Please ensure Javascript is enabled for purposes of website accessibility
Powered by Zoomin Software. For more details please contactZoomin

PI System Connector

PI System Connector 2​.5​.3 release notes

  • Last UpdatedOct 31, 2025
  • 4 minute read

PI System Connector

2.5.3.74

Overview

PI System Connector provides a convenient and autonomous solution to constantly synchronize and move data from a source PI System to a destination PI System. Each PI System connection is routed through a single PI Connector Relay. The connector reads and moves Data Archive PI points and/or Asset Framework (AF) hierarchy from a source to destination PI System along with the associated asset framework library objects and the referenced PI points.

Version 2.5.3.74 is a general availability release addressing a critical bug that caused failures when transporting large AF databases, attributed by insufficient RAM. To reduce the memory footprint of exports and resyncs, a configuration option was added to exclude default values (Exclude Default Values).

Data bursts were also causing large increases in connector memory but are now handled by moving the affected points into history recovery. See the Software and hardware requirements as well as the installation and uninstall instructions for additional information on product features and functions.

Fixes and Enhancements

Fixes

This section lists items that were resolved in this release of PI System Connector:

Work Items

Description

103813

Replicating large AF databases can result in an exception "stream too long" or "System.OutOfMemoryException" being thrown.

The following fixes were made to resolve the System.OutOfMemoryException Issue

Exclude Default Values

When enabled, default values are excluded from the initial export and also on Resync. The purpose is to reduce the size of the exported file sent to the Relay.

When exporting an AF database, including default values increases the XML generated code by a significant number of XML elements. These default values are included in the XML for elements, event frames, element templates, attribute templates and attributes. With the Exclude Default Values on, the default values are not included in the export, reducing the overall memory footprint. Additionally, during import the reduced XML is processed at a greater rate.

Exclude Default Values is enabled by default. This can be configured in the data source within the connector (Data Collection Manager > Data Source Configuration).

Event Frames

Some references were lost when importing on the destination PI Server if Event Frames had identical names. We now divide Event Frame transfers into smaller chunks to avoid the System.OutOfMemoryException issue.

Data Burst Detection

The connector detects data bursts for points and handle them appropriately. Data bursts can cause large increases in connector memory. To avoid this, the point in data burst is moved back to history recovery. This detection is logged and looks similar to this: "There has been a data burst of 10 points: Example Server1*PointA"

Enhancements

There are no enhancements in this release of PI System Connector:

Known Issues

This section lists problems and enhancements that have been deferred until a future release.

Work Items

Description

95026

The PI System Connector User Interface does not always update after the final History Recovery status is sent. Refresh the browser to view the correct information.

System Requirements

Operating Systems

This interface is a 64-bit application.

The latest service packs and updates to the operating system are recommended.

  • Windows Server 2022

  • Windows Server 2019

  • Windows Server 2016

  • Windows 11

  • Windows 10

Distribution Kit Files

Product

Software Version

Microsoft .NET Framework

4.8

Microsoft Visual C++ 2019 Redistributable (x86)

14.40.33810

Microsoft Visual C++ 2019 Redistributable (x64)

14.40.33810

PI AF Client 2023 Patch 2

3.0.2.5

PI System Connector

2.5.3.74

Installation and Upgrade

The PI System Connector can be installed or upgraded using the PI System Connector installation kit (PI System Connector_2.5.3.74_.exe). This installation kit can be obtained by using the How to Download Products link listed in the AVEVA Customer Portal How To's list. This list is located on the Customer Portal site.

For additional information regarding the PI System Connector installation, please see the Installation instructions.

Uninstalling PI System Connector

The PI System Connector can be uninstalled using the Programs and Features list accessible from the Windows Control Panel. After accessing the Programs and Features list, select the PI System Connector and then select Uninstall to uninstall the interface.

Security information and guidance

We are committed to releasing secure products. This section is intended to provide relevant security-related information to guide your installation or upgrade decision.

We proactively disclose aggregate information about the number and severity of security vulnerabilities addressed in each release. The tables below provide an overview of security issues addressed and their relative severity based on standard scoring.

Overview of New Vulnerabilities Found or Fixed

This section is intended to provide relevant security-related information to guide your installation or upgrade decision. We are proactively disclosing aggregate information about the number and severity of PI System Connector security vulnerabilities that are fixed in this release.

Security vulnerabilities fixed or mitigated

The following table lists the number of fixed vulnerabilities for PI System Connector 2.5.3.74 by severity category and CVSS base score range.

Severity category

CVSS base score range

Number of vulnerabilities fixed

Critical

9.0 - 10

0

High

7.0 - 8.9

0

Medium

4.0 - 6.9

0

Low

0 - 3.9

0

This table lists the known vulnerabilities along with their mitigation in this product.

Component

Version

CVE or Reference

CVSS

Mitigation

ag-grid

12.0.2

BDSA-2024-4078

8.9

Vulnerable code cannot be controlled by adversary.

SQLite

3.43.0

BDSA-2023-3555

7.4

Vulnerable code is not present.

SQLite

3.43.0

BDSA-2023-3627

6.3

Vulnerable code is not in execution path.

ag-grid

12.0.2

CVE-2017-16009 (https://nvd.nist.gov/vuln/detail/CVE-2017-16009)

6.1

Vulnerable code is not in execution path.

JSON Web Token Handler For the Microsoft .Net Framework 4.5

6.19.0

BDSA-2024-4605

5.9

Vulnerable code is not in execution path.

ag-grid

12.0.2

BDSA-2016-1698

5.6

Vulnerable code is not in execution path.

Technical support and resources

See Technical support and other resources.

In This Topic
TitleResults for “How to create a CRG?”Also Available in