NetBackup IT Analytics Data Collector Installation and Configuration Guide for Veritas NetBackup
- Introduction
- Configure a NetBackup IT Analytics Distributed Data Collector on a NetBackup Primary Server
- Configure Data Collector on non-clustered NetBackup 10.4 and later primary server
- Configure Data Collector on non-clustered NetBackup 10.1.1, 10.2, 10.2.01, 10.3 or 10.3.0.1 primary server
- Configure a Veritas NetBackup Data Collector Policy
- Configuring file analytics in NetBackup Data Collector policy
- Installing the Data Collector software
- Configure SSL
- Centralized Data Collector for NetBackup - Prerequisites, Installation, and Configuration
- Step-1: Choose operating system and complete prerequisites
- Step-5: SSH/WMI
- Upgrading Data Collector Locally
- Clustering Data Collectors with VCS and Veritas NetBackup (RHEL)
- Clustering Data Collectors with VCS and Veritas NetBackup (Windows)
- Install and configure NetBackup IT Analytics Data Collector on MSCS environment
- Data Collector Policy Migration
- Pre-Installation setup for Veritas NetBackup appliance
- Pre-installation setup for Veritas Flex Appliance
- Data Collector Troubleshooting
- Host resources: Check host connectivity using standard SSH
- Host resources: Generating host resource configuration files
- Configuring parameters for SSH
- Appendix A. Configure Appliances
- Appendix B. Load historic events
- Load Veritas NetBackup events
- Appendix C. Firewall configuration: Default ports
- Appendix D. CRON Expressions for Policy and Report Schedules
- Appendix E. Maintenance Scenarios for Message Relay Server Certificate Generation
Adding a certificate to the Java keystore
Use the following steps to add an SSL certificate to the Java keystore for a Data Collector. Some servers, such as VSphere, require a certificate for connection while communicating with SSL.
Note:
For the following commands, if you are not running in the default collector location (/usr/openv/analyticscollector or \Program Files\Veritas\AnalyticsCollector), substitute the appropriate APTARE_HOME in the command path.
For Windows Data Collector:
C:\Program Files\Veritas\AnalyticsCollector\java\lib\security\cacerts
For Linux Data Collector:
/usr/openv/analyticscollector/java/lib/security/cacerts
Copy the certificate file (certfile.txt) to the Data Collector. Run the following command to add the certificate:
For Windows Data Collector:
C:\Program Files\Veritas\AnalyticsCollector\java\bin\keytool -import -alias "somealias" -file certfile.txt -keystore C:\Program Files\Veritas\AnalyticsCollector\java\lib\security\cacerts
For Linux Data Collector:
/usr/openv/analyticscollector/java/bin/keytool -import -alias "somealias" -file certfile.txt -keystore /usr/openv/analyticscollector/java/lib/security/cacerts
When prompted, enter the default password to the keystore:
changeit
The results will be similar to the following example:
Enter keystore password: ...... Certificate Shown here ...... ...... ...... Trust this certificate? [no]: yes
Once completed, run the following keytool command to view a list of certificates from the keystore and confirm that the certificate was successfully added. The certificate fingerprint line displays with the alias name used during the import.
For Windows Data Collector:
C:\Program Files\Veritas\AnalyticsCollector\java\bin\keytool -list -keystore C:\Program Files\Veritas\AnalyticsCollector\java\lib\security\cacerts
For Linux Data Collector:
/usr/openv/analyticscollector/java/bin/keytool -list -keystore /usr/openv/analyticscollector/java/lib/security/cacerts
Sample Linux Output
Enter keystore password: Keystore type: JKS Keystore provider: SUN Your keystore contains 79 entries digicertassuredidrootca, Apr 16, 2008, trustedCertEntry, Certificate fingerprint (SHA1): 05:63:B8:63:0D:62:D7:5A:BB:C8:AB:1E:4B:DF:B5:A8:99:B2:4D:43 trustcenterclass2caii, Apr 29, 2008, trustedCertEntry, Certificate fingerprint (SHA1): AE:50:83:ED:7C:F4:5C:BC:8F:61:C6:21:FE:68:5D:79:42:21:15:6E .....