Searching the Help
To search for information in the Help, type a word or phrase in the Search box. When you enter a group of words, OR is inferred. You can use Boolean operators to refine your search.
Results returned are case insensitive. However, results ranking takes case into account and assigns higher scores to case matches. Therefore, a search for "cats" followed by a search for "Cats" would return the same number of Help topics, but the order in which the topics are listed would be different.
Search for | Example | Results |
---|---|---|
A single word | cat
|
Topics that contain the word "cat". You will also find its grammatical variations, such as "cats". |
A phrase. You can specify that the search results contain a specific phrase. |
"cat food" (quotation marks) |
Topics that contain the literal phrase "cat food" and all its grammatical variations. Without the quotation marks, the query is equivalent to specifying an OR operator, which finds topics with one of the individual words instead of the phrase. |
Search for | Operator | Example |
---|---|---|
Two or more words in the same topic |
|
|
Either word in a topic |
|
|
Topics that do not contain a specific word or phrase |
|
|
Topics that contain one string and do not contain another | ^ (caret) |
cat ^ mouse
|
A combination of search types | ( ) parentheses |
|
- Supported Protocols
- AMQP Protocol
- AS400 Protocol
- AWS Protocol
- CA CMDB Protocol
- CIM Protocol
- Generic DB (SQL) Protocol
- Generic Protocol
- HP Network Automation Java Protocol
- HP SIM Protocol
- HTTP Protocol
- JBoss Protocol
- LDAP Protocol
- NetApp Protocol
- NetApp SANscreen/OnCommand Protocol
- NNM Protocol
- NTCMD Protocol
- PowerCmd Protocol
- PowerShell Protocol
- Remedy Protocol
- Salesforce Rest Protocol
- SAP JMX Protocol
- SAP Protocol
- ServiceNow Protocol
- Siebel Gateway Protocol
- SNMP Protocol
- SSH Protocol
- Telnet Protocol
- TIBCO Protocol
- UCS Protocol
- UDDI Registry Protocol
- Universal Discovery Protocol
- vCloud Protocol
- VMware Infrastructure Management (VIM) Protocol
- WebLogic Protocol
- WebSphere Protocol
- WMI Protocol
AWS Protocol
Parameter |
Description |
---|---|
Username |
Access Key ID. An alphanumeric text string that uniquely identifies the owner of the account. |
Password |
Secret Access Key, performing the role of a password. |
Connection Timeout |
Time-out in milliseconds after which the Probe stops trying to connect to the database. |
EC2 Endpoint |
The AWS endpoint for Amazon Elastic Compute Cloud (Amazon EC2). If this field is left empty, all available regions are discovered. For more details about this endpoint, see Amazon EC2. Note You can type at most six EC2 endpoints in this field, separated by commas. |
Http Proxy Host | The hostname, or address, of the proxy server. |
Http Proxy Port | The port number of the proxy server. |
IAM Endpoint | The AWS endpoint for AWS Identity and Access Management (IAM). If this field is left empty, all available regions are discovered. For more details about this endpoint, see AWS Identity and Access Management (IAM). |
RDS Endpoint | The AWS endpoint for Amazon Relational Database Service (Amazon RDS). If this field is left empty, all available regions are discovered. For more details about this endpoint, see Amazon Relational Database Service (Amazon RDS). |
Note The EC2 Endpoint, Http Proxy Host, Http Proxy Port, IAM Endpoint, and RDS Endpoint parameters only appear in the Edit Protocol Parameter dialog box. To open this dialog box, right-click the protocol that you created, and then select Edit using previous interface.
You can use the EC2 Endpoint, IAM Endpoint, and RDS Endpoint parameters for the following scenarios:
- Regular AWS discovery: Leave these parameter empty – defaults are used and for regular AWS credentials, all regions are discovered.
- Discovery of GovCloud: Set these parameters to the endpoints used by GovCloud.
- Discovery of a specific region in AWS: Set these parameters to the corresponding endpoints used by a specific region.
Note When the CyberArk integration is enabled, two radio buttons (Regular Credential and External Vault) are enabled. The existing Username and Password parameters are grouped under the Regular Credential radio button, and CyberArk integration specific parameters Type and Reference are enabled and grouped under the External Vault radio button, as described in the table below.
Parameter |
Description |
---|---|
Regular Credential |
Enabled when CyberArk integration is enabled. Select this radio button to use regular credential as before.
|
External Vault |
Enabled when CyberArk integration is enabled. Select this radio button to use an external credential vault.
|