NetBackup IT Analytics Data Collector Installation Guide for Capacity Manager

Last Published:
Product(s): NetBackup IT Analytics (11.5)
  1. Overview
    1.  
      Purpose of this document
    2.  
      Architecture overview
    3.  
      Determining the required policy
    4.  
      Planning worksheets
    5.  
      Storage array details
    6.  
      Host resources details
  2. Pre-Installation setup for Compute Resources
    1.  
      Overview
    2.  
      Prerequisites for adding Data Collectors - Compute Resources
    3.  
      Installation overview
    4.  
      Add a Compute Resources policy
  3. Pre-Installation setup for Dell Compellent
    1.  
      Overview
    2.  
      Prerequisites for adding Data Collectors (Dell compellent)
    3.  
      Upgrade troubleshooting: Microsoft SQL Server and Java 11
    4.  
      Installation overview (Dell compellent)
    5.  
      Adding a Dell Compellent Data Collector policy
  4. Pre-Installation setup for DELL EMC Elastic Cloud Storage (ECS)
    1.  
      Pre-Installation setup for DELL EMC Elastic Cloud Storage (ECS)
    2.  
      Prerequisites for adding Data Collectors - DELL EMC Elastic Cloud Storage (ECS)
    3.  
      Installation overview - DELL EMC Elastic Cloud Storage (ECS)
    4.  
      Add a DELL EMC Elastic Cloud Storage (ECS) Data Collector policy
  5. Pre-Installation setup for Dell EMC Unity
    1.  
      Pre-Installation setup for Dell EMC Unity
    2.  
      Prerequisites for adding Data Collectors (Dell EMC Unity)
    3.  
      Installation overview (Dell EMC Unity)
    4.  
      Add a Dell EMC Unity Data Collector policy
  6. Pre-Installation setup for EMC data domain storage
    1.  
      Architecture overview (EMC data domain storage)
    2.  
      Prerequisites for adding data Collectors (EMC data domain storage)
    3.  
      Installation overview (EMC data domain storage)
    4.  
      Add EMC data domain servers
    5.  
      Adding an EMC data domain storage Data Collector policy
  7. Pre-Installation setup for EMC Isilon
    1.  
      Pre-Installation setup for EMC Isilon
    2.  
      Prerequisites for adding Data Collectors (EMC Isilon)
    3.  
      Configure the Isilon SNMP service
    4. Configure Isilon sudo access
      1.  
        Modify the Sudo configuration
    5.  
      Installation overview (EMC Isilon)
    6.  
      Adding an EMC Isilon Data Collector policy
  8. Pre-Installation setup EMC Symmetrix
    1.  
      Pre-Installation setup EMC Symmetrix
    2.  
      Prerequisites for adding Data Collectors (EMC Symmetrix)
    3.  
      Installation overview (EMC Symmetrix)
    4. Adding an EMC Symmetrix Data Collector policy
      1.  
        If the EMC solutions enabler is on a remote server (Recommended)
  9. Pre-Installation setup for EMC VNX Celerra
    1.  
      Pre-Installation setup for EMC VNX Celerra
    2.  
      Prerequisites for adding Data Collectors (EMC VNX Celerra)
    3.  
      Setup for EMC VNX Celerra arrays
    4.  
      Configure a Read-Only user with an Operator role
    5.  
      Start the XML API server
    6.  
      Installation overview (EMC VNX Celerra)
    7.  
      Adding an EMC VNX Celerra Data Collector policy
  10. Pre-Installation setup for EMC VNX
    1.  
      Pre-Installation setup for EMC VNX
    2.  
      Prerequisites for adding Data Collectors (EMC VNX)
    3.  
      Installation overview (EMC VNX)
    4.  
      Adding an EMC VNX Data Collector policy
  11. Pre-Installation setup for EMC VPLEX
    1.  
      Pre-Installation setup for EMC VPLEX
    2.  
      Prerequisites for adding Data Collectors (EMC VPLEX)
    3.  
      Installation overview (EMC VPLEX)
    4.  
      Adding a EMC VPLEX Data Collector policy
  12. Pre-Installation setup for EMC XtremIO
    1.  
      Pre-Installation setup for EMC XtremIO
    2.  
      Prerequisites for adding Data Collectors (EMC XtremIO)
    3.  
      Installation overview (EMC XtremIO)
    4.  
      Add an EMC XtremIO Data Collector policy
  13. Pre-installation setup for FUJITSU ETERNUS Data Collector
    1.  
      About data collector
    2.  
      Pre-installation setup
    3.  
      Prerequisites for adding Data Collectors
    4.  
      Installation overview
    5.  
      Adding a FUJITSU ETERNUS Data Collector policy
  14. Pre-Installation setup for Hitachi Block
    1.  
      Pre-Installation setup for Hitachi Block
    2.  
      Prerequisites for adding Data Collectors (Hitachi Block)
    3.  
      Installation overview (Hitachi Block Storage)
    4.  
      Adding a Hitachi Block Storage Data Collector policy
    5. Configuring a Hitachi Device manager user
      1.  
        Validate the User ID access
    6.  
      Configuring a Collector for Hitachi NAS block storage
    7.  
      Adding an HP command view advanced Data Collector policy
  15. Pre-Installation setup for Hitachi Content Platform (HCP)
    1.  
      Pre-Installation setup for Hitachi Content Platform (HCP)
    2.  
      Prerequisites for adding Data Collectors (Hitachi Content Platform)
    3.  
