Record Caching Service configuration tabs - Security Center 5.10

Security Center Administrator Guide 5.10

Applies to
Security Center 5.10
Last updated
2023-06-12
Content type
Guides > Administrator guides
Language
English
Product
Security Center
Version
5.10

You can configure the settings of the Record Caching Service role from the Roles view of the System task in Security Center Config Tool.

Record Caching Service - Properties tab

Click the Properties tab to view the configuration of your record type. What you see on this page are the standard properties of the selected record type in the left pane.

Name
Name of the record type.
Icon
Icon or string expression representing this record type. By default, the first letter of the record type name is used.
Status
Record type status, followed by the number fields and the current number of records.

Click the number of fields to view the list of fields with their name and data type. The icon in front of certain fields indicates the function assigned to that field, which can be one of the following: ID, Timestamp, Latitude, Longitude, or Location.

Click Import data to import new data from a flat file.

Raise event when record cached
When enabled, the system raises the Record updated event every time a record from this record type is ingested.
Associate events to an entity
Map that displays Record updated events when data is ingested. For this to work, the map must show at least one area entity represented as a polygon. The area is used for geofencing.
Display on map as
Indicates whether or not to display the records from this record type on maps, either as events or as a query results. You can choose to display the records as a pin or a polygon. The Pin preview shows you how a record is represented on a map.

The Record presentation section describes how the information is presented when a record is displayed in a tile in the Genetec™ Mobile app, or in the information bubble when you click a record on a map. The Preview window shows you how the information looks in an information bubble.

Title
Title of the data record, displayed in a larger font.
Description
Description of the data record, displayed in a smaller font.
Displayed items
List of items displayed in the information bubble.
Item
Either a field name or a custom expression that transforms or combines multiple fields.
Name
Label for the item.
Rendered as
Display format of the item.
You can click to add more items or click to remove a selected item from the list.

Record Caching Service - Resources tab

Click the Resources tab to configure the servers and database assigned to this role.
Servers
Servers hosting this role. All must have access to the role database.
Database status
Current status of the database.
Database server
Name of the SQL Server service. The value (local)\SQLEXPRESS corresponds to Microsoft SQL Server Express Edition installed by default with Security Center Server.
Database
Name of the database instance.
Actions
You can perform the following functions on the role database:
Create a database ()
Create a new database with the option to overwrite the existing one.
Delete the database ()
Delete the database.
Database info ()
Show the database information.
Notifications ()
Set up notifications for when the database space is running low.
Backup/Restore ()
Back up or restore the database.
Cleanup ()
Configure a different retention period for each record type managed by this role.
Authentication
Specifies which SQL Server authentication is to be used:
Windows
(Default) Use Windows authentication when the role server and the database server are on the same domain.
SQL Server
Use SQL Server authentication when the role server and the database server are not on the same domain. You must specify a username and password in this case.
Database security
Security options for communication between the role and its database server.
Encrypt connections
(Default) Uses Transport Layer Security (TLS) protocol for all transactions between the role and the database server. This option prevents eavesdropping and requires no setup on your part.
Validate certificate
Authenticates the database server before opening a connection. This is the most secure communication method and prevents man-in-the-middle attacks. The Encrypt connections option must first be enabled.
NOTE: You must deploy a valid identity certificate on the database server. A valid certificate is signed by a certificate authority (CA) that is trusted by all servers hosting the role and that is not expired.