Add Additional SAM
This section explains how to add additional SAM in the
VMware Telco
Cloud Service Assurance
.- Navigate toAdministration>Configuration>Collectors and Connectors>Smarts Integration.TheSmarts Integrationpage appears.
- Click the vertical ellipsis (⋮) icon against the broker name and clickDetails.
- ClickAdd SAM.
- Enter the following details:
- Presentation SAM: Select the Presentation SAM from the drop-down menu.Select SAM's that are confgured as Presentation SAM only.
- SAM Credentials: Select the SAM Credentials from the drop-down. By defaultdefaultSmartsDomainCredentialis populated in the drop-down.
- defaultSmartsDomainCredentialusesadminas UserName andchangemeas Password.
- SAM Credentials used byVMware Telco Cloud Service Assurancemust belong to administrator profile.
- Name of Presentation SAM selected must be unique with-in list of SAM configured inVMware Telco Cloud Service Assurance. This constraint applies to SAMs across brokers configured inVMware Telco Cloud Service Assurance.
- EDAA URL: EDAA URL is automatically assigned, based on the broker selection.All the Domain Managers underlying to SAM server, must be EDAA enabled. Additionally, the hostname populated in EDAA URL field must be resolvable by DNS. In case if the host name is not resolvable by DNS, then EDAA URL can be edited to use IP Address .
- EDAA Credentials:Select the EDAA credential from the drop-down. By defaultdefaultSmartsEDAACredentialcredential is popuated in the drop-down. If there is no authentication configured for EDAA, then selectNoAuthfrom the drop-down in the EDAA Credentials field.Note that, ThedefaultSmartsEDAACredentialusesadminas UserName andchangemeas Password. In case if the EDAA is backed by CAS authentication, then the credential should be that of administrator.
TheShow Advanced Settingsare auto populated and optional. If you want to modify theKafka TopicandNotification List, enter the appropriate information accordingly. - ClickAdd SAM.In case the SSL certificate used in EDAA/CAS are not trusted, then you need to validate the certificates manually and confirm to proceed.