NetBackup IT Analytics Data Collector Installation Guide for the Cloud
- Pre-Installation Setup for Amazon Web Services (AWS)
- Pre-Installation setup for Amazon Web services (AWS)
- Prerequisites for adding Data Collectors (Amazon Web services)
- Prerequisite Amazon Web services (AWS) configurations
- Configure an S3 bucket to receive billing reports
- Select cost allocation tags
- Create an AWS IAM user
- Link AWS accounts for Collection of consolidated billing data
- Installation overview (Amazon Web Services - AWS)
- Add an Amazon Web Services (AWS) policy
- Pre-installation setup for Google Cloud Platform
- Pre-Installation Setup for OpenStack Ceilometer
- Pre-Installation Setup for OpenStack Swift
- Pre-Installation Setup for Microsoft Azure
- Pre-Installation setup for Microsoft Azure
- Setting up credentials for Microsoft Azure Data Collection
- Install the Azure PowerShell client on a Windows computer
- Find your tenant and subscription ID
- Register a new application for the Data Collector
- Create a principal and assign role to the application
- Prerequisites for Adding Data Collectors (Microsoft Azure)
- Installation overview (Microsoft Azure)
- Add a Microsoft Azure Data Collector policy
- Installing the Data Collector Software
- Validating Data Collection
- Uninstalling the Data Collector
- Manually Starting the Data Collector
- Appendix A. Firewall Configuration: Default Ports
Creating an IAM role
This role is intended to be used at the organization level so that it can be easily shared between projects.
If the collector is intended to only monitor a single project then the role can be added at the project level.
Create a new role.
Choose the organization from the project selector.
Navigate to IAM & Admin > Roles.
Choose CREATE ROLE.
Specify title and description.
After completing the above steps, continue with the following.
Select General Availability.
Click Add Permissions.
In the Filter permission by role field to find and add the following permissions.
compute.instances.list
compute.machineTypes.get
compute.snapshots.list
compute.zones.list
resourcemanager.projects
.get resourcemanager.projects.list
storage.buckets.list
storage.objects.list
Note:
IAM administrative access required to assign the permissions.