Skip to content

Commit

Permalink
Merge pull request #375 from ritza-co/docs-19.03.01
Browse files Browse the repository at this point in the history
Docs 19.03.01 release (Week 40, 2024)
  • Loading branch information
sixhobbits authored Oct 14, 2024
2 parents 9426858 + 7f2db47 commit 0d6beec
Show file tree
Hide file tree
Showing 30 changed files with 348 additions and 263 deletions.
2 changes: 2 additions & 0 deletions docs/auto-discovery/network-auto-discovery.mdx
Original file line number Diff line number Diff line change
Expand Up @@ -16,6 +16,8 @@ SNMP is a widely supported protocol and standard for managing network-connected

SNMP is typically used in a read-only capacity, but it can support read and write permissions. By default, it uses port 161. SNMP exposes management data in the form of variables, which are organized in a Management Information Base (MIB). An MIB essentially describes the variables available on a given system, each of which can be remotely queried via SNMP.

Network devices can be discovered by Device42 using SNMP v1, v2c, or v3. If you're looking to do [Storage discovery](storage-arrays-autodiscovery/snmp-san-server-auto-discovery.mdx) via SNMP, you may want to visit the dedicated [SNMP SAN/Server Auto-Discovery](storage-arrays-autodiscovery/snmp-san-server-auto-discovery.mdx) page. SNMP discovery will pull in CDP/LLDP neighbors as long as SNMP credentials are the same across all neighbors. Should the credentials \*not\* be the same, you may instead add devices using different credentials separately, as their own discovery job.

:::Note
SNMP autodiscovery supports IPv6 addresses for device discovery.
:::
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -13,104 +13,106 @@ Follow the steps in the sections below to set up users or roles with minimum rea

### Infinidat

1. Log into the Infinidat console.
2. Select _Settings_ from left panel.
3. Click on _Users_ from the tab.
4. Click the _Create User_ button to open create user panel.
5. Create a user and assign one of the available roles:
1. Log in to the Infinidat console.
2. Select **Settings** from the left panel.
3. Click on **Users** from the tab.
4. Click the **Create User** button to open the Create User panel.
5. Create a user and assign it one of the available roles:
- ADMIN
- POOL\_ADMIN
- READ\_ONLY
Select the minimum _**READ\_ONLY**_ role
6. Click _OK_ and save the user.

6. Select the minimum **READ\_ONLY** role
7. Click **OK** and save the user.

### Netapp Filers

- Connect to your Netapp via SSH.
- Create a monitoring role with the necessary permissions.

_useradmin role add -a api-system-get-version,login-http-admin,security-api-vfiler,api-system-get-info,api-fcp-adapter-list-info,api-iscsi-initiator-list-info,api-iscsi-adapter-list-info,api-disk-list-info,api-aggr-list-info,api-volume-list-info,api-lun-list-info,api-qtree-list,api-quota-list-entries,api-cifs-share-list-iter-start,api-perf-object-get-instances,api-lun-map-list-info,api-cifs-share-list-iter-next,api-lun-get-serial-number_

**Permissions contained in the above command:**

api-system-get-version
login-http-admin
security-api-vfiler
api-system-get-info
api-fcp-adapter-list-info
api-iscsi-initiator-list-info
api-iscsi-adapter-list-info
api-disk-list-info
api-aggr-list-info
api-volume-list-info
api-lun-list-info
api-qtree-list
api-quota-list-entries
api-cifs-share-list-iter-start
api-perf-object-get-instances
api-lun-map-list-info
api-cifs-share-list-iter-next
api-lun-get-serial-number
```shell
_useradmin role add -a api-system-get-version,login-http-admin,security-api-vfiler,api-system-get-info,api-fcp-adapter-list-info,api-iscsi-initiator-list-info,api-iscsi-adapter-list-info,api-disk-list-info,api-aggr-list-info,api-volume-list-info,api-lun-list-info,api-qtree-list,api-quota-list-entries,api-cifs-share-list-iter-start,api-perf-object-get-instances,api-lun-map-list-info,api-cifs-share-list-iter-next,api-lun-get-serial-number_
```

**Permissions contained in the above command:**

- `api-system-get-version`
- `login-http-admin
- `security-api-vfiler
- `api-system-get-info
- `api-fcp-adapter-list-info
- `api-iscsi-initiator-list-info
- `api-iscsi-adapter-list-info
- `api-disk-list-info
- `api-aggr-list-info
- `api-volume-list-info
- `api-lun-list-info
- `api-qtree-list
- `api-quota-list-entries
- `api-cifs-share-list-iter-start
- `api-perf-object-get-instances
- `api-lun-map-list-info
- `api-cifs-share-list-iter-next
- `api-lun-get-serial-number
- Create a monitoring group, attaching the monitoring role created above.
```
useradmin group add -r
```
```
useradmin group add -r
```

