Reach PI System’s full potential


Implementation

Interface

Upgrade

High Availability

Developing

Reports

Training

Outsourcing

Audit

Slider

PI System Audit


For this service, the main objectives to achieve are:

  • Audit the existing PI System architecture in its current state.
  • Diagnose System security and performance problems.
  • Specify the conditions for the use of licenses and versions.
  • Evaluate current management practices and propose improvements.
  • Evaluate the functionality and usefulness of third-party applications.
  • Provide a support plan and improve performance and use of the system.
  • Provide a backup plan for the system.
  • Propose a scalable system growth plan.

The audit consists of reviewing the installation, configuration and use of PI System and its components, ending with the delivery of an audit report.

The service is performed on site by professionals from PIPER Solutions, certified by OSIsoft as specialists in PI System infrastructure and installation.

Benefit


  • Ensure optimal growth of the PI System.
  • Reduce indirect costs in managing the PI System.
  • Opportunity to implement best practices for PI System Administration.
  • PIPER offers improvement and solution alternatives to current problems that can be identified in the PI System infrastructure.
  • Opportunity to optimize the full performance of the PI Server.

The scope of this package is limited to a single site comprised of 1 PI Server node, up to 5 interface nodes, 1 System Manager node, 3 custom or third-party applications and up to 5 PI Client stations.

Audit deliverables


  • Pre-visit checklist review, confirmation that all prerequisites are met before continuing.
  • Software audit:
    • PI version inventory Server ™, PI Client and PI Interface ™.
    • Audit of license usage.
  • Performance and configuration audit:
    • Review of the PI System ™ architecture.
    • Inventory of hardware and software.
    • Inspection of records PI System.
    • PI System performance metrics and stress testing inspection.
    • Review the security model.
    • Review high availability options .
    • PI Tags configuration audit.
    • Review of PI System backups and restoration procedures.
  • Audit of custom or third-party applications:
    • Architecture and functionality review of current or proposed third-party custom applications based on PI System.
  • System administration audit.
    • Review of system administration practices.
  • Brief presentation of findings and recommendations at the end of the audit service.
  • Presentation of technical support and help the client to obtain assistance from OSIsoft technical support.
  • Estimate of services recommended by PIPER.
  • Estimate of training courses recommended by PIPER.
  • Audit report (up to 80 pages).

Why request the PI System Audit service with PIPER?


PIPER Solutions professionals have the certifications of PI System Installation Specialist and PI System Infrastructure Specialist, which accredit them to perform installations of all PI System components under the best practices recommended by OSIsoft®.

In addition, PIPER works closely with the development, training and technical support teams of OSIsoft® to guarantee assistance and specialized knowledge in the product line OSIsoft offers its customers.

Why request the PI System Update service with PIPER?


PIPER Solutions professionals have the certifications of PI System Installation Specialist and PI System Infrastructure Specialist, which accredit them to perform installations of all PI System components under the best practices recommended by OSIsoft®.

In addition, PIPER works closely with the development, training and technical support teams of OSIsoft® to guarantee assistance and specialized knowledge in the product line OSIsoft offers its customers.

Contents of the audit report


  • 1. Introduction.
  • 2. Audit deliverables.
  • 3. Current PI System architecture, licenses and use.
  • 4. PI System Logs.
  • 5. PI System Performance Metrics.
  • 6. PI Data Archive Security Model.
  • 7. PI Asset Framework Security Model.
  • 8. PI Tags Configuration.
  • 9. Asset Framework.
  • 10. Backup status and procedure.
  • 11. Inventory of third-party applications.
  • 12. Management Practices.
  • 13. Recommendations based on Best Practices.
  • 14. Facilities and training.
  • 15. High Availability Options.
  • 16. OSIsoft Technical Support.
  • 17. Conclusions.
  • 18. Additional information.
  • 19. Evidence.

Timeline


The upgrade process, from ordering to completion, normally takes 3 to 4 weeks:

Week 1 - Communication of prerequisites. Confirmation of installation date with PIPER.

Week 2 – On-site visit (up to three days).

Weeks 3 – Prepare and transmit a final audit report.

Audit requirement


  • Customer’s technical staff needs to be available to provide system access for the duration of the audit (PI System, Security, Network, and Control Systems).
  • Customer must provide the list of nodes to be audited (PI Server, PI Interface nodes, Administrator console, Custom or third-party applications and clients).
  • Customer must provide a configuration station with the PI System Management Tools™ (PI SMT) and Microsoft® Excel® software.
  • Customer must provide an up-to-date network architecture drawing.
  • Customer’s technical staff must be available to answer questions about existing data sources.
  • Customer’s application users must be available to answer questions about existing and desired applications.
  • Customer must arrange for safety training, and any permits required.
  • Customer must guarantee the validity of the security permits required for access to their organization as a prerequisite to the visit.

Does this information seem interesting to you? Share it


Our commitment to you


Commitment and Support in Peru
We become your Strategical Partners
Knowledge and Integration with the Industry
Certified Professionals in the PI System