NetBackup IT Analytics Data Collector Installation Guide for Capacity Manager
- Overview
- Pre-Installation setup for Compute Resources
- Pre-Installation setup for Dell Compellent
- Pre-Installation setup for DELL EMC Elastic Cloud Storage (ECS)
- Pre-Installation setup for Dell EMC Unity
- Pre-Installation setup for EMC data domain storage
- Pre-Installation setup for EMC Isilon
- Pre-Installation setup EMC Symmetrix
- Pre-Installation setup for EMC VNX Celerra
- Pre-Installation setup for EMC VNX
- Pre-Installation setup for EMC VPLEX
- Pre-Installation setup for EMC XtremIO
- Pre-installation setup for FUJITSU ETERNUS Data Collector
- Pre-Installation setup for Hitachi Block
- Configuring a Hitachi Device manager user
- Pre-Installation setup for Hitachi Content Platform (HCP)
- Hitachi content platform system management console
- Hitachi content platform tenant management console
- Pre-Installation Setup for Hitachi NAS
- Pre-Installation Setup for Hitachi Vantara All-Flash and Hybrid Flash Storage
- Host inventory pre-installation setup
- Host Access Privileges, Sudo Commands, Ports, and WMI Proxy Requirements
- Configure host Discovery policies to populate the host Inventory
- Validate host connectivity
- Host Inventory search and host Inventory export
- Configure and edit host probes
- Propagate Probe Settings: Copy Probes, Paste Probes
- Pre-Installation setup for HP 3PAR
- Pre-Installation setup for HP EVA
- Pre-Installation setup for HPE Nimble Storage
- Pre-Installation setup for HPE StoreOnce
- Pre-Installation setup for IBM Enterprise
- Pre-Installation setup for IBM COS
- Pre-Installation setup for IBM SVC
- Pre-Installation setup for IBM XIV
- Pre-Installation setup for Microsoft Windows server
- Pre-Installation setup for NetApp-7
- Pre-Installation setup for NetApp StorageGRID
- Pre-Installation setup for NetApp Cluster
- Pre-Installation setup for NetApp E-Series
- Pre-Installation setup for NEC HYDRAstor
- Pre-Installation setup for Pure Storage FlashArray
- Pre-Installation setup for Veritas NetBackup appliance
- Pre-installation setup for Veritas Flex Appliance
- Installing the Data Collector software
- Validating Data Collection
- Uninstalling the Data Collector
- Manually starting the Data Collector
- Appendix A. Firewall configuration: Default ports
Configure a Discovery policy
Note:
A Discovery Policy typically is used once to initially populate your host inventory. Executing a discovery policy more than once has no effect for the subsequent runs for hosts that have already been discovered and added to the inventory.
For additional information about Host Inventory Discovery and Management,
To create/edit Host Discovery Policies, select
In the Host Inventory toolbar at the top of the browser window, click
.Add, Edit, or Delete settings using the buttons at the bottom of the window.
Click
to configure settings and then click .
Table: Host Discovery Policy field descriptions.
Field | Description | Sample Values |
---|---|---|
Name* |
Assign a name to identify this Discovery Policy. | |
Collector* |
Select the data collector from the drop-down list | |
Domain* |
Select the NetBackup IT Analytics Domain from the list; for most environments, only one Domain is displayed. Multiple domains facilitate management for Managed Services Providers (MSPs). | |
Host addresses* |
|
192.168.0.1-250 172.168.1.21, ABChost1, ABChost2, 172.168.1.58 |
Excludes |
List any known IP addresses that you know are not valid for host collection; for example, the IP address of a printer. IP address ranges are also supported. | |
Configuration options |
This list gets populated when you select a Domain at the top of the Host Discovery Policies window.
Expand these lists to select the configurations to be used by this Discovery Policy. Note: If you choose more than one credential in the list, you risk host authentication failure lock-out. The discovery process will try the first credentials and if they fail, discovery will try the next credentials that you've selected. Therefore, if your hosts are configured to prevent multiple authentication retries, multiple failed attempts may cause a lock-out. |