You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/administration/appliance-manager/setting-up-backup-device42-appliance-manager.mdx
+18-8Lines changed: 18 additions & 8 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -41,6 +41,16 @@ Configure the backup options for the Main Appliance and Remote Collectors (RCs).
41
41
42
42

43
43
44
+
### For Standby Instances
45
+
46
+
Select the **Backup Meta Data** option when creating a Device42 instance for recovery or failover purposes. Selecting the metadata option copies all system identifiers, passphrases, certificates, and configuration settings – preparing the standby instance to fully replace your production instance when needed.
47
+
48
+
The standby instance will have the same system identifiers as the production instance, which means it will connect as the primary instance. For this reason, keep one instance with the identifier data active at a time. See the [Warm HA Setup documentation](administration/appliance-manager/warm-ha-setup-failover-and-automated-backups.mdx) for failover procedures.
49
+
50
+
### For Test Instances
51
+
52
+
Do not select the **Backup Meta Data** option when creating test or development environments. Backing up and restoring this way is useful when you just want to recover your data, rather than replacing your production instance. The GUIDs will not be copied without the metadata option selected, and without these GUIDs, the machine cannot connect to external services or be used to replace the production instance.
53
+
44
54
### Remote Collector Options
45
55
46
56
The following table summarizes the backup settings for the selected RC(s):
@@ -69,7 +79,7 @@ The following table summarizes the backup settings for the selected RC(s):
69
79
</tr>
70
80
<tr>
71
81
<td>**Backup TLS Key Pair**</td>
72
-
<td>Backs up the TLS certificate and key</td>
82
+
<td>Backs up the TLS certificate and key.</td>
73
83
<td>
74
84
<ul>
75
85
<li>`/etc/nginx/ssl.crt/server.crt`</li>
@@ -99,19 +109,19 @@ The following table summarizes the backup settings for the selected RC(s):
99
109
</table>
100
110
101
111
102
-
## Back up to an SFTP Server
112
+
## Back Up to an SFTP Server
103
113
104
-
The backup file can be scheduled to be sent to a SFTP server. All fields are required.
114
+
The backup file can be scheduled to be sent to an SFTP server. All fields are required.
105
115
106
116

107
117
108
-
## Back up to an NFS server
118
+
## Back Up to an NFS Server
109
119
110
-
The backup file can be scheduled to be sent to an NFS server. All fields are required. The IP address should be the address of the target NFS server, and the folder path should be the path to the directory where the backups will be stored. This folder should be writeable by a user with `uid=1000`.
120
+
The backup file can be scheduled to be sent to an NFS server. All fields are required. The IP address should be the address of the target NFS server, and the folder path should be the path to the directory where the backups will be stored. This folder should be writable by a user with `uid=1000`.
111
121
112
122

113
123
114
-
## Back up Using Amazon S3
124
+
## Back Up Using Amazon S3
115
125
116
126
The backup file can be scheduled to be sent to Amazon S3 as well. All fields are required.
117
127
@@ -141,15 +151,15 @@ If your **Current System Time** is incorrect, change it in your VM system config
141
151
}}
142
152
/>
143
153
144
-
## Important Note for Scheduled Backups
154
+
###Important Note for Scheduled Backups
145
155
146
156
If you intend to use a backup schedule for an auto-restore configuration to a stand-by appliance, as described in the Device42 [Warm HA Configuration](administration/appliance-manager/warm-ha-setup-failover-and-automated-backups.mdx) documentation, it's critical that you select the **Backup Meta Data** option for the backup schedule.
147
157
148
158
Without the metadata for scheduled backups, the restore and passphrase settings will not be in the backup archive, and the appliance will have no reference for how to use the data when attempting to restore it.
149
159
150
160
A backup file without metadata can still be used for an on-demand restore.
151
161
152
-
###Limit Backup Retention
162
+
## Limit Backup Retention
153
163
154
164
You may want to limit the duration for which backups will be retained.
Copy file name to clipboardExpand all lines: docs/auto-discovery/database-discovery/index.mdx
+48-1Lines changed: 48 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -266,7 +266,7 @@ Device42 supports autodiscovery on Windows and \*nix platforms for the following
266
266
267
267
Device42 database autodiscovery for Windows and \*nix targets supports discovery for Oracle RAC clustered database environments, which helps users better assess their cluster databases and understand all the IT assets tied to critical business applications. Discovery returns data about the RAC configuration, the RAC database, and the nodes (physical servers) running the RAC software. You can run the autodiscovery against one or more nodes in the Oracle RAC and return information about all connected nodes. Device42 requires the use of sudo for Oracle discoveries to mitigate the risk of lockout.
268
268
269
-
### Minimum Permissions Requirements for Oracle Discovery
269
+
### Minimum Database-Level Permissions
270
270
271
271
For discovery to return detailed info about your database instance, you will require read or view permissions for the following system views and tables:
272
272
@@ -284,6 +284,53 @@ To get information about pluggable databases (PDBs) within an Oracle container d
284
284
CONTAINER = CURRENT;
285
285
```
286
286
287
+
### System-Level Permissions
288
+
289
+
In addition to the minimum DB-level permissions above, discovery also needs shell access to the target system to run OS-level commands to get information about the Oracle environment.
290
+
291
+
For example, shell access is needed to read the `tnsames.ora` file, which contains network connection details:
Another example is the `lsnrctl status` command, which checks the status of the Oracle listener:
298
+
299
+
```bash
300
+
oracle -c 'lsnrctl status'
301
+
```
302
+
303
+
To allow Device42 to run these commands securely, you can grant limited `sudo` access by adding the following to the `/etc/sudoers` file or by creating a separate `sudoers` file for Device42 Oracle discovery:
304
+
305
+
<details>
306
+
<summary>Click to expand the code block</summary>
307
+
308
+
```bash
309
+
# Basic Oracle Discovery Commands
310
+
Cmnd_Alias DEVICE42_ORACLE = \
311
+
/usr/bin/ps -ef, \
312
+
/usr/bin/pwdx *, \
313
+
/usr/bin/su - oracle -c lsnrctl status, \
314
+
/usr/bin/su - oracle -c echo"select * from product_component_version;"| sqlplus -L -S -M "HTML ON" / as sysdba, \
To begin discovering your Oracle databases, navigate to **Discovery > HyperVisors /\*nix /Windows**. Create a new discovery job for Windows or \*nix (or both) targets, and be sure to check the **Collect database server information** checkbox.
0 commit comments