NetBackup IT Analytics Data Collector Installation and Configuration Guide

Last Published:
Product(s): NetBackup IT Analytics (11.6)
Platform: Complete,Protection,Storage
  1. Section I. Introduction
    1. Introduction
      1.  
        Overview
      2.  
        Distributed Data Collector (recommended for NetBackup)
      3.  
        Centralized Data Collector
      4.  
        Data Collector prerequisites
    2. Install and configure a Data Collector
      1.  
        Overview
      2. Step-1: Choose operating system and complete prerequisites
        1.  
          Factors impacting Data Collector performance and memory requirements
        2.  
          Data Collector supported operating systems
        3.  
          Data Collector server memory and CPU guidelines
        4.  
          Additional prerequisites
        5.  
          Linux Data Collector Prerequisites: Changing the Linux Temporary Directory for Collection
      3.  
        Step-2: HTTPS requirement
      4.  
        Step-3: Add Data Collector on NetBackup IT Analytics Portal
      5.  
        Step-4: Install the Data Collector
      6.  
        Step-5: Verify the Data Collector is online from the Portal
      7.  
        Step-6: Confirm that the Data Collector is updated
      8.  
        Step-7: Configure the data collection policy
      9.  
        Step-8: Confirm that the data collection policy is collecting data
    3. Installing the Data Collector software
      1.  
        Introduction
      2.  
        Considerations to install Data Collector on non-English systems
      3.  
        Install Data Collector Software on Windows
      4.  
        Install Data Collector software on Linux
      5.  
        Deploy Data Collector in native Kubernetes environment
      6.  
        Configure Data Collector manually for Cohesity NetBackup
      7.  
        Install Data Collector binaries on Windows (without configuration)
      8.  
        Install Data Collector binaries on Linux host (without configuration)
    4. Configure SSL
      1.  
        SSL/TLS certificate configuration
      2.  
        SSL implementation overview
      3.  
        Obtain an SSL certificate
      4.  
        Update the web server configuration to enable SSL on the Portal server
      5.  
        Enable / Disable SSL for a Data Collector
      6.  
        Enable / Disable SSL for emailed reports
      7.  
        Test and troubleshoot SSL configurations
      8.  
        Keystore file locations on the Data Collector server
      9.  
        Import a certificate into the Data Collector Java keystore
      10.  
        Keystore on the portal server
      11.  
        Add a virtual interface to a Linux server
      12.  
        Add a virtual / secondary IP address on Windows
  2. Section II. Data Protection
    1. Configuration for Veritas Backup Exec
      1.  
        Introduction
      2.  
        Architecture overview (Veritas Backup Exec)
      3.  
        Backup Exec terminology
      4.  
        Prerequisites for adding data collectors (Veritas Backup Exec)
      5.  
        Installation overview (Veritas Backup Exec)
      6.  
        Enable TCP/IP for the SQL server
      7.  
        Configure a Windows user
      8.  
        Add Veritas Backup Exec servers
      9.  
        Importing Backup Exec Server information
      10.  
        Add a Veritas Backup Exec Data Collector policy
    2. Configuration for Cohesity DataProtect
      1.  
        Introduction
      2.  
        Prerequisites for adding Data Collectors (Cohesity DataProtect)
      3.  
        Installation overview (Cohesity DataProtect)
      4.  
        Add a Cohesity DataProtect Data Collector policy
    3. Configuration for Commvault Simpana
      1.  
        Introduction
      2.  
        Architecture overview (Commvault Simpana)
      3.  
        Prerequisites for adding Data Collectors (Commvault Simpana)
      4.  
        Upgrade troubleshooting: Microsoft SQL Server and Java 11
      5.  
        Installation overview (Commvault Simpana)
      6. Open TCP/IP access to the Commvault database
        1.  
          Additional Static Port Configuration Steps
      7. Set up a read-only user in the CommServe server
        1.  
          Option 1: Execute SQL commands in the CommServe database
        2.  
          Option 2: Use MSSQL Management Studio
      8.  
        Load historical data prior to initial data collection
      9.  
        Add Commvault Simpana servers
      10.  
        Add a Commvault Simpana Data Collector policy
    4. Configuration for EMC Avamar
      1.  
        Introduction
      2.  
        Architecture overview (EMC Avamar)
      3.  
        Prerequisites for adding Data Collectors (EMC Avamar)
      4.  
        Installation overview (EMC Avamar)
      5.  
        Add EMC Avamar servers
      6.  
        Adding an EMC Avamar Data Collector policy
      7.  
        Testing the collection
      8.  
        Add/Configure an Avamar Server within the Data Collector policy window
      9. Import EMC Avamar server information
        1.  
          CSV Format Specifications
        2.  
          Import Notes
      10.  
        Export EMC Avamar server information
    5. Configuration for EMC Data Domain backup
      1.  
        Architecture overview (EMC Data Domain Backup)
      2.  
        Prerequisites for adding Data Collectors (EMC Data Domain Backup)
      3.  
        Installation overview (EMC data domain Backup)
      4.  
        Add EMC data domain servers
      5.  
        Add an EMC data domain backup Data Collector policy
      6.  
        Adding/Configuring an EMC data domain server within the Data Collector policy window
      7.  
        Configure a data domain server for file-level compression collection
