NetBackup IT Analytics Certified Configuration Guide

Last Published:
Product(s): NetBackup IT Analytics (11.3)
  1. Introduction
    1.  
      NetBackup IT Analytics Overview
    2.  
      Purpose of this document
    3.  
      Software and hardware disclaimer
  2. Portal and database servers
    1.  
      Portal supported operating systems
    2.  
      Recommended portal configurations
    3.  
      Oracle Database and Memory Requirements
    4. Supported browsers and display resolution
      1.  
        Linux portal server: Exported and emailed reports
    5.  
      Supported third-party and open source products
  3. Data Collector server configurations
    1.  
      Data Collector supported operating systems
    2. Data Collector server memory and CPU guidelines
      1.  
        Customize the Linux file handle setting for large collections
      2.  
        Factors impacting Data Collector performance and memory requirements
    3.  
      Data Collector prerequisites
    4.  
      Firewall configuration: Default ports
  4. Capacity Manager configurations
    1.  
      Supported systems and access requirements
    2.  
      IBM Arrays: Modify profile
    3.  
      Creating a NetApp user with API privileges
    4.  
      Creating a NetApp cluster-mode user with API privileges
    5. Array/LUN performance Data Collection
      1.  
        Port performance metrics
    6. EMC Isilon array performance metrics
      1.  
        EMC Isilon Array Performance
      2.  
        EMC Isilon Disk Performance
      3.  
        EMC Isilon Node Performance
      4.  
        EMC Isilon OneFS Performance
      5.  
        EMC Isilon Protocol Performance
    7. NetApp Cluster-Mode performance metrics
      1.  
        NetApp Cluster-Mode Aggregate Performance
      2.  
        NetApp Cluster-Mode CIFS Performance
      3.  
        NetApp Cluster-Mode Disk Performance
      4.  
        NetApp Cluster-Mode Fiber Channel Protocol Logical Interface Performance
      5.  
        NetApp Cluster-Mode LUN Performance
      6.  
        NetApp Cluster-Mode NFS Performance
      7.  
        NetApp Cluster-Mode Processor Node Performance
      8.  
        NetApp Cluster-Mode Processor Performance
      9.  
        NetApp Cluster-Mode RAID Performance
      10.  
        NetApp Cluster-Mode SMB (Server Message Block) Performance
      11.  
        NetApp Cluster-Mode System Performance
      12.  
        NetApp Cluster-Mode Target Port Performance
      13.  
        NetApp Cluster-Mode Volume Performance
    8. EMC Symmetrix enhanced performance metrics
      1.  
        Create enhanced EMC Symmetrix Performance report templates
      2.  
        EMC Symmetrix Array Performance
      3.  
        EMC Symmetrix Backend Director Performance
      4.  
        EMC Symmetrix Frontend Director Performance
      5.  
        EMC Symmetrix Front-end Port Performance
      6.  
        EMC Symmetrix Storage Group Performance
      7.  
        EMC Symmetrix Database Performance
      8.  
        EMC Symmetrix Disk Group Performance
      9.  
        EMC Symmetrix Disk Performance
      10.  
        EMC Symmetrix Device Groups Performance
      11.  
        EMC Symmetrix Disk by Technology Performance
      12.  
        EMC Symmetrix Storage Tier Performance
      13.  
        EMC Symmetrix Thin Tier Performance
      14.  
        EMC Symmetrix Thin Pool Performance
      15.  
        EMC Symmetrix Enhanced Performance metrics
    9.  
      Hitachi Vantara array performance metrics
    10.  
      Host resources prerequisites and configurations
    11. Host access privileges, sudo commands, ports, and WMI proxy requirements
      1.  
        Access requirements by OS
    12.  
      WMI proxy requirements for Windows host Data Collection
    13.  
      Host resources supported configurations
    14.  
      Pure Storage Flash Array performance metrics
    15.  
      Supported host bus adapters (HBAs)
    16.  
      Compute Resources supported configurations
  5. Cloud configurations
    1.  
      Supported systems and access requirements
  6. Virtualization Manager configurations
    1.  
      Supported versions
    2. Virtualization Manager Data Collector requirements for VMware
      1.  
        Creating a VMware Read-Only user
    3.  
      Virtualization Manager Data Collector requirements for Microsoft Hyper-V
  7. File Analytics configurations
    1. Data Collector probes by storage type
      1.  
        CIFS shares
      2.  
        Host inventory probe
      3.  
        File Analytics probe
  8. Fabric Manager configurations
    1. Switch vendors
      1.  
        Download Cisco Data Center Network Manager
  9. Backup Manager configurations
    1.  
      Backup solutions and versions
    2.  
      Centralized NetBackup Data Collection requirements
    3. Veritas NetBackup 8.1 (and later) requirements for centralized collection
      1.  
        Required Software
  10. ServiceNow configurations
    1.  
      ServiceNow configurations
  11. Internal TCP port requirements
    1.  
      Internal TCP port requirements
    2.  
      Internal portal server ports
    3.  
      Internal data collector ports

Creating a NetApp cluster-mode user with API privileges

Data collection of NetApp Cluster-Mode requires a specific read-only role and user in order to collect data for a cluster.

To create a new user account with the required privileges, use the following Command Line Interface (CLI) steps. This set of commands creates a role as apt_readonly and then a user named apt_user with read-only access.

  1. Create a read-only role using the following two commands.

    security login role create -role apt_readonly -cmddirname DEFAULT -access readonly
    security login role create -role apt_readonly -cmddirname security -access readonly
    
  2. Create the read-only user using the following command. Once you have executed the create command, you will be prompted to enter a password for this user.

    security login create -username apt_user -application ontapi -authmethod password -role apt_readonly
    

    The resulting role and user login will look something like this:

          Role            Command/                         Access
    Vserver    Name          Directory                   Query Level
    ---------- ------------- --------- ------------------ --------
    cluster1   apt_readonly  DEFAULT                      readonly
    cluster1   apt_readonly  security                     readonly
    cluster1::security login> show
    Vserver: cluster1
                                 Authentication                  Acct
    UserName         Application Method         Role Name        Locked
    ---------------- ----------- -------------- ---------------- ------
    apt_user         ontapi      password       apt_readonly     no