Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Document how to extract the logfiles from the backups #153

Closed
randomaztec opened this issue Apr 11, 2019 · 10 comments
Closed

Document how to extract the logfiles from the backups #153

randomaztec opened this issue Apr 11, 2019 · 10 comments
Labels
documentation A documentation-related issue.

Comments

@randomaztec
Copy link

randomaztec commented Apr 11, 2019

removed query answered elsewhere
trf files are not available on synergy models as per presentation below

http://chapter.aapm.org/nccaapm/z_meetings/2017-04-07/04_Agenda_and_Presentations/1145_Wiesmeyer_2017-Spring-Meeting.pdf

@SimonBiggs
Copy link
Member

SimonBiggs commented Apr 11, 2019

Hi @randomaztec

We have an Elekta Synergy with an Agility head. Not sure if the Agility head makes the difference, but our logfiles are accessible as long as the diagnostics backups are running.

I have created a tool that automatically pulls from the backup shared drive, then queries MOSAIQ to index them. I need to get the chance to write up the documentation for using those tools. Once that documentation is ready it shall appear at https://pymedphys.com/en/stable/projects/elekta-logfiles.html#basic-implementation

As a stop gap, before that documentation arrives, here is a method to manually extract those logfiles.

Run the diagnostics backups, either on a schedule, or trigger the backup manually.

Download the diagnostics backups from the NSS shared drive.

To get this NSS backup, let me explain a few things:

The Linac has two networks. It has an internal network and a hospital network. The NSS is the firewall between the two. The NSS has an IP address on both the hospital network and the Linac network. For our purposes here we are interested in the NSS hospital network IP. All you need to do is type into a file browser the hospital network IP address of the NSS on another (non-Elekta) computer that is also on the hospital network and then you should be able to access the backup files. The address in your file browser you want to write will look something like:

\\[NSS Hospital IP]\Backup\TCS

For example, if your NSS Hospital IP is 192.168.1.40 then you would write:

\\192.168.1.40\Backup\TCS

At that point you need to provide an NSS password on your personal computer. Precede the user name with a backwards slash.

For example, if the user name password combinations on the NSS is "george", "macdonald" then you would write within username on your PC's login prompt "\george", and password you would write "macdonald".

You'll need to talk to someone in your centre, that Elekta engineer would be perfect, for one of those user/password combinations.

From there, as long as a diagnostic backup has been run, you'll find some files that start with SDD and end in .zip. You can then copy those, and extract them to your local machine. These trf zip files are not encrypted. The TRF files themselves can then be decoded with the pymedphys TRF decoder tool. A bunch of the files in there are .trf files, they're the ones that can be decoded.

I have written tools that automatically pull these SDD files, then use MOSAIQ SQL to index them by patient ID. They are in the process of having docs written up also. But the first parts of the docs for that tool can be found at https://pymedphys.com/en/stable/user/interfaces/cli/logfile.html

@SimonBiggs
Copy link
Member

Also, wanted to add, this is the perfect forum for questions. See:

http://pymedphys.com/en/stable/getting-started/faq.html#i-need-help-how-do-i-ask-for-help

@SimonBiggs SimonBiggs changed the title Elekta logfiles Document how to extract the logfiles from the backups Apr 11, 2019
@Matthew-Jennings Matthew-Jennings added the documentation A documentation-related issue. label Apr 24, 2019
@SimonBiggs SimonBiggs pinned this issue Apr 24, 2019
@jasqs jasqs unpinned this issue Apr 24, 2019
@mchamberland
Copy link
Collaborator

@SimonBiggs Hey, in the process of trying to push dicom files to Service Mode for Winston-Lutz (see #584), I ended up enabling the NSS shared drive, so I have access to trf files now!

Is there any documentation about logfiles analysis? Or can you give me a just a very quick rundown of the tools available right now? I can figure out most of it by looking through the repo, but you may be able to give me a head start.

@SimonBiggs
Copy link
Member

Certainly :) How bout I describe our setup.

At D:\LinacLogFiles on a server that can access the diagnostic backups I have the following files:

config.zip

Of importance, within Windows credential manager on the computer running the logfile code the NSS share login needs to be saved. The .bat file in there is set within Windows scheduler to run each night. It searches each of the Linac IPs detailed, it downloads the diagnostic backups, extracts the .trf files, and then logs in to Mosaiq to identify them.

Once you have identified logfiles we then run the following notebook to log into mosaiq, look at our QCLs, and then based on the outstanding QCLs we go and read the MLC shapes directly our of Monaco's tel.1 files and compare them to the logfile record via a sort of fluence comparison:

https://github.com/pymedphys/pymedphys/blob/master/examples/site-specific/cancer-care-associates/production/Logfiles/MU%20Density/QCL%20Based%20Logfile%20to%20Monaco%20Comparison.ipynb

Hopefully that gives you a bit of a kick start :).

@SimonBiggs
Copy link
Member

If you did want to throw your experience in a document of some sort I would absolutely love to be able to add that to the documentation.......

@mchamberland
Copy link
Collaborator

Thanks, very helpful!

I'll try to keep notes on what I do. Still not sure what I want or can do with those log files, so this is all exploratory.

@SimonBiggs
Copy link
Member

I also have some code that maps the log file to a DICOM plan file for sending back to the TPS if that is helpful.

@SimonBiggs
Copy link
Member

SimonBiggs commented Jan 11, 2020

Also, within those backups is also an RMX file. I have only had an initial investigation, but I believe that file contains the record of all of the Linac set numbers (2RI Ctrl etc). It would be quite great to be able to decode those into a human readable format. If you're feeling adventurous that'd be quite amazing to have access to.

@Son21042022
Copy link

Hi @randomaztec

We have an Elekta Synergy with an Agility head. Not sure if the Agility head makes the difference, but our logfiles are accessible as long as the diagnostics backups are running.

I have created a tool that automatically pulls from the backup shared drive, then queries MOSAIQ to index them. I need to get the chance to write up the documentation for using those tools. Once that documentation is ready it shall appear at https://pymedphys.com/en/stable/projects/elekta-logfiles.html#basic-implementation

As a stop gap, before that documentation arrives, here is a method to manually extract those logfiles.

Run the diagnostics backups, either on a schedule, or trigger the backup manually.

Download the diagnostics backups from the NSS shared drive.

To get this NSS backup, let me explain a few things:

The Linac has two networks. It has an internal network and a hospital network. The NSS is the firewall between the two. The NSS has an IP address on both the hospital network and the Linac network. For our purposes here we are interested in the NSS hospital network IP. All you need to do is type into a file browser the hospital network IP address of the NSS on another (non-Elekta) computer that is also on the hospital network and then you should be able to access the backup files. The address in your file browser you want to write will look something like:

\\[NSS Hospital IP]\Backup\TCS

For example, if your NSS Hospital IP is 192.168.1.40 then you would write:

\\192.168.1.40\Backup\TCS

At that point you need to provide an NSS password on your personal computer. Precede the user name with a backwards slash.

For example, if the user name password combinations on the NSS is "george", "macdonald" then you would write within username on your PC's login prompt "\george", and password you would write "macdonald".

You'll need to talk to someone in your centre, that Elekta engineer would be perfect, for one of those user/password combinations.

From there, as long as a diagnostic backup has been run, you'll find some files that start with SDD and end in .zip. You can then copy those, and extract them to your local machine. These trf zip files are not encrypted. The TRF files themselves can then be decoded with the pymedphys TRF decoder tool. A bunch of the files in there are .trf files, they're the ones that can be decoded.

I have written tools that automatically pull these SDD files, then use MOSAIQ SQL to index them by patient ID. They are in the process of having docs written up also. But the first parts of the docs for that tool can be found at https://pymedphys.com/en/stable/user/interfaces/cli/logfile.html

Hi @SimonBiggs, I tried extracting the log file your way, but we only get the .dat file but not the .trf file. We hope to have your support to be able to extract the trf log file. Best regards

@SimonBiggs
Copy link
Member

@mchamberland, do you have any idea what might be going on here for @Son21042022?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
documentation A documentation-related issue.
Projects
None yet
Development

No branches or pull requests

5 participants