NetBackup IT Analytics Data Collector Installation Guide for Capacity Manager
- Overview
- Pre-Installation setup for Compute Resources
- Pre-Installation setup for Dell Compellent
- Pre-Installation setup for DELL EMC Elastic Cloud Storage (ECS)
- Pre-Installation setup for Dell EMC Unity
- Pre-Installation setup for EMC data domain storage
- Pre-Installation setup for EMC Isilon
- Pre-Installation setup EMC Symmetrix
- Pre-Installation setup for EMC VNX Celerra
- Pre-Installation setup for EMC VNX
- Pre-Installation setup for EMC VPLEX
- Pre-Installation setup for EMC XtremIO
- Pre-installation setup for FUJITSU ETERNUS Data Collector
- Pre-Installation setup for Hitachi Block
- Pre-Installation setup for Hitachi Block
- Prerequisites for adding Data Collectors (Hitachi Block)
- Installation overview (Hitachi Block Storage)
- Adding a Hitachi Block Storage Data Collector policy
- Configuring a Hitachi Device manager user
- Configuring a Collector for Hitachi NAS block storage
- Adding an HP command view advanced Data Collector policy
- Pre-Installation setup for Hitachi Content Platform (HCP)
- Pre-Installation setup for Hitachi Content Platform (HCP)
- Prerequisites for adding Data Collectors (Hitachi Content Platform)
- Installation overview (Hitachi Content Platform)
- Add a Hitachi Content Platform (HCP) Data Collector policy
- Setting up permissions for an HCP local user or active directory user
- Hitachi content platform system management console
- Hitachi content platform tenant management console
- Pre-Installation Setup for Hitachi NAS
- Pre-Installation Setup for Hitachi Vantara All-Flash and Hybrid Flash Storage
- Host inventory pre-installation setup
- Host Access Privileges, Sudo Commands, Ports, and WMI Proxy Requirements
- Host Inventory pre-installation setup
- Plan host Data Collection
- WMI Proxy requirements for Windows host Data Collection
- Host access requirements
- Verify command paths
- Host Inventory configuration steps
- Host Inventory setup overview
- Host Inventory maintenance overview
- Before discovering hosts
- Configure / Search the host Inventory
- Manage credentials
- Manage WMI proxy
- Manage paths
- Manage access control
- Host Inventory management
- Configure host Discovery policies to populate the host Inventory
- Execute and monitor host Discovery
- Validate host connectivity
- Show errors
- Filter the host Inventory - hide / un-hide, remove
- Host Inventory search and host Inventory export
- Export the host Inventory
- Configure and edit host probes
- Propagate Probe Settings: Copy Probes, Paste Probes
- Pre-Installation setup for HP 3PAR
- Pre-Installation setup for HP EVA
- Pre-Installation setup for HPE Nimble Storage
- Pre-Installation setup for Huawei OceanStor
- Pre-Installation setup for IBM Enterprise
- Pre-Installation setup for IBM COS
- Pre-Installation setup for IBM SVC
- Pre-Installation setup for IBM XIV
- Pre-Installation setup for Infinidat InfiniBox
- Pre-Installation setup for Infinidat InfiniGuard
- Pre-Installation setup for Microsoft Windows server
- Pre-Installation setup for NetApp-7
- Pre-Installation setup for NetApp StorageGRID
- Pre-Installation setup for NetApp Cluster
- Pre-Installation setup for NetApp E-Series
- Pre-Installation setup for Pure Storage FlashArray
- Pre-Installation setup for Veritas NetBackup appliance
- Installing the Data Collector software
- Introduction
- Installing the WMI Proxy service (Windows host resources only)
- Testing WMI connectivity
- Considerations to install Data Collector on non-English systems
- Install Data Collector Software on Windows
- Install Data Collector software on Linux
- Install Data Collector in containerized environment
- Validating Data Collection
- Uninstalling the Data Collector
- Manually starting the Data Collector
- Appendix A. Firewall configuration: Default ports
Manage credentials
Multiple credential sets can be created, typically for groups of hosts with common credentials and/or hosts grouped by operating system (Linux/Windows). These credential sets are then selected and applied to specific Host Discovery policies. In fact, multiple credential sets can be listed, allowing the Data Collector to attempt authentication in a specific order until it is successful.
At the very least, you should have one credential set for Linux hosts and another for Windows hosts. Each defined set of credentials will have a name, to enable relevant selection when configuring Host Discovery policies.
For additional prerequisite details:
See Host Inventory configuration steps.
To Manage Host Credentials, select:
In the Host Inventory toolbar at the top of the browser window, click .
Add, Edit, or Delete credentials using the buttons at the bottom of the window.
Table: Windows credentials field descriptions.
| Field | Description | Sample Values |
|---|---|---|
|
Domain* |
Select the NetBackup IT Analytics Domain from the list; for most environments, only one Domain is displayed. Multiple domains facilitate management for Managed Services Providers (MSPs). | |
|
Name* |
Assign a name to identify this set of credentials that you are defining. | |
|
Account* |
Enter the login account name used to log in to the hosts. If the policy includes a group of Windows hosts, use the Windows domain user id. This user id must have administrative privileges. For Linux hosts, super user root privileges are required. You also could use an access control command, such as , or . If using any of these access commands, ensure that the user ID has sudo, sesudo, or pbrun privileges. Some enterprises prefer to create a new user and provide access to commands via an access control command. and See Host Access Privileges, Sudo Commands, Ports, and WMI Proxy Requirements. |
root |
|
Description |
Enter a note to help identify this type of credential |
Linux logins for Corporate |
|
Password |
Enter the password for the account |
Password1 |
|
OS type* |
Select either Linux, Windows, or NAS. | |
|
Windows Domain |
For Windows hosts only: If any of the hosts specified in the Host address field are Windows hosts, you need to specify the Windows domain name. If the host is not a member of a domain, or to specify a local user account, use a period (.) to substitute the local host SSID for the domain. |
win2kdomain |
|
Private Key File |
For Linux hosts only: If you have configured Public Key/Private Key between your Data Collector Server and the Hosts you intend to monitor, use this field to specify the location of the Private Key file on the Data Collector Server. |
/root/.ssh/id_rsa or C:\Program Files\Aptare\mbs\conf\id_rsa |
|
Known Hosts File |
For Linux hosts only: If you have configured Public Key/Private Key between your Data Collector Server and the Hosts you intend to monitor, use this field to specify the location of the Known Hosts file on the Data Collector Server. |
/root/.ssh/known_hosts or C:\Program Files\ Aptare\mbs\conf \known_hosts |