NetBackup IT Analytics Data Collector Installation Guide for Capacity Manager
- Overview
- Pre-Installation setup for Compute Resources
- Pre-Installation setup for Dell Compellent
- Pre-Installation setup for DELL EMC Elastic Cloud Storage (ECS)
- Pre-Installation setup for Dell EMC Unity
- Pre-Installation setup for EMC data domain storage
- Pre-Installation setup for EMC Isilon
- Pre-Installation setup EMC Symmetrix
- Pre-Installation setup for EMC VNX Celerra
- Pre-Installation setup for EMC VNX
- Pre-Installation setup for EMC VPLEX
- Pre-Installation setup for EMC XtremIO
- Pre-installation setup for FUJITSU ETERNUS Data Collector
- Pre-Installation setup for Hitachi Block
- Configuring a Hitachi Device manager user
- Pre-Installation setup for Hitachi Content Platform (HCP)
- Hitachi content platform system management console
- Hitachi content platform tenant management console
- Pre-Installation Setup for Hitachi NAS
- Pre-Installation Setup for Hitachi Vantara All-Flash and Hybrid Flash Storage
- Host inventory pre-installation setup
- Host Access Privileges, Sudo Commands, Ports, and WMI Proxy Requirements
- Configure host Discovery policies to populate the host Inventory
- Validate host connectivity
- Host Inventory search and host Inventory export
- Configure and edit host probes
- Propagate Probe Settings: Copy Probes, Paste Probes
- Pre-Installation setup for HP 3PAR
- Pre-Installation setup for HP EVA
- Pre-Installation setup for HPE Nimble Storage
- Pre-Installation setup for HPE StoreOnce
- Pre-Installation setup for IBM Enterprise
- Pre-Installation setup for IBM COS
- Pre-Installation setup for IBM SVC
- Pre-Installation setup for IBM XIV
- Pre-Installation setup for Microsoft Windows server
- Pre-Installation setup for NetApp-7
- Pre-Installation setup for NetApp StorageGRID
- Pre-Installation setup for NetApp Cluster
- Pre-Installation setup for NetApp E-Series
- Pre-Installation setup for NEC HYDRAstor
- Pre-Installation setup for Pure Storage FlashArray
- Pre-Installation setup for Veritas NetBackup appliance
- Pre-installation setup for Veritas Flex Appliance
- Installing the Data Collector software
- Validating Data Collection
- Uninstalling the Data Collector
- Manually starting the Data Collector
- Appendix A. Firewall configuration: Default ports
Manage credentials
Multiple credential sets can be created, typically for groups of hosts with common credentials and/or hosts grouped by operating system (Linux/Windows). These credential sets are then selected and applied to specific Host Discovery policies. In fact, multiple credential sets can be listed, allowing the Data Collector to attempt authentication in a specific order until it is successful.
At the very least, you should have one credential set for Linux hosts and another for Windows hosts. Each defined set of credentials will have a name, to enable relevant selection when configuring Host Discovery policies.
For additional prerequisite details:
See Host Inventory configuration steps.
To Manage Host Credentials, select:
In the Host Inventory toolbar at the top of the browser window, click
.Add, Edit, or Delete credentials using the buttons at the bottom of the window.
Table: Windows credentials field descriptions.
Field | Description | Sample Values |
---|---|---|
Domain* |
Select the NetBackup IT Analytics Domain from the list; for most environments, only one Domain is displayed. Multiple domains facilitate management for Managed Services Providers (MSPs). | |
Name* |
Assign a name to identify this set of credentials that you are defining. | |
Account* |
Enter the login account name used to log in to the hosts. If the policy includes a group of Windows hosts, use the Windows domain user id. This user id must have administrative privileges. For Linux hosts, super user root privileges are required. You also could use an access control command, such as , or . If using any of these access commands, ensure that the user ID has sudo, sesudo, or pbrun privileges. Some enterprises prefer to create a new user and provide access to commands via an access control command.and See Host Access Privileges, Sudo Commands, Ports, and WMI Proxy Requirements. |
root |
Description |
Enter a note to help identify this type of credential |
Linux logins for Corporate |
Password |
Enter the password for the account |
Password1 |
OS type* |
Select either Linux, Windows, or NAS. | |
Windows Domain |
For Windows hosts only: If any of the hosts specified in the Host address field are Windows hosts, you need to specify the Windows domain name. If the host is not a member of a domain, or to specify a local user account, use a period (.) to substitute the local host SSID for the domain. |
win2kdomain |
Private Key File |
For Linux hosts only: If you have configured Public Key/Private Key between your Data Collector Server and the Hosts you intend to monitor, use this field to specify the location of the Private Key file on the Data Collector Server. |
/root/.ssh/id_rsa or C:\Program Files\Aptare\mbs\conf\id_rsa |
Known Hosts File |
For Linux hosts only: If you have configured Public Key/Private Key between your Data Collector Server and the Hosts you intend to monitor, use this field to specify the location of the Known Hosts file on the Data Collector Server. |
/root/.ssh/known_hosts or C:\Program Files\ Aptare\mbs\conf \known_hosts |