      Installation overview (Hitachi Content Platform)
    4.  
      Add a Hitachi Content Platform (HCP) Data Collector policy
    5.  
      Setting up permissions for an HCP local user or active directory user
    6. Hitachi content platform system management console
      1.  
        Local users
      2.  
        Local users and active directory users
    7. Hitachi content platform tenant management console
      1.  
        Local users
      2.  
        Active directory users
      3.  
        Local users and active directory users
  16. Pre-Installation Setup for Hitachi NAS
    1.  
      Pre-Installation setup Hitachi NAS
    2.  
      Prerequisites for adding Data Collectors (Hitachi NAS - HNAS)
    3.  
      Installation overview (Hitachi NAS - HNAS)
    4.  
      Adding a Hitachi NAS (HNAS) Data Collector policy
    5. HNAS configuration requirements
      1.  
        Configuring SSC access
    6.  
      Adding the collector
  17. Pre-Installation Setup for Hitachi Vantara All-Flash and Hybrid Flash Storage
    1.  
      Pre-Installation setup for Hitachi Vantara All-Flash and Hybrid Flash Storage
    2.  
      Prerequisites for adding Data Collectors (Hitachi Vantara All-Flash and Hybrid Flash Storage)
    3.  
      Installation overview
    4.  
      Adding a Hitachi Vantara All-Flash and Hybrid Flash Storage policy
  18. Host inventory pre-installation setup
    1. Host Access Privileges, Sudo Commands, Ports, and WMI Proxy Requirements
      1.  
        Access Requirements by OS
    2.  
      Host Inventory pre-installation setup
    3.  
      Plan host Data Collection
    4.  
      WMI Proxy requirements for Windows host Data Collection
    5.  
      Host access requirements
    6.  
      Verify command paths
    7.  
      Host Inventory configuration steps
    8.  
      Host Inventory setup overview
    9.  
      Host Inventory maintenance overview
    10.  
      Before discovering hosts
    11.  
      Configure / Search the host Inventory
    12.  
      Manage credentials
    13.  
      Manage WMI proxy
    14.  
      Manage paths
    15.  
      Manage access control
    16.  
      Host Inventory management
    17. Configure host Discovery policies to populate the host Inventory
      1.  
        Discovery policy considerations
      2.  
        Configure a Discovery policy
      3.  
        Collecting from Clustered SQL server and Oracle applications
    18.  
      Execute and monitor host Discovery
    19. Validate host connectivity
      1.  
        Validate hosts
      2.  
        Validation history
    20.  
      Show errors
    21.  
      Filter the host Inventory - hide / un-hide, remove
    22. Host Inventory search and host Inventory export
      1.  
        Basic search
      2.  
        Pre-Defined search
      3.  
        Advanced search parameters
    23.  
      Export the host Inventory
    24. Configure and edit host probes
      1.  
        Host Inventory File Analytics probe
      2.  
        File Analytics Probe configurations by operating system
      3.  
        Both Windows and Linux servers
      4.  
        Best practices for Host Inventory File Analytics probes
    25. Propagate Probe Settings: Copy Probes, Paste Probes
      1.  
        Probe settings
  19. Pre-Installation setup for HP 3PAR
    1.  
      Pre-Installation setup for HP 3PAR
    2.  
      Prerequisites for adding Data Collectors (HP 3PAR)
    3.  
      Installation Overview (HP 3PAR)
    4.  
      Adding an HP 3PAR Data Collector Policy
    5.  
      Adding an HP command view advanced Data Collector policy
  20. Pre-Installation setup for HP EVA
    1.  
      Pre-Installation setup for HP EVA
    2.  
      Prerequisites for adding Data Collectors (HP EVA)
    3.  
      Installation overview (HP EVA)
    4.  
      Adding an HP EVA Data Collector policy
  21. Pre-Installation setup for HPE Nimble Storage
    1.  
      Pre-Installation setup for HPE Nimble Storage
    2.  
      Prerequisites for adding Data Collectors (HPE Nimble Storage)
    3.  
      Installation overview (HPE Nimble Storage)
    4.  
      Adding an HPE Nimble Storage Data Collector policy
  22. Pre-Installation setup for HPE StoreOnce
    1.  
      Pre-Installation setup for HPE StoreOnce
    2.  
      Prerequisites for adding Data Collectors (HPE StoreOnce)
    3.  
      Installation overview
    4.  
      Adding a HPE StoreOnce policy
  23. Pre-Installation setup for IBM Enterprise
    1.  
      Pre-Installation setup for IBM Enterprise
    2.  
      Prerequisites for adding Data Collectors (IBM Enterprise)
    3.  
      Installation overview (IBM Enterprise)
    4.  
      Adding an IBM Enterprise Data Collector policy
  24. Pre-Installation setup for IBM COS
    1.  
      Introduction
    2.  
      Prerequisites for adding data collectors (IBM COS)
    3.  
      Installation overview (IBM COS)
    4.  
      Add IBM COS Data Collector policy
  25. Pre-Installation setup for IBM SVC
    1.  
      Pre-Installation setup for IBM SVC
    2.  
      Prerequisites for adding Data Collectors (IBM SVC)