    6. Configuration for Dell EMC NetWorker backup & recovery
      1.  
        Introduction
      2.  
        Prerequisites for adding data collectors (Dell EMC NetWorker Backup & Recovery)
      3.  
        Installation overview (Dell EMC Networker Backup & Recovery)
      4.  
        Adding a Dell EMC Networker Backup & Recovery Data Collector policy
    7. Importing generic backup data
      1. About generic backup data collection
        1.  
          Considerations
      2.  
        Configuring generic backup data collection
      3. CSV Format Specification
        1.  
          EXAMPLE: genericBackupJobs.csv
      4.  
        Manually loading the CSV file
    8. Configuration for generic backup
      1.  
        Introduction
      2.  
        Generic backup data collection
      3.  
        Prerequisites for adding Data Collectors (Generic Backup)
      4.  
        Installation overview (generic backup)
      5.  
        Add generic backup servers
      6.  
        Add a generic backup Data Collector policy
      7.  
        Adding/Editing a generic backup server within the Data Collector policy
      8.  
        Manually load the CSV file (generic backup)
      9. CSV format specification
        1.  
          EXAMPLE: genericBackupJobs.csv
    9. Configuration for HP Data Protector
      1.  
        Introduction
      2. Architecture overview (HP Data Protector)
        1.  
          Cell Manager
        2.  
          Disk agent (backup agent)
        3.  
          Media agent
        4.  
          Client systems
        5.  
          User interface (UI)
      3.  
        Prerequisites for adding Data Collectors (HP Data Protector)
      4.  
        Installation overview (HP Data Protector)
      5.  
        Identify HP Data Protector collection requirements
      6.  
        Cell Manager commands for data collection
      7.  
        Preparing for centralized data collection on a remote Cell Manager
      8. Configure the Data Collector server in Cell Manager (HP Data Protector)
        1.  
          Requirements for the Data Collector (Windows)
        2.  
          Steps to Configure the Data Collector Server in Cell Manager
      9.  
        Configure an HP Data Protector admin user
      10.  
        Validate HP Data Protector setup
      11.  
        Add HP Cell Manager servers to NetBackup IT Analytics
      12.  
        Add an HP Data Protector Data Collector policy
      13.  
        Add/Edit a HP Data Protector server within the Data Collector policy
      14.  
        Tune the configuration
    10. Configuration for IBM Spectrum Protect (TSM)
      1.  
        Introduction
      2. Architecture overview (IBM Spectrum Protect -TSM)
        1.  
          IBM Spectrum Protect (TSM) - servers and instances defined
      3.  
        Prerequisites for adding data collectors (IBM Spectrum Protect - TSM)
      4.  
        Installation overview (IBM Spectrum Protect - TSM)
      5.  
        Add IBM Spectrum Protect (TSM) servers
      6.  
        Adding an IBM Spectrum Protect (TSM) Data Collector policy
      7.  
        Add/Configure an IBM Spectrum Protect (TSM) server within the Data Collector policy
      8. Import IBM Spectrum Protect (TSM) information
        1.  
          CSV format specifications
      9.  
        Export IBM Spectrum Protect (TSM) server information
    11. Configuration for NAKIVO Backup & Replication
      1.  
        Introduction
      2.  
        Prerequisites for adding data collectors (NAKIVO Backup & Replication)
      3.  
        Installation overview (NAKIVO Backup & Replication)
      4.  
        Add a NAKIVO Backup & Replication Data Collector policy
    12. Configuration for Oracle Recovery Manager (RMAN)
      1.  
        Introduction
      2.  
        Prerequisites for adding data collectors (Oracle Recovery Manager - RMAN)
      3.  
        Installation overview (Oracle Recovery Manager - RMAN)
      4.  
        Add an Oracle Recovery Manager (RMAN) Data Collector policy
    13. Configuration for Rubrik Cloud Data Management
      1.  
        Introduction
      2.  
        Prerequisites for adding Data Collectors (Rubrik Cloud Data Management)
      3.  
        Installation overview (Rubrik Cloud Data Management)
      4.  
        Add a Rubrik Cloud Data Management Data Collector policy
    14. Configuration for Veeam Backup & Replication
      1.  
        Introduction
      2.  
        Prerequisites for adding data collectors (Veeam Backup & Replication)
      3.  
        Verifying Data Collector servers can connect to Veeam servers
      4.  
        Known issues and limitations (Veeam Backup & Replication)
      5.  
        Installation overview (Veeam Backup & Replication)
      6.  
        Add a Veeam Backup & Replication Data Collector policy
  3. Section III. Storage (Capacity)
    1. Configuration for Compute Resources
      1.  
        Overview
      2.  
        Prerequisites for adding Data Collectors - Compute Resources
      3.  
        Installation overview
      4.  
        Add a Compute Resources policy
    2. Configuration for DELL EMC Elastic Cloud Storage (ECS)
      1.  
        Pre-Installation setup for DELL EMC Elastic Cloud Storage (ECS)
      2.  
        Prerequisites for adding Data Collectors - DELL EMC Elastic Cloud Storage (ECS)
      3.  
        Installation overview - DELL EMC Elastic Cloud Storage (ECS)
      4.  
        Add a DELL EMC Elastic Cloud Storage (ECS) Data Collector policy
    3. Configuration for Dell EMC Unity
      1.  
        Pre-Installation setup for Dell EMC Unity
      2.  
        Prerequisites for adding Data Collectors (Dell EMC Unity)
      3.  
        Installation overview (Dell EMC Unity)
      4.  
        Add a Dell EMC Unity Data Collector policy
    4. Configuration for EMC data domain storage
      1.  
        Architecture overview (EMC data domain storage)
      2.  
        Prerequisites for adding data Collectors (EMC data domain storage)
      3.  
        Installation overview (EMC data domain storage)
      4.  
        Add EMC data domain servers
      5.  
        Adding an EMC data domain storage Data Collector policy
    5. Configuration for EMC Isilon
      1.  
        Pre-Installation setup for EMC Isilon
      2.  
        Prerequisites for adding Data Collectors (EMC Isilon)
      3.  
        Configure the Isilon SNMP service
      4. Configure Isilon sudo access
        1.  
          Modify the Sudo configuration
      5.  
        Installation overview (EMC Isilon)
      6.  
        Adding an EMC Isilon Data Collector policy
    6. Configuration for EMC Symmetrix
      1.  
        Pre-Installation setup EMC Symmetrix
      2.  
        Prerequisites for adding Data Collectors (EMC Symmetrix)
      3.  
        Installation overview (EMC Symmetrix)
      4. Adding an EMC Symmetrix Data Collector policy
        1.  
          If the EMC solutions enabler is on a remote server (Recommended)
    7. Configuration for EMC VNX Celerra
      1.  
        Pre-Installation setup for EMC VNX Celerra
      2.  
        Prerequisites for adding Data Collectors (EMC VNX Celerra)
      3.  
        Setup for EMC VNX Celerra arrays
      4.  
        Configure a Read-Only user with an Operator role
      5.  
        Start the XML API server
      6.  
        Installation overview (EMC VNX Celerra)
      7.  
        Adding an EMC VNX Celerra Data Collector policy
    8. Configuration for EMC VNX CLARiiON
      1.  
        Pre-Installation setup for EMC VNX
      2.  
        Prerequisites for adding Data Collectors (EMC VNX)
      3.  
        Installation overview (EMC VNX)
      4.  
        Adding an EMC VNX Data Collector policy
    9. Configuration for EMC VPLEX
      1.  
        Pre-Installation setup for EMC VPLEX
      2.  
        Prerequisites for adding Data Collectors (EMC VPLEX)
      3.  
        Installation overview (EMC VPLEX)
      4.  
        Adding a EMC VPLEX Data Collector policy
    10. Configuration for EMC XtremIO
      1.  
        Pre-Installation setup for EMC XtremIO
      2.  
        Prerequisites for adding Data Collectors (EMC XtremIO)
      3.  
        Installation overview (EMC XtremIO)
      4.  
        Add an EMC XtremIO Data Collector policy
    11. Configuration for FUJITSU ETERNUS Data Collector
      1.  
        About data collector
      2.  
        Pre-installation setup
      3.  
        Prerequisites for adding Data Collectors
      4.  
        Installation overview
      5.  
        Adding a FUJITSU ETERNUS Data Collector policy
    12. Configuration for Hitachi Block
      1.  
        Pre-Installation setup for Hitachi Block
      2.  
        Prerequisites for adding Data Collectors (Hitachi Block)
      3.  
        Installation overview (Hitachi Block Storage)
      4.  
        Adding a Hitachi Block Storage Data Collector policy
      5. Configuring a Hitachi Device manager user
        1.  
          Validate the User ID access
      6.  
        Configuring a Collector for Hitachi NAS block storage
      7.  
        Adding an HP command view advanced Data Collector policy
    13. Configuration for Hitachi Content Platform (HCP)
      1.  
        Pre-Installation setup for Hitachi Content Platform (HCP)
      2.  
        Prerequisites for adding Data Collectors (Hitachi Content Platform)
      3.  
        Installation overview (Hitachi Content Platform)
      4.  
        Add a Hitachi Content Platform (HCP) Data Collector policy
      5.  
        Setting up permissions for an HCP local user or active directory user
      6. Hitachi content platform system management console
        1.  
          Local users
        2.  
          Local users and active directory users
      7. Hitachi content platform tenant management console
        1.  
          Local users
        2.  
          Active directory users
        3.  
          Local users and active directory users
    14. Configuration for Hitachi NAS
      1.  
        Pre-Installation setup Hitachi NAS
      2.  
        Prerequisites for adding Data Collectors (Hitachi NAS - HNAS)
      3.  
        Installation overview (Hitachi NAS - HNAS)
      4.  
        Adding a Hitachi NAS (HNAS) Data Collector policy
      5. HNAS configuration requirements
        1.  
          Configuring SSC access
      6.  
        Adding the collector
    15. Configuration for Hitachi Vantara All-Flash and Hybrid Flash Storage
      1.  
        Pre-Installation setup for Hitachi Vantara All-Flash and Hybrid Flash Storage
      2.  
        Prerequisites for adding Data Collectors (Hitachi Vantara All-Flash and Hybrid Flash Storage)
      3.  
        Installation overview
      4.  
        Adding a Hitachi Vantara All-Flash and Hybrid Flash Storage policy
    16. Configuration of Host inventory
      1. Host Access Privileges, Sudo Commands, Ports, and WMI Proxy Requirements
        1.  
          Access Requirements by OS
      2.  
        Host Inventory pre-installation setup
      3.  
        Plan host Data Collection
      4.  
        WMI Proxy requirements for Windows host Data Collection
      5.  
        Host access requirements
      6.  
        Verify command paths
      7.  
        Host Inventory configuration steps
      8.  
        Host Inventory setup overview
      9.  
        Host Inventory maintenance overview
      10.  
        Before discovering hosts
      11.  
        Configure / Search the host Inventory
      12.  
        Manage credentials
