SolutionPack for Physical Hosts

Table of Contents

Overview

This article explains how to install and configure theSolutionPack for Physical Hosts. The SolutionPack for Physical Hosts enables you to monitor and generate real-time and historical reports on the performance of physical hosts. The SolutionPack gives better insight into parameters such as capacity and utilization associated with an inventory of File Systems, Volume Groups, and Disks (local and remote).

This article applies to EMC ViPR SRM version 3.5.1.

report screen

SolutionPack for Physical Hosts

Back to Top

Technical Specifications

SolutionPack version

Compatible ViPR SRM version

Polled metrics

Main reports

Supported hosts

Comments
This SolutionPack currently does not identify LUNs from the Hitachi AMS200 array.
The PowerPath Support Matrix on EMC Online Support Site provides more details.
Windows: fcinfo.exe is available from http://www.microsoft.com/download/en/details.aspx?displaylang=en&id=17530 . Use the latest version and default install location recommended by Windows.
Due to the unavailability of WWN using in-band SCSI mechanisms accessible to the hosts, the software cannot match the LUNs associated with an array to the disks from the hosts.

Back to Top

Preparing your hosts for discovery and data collection

You need to configure hosts to support resource discovery and data collection.

Back to Top

Guidelines for hostnames and IP addresses

You have to follow these guidelines to ensure a successful host discovery and data collection.

  • The host names are in Domain Name Server (DNS) format with fully qualified domain name (FQDN).
  • IP addresses are registered with the appropriate domain name servers and resolve for a reverse DNS lookup.
  • Hostname labels can contain only the lowercase ASCII letters a through z, the digits 0 through 9, and the hyphen (-). No other symbols, punctuation characters, or white spaces are permitted.
    Note Image
    If ViPR SRM encounters a host name with an underscore, users may be prevented from logging in.

Back to Top

Guidelines for SNIA libraries and HBA drivers

In order to discover SNIA-qualified HBA-related information for all the host platforms you should ensure the right versions of SNIA library, drivers and firmware are in place.

  • Ensure you have EMC-supported host bus adapter (HBA) drivers and firmware. EMC ViPR SRM Support Matrix provides information for the supported SNIA compliant version of the HBA driver.
  • HBA Model and the compatible driver versions qualified by EMC can also be verified on https://support.emc.com > Product and Support Tools > Elab Interoperability Navigator. The vendor websites also list the EMC compatible drivers
  • The vendor-specific SNIA libraries must be installed on the target host.
  • The HBA model number and part number should be verified before updating the hosts with SNIA libraries for HBA.
  • You can install the SNIA library as part of HBA driver installation package or install the latest version of HBAnywhere (for Emulex installations) or SAN Surfer (for Qlogic installation).

    To discover an HP-UX host with a multi-port Fibre Channel card, the package CommonIO bundle 0812(Dec 2008) or later should be present on the host to obtain the updated FC-SNIA file set. INQ is dependent on binaries from CommonIO bundle.

Back to Top

Windows host configuration for discovery and data collection

Software to preinstall on hosts

  • Install Powershell 2.0 or later on Windows hosts. Powershell can be downloaded from http://support.microsoft.com/kb/968929/en-us. User should have permissions to execute powershell scripts. To provide permissions to execute scripts, type on powershell terminal: Set-ExecutionPolicy RemoteSigned

Preinstall the following software on hosts using Windows 2003:

  • Fcinfo is required to fetch HBA information. fcinfo.exe can be downloaded from http://www.microsoft.com/download/en/details.aspx?displaylang=en&id=17530. Use the latest version of fcinfo and the default install location recommended by Windows.
  • INQ 7.6.1.0 needs to be made available on the host. Platform specific INQ can be downloaded from: ftp://ftp.emc.com/pub/symm3000/inquiry/v7.6.1.0/ The downloaded platform specific binary should be renamed to inq and placed in any one of the below specified locations:
    • C:\inq.exe
    • C:\temp\inq.exe
    • C:\windows\Temp\nl_dwd\inq.exe

    INQ binary should have executable permissions on the host.

User permissions required to be configured in ViPR SRM

The user credentials required for successful host discovery would be as follows:

  • Local administrator
  • Domain user who is part of administrator's group
  • Non-admin user
A non-admin user is identified by ViPR SRM as a service account user or domain user whois neither a part of the Administrator group or domain Administrators group.