    3.  
      Installation overview (IBM SVC)
    4.  
      Adding an IBM SVC Data Collector policy
  26. Pre-Installation setup for IBM XIV
    1.  
      Pre-Installation Setup for IBM XIV
    2.  
      Prerequisites for adding Data Collectors (IBM XIV)
    3.  
      Installation overview (IBM XIV)
    4.  
      Adding an IBM XIV Data Collector policy
  27. Pre-Installation setup for Microsoft Windows server
    1.  
      Pre-Installation setup for Microsoft Windows server
    2.  
      Prerequisites for adding Data Collectors (Microsoft Windows server)
    3.  
      Collecting from applications and services logs
    4.  
      Installation overview (Microsoft Windows Server)
    5.  
      Add a Microsoft Windows server Data Collector policy
  28. Pre-Installation setup for NetApp-7
    1.  
      Pre-Installation setup for NetApp-7
    2.  
      Prerequisites for adding Data Collectors (NetApp-7)
    3. Data Collector configurations specific to NetApp-7
      1.  
        If HTTP access is disabled on the vFiler
    4.  
      Installation overview (NetApp-7)
    5.  
      Adding a NetApp Data Collector policy
    6.  
      Testing the collection
    7.  
      Creating a NetApp user with API privileges
  29. Pre-Installation setup for NetApp StorageGRID
    1.  
      NetApp StorageGRID overview
    2.  
      Prerequisites for adding Data Collectors (NetApp StorageGRID)
    3.  
      Data Collector configuration specific to NetApp StorageGRID
    4.  
      Installing NetApp StorageGRID
    5.  
      Adding a NetApp StorageGRID Data Collector policy
    6.  
      Testing the collection
  30. Pre-Installation setup for NetApp Cluster
    1.  
      Pre-Installation setup for NetApp Cluster
    2.  
      Prerequisites for adding Data Collectors (NetApp Cluster)
    3.  
      Installation overview (NetApp Cluster-Mode)
    4.  
      Adding a NetApp Cluster-Mode Data Collector policy
    5.  
      Testing the collection
    6.  
      Creating a NetApp Cluster-Mode Read-Only user
  31. Pre-Installation setup for NetApp E-Series
    1.  
      Pre-Installation setup for NetApp E-Series
    2.  
      Prerequisites for adding Data Collectors (NetApp E-Series)
    3.  
      Installation overview (NetApp E-Series)
    4.  
      Adding a NetApp E-Series Data Collector policy
  32. Pre-Installation setup for NEC HYDRAstor
    1.  
      Introduction
    2.  
      Architecture overview
    3.  
      Supported models and versions
    4.  
      Prerequisites for adding a Data Collector
    5.  
      Installation overview
    6.  
      Adding a policy
  33. Pre-Installation setup for Pure Storage FlashArray
    1.  
      Pre-Installation setup for pure Storage FlashArray
    2.  
      Prerequisites for adding Data Collectors (pure Storage FlashArray)
    3.  
      Installation overview (Pure storage FlashArray)
    4.  
      Add a pure storage FlashArray Data Collector policy
  34. Pre-Installation setup for Veritas NetBackup appliance
    1.  
      Overview
    2.  
      Prerequisites for adding Data Collectors (Veritas NetBackup appliance)
    3.  
      Installation Overview (Veritas NetBackup Appliance)
    4.  
      Adding a Veritas NetBackup Appliance Data Collector policy
  35. Pre-installation setup for Veritas Flex Appliance
    1.  
      Pre-Installation setup for Veritas Flex Appliance
    2.  
      Prerequisites for adding Data Collectors (Veritas Flex Appliance)
    3.  
      Installation overview (Veritas Flex Appliance)
    4.  
      Add a Veritas Flex Appliance policy
    5.  
      Troubleshoot Veritas Flex Appliance policy configuration
  36. Installing the Data Collector software
    1.  
      Introduction
    2.  
      Installing the WMI Proxy service (Windows host resources only)
    3.  
      Testing WMI connectivity
    4.  
      Considerations to install Data Collector on non-English systems
    5.  
      Install Data Collector Software on Windows
    6.  
      Install Data Collector software on Linux
    7.  
      Deploy Data Collector in native Kubernetes environment
    8.  
      Configure Data Collector manually for Veritas NetBackup
    9.  
      Install Data Collector binaries on Windows (without configuration)
    10.  
      Install Data Collector binaries on Linux host (without configuration)
  37. Validating Data Collection
    1.  
      Validation methods
    2.  
      Data Collectors: Vendor-Specific validation methods
    3. Working with on-demand Data Collection
      1.  
        View real-time logging during an on-demand collection
      2.  
        Generating debug level logs during an on-demand collection
    4.  
      Using the CLI check install utility
    5.  
      List Data Collector configurations
  38. Uninstalling the Data Collector
    1.  
      Uninstall the Data Collector on Linux
    2.  
      Uninstall the Data Collector on Windows
  39. Manually starting the Data Collector
    1.  
      Introduction
  40. Appendix A. Firewall configuration: Default ports
    1.  
      Firewall configuration: Default ports