      13.  
        Manage WMI proxy
      14.  
        Manage paths
      15.  
        Manage access control
      16.  
        Host Inventory management
      17. Configure host Discovery policies to populate the host Inventory
        1.  
          Discovery policy considerations
        2.  
          Configure a Discovery policy
        3.  
          Collecting from Clustered SQL server and Oracle applications
      18.  
        Execute and monitor host Discovery
      19. Validate host connectivity
        1.  
          Validate hosts
        2.  
          Validation history
      20.  
        Show errors
      21.  
        Filter the host Inventory - hide / un-hide, remove
      22. Host Inventory search and host Inventory export
        1.  
          Basic search
        2.  
          Pre-Defined search
        3.  
          Advanced search parameters
      23.  
        Export the host Inventory
      24. Configure and edit host probes
        1.  
          Host Inventory File Analytics probe
        2.  
          File Analytics Probe configurations by operating system
        3.  
          Both Windows and Linux servers
        4.  
          Best practices for Host Inventory File Analytics probes
      25. Propagate Probe Settings: Copy Probes, Paste Probes
        1.  
          Probe settings
    17. Configuration for HP 3PAR
      1.  
        Pre-Installation setup for HP 3PAR
      2.  
        Prerequisites for adding Data Collectors (HP 3PAR)
      3.  
        Installation Overview (HP 3PAR)
      4.  
        Adding an HP 3PAR Data Collector Policy
      5.  
        Adding an HP command view advanced Data Collector policy
    18. Configuration for HP EVA
      1.  
        Pre-Installation setup for HP EVA
      2.  
        Prerequisites for adding Data Collectors (HP EVA)
      3.  
        Installation overview (HP EVA)
      4.  
        Adding an HP EVA Data Collector policy
    19. Configuration for HPE Nimble Storage
      1.  
        Pre-Installation setup for HPE Nimble Storage
      2.  
        Prerequisites for adding Data Collectors (HPE Nimble Storage)
      3.  
        Installation overview (HPE Nimble Storage)
      4.  
        Adding an HPE Nimble Storage Data Collector policy
    20. Configuration for HPE StoreOnce
      1.  
        Pre-Installation setup for HPE StoreOnce
      2.  
        Prerequisites for adding Data Collectors (HPE StoreOnce)
      3.  
        Installation overview
      4.  
        Adding a HPE StoreOnce policy
    21. Configuration for IBM Enterprise
      1.  
        Pre-Installation setup for IBM Enterprise
      2.  
        Prerequisites for adding Data Collectors (IBM Enterprise)
      3.  
        Installation overview (IBM Enterprise)
      4.  
        Adding an IBM Enterprise Data Collector policy
    22. Configuration for IBM COS
      1.  
        Introduction
      2.  
        Prerequisites for adding data collectors (IBM COS)
      3.  
        Installation overview (IBM COS)
      4.  
        Add IBM COS Data Collector policy
    23. Configuration for IBM SVC
      1.  
        Pre-Installation setup for IBM SVC
      2.  
        Prerequisites for adding Data Collectors (IBM SVC)
      3.  
        Installation overview (IBM SVC)
      4.  
        Adding an IBM SVC Data Collector policy
    24. Configuration for IBM XIV
      1.  
        Pre-Installation Setup for IBM XIV
      2.  
        Prerequisites for adding Data Collectors (IBM XIV)
      3.  
        Installation overview (IBM XIV)
      4.  
        Adding an IBM XIV Data Collector policy
    25. Configuration for Microsoft Windows server
      1.  
        Pre-Installation setup for Microsoft Windows server
      2.  
        Prerequisites for adding Data Collectors (Microsoft Windows server)
      3.  
        Collecting from applications and services logs
      4.  
        Installation overview (Microsoft Windows Server)
      5.  
        Add a Microsoft Windows server Data Collector policy
    26. Configuration for NetApp-7
      1.  
        Pre-Installation setup for NetApp-7
      2.  
        Prerequisites for adding Data Collectors (NetApp-7)
      3. Data Collector configurations specific to NetApp-7
        1.  
          If HTTP access is disabled on the vFiler
      4.  
        Installation overview (NetApp-7)
      5.  
        Adding a NetApp Data Collector policy
      6.  
        Testing the collection
      7.  
        Creating a NetApp user with API privileges
    27. Configuration for NetApp StorageGRID
      1.  
        NetApp StorageGRID overview
      2.  
        Prerequisites for adding Data Collectors (NetApp StorageGRID)
      3.  
        Data Collector configuration specific to NetApp StorageGRID
      4.  
        Installing NetApp StorageGRID
      5.  
        Adding a NetApp StorageGRID Data Collector policy
      6.  
        Testing the collection
    28. Configuration for NetApp Cluster
      1.  
        Pre-Installation setup for NetApp Cluster
      2.  
        Prerequisites for adding Data Collectors (NetApp Cluster)
      3.  
        Installation overview (NetApp Cluster-Mode)
      4.  
        Adding a NetApp Cluster-Mode Data Collector policy
      5.  
        Testing the collection
      6.  
        Creating a NetApp Cluster-Mode Read-Only user
    29. Configuration for NetApp E-Series
      1.  
        Pre-Installation setup for NetApp E-Series
      2.  
        Prerequisites for adding Data Collectors (NetApp E-Series)
      3.  
        Installation overview (NetApp E-Series)
      4.  
        Adding a NetApp E-Series Data Collector policy
    30. Configuration for NEC HYDRAstor
      1.  
        Introduction
      2.  
        Architecture overview
      3.  
        Supported models and versions
