NetBackup IT Analytics Data Collector Notes and Troubleshooting

Last Published:
Product(s): NetBackup IT Analytics (11.1)
  1. Data Collector Troubleshooting
    1.  
      Resolving Data Collectors connections issues - Linux specific
    2.  
      Resolving Data Collectors connections issues - Windows specific
    3.  
      Portal upgrade / data collector performance issues
    4.  
      Verify the Data Collector configuration
    5.  
      Verify Connectivity
    6.  
      Configuring web proxy updates
    7.  
      Collecting missed events for Veritas Backup Exec
    8.  
      Substituting ODBC for JDBC to connect to SQL server for Veritas Backup Exec
    9.  
      Useful Data Collection scripts for capacity
    10.  
      Host resources troubleshooting
    11.  
      Host resources: Check the status of the WMI proxy server
    12.  
      Host resources: Post-Installation verification
    13. Host resources: Check host connectivity using standard SSH
      1.  
        Checking Paths for SSH
      2.  
        Environment setting for bash users
    14.  
      Host resources: Check host connectivity
    15.  
      Host resources: Check host connectivity using Host Resource Configuration file
    16. Host resources: Generating host resource configuration files
      1.  
        Sample lines in an input file
    17.  
      Host resources: Check the execution of a command on a remote server
    18.  
      Host resources Data Collection
    19.  
      Host resources: Collection in stand-alone mode
    20. Configuring parameters for SSH
      1.  
        Configure channelWaitTime
      2.  
        Configure singleChannelSession
      3.  
        Configure sudoWithPassword
    21.  
      Identifying Windows file system access errors (File Analytics)
    22.  
      Collect from remote shares (File Analytics)
    23.  
      Adding a certificate to the Java keystore
  2. Firewall Configuration: Default Ports
    1.  
      Firewall configuration: Default ports
  3. CRON Expressions and Probe Schedules
    1.  
      CRON expressions and probe schedules
  4. Clustering Data Collectors with VCS and Veritas NetBackup (RHEL 7)
    1.  
      Clustering Data Collectors with VCS and Veritas NetBackup (RHEL 7)
    2.  
      Prerequisites
    3.  
      Getting started with Data Collector clustering
    4.  
      Main.cf
    5.  
      Upgrading a clustered Data Collector
  5. Clustering Data Collectors with VCS and Veritas NetBackup (Windows)
    1.  
      Clustering Data Collectors with VCS and Veritas NetBackup (Windows)
    2.  
      Prerequisites
    3.  
      Getting with Started with Data Collector Clustering
    4.  
      Main.cf
    5.  
      Upgrading a Clustered Data Collector
  6. Firewall Configuration: Default Ports
    1.  
      Firewall configuration: Default ports
  7. Maintenance Scenarios for Message Relay Server Certificate Generation
    1.  
      Regenerate authentication certificate nearing expiry (or already expired)
    2.  
      Recover inadvertently deleted aptare.ks file
    3.  
      Authenticate new database with existing SSL certificates
    4.  
      SSL certificate authentication for a new data collector

Adding a certificate to the Java keystore

Use the following steps to add an SSL certificate to the Java keystore for a Data Collector. Some servers, such as VSphere, require a certificate for connection while communicating with SSL.

Keystore file location

Note:

For the following commands, if you are not running in the default collector location (/opt/aptare or C:\opt\aptare), substitute the appropriate APTARE_HOME in the command path.

For Windows Data Collector:

C:\opt\aptare\java\lib\security\cacerts

For Linux Data Collector:

/opt/aptare/java/lib/security/cacerts

Copy the certificate file (certfile.txt) to the Data Collector. Run the following command to add the certificate:

For Windows Data Collector:

C:\opt\jre\bin\keytool -import -alias "somealias" -file certfile.txt -keystore
C:\opt\aptare\java\lib\security\cacerts

For Linux Data Collector:

/usr/java/bin/keytool -import -alias "somealias" -file certfile.txt -keystore /opt/aptare/java/lib/security/cacerts

When prompted, enter the default password to the keystore:

changeit

The results will be similar to the following example:

Enter keystore password:
......
Certificate Shown here
......
......
......
Trust this certificate? [no]: yes

Once completed, run the following keytool command to view a list of certificates from the keystore and confirm that the certificate was successfully added. The certificate fingerprint line displays with the alias name used during the import.

For Windows Data Collector:

C:\opt\jre\bin\keytool -list -keystore C:\opt\aptare\jre\lib\security\cacerts

For Linux Data Collector:

/usr/java/bin/keytool -list -keystore /opt/aptare/jre/lib/security/cacerts

Sample Linux Output

Enter keystore password:
Keystore type: JKS
Keystore provider: SUN
Your keystore contains 79 entries
digicertassuredidrootca, Apr 16, 2008, trustedCertEntry,
Certificate fingerprint (SHA1): 05:63:B8:63:0D:62:D7:5A:BB:C8:AB:1E:4B:DF:B5:A8:99:B2:4D:43
trustcenterclass2caii, Apr 29, 2008, trustedCertEntry,
Certificate fingerprint (SHA1): AE:50:83:ED:7C:F4:5C:BC:8F:61:C6:21:FE:68:5D:79:42:21:15:6E
.....