Skip to main content
NetApp Stage KB

Where is the proxy information saved to in the Cloud Insights Acquisition Unit?

Views:
Visibility:
Public
Votes:
0
Category:
cloud-insights
Specialty:
oci
Last Updated:

Applies to

Cloud Insights Acquisition Unit (AU)

Answer

  • The proxy information is saved to the securityadmin vault on the AU.
  • To update the proxy, run the securityadmin tool in non-interactive mode using the CLI option -pr or --proxy configure
Linux securityadmin tool: /opt/netapp/cloudinsights/acq/securityadmin/bin
 
Windows securityadmin tool: <install location>\Cloud Insights\Acquisition Unit\acq\securityadmin\bin
 
Ex:Running securityadmin.sh on Linux AU

# securityadmin.sh  -pr
usage: securityadmin -pr -ap <arg> | -h | -rp | -upr <arg>

The purpose of this tool is to enable reconfiguration of security aspects
of the Acquisition Unit such as encryption keys, and proxy configuration,
etc. For more information about this tool, please check the Cloud Insights
Documentation.

 -ap,--add-proxy <arg>       add a proxy server.  Arguments: ip=ip
                             port=port user=user password=password
                             domain=domain
                             (Note: Always use double quote(") or single
                             quote(') around user and password to escape
                             any special characters, e.g., <, >, ~, `, ^,
                             !
                             For example: user="test" password="t'!<@1"
                             Note: domain is required if the proxy auth
                             scheme is NTLM.)

 

Additional Information

additionalInformation_text
NetApp provides no representations or warranties regarding the accuracy or reliability or serviceability of any information or recommendations provided in this publication or with respect to any results that may be obtained by the use of the information or observance of any recommendations provided herein. The information in this document is distributed AS IS and the use of this information or the implementation of any recommendations or techniques herein is a customer's responsibility and depends on the customer's ability to evaluate and integrate them into the customer's operational environment. This document and the information contained herein may be used solely in connection with the NetApp products discussed in this document.
280feac9-0fcc-40e5-af59-55243d5111e4