      4.  
        Prerequisites for adding a Data Collector
      5.  
        Installation overview
      6.  
        Adding a policy
    31. Configuration for Pure Storage FlashArray
      1.  
        Pre-Installation setup for pure Storage FlashArray
      2.  
        Prerequisites for adding Data Collectors (pure Storage FlashArray)
      3.  
        Installation overview (Pure storage FlashArray)
      4.  
        Add a pure storage FlashArray Data Collector policy
  4. Section IV. Compute (Virtualization and Host Collection)
    1. Configuration for VMware
      1.  
        Pre-Installation setup for VMware
      2.  
        VMware Data Collection
      3. Prerequisites for adding data collectors (VMware)
        1.  
          Virtualization Manager: Collection of VMware Data
        2. Configure VMware Access
          1.  
            Pre-requisites for vSAN Data Collection
          2.  
            Creating a VMware Read-Only User with Required Permissions
      4.  
        Installation overview (VMware)
      5.  
        Add a VMware Data Collector policy
      6. Datastore scan collection
        1.  
          Reports impacted by Datastore Collection
    2. Configuration for IBM VIO
      1.  
        Pre-Installation setup for IBM VIO
      2.  
        Prerequisites for adding data collectors (IBM VIO)
      3.  
        Installation overview (IBM VIO)
      4.  
        Adding servers for the IBM VIO Data Collector policy
      5.  
        VIO servers (IBM Virtual I/O Servers)
      6.  
        LPAR clients (IBM Logical Partitioning Clients) managed by VIO servers
      7.  
        HMC (IBM Hardware Management Console)
      8.  
        Add an IBM VIO Data Collector policy
    3. Configuration for Microsoft Hyper-V
      1.  
        Pre-Installation setup for Microsoft Hyper-V
      2.  
        Prerequisites for adding data collectors (Microsoft Hyper-V)
      3.  
        Installation overview (Microsoft Hyper-V)
      4.  
        Add a Microsoft Hyper-V Data Collector policy
  5. Section V. Cloud
    1. Configuration for Amazon Web Services (AWS)
      1.  
        Pre-Installation setup for Amazon Web services (AWS)
      2.  
        Prerequisites for adding Data Collectors (Amazon Web services)
      3.  
        Prerequisite Amazon Web services (AWS) configurations
      4.  
        Configure an S3 bucket to receive billing reports
      5.  
        Select cost allocation tags
      6.  
        Create an AWS IAM user
      7. Mandatory probe user privileges
        1.  
          For all probes
        2.  
          For independent probes
      8. Link AWS accounts for Collection of consolidated billing data
        1.  
          Create a role for NetBackup IT Analytics Data Collection
        2.  
          Add the role to the IAM user
      9.  
        Installation overview (Amazon Web Services - AWS)
      10.  
        Add an Amazon Web Services (AWS) policy
    2. Configuration for Google Cloud Platform
      1.  
        Overview
      2.  
        Pre-installation setup for GCP
      3.  
        Prerequisites for adding Data Collectors (GCP)
      4.  
        Installation GCP
      5.  
        Adding policy
      6.  
        Testing the collection
      7.  
        Creating an IAM role
      8.  
        Billing Data Access Role
      9.  
        Cloud API
      10.  
        Project access
    3. Configuration for OpenStack Ceilometer
      1.  
        Pre-Installation setup for OpenStack Ceilometer
      2.  
        Prerequisites for adding Data Collectors (OpenStack Ceilometer)
      3.  
        Installation Overview (OpenStack Ceilometer)
      4.  
        Adding an OpenStack Ceilometer Data Collector policy
    4. Configuration for OpenStack Swift
      1.  
        Pre-Installation setup for OpenStack Swift
      2.  
        Prerequisites for adding Data Collectors (Dell compellent)
      3.  
        Installation overview (OpenStack Swift)
      4.  
        Adding an OpenStack Swift Data Collector policy
    5. Configuration for Microsoft Azure
      1.  
        Pre-Installation setup for Microsoft Azure
      2.  
        Setting up credentials for Microsoft Azure Data Collection
      3.  
        Install the Azure PowerShell client on a Windows computer
      4.  
        Find your tenant and subscription ID
      5.  
        Register a new application for the Data Collector
      6.  
        Create a principal and assign role to the application
      7.  
        Prerequisites for Adding Data Collectors (Microsoft Azure)
      8.  
        Installation overview (Microsoft Azure)
      9.  
        Add a Microsoft Azure Data Collector policy
  6. Section VI. Fabric
    1. Configuration for Brocade switch
      1.  
        Pre-Installation setup for Brocade switch
      2.  
        Prerequisites for adding Data Collectors (Brocade switch)
      3.  
        Upgrade troubleshooting: Brocade BNA SMI-S (CIM) server and Java 11
      4.  
        Supported switches
      5.  
        Brocade switches: Default ports and firewall considerations
      6.  
        Installation overview (Brocade switch)
      7.  
        Brocade switch Data Collector policy
    2. Configuration for Cisco switch
      1.  
        Pre-Installation setup for Cisco switch
      2.  
        Prerequisites for adding Data Collectors (Cisco switch)
      3.  
        Upgrade troubleshooting: Cisco DCNM SMI-S (CIM) server and Java 11
      4.  
        Cisco switches: Default ports and firewall considerations
      5.  
        Installation overview (Cisco switch)
      6.  
        Cisco switch Data Collection policy
      7.  
        Before you start Cisco switch Data Collection
    3. Configuration for Brocade Zone alias
      1.  
