Documentation forAccess Rights Manager

Prepare the NetApp clustered data ONTAP file servers

Collectors for NetApp file servers

The collectors for NetApp file servers are dedicated Windows servers running the collector service.

SolarWinds strongly recommends using a Collector server within the same network segment as the NetApp file server. Otherwise, you may experience performance and routing problems.

In contrast with Windows file servers, FS Logga for NetApp file servers do not require a filter driver installation.

Set NetApp file servers findable

In Active Directory registered NetApp file servers have a typical value set in the LDAP attribute operatingSystem. This property is used by the collector to detect NetApp file servers and mark it as NetApp file server type in the FS Logga configuration.

By default, the operatingSystem value of the NetApp file servers is set to OnTap or NetApp in the collector configuration file. If your NetApp file servers use different values for the operatingSystem property, you can adjust the search parameters.

If your NetApp file server is not registered in Active Directory, create a computer account and set the operatingSystem attribute accordingly.

Configuration file

pnCollector.config.xml

Computer

The collector server that is configured for the NetApp file server.

Path

%ProgramData%\Protected Networks\8MAN\cfg

If the file does not exist, copy the template from the following path:

old: %ProgramFiles%\Protected Networks\8MAN\etc

new: %ProgramFiles%\solarwinds\ARM\etc

Code

<?xml version="1.0" encoding="utf-8"?>
<config>
  <tracer>
    <netapp>
      <NetappOperatingSystems>OnTap,NetApp</NetappOperatingSystems>
    </netapp>
  </tracer>
</config>

Possible values

Add your operatingSystem values separated by commas.

If your NetApp file servers include different values for the operatingSystem property, insert these values separated by commas.

If no or not all NetApp file servers register the operatingSystem property in the Active Directory, leave the entry empty in the collectors configuration file. Using an empty entry, all non-EMC or non-Windows computer accounts from Active Directory will be visible for the used account.

Set up the encrypted data transfer on the collector

The following steps are required if communications between NetApp and the collector are encrypted.

If you configured the encrypted data transfer, adapt the pnTracer.config.xml file on the collector server. For each file server (CIFS server on the NetApp) to be monitored on this collector, the following entry must be added under <tracer><netapp><ssl><cifsServers>:

<name of cifs server>

<switchOn type="System.Boolean">true</switchOn>

<protocol type="System.Int32">5</protocol>

<serverCertificateName>name of certificate from certificate store to use</serverCertificateName>

</name of cifs server>

The certificate must be installed in the certificate store on the computer.

For <protocol>, the following values are possible:

TLS = 1, TLS1.1 = 2, TLS1.2 = 3, SSL2 = 4, SSL3 = 5. Default is SSL3 (5).

Select an available protocol on the collector and NetApp.

FPolicy feature

The FS-Logga for NetApp file server uses the NetApp FPolicy feature. As a result, it must be activated and configured using the CLI.

To configure the FPolicy feature, use a role admin or vsadmin account on NetApp.

In the following CLI commands, replace the <vserver_name> parameter with the storage virtual machine (SVM) name.

Creating the event configuration

The event configuration determines:

  • Events that will be monitored
  • Events that will not be monitored
  • Protocol to use (only the CIFS protocol is supported by FS Logga)

Change only the <vserver_name> parameter. Any additional changes may lead to missing events in the reports, as well as higher collector and NetApp load due to processing unused events.

Command

fpolicy policy event create -vserver <vserver_name> -event-name event_8manlogga_cifs -file-operations create, create_dir, delete, delete_dir, read, write, rename, rename_dir, setattr, open -protocol cifs -filters first-read, first-write, open-with-delete-intent

Replace:

<vserver_name> - name of the SVM (Storage Virtual Machine)

with the following command to check the result:

fpolicy policy event show

Create the External Engine Configuration

The External Engine Configuration determines the server (defined by IP address and port) that receives the events sent by NetApp. Ensure that the IP address is the FS-Logga collector address that is reachable by NetApp. The port must be a free and reachable port on the collector.

Command

fpolicy policy external-engine create -vserver <vserver_name> -engine-name engine_8manlogga -primary-servers <collector-ip> -port 2002 -extern-engine-type asynchronous -ssl-option <ssl-option>

Replace:

<vserver_name> - name of the SVM (Storage Virtual Machine)

<collector-ip> - IP address of the collector

<ssl-option>

  • "no-auth" - no encryption
  • "server-auth" - use encryption

To use encryption, be sure to configure encryption on the collector and NetApp.

With the following command you can check the result:

fpolicy policy external-engine show

Creating the FPolicy Configuration

The FPolicy Configuration is the assembly of Event- and External Engine Configuration.