- Create a monitoring user and assign it to the monitoring group created in the step above.

```
useradmin user add -g
```
```
useradmin user add -g
```

**Cluster Mode**

1. Connect to your NetApp cluster via SSH.
2. Create a user with the following config:

- VServer to discover: `<vserver\_name>`
- Discovery User name: `<user\_name>`
- Role: readonly (existing system role)
- Application: ontapi
- Auth Method: Password
- **VServer to discover:** `<vserver\_name>`
- **Discovery User name:** `<user\_name>`
- **Role:** readonly (existing system role)
- **Application:** ontapi
- **Auth Method:** Password

```
security login create -vserver -user-or-group-name -application ontapi -authentication-method password -role readonly
```
```
security login create -vserver -user-or-group-name -application ontapi -authentication-method password -role readonly
```

### Nutanix

1. Log into the Nutanix console.
2. Click the gear icon or select _Settings_ from main menu.
3. Select _Local User Management_ under Users and Groups.
4. Click on the _\+ New User_ button.
5. Do not click on any roles and this will give the user a viewer role.
6. Click _OK_ and save the user.
1. Log in to the Nutanix console.
2. Click the gear icon or select **Settings** from the main menu.
3. Select **Local User Management** under **Users and Groups**.
4. Click on the **+ New User** button.
5. Do not select any roles, so that the user is assigned a viewer role by default.
6. Click **OK** and save the user.

### Oracle ZFS

1. Log into the Oracle ZFS console.
2. Select _Configuration_ from main menu.
3. Click on the + button next to _Roles_ to create a new role.
1. Log in to the Oracle ZFS console.
2. Select **Configuration** from the main menu.
3. Click on the **+** button next to **Roles** to create a new role.
- Add the following Authorizations to the role (leave Domain as “\*”):
- Analytics: Read
- Worksheet: Read
4. Click on the + button next to _Users_ to create a new user
- **Analytics:** Read
- **Worksheet:** Read
4. Click on the **+** button next to **Users** to create a new user.
- Select the Role created in step 3 for the user.
- “Kiosk User” must **NOT** be selected.

5\. Click on _Finish_ to save the user.
5. Click **Finish** to save the user.

### Pure Storage

Pure Storage does not allow for multiple local users, relying on an LDAP provider to supply user authentication and group membership for a non-root user.
Pure Storage does not allow for multiple local users, and relies on an LDAP provider to supply user authentication and group membership for a non-root user.

1. Log into the Pure Storage console.
2. Click on _System Menu_.
3. Click on _Configuration_.
4. Click on Directory Service.
1. Log in to the Pure Storage console.
2. Click on **System Menu**.
3. Click on **Configuration**.
4. Click on **Directory Service**.
5. Connect your Pure Array to your LDAP provider, making sure to map the Read Only Group to the appropriate OU within your LDAP environment.
6. Create a discovery user account in your LDAP environment.
7. Add that LDAP user account to the OU associated with the Pure’s Read Only Group.
7. Add that LDAP user account to the OU associated with the Pure Storage Read Only Group.
Original file line number Diff line number Diff line change
Expand Up @@ -15,57 +15,59 @@ Follow the steps in the sections below to set up users or roles with minimum rea

Compellent discovery requires use of an associated Dell Storage Manager appliance.

1. Log into your DSM deployment’s web UI.
2. Select Data Collector settings.
3. Go to the Users tab.
4. Go to the Users & User Groups tab.
1. Log in to your DSM deployment’s web UI.
2. Select **Data Collector** settings.
3. Go to the **Users** tab.
4. Go to the **Users & User Groups** tab.
5. Create a user and assign it the **Reporter** role.
6. Select your new user and connect it to your target Storage Center via the Select Storage Center Mappings menu.
6. Select your new user and connect it to your target **Storage Center** via the **Select Storage Center Mappings** menu.

### VNX or VMAX using EMC SMIS Provider
### VNX or VMAX Using EMC SMIS Provider

Login to SMIS provider using `http://<SMIS-Provider-IP>:5988/ECOMConfig` or `https://<SMIS-Provider-IP>:5989/ECOMConfig`.
Log in to SMIS provider using `http://<SMIS-Provider-IP>:5988/ECOMConfig` or `https://<SMIS-Provider-IP>:5989/ECOMConfig`.

