|
Audience: IT administrators and DevOps engineers deploying the product in enterprise environments (Windows Server, on-premises, or private cloud). This page is an operational workflow — install, configure, monitor, update, secure. For deep product reference, each section links to the corresponding technical page. |
A typical enterprise deployment has three layers:
For architecture context and sizing, see Platform Architecture Reference and Deployment Scenarios.
Other deployment modes (Linux, Docker/Kubernetes, edge devices, mobile clients) are supported but outside the scope of this runbook. See the links in section 10 below.
Before installing, decide:
Run the signed installer and follow the wizard. Default install location is C:\Program Files\Tatsoft\FrameworX\. Full step-by-step reference: Installation and Licensing Reference.
The installer is an Inno Setup package and supports standard silent switches for SCCM, Intune, PowerShell DSC, Ansible, or any deployment pipeline:
Start-Process -FilePath "FrameworX-10.1.5-Setup.exe" `
-ArgumentList "/VERYSILENT", "/SUPPRESSMSGBOXES", "/NORESTART", `
"/LOG=C:\Logs\frameworx-install.log", `
"/DIR=C:\Program Files\Tatsoft\FrameworX" `
-Wait -PassThru |
Common switches:
Switch |
Purpose |
|---|---|
|
Fully silent — no progress, no prompts |
|
Suppress all message boxes (use with /VERYSILENT) |
|
Prevent automatic reboot on completion |
|
Override default install directory |
|
Write install log to specified file |
Install exit codes:
Code |
Meaning |
|---|---|
0 |
Success |
1 |
Setup failed to initialize or user aborted |
2 |
User cancelled during preparation |
5 |
Install aborted (user cancelled during copy) |
3010 |
Success — reboot required to complete |
The .NET 8 runtime can also be deployed by copying the installation folder. Useful for portable deployments, custom update pipelines, and locked-down environments where MSI-style installs are blocked. See Runtime Installation Reference.
Standard install layout:
Location |
Purpose |
|---|---|
|
Executables and supporting libraries (read-only after install) |
|
User-facing content: solutions, exchange folder, screenshots, trace logs (default) |
|
Optional location for operational data when configured for enterprise deployments |
Full layout reference: Installation Folders and Utilities Reference.
For production, the runtime should run as a Windows Service so it starts automatically with the machine, survives user logouts, and is managed through standard Windows tooling (sc.exe, Services.msc, Get-Service).
Service install options:
TManageServices.exe (located in the product root folder) from an elevated shellExample: install the runtime as a Windows Service for a specific solution, unattended:
cd "C:\Program Files\Tatsoft\FrameworX"
.\TManageServices.exe /installtstartup `
/solution:"C:\Users\Public\Documents\FrameworX\Solutions\Plant1.tproj" `
/silent
# Uninstall later
.\TManageServices.exe /uninstalltstartup /solution:"Plant1" /silent |
TManageServices.exe also handles TWebServices, TSecureGateway, TMQTTBroker, THardkey, and RuntimeMCPHttp. Run TManageServices.exe /? for the full command list. The /silent flag makes it script-friendly: it never pauses for input and returns a non-zero exit code on failure. Full reference: Runtime Startup Reference.
Run the service under a dedicated domain account where possible. The account needs:
Web client, REST endpoints, and runtime HTTP services are hosted by the built-in web server. Configure ports, TLS certificates, and optional reverse-proxy routing as described in Web Server Configuration Reference.
Online activation is used for internet-connected servers. Offline activation (license file transfer) is supported for air-gapped networks. See Licensing Procedures Reference.
