Skip to content

Verifying the EMC Isilon Connector Installation

Verifying Application Configuration

After the configuration of one of the following applications is complete, verify it was properly configured by running the Test Connection task.

The Test Connection will run and validate a series of validations to see if the application was configured correctly.

Common Isilon Validations

The following is a list of common validations that run when the test connection is run with a Isilon application.

  • Server responsiveness

  • Verifying the ability to list shares

  • Verifying the ability to read share permissions

  • Verifying the membership to the Backup Operators group

  • Verifying access to the OneFS API

  • Verifying the audit setting are correct on the Isilon server

  • Verifying the Activity Monitoring event listener is running

Installed Services

Verify that the services installed for the connector are available and active. Using windows Service manager, or other tool, look for the File Access Manager services, and see that they are running.

For example:

  • File Access Manager Central Activity Monitor - <Application_Name>.

  • File Access Manager Permissions Collection - <Application_Name>.

  • File Access Manager Data Classification - <Application_Name> .

Log Files

Check the log files listed below for errors:

  • “%SAILPOINT_HOME_LOGS%\ FilesMiniFilter_ <Application_Name>.log"

  • “%SAILPOINT_HOME_LOGS%\PermissionCollection_<Service_Name>.log"

  • “%SAILPOINT_HOME_LOGS%\DataClassification_<Service_Name>.log"

  • “%SAILPOINT_HOME_LOGS%\EMCCelerra-<Application_Name>.log"

Verifying Monitored Activities

  1. Simulate activities on the storage system.

  2. Wait approximately one minute.

  3. Verify that the activities display in the File Access Manager website under Forensics > Activities.

Permissions Collection

  1. Run the Crawler and Permissions Collector tasks on the Settings > Task Management > Scheduled Tasks page.

  2. Verify that:

    • The tasks completed successfully

    • Business resources were created in the resource explorer on the Admin > Applications > [application column] > Manage Resources page.

    • Permissions display in the Permission Forensics page at Forensics > Permissions.