        Pre-Installation setup for Brocade zone alias
      2.  
        Prerequisites for adding Data Collectors (Brocade zone alias)
      3.  
        Brocade switches: Default ports and firewall considerations
      4.  
        Installation overview (Brocade zone alias)
      5.  
        Brocade zone alias Data Collector policy
    4. Configuration for Cisco Zone alias
      1.  
        Pre-Installation setup Cisco zone alias
      2.  
        Prerequisites for adding Data Collectors (Cisco zone alias)
      3.  
        Cisco switches: Default ports and firewall considerations
      4.  
        Installation overview (Cisco Zone Alias)
      5.  
        Cisco zone alias Data Collector policy
  7. Section VII. File Analytics
    1. Configuration for File Analytics
      1.  
        Pre-Installation setup for File Analytics
      2.  
        File Analytics Data Collection overview
      3.  
        File Analytics Data Collection architecture
      4.  
        File Analytics Data Collector policies
      5.  
        Prerequisites for adding Data Collectors (File Analytics)
      6.  
        CIFS shares
      7. Host Discovery and Collection File Analytics probe
        1.  
          File Analytics Probe Configurations by operating system
        2.  
          Both Windows and Linux servers
        3.  
          Best practices for host Inventory File Analytics probes
      8. Adding a File Analytics Data Collector policy
        1.  
          Importing the CIFS share configuration
      9.  
        Set up FIPS compliant Data Collector for File Analytics
    2. File Analytics Export Folder Size and Folder Depth
      1.  
        Extracting File Analytics export folder size
      2.  
        Specifying the File Analytics folder depth
  8. Section VIII. Data Collection Validation and Troubleshooting
    1. Validate data collection
      1.  
        Validation methods
      2.  
        Data Collectors: Vendor-Specific validation methods
      3. Working with on-demand Data Collection
        1.  
          View real-time logging during an on-demand collection
        2.  
          Generating debug level logs during an on-demand collection
      4.  
        Collect historic data on-demand
      5.  
        Using the CLI check install utility
      6.  
        List Data Collector configurations
    2. Data Collector Troubleshooting
      1.  
        Resolving Data Collectors connections issues - Linux specific
      2.  
        Resolving Data Collectors connections issues - Windows specific
      3.  
        Portal upgrade performance issues
      4.  
        Verify the Data Collector configuration
      5.  
        Verify Connectivity
      6.  
        Configuring web proxy updates
      7.  
        Collecting missed events for Veritas Backup Exec
      8.  
        Substituting ODBC for JDBC to connect to SQL server for Veritas Backup Exec
      9.  
        Useful Data Collection scripts for capacity
      10.  
        Host resources troubleshooting
      11.  
        Host resources: Check the status of the WMI proxy server
      12.  
        Host resources: Post-Installation verification
      13. Host resources: Check host connectivity using standard SSH
        1.  
          Checking Paths for SSH
        2.  
          Environment setting for bash users
      14.  
        Host resources: Check host connectivity
      15.  
        Host resources: Check host connectivity using Host Resource Configuration file
      16. Host resources: Generating host resource configuration files
        1.  
          Sample lines in an input file
      17.  
        Host resources: Check the execution of a command on a remote server
      18.  
        Host resources Data Collection
      19.  
        Host resources: Collection in stand-alone mode
      20. Configuring parameters for SSH
        1.  
          Configure channelWaitTime
        2.  
          Configure singleChannelSession
        3.  
          Configure sudoWithPassword
      21.  
        Identifying Windows file system access errors (File Analytics)
      22.  
        Collect from remote shares (File Analytics)
      23.  
        Adding a certificate to the Java keystore
    3. Uninstalling the Data Collector
      1.  
        Uninstall the Data Collector on Linux
      2.  
        Uninstall the Data Collector on Windows
  9. Appendix A. Firewall Configuration: Default Ports
    1.  
      Firewall configuration: Default ports
  10. Appendix B. Load historic events
    1.  
      Introduction
    2.  
      Load Commvault Simpana events
    3.  
      Load EMC Avamar events
    4.  
      Load EMC NetWorker events
    5.  
      Load HP Data Protector events
    6.  
      Load IBM Spectrum Protect (TSM) events
    7.  
      Load Oracle Recovery Manager (RMAN) events
    8.  
      Load Veeam Backup & Replication events
    9. Load Veritas NetBackup events
      1.  
        Load events for individual NetBackup clients
      2.  
        Load events for a group of NetBackup clients
    10.  
      Load Veritas Backup Exec events
    11.  
      Corrections in duplication of clients
    12.  
      Cohesity
    13.  
      Dell EMC NetWorker Backup & Recovery
  11. Appendix C. CRON Expressions for Policy and Report Schedules
    1.  
      CRON expressions for policy probe schedules
    2.  
      CRON expressions for scheduling reports
  12. Appendix D. Maintenance Scenarios for Message Relay Server Certificate Generation
    1.  
      Regenerate authentication certificate nearing expiry (or already expired)
    2.  
      Recover inadvertently deleted aptare.ks file
    3.  
      Authenticate new database with existing SSL certificates
    4.  
      SSL certificate authentication for a new data collector

