You can configure the settings of the Record Caching Service role from the Roles view of the System task in Security Center Config Tool.
Record Caching Service - Properties tab
Click the Properties tab to view the configuration of the external record types imported by this role. What you see on this page are the standard properties of the selected record type in the left pane.
- Name
- Name of the record type.
- Icon
- Icon or string expression representing this record type. By default, the first letter of the record type name is used.
- Status
- Record type status, followed by the number fields and the current number of
records.
Click the number of fields to view the list of fields with their name and data type. The icon in front of certain fields indicates the function assigned to that field, which can be one of the following: ID, Timestamp, Latitude, Longitude, or Location.
Click Import data to import new data from a flat file.
- Raise event when record cached
- When enabled, the system raises the Record updated event every time a record from this record type is ingested.
- Associate events to an entity
- Map that displays Record updated events when data is ingested. For this to work, the map must show at least one area entity represented as a polygon. The area is used for geofencing.
- Display on map as
- Indicates whether or not to display the records from this record type on maps, either as events or as a query results. You can choose to display the records as a pin or a polygon. The Pin preview shows you how a record is represented on a map.
- Clustering
- When enabled, three or more records that are placed too closely to be visible at a given zoom level on a map are represented by a blue cluster bubble (). The number on the bubble indicates the number of objects inside it.
The Record presentation section describes how the information is presented when a record is displayed in a tile in the Genetec™ Mobile app, or in the information bubble when you click a record on a map. The Preview window shows you how the information looks in an information bubble.
- Title
- The title of the data record, displayed in a larger font.
- Description
- The description of the data record, displayed in a smaller font.
- Displayed items
- List of items displayed in the information bubble.
- Item
- Either a field name or a custom expression that transforms or combines multiple fields.
- Name
- Label for the item.
- Rendered as
- The display format of the item.
Record Caching Service - Resources tab
- Servers
- Servers hosting this role. All must have access to the role database.
- Database status
- Current status of the database.
- Database server
- Name of the SQL Server service. The value
(local)\SQLEXPRESS
corresponds to Microsoft SQL Server Express Edition installed by default with Security Center Server. Ensure that the SQL Server version is compatible with Security Center software requirements. For more information, see Security Center 5.12 software requirements . - Database
- Name of the database instance.
- Actions
-
You can perform the following functions on the role
database:
- Create a database ()
- Create a new database with the option to overwrite the existing one.
- Delete the database ()
- Delete the database.
- Database info ()
- Show the database information.
- Notifications ()
- Set up notifications for when the database space is running low.
- Backup/Restore ()
- Back up or restore the database.
- Cleanup ()
- Configure a different retention period for each record type managed by this role.
- Authentication
- Specifies which SQL Server authentication is to be used:
- Windows
- (Default) Use Windows authentication when the role server and the database server are on the same domain.
- SQL Server
- Use SQL Server authentication when the role server and the database server are not on the same domain. You must specify a username and password in this case.
- Database security
- Security options for communication between the role and its database server.
- Encrypt connections
- (Default) Uses Transport Layer Security (TLS) protocol for all transactions between the role and the database server. This option prevents eavesdropping and requires no setup on your part.
- Validate certificate
- Authenticates the database server before opening a connection. This is the most
secure communication method and prevents manipulator-in-the-middle attacks.
The Encrypt connections option must first be enabled.NOTE: You must deploy a valid identity certificate on the database server. A valid certificate is signed by a certificate authority (CA) that is trusted by all servers hosting the role and that is not expired.