In principle, all Solar-Log™ models (Solar-Log Base 15, 100 and 2000) are capable of reliably monitoring a PV plant. The models differ primarily in how large the plant is. The Solar-Log Base 15 can be connected up to a plant size of 15 kWp, the Solar-Log Base 100 up to 100 kWp and the Solar-Log Base 2000 is designed for a maximum of 2000 kWp Extension licences are available for certain models.
The following details are important to have when selecting the best data logger for your needs: plant size, the availability of Internet, inverter type and series.The selection of accessories also helps when deciding on the Solar-Log™ models..
Here is an overview of all Supported Components by Solar-Log™ devices: Supported components
If you have a request for PV system design, please contact us and give us so many details as possible, as they will help us to offer you a professional and optimal solution.
The Solar-Log is supplied with power via a 24 V power supply unit (if required via a 12 V power supply unit).
The Solar-Log has a battery-buffered Real Time Clock, or RTC for short. An internal circuit ensures that the battery supplies the RTC and that it only discharges when there is no external power supply for the Solar-Log.
The RTC and therefore the respective time will continue to run in the absence of an external power supply. This is important for recording the data with the correct time stamp after the power supply has been interrupted, as it may take some time to synchronise the system time on the Internet.
The battery has been sized so that the Solar-Log Base continues to record the system time for at least 3 years from production without an external power supply.
Log in with the account symbol (top right) to create a new plant under your account. Switch to "My Plants" and click on the plus symbol. Then a window appears to enter the "Plant Name" and "Serial Number." Enter the "Easy Code" if the Solar-Log™ should register automatically to the portal. Remove the top gray cover on the device to find the serial number and Easy Code. Then click on "Save." The plant is then automatically created. All the necessary information that needs to be entered in the Solar-Log™ to transfer data is located in the plant's "Access Data" section on the portal.
If it is necessary to replace a Solar-Log™ device at your plant, you do not need to register the new device. The device replacement can be performed with you existing account.
The following steps are necessary to replace a device in the Solar-Log WEB-Enerest™ portal. Log in with the account symbol. Switch to "My Plants." Go to the plant where the device needs to be replaced and click on the tab "Solar-Log™ Replacement." Enter the serial number from the new Solar-Log™ in the serial number box (remove the top gray cover on the device to find the serial number) and then click on the "Replace" button. This completes the device replacement process and the Solar-Log™ now transfers its recorded data to the WEB portal.
To create a new password in Solar-Log WEB-Enerest™, log in with the account symbol, go to "Personal information" and click on the "Password" tab. You can generate a new password in the "password" box. After clicking on "Change Password" to save the password, the password will be activated and sent via e-mail to the registered e-mail address.
If you have forgotten your password, go to the account symbol (top right) and click on the link "Forgot your password?." Then the "Recover Password" window appears where you have to enter the e-mail address used for registration. A randomly generated password is send to this e-mail address. Please change this password right after you log in with it. (Refer to "Creating a new password in Solar-Log WEB-Enerest™).
If the Solar-Log WEB Enerest™ service for certain PV plants is not to be extended, there are two possibilities how this can be implemented. Use the link below to obtain a document explaining these options.
Download: Solar-Log WEB Enerest™ Billing Portal
All information about the Enerest ToGo APP from Solar-Log™ can be found under the following "Online help" link.
APP FAQ page
The following link will provide you with instructions on how to set the PC to DHCP in order to connect directly with the Solar-Log™ Base by means of the crossover cable and then configure it. See chapter "Connect the Solar-Log™ Base to the network/PC".
When, for example, 105 kW or more is connected to a Solar-Log Base , exceeding its limit of 100.99 kW. The following occurs: FTP Export is disabled (Remote Configuration still works). HTTP Export is disabled (Remote Configuration still works). The sending of error and yield notifications is disabled. The following message appears in the web interface: "The amount of connected generator power allowed for this device has been exceeded. The device's use is limited. Please check the device configuration."
The following checklist will assist you step by step in connecting inverters to the Solar-Log™ system. Notes on the wiring and interface are provided.
Download: Checklist Inverter Detection
You can find step-by-step information on how to proceed in these general directions for inverter replacement.
Download: Inverter Replacement Manual
Commissioning as of 01.01.2016/ system size as of 100 kWp
Commissioning as of 01.08.2014/ system size as of 500 kWp
Plants below 100 kWp and existing plants can optionally participate in direct marketing. Please contact us and request a quote for our direct marketing solution.
