NetBackup IT Analytics Data Collector Notes and Troubleshooting
- Data Collector Troubleshooting
- Verify the Data Collector configuration
- Verify Connectivity
- Configuring web proxy updates
- Collecting missed events for Veritas Backup Exec
- Substituting ODBC for JDBC to connect to SQL server for Veritas Backup Exec
- Useful Data Collection scripts for capacity
- Host resources troubleshooting
- Host resources: Check the status of the WMI proxy server
- Host resources: Post-Installation verification
- Host resources: Check host connectivity using standard SSH
- Host resources: Check host connectivity
- Host resources: Check host connectivity using Host Resource Configuration file
- Host resources: Generating host resource configuration files
- Host resources: Check the execution of a command on a remote server
- Host resources Data Collection
- Host resources: Collection in stand-alone mode
- Configuring parameters for SSH
- Identifying Windows file system access errors (File Analytics)
- Collect from remote shares (File Analytics)
- Adding a certificate to the Java keystore
- Firewall Configuration: Default Ports
- CRON Expressions and Probe Schedules
- Clustering Data Collectors with VCS and Veritas NetBackup (RHEL 7)
- Clustering Data Collectors with VCS and Veritas NetBackup (Windows)
- Firewall Configuration: Default Ports
- Maintenance Scenarios for Message Relay Server Certificate Generation
Adding a certificate to the Java keystore
Use the following steps to add an SSL certificate to the Java keystore for a Data Collector. Some servers, such as VSphere, require a certificate for connection while communicating with SSL.
Note:
For the following commands, if you are not running in the default collector location (/opt/aptare or C:\opt\aptare), substitute the appropriate APTARE_HOME in the command path.
For Windows Data Collector:
C:\opt\aptare\java\lib\security\cacerts
For Linux Data Collector:
/opt/aptare/java/lib/security/cacerts
Copy the certificate file (certfile.txt) to the Data Collector. Run the following command to add the certificate:
For Windows Data Collector:
C:\opt\jre\bin\keytool -import -alias "somealias" -file certfile.txt -keystore C:\opt\aptare\java\lib\security\cacerts
For Linux Data Collector:
/usr/java/bin/keytool -import -alias "somealias" -file certfile.txt -keystore /opt/aptare/java/lib/security/cacerts
When prompted, enter the default password to the keystore:
changeit
The results will be similar to the following example:
Enter keystore password: ...... Certificate Shown here ...... ...... ...... Trust this certificate? [no]: yes
Once completed, run the following keytool command to view a list of certificates from the keystore and confirm that the certificate was successfully added. The certificate fingerprint line displays with the alias name used during the import.
For Windows Data Collector:
C:\opt\jre\bin\keytool -list -keystore C:\opt\aptare\jre\lib\security\cacerts
For Linux Data Collector:
/usr/java/bin/keytool -list -keystore /opt/aptare/jre/lib/security/cacerts
Sample Linux Output
Enter keystore password: Keystore type: JKS Keystore provider: SUN Your keystore contains 79 entries digicertassuredidrootca, Apr 16, 2008, trustedCertEntry, Certificate fingerprint (SHA1): 05:63:B8:63:0D:62:D7:5A:BB:C8:AB:1E:4B:DF:B5:A8:99:B2:4D:43 trustcenterclass2caii, Apr 29, 2008, trustedCertEntry, Certificate fingerprint (SHA1): AE:50:83:ED:7C:F4:5C:BC:8F:61:C6:21:FE:68:5D:79:42:21:15:6E .....