Skip to content

Commit 69ba668

Browse files
authored
Merge pull request #463 from ritza-co/19.06.12
Docs 19.06.12 release (Week 30, 2025)
2 parents 7330ee8 + cf64763 commit 69ba668

File tree

2 files changed

+66
-9
lines changed

2 files changed

+66
-9
lines changed

docs/administration/appliance-manager/setting-up-backup-device42-appliance-manager.mdx

Lines changed: 18 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -41,6 +41,16 @@ Configure the backup options for the Main Appliance and Remote Collectors (RCs).
4141

4242
![Run the backup](/assets/images/setting-up-backup-device42-appliance-manager/backup-now-form.png)
4343

44+
### For Standby Instances
45+
46+
Select the **Backup Meta Data** option when creating a Device42 instance for recovery or failover purposes. Selecting the metadata option copies all system identifiers, passphrases, certificates, and configuration settings – preparing the standby instance to fully replace your production instance when needed.
47+
48+
The standby instance will have the same system identifiers as the production instance, which means it will connect as the primary instance. For this reason, keep one instance with the identifier data active at a time. See the [Warm HA Setup documentation](administration/appliance-manager/warm-ha-setup-failover-and-automated-backups.mdx) for failover procedures.
49+
50+
### For Test Instances
51+
52+
Do not select the **Backup Meta Data** option when creating test or development environments. Backing up and restoring this way is useful when you just want to recover your data, rather than replacing your production instance. The GUIDs will not be copied without the metadata option selected, and without these GUIDs, the machine cannot connect to external services or be used to replace the production instance.
53+
4454
### Remote Collector Options
4555

4656
The following table summarizes the backup settings for the selected RC(s):
@@ -69,7 +79,7 @@ The following table summarizes the backup settings for the selected RC(s):
6979
</tr>
7080
<tr>
7181
<td>**Backup TLS Key Pair**</td>
72-
<td>Backs up the TLS certificate and key</td>
82+
<td>Backs up the TLS certificate and key.</td>
7383
<td>
7484
<ul>
7585
<li>`/etc/nginx/ssl.crt/server.crt`</li>
@@ -99,19 +109,19 @@ The following table summarizes the backup settings for the selected RC(s):
99109
</table>
100110

101111

102-
## Back up to an SFTP Server
112+
## Back Up to an SFTP Server
103113

104-
The backup file can be scheduled to be sent to a SFTP server. All fields are required.
114+
The backup file can be scheduled to be sent to an SFTP server. All fields are required.
105115

106116
![Backup to an SFTP server](/assets/images/setting-up-backup-device42-appliance-manager/sftp-server-settings.png)
107117

108-
## Back up to an NFS server
118+
## Back Up to an NFS Server
109119

110-
The backup file can be scheduled to be sent to an NFS server. All fields are required. The IP address should be the address of the target NFS server, and the folder path should be the path to the directory where the backups will be stored. This folder should be writeable by a user with `uid=1000`.
120+
The backup file can be scheduled to be sent to an NFS server. All fields are required. The IP address should be the address of the target NFS server, and the folder path should be the path to the directory where the backups will be stored. This folder should be writable by a user with `uid=1000`.
111121

112122
![Backup to an NFS server](/assets/images/setting-up-backup-device42-appliance-manager/nfs-server-settings.png)
113123

114-
## Back up Using Amazon S3
124+
## Back Up Using Amazon S3
115125

116126
The backup file can be scheduled to be sent to Amazon S3 as well. All fields are required.
117127

@@ -141,15 +151,15 @@ If your **Current System Time** is incorrect, change it in your VM system config
141151
}}
142152
/>
143153

144-
## Important Note for Scheduled Backups
154+
### Important Note for Scheduled Backups
145155

146156
If you intend to use a backup schedule for an auto-restore configuration to a stand-by appliance, as described in the Device42 [Warm HA Configuration](administration/appliance-manager/warm-ha-setup-failover-and-automated-backups.mdx) documentation, it's critical that you select the **Backup Meta Data** option for the backup schedule.
147157

148158
Without the metadata for scheduled backups, the restore and passphrase settings will not be in the backup archive, and the appliance will have no reference for how to use the data when attempting to restore it.
149159

