Skip to content
  • Services
    • Construction & Infrastructure
    • Mines & Quarries
  • Instrumentation
    • Blast Monitoring
    • Noise Monitoring
    • Dust Monitoring
    • Weather Monitoring
    • Vibration Monitoring
    • Accessories
  • Resources
    • Blog
    • News
    • Technical Bulletins
    • Newsletters
    • Terms & Conditions
  • About
    • Team
  • Contact
  • Services
    • Construction & Infrastructure
    • Mines & Quarries
  • Instrumentation
    • Blast Monitoring
    • Noise Monitoring
    • Dust Monitoring
    • Weather Monitoring
    • Vibration Monitoring
    • Accessories
  • Resources
    • Blog
    • News
    • Technical Bulletins
    • Newsletters
    • Terms & Conditions
  • About
    • Team
  • Contact
Facebook-f Linkedin Twitter Instagram
Call Us

T-Suite Multi-User and File Locking

  • November 11, 2022

How T-Suite Applications protect your data in a Multi-User Environment

Background

T-Link and T-Sched have long allowed their data path to be on a shared network drive, allowing network users to access the data for reporting and analysis, and facilitating system backup.

 

T-Suite 2.2 introduces Full Multi-User Locking

A combination of application level and file level locking manages the processes to keep the network data safe, but still allow network user access to data retrieval and reporting.

How is T-Suite Locking Enabled?

Locking is disabled when you first install T-Link 2.2.

You can enable locking in T-Options, under Path Options on the Data Sharing Tab, by clicking Data Path is Shared:

T-Suite-Multi-User-and-File-Locking

If you move your Data Path, Data Sharing is automatically set:

T-Suite-Multi-User-and-File-Locking-2

You can turn this off if the location is not shared, see below.

 

When T-Link, T-Sched or any other T-Suite Application is run and other locking activity is found, Sharing is enforced whether you have set the Data Path is Shared flag above or not. If you go into T-Options, this fact will be displayed like this:

T-Suite-Multi-User-and-File-Locking-3

The red Shared indication is always visible on the Paths page if the Data Path is Shared for any reason.

As shown, the Local LOG Files path is also visible after the T-Link Data Path is moved.

T-Suite-Multi-User-and-File-Locking-4.

How do you Turn off Locking?

Clear the Data Path is Shared tick box to turn off locking:

T-Suite-Multi-User-and-File-Locking-5

If Sharing is Enforced (as shown above) you will have to Clear all Locks before you can turn off Locking.

 

Clearing all Locks

Click the Clear all Locks Button to clear all currently active locks, and release the enforced sharing. You will be prompted like this to confirm this action:

T-Suite-Multi-User-and-File-Locking-6

■ This can lead to damaged or lost data

This message means that if you Clear all Locks, and another user is currently depending on these locks you may cause damaged data!

You can use the Display found locks button to check who else may be using this Data Path:

Display found Locks

Click the Display found locks button to display currently active locks, like this:

T-Suite-Multi-User-and-File-Locking-7

Here you are told there is one active user, and one active file lock. Any Running TLink Apps indicate possible data damage if locks are cleared.

If no locks are currently active this message will look like this:

T-Suite-Multi-User-and-File-Locking-8

 

It is safer to Clear Locks in this situation, but if another user starts after you do this data loss can still occur!

■ It is best to leave locking enabled in remote paths

How will I see T-Suite Locking in Action?

T-Suite Locking applies at two levels:

  • Application Locking
  • File Locking

Application Locking

In certain limited situations T-Suite applications will not run when other T-Suite applications are running at the same time. This only affects T-Sched and T-SiteExplorer:

■ Only one T-Sched can be run in the T-Link Data Path (on any PC) at a time

If T-Sched is running on any other PC in the same Data Path you will get this message when you try to start the second copy of T-Sched:

T-Suite-Multi-User-and-File-Locking-9.

■ T-SiteExplorer requires that no other T-Suite Application is running at the same time

T-SiteExplorer can move, rename, delete or import data, so any other running application on any PC on the network will cause T-SiteExplorer to abandon startup:

T-Suite-Multi-User-and-File-Locking-10.

And no other T-Suite application will start if T-SiteExplorer is running in the Data Path.

T-Suite-Multi-User-and-File-Locking-11.

T-Suite Apps won’t start if another T-Suite App is running on the Same PC

■ This happens with or without Data Sharing 

There is one exception here in that T-Link will run if T-Sched is running, BUT in a limited ‘Reports Only’ mode i.e. only the Report Button will be enabled.

T-Suite-Multi-User-and-File-Locking-12.

