Please enter search query.
Search <book_title>...
NetBackup IT Analytics System Administrator Guide
Last Published:
2023-08-01
Product(s):
NetBackup IT Analytics (11.1)
- Introduction
- Preparing for updates
- Backing up and restoring data
- Monitoring NetBackup IT Analytics
- Accessing NetBackup IT Analytics reports with the REST API
- Defining NetBackup estimated tape capacity
- Automating host group management
- Categorize host operating systems by platform and version
- Bulk load utilities
- Automate NetBackup utilities
- Scheduling utilities to run automatically
- Attribute management
- Importing generic backup data
- Backup job overrides
- Managing host data collection
- System configuration in the portal
- Custom parameters
- Performance profile schedule customization
- Configuring AD/LDAP
- Configuring single sign-on (SSO) using security assertion markup language (SAML)
- Change Oracle database user passwords
- Integrate with CyberArk
- Tuning NetBackup IT Analytics
- Working with log files
- Portal and data collector log files - reduce logging
- Data collector log file naming conventions
- Portal log files
- Defining report metrics
- SNMP trap alerting
- SSL certificate configuration
- Configure virtual hosts for portal and / or data collection SSL
- Keystore on the portal server
- Portal properties: Format and portal customizations
- Data retention periods for SDK database objects
- Troubleshooting
- Appendix A. Configure TLS-enabled Oracle database on NetBackup IT Analytics Portal and data receiver
Sample portal.properties configurations for AD/LDAP
Sample AD/LDAP configurations with different scenarios.
AD/LDAP Configuration
Linux: |
ldap.enabled=true ldap.context=com.sun.jndi.ldap.LdapCtxFactory ldap.searchBase=dc=example,dc=company,dc=com ldap.url=ldap://example.company.com:389 ldap.dn=CN=Admin,CN=Users,DC=example,DC=company,DC=com ldap.password=Password ldap.password.encrypted= ldap.loginAttribute=sAMAccountName ldap.authorization=true ldap.newUserDomain=example.company.com ldap.disable.user.attribute.name= ldap.disable.user.attribute.value= #ldap.keystore=/opt/aptare/portalconf/portal.keystore #ldap.keystore.password= #ldap.keystore.password.encrypted= |
Windows: |
ldap.enabled=true ldap.context=com.sun.jndi.ldap.LdapCtxFactory ldap.searchBase=dc=example,dc=company,dc=com ldap.url=ldap://example.company.com:389 ldap.dn=CN=Admin,CN=Users,DC=example,DC=company,DC=com ldap.password=Password ldap.password.encrypted= ldap.loginAttribute=sAMAccountName ldap.authorization=true ldap.newUserDomain=example.company.com ldap.disable.user.attribute.name= ldap.disable.user.attribute.value= #ldap.keystore=c:\\opt\\aptare\\portalconf\\portal.keystore #ldap.keystore.password= #ldap.keystore.password.encrypted= |
SSL-enabled AD/LDAP Configuration
Linux: |
ldap.enabled=true ldap.context=com.sun.jndi.ldap.LdapCtxFactory ldap.searchBase=dc=example,dc=company,dc=com ldap.url=ldaps://example.company.com:636 ldap.dn=CN=Admin,CN=Users,DC=example,DC=company,DC=com ldap.password=Password ldap.password.encrypted= ldap.loginAttribute=sAMAccountName ldap.authorization=true ldap.newUserDomain=example.company.com ldap.disable.user.attribute.name= ldap.disable.user.attribute.value= ldap.keystore=/opt/aptare/portalconf/portal.keystore ldap.keystore.password=KeyStorePassword ldap.keystore.password.encrypted= |
Windows: |
ldap.enabled=true ldap.context=com.sun.jndi.ldap.LdapCtxFactory ldap.searchBase=dc=example,dc=company,dc=com ldap.url=ldaps://example.company.com:636 ldap.dn=CN=Admin,CN=Users,DC=example,DC=company,DC=com ldap.password=Password ldap.password.encrypted= ldap.loginAttribute=sAMAccountName ldap.authorization=true ldap.newUserDomain=example.company.com ldap.disable.user.attribute.name= ldap.disable.user.attribute.value= ldap.keystore=c:\\opt\\aptare\\portalconf\\portal.keystore ldap.keystore.password= KeyStorePassword ldap.keystore.password.encrypted= Note: You can use port 3269 instead of 636 if port 636 is taking more time to respond and causing timeout while trying to login to the portal. |