150160
A backup file without metadata can still be used for an on-demand restore.
151161

152-
### Limit Backup Retention
162+
## Limit Backup Retention
153163

154164
You may want to limit the duration for which backups will be retained.
155165

docs/auto-discovery/database-discovery/index.mdx

Lines changed: 48 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -266,7 +266,7 @@ Device42 supports autodiscovery on Windows and \*nix platforms for the following
266266

267267
Device42 database autodiscovery for Windows and \*nix targets supports discovery for Oracle RAC clustered database environments, which helps users better assess their cluster databases and understand all the IT assets tied to critical business applications. Discovery returns data about the RAC configuration, the RAC database, and the nodes (physical servers) running the RAC software. You can run the autodiscovery against one or more nodes in the Oracle RAC and return information about all connected nodes. Device42 requires the use of sudo for Oracle discoveries to mitigate the risk of lockout.
268268

269-
### Minimum Permissions Requirements for Oracle Discovery
269+
### Minimum Database-Level Permissions
270270

271271
For discovery to return detailed info about your database instance, you will require read or view permissions for the following system views and tables:
272272

@@ -284,6 +284,53 @@ To get information about pluggable databases (PDBs) within an Oracle container d
284284
CONTAINER = CURRENT;
285285
```
286286

287+
### System-Level Permissions
288+
289+
In addition to the minimum DB-level permissions above, discovery also needs shell access to the target system to run OS-level commands to get information about the Oracle environment.
290+
291+
For example, shell access is needed to read the `tnsames.ora` file, which contains network connection details:
292+
293+
```bash
294+
/usr/bin/cat: /dbprog/oracle/product/19.3.0.0.26/network/admin/tnsnames.ora
295+
```
296+
297+
Another example is the `lsnrctl status` command, which checks the status of the Oracle listener:
298+
299+
```bash
300+
oracle -c 'lsnrctl status'
301+
```
302+
303+
To allow Device42 to run these commands securely, you can grant limited `sudo` access by adding the following to the `/etc/sudoers` file or by creating a separate `sudoers` file for Device42 Oracle discovery:
304+
305+
<details>
306+
<summary>Click to expand the code block</summary>
307+
308+
```bash
309+
# Basic Oracle Discovery Commands
310+
Cmnd_Alias DEVICE42_ORACLE = \
311+
/usr/bin/ps -ef, \
312+
/usr/bin/pwdx *, \
313+
/usr/bin/su - oracle -c lsnrctl status, \
314+
/usr/bin/su - oracle -c echo "select * from product_component_version;" | sqlplus -L -S -M "HTML ON" / as sysdba, \
315+
/usr/bin/cat /etc/oratab, \
316+
/usr/bin/su - oracle -c /u01/app/19.1.0.0/grid/bin/lsnrctl status, \
317+
/usr/bin/su - oracle -c echo "select * from product_component_version;" | /u01/app/19.1.0.0/grid/bin/sqlplus -L -S -M "HTML ON" / as sysdba
318+
319+
# Oracle RAC Additional Commands
320+
Cmnd_Alias DEVICE42_ORACLE_RAC = \
321+
/usr/bin/su - oracle -c /u01/app/19.1.0.0/grid/bin/olsnodes -c, \
322+
/usr/bin/su - oracle -c /u01/app/19.1.0.0/grid/bin/olsnodes -n -i -s, \
323+
/usr/bin/su - oracle -c /u01/app/19.1.0.0/grid/bin/olsnodes -l -n -i -s, \
324+
/usr/bin/su - oracle -c /u01/app/19.1.0.0/grid/bin/srvctl config scan_listener, \
325+
/usr/bin/su - oracle -c /u01/app/19.1.0.0/grid/bin/srvctl config scan, \
326+
/usr/bin/su - oracle -c /u01/app/19.1.0.0/grid/bin/crsctl stat res -t | grep *, \
327+
/usr/bin/su - oracle -c srvctl config database -d *
328+
329+
# Grant these permissions to your Device42 discovery user:
330+
# username ALL=(ALL) NOPASSWD: DEVICE42_ORACLE, DEVICE42_ORACLE_RAC
331+
```
332+
</details>
333+
287334
### Set Up Your Oracle Discovery Job
288335

289336
To begin discovering your Oracle databases, navigate to **Discovery > HyperVisors /\*nix /Windows**. Create a new discovery job for Windows or \*nix (or both) targets, and be sure to check the **Collect database server information** checkbox.

0 commit comments

Comments
 (0)