persisted communication between the data collector and the web host as well as between the data collector and the machine network. For the purposes of simplifying the explanation, the system is broken down into three (3) main components:
Data Collection Device(s) [internal machine network] – Plant Floor Machine Data
Data Collector PC [internal public network] – On-Site Collector PC
Web Host [external public network] – AWS Cloud
Below is a diagram outlining the system architecture for the Smart Factory Suite (Core), with visible segmentation between the Plant Floor Machine Data and the AWS Cloud by the On-Site Collector PC:
Figure 1: Shoplogix System Architecture
As the system was designed for signal edge detection with higher-level caching of stored events, it does not currently have the capability to pull cached data from data collection devices. What the system can do is cache data already collected from a data collection device if there is communication loss between the data collector PC and the cloud service. In other words,
[internal machine network to internal public network] if the data collection device (ex. ADAM-6251) is disconnected from the data collector PC, any data missed during the communication outage will be lost; this is equally true for historian-styled data sources, such as DCS.
[internal public network to external public network] If the data collector PC is disconnected from the cloud service, any data missed during the communication outage will batch upload when re-establishing communication. Note: keep in mind that there is a physical disk limitation with how much cached data can be stored equalling roughly 7 days of data.
To mitigate the above problem, it is recommended that a robust communication channel be maintained between the data collection devices and the data collector PC. Therefore, wired communication networking is the preferred method of communication between data collection devices and the data collector PC while it is strongly recommended that wireless devices and communication not be used due to the potential for disconnects and attenuation in industrial and manufacturing environments. If opting to continue with wireless networking, your mileage may vary, and it will be up to the customer to diagnose any potential networking and data loss issues as the first step in any troubleshooting process.
Data Encryption and Security
All external communication between the Shoplogix system and the AWS EC2 web host is authenticated and encrypted using Transport Layer Security (TLS) 1.2. Machine data is aggregated by the Shoplogix Data Collector software before being pushed up to the AWS EC2 instance for processing [internal > external]. When required, system configuration changes and updates are pushed from the AWS EC2 instance down to the Shoplogix system [external > internal].
Time Synchronization
It is strongly recommended that the system be synchronized with a corporate NTP server as transactions and message payloads are timestamped using the system’s clock. Asynchronous transactions and message payloads can cause data discrepancies, including but not limited to incorrect metric calculations and data loss.
System Maintenance and Updates
It is the customer’s responsibility that the system be routinely maintained as the expectation is to have reasonably high uptime for persistent data collection. As such, it is strongly recommended that the system be included in the maintenance plan managed by IT, whether local or corporate, including but not limited to scheduling Windows updates, scheduled system reboot cycles, and routine system maintenance.
Remote Access and Virtual Private Network (VPN)
Remote access and VPN requirements are at the discretion of the customer’s IT policy; as far as Shoplogix is concerned, we are brand- and protocol-agnostic. However, there are different access levels of needs depending on the phase of the project, as outlined in the sections below.
Implementation Phase
Shoplogix considers the implementation phase of the project as the deployment phase or hyper-care phase, where system access will be in high demand. During this phase of the project, Shoplogix will require access to the system to install, configure, and/or validate data with the intent to convert the system to be production ready (go-live). It is strongly recommended that during this phase of the project Shoplogix is given unfettered remote access to the system to prevent administrative hold-up of the project schedule.
Support Phase
During the support phase of the project, Shoplogix’s demand for system access is low. A typical situation would include Shoplogix requesting access to the system to troubleshoot an issue or incident as identified by the customer, or if Shoplogix determines there to be a bug that needs to be addressed and will pro-actively need system access to triage. Although it is strongly recommended that access established during the Implementation Phase be upheld, Shoplogix understands that it is unreasonable to have a permanent “back door” into a customer’s system from an external contractor and believe it to be reasonable to downgrade system access to “upon request as necessary”.
Web Portal Access
Browsers
It is expected that each user will have browser access to the web portal. Shoplogix has performed extensive testing with Google Chrome, Microsoft Edge, and other Chromium-based browsers within our development and sandbox-QA environments. Limited-to-no compatibility testing was performed against Mozilla Firefox and other browsers which may display visual artifacts if used. Microsoft Internet Explorer has been deprecated and phased out of support, resulting in it being considered unfit for use. As such, the recommended browser are Google Chrome, Microsoft Edge, or other Chromium-based browsers. Note: caching is required for metric display when accessing the Shoplogix Whiteboard and Analytics Portal, therefore we recommend that Smart TV’s built-in browsers not be used as they have significant memory limitations.
IP Address/Uniform Resource Locator (URL) Whitelisting
Although elastic addresses are assigned to each AWS EC2 instance, there are circumstances where the IP address will need to be changed. For this reason, it is strongly recommended that URL whitelisting be used as it is fixed to entitlement. The web portal for the data collection, entry, and visualization is not pre-allocated and will need to be configured during entitlement at the implementation phase; an assigned URL will need to be conveyed from the Shoplogix team during the implementation phase. The URL homepage syntax will reflect the following structure: https://<company>.shoplogix.com/*, where * denotes any subsequent page during navigation. Additionally, the operational analytics web portal will also need to be whitelisted, where the structure is not tied to any entitlement: https://portal.shoplogix.com/*; and the authentication for user login: https://identity.shoplogix.com/*.