Types of discovery allowed by different privilege levels

Configurations to be performed on the host

Hosts should be pre-configured with certain WSMAN settings. These settings are required to prepare Windows hosts for ViPR SRM discovery of objects using WinRM services.

Configure one of the following listeners:

  • WinRM HTTP listener with the following configuration:
    • Basic / Negotiate authentication mode set to true.
    • AllowUnencrypted be set to true
    • Firewall exception added for port 5985
  • WinRM HTTPS listener with following configuration:
    • Basic / Negotiate authentication mode set to true
    • A certificate needs to be generated and placed in personal store.

      Generating a .pfx certificate

    • Firewall exception added for port 5986.

These changes can be accomplished via two methods:

Back to Top

Types of discovery allowed by different privilege levels

In this topic, the term "non-admin user" is a service account user or domain user who is not part of the Administrators group on a Windows host.

The following table applies to Windows 2003, 2008, and 2012:

Chargeback reports for non-admin users is supported on VMAX, VNX, VNXe and XtremIO array devices. Refer to the release notes for any limitations on third-party array LUNs masked to Windows hosts.

Back to Top

Customizing a WinRM URL prefix

Before you begin

EMC supports use of a custom WinRM URL prefix. You can change the URL prefix from the default "wsman" to any other, by using following command on the target host.

Procedure

  1. Type the following command:
    For Use
    Non-SSL communication winrm set winrm/config/listener?Address=*+Transport=HTTP @ {URLPrefix="EMC"}
    SSL-based communication winrm set winrm/config/listener?Address=*+Transport=HTTPS @{URLPrefix="EMC"}
  2. In the default installation path /opt/APG/Collecting/Collector-Manager/Generic-RSC/conf), add and commit the following line in module.properties: apg.remote.shell.winrm.path=<URL prefix>
    "/EMC" is an example of a user-defined WinRm URL prefix.
Back to Top

Prerequisites for discovering a Windows host using non-admin user credentials

To prepare Windows hosts for discovery, you can configure privileges in these ways:

  • Provide the option -user nonadmin as an input to the Host Configuration utility
  • Manually

The following checklist summarizes the configuration changes required on Windows hosts:

  1. WinRM configuration settings:
    1. Adding a non-admin user to a group
    2. Retrieving the SID of a non-admin user
    3. Adding a non-admin SID to root SDDL
  2. Enabling WMI permissions for the non-admin user
  3. Restarting WinRM and WMI services

If you decide to use Host Configuration utility, the script performs these operations on the host.

  • For Windows 2003 hosts the Host configuration utility sets the WinRM changes. You must manually configure the WMI permissions.

    Enabling WMI permissions for the non-admin user

  • For Windows 2008 and Windows 2012, the Host Configuration utility sets both WinRM and WMI configurations.

These procedures are only available in ViPR SRM 3.5.1.

Back to Top

Adding a non-admin user to a group

Before you begin
  • On a Windows 2003 host, the non-admin user should be part of the following groups:
    • TelnetClients
    • Performance Monitor Users
    • Performance Log Users

On a Windows 2008/2012 host a non-admin user should be part of the following groups:

  • Performance Monitor Users
  • Performance Log Users

Procedure
  1. Go to Start.
  2. Right-click Computer name and click Manage.
  3. On the Computer management window, click Local Users and Groups.
  4. Right-click the non-admin user and select Properties.
  5. Select the MemberOf tab.
  6. Click the Add button and key in the group name.
  7. Click Ok, then click Apply.
  8. Repeat these steps to add Performance Monitor Users, Performance Log Users and TelnetClients.
  9. click Ok
Back to Top

Retrieving the SID of a non-admin user

Procedure
  1. Run the command wmic useraccount get name,sid at a command prompt.
  2. From the output of the command, capture the SID of the non-admin user.
Back to Top

Adding a non-admin SID to root SDDL

Procedure
  1. Open a command prompt.
  2. Type the following command to add the SID.
    winrm set winrm/config/service @{RootSDDL="O:NSG:BAD:P(A;;GA;;;BA)(A;;GA;;;<non-admin-sid>)S:P(AU;FA;GA;;;WD)(AU;SA;GWGX;;;WD)"}
    Replace <non-admin-sid> in this command with the SID you obtained.
Back to Top

Enabling WMI permissions for the non-admin user

Procedure
  1. Go to Start.
  2. Right click Computer name and click Manage.
  3. On the Computer management window, expand Services and Applications.
  4. Select WMI Control.
  5. Right click WMI Control and select properties.
  6. Click Security.
  7. Select Root and click the Security button.
  8. Add the non-admin user (hostname\non-admin-username) and click ok.
  9. Select the check boxes for Enable Account, Read Security, and Remote Enable.
  10. Click Advanced > edit on non-admin user > Apply onto > This namespace and subnamespaces.
  11. Click Ok, click Apply, and click Ok.
Back to Top

Restarting WinRM and WMI services

Procedure
  1. Go to Start > Run.
  2. Type the command services.msc.
  3. Right click Windows Remote Management and click start.
    In case the services are already running, click restart.
Back to Top

Using the HostConfiguration Utility

The host configuration utility is packaged along with SolutionPack for Physical Hosts. It is available <APG Home Directory/Collecting/Remote Shell Collector/Generic-RSC/scripts/windows>

The script verifies and performs the following actions:

  • Ensures that the WINRM service is running
  • Creates a listener port for accepting WS-MAN requests
  • Adds firewall exceptions to open port 5985 as non-SSL and 5986 as SSL
  • Sets Basic or Negotiate authentication mode, based on input argument to script (-authType <Authentication_type>), to true.
  • Sets AllowUnencrypted to true.
  • Sets MaxTimeout value to 300000 ms.
  • Checks whether fcinfo package is present on the host, if Windows 2003
  • Verifies the presence of INQ on the host and checks its version, if Windows 2003

Usage

./hostconfig-srm.ps1 <-verify | -set | -set -force> [-authType <authentication_type>] [-ssl [-thumbprint <thumbprint_value>] [-CN <certificate_hostname>]] [-user <username>][-help]

Examples

The following screens show how to perform actions with the Host Configuration Utility.

  • Verify whether host is ready for discovery with HTTP using Negotiate authtype on Windows 2003:
    Host Configuration Utility screen

    Verify that the host is ready for discovery with HTTP

  • Set Negotiate authtype for a successful discovery with HTTP on Windows 2008:
    Host Configuration Utility screen

    Set Negotiate authtype

  • Verify whether the host is ready for a successful discovery with HTTPS on Windows 2008:
    Host Configuration Utility screen

    Verify that the host is ready for discovery with HTTPS

  • Set Basic authtype for a successful discovery with HTTPS on Windows 2008, without prompting the user:
    Host Configuration Utility screen

    Set Negotiate authtype

  • Set non-admin user on Windows 2008:
    Host Configuration Utility screen

    Set non-admin user

Back to Top

Configuring group policy

Use a group policy if you do not want to set the configuration on each and every host (either manually or using a script). The group policy lets you apply a set of configurations across a set of hosts. You have to configure the group policy so that it can be applied across hosts as required.

Procedure

  1. Right-click Computer and select Manage.
  2. Go to Features > Group Policy Management > Forest Domain name > Domains > Domain Name > Default Domain Policy.
  3. Right-click Default Domain Policy and select Edit.
    The group policy editor appears.
  4. Select Default Domain Policy > Computer Configuration > Policies > Administrative Templates > Windows Components > Windows Remote Management.
  5. Modify the following parameters as required:
    • Enable Allow automatic configuration of listeners.
    • Enable Allow Negotiate Authentication (for domain user).
    • Enable Allow encrypted traffic.
    • Add Windows Firewall exception for Port 5985 - HTTP
    • Add Windows Firewall exception for Port 5986 - HTTPS
    Note Image
    HTTPS listener configuration is not possible from Group Policy.
Back to Top

Configuring firewall port exception using group policy

Using group policy, you have to configure firewall port exception if you are not using default ports.

Procedure

  1. Click Computer.
  2. Go to Computer Configurations > Policies > Windows Settings > Windows Firewall with Advanced Security > Inbound Rules
  3. Create a new inbound rule
    This enables the WinRM communication.
Back to Top

Updating group policy

If you update the group policy on a domain controller, the changes are reflected on the computers that are part of the domain in approximately 90-120 minutes. Use this procedure to force update the group policy on the member computers.

Procedure

  1. You can use any of the options for force update of group policy:
    Option Comment

    Run the command gpupdate/force on all the member computers.

    This command results in a fetch operation for the group policy

    This command has to be run on all the hosts and hence maybe cumbersome.

    Change the Group Policy Refresh Interval in the Group Policy Management editor under Computer Configuration > Administrative Templates > System > Group Policy

    Minimum possible time is 7 minutes.

    Reducing refresh interval is not recommended as it increases the load on the network.

