The requested article is not available. Either it doesn't apply to this version of the product or the relevant information is organized differently in this version of the docs. You can search, browse, or go back to the other version.
This may take a few minutes. Thanks for your patience.
Your file is ready
Deploy the Connector in private mode so that you can use BlueXP with no outbound connectivity to the BlueXP software as a service (SaaS) layer. To get started, install the Connector, set up BlueXP by accessing the user interface that's running on the Connector, and then provide the cloud permissions that you previously set up.
Step 1: Install the Connector
Download the product installer from the NetApp Support Site and then manually install the Connector on your own Linux host.
Attach the IAM role that you previously created to the Connector EC2 instance.
Steps
Go to the Amazon EC2 console.
Select Instances.
Select the Connector instance.
Select Actions > Security > Modify IAM role.
Select the IAM role and select Update IAM role.
Result
BlueXP now has the permissions that it needs to perform actions in AWS on your behalf.
Provide BlueXP with the AWS access key for an IAM user that has the required permissions.
Steps
In the upper right of the BlueXP console, select the Settings icon, and select Credentials.
Select Add Credentials and follow the steps in the wizard.
Credentials Location: Select Amazon Web Services > Connector.
Define Credentials: Enter an AWS access key and secret key.
Marketplace Subscription: Associate a Marketplace subscription with these credentials by subscribing now or by selecting an existing subscription.
Review: Confirm the details about the new credentials and select Add.
Result
BlueXP now has the permissions that it needs to perform actions in AWS on your behalf.
Go to the Azure portal and assign the Azure custom role to the Connector virtual machine for one or more subscriptions.
Steps
From the Azure Portal, open the Subscriptions service and select your subscription.
It's important to assign the role from the Subscriptions service because this specifies the scope of the role assignment at the subscription level. The scope defines the set of resources that the access applies to. If you specify a scope at a different level (for example, at the virtual machine level), your ability to complete actions from within BlueXP will be affected.
Select Access control (IAM) > Add > Add role assignment.
In the Role tab, select the BlueXP Operator role and select Next.
BlueXP Operator is the default name provided in the BlueXP policy. If you chose a different name for the role, then select that name instead.
In the Members tab, complete the following steps:
Assign access to a Managed identity.
Select Select members, select the subscription in which the Connector virtual machine was created, under Managed identity, choose Virtual machine, and then select the Connector virtual machine.
Select Select.
Select Next.
Select Review + assign.
If you want to manage resources in additional Azure subscriptions, switch to that subscription and then repeat these steps.
Result
BlueXP now has the permissions that it needs to perform actions in Azure on your behalf.
Provide BlueXP with the credentials for the Azure service principal that you previously setup.
Steps
In the upper right of the BlueXP console, select the Settings icon, and select Credentials.
Select Add Credentials and follow the steps in the wizard.
Credentials Location: Select Microsoft Azure > Connector.
Define Credentials: Enter information about the Microsoft Entra service principal that grants the required permissions:
Application (client) ID
Directory (tenant) ID
Client Secret
Marketplace Subscription: Associate a Marketplace subscription with these credentials by subscribing now or by selecting an existing subscription.
Review: Confirm the details about the new credentials and select Add.
Result
BlueXP now has the permissions that it needs to perform actions in Azure on your behalf.
Associate the service account with the Connector VM.
Steps
Go to the Google Cloud portal and assign the service account to the Connector VM instance.
If you want to manage resources in other projects, grant access by adding the service account with the BlueXP role to that project. You'll need to repeat this step for each project.
Result
BlueXP now has the permissions that it needs to perform actions in Google Cloud on your behalf.