NetBackup IT Analytics Data Collector Installation Guide for the Cloud

Last Published:
Product(s): NetBackup IT Analytics (11.4)
  1. Pre-installation setup for Google Cloud Platform
    1.  
      Overview
    2.  
      Pre-installation setup for GCP
    3.  
      Prerequisites for adding Data Collectors (GCP)
    4.  
      Installation GCP
    5.  
      Adding policy
    6.  
      Testing the collection
    7.  
      Creating an IAM role
    8.  
      Billing Data Access Role
    9.  
      Cloud API
    10.  
      Project access
  2. Pre-Installation Setup for OpenStack Ceilometer
    1.  
      Pre-Installation setup for OpenStack Ceilometer
    2.  
      Prerequisites for adding Data Collectors (OpenStack Ceilometer)
    3.  
      Installation Overview (OpenStack Ceilometer)
    4.  
      Adding an OpenStack Ceilometer Data Collector policy
  3. Pre-Installation Setup for OpenStack Swift
    1.  
      Pre-Installation setup for OpenStack Swift
    2.  
      Prerequisites for adding Data Collectors (OpenStack Swift)
    3.  
      Installation overview (OpenStack Swift)
    4.  
      Adding an OpenStack Swift Data Collector policy
  4. Pre-Installation Setup for Microsoft Azure
    1.  
      Pre-Installation setup for Microsoft Azure
    2.  
      Setting up credentials for Microsoft Azure Data Collection
    3.  
      Install the Azure PowerShell client on a Windows computer
    4.  
      Find your tenant and subscription ID
    5.  
      Register a new application for the Data Collector
    6.  
      Create a principal and assign role to the application
    7.  
      Prerequisites for Adding Data Collectors (Microsoft Azure)
    8.  
      Installation overview (Microsoft Azure)
    9.  
      Add a Microsoft Azure Data Collector policy
  5. Installing the Data Collector Software
    1.  
      Introduction
    2.  
      Installing the WMI Proxy service (Windows host resources only)
    3.  
      Testing WMI connectivity
    4.  
      Install Data Collector Software on Windows
    5.  
      Install Data Collector software on Linux
    6.  
      Deploy Data Collector in native Kubernetes environment
    7.  
      Configure Data Collector manually for Veritas NetBackup
    8.  
      Install Data Collector binaries on Windows (without configuration)
    9.  
      Install Data Collector binaries on Linux host (without configuration)
  6. Validating Data Collection
    1.  
      Validation methods
    2.  
      Data Collectors: Vendor-Specific validation methods
    3. Working with on-demand Data Collection
      1.  
        View real-time logging during an on-demand collection
      2.  
        Generating debug level logs during an on-demand collection
    4.  
      Using the CLI check install utility
    5.  
      List Data Collector configurations
  7. Uninstalling the Data Collector
    1.  
      Uninstall the Data Collector on Linux
    2.  
      Uninstall the Data Collector on Windows
  8. Manually Starting the Data Collector
    1.  
      Introduction
  9. Appendix A. Firewall Configuration: Default Ports
    1.  
      Firewall configuration: Default ports

Create a principal and assign role to the application

This step enables the newly registered application to have access rights to the subscription.

To enable access rights to the subscription, you can either create a Contributor role or create a combination of Reader and Custom roles for the application. Since Reader and Custom roles have restricted permissions compared to the Contributor role, you can choose to assign them to the application if the privileges available through the Contributor role do not comply with your organizational policy.

To create a principal and assign a Contributor role:

  1. Create a Principal for the Application:

    New-AzureRmADServicePrincipal -ApplicationId <APPLICATIONID>
  2. Create a Contributor role:

    New-AzureRmRoleAssignment -RoleDefinitionName Contributor -ServicePrincipalName <APPLICATIONID>

To create a principal and assign Reader and Custom roles:

  1. Create a Principal for the Application:

    New-AzureRmADServicePrincipal -ApplicationId <APPLICATIONID>
  2. Create a Reader role:

    New-AzureRmRoleAssignment -RoleDefinitionName Reader 
    -ServicePrincipalName <APPLICATIONID>
  3. Assign a Reader role to the application:

    New-AzureRmRoleAssignment -RoleDefinitionName Reader 
    -ServicePrincipalName <APPLICATIONID>
  4. Create a custom role with JSON template.

    For example, create a file customrole.json using the following:

    { "Name": "<Role-Name>", "Id": null, "IsCustom": true, 
    "Description": "<Role Description>", "Actions": 
    [ "Microsoft.Storage/storageAccounts/listkeys/action" ], 
    "NotActions": [], "DataActions": [], "NotDataActions": [], 
    "AssignableScopes": [ "/subscriptions/<Subscription ID>" ] }
  5. Create a Custom role:

    New-AzRoleDefinition -InputFile "C:\CustomRoles\customrole.json"
  6. Assign a custom role to application:

    New-AzureRmRoleAssignment -RoleDefinitionName <customeRoleName> 
    -ServicePrincipalName <APPLICATIONID>