NetBackup IT Analytics Data Collector Installation Guide for Fabric Manager

Last Published:
Product(s): NetBackup IT Analytics (11.2)
  1. Fabric Manager Data Collection overview
    1.  
      Introduction
    2.  
      Fabric Manager: Collection of SAN switch data
    3.  
      Switch zone alias collection
  2. Pre-Installation setup for Brocade switch
    1.  
      Pre-Installation setup for Brocade switch
    2.  
      Prerequisites for adding Data Collectors (Brocade switch)
    3.  
      Upgrade troubleshooting: Brocade BNA SMI-S (CIM) server and Java 11
    4.  
      Supported switches
    5.  
      Brocade switches: Default ports and firewall considerations
    6.  
      Installation overview (Brocade switch)
    7.  
      Brocade switch Data Collector policy
  3. Pre-Installation setup for Cisco switch
    1.  
      Pre-Installation setup for Cisco switch
    2.  
      Prerequisites for adding Data Collectors (Cisco switch)
    3.  
      Upgrade troubleshooting: Cisco DCNM SMI-S (CIM) server and Java 11
    4.  
      Cisco switches: Default ports and firewall considerations
    5.  
      Installation overview (Cisco switch)
    6.  
      Cisco switch Data Collection policy
    7.  
      Before you start Cisco switch Data Collection
  4. Pre-Installation setup for Brocade Zone alias
    1.  
      Pre-Installation setup for Brocade zone alias
    2.  
      Prerequisites for adding Data Collectors (Brocade zone alias)
    3.  
      Brocade switches: Default ports and firewall considerations
    4.  
      Installation overview (Brocade zone alias)
    5.  
      Brocade zone alias Data Collector policy
  5. Pre-Installation setup Cisco Zone alias
    1.  
      Pre-Installation setup Cisco zone alias
    2.  
      Prerequisites for adding Data Collectors (Cisco zone alias)
    3.  
      Cisco switches: Default ports and firewall considerations
    4.  
      Installation overview (Cisco Zone Alias)
    5.  
      Cisco zone alias Data Collector policy
  6. Installing the Data Collector software
    1.  
      Introduction
    2.  
      Installing the WMI Proxy service (Windows host resources only)
    3.  
      Testing WMI connectivity
    4.  
      Considerations to install Data Collector on non-English systems
    5.  
      Install Data Collector Software on Windows
    6.  
      Install Data Collector software on Linux
    7.  
      Deploy Data Collector in native Kubernetes environment
    8.  
      Configure Data Collector manually for Veritas NetBackup
    9.  
      Install Data Collector binaries on Windows (without configuration)
    10.  
      Install Data Collector binaries on Linux host (without configuration)
  7. Validating Data Collection
    1.  
      Validation methods
    2.  
      Data Collectors: Vendor-Specific validation methods
    3. Working with on-demand Data Collection
      1.  
        View real-time logging during an on-demand collection
    4.  
      Using the CLI check install utility
    5.  
      List Data Collector configurations
  8. Uninstalling the Data Collector
    1.  
      Uninstall the Data Collector on Linux
    2.  
      Uninstall the Data Collector on Windows
  9. Manually starting the Data Collector
    1.  
      Introduction
  10. Appendix A. Firewall configuration: Default ports
    1.  
      Firewall configuration: Default ports

Introduction

The Data Collector is a centralized and remotely managed data collection mechanism. This Java application is responsible for interfacing with enterprise objects, such as backup servers and storage arrays, gathering information related to storage resource management.

The Data Collector continuously collects data and sends this data, using an http or https connection, to another Java application, the Data Receiver. The Data Receiver runs on the Portal Server and stores the data that it receives in the Reporting Database. When you use the Portal to generate a report, the Portal requests this information from the Reporting Database, then returns the results in one of the many available reports.

The Data Collector obtains all of its monitoring rules from a Data Collector configuration file. This file resides in the Reporting Database in XML format. When the Data Collector first starts, it downloads this file from the Reporting Database. The Data Collector uses this file to determine the list of enterprise objects that are to be monitored and included in its data collection process.