Hitachi

JP1 Version 13 JP1/Integrated Management 3 - Manager Command, Definition File and API Reference


jimasecret

Organization of this page

Function

This command obfuscates the specified secret and add it to the secret management File. Added secret is read and used by JP1/IM - Agent service.

For details about the secrets that you can Setup with this command, see 3.15.10 Secret obfuscation function in the JP1/Integrated Management 3 - Manager Overview and System Design Guide.

Format

jimasecret -list
                   [-l shared-directory]
jimasecret -add
                   -key key-name
                   -s secret
                   [-l shared-directory]
jimasecret -rm
                   -key key-name
                   [-l shared-directory]

Execution permission

In Windows: Administrator permissions (if the Windows UAC feature is enabled, the command is executed from the administrator console)

In UNIX: Superuser permissions

Storage directory

In Windows:

Agent-path\tools\

In Linux:

/opt/jp1ima/tools/

Arguments

-list

Lists the keys for the secret that you add. The secrets are not displayed.

It cannot be specified together with -add, or -rm option.

-add

Add a new secret by keying it.

If you specify a key that has already been added, overwrite the secret. At this time, overwriting is not checked.

You can Add up to 1,000 secrets.

If you specify this option, you must also specify -key and -s options.

Cannot be specified together with -list or -rm option.

-rm

Delete the secret that is already added by keying.

If a key that does not exist is specified, Error is returned.

If you specify this option, you must also specify -key option.

Cannot be specified together with -list or -rm option.

-key key-name

Specifies the key-name of the secret that you want to add, modify, or delete.

The characters that can be specified are 0x20 to 0x7e characters of ASCII.

The maximum length that can be specified is 1,024 characters.

The specific key format is shown below.

- Information about the manager of connection destination:
  • Key for the proxy password to connect to the manager host:

immgr.proxy_user.authentication-ID

For the authentication-ID, specify the user ID specified in the immgr.proxy_user in the imagent common settings file (jpc_imagentcommon.json).

  • The key of initial secret to connect to the manager host:

immgr.initial_secret
  • The key of client secret to connect to the manager host:

immgr.client_secret

If you use data delivery function to multiple manager hosts, use the following keys instead of the above keys:

  • Key for the proxy password to connect to the manager host

jmmgr.proxy_user-imagent-group-identifier.Authentication-ID

For the authentication-ID, specify the user ID specified in the proxy_user of the secondary element (the element whose imagid below immgrs array matches imagent group-identifier) in the imagent common configuration file (jpc_imagentcommon.json).

  • Keying initial secret to connect to the manager host

immgr.initial_secret-imagent-group-identifier
  • Keying client secret to connect to the manager host

immgr.client_secret-imagent-group-identifier
- JP1/IM agent control base
  • The key for registration of password of the user used for Action Execution:

action.user.user-name

Set user name user that is set to action.username in imagent configuration file (jpc_imagent.json). This is only for Windows. In Linux, it is ignored even if it is specified.

Important

Value specified in -key is not checked for correct format.

Note

Specify client secret only if you want to manually delete it.

- For Blackbox exporter:
  • Key to add password of the proxy authentication:

Blackbox.module-name.proxy_user.authentication-ID

For the module-name, specify the module name specified for Blackbox exporter configuration file (jpc_blackbox_exporter.yml).

For authentication-ID, specify the user ID specified for proxy_user in Blackbox exporter configuration file (jpc_blackbox_exporter.yml)

  • Keys used to Add Password of the monitored Web Server:

Blackbox.module-name.basic_auth.authentication-ID

For the module-name, specify the module name specified for Blackbox exporter configuration file (jpc_blackbox_exporter.yml).

For authentication-ID, specify the user ID specified for basic_auth.username in Blackbox exporter configuration file (jpc_blackbox_exporter.yml)

  • Key to add Bearer token of the monitored Web Server:

Blackbox.module-name.bearer_token

For the module-name, specify the module name specified for Blackbox exporter configuration file (jpc_blackbox_exporter.yml).

- For Primitor
  • Keys used to add client secret of the Resource Discovery:

Promitor.resource_discovery.env.AUTH_APPKEY
  • Key to add client secret key of the Scraper:

Promitor.scraper.env.AUTH_APPKEY
- For OracleDB exporter

There are two types of keys for registering a password for connecting to OracleDB:

  • Password-key to connect to OracleDB (type of specifying the username)

OracleDB.user.user-name

For the user-name, specify the username that is set in the environment-variable DATA_SOURCE_NAME. Make sure to match the case.

  • Password-key to connect to OracleDB (type of specifying the host name, listener service name, and username)

OracleDB.host.host-name.listener.listener-service-name.user.user-name

For the host-name, specify the hostname of OracleDB server for DATA_SOURCE_NAME. Make sure to match the case.

For the listener-service-name, specify the service name of the environment-variable DATA_SOURCE_NAME. Make sure to match the case.

For the user-name, specify the username that is set in the environment-variable DATA_SOURCE_NAME. Make sure to match the case.

Typically, you use the key which is the "type of specifying the username".

If more than one user with the same username exists and a different password is set, you must set a password for each OracleDB host/service using the "type of specifying the host name, listener service name, and username".

OracleDB exporter retrieves the values of the host-name, listener-service-name, and user-name from the values of the environment variable DATA_SOURCE_NAME. Search for a registered password by configuring the key in the "type of specifying the username" or the "type of specifying the host name, listener service name, and username". If the password could be retrieved in both formats, use the key "type of specifying the host name, listener service name, and username".

- For Web exporter

There are two types of keys for registering passwords for executing Web scenarios from Web exporter:

  • Password key for executing Web scenarios (in the form of a username)

Webscena.user.user-name

The username specifies the user specified in Web exporter configuration file (jpc_web_exporter) username.

  • Password key for executing Web scenarios (in the form of a username and domain name)

Webscena.user.user-name.domainname.domain-name

The username specifies the user specified in Web exporter configuration file (jpc_web_exporter) username.

For domain name, specify domain name specified in Web exporter configuration file (jpc_web_exporter) domainname.

If there is more than one user with the same username, use the key in the Format for specifying the username and domain name.

- For VMware exporter
  • Section password key to connect to VMware ESXi

When using VMware exporter, be sure to specify "vmware.section.default" as the key. The first section name of the connection destination is "default" and the secret for "default" is mandatory.

Vmware.section.section-name

For the section name, specify the section name specified in VMware exporter configuration file (jpc_vmware_exporter.yml).

-s secret

Specifies the secret (Password) to be added or updated.

The characters that can be specified are 0x20 to 0x7e characters of ASCII.

The maximum length that can be specified is 1,024 characters.

-l shared-directory

For a Logical host environment, specify Logical host shared directory.

Specify a relative or absolute path.

The length of the path can be up to 63 bytes.

Character types are not checked.

Notes

Return values

0

Normal termination

1

Abnormal termination (user-caused Error)

2

Abnormal termination (miscellaneous Error)

Log output

Example

> jimasecret -add -key Blackbox.http1.proxy_user.p-user01 -s password01
> jimasecret -rm -key Blackbox.http1.proxy _user.p-user01
> jimasecret -list
Blackbox.http1.proxy_user.p-user01
Blackbox.http1.basic_auth.w-user01
immgr.proxy_user.user01