You can import the VMware Aria Operations for Networks Collector OVA using vSphere Web Client.

Procedure

  1. Right-click the Datacenter where you want to install the appliance and select Deploy OVF Template.
  2. Enter the URL to download and install the OVA package from the internet. Or, browse your computer to select the source location of the OVA package.
  3. Provide a name and specify a location where you want to save the deployed template. Click Next.
  4. Select a resource (host or a cluster) where you want to run the deployed template. Click Next.
  5. Verify all the details of the template. Click Next.
  6. Read the End-User License Agreement and click Accept. Click Next.
  7. Select a deployment configuration. Click Next.
    Important: If you select 2X Large as your deployment configuration, after you complete the deployment procedure, you need to increase the disk size to meet the system requirement of the brick size. To know how to increase the disk size, see Increase the Disk Size.
  8. Select the location where you want to store the files for the deployed template.
    1. Select Thin Provision as the virtual disk format.
    2. Specify the format in which you want to store the virtual disks.
    3. Select the datastore in which you want to install the files.
    4. Click Next.
  9. Specify the destination network for the source network. Click Next.
  10. Customize the template for the deployment. Provide the shared secret that is generated on the UI. You will have to manually configure the appliance using the VM console. Click Next.
  11. Verify all the configuration data. Click Finish.
  12. Once the Collector OVA is installed, start the VM and launch the console.
  13. Log in with the console credential that you see on the screen and run the setup command.
  14. Create the password for the support login and change the password for the consoleuser.
    Note:
    • Your password must contain a minimum of 6 characters. A single quote (') is not allowed.
    • You must change the support and consoleuser password periodically to comply with your organization policy.
  15. Network Configuration: Enter the IP family to be associated with the network.
    • Enter ipv4 to configure your network with IPv4 capabilities.
    • Enter ipv6 to configure your network with IPv6 capabilities.
    • Enter dual-stack to configure your network with both IPv4 and IPv6 capabilities.
  16. Based on your choice in Step 15, enter the details of the IP family.
    Action Procedure
    ipv4

    Enter IPv4 network configuration details such as:

    1. IP_Address: Second reserved static IPv4 address.
    2. Netmask: Subnet mask for the static IPv4 address.
    3. Default_Gateway: Default gateway of your network.
    4. DNS : DNS server of your environment. To enter multiple DNS servers, use space.
    5. Domain _Search : The domain that must be appended for DNS lookups.
    6. Enter y to save the configuration.
    ipv6

    Enter IPv6 network configuration details such as:

    1. IPv6_Address: Second reserved static IPv6 address.
    2. IPv6_Netmask: Subnet mask for the static IPv6 address.
    3. IPv6_Default Gateway: Default gateway of your network.
    4. IPv6_DNS : DNS server of your environment. To enter multiple DNS servers, use space.
    5. Domain_Search: The domain that must be appended for DNS lookups.
    6. Enter y to save the configuration.
    dual-stack Enter both IPv4 and IPv6 network configuration details.
  17. Network Time Server Configuration: Configure NTP or secure NTP servers.
    • Enter y if network time security is supported for the NTP server. Network time security is supported only in secure NTP servers.
    • Enter n if network time security is not supported for the NTP server.
  18. Based on your choice in step 16, enter the IP address or FQDN details of a NTP or secure NTP server. Ensure that the VMs can reach these servers. If the NTP time is out of sync, the services will fail to start.
    To enter multiple servers, use commas.
  19. (Optional) To configure web proxy:
    1. Enter y.
    2. Provide the web proxy details.
  20. A check is made to see if the shared secret key has been configured. The collector is paired with the corresponding platform. This may take few minutes.
  21. All the services are verified.
  22. Click Finish, when you see the Proxy Detected! message displayed on the onboarding page. You will be redirected to the Login page.