Back to Top

Generating a certificate

WinRM HTTPS requires a local computer server authentication certificate or self-signed certificate with a CN name installed on the host. The certificates should not have expired or been revoked.

Perform the following to create certificates:

Procedure

  1. Generate a .pfx certificate
  2. Exporting the .pfx certificate
  3. Importing the .pfx certificate
  4. Generate a .cer file
  5. Import the .cer file
Back to Top

Generating a .pfx certificate

You can generate the required certificate using any certificate generator. This procedure demonstrates generating a certificate using makecert.

Procedure
  1. From the command prompt, run C:\>makecert.exe -ss MY -sr LocalMachine -n "CN=<certificatename>" -sky exchange -pe -a sha1 -eku 1.3.6.1.5.5.7.3.1
    This creates a certificate under the personal store. Use the following steps to verify the certificate created using makecert.
  2. On a Windows host, click Start > Run.
  3. Type mmc and click OK.
    The Console window appears.
  4. Click File > Add/Remove Snap-in.
  5. Select Certificates under Available snap-ins and click Add.
  6. Select Computer account.
  7. Click Finish.
  8. Click OK in the Add or Remove snap ins window.
  9. On the left pane, double click Certificates (Local Computer) > Personal > Certificates.
  10. On the right pane double click the certificate listed.
  11. Navigate to Details tab. Select Subject to get the CN Name and Thumbprint to get the Thumbprint of the certificate.

    Note the CN Name and Thumbprint value, which will be used later while creating a WSMAN listener for HTTPS.

Back to Top

Exporting the .pfx certificate

To use the same certificate on multiple hosts, the generated certificate has to be imported on other hosts.

Procedure
  1. On a Windows host, click Start > Run.
  2. Type mmc and click OK.
  3. In the Console window, click Certificates (local Computer) > Personal > Certificates.
  4. Double-click Certificates.
  5. Under Details, click Copy to File.
  6. In the Certificate Export Wizard select Yes, export the private key. and click Next.
  7. Select Include all certificates in the certification path if possible and click Next.
  8. Type a password for the private key.
    This password is used when you import this certificate on other hosts.
  9. Type a filename and save the .pfx file.
Back to Top

Importing the .pfx certificate

You have to import the .pfx on other hosts if you want to use the same certificate on multiple hosts.

Before you begin

The .pfx certificate must be copied on the host where it is to be imported.

Procedure
  1. On a Windows host, click Start > Run.
  2. Type mmc and click OK.
  3. In the Console window, click Certificates (Local Computer) > Personal > Certificates
  4. Right-click and select All Tasks > Import.
  5. In the browse window, select the .pfx certificate and click OK.
Back to Top

Generating a .cer file

The .cer file is created from a .pfx certificate with only a public key, which is used along with the private key for a successful handshake between the client and server.

Procedure
  1. Go to Start > Run > mmc > Certificates (Local Computer) > Personal > Certificates
  2. Double-click Certificates.
  3. Under Details, click Copy to File.
  4. Select No, do not export the private keys.
  5. Selecting the Encoding type as DER or Base-64, and click Next.
  6. Type a file name and click Save.
Back to Top

Importing a .cer file

You have to import the .cer file on the collector host to enable a successful handshake between the server and the client.

Procedure
  1. Copy the .cer file on the collector host.
  2. Log in to the collector.
  3. Run the command /opt/APG/Java/Sun-JRE/6.0u45/bin/keytool -import -file <Public_Certificate_File>-keystore/opt/APG/Java/Sun-JRE/6.0u45/lib/security/cacerts-alias <Name>

    The command prompts for keystore’s password. The default password is changeit.

    A sample output returned by the command:
    Owner: CN=<CN Name>
    Issuer: CN=Root Agency
    Serial number: 522200243f029a894c741bcb83d58a5d
    Valid from: Tue Dec 10 11:59:03 EST 2013 until: Sat Dec 31
    18:59:59 EST 2039
    Certificate fingerprints:
    MD5: 99:2A:6E:DC:CD:D7:7E:7D:07:C3:E2:8A:8F:E1:BB:DD
    SHA1:
    17:29:F4:45:99:AE:DC:C5:08:C6:73:D4:CF:A6:BE:7E:79:48:50:76
    Signature algorithm name: SHA1withRSA
    Version: 3
    Extensions:
    #1: ObjectId: 2.5.29.1 Criticality=false
    #2: ObjectId: 2.5.29.37 Criticality=false
    ExtendedKeyUsages [
    serverAuth
    ]
    Trust this certificate? [no]: yes
Back to Top

UNIX host configuration for discovery and data collection

You can acquire INQ in the following ways:

  • Push INQ to user's HOME directory during discovery from ViPR SRM - No action needed from user.
  • Install INQ at a user specified location on the host at a location provided to ViPR SRM during SolutionPack installation.
    • INQ 7.6.1.0 needs to be made available on the host. Platform specific INQ can be downloaded from: ftp://ftp.emc.com/pub/symm3000/inquiry/v7.6.1.0/ The downloaded platform-specific binary should be renamed to inq and placed in any user defined location. The location has to be provided to ViPR SRM during ViPR SRM installation.
    • INQ binary should have executable permissions on the host.

Unix hosts can be discovered in the following ways:

Back to Top

Configuring sudo for host discovery

Due to security constraints, ViPR SRM must be able to discover Linux and UNIX hosts in a data center even with non-root credentials. SUDO is a tool on UNIX hosts that can temporarily elevate a user’s credentials. Administrators can add specific commands in the sudoers file to enable ViPR SRM to execute those commands and collect host information.

Procedure

  1. Include the path of sudo command in the environment variable $PATH for the sudo user.
    The variable $PATH can be set either in /etc/environment or /etc/default/login or any other OS specific file.
  2. Include the paths of OS commands in the environment variable $PATH for sudo user.
    By default, most of the command files have the following location: /usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin
  3. Verify that the $PATH is correct.
    1. Log in as sudo user
    2. Type which sudo.
  4. Ensure that the sudoers file is available.
    By default, the sudoers file is available in /etc or /opt/sfw/etc/ or /usr/local/etc/sudoers
  5. Ensure that the sudo user has root privilege to run the following commands on a given host.

    Ensure the absolute path to the packages are provided in sudoers file.

    It is recommended to use visudo to edit sudoers file.

    Some packages are not installed by default.

    • inq
    • powermt
    • sar
    • vxdisk (Solaris)
    • dmidecode (Linux)
    • vgs (Linux)
    • lvdisplay (Linux, HP-UX)
    • vgdisplay (Linux, HP-UX)
    • /opt/sfm/bin/CIMUtil (HP-UX)

      This command is only allowed in ViPR SRM 3.5.1 or higher.

    • pvs (Linux)
    • kdb (VIO clients)
    • swap (AIX)
    • multipath (Linux)
Back to Top

Generating a public and private key pair for SSH key based authentication

For the SSH key method of discovering UNIX hosts, you must generate a valid public and private key pair. You can choose any key generation tool to generate a valid public and private key pair.

Before you begin

You must have a public key present on all the UNIX hosts that are to be discovered using the private key.

These steps describe the procedure to generate a public and private key pair for UNIX hosts using the ssh-keygen tool.

Note Image
The public key is to be added to the authorized_keys file on the target hosts intended for discovery and the private key is to be imported to the collector VMs where discovery is triggered.

Procedure

  1. Public-Private key pair can be generated on any UNIX host using the command:
    ssh-keygen -t rsa -f <location_of_the_private_key/name_of_ private_key_file> -N ""

    For example: ssh-keygen -t rsa -f /root/.ssh/id_rsa -N ””

  2. Ensure that the public and private key pair that is generated has the following permissions:
    • chmod 600 /root/.ssh/id_rsa
    • chmod 644 /root/.ssh/id_rsa.pub
    The private key file is id_rsa.
    The public key file is id_rsa.pub.
  3. To make the key pair functional, append the public key to <users home directory>/.ssh/authorized_keys in the target UNIX host using the command cat<location_of_the_public_key/name_of_public_key_file> >> <users home directory>/.ssh/authorized_keys
    For example: cat /root/.ssh/id_rsa.pub >> /root/.ssh/authorized_keys
    Next, import the private key into the SolutionPacks
Back to Top

Importing a private key into the SolutionPack

Procedure

  1. Place the generated private key in the RSC conf folder /opt/APG/Collecting/Remote-Shell-Collector/<instance_of_collector>/conf
  2. Type chown apg:apg <private_key_file>
    This command changes the owner.
Back to Top

Configuring SSH authentication

Modify the /etc/ssh/sshd_config file on SLES 11 SP3 to allow successful ssh authentication.

