Please enter search query.
Search <book_title>...
APTARE IT Analytics System Administrator Guide
Last Published:
2021-12-01
Product(s):
APTARE IT Analytics (10.5)
- Preparing for updates
- Backing up and restoring data
- Monitoring APTARE IT Analytics
- Accessing APTARE reports with the REST API
- Defining NetBackup estimated tape capacity
- Automating host group management
- Categorize host operating systems by platform and version
- Bulk load utilities
- Automating NetBackup utilities
- Attribute management
- Importing generic backup data
- Backup job overrides
- Managing host data collection
- System configuration in the portal
- Host discovery: EMC Avamar
- Performance profile schedule customization
- Configuring AD/LDAP
- Configuring single sign-on (SSO) using security assertion markup language (SAML)
- Changing Oracle database user passwords
- Integrating with CyberArk
- Tuning APTARE IT Analytics
- Working with log files
- Portal and data collector log files - reduce logging
- Data collector log file naming conventions
- Portal log files
- Defining report metrics
- SNMP trap alerting
- SSL certificate configuration
- Configure virtual hosts for portal and / or data collection SSL
- Keystore on the portal server
- Portal properties: Format and portal customizations
- Advanced configuration for NetBackup discovery
- Data retention periods for SDK database objects
- Configure multi-tenancy data purging retention periods
- Troubleshooting
Enabling SNMP for Red Hat Linux
Red Hat Linux has an SNMP agent, ucd-snmp, preinstalled. Ucd-snmp is the pre-cursor to net-snmp. You need to configure the ucd-snmp agent to return the host resource information and to ensure that it executes at system startup. This procedure provides the steps for enabling SNMP in a Red Hat Linux environment.
To enable SNMP for Red Hat Linux:
Locate the SNMPD configuration file in /etc/snmp/snmpd.conf and the executable at /usr/sbin/snmpd.
Configure the SNMP agent as shown in the following example, which shows read-only access to the system and host resource storage portions of the MIB.
#### # First, map the community name "public" into a "security name" # sec.name source community com2sec notConfigUser default public #### # Second, map the security name into a group name: # groupName securityModel securityName group notConfigGroup v1 notConfigUser group notConfigGroup v2c notConfigUser #### # Third, create a view for us to let the group have rights to: # name incl/excl subtree mask(optional) #view systemview included .1 view APTARE IT Analytics included .iso.org.dod.internet.mgmt.mib-2.system fe view APTARE IT Analytics included .iso.org.dod.internet.mgmt.mib-2.host.hrStorage ff view APTARE IT Analytics included .iso.org.dod.internet.mgmt.mib-2.host.hrDevice ff # .iso.org.dod.internet.mgmt.mib-2.system = .1.3.6.1.2.1.1 # .iso.org.dod.internet.mgmt.mib-2.host.hrStorage = .1.3.6.1.2.1.25.2 #### # Finally, grant read-only access to the system and storage portions of the MIB2 tree # group context sec.model sec.level prefix read write notif #access notConfigGroup "" any noauth exact systemview none none access notConfigGroup "" any noauth exact APTARE IT Analytics none none