- Click on _Add User_ and create a user with the **monitor** role.
- Click **Add User** and create a user with the **monitor** role.

![Add User](/assets/images/dell-emc-autodiscovery/smis-add-user.png)

- Use the Dynamic Settings shown below.
- Use the **Dynamic Settings** shown below.

![Dynamic Settings](/assets/images/dell-emc-autodiscovery/smis-dynamic-settings.png)

### EMC Data Domain

1. Log into the Data Domain console.
2. Select _AdministrationAccess_ from the left panel.
3. Go to the _Local Users_ tab.
1. Log in to the Data Domain console.
2. Select **AdministrationAccess** on the left panel.
3. Go to the **Local Users** tab.
4. Create a user and assign one of the available roles:

- admin
- limited-admin
- security
- user
- back-operator
- none

Select the minimum _**user**_ role.
5. Click _OK_ and save the user.
6. Select the minimum **user** role.
7. Click **OK** and save the user.

### EMC Unity

1. Log into the EMC Unity Console console.
2. Click on the gear icon in the tool bar to open the Settings window.
3. Click on _Users and Groups_ tab.
4. Click on the + button to add a User. This will launch the Create User Wizard.
5. Select type of user on first page, and click _Next_.
6. Enter username and password, and click _Next_.
1. Log in to the EMC Unity Console console.
2. Click on the gear icon in the tool bar to open the **Settings** window.
3. Click on the **Users and Groups** tab.
4. Click on the **+** button to add a user. This will launch the **Create User** wizard.
5. Select type of user on first page, and click **Next**.
6. Enter username and password, and click **Next**.
7. Assign one of the available roles:

- Administrator
- Storage Administrator
- Operator
- VM Administrator

Select the minimum _**Operator**_ role
8. Click _Finish_ and save the user.
8. Select the minimum **Operator** role.
9. Click **Finish** and save the user.

### Isilon

Expand Down Expand Up @@ -95,64 +97,74 @@ Create a new role and add the following read-only permissions:
- ISI_PRIV_SMB
- ISI_PRIV_STATISTICS

**You can also use CLI commands to create such roles:**

You can also use CLI commands to create such roles.

1. Login to the cluster using SSH.
1. Log in to the cluster using SSH.

2. Run the following commands:

- To create a read-only role:

```
isi auth roles create –name readonly_role –description “Read-only role for D42”
```

- To give permissions to this role add all the permissions from above:

```
isi auth roles modify readonly_role –add-priv-ro=ISI_PRIV_LOGIN_PAPI
```
- Create a USER:
```

- To create a USER:

```
isi auth users create readonly_user –enabled yes –password xxxxxx
```
- Add user to the role:

- To add a user to the role:

```
isi auth roles modify readonly_role –add-user=readonly_user
```

**Creating the Role/User via Web UI**

1. Login to the Cluster Web UI.
2. Select _Access Tab → Membership & Roles_.
3. Select the _Users Tab_.
4. Select Provider “LOCAL: System”
5. Create User
- Set user name and password
- Select primary group “Users”
- Enable the account
6. Select the _Roles Tab_.
7. Create a role
- Set Role Name
- Add member (User created above)
- Add the following privileges as Read only
_Console
Platform API
SSH
Shutdown
Support
Auth
Audit
Cluster
Devices
FTP
HDFS
HTTP
Monitoring
NDMP
Network
NFS
Remote Support
SmartPools
SMB
Statistics
Namespace Traverse
Namespace Acces_s
**Alternatively, you can create the Role/User via the web UI**

1. Log in to the cluster web UI.
2. Select **Access Tab → Membership & Roles**.
3. Select the **Users** tab.
4. Select **LOCAL: System** for the provider.
5. Create user:

- Set the username and password.
- Select **Users** as the primary group.
- Enable the account.

7. Select the **Roles** tab.
8. Create a role:

- Set the **Role Name**.
- Add the member (the user created above).
- Add the following privileges as read-only:

- Console
- Platform API
- SSH
- Shutdown
- Support
- Auth
- Audit
- Cluster
- Devices
- FTP
- HDFS
- HTTP
- Monitoring
- NDMP
- Network
- NFS
- Remote Support
- SmartPools
- SMB
- Statistics
- Namespace Traverse
- Namespace Acces_s
Loading

0 comments on commit 0d6beec

Please sign in to comment.