NetBackup IT Analytics Data Collector Installation Guide for Capacity Manager
- Overview
- Pre-Installation setup for Compute Resources
- Pre-Installation setup for Dell Compellent
- Pre-Installation setup for DELL EMC Elastic Cloud Storage (ECS)
- Pre-Installation setup for Dell EMC Unity
- Pre-Installation setup for EMC data domain storage
- Pre-Installation setup for EMC Isilon
- Pre-Installation setup EMC Symmetrix
- Pre-Installation setup for EMC VNX Celerra
- Pre-Installation setup for EMC VNX
- Pre-Installation setup for EMC VPLEX
- Pre-Installation setup for EMC XtremIO
- Pre-installation setup for FUJITSU ETERNUS Data Collector
- Pre-Installation setup for Hitachi Block
- Pre-Installation setup for Hitachi Block
- Prerequisites for adding Data Collectors (Hitachi Block)
- Installation overview (Hitachi Block Storage)
- Adding a Hitachi Block Storage Data Collector policy
- Configuring a Hitachi Device manager user
- Configuring a Collector for Hitachi NAS block storage
- Adding an HP command view advanced Data Collector policy
- Pre-Installation setup for Hitachi Content Platform (HCP)
- Pre-Installation setup for Hitachi Content Platform (HCP)
- Prerequisites for adding Data Collectors (Hitachi Content Platform)
- Installation overview (Hitachi Content Platform)
- Add a Hitachi Content Platform (HCP) Data Collector policy
- Setting up permissions for an HCP local user or active directory user
- Hitachi content platform system management console
- Hitachi content platform tenant management console
- Pre-Installation Setup for Hitachi NAS
- Pre-Installation Setup for Hitachi Vantara All-Flash and Hybrid Flash Storage
- Host inventory pre-installation setup
- Host Access Privileges, Sudo Commands, Ports, and WMI Proxy Requirements
- Host Inventory pre-installation setup
- Plan host Data Collection
- WMI Proxy requirements for Windows host Data Collection
- Host access requirements
- Verify command paths
- Host Inventory configuration steps
- Host Inventory setup overview
- Host Inventory maintenance overview
- Before discovering hosts
- Configure / Search the host Inventory
- Manage credentials
- Manage WMI proxy
- Manage paths
- Manage access control
- Host Inventory management
- Configure host Discovery policies to populate the host Inventory
- Execute and monitor host Discovery
- Validate host connectivity
- Show errors
- Filter the host Inventory - hide / un-hide, remove
- Host Inventory search and host Inventory export
- Export the host Inventory
- Configure and edit host probes
- Propagate Probe Settings: Copy Probes, Paste Probes
- Pre-Installation setup for HP 3PAR
- Pre-Installation setup for HP EVA
- Pre-Installation setup for HPE Nimble Storage
- Pre-Installation setup for Huawei OceanStor
- Pre-Installation setup for IBM Enterprise
- Pre-Installation setup for IBM COS
- Pre-Installation setup for IBM SVC
- Pre-Installation setup for IBM XIV
- Pre-Installation setup for Infinidat InfiniBox
- Pre-Installation setup for Infinidat InfiniGuard
- Pre-Installation setup for Microsoft Windows server
- Pre-Installation setup for NetApp-7
- Pre-Installation setup for NetApp StorageGRID
- Pre-Installation setup for NetApp Cluster
- Pre-Installation setup for NetApp E-Series
- Pre-Installation setup for Pure Storage FlashArray
- Pre-Installation setup for Veritas NetBackup appliance
- Installing the Data Collector software
- Introduction
- Installing the WMI Proxy service (Windows host resources only)
- Testing WMI connectivity
- Considerations to install Data Collector on non-English systems
- Install Data Collector Software on Windows
- Install Data Collector software on Linux
- Install Data Collector in containerized environment
- Validating Data Collection
- Uninstalling the Data Collector
- Manually starting the Data Collector
- Appendix A. Firewall configuration: Default ports
Host Inventory setup overview
Note that some steps typically are required only as part of the initial configuration and rarely require additional maintenance. For the purpose of this document, these initial steps are treated as requirements:
Note:
Each step is summarized in this section. To access detailed descriptions, click the links for each step. The buttons at the bottom of the window----are described in the following section.
Prior to discovering hosts, a data collector policy must be configured. You can use an existing policy--for example, a data collector policy that has been created for Storage Array data collection--or create a new data collector policy.
See Configure / Search the host Inventory.
Using the Host Inventory window, you can search for hosts in the inventory; or you can set up configurations in preparation for discovering and configuring hosts.
See Configure and edit host probes.
Many of the probes may not be applicable to your enterprise. It is essential that you identify the probes that are relevant to your hosts.
See Manage credentials.
Configure user IDs and passwords for authentication when the data collector is accessing hosts.
See Manage WMI proxy.
A WMI Proxy is required to collect data from Windows hosts. Use this option to define one or more WMI Proxies.
See Manage paths.
Configure the paths that data collectors will use to execute commands on hosts.
Data Collectors require read-only access to execute non-intrusive commands on hosts. It is strongly recommended that a separate login account used strictly for NetBackup IT Analytics be established and using Active Directory for Windows systems and the sudo command for Linux systems, restrict the commands that NetBackup IT Analytics can issue. To accommodate this security approach, you can optionally specify access control commands like sudo, sesudo, or pbrun.
See Host Access Privileges, Sudo Commands, Ports, and WMI Proxy Requirements.
See Configure host Discovery policies to populate the host Inventory.
Host Discovery attempts to find hosts and populate your NetBackup IT Analytics host inventory. Create Host Discovery Policies that use the credentials, WMI proxies, and paths that you configured.
See Validate host connectivity.
Host validation must take into account host access for a wide variety of conditions and environments. As the discovery process accesses hosts, informative messages will provide clues to connectivity issues. In addition, devices that don't belong in a host inventory--for example, printers in the IP address range that you specified--may have been discovered and need to be hidden or removed from the inventory.
See Host Inventory setup overview.
To facilitate data collection troubleshooting, you can create log requests and be notified when the logs are available. These logs can also be transferred to support for additional analysis.