User Access
Basic Authentication
Basic authentication is used for local communication between services, API calls, and job upload templating. This authentication method is only used locally – users will not be able access to the local collector system or AWS EC2 instance with this authentication.
OAuth Authentication
During implementation, the customer will need to supply a list of names and associated email addresses for proper OAuth registration and authentication to access the AWS EC2 web portal (whiteboard and analytics portal) hosted by Shoplogix. Once registered, an email will be sent to the associated email addresses for password creation. Once done, users will be able to log into the web portal using their email/password. Note: if required, Shoplogix can issue a reset password creation email to users who require assistance.
Active Directory Authentication
AD authentication can be configured for web portal access, upon request.
Ancillary Hardware
Two of the three core functions of the Shoplogix system are qualified data entry and quantified data visualization. It requires operations to have the necessary tools to both manually enter qualifying reasons or comments and see the changes made for actionable information. This is accomplished by deploying a mix of workstations, monitors, TVs and peripheral equipment including barcode scanners. However, due to each customer’s facilities having their own environmental factors to consider, there is no single recommendation that will adhere to all variables present. Below is a general list of considerations:
Consideration | Notes |
Physical | |
Distance | The device should be within reach for maintenance and configuration with appropriate peripheral equipment to assist (ex. wireless keyboard/mouse, access to the power button, etc) while being sufficient distance away to prevent intentional or accidental sabotage or damage |
Height | The device should be within reach for maintenance and configuration with appropriate peripheral equipment to assist (ex. wireless keyboard/mouse, access to the power button, etc) while being a sufficient distance away to prevent intentional or accidental sabotage or damage |
Orientation | Landscape or portrait display orientation will depend on the elements being visualized, but the mounting being able to rotate orientation is strongly recommended |
Power |
|
Size | The device should be large enough that all visual elements are reasonably legible when mounted at their requisite distance and height |
Environmental | |
Air Quality | The device should be sufficiently guarded against potential air quality issues (ex. in bakery environment, it is recommended to use fanless/heatsinked device) |
Corrosion | The device should be sufficiently guarded against potential corrosion issues (ex. in machining environments, direct exposure to lubricant and oil can degrade device components) |
Humidity | The device should be sufficiently guarded against potential humidity issues |
Temperature | The device should be sufficiently guarded against potential temperature issues |
Washdown/Sterilization | The device should be sufficiently guarded against potential washdown/sterilization issues (ex. in food and beverage plants, scheduled washdown is required for health and safety, and the device may be required to be hermetically sealed) |
Visualization | |
Full-Screen Mode | To maximize visual real estate, it is recommended that the browser be launched in full-screen mode |
Graphics | Charts and visual elements should be legible |
Text | All text should be legible from a reasonable distance away from the display as well as at indirect viewing angles |
Viewing (Portrait) | Ideal orientation for Shift, Hourly, and Analysis (Area) views |
Viewing (Landscape) | Ideal orientation for Layout, Dashboard, Chrono and Flex Chrono views |
Table 8: Display Considerations
The following sections are based on options that Shoplogix has historically seen deployed at customer facilities and should not be considered as either exhaustive or prohibitive of alternate solutions, including reallocation of existing resources for this project. It is the sole responsibility of the customer to source, requisition, purchase (or repurpose), and maintain hardware while ensuring conformance to their facility’s environmental, operational, and IT policies and needs.
Operator Data Entry
Workstations
Workstations are typically used in fixed areas of operations, where there is little necessary movement from the operator to get to and from the production area. As far as Shoplogix is concerned, workstations can either be thin or fat clients at the discretion of the customer, so long as the workstation can perform data entry, data visualization, or both functions as required. Keep in mind that the Shoplogix web portal requires internet access, through a URL by whitelisting or not, so the system specifications are based on a web browser’s minimal requirements while the environmental factors to consider as substantial. Depending on whether the purpose is for data entry or visualization, some items on the list below of historically used workstations by our customer-base may be more relevant than others – the list is neither exhaustive nor prohibitive:
Vendor | Product | Notes |
Dell | OptiPlex Micro Series | Workstations must have internet access to the Shoplogix web portal, whitelisted or not Configure to auto-launch web browser directed at the Shoplogix landing URL is strongly recommended Mounting brackets can be used to attach to the backside of monitors and TVs |
Intel | Compute Stick | |
Intel | NUC | |
Lenovo | ThinkCentre Tiny Series | |
Lenovo | Ideacentre Stick | |
Raspberry Pi | Pi 4 |
Note: workstations require an associated monitor for display, network access, and peripheral equipment including keyboard and mouse if not touchscreen capable.
