Migrate the PI ICU settings away from the PI Module Database
PI ICU settings are currently the main reason why the PI Module Database continues to live on even the most up-to-date PI systems. Please consider migrating the PI ICU settings from the PI Module Database to the PI Asset Framework or a separate file.
This way, PI administrators have 1 less legacy PI feature to worry about eventually migrating and 1 less legacy PI feature that they need to keep visible in PI System Management Tools.
Kenneth Barber commented
Czuprynski, I was told back in 2016 that the PI Analysis Service is supposed to replace PI ACE. This was back when I was new to PI and wanted to know what was deprecated and what was not. I've never used PI ACE before, so I can't tell you if the PI Analysis Service has all of the functionality of PI ACE.
If we REALLY wanted to kill the PI Module Database, we could always set up our PI Interfaces without the PI ICU, but it would be harder than when we do use the PI ICU. I don't understand why the PI ICU needs to store a separate copy of the configuration settings in the PI Module Database. The settings are already contained in the batch file and PI ICU will even complain when the batch file and the PI Module Database don't match.
Krzysztof Czupryński commented
There's at least one more soft using MDB - PI ACE. Nevertheless, you are 100% right. ICU should keep it's settings out in AF. AF has been designed to replace MDB. There's one more reason - there are no tools to edit MDB. I'm now trying to improve my systems security by changing ICU identity from piadmin and I am forced to do it manually.
Michele Albicocchi commented
Interesting idea the one of the AF, even if I have some doubt about how reliable could be the Windows authentication: PI interface node and PI server are normally segregated by firewalls and not in the same domain. In similar cases (i.e. when using a PI EMDVB interface to Event Frames) we happened to get some inexplicable unauthorized errors that later disappeared again inexplicably. Today (with PI MDB) we set easily a PI trust and just open port 5450/tcp.