NetBackup IT Analytics Data Collector Installation and Configuration Guide
- Section I. Introduction
- Introduction
- Install and configure a Data Collector
- Step-1: Choose operating system and complete prerequisites
- Installing the Data Collector software
- Configure SSL
- Section II. Data Protection
- Configuration for Veritas Backup Exec
- Configuration for Cohesity DataProtect
- Configuration for Commvault Simpana
- Open TCP/IP access to the Commvault database
- Set up a read-only user in the CommServe server
- Configuration for EMC Avamar
- Import EMC Avamar server information
- Configuration for EMC Data Domain backup
- Configuration for Dell EMC NetWorker backup & recovery
- Importing generic backup data
- Configuration for generic backup
- CSV format specification
- Configuration for HP Data Protector
- Architecture overview (HP Data Protector)
- Configure the Data Collector server in Cell Manager (HP Data Protector)
- Configuration for IBM Spectrum Protect (TSM)
- Architecture overview (IBM Spectrum Protect -TSM)
- Import IBM Spectrum Protect (TSM) information
- Configuration for NAKIVO Backup & Replication
- Configuration for Oracle Recovery Manager (RMAN)
- Configuration for Rubrik Cloud Data Management
- Configuration for Veeam Backup & Replication
- Configuration for Veritas Backup Exec
- Section III. Storage (Capacity)
- Configuration for Compute Resources
- Configuration for DELL EMC Elastic Cloud Storage (ECS)
- Configuration for Dell EMC Unity
- Configuration for EMC data domain storage
- Configuration for EMC Isilon
- Configuration for EMC Symmetrix
- Configuration for EMC VNX Celerra
- Configuration for EMC VNX CLARiiON
- Configuration for EMC VPLEX
- Configuration for EMC XtremIO
- Configuration for FUJITSU ETERNUS Data Collector
- Configuration for Hitachi Block
- Configuring a Hitachi Device manager user
- Configuration for Hitachi Content Platform (HCP)
- Hitachi content platform system management console
- Hitachi content platform tenant management console
- Configuration for Hitachi NAS
- Configuration for Hitachi Vantara All-Flash and Hybrid Flash Storage
- Configuration of Host inventory
- Host Access Privileges, Sudo Commands, Ports, and WMI Proxy Requirements
- Configure host Discovery policies to populate the host Inventory
- Validate host connectivity
- Host Inventory search and host Inventory export
- Configure and edit host probes
- Propagate Probe Settings: Copy Probes, Paste Probes
- Configuration for HP 3PAR
- Configuration for HP EVA
- Configuration for HPE Nimble Storage
- Configuration for HPE StoreOnce
- Configuration for IBM Enterprise
- Configuration for IBM COS
- Configuration for IBM SVC
- Configuration for IBM XIV
- Configuration for Microsoft Windows server
- Configuration for NetApp-7
- Configuration for NetApp StorageGRID
- Configuration for NetApp Cluster
- Configuration for NetApp E-Series
- Configuration for NEC HYDRAstor
- Configuration for Pure Storage FlashArray
- Section IV. Compute (Virtualization and Host Collection)
- Configuration for VMware
- Configuration for IBM VIO
- Configuration for Microsoft Hyper-V
- Section V. Cloud
- Configuration for Amazon Web Services (AWS)
- Mandatory probe user privileges
- Link AWS accounts for Collection of consolidated billing data
- Configuration for Google Cloud Platform
- Configuration for OpenStack Ceilometer
- Configuration for OpenStack Swift
- Configuration for Microsoft Azure
- Configuration for Amazon Web Services (AWS)
- Section VI. Fabric
- Configuration for Brocade switch
- Configuration for Cisco switch
- Configuration for Brocade Zone alias
- Configuration for Cisco Zone alias
- Configuration for Brocade switch
- Section VII. File Analytics
- Configuration for File Analytics
- Host Discovery and Collection File Analytics probe
- Adding a File Analytics Data Collector policy
- File Analytics Export Folder Size and Folder Depth
- Configuration for File Analytics
- Section VIII. Data Collection Validation and Troubleshooting
- Validate data collection
- Data Collector Troubleshooting
- Host resources: Check host connectivity using standard SSH
- Host resources: Generating host resource configuration files
- Configuring parameters for SSH
- Uninstalling the Data Collector
- Appendix A. Firewall Configuration: Default Ports
- Appendix B. Load historic events
- Load Veritas NetBackup events
- Appendix C. CRON Expressions for Policy and Report Schedules
- Appendix D. Maintenance Scenarios for Message Relay Server Certificate Generation
Probe settings
Table: Probe Settings
Probe Type | Parameters | Description |
---|---|---|
Capacity HBA iSCSI Volume Manager Multi-pathing Note: Do not enable HBA probes for VMware guest host collection. |