File Locking

When data is retrieved T-Link or T-Sched will lock the file/s it is writing to before the data is written and unlock them after the data is written, to prevent another T-Link or T-Sched writing to that data file at the same time.

This process is usually pretty quick, and mostly you will see nothing, or a ‘lock message’ like this flashes past while you are retrieving:

T-Suite-Multi-User-and-File-Locking-13

If the file remains locked for more than 5 seconds (time out counted on the ‘lock message’), you get this window:

T-Suite-Multi-User-and-File-Locking-14.

with ‘More Info’ if you want it:

T-Suite-Multi-User-and-File-Locking-15

Initially the file name, and the user and PC that locked the file is shown.

The ‘More Info’ Tickbox Shows

  • Full details on the file, so you can confirm the Shared Data Path (working folder)
  • The date and time at the file was locked

This Prevents

The box at the top is ‘This prevents’ explains what part of the process is being help up by the lock

There is also a Suggestion

■ It is always worth reading and following the suggestion

From this window you have initially only two options

Cancel

This abandons what you are doing.

You will have to confirm the cancel:

T-Suite-Multi-User-and-File-Locking-16.

■ This can result in a loss of data

Retry
This simply restarts the timeout and has another go at locking the file. In most cases this will work. Perhaps the information under Locked By will give you an indication of how long it is worth waiting.

You can retry as many times as you want.

Once you have retried once, you get the opportunity to Ignore, and an updated Suggestion!

One of the suggestion is usually to check with the person identified at ‘Locked By’.

If you click Ignore, you will have to confirm this question:

T-Suite-Multi-User-and-File-Locking-17

T-Suite-Multi-User-and-File-Locking-18

What does T-Sched do when it finds a Lock?

Clearly there is no person to manage this Ignore, Retry, Cancel process.

T-Sched automatically doubles the timeouts.

T-Sched has an inherent retry process in its task schedule, so it will safely retry any task abandoned by a locking process.

Other Multi-User Processes

Monitor History Files Identify PC and User in Monitor Activity Reports
All connections to a monitor are logged into the Monitor History and identify the date, time and action
being undertaken E.g.:

2012-12-17 17:42:30 – Connecting – Configure Custom FW:2.25

In a Shared Data Path, the PC and User name are also identified:

2012-12-19 19:16:10 – Connecting – Configure Custom FW:2.29 PC: ANDREW-VISTA User: andrewm

■ These details are available in Monitor Activity Reports

Reporting Process is Read only with data files

T-Link 2.2 updates the reporting process, so that no changes are recorded in the reported data files. This allows any user to run any type of report without affecting data retrieval by other users.

Network Path and Mapped Drive Awareness

If a PC refers to a shared path by a different name, usually because of mapped network drive identifiers, T-Link (or T-Sched) will identify this path correctly by its full UNC path.

This prevents the old “Event Files are NOT all in Working Local Path – Fix Them?” messages, and the related waveform reporting problems when for example: User A may see the T-Link Data Path as “\\Blast Data\T-Link”; while User B sees it as “T:\T-Link”; and these are the same place.

Shared System LOG File for Easy Analysis

T-Suite creates a Shared System LOG File for all Network Users in a Shared Data Path.

All T-Suite Applications from all users log their activity to this LOG File.

This greatly simplifies understanding activity across a network.

Some Details on the Shared System LOG File

The Shared System LOG file is found in the Shared Data Path and is called ‘T-LinkSystemLOG.txt’, and can be opened with Notepad.

■ Do not edit your T-LinkSystemLOG.txt file

Shared System LOG Example Entries

The System LOG File records all T-Suite Applications starting up and shutting down

It also shows if Data Sharing is Active and the current Data Path, if it has been moved:

T-Suite-Multi-User-and-File-Locking-19

T-Suite-Multi-User-and-File-Locking-20

T-Suite-Multi-User-and-File-Locking-21

Further Assistance

If you need any further assistance, please contact Texcel:
Phone: +61-7-3237 8111
Email: team@texcel.com.au

 

  • +61 7 3237 8111
  • team@texcel.com.au
  • Unit 1, 180 Northgate Rd Northgate Queensland 4013 Australia
  • PO Box 21 Virginia Queensland 4014 Australia
  • Members Login
Facebook-f Linkedin Twitter Instagram
Contact Us

Want to know more?

Ask the team at Texcel how we can automate, inform, and empower your teams with our services.

Facebook-f Linkedin

News Signup

Stay up to date on the latest industry news, technology and services from Texcel.

texcel-environmental-monitoring

Environmental monitoring made easy

Terms of Use | Privacy Policy           ©2020. All Rights Reserved | Website by Chilli

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT