NetBackup IT Analytics Data Collector Installation and Configuration Guide for Cohesity NetBackup
- Introduction
- Configure a NetBackup IT Analytics Distributed Data Collector on a NetBackup Primary Server
- Configure Data Collector on non-clustered NetBackup 10.4 and later primary server
- Configure Data Collector on non-clustered NetBackup 10.1.1, 10.2, 10.2.01, 10.3 or 10.3.0.1 primary server
- Configure a Veritas NetBackup Data Collector Policy
- Configuring file analytics in NetBackup Data Collector policy
- Installing the Data Collector software
- Configure SSL
- Centralized Data Collector for NetBackup - Prerequisites, Installation, and Configuration
- Step-1: Choose operating system and complete prerequisites
- Step-5: SSH/WMI
- Upgrading Data Collector Locally
- Clustering Data Collectors with VCS and Veritas NetBackup (RHEL)
- Clustering Data Collectors with VCS and Veritas NetBackup (Windows)
- Install and configure NetBackup IT Analytics Data Collector on MSCS environment
- Data Collector Policy Migration
- Pre-Installation setup for Veritas NetBackup appliance
- Pre-installation setup for Veritas Flex Appliance
- Data Collector Troubleshooting
- Host resources: Check host connectivity using standard SSH
- Host resources: Generating host resource configuration files
- Configuring parameters for SSH
- Appendix A. Configure Appliances
- Appendix B. Load historic events
- Load Veritas NetBackup events
- Appendix C. Firewall configuration: Default ports
- Appendix D. CRON Expressions for Policy and Report Schedules
- Appendix E. Maintenance Scenarios for Message Relay Server Certificate Generation
Prerequisites for collection from Cohesity NetBackup deployed on Kubernetes clusters
This section describes the portal configurations required, before adding a Cohesity NetBackup policy, when Cohesity NetBackup is deployed on Kubernetes clusters in the cloud and it is using the cloud resources to perform backups.
Since Cohesity NetBackup is deployed on Kubernetes clusters, it must communicate with the Data Collector using SSH key-based authentication.
- Generate an SSH public/private key pair. This key will be required later during configuration. To generate this key pair, run the ssh-keygen command on a Linux system or an equivalent command on Windows.
Save the public and private key pair along with the passphrase used while generating the key, as you will need to provide the private key path and the passphrase while creating the NetBackup Collection policy in NetBackup IT Analytics Portal.
- Copy the public key to the itAnalyticsPublicKey spec of the Environment Custom Resource
environment.yaml
. You can find this file on the jumpserver that was used to create the initial NetBackup setup on Kubernetes cluster. - Apply the update to itAnalyticsPublicKey spec using kubectl apply -f environment.yaml. The
environment.yaml
file is available on the jumpserver used to create the NetBackup primary server setup on Kubernetes cluster.Alternatively, if the jumpserver is not accessible, use kubectl edit environment <environment_name> -n <namespace> command to edit the environment to add the public key to the itAnalyticsPublicKey sec
- On a successful deployment, describe the Environment Custom Resource using kubectl describe PrimaryServer <primary-server-name> -n <namespace>.
This API key is required when you add or edit a Cohesity NetBackup primary server for the Cohesity NetBackup policy configuration. This API key is essential especially when NetBackup IT Analytics has to collect metrics from NetBackup deployed on Kubernetes clusters in the cloud.
See the Manage API keys section from the NetBackup Web UI Security Administrator's Guide for steps to get the API key.
If the Firewall of the NetBackup primary server is turn on, follow these steps to communicate through the Firewall port:
- Open and edit the file
/etc/firewalld/zones/public.xml
. - Add the following lines in the file:
<service-name="https"/> <port protocol = "tcp" port="1556">
- Save the file.