Solar-Log 1000/ 1000 PM+, 1200/ 1200 PM+, 1900/ 1900 PM+, 2000/ 2000 PM+,
Prerequisite is at least firmware version 3.3.0.
Solar-Log™ Base 15/100/2000 from firmware version 5.0.
If you want to operate direct marketing with a master-slave PV system, please send us the following information via the contact form:
We will get in touch with you and will be happy to provide you with an individual solution option.
Yes, provided that the control is carried out via the Solar-Log™ direct marketer licence. The Solar-Log™ then implements the lower power specification of the grid operator or direct marketer.
Check this quickly and easily in our component database. Please select "Direct marketer" under Component and then the desired manufacturer.
Do you want to change a direct marketer or exchange a direct marketer certificate? Please follow this link. It explains the background and the necessary steps.
Yes, contact us and we will help you. Please include the ticket number of the previous transaction and the name of the PV park.
This licence is available in our licence shop and can be purchased there. Please log in to our licence shop with your Solar-Log WEB Enerest™ account. After activation, simply click on "Synchronise" in the Solar-Log™ menu under Configuration, System, Licence.
IT security protects against threats such as hacking, data loss or cyber attacks, which can jeopardise both operations and data integrity. For us as a company, IT and data security is a top priority, as our products rely on correct and tamper-free data. On the other hand, our high IT security standards not only protect our own infrastructure, but also that of all our customers where our products are directly connected to the customer's systems.
We follow various international standards such as ISO/IEC 27001 and ensure that all security policies and procedures comply with them. We also carry out regular audits and penetration tests by external specialists.
We follow various international standards such as ISO/IEC 27001 and ensure that all security policies and procedures comply with them. We also carry out regular audits and penetration tests by external specialists.
Yes, our company has a specialised IT security team that takes care of the implementation and monitoring of security measures.
We have a structured process that quickly identifies, prioritises and immediately rectifies security vulnerabilities to ensure the integrity of our systems.
Our servers are located in various data centres within the EU.
We use various encryption technologies for data transmission and data storage for the different product areas in hardware, embedded and digital interfaces.
Our cloud partners are ISO 27001 certified and we utilise advanced encryption and access control mechanisms to ensure data security. In addition, the relevant data is replicated multiple times to ensure the possibility of data recovery and to provide redundancy in the event of errors.
Yes, we have a transparent privacy policy that describes how we collect, store and process personal data. You can access this directly in the respective product areas.
We continuously monitor all relevant legal changes and adapt our security policies and procedures accordingly. In addition, all employees are continuously sensitised to data protection requirements and receive further training.
We ensure the protection of personal data through anonymisation, encryption and strict access controls in accordance with the requirements of the GDPR. We guarantee this for all customers worldwide.
In the event of a data breach, we have implemented appropriate processes to ensure that all affected parties are informed immediately and that appropriate steps are taken to minimise the impact and eliminate the causes.
User rights are assigned on the basis of the principle of least privilege and through role-based access controls.
We use multi-factor authentication (MFA) and role-based access controls to secure access to sensitive data and systems. In addition, there are corresponding password security requirements and continuous training for specially authorised employees for sensitive systems.
In addition to password authentication with increased password complexity requirements, we rely on multi-factor authentication (MFA) for an additional layer of security.
In particular, our systems log critical changes and offer the option of auditing user actions. Thanks to the existing role concept, we also prevent unauthorised or unapproved users from making changes.
We use secure coding practices, carry out regular code reviews and use automated security scans.
Security updates are released immediately or closed by updates as soon as a potential security problem is identified.
We carry out continuous penetration tests, automated security scans and security audits to quickly identify potential vulnerabilities.
Yes, we also provide security patches for older versions if this is necessary to ensure the security of our customers. In particular, we communicate continuously about the hardware product versions that are still supported.
We use firewalls, intrusion detection systems (IDS), anti-malware solutions and regular penetration tests, among other things, to protect ourselves from threats.
We have an incident response team that takes immediate action in the event of an incident to minimise the damage and restore the system quickly.
Customers are proactively informed if their data is affected and receive a detailed explanation of the measures taken to minimise the damage.
Yes, our emergency plan contains clear guidelines and processes for responding quickly to data breaches in order to minimise the impact on customers and systems.