NetBackup IT Analytics Data Collector Installation and Configuration Guide
- Section I. Introduction
- Introduction
- Install and configure a Data Collector
- Step-1: Choose operating system and complete prerequisites
- Installing the Data Collector software
- Configure SSL
- Section II. Data Protection
- Configuration for Veritas Backup Exec
- Configuration for Cohesity DataProtect
- Configuration for Commvault Simpana
- Open TCP/IP access to the Commvault database
- Set up a read-only user in the CommServe server
- Configuration for EMC Avamar
- Import EMC Avamar server information
- Configuration for EMC Data Domain backup
- Configuration for Dell EMC NetWorker backup & recovery
- Importing generic backup data
- Configuration for generic backup
- CSV format specification
- Configuration for HP Data Protector
- Architecture overview (HP Data Protector)
- Configure the Data Collector server in Cell Manager (HP Data Protector)
- Configuration for IBM Spectrum Protect (TSM)
- Architecture overview (IBM Spectrum Protect -TSM)
- Import IBM Spectrum Protect (TSM) information
- Configuration for NAKIVO Backup & Replication
- Configuration for Oracle Recovery Manager (RMAN)
- Configuration for Rubrik Cloud Data Management
- Configuration for Veeam Backup & Replication
- Configuration for Veritas Backup Exec
- Section III. Storage (Capacity)
- Configuration for Compute Resources
- Configuration for DELL EMC Elastic Cloud Storage (ECS)
- Configuration for Dell EMC Unity
- Configuration for EMC data domain storage
- Configuration for EMC Isilon
- Configuration for EMC Symmetrix
- Configuration for EMC VNX Celerra
- Configuration for EMC VNX CLARiiON
- Configuration for EMC VPLEX
- Configuration for EMC XtremIO
- Configuration for FUJITSU ETERNUS Data Collector
- Configuration for Hitachi Block
- Configuring a Hitachi Device manager user
- Configuration for Hitachi Content Platform (HCP)
- Hitachi content platform system management console
- Hitachi content platform tenant management console
- Configuration for Hitachi NAS
- Configuration for Hitachi Vantara All-Flash and Hybrid Flash Storage
- Configuration of Host inventory
- Host Access Privileges, Sudo Commands, Ports, and WMI Proxy Requirements
- Configure host Discovery policies to populate the host Inventory
- Validate host connectivity
- Host Inventory search and host Inventory export
- Configure and edit host probes
- Propagate Probe Settings: Copy Probes, Paste Probes
- Configuration for HP 3PAR
- Configuration for HP EVA
- Configuration for HPE Nimble Storage
- Configuration for HPE StoreOnce
- Configuration for IBM Enterprise
- Configuration for IBM COS
- Configuration for IBM SVC
- Configuration for IBM XIV
- Configuration for Microsoft Windows server
- Configuration for NetApp-7
- Configuration for NetApp StorageGRID
- Configuration for NetApp Cluster
- Configuration for NetApp E-Series
- Configuration for NEC HYDRAstor
- Configuration for Pure Storage FlashArray
- Section IV. Compute (Virtualization and Host Collection)
- Configuration for VMware
- Configuration for IBM VIO
- Configuration for Microsoft Hyper-V
- Section V. Cloud
- Configuration for Amazon Web Services (AWS)
- Mandatory probe user privileges
- Link AWS accounts for Collection of consolidated billing data
- Configuration for Google Cloud Platform
- Configuration for OpenStack Ceilometer
- Configuration for OpenStack Swift
- Configuration for Microsoft Azure
- Configuration for Amazon Web Services (AWS)
- Section VI. Fabric
- Configuration for Brocade switch
- Configuration for Cisco switch
- Configuration for Brocade Zone alias
- Configuration for Cisco Zone alias
- Configuration for Brocade switch
- Section VII. File Analytics
- Configuration for File Analytics
- Host Discovery and Collection File Analytics probe
- Adding a File Analytics Data Collector policy
- File Analytics Export Folder Size and Folder Depth
- Configuration for File Analytics
- Section VIII. Data Collection Validation and Troubleshooting
- Validate data collection
- Data Collector Troubleshooting
- Host resources: Check host connectivity using standard SSH
- Host resources: Generating host resource configuration files
- Configuring parameters for SSH
- Uninstalling the Data Collector
- Appendix A. Firewall Configuration: Default Ports
- Appendix B. Load historic events
- Load Veritas NetBackup events
- Appendix C. CRON Expressions for Policy and Report Schedules
- Appendix D. Maintenance Scenarios for Message Relay Server Certificate Generation
Add EMC data domain servers
For each EMC Data Domain server specified in the NetBackup IT Analytics Data Collector Pre-Installation worksheet, add the Data Domain server(s) to NetBackup IT Analytics by following the steps outlined in this section.
Note:
When adding an EMC Data Domain Server, in the Inventory select
, not Backup Servers.In the Portal, add a host for each Data Domain server.
External Host Name - Displayed in the Portal.
Internal Host Name - Must match the host name of the Data Domain server; fully qualified domain name (FQDN).
Backup Type - Data Domain Server
If collecting Folder-Level Compression data, refer to the following section.
In addition to the values that were entered when an EMC Data Domain server was created, credentials are required to access and collect from the server. Also, if Folder-Level Compression collection is desired, folder paths can be specified.
Folder-level data compression rates enable reporting on used disk space associated with shares and mounts, and folders within those shares and mounts. In the data collection policy, define the share folder depth to be interrogated. For example, a single share may have individual folders for business units. Data about these folders and files is collected and collated, based on the folder depth specified.
Enter the following details and click
.
Field | Description | Sample Value |
---|---|---|
Data Domain Server Name* |
In order for Data Domain Servers to be listed in the policy window, they must have been created via the Inventory and configured with a of . |
DDM-HQ |
SSH User ID* |
The command-line interface (CLI) via SSH is used to gather Data Domain system data. This requires a view-only Data Domain User ID that must be a member of the Data Domain system Admin group. This User ID must be the same for all addresses listed in the System Addresses entry field for the Data Domain systems. |
Administrator |
Password |
The password associated with the User ID. |
Pwd1 |
Repeat Password |
The password associated with the User ID. |
Pwd1 |
Folder-Level Compression |
Select the option to either include or exclude collection and then enter folders to the list. If the exclude option is selected with an empty folder list, compression data from all folders will be collected. If the include option is selected with an empty folder list, no folder-level compression data will be collected. The folders should start with /data/col1 Warning: Choosing to exclude compression collection with an empty folder list may cause collection to take several hours to complete. |
/data/col1/dd890-nbuprod |
Folder Depth (from data/col1) |
Specify the folder depth to be interrogated. For example, a single share may have individual folders for business units. Data about these folders and files is collected and collated, based on the folder depth specified. The folder depth starts from the folder path name that is specified in the include list or from /data/col1, if no include folders are specified. An empty value means that data collection will collect all the sub-folders within each folder specified in the include list. |
1 |