Procedure

  1. Change the following value to no:
    #PasswordAuthentication no <--- original
    #PasswordAuthentication yes <--- modified
    Tunneled clear text passwords are disabled.
Back to Top

Configuring ESX hosts to collect PowerPath metrics

Provides information about configuring ESX host to collect PowerPath metrics.

Before you begin

  • Ensure that PowerPath/VE remote CLI (rpowermt) is installed on the host and enable performance collection by running the rpowermt set perfmon={on [interval=<#seconds>] | off} host=HOST_FQDN command.

    The EMC ViPR SRM Support Matrix provides more information on supported PowerPath versions.

  • Register ESX and enable performance for reporting.

    Refer to the Powerpath /Ve or Rtools documentation about how to register an ESX server and enable performance.

  • Configure the host where RTOOLS resides in generic-RSC based on the operating system type (ESX-LINUX or ESX-Windows).

To collect PowerPath metrics, do the following:

Procedure

  1. Create a lockbox.
  2. Update host username and password in the lockbox.

    The PowerPath/VE for VMware vSphere Installation and Administration Guide provides detailed description of performing the above steps.

    PowerPath reports can also be accessed from Explore View > Host > Storage Connectivity.

    PowerPath reports are available for the SolutionPack for IBM LPAR.
Back to Top

Configuring hosts to collect PowerPath metrics

Provides information about configuring host to collect PowerPath metrics.

To collect PowerPath metrics, do the following:

Procedure

  1. Install PowerPath CLI (powermt) on the host.
  2. Enable performance collection by running the powermt set perfmon={on [interval=<#seconds>] | off} command.
    Note Image
    The EMC ViPR SRM Support Matrix provides more information on supported PowerPath versions.
Back to Top

Installing the SolutionPack

Before you begin

The steps below assume a typical four server deployment: Primary Backend, Additional Backend, Collector, and Front End.

Procedure

  1. Log in.
  2. Click Administration.
  3. Click Centralized Management.
  4. Click SolutionPacks.
  5. Select SolutionPack Center.
  6. Select the Physical Hosts SolutionPack.
  7. Click Install.
  8. Enter the instance name.
  9. In the Alert Consolidation field, select the Primary Backend.
  10. In the Pre-configured alerts field, select the Primary Backend.
  11. In the Reports field, select the Front End.
  12. In the Scripts field, select the Collector.
  13. Click Next.
  14. At the Alert Consolidation window, click Next.
  15. Select a value for Alerting on data collection.
    If you select Add a new Alerting on data collection, select the Primary Backend host as the Alerting Web-Service Instance.
  16. Optionally, you can enable host PowerPath alerts and provide an email address in which to receive the alerts.
  17. Click Next.
  18. At the Reports window, click Next.
  19. Select the performance metrics that you want to collect.
  20. Select Use advanced settings to configure polling settings.
  21. Click Install.
  22. After installation is complete, select Centralized Management > SolutionPack to verify the installed SolutionPack.
    Note Image

    SolutionPack for Physical Hosts will collect data from Physical Host/LPAR/VIO Servers. You can configure script block from SolutionPack for Physical Hosts on multiple collectors VMs where you intend to discover hosts/LPAR/VIO server. Based on your deployment plan, you can distribute host discovery on multiple collector VMs.

Back to Top

Using Discovery Center to discover physical hosts

Procedure

  1. From the user interface, click Administration button.
  2. Click Discovery Center.
  3. Under Device Type, click Host configuration.
  4. Click Add new device.
  5. In Server, select the collector VM where script block from SolutionPack for Physical Hosts is installed.
  6. Enter the hostname and OS type.
  7. As Authentication Type, select:
    1. Password based if you wish to use password based method.
    2. Public key based if you wish to use SSH public private key based method.
  8. Provide username (root or sudo user)
    1. Provide password of the host for Password based
    2. Provide the location of the private key for Public key based (/opt/APG/Collecting/Remote-Shell-Collector/<instance_of_collector>/conf/<Name of private key> ) .
  9. Click Ok.
  10. Select the device added and click Save.
  11. Add a new device for each host that will be discovered.
Back to Top

SolutionPack reconfiguration

If you wish to change the answers that were provided during SolutionPack installation first time, you can change them by reconfiguring the SolutionPack.

Procedure

  1. Click Administration.
  2. Under Centralized Management, click SolutionPacks > Independent SolutionPackBlocks and select the required instance.
    The SolutionPack Reconfiguration dialog box appears.
  3. Change the configuration as desired.
  4. Click Reconfigure.
Back to Top