Host Inventory setup overview

Note that some steps typically are required only as part of the initial configuration and rarely require additional maintenance. For the purpose of this document, these initial steps are treated as requirements:

See Before discovering hosts.

Note:

Each step is summarized in this section. To access detailed descriptions, click the links for each step. The buttons at the bottom of the window--Hide, Remove, Show Errors, Validate, Edit Probes, Copy Probes, Paste Probes--are described in the following section.

See Host Inventory maintenance overview.

  1. Prior to discovering hosts, a data collector policy must be configured. You can use an existing policy--for example, a data collector policy that has been created for Storage Array data collection--or create a new data collector policy.

  2. See Configure / Search the host Inventory.

    Using the Host Inventory window, you can search for hosts in the inventory; or you can set up configurations in preparation for discovering and configuring hosts.

    • See Configure and edit host probes.

      Many of the probes may not be applicable to your enterprise. It is essential that you identify the probes that are relevant to your hosts.

  3. See Manage credentials.

    Configure user IDs and passwords for authentication when the data collector is accessing hosts.

  4. See Manage WMI proxy.

    A WMI Proxy is required to collect data from Windows hosts. Use this option to define one or more WMI Proxies.

  5. See Manage paths.

    Configure the paths that data collectors will use to execute commands on hosts.

  6. See Manage access control.

    Data Collectors require read-only access to execute non-intrusive commands on hosts. It is strongly recommended that a separate login account used strictly for NetBackup IT Analytics be established and using Active Directory for Windows systems and the sudo command for Linux systems, restrict the commands that NetBackup IT Analytics can issue. To accommodate this security approach, you can optionally specify access control commands like sudo, sesudo, or pbrun.

    See Host Access Privileges, Sudo Commands, Ports, and WMI Proxy Requirements.

  7. See Configure host Discovery policies to populate the host Inventory.

    Host Discovery attempts to find hosts and populate your NetBackup IT Analytics host inventory. Create Host Discovery Policies that use the credentials, WMI proxies, and paths that you configured.

    • See Validate host connectivity.

      Host validation must take into account host access for a wide variety of conditions and environments. As the discovery process accesses hosts, informative messages will provide clues to connectivity issues. In addition, devices that don't belong in a host inventory--for example, printers in the IP address range that you specified--may have been discovered and need to be hidden or removed from the inventory.

  8. See Host Inventory setup overview.

    To facilitate data collection troubleshooting, you can create log requests and be notified when the logs are available. These logs can also be transferred to support for additional analysis.