Adding an IBM Spectrum Protect (TSM) Data Collector policy

  • Before adding the policy: A Data Collector must exist in the Portal, to which you will add Data Collector Policies.

    For specific prerequisites and supported configurations for a specific vendor, see the Certified Configurations Guide.

  • After adding the policy: For some policies, collections can be run on-demand using the Run button on the Collector Administration page action bar. The Run button is only displayed if the policy vendor is supported.

    On-demand collection allows you to select which probes and devices to run collection against. This action collects data the same as a scheduled run, plus logging information for troubleshooting purposes. For probe descriptions, refer to the policy.

To add the policy

  1. Select Admin > Data Collection > Collector Administration. Currently configured Portal Data Collectors are displayed.
  2. Search for a Collector if required.
  3. Select a Data Collector from the list.
  4. Click Add Policy, and then select the vendor-specific entry in the menu.
  5. Enter or select the parameters. Mandatory parameters are denoted by an asterisk (*):

    See See Table: Policy Parameters.

  6. Click OK to save the policy.
  7. On the Data Collector server, install/update the Data Collector software.

Table: Policy Parameters

Field

Description

Collector Domain

The domain of the collector to which the collector backup policy is being added. This is a read-only field. By default, the domain for a new policy will be the same as the domain for the collector. This field is set when you add a collector.

Policy Domain

The Policy Domain is the domain of the policy that is being configured for the Data Collector. The Policy Domain must be set to the same value as the Collector Domain. (The Collector Domain is the domain that was supplied during the Data Collector installation process.)

The domain identifies the top level of your host group hierarchy. All newly discovered hosts are added to the root host group associated with the Policy Domain.

Typically, only one Policy Domain will be available in the drop-down list. If you are a Managed Services Provider, each of your customers will have a unique domain with its own host group hierarchy.

To find your Domain name, click your login name and select My Profile from the menu. Your Domain name is displayed in your profile settings.

IBM Spectrum Protect (TSM) Instances

Active

Click Active to indicate the IBM Spectrum Protect (TSM) server/instances to use in the data collection policy. Multi-select is supported. If additional fields must be configured, the Configure Server dialog is automatically displayed when you make your selection.

Add

Click Add to add an IBM Spectrum Protect (TSM) server/instance. The IBM Spectrum Protect (TSM) servers added to this table using IBM Spectrum Protect (TSM) Data Collector Policy screen are also displayed in the Inventory

Note:

Data Collector policies can be in place for multiple instances, but an instance cannot exist in multiple policies.

See Add/Configure an IBM Spectrum Protect (TSM) server within the Data Collector policy.

Configure

Select a row in the IBM Spectrum Protect (TSM) Instances table. Double-click or click Configure to revise or add information to the TSM server/instance you selected.

See Add/Configure an IBM Spectrum Protect (TSM) server within the Data Collector policy.

Import

Click Import to browse for the CSV file in which you entered the IBM Spectrum Protect (TSM) server/instance configuration details. This enables you quickly add a list of IBM Spectrum Protect (TSM) instances or servers.

See Import IBM Spectrum Protect (TSM) information.

Export

Click Export to create and download a comma-separated values (CSV) file containing all the host/instance information listed in the IBM Spectrum Protect (TSM) Instances table. This enables you to extract your IBM Spectrum Protect (TSM) server information and transfer it easily into a spreadsheet or some other media.

See Export IBM Spectrum Protect (TSM) server information.

Backup Software Location*

The home directory of the TSM Admin Client software--that is, the dsmadmc command on the Data Collector server.

Typically C:\Program Files\Tivoli\TSM\baclient for Windows, or /opt/tivoli/tsm/client/ba/bin for Linux

Active Probes and Schedules

Schedule

Click the clock icon to create a schedule. Every Minute, Hourly, Daily, Weekly, and Monthly schedules may be created. Advanced use of native CRON strings is also available.

Note:

Explicit schedules set for a Collector policy are relative to the time on the Collector server. Schedules with frequencies are relative to the time that the Data Collector was restarted.

Backup Policy Details

Collects backup policy details including policy name, policy identifier, date and time as it relates to the specified IBM Spectrum Protect (TSM) instances/servers.

Backup Event Details

Collects backup event details including backup type, client names, duration, dates, size, files, directories and so on.

Restore Event Details

Collects restore event details such as job duration, number of files backed up and also skipped, amount of data restored, and restore job status.

Database Details

Collects IBM Spectrum Protect (TSM) backup database details, such as total capacity, available space, cache hit percentages, and buffer requests.

Storage Pool Details

Collects IBM Spectrum Protect (TSM) storage pool information, such as migration and reclamation details.

Job Summary Details

Collects IBM Spectrum Protect (TSM) job summary details including client name, node name, backup type, dates, duration and so on, as it relates to the specified IBM Spectrum Protect (TSM) instances/servers.

Client Node Details

Collects client node details covered by the selected policy domain as they relate to the specified IBM Spectrum Protect (TSM) instances/servers.

Drive Status Monitor

Continuously monitors the IBM Spectrum Protect (TSM) console for drive status messages, there is no schedule.

Drive Status Details

Collects drive status details including, drive name, library name, status, start and end times as it relates to the specified IBM Spectrum Protect (TSM) instances/servers.

Inventory Details

Collects IBM Spectrum Protect (TSM) host details including host name, IP Address, Host ID, and port number. Also collects from drives and paths such as device type, device name, library name, and ACS drive ID.

Tape Details

Collects the tape details including media type name, media status, storage pool name, and estimated capacity.

Volume Usage and Media Occupancy Details

Collects client and node information, and then for each node it retrieves the volume usage details from the IBM Spectrum Protect (TSM) instance or server. For each volume, collects details of media occupying the storage pool. Details include the type and size of the media.

Filespace Management Details

Collects filespace details such as capacity, backup start/finish dates, and the percentage of the filespace that is occupied.

Storage Pool Backup Monitor

Continuously monitors the IBM Spectrum Protect (TSM) console for storage pool migration messages, there is no schedule.

Notes

Enter or edit notes for your data collector policy. The maximum number of characters is 1024. Policy notes are retained along with the policy information for the specific vendor and displayed on the Collector Administration page as a column making them searchable as well.