NetBackup IT Analytics Data Collector Notes and Troubleshooting

Last Published:
Product(s): NetBackup IT Analytics (11.1)
  1. Data Collector Troubleshooting
    1.  
      Resolving Data Collectors connections issues - Linux specific
    2.  
      Resolving Data Collectors connections issues - Windows specific
    3.  
      Portal upgrade / data collector performance issues
    4.  
      Verify the Data Collector configuration
    5.  
      Verify Connectivity
    6.  
      Configuring web proxy updates
    7.  
      Collecting missed events for Veritas Backup Exec
    8.  
      Substituting ODBC for JDBC to connect to SQL server for Veritas Backup Exec
    9.  
      Useful Data Collection scripts for capacity
    10.  
      Host resources troubleshooting
    11.  
      Host resources: Check the status of the WMI proxy server
    12.  
      Host resources: Post-Installation verification
    13. Host resources: Check host connectivity using standard SSH
      1.  
        Checking Paths for SSH
      2.  
        Environment setting for bash users
    14.  
      Host resources: Check host connectivity
    15.  
      Host resources: Check host connectivity using Host Resource Configuration file
    16. Host resources: Generating host resource configuration files
      1.  
        Sample lines in an input file
    17.  
      Host resources: Check the execution of a command on a remote server
    18.  
      Host resources Data Collection
    19.  
      Host resources: Collection in stand-alone mode
    20. Configuring parameters for SSH
      1.  
        Configure channelWaitTime
      2.  
        Configure singleChannelSession
      3.  
        Configure sudoWithPassword
    21.  
      Identifying Windows file system access errors (File Analytics)
    22.  
      Collect from remote shares (File Analytics)
    23.  
      Adding a certificate to the Java keystore
  2. Firewall Configuration: Default Ports
    1.  
      Firewall configuration: Default ports
  3. CRON Expressions and Probe Schedules
    1.  
      CRON expressions and probe schedules
  4. Clustering Data Collectors with VCS and Veritas NetBackup (RHEL 7)
    1.  
      Clustering Data Collectors with VCS and Veritas NetBackup (RHEL 7)
    2.  
      Prerequisites
    3.  
      Getting started with Data Collector clustering
    4.  
      Main.cf
    5.  
      Upgrading a clustered Data Collector
  5. Clustering Data Collectors with VCS and Veritas NetBackup (Windows)
    1.  
      Clustering Data Collectors with VCS and Veritas NetBackup (Windows)
    2.  
      Prerequisites
    3.  
      Getting with Started with Data Collector Clustering
    4.  
      Main.cf
    5.  
      Upgrading a Clustered Data Collector
  6. Firewall Configuration: Default Ports
    1.  
      Firewall configuration: Default ports
  7. Maintenance Scenarios for Message Relay Server Certificate Generation
    1.  
      Regenerate authentication certificate nearing expiry (or already expired)
    2.  
      Recover inadvertently deleted aptare.ks file
    3.  
      Authenticate new database with existing SSL certificates
    4.  
      SSL certificate authentication for a new data collector

Host resources: Check host connectivity

This utility displays information on the connection status of a list of host names, IP addresses, or a range of IP addresses.

chkHostConnection.{sh|bat} HostAddresses userId password 
[domain <domain>] 
[exclude <excludeHostAddresses>] [wmiserver <wmiserver>] 
[cto <connectTimeout>] [sto socketTimeout>] 
[accessCmd=accessControlCommand>]

Table: Hosts resources and their values.

Host Addresses

The hosts to verify. It can be hostname, IP address, or range of IP addresses, or a comma-separated list of them.

domain

The Domain for the Windows hosts

excludeHostAddresses

The hosts to be excluded from the HostAddresses list. It can be hostname, IP address, or range of IP addresses, or a comma separated list of them.

wmiserver

Name of the WMI Proxy Server

cto

Connection time-out in milliseconds

sto

Socket time-out in milliseconds

accessCmd

An access control command such as sudo

As a result: for each host, the status of the connection is listed.

Connectivity Check Server List: [172.16.1.10, 172.16.1.12, APTAREaix1]
172.16.1.10 ............. SUCCESS
172.16.1.12 ............. SUCCESS
Usage
chkHostConnection.{sh|bat} HostAddresses userId password [domain <domain>] [exclude <excludeHostAddresses>] [wmiserver <wmiserver>] [cto <connectTimeout>] [sto socketTimeout>] [accessCmd=accessControlCommand>]

HostAddresses

The hosts to verify. It can be hostname, IP address, or range of IP addresses, or a comma-separated list of them.

domain

The Domain for the Windows hosts

excludeHostAddresses

The hosts to be excluded from the HostAddresses list. It can be hostname, IP address, or range of IP addresses, or a comma separated list of them.

wmiserver

Name of the WMI Proxy Server

cto

Connection time-out in milliseconds

sto

Socket time-out in milliseconds

accessCmd

An access control command such as sudo

Result

For each host, the status of the connection is listed.

Connectivity Check Server List: [172.16.1.10, 172.16.1.12, APTAREaix1]
172.16.1.10 ............. SUCCESS
172.16.1.12 ............. SUCCESS