Typical enterprise deployment ports:
Port |
Protocol |
Service |
Direction |
|---|---|---|---|
3101 |
TCP |
Runtime client-server |
Inbound from Rich Clients |
3110 |
HTTP |
Web client (non-TLS) |
Inbound from browsers |
3111 |
HTTPS |
Web client (TLS) |
Inbound from browsers |
4840 |
TCP |
OPC UA Server (optional) |
Inbound from OPC clients |
1883 / 8883 |
TCP / TLS |
MQTT broker (optional) |
Inbound from MQTT clients |
1433 / 5432 / 1521 |
TCP |
SQL Server / PostgreSQL / Oracle |
Outbound from runtime to DB |
Default runtime and web ports are configurable. Exact values depend on solution configuration — see Runtime Startup Reference and Server Configuration Reference.
The runtime writes trace logs by default to C:\Users\Public\Documents\FrameworX\TraceLogs\. The location is configurable per solution via Solution Settings; enterprise deployments typically relocate it under ProgramData so it's picked up by Windows-standard log collectors (Splunk forwarder, Datadog agent, Azure Monitor, ELK).
Install logs are written to the path specified by /LOG= during silent install, or to %TEMP%\Setup Log YYYY-MM-DD.txt for interactive installs.
Windows logs basic service start, stop, and unexpected termination events for every installed FrameworX Windows service to the System event log under source Service Control Manager. SCOM, Azure Monitor, Datadog, PRTG, and other Windows-native monitoring tools pick these up automatically without any custom configuration — point your alerts at the service name (for example, TStartup-<SolutionName>).
Application-level events (solution load failures, license errors, module exceptions) are written to the runtime TraceLogs. When an Event Log entry indicates a service failed to start, the root cause detail is in the most recent TraceLog file.
The built-in System Monitor exposes live metrics on tags, modules, memory, and client sessions. See Runtime System Monitor Reference and Runtime Diagnostics Reference.
Updates within the same major version (e.g. 10.1.5 to 10.1.6) can be applied by running the newer installer over an existing installation. The installer supports side-by-side versioning with rotation, so a minor update can be rolled back by re-running the previous installer. Full semantics: Managing Updates and Multiple Versions Reference.
Before updating a production server:
C:\Users\Public\Documents\FrameworX\Solutions\)Uninstall from Programs & Features or silently:
"C:\Program Files\Tatsoft\FrameworX\unins000.exe" /VERYSILENT /SUPPRESSMSGBOXES /NORESTART |
The uninstaller removes the installed executables, the Windows Service registration, and the registry entries. User content under C:\Users\Public\Documents\FrameworX\ is preserved — remove manually if you want a fully clean uninstall.
To remove only the installed Windows services (without removing the product files), use:
cd "C:\Program Files\Tatsoft\FrameworX" .\TManageServices.exe /removeallservices /silent |
Production deployments should follow the hardening checklist. Topics include TLS configuration, authentication (local users, Windows authentication, Active Directory), role-based access control, secrets storage, audit logging, and network segmentation.
Typical automation patterns:
3010 as a soft-reboot signal.Start-Process with the silent switches and check exit codes for the product installer; use TManageServices.exe /silent for service install/uninstall steps..dbsln solution file to the target server's Solutions folder, then run TManageServices.exe /installtstartup /solution:"<path>" /silent to install the runtime as a service. Solutions are self-contained.unins000.exe with silent switches across a fleet, or TManageServices.exe /removeallservices /silent to clean services only.Symptom |
First place to look |
|---|---|
Service won't start |
Windows System event log (source |
Port conflict |
|
License error |
Runtime TraceLogs for the detailed license error, then Licensing Procedures Reference |
Client can't connect to runtime |
Firewall rule on runtime port, |
Web client blank / auth error |
TLS certificate validity, browser console, Web Server Configuration Reference |
Database connection fails |
Service account permissions, connection string, firewall rule to DB server |
Deep reference: Runtime Troubleshooting Reference.
When opening a support ticket, collect: the most recent TraceLog file, the install log, the output of Get-Service for the runtime service, the relevant Windows System event log entries for the service, and the solution build number.
This runbook focuses on typical enterprise Windows Server deployments. Other modes are supported — see the dedicated references: