nz_controller
No SSH Required.nz_controller is a web-based management GUI that gives engineers complete visibility and control over Netezza hardware and software — running behind a modern, hardened, SOC2-compliant Enterprise Linux 9 host. Support legacy systems without exposing them directly.
The Problem We Solve
Older Netezza appliances run operating systems and firmware that are well past security patching. Supporting them requires direct SSH access to systems with significant vulnerability exposure. nz_controller changes that.
Capabilities
nz_controller exposes the full range of Netezza diagnostic and management operations through a structured, auditable web interface. Nothing is left out because it was "too complex" for a GUI.
Fan status, disk health, SPU node states, temperature readings, and component alerts — presented clearly without needing to parse raw CLI output. Spot hardware problems before they become failures.
Active sessions, query status, workload queue depth, resource utilisation, and long-running job identification. All the visibility a support engineer needs without direct database access.
NPS version information, patch level, installed packages, service status, and system configuration review. Everything needed to understand the software state of the appliance at a glance.
Every action taken through nz_controller is recorded: who did what, when, and what the output was. For compliance and support accountability, this is invaluable. No more "did someone restart that service?" archaeology.
Manage which engineers can access which systems and what operations they can perform. Access is granted and revoked centrally through the controller — no SSH key rotation required across multiple appliances.
nz_controller monitors system state continuously and raises alerts when hardware components degrade, services stop, or performance thresholds are breached. Integrated with email and webhook notification channels.
Architecture
nz_controller runs on a modern Enterprise Linux 9 host that sits in front of the legacy Netezza appliance. The controller host is fully patched, hardened per SOC2 requirements, and is the only system that communicates with the Netezza appliance. Support engineers connect to the controller — never directly to the appliance.
This architecture achieves something that previously seemed incompatible: you can maintain full support capability for a legacy Netezza system running vulnerable old software, while satisfying modern security and compliance requirements. The vulnerable system is isolated. The access point is hardened.
The controller host can be deployed on-premises alongside the Netezza appliance, or in a cloud VPC with an appropriate network path. The Netezza appliance requires no changes — it does not know nz_controller exists.
When You Need It
If you are running Striper, Mako, or CP4D beyond its EOS date, your appliance is running unpatched software. nz_controller lets you continue to operate and support those systems without exposing them to additional risk through direct access.
If your security team is uncomfortable with direct SSH access to legacy infrastructure — or if a recent audit has flagged it as a risk — nz_controller provides the hardened access boundary that satisfies SOC2 and ISO 27001 control requirements.
Smart Associates engineers use nz_controller as the standard access method for managed support engagements. This gives clients full visibility into every action taken by Smart Associates engineers on their systems, with a complete audit trail.
Not every team has engineers who know Netezza's obscure CLI commands by heart. nz_controller exposes those capabilities through a structured interface that any competent infrastructure engineer can use effectively from day one.
nz_controller was designed from the ground up for environments where security and compliance are non-negotiable. The controller host architecture separates the modern access point from the legacy appliance, giving security teams a clean, auditable boundary.
The legacy Netezza appliance is accessible only from the controller host. No direct external access paths exist. This dramatically reduces the attack surface of the legacy system.
Every operation performed through nz_controller is logged with timestamp, operator identