Please enter search query.
Search <book_title>...
NetBackup IT Analytics System Administrator Guide
Last Published:
2025-01-03
Product(s):
NetBackup IT Analytics (11.4)
- Introduction
- Preparing for updates
- Backing up and restoring data
- Monitoring NetBackup IT Analytics
- Accessing NetBackup IT Analytics reports with the REST API
- Defining NetBackup estimated tape capacity
- Automating host group management
- Categorize host operating systems by platform and version
- Bulk load utilities
- Automate NetBackup utilities
- Scheduling utilities to run automatically
- Attribute management
- Importing generic backup data
- Backup job overrides
- Managing host data collection
- System configuration in the Portal
- Custom parameters
- Performance profile schedule customization
- LDAP and SSO authentication for Portal access
- Change Oracle database user passwords
- Integrate with CyberArk
- Tuning NetBackup IT Analytics
- Working with log files
- Portal and data collector log files - reduce logging
- Data collector log file naming conventions
- Portal log files
- Defining report metrics
- SNMP trap alerting
- SSL certificate configuration
- Configure virtual hosts for portal and / or data collection SSL
- Keystore on the portal server
- Portal properties: Format and portal customizations
- Data retention periods for SDK database objects
- Data aggregation
- Troubleshooting
- Appendix A. Kerberos based proxy user's authentication in Oracle
- Appendix B. Configure TLS-enabled Oracle database on NetBackup IT Analytics Portal and data receiver
- Appendix C. NetBackup IT Analytics for NetBackup on Kubernetes and appliances
Exporting service and user principal's to keytab file on KDC
The Authentication Server needs a keytab file and validate a user when refreshing session credentials.
This section describes how to export and copy a keytab file.
- Create oracle service principal.
# kadmin.local addprinc -randkey <oracle SID>/<oracle server host name>@<domain realm name>
For example: addprinc -randkey scdb/abc.example.com@EXAMPLE.COM
- Extract oracle service principal to keytab file
# kadmin.local ktadd -k <keytab file path> <oracle SID>/<oracle server host name>@<domain realm name>
For example: ktadd -k /tmp/keytab scdb/abc.example.com@EXAMPLE.COM
- Create Kerberos user principal
# kadmin.local addprinc <kerberos user name>
For example: addprinc k1portal
- Extract Kerberos user principal to keytab file.
# kadmin.local ktadd -k <keytab file path> <kerberos user name>
For example:ktadd -k /tmp/keytab k1portal