Verifying the NetApp Connector Installation
Verifying Application Configuration
After the configuration of one of the following applications is complete, verify it was properly configured by running the Test Connection task.
The Test Connection will run and validate a series of validations to see if the application was configured correctly.
Common NetApp Validations
The following is a list of common validations that run when the test connection is run with a NetApp application.
-
Server responsiveness
-
Verifying the ability to list shares
-
Verifying the ability to read share permissions
-
Verifying the membership to the Backup Operators group
-
Verifying access to the ONTAP API
-
Verifying the FPolicy is configured
-
Verifying there is a connection between FPolicy and the Activity Monitor
Installed Services
Verify that the services installed for the connector are available and active. Using windows Service manager, or other tool, look for the File Access Manager services, and see that they are running.
for example:
- File Access Manager Central Activity Monitor - <Service Name>
- File Access Manager Central Permissions Collection - <Service Name>
- File Access Manager Central Data Classification - <Service Name>
Log Files
Check the log files listed below for errors
-
“%SAILPOINT_HOME_LOGS%\ FilesMiniFilter_ <Application_Name>.log"
-
“%SAILPOINT_HOME_LOGS%\PermissionCollection_<Service_Name>.log"
-
“%SAILPOINT_HOME_LOGS%\DataClassification_<Service_Name>.log"
- “%SAILPOINT_HOME_LOGS%\Netapp-<Application_Name>.log"
Monitored Activities
-
Simulate activities on NetApp.
-
Wait a minute (approximately).
-
Verify that the activities display in the File Access Manager website under
Forensics > Activities
Permissions Collection
-
Run the Crawler and Permissions Collector tasks (Settings > Task Management > Scheduled Tasks)
-
Verify that:
-
The tasks completed successfully
-
Business resources were created in the resource explorer (Admin > Applications > [application column] > Manage Resources)
-
Permissions display in the Permission Forensics page (Forensics > Permissions)
-