Command

fpolicy policy create -vserver <vserver_name> -policy-name 8manlogga -events event_8manlogga_cifs -engine engine_8manlogga -is-mandatory false

Replace

<vserver_name> - name of the SVM (Storage Virtual Machine)

With the following command to check the result:

fpolicy policy show

Creating the FPolicy scope

Use the following command to select the volumes you want to monitor, including the shares, directories, and files.

Command

fpolicy policy scope create -vserver <vserver_name> -policy-name 8manlogga -volumes-to-include "*"

Optional: Replace

"*"

if only certain volumes are monitored. SolarWinds recommends using a comma-separated list of these volumes instead of the wildcard ("*"). This process reduces load on the NetApp file server and collector.

Enable the FPolicy

If the previous procedures were successful, activate the policy. Even if one policy is defined, the system requires a sequence number.

Command

fpolicy enable -vserver <vserver_name> -policy-name 8manlogga -sequence-number 1

Replace

<vserver_name> - name of the SVM (Storage Virtual Machine)

with the following command to check the result:

fpolicy show-enabled

Always specify a sequence number, even if you have one FPolicy. This process determines the FPolicies processing order.

Domain accounts

To read the local share paths, create an account that is a member of the local Power Users group on the NetApp SVM. In al later step, you can configure Logga with this account.

Command

vserver cifs users-and-groups local-group add-members -vserver <vserver_name> -group-name "BUILTIN\Power Users" -member-names <domain\user>

Replace:

<vserver_name> - name of the SVM (Storage Virtual Machine)

<domain\user> - User account used to configure FS Logga within ARM

The Logga uses the ONTAP API to read the FPolicy data and request the NetApp to start logging for the external engine. This procedure requires a Logga account with restricted access rights on NetApp. As a result, create a new role. The rights of this role will be defined in a later step.

Commands

security login role create -role 8manrole -vserver <vserver_name> -cmd "vserver fpolicy"
security login role create -role 8manrole -vserver <vserver_name> -cmd "volume" -access readonly
security login role create -role 8manrole -vserver <vserver_name> -cmd "vserver" -access readonly
security login role create -role 8manrole -vserver <vserver_name> -cmd "version" -access readonly

Replace:

<vserver_name> - name of the SVM (Storage Virtual Machine)

with the following command to check the result:

security login role show

Assign the new role to the account used by Logga

security login create -username <domain\username> -application ontapi -authmethod domain -role 
8manrole -vserver <vserver_name>

Replace:

<vserver_name> - name of the SVM (Storage Virtual Machine)

<domain\username> - User account used to configure FS Logga within ARM

with the following command to check the result:

security login show

Firewall configuration

The Logga uses the ONTAP API through HTTPS to read FPolicy data and request NetApp to begin logging for the external engine. Configure he HTTPS service on a logical interface (LIF) of the SVM. The LIF must be reachable by the collector.

Use the following command to view the service that is active for the SVM firewall policy:

system service firewall policy show

Use the following command to check the firewall policies to the LIF of a specific SVM:

network interface show -vserver <vserver_name> -fields firewall-policy

Replace

<vserver_name> - name of the SVM (Storage Virtual Machine)

when a firewall policy with the HTTPS is active on a LIF of the SVM. When you are finished, change change the 'allow-list':

system services firewall policy modify -vserver <vserver_name> -policy <current_firewall_policy> 
-service https -allow-list <collector-ip/32>

Replace:

<vserver_name> - name of the SVM (Storage Virtual Machine)

<current_firewall_policy> - already activated firewall policy

<collector-ip/32> - IP address of the collector

If you do not want to change the current firewall policy, create a copy of this firewall policy, perform the necessary changes, and assign this new firewall policy to the appropriate LIF:

system services firewall policy clone -vserver <vserver_name> -policy <current_firewall_policy> 
-destination-policy 8manlogga_fp

If the HTTPS service exists on the cloned firewall policy, run: 

system services firewall policy modify -vserver <vserver_name> -policy 8manlogga_fp -service https 
-allow-list <collector-ip/32>

If the HTTPS service does not exist in the cloned firewall policy, run: 

system services firewall policy create -vserver <vserver_name> -policy 8manlogga_fp -service https 
-allow-list <collector-ip/32>
network interface modify -vserver <vserver_name> -lif <lif> -firewall-policy 8manlogga_fp

Replace:

<vserver_name> - name of the SVM (Storage Virtual Machine)

<current_firewall_policy> - already activated firewall policy

<collector-ip/32> - IP address of the collector

<lif> - Name of the Logical Interface

Configuring a certificate for the encrypted event data transfer

If you configured the encrypted event data transfer between NetApp and Logga, install the public Certificate of Authority (CA) used to sign the collector certificate on the SVM:

security certificate install -vserver <vserver_name> -type client-ca

Replace:

<vserver_name> - name of the SVM (Storage Virtual Machine)

Use the following command to verify that the certificate is installed:

security certificate show