Connector, vmware type
Expand all | Collapse all
Connectors of the vmware typeUsed for getting VMware vCenter data via the API. Settings for a connector of the vmware type are described in the following tables.
Basic settings tab
Setting
|
Description
|
Name
|
Unique name of the resource. The maximum length of the name is 128 Unicode characters.
Required setting.
|
Tenant
|
The name of the tenant that owns the resource.
Required setting.
|
Type
|
Connector type: vmware.
Required setting.
|
Tags
|
Tags for resource search.
Optional setting.
|
URL
|
URL of the VMware API. You need to include the hostname and port number in the URL. You can only specify one URL.
Required setting.
|
VMware credentials
|
Secret that stores the user name and password for connecting to the VMware API. You can select an existing secret or create a new secret. To create a new secret, select Create new.
If you want to edit the settings of an existing secret, click the pencil icon next to it.
How to create a secret?
To create a secret:
- In the Name field, enter the name of the secret.
- In the User and Password fields, enter the credentials of the user account that the Agent will use to connect to the connector.
- If necessary, enter a description of the secret in the Description field.
- Click the Create button.
The secret is added and displayed in the Secret drop-down list.
Required setting.
|
Client timeout
|
Time to wait after a request that did not return events before making a new request. The default value is 5 seconds. If you specify 0 , the default value is used.
|
Maximum number of events
|
Number of events requested from the VMware API in one request. The default value is 100 . The maximum value is 1000 .
|
Start timestamp
|
Starting date and time from which you want to read events from the VMware API. By default, events are read from the VMware API from the time when the collector was started. If started after the collector is stopped, the events are read from the last saved date.
|
Description
|
Description of the resource. The maximum length of the description is 4000 Unicode characters.
|
Advanced settings tab
Setting
|
Description
|
Debug
|
Ths switch enables resource logging. The toggle switch is turned off by default.
|
Character encoding
|
Character encoding. The default is UTF-8.
|
TLS mode
|
TLS encryption mode. When using TLS encryption, you cannot specify an IP address in the URL field on the Basic settings. Available values:
- Disabled means TLS encryption is not used. This value is selected by default.
- Enabled means TLS encryption is used, but certificates are not verified.
- Custom CA means TLS encryption is used with verification that the certificate was signed by a Certificate Authority. If you select this value, in the Custom CA drop-down list, specify a secret with a certificate signed by a certification authority. You can select an existing secret or create a new secret. To create a new secret, select Create new.
If you want to edit the settings of an existing secret, click the pencil icon next to it.
How to create a certificate signed by a Certificate Authority?
You can create a CA-signed certificate on the KUMA Core server (the following command examples use OpenSSL).
To create a certificate signed by a Certificate Authority:
- Generate a key to be used by the Certificate Authority, for example:
openssl genrsa -out ca.key 2048
- Create a certificate for the generated key, for example:
openssl req -new -x509 -days 365 -key ca.key -subj "/CN=< common host name of Certificate Authority >" -out ca.crt
- Create a private key and a request to have it signed by the Certificate Authority, for example:
openssl req -newkey rsa:2048 -nodes -keyout server.key -subj "/CN=< common host name of KUMA server >" -out server.csr
- Create the certificate signed by the Certificate Authority. You need to include the domain names or IP addresses of the server for which you are creating the certificate in the
subjectAltName variable, for example:openssl x509 -req -extfile <(printf "subjectAltName=DNS:domain1.ru,DNS:domain2.com,IP:192.168.0.1") -days 365 -in server.csr -CA ca.crt -CAkey ca.key -CAcreateserial -out server.crt
- Upload the created
server.crt certificate in the KUMA Console to a secret of the certificate type, then in the Custom CA drop-down list, select the secret of the certificate type.
To use KUMA certificates on third-party devices, you must change the certificate file extension from CERT to CRT. Otherwise, you can get the x509: certificate signed by unknown authority error.
|
Page top
[Topic 268029]