Skip to main content
NetApp Console setup and administration

Deploy the Console agent in private mode

Contributors netapp-tonias

Deploy the NetApp Console in private mode so that you can use it with no outbound connectivity. To get started, install a Console agent, set up the NetApp Console by accessing the user interface that's running on the Console agent, and then provide the cloud permissions that you previously set up.

Step 1: Install the Console agent

Download the product installer from the NetApp Support Site and then manually install the Console on your own Linux host.

To use the NetApp Console in the AWS Secret Cloud or the AWS Top Secret Cloud, then you should follow separate instructions to get started in those environments. Learn how to get started with Cloud Volumes ONTAP in the AWS Secret Cloud or Top Secret Cloud

Before you begin
  • Root privileges are required to install the Console agent.

  • Depending on your operating system, either Podman or Docker Engine is required before you install the Console agent.

Steps
  1. Download the Console agent software from the NetApp Support Site

    Be sure to download the offline installer for private networks without internet access.

  2. Copy the installer to the Linux host.

  3. Assign permissions to run the script.

    chmod +x /path/NetApp-Console-Private-Mode-<version>

    Where <version> is the version of the Console agent that you downloaded.

  4. Run the installation script:

    sudo /path/NetApp-Console-Private-Mode-<version>

    Where <version> is the version of the Console agent that you downloaded.

Result

The Console agent is installed. You can now set up the NetApp Console.

Step 2: Set up NetApp Console

When you access the NetApp Console for the first time, you'll be prompted to set up NetApp Console.

Steps
  1. Open a web browser and enter the IP address of the Linux host where you installed the Console agent.

  2. Select Set Up New Console agent and follow the prompts to set up the system.

    • System Details: Enter a name for the Console agent and your company name.

    • Create an Admin User: Create the admin user for the system.

    • Review: Review the details, accept the license agreement, and then select Set Up.

  3. Log in to NetApp Console using the admin user that you just created.

Result

The Console agent is now installed. Access its IP address in a web browser to access the NetApp Console in private mode.

When new versions of the Console software are available, they'll be posted to the NetApp Support Site. Learn how to upgrade the Console agent.

What's next?

Provide the Console agent with the cloud provider permissions that you previously set up.

Step 3: Provide permissions to Console agent

If you want to create Cloud Volumes ONTAP working environments, you'll need to provide the Console agent with the cloud provider permissions that you previously set up.

AWS IAM role

Attach the IAM role that you previously created to the Console agent EC2 instance.

Steps
  1. Go to the Amazon EC2 console.

  2. Select Instances.

  3. Select the Console agent instance.

  4. Select Actions > Security > Modify IAM role.

  5. Select the IAM role and select Update IAM role.

AWS access key

Provide the Console agent with the AWS access key for an IAM user that has the required permissions.

Steps
  1. Select Administration > Credentials.

  2. Select Organization credentials.

  3. Select Add Credentials and follow the steps in the wizard.

    1. Credentials Location: Select *Amazon Web Services > Agent.

    2. Define Credentials: Enter an AWS access key and secret key.

    3. Marketplace Subscription: Associate a Marketplace subscription with these credentials by subscribing now or by selecting an existing subscription.

    4. Review: Confirm the details about the new credentials and select Add.

Azure role

Go to the Azure portal and assign the Azure custom role to the Console agent virtual machine for one or more subscriptions.

Steps
  1. From the Azure Portal, open the Subscriptions service and select your subscription.

    It's important to assign the role from the Subscriptions service because this specifies the scope of the role assignment at the subscription level. The scope defines the set of resources that the access applies to. If you specify a scope at a different level (for example, at the virtual machine level), your ability to complete actions from within the NetApp Console will be affected.

  2. Select Access control (IAM) > Add > Add role assignment.

  3. In the Role tab, select the Console Operator role and select Next.

    Note Console Operator is the default name provided in the policy. If you chose a different name for the role, then select that name instead.
  4. In the Members tab, complete the following steps:

    1. Assign access to a Managed identity.

    2. Select Select members, select the subscription in which the Console agent virtual machine was created, under Managed identity, choose Virtual machine, and then select the Console agent virtual machine.

    3. Select Select.

    4. Select Next.

    5. Select Review + assign.

    6. If you want to manage resources in additional Azure subscriptions, switch to that subscription and then repeat these steps.

Azure service principal

Provide the Console agent with the credentials for the Azure service principal that you previously setup.

Steps
  1. Select Administration > Credentials.

  2. Select Add Credentials and follow the steps in the wizard.

    1. Credentials Location: Select Microsoft Azure > Agent.

    2. Define Credentials: Enter information about the Microsoft Entra service principal that grants the required permissions:

      • Application (client) ID

      • Directory (tenant) ID

      • Client Secret

    3. Marketplace Subscription: Associate a Marketplace subscription with these credentials by subscribing now or by selecting an existing subscription.

    4. Review: Confirm the details about the new credentials and select Add.

Google Cloud service account

Associate the service account with the Console agent VM.

Steps
  1. Go to the Google Cloud portal and assign the service account to the Console agent VM instance.

  2. If you want to manage resources in other projects, grant access by adding the service account with the Console agent role to that project. You'll need to repeat this step for each project.