Table of Contents
- Getting Started
- Agent-Based Management
- Common Tasks
- Data Providers
- Directory Services
- Auditing
- Hosts
- Templates
- Template Properties
- Batch Update Templates
- Assign Templates
- Log Management Templates
- SCAP Compliance Monitor
- Active Directory User Monitor Templates
- File and Directory Monitor Templates
- Windows Monitor Templates
- Account Lockout Monitor Template
- Logon Monitor Template
- CPU Monitor Template
- Memory Monitor Template
- Disk Space Monitor Template
- SMART Monitor Template
- Process Monitor Template
- Service Monitor Template
- Performance Counter Monitor Template
- PowerShell Template
- Registry Value Monitor Template
- System Security Monitor Template
- Task Scheduler Template
- Clock Synchronization Template
- Defragment NTFS Disks Template
- Windows Audit Policy Monitor Template
- Windows Logon As Monitor Template
- Windows Update Template
- WMI Query Template
- Network and Application Monitor Templates
- Database Monitor Template
- Directory Service Monitor Template
- DNS Blacklist Monitor Template
- DNS Monitor Template
- Domain Expiration Monitor Template
- Network Speed Monitor Template
- Ping Monitor Template
- Database Table Reseed
- SQL Server Shrink and Backup Template
- SSH Shell
- TCP Port Scan Monitor Template
- Website Monitor Template
- Wake On LAN Template
- SSL Certificate Monitor Templates
- Email Monitor Templates
- SNMP Monitor Templates
- Windows Accounts Templates
- Monitors
- Reports
- Auto-Configurators
- Filters
- Actions
- Database Actions
- Desktop Actions
- Email Actions
- Event Log Actions
- Executable Actions
- File Actions
- IIS IP Address Restriction Actions
- Microsoft Teams Actions
- PowerShell Actions
- Report Actions
- Service Actions
- SMS Actions
- SNMP Trap Actions
- Syslog Actions
- Template Actions
- IIS IP Address Restriction Actions
- Action Variables
- Schedules
- Environment Variables
- Options
- SNMP
- SSH Shell
- Syslog
- Shared Views
- Active Directory User and Group Filters
- Assign Actions
- Assign Azure Audit Logs
- Assign Consolidated Logs
- Assign Directories
- Assign Disks
- Assign Event Logs
- Assign Files
- Assign Services
- Assign Shares
- Auto-Config Host Assignment Properties
- Define CSV and W3C Log Entry Columns
- Define Log Entry Columns
- Define Log Entry Columns with Regular Expressions
- Executable Status
- Executable Timeline
- Explicitly Assigned Logs
- File Explorer
- General Executable Properties
- Report Columns
- Report Date/Time Ranges
- Report Security Event Log Filters
- Select Folder or File
- Target Files and Sub-Directories
- Command Line Interface
- Server Configuration
- Agent Configuration
- Troubleshooting
- Terminology
Corner Bowl Server Manager
SIEM, IPS, Server Monitoring, Uptime Monitoring and Compliance Software
Data Provider Properties
The Data Provider Properties view enables you to view and modify a Data Provider's settings.
To view or modify a Data Provider:
- From the Explorer View, navigate to the Data Provider you want to view or modify.
- Right-click and select Properties. The Data Provider Properties View displays.
- Use the Name text box to specify a unique name.
Note
Click the Auto Generate button to automatically generate a name. If you click this button after you have set the data provider settings, the generated name reflects the settings you have selected (e.g. Primary Log Database (SQL Server)).
- Use the Type Drop-Down to select the database type. The following Types are available:
Type | Description |
---|---|
SQLite | A self-contained open-source SQL database engine. |
Microsoft SQL Server | Microsoft SQL Server v2012-2022. |
MySQL | Oracle MySQL v5.7-8x |
File System | A proprietary Corner Bowl Software developed binary flat file system. |
- Use the Role Drop-Down to select how you would like to use the database. The following Roles are available:
Role | Description |
---|---|
Log Database | Contains the latest consolidated log entries. (e.g. log entries less than 15 days old). |
Archive Log Database | Contains archived consolidated log entries previously saved to the Log Database (e.g. log entries 15 days and older). |
Auxiliary Log Database | Contains auxiliary or backup consolidated logs. Typically used to view old database backups for auditing purposes. |
History Database | Only available when using the File System. Contains monitor and report execution history (e.g. execution time, state, and results such as the number of entries downloaded). |
None | This setting has two purposes. First, to be used for Database Monitoring. Second, to be used to maintaining database connection settings for later use. |
- Use the rest of the controls to set the Type specific settings. For more information see:
- Click the Save button to save the settings.
Note
When saving a Log Database or Log Archive Database, if the database does not exist, the database and several tables are automatically created.
- Click Delete to permanently delete this object.
Important
Log Database and Archive Log Database objects cannot be deleted.