Text and Application Log Monitoring, Management, Consolidation, Security, Compliance and Uptime Software Tool
  • Call:  801-910-4256
  • Login

Corner Bowl Text Log Monitor

Text and Application Log Monitoring, Management, Consolidation, Security, Compliance and Uptime Software Tool for IT Professionals

Start your Free Trial with Support Now
Great features for a reasonable price. The rich feature set and the reporting are great at this price range. It's very stable and is quite low on system resources.
Marc De Schryver
Infrastructure Manager
Sonoco-Alcore
July 30, 2020

What is Text Log Monitor?

It is...

  • an Application Log Management Software Tool
  • a Real-Time Application Log Monitor
  • an Application Log Consolidator
  • an Application Log Report Generator
  • Compliance Software for CJIS, PCI/DSS, HIPAA, SOX, GDPR and CIS Microsoft 365 Security & Compliance

What does Text Log Monitor do?

  • Monitors application log files for critical events
  • Centrally saves application log files
  • Schedules compliance reports
  • Sends email and text notifications
  • Remote executes Powershell scripts
  • Deletes expired data

How does Corner Bowl Text Log Monitor do it?

Text Log Monitor uses a combination of WMI, Windows Shares and SSH to tail and download application and system log files from any platform.

Once harvested, log entries are filtered and, if triggered, alerts and actions fired. If you need to centrally store log files, log entries are saved to either a local or offsite repository. Don't worry, out-of-the-box Corner Bowl saves data to it's own flat file system format getting you up and running without any required 3rd party integration.

MySQL
  • The world's most popular
  • Open source database
Microsoft SQL Server
  • Already have it?
  • Use it!
Corner Bowl File System Format
  • Our own out of the box binary file format.

What does Corner Bowl Text Log Monitor include?

Define Multi-Line Log Entries

Supports both delimited and non-delimited text log files. Delimited files follow a specific format enabling programmatic parsing over multiple lines, for example, syslog files. Delimited files are read line by line until the next entry delimiter is reached. Once reached, all lines are concatenated together to form an entry. Non-delimited files do not follow any specific format making programmatic parsing impossible. Non-delimited log files are read and filtered line by line.

Define and Monitor Date Based Directories and Application Log Files

Many applications create log files using a random or a date driven naming mechanism. Text Log Monitor enables you to monitor files within a directory that match user defined file name masks that include time based criteria such as *.txt and *<yyyyMMdd>.log. When a new file is detected, Text Log Monitor automatically starts monitoring the file contents.

Compliance

Sarbanes-Oxley may require your organization to archive critical log files for future reference and accountability. Text Log Monitor will archive your logs in their entirety or as a sub-set to a central SQL Server or MySQL database as well as to CSV, HTML, TXT, or XML files.

Automatic Report Generation

Create scheduled web and email reports that contain specific entries, for example, receive a daily email that contains critical application information contained within its service log file.

Enhanced Log Viewer

Text Log Monitor includes a text log viewer that pages data enables users to view, search, filter and tail large text files replacing popular command-line text file parsing tools while enabling efficient and repeatable log analysis.

Corner Bowl Text Log Monitor Screenshots

Unlimited Log Entry Filtering Options

Grouped Attribute Value Filters

Enable you to select Security Event Log entries from the viewer then create complex filters based on the message schema and data.


Normalizes log messages so you can create grouped attribute value pair filters on specific fields within each message.

C# Script Filters

Enable you to script and compile your own filters so you can create the most powerful and customized filters imaginable.


Provides a C# script interface that includes property auto complete, a compiler and error output.

Complex Filters

Enable you to graphically create complex hierarchical filters with grouped (and, or, not) criteria and sub-grouped criteria.


Provides a graphical user interface to build, test and update your queries.

Corner Bowl System Component and Network Architecture

Available Notifications, Alerts and Actions

Send Emails
Send custom email alerts and notifications with optional log file attachment support.
Send Microsoft Teams Messages
Send alerts and notifications to Microsoft Teams Channels via Incoming Webhook Connector.
Send SMS Messages
Send text messages through various popular SMS providers such as Twilio.
Launch a Script
Remote launch your own custom Powershell scripts, batch files and executables.
Manage Windows Services
Remote stop, start and restart Windows Services.
Fire SNMP Traps
Need to integrate into your enterprise systems? Fire Simple Network Management Protocol (SNMP) traps when critical events are detected.
Write to File
Write, append and backup schedule reports to HTML, CSV, TXT and PDF file formats.
Write Event Log Entries
Write custom alert and notification messages to any Windows Event Log on any machine.
Send Syslog Messages
Send custom Syslog alerts and notifications. You can even relay Syslog messages to another server.
Display Desktop Notifications
Client/Server architecture enables you to receive real-time notifications on your personal desktop or laptop.

Constant Delivery Pipelines

Create

Automatically apply monitoring, notifications and reporting to new servers and workstations.


Runs scheduled scans on Active Directory or any Directory Service provider then applies configuration templates to discovered machines.

Update

Automatically update and re-apply configurations ensuring new and existing rules are rolled to target groups of machines.


Runs scheduled scans then applies new and updated configuration templates to existing machines.

Delete

Automatically remove hosts from the software when servers or workstations are decommissioned.


Runs scheduled scans then removes machines either not found or not passing custom filter criteria.

System Requirements

Supported Operating Systems
  • Windows Server 2019, 2016, 2012, 2008 R2
  • Windows 10, 8, 7 SP1
Supported Architecture - 64-Bit and 32-Bit

Text Log Monitor can only be installed on both 64-bit and 32-Bit Windows.

Memory

8 GBs of available memory, 16 GBs suggested for large log entry reports.

Microsoft .NET Framework 4.8

The installation detects if the .Net Framework 4.8 is already installed. If not, the framework is automatically downloaded from Microsoft and then installed. Please note the framework may take a significant amount of time to install. Please be patient while the installation completes.

Domain Administrator Account

To access and manage remote resources Log Manager requires domain administrator credentials. If off-domain, then local administrator credentials. The first time the application is run, the onboarding wizard will prompt you to assign then necessary credentials to the service.

Windows Management Instrumentation (client and server)

Many functions within Text Log Monitor utilize Microsoft's Windows Management Instrumentation (WMI) API (e.g. Event Log management, CPU and memory monitoring). This software includes options to optimize WMI packet size and performance.

Licensing

Text Log Monitor is sold in node packs. Each unique IP address or hostname that is monitored, scanned or managed by the software is a node.

Text Log Monitor can be installed on a single host or up to as many hosts as nodes purchased.

For example, a 100 node license would enable an IT professional to install the software on 3 servers with one installation monitoring 50 servers and the other two installations monitoring 25 workstations each for a total of 100 nodes.

After you purchase a license, you have the option through this website or your reseller to upgrade your existing license with more nodes.

Once you have purchased a license, a license key will be emailed to you. If you purchase through a reseller, a claim link will be emailed to you enabling you to retrieve your key from this website. Once you have your key you will register online through the software's management console. If you are installing this software on an Air-Gapped network, you will generate license key files through this website where you will also find detailed instructions on how to apply your Air-Gapped key files.

Start your Free Trial Now
Pricing

Last Updated: February 22nd, 2021