Tablets
Tablets are a great tool for operators to interact with the Shoplogix system for data entry and data visualization while being able to freely remove around their production area. In general, so long as the tablet can run a web browser and can access the Shoplogix web portal, whitelisted or not, it is sufficient. Below is a list of historically used hardware by our customer-base – the list is neither exhaustive nor prohibitive:
Vendor | Product | Notes |
Acer | Enduro | Tablets must have internet access to the Shoplogix web portal, whitelisted or not Configure to auto-launch web browser directed at the Shoplogix landing URL is strongly recommended Mounting brackets and enclosures can be used to attach to a serviceable location for ease of access |
Amazon | Fire Tablet | |
Apple | iPad | |
Pixel Tablet | ||
Lenovo | Smart Tab | |
Samsung | Galaxy Tab S Series |
Facilities Data Visualization
Televisions
There are dozens of brands and hundreds of models of deployed televisions across our customer-base with the common restriction being not using Smart TV in-built web browsers due to their limited CPU, memory, and security updates that causes poor performance when accessing the Shoplogix web portal for extended periods of time. Environmental, operational, and IT policies and needs will dictate which TVs should be used.
Barcode Scanners
Some processes can be augmented with a manual barcode scanner to work inline with manual entry on a workstation for the Shoplogix system. Shoplogix leverages the wedge-scanner functionality of 1D/2D barcode scanners to inject delimited string values. Below is a list of historically used scanners by our customer-base – the list is neither exhaustive nor prohibitive:
Vendor | Product | Notes |
Datalogic | Gryphon Series | Applicable with Bluetooth, USB, or Wireless scanners Per-scanner configuration to function as wedge-scanner required Generation of barcode template that conforms to required syntax used for Shoplogix required |
Datalogic | QuickScan Series | |
Honeywell | Voyager Series | |
Honeywell | Xenon Series | |
Zebra | DS Series |
Note: As scanner functionality is not configured for the core product, service time will need to be allocated to work with local customer resources to implement; if required, consult your implementation manager for further information.
Note 2: IP scanners have not been tested for production.
Ancillary Software
Shoplogix uses various software tools during the implementation and support phases of projects to assist with deployment and troubleshooting respectively. Below is a list of applications that historically have been used during a project life cycle – although neither exhaustive nor prohibitive, the listed software are grouped into assumed risk-levels as related to vendor trusted status or to atypical data payload and/or network traffic access:
Vendor | Product | Description | Source |
Low-to-No Risk – listed software are from trusted vendors or have no access to data payload or network traffic | |||
Advantech | AdamApax .NET Utility | Configuration and Diagnostic tool for the ADAM-6xxx and WISE-4xxx I/O devices | |
Bare Metal Software | Baretail | Real-time log file monitoring tool | |
Microsoft | PortQryUI | Troubleshoot TCP/UDP port issues | |
Notepad-plus-plus | Notepad++ | Alternate text editor with language and encoding visualization capabilities | |
Medium-to-High Risk – listed software may have atypical access to monitor data payload or network traffic | |||
iNTERFACEWARE | Iguana | HL7, XML, JSON, and CSV business system integration tool typically used in medical EMR | |
Simon Tatham | PuTTY | Open-Source terminal emulator, serial console and network file transfer application | |
Wireshark Foundation | Wireshark | Open-Source packet analyzer used for network troubleshooting and analysis |
Table 12: Ancillary Software List
iNTERFACEWARE Iguana
iNTERFACEWARE’s Iguana is an optional add-on that requires additional subscription and services per quotation and purchase order independent of the core implementation services and subscription costs due to the application engineering time required per use-case. The Shoplogix Data Collector software can leverage Iguana solution to Extract, Transform, and Load (ETL) parsed ERP job standards and other non-OPC-centric data. Iguana has two standard deployment topologies, depending on use-case: cloud-hosted solution and on-premise solution.
Operating Requirements
CPU: | Intel-i3 |
Memory: | 4 GB |
Free Disk Space: | Varies depending on message load |
Operating System: | Windows 8, 10, or 11 Windows Server 2016, 2019, or 2022 Mac OS X Linux |
Table 13: Operating Requirements for Iguana
Port Exceptions
Port Number | Description |
iNTERFACEWARE Iguana – default [user configurable] – internal communication | |
6543 | Dashboard |
Table 14: Port Exceptions for Iguana
Application Exceptions
Application | File Path – default [user configurable] |
iNTERFACEWARE Iguana – external/internal communication | |
Iguana Runtime | %ROOT%\Program Files\iNTERFACEWARE\Iguana\iguana_service.exe |
Table 15: Application Exceptions for Iguana
Directory Whitelisting
File Path – default [user configurable] |
iNTERFACEWARE Iguana |
%ROOT%\Program Files\iNTERFACEWARE\ |
%ROOT%\Program Files (x86)\iNTERFACEWARE\ |
Table 16: Directory Whitelist for Iguana
Service and User Permissions
Service | User Access |
iNTERFACEWARE Iguana | |
iNTERFACEWARE Iguana | Local System |
Table 17: Services and User Permissions for Iguana