Probe schedule* |
A schedule in cron format; for example: */20 9-18 * * * which translates to "every 0, 20 and 40th minute past the 9, 10, 11, 12, 13, 14, 15, 16, 17 and 18th hour." |
Memory |
Probe schedule* |
A schedule in cron format; for example: */20 9-18 * * * which translates to "every 0, 20 and 40th minute past the 9, 10, 11, 12, 13, 14, 15, 16, 17 and 18th hour." |
Network |
Probe schedule* |
A schedule in cron format; for example: */20 9-18 * * * which translates to "every 0, 20 and 40th minute past the 9, 10, 11, 12, 13, 14, 15, 16, 17 and 18th hour." |
Process |
Probe schedule* |
A schedule in cron format; for example: */20 9-18 * * * which translates to "every 0, 20 and 40th minute past the 9, 10, 11, 12, 13, 14, 15, 16, 17 and 18th hour." |
Processor |
Probe schedule* |
A schedule in cron format; for example: */20 9-18 * * * which translates to "every 0, 20 and 40th minute past the 9, 10, 11, 12, 13, 14, 15, 16, 17 and 18th hour." |
System |
Probe schedule* |
A schedule in cron format; for example: */20 9-18 * * * which translates to "every 0, 20 and 40th minute past the 9, 10, 11, 12, 13, 14, 15, 16, 17 and 18th hour." |
Exchange |
Collect |
Check this box to activate collection on an on-going basis. When it is unchecked, only initial validation will attempt this probe. |
Probe schedule |
A schedule in cron format; for example: */20 9-18 * * * which translates to "every 0, 20 and 40th minute past the 9, 10, 11, 12, 13, 14, 15, 16, 17 and 18th hour." | |
Active Directory Host |
Host name or address | |
Active Directory Port |
For example: 389 | |
Active Directory Base DN* |
The starting point for the Active Directory. For example: CN=Services,CN=Configuration, DC=contoso2003,DC=com Several tools are available to help you identify the Base DN: - - | |
Active Directory User Name |
Active Directory User Name This username must have privileges to search under the base DN within the Active Directory. Typically, this is an Administrator. | |
Password |
Active Directory Password | |
SQL Server |
Collect |
Check this box to activate collection on an on-going basis. When it is unchecked, only initial validation will attempt this probe. |
Probe schedule |
A schedule in cron format; for example: */20 9-18 * * * which translates to "every 0, 20 and 40th minute past the 9, 10, 11, 12, 13, 14, 15, 16, 17 and 18th hour." | |
Database* |
The name of the database within the SQL server. | |
Instance |
The system identifier to identify the SQL server database instance--for example: BKUPEXEC. Specify either an instance name or a port. If an instance name is not specified, MSSQLSERVER is substituted. | |
Port |
To identify the SQL server instance, provide either an instance name or a database port number; for example: 1433. If a port number is not specified, the port is determined automatically from the instance name. | |
Account* |
Database access user name The data collector requires a user account with permissions to execute the stored procedures | |
Password* |
Database access password | |
Windows Authentication |
Check this box if you want Windows authentication rather than SQL server authentication. | |
Oracle |
Collect |
Check this box to activate collection on an on-going basis. When it is unchecked, only initial validation will attempt this probe. |
Probe schedule |
A schedule in cron format; for example: */20 9-18 * * * which translates to "every 20 minutes between the hours of 9 a.m. and 6 p.m." | |
SID* |
The system identifier to identify the database instance. | |
Port* |
Database port number; default: 1521 | |
Username* |
The Oracle user must have the following role granted: SELECT_CATALOG_ROLE To grant this access, use: GRANT SELECT_CATALOG_ROLE TO 'user' where user is the database Username that you'll provide here. | |
Password* |
Database access password | |
Oracle ASM |
Collect |
Check this box to activate collection on an on-going basis. When it is unchecked, only initial validation will attempt this probe. |
Probe schedule |
A schedule in cron format; for example: */20 9-18 * * * which translates to "every 20 minutes between the hours of 9 a.m. and 6 p.m." | |
Account* |
The Oracle user privileges required: SYSDBA privilege if 10g sysasm in 11g | |
Password* |
Database access password | |
Port* |
Database port number; default: 1521 | |
ASM Instance* |
The name that identifies the database instance. | |
File Analytics |
Collect |
Check this box to activate collection on an on-going basis. When it is unchecked, only initial validation will attempt this probe. |
Probe schedule |
Default is once a month. A schedule in cron format; for example: */20 9-18 * * * which translates to "every 20 minutes between the hours of 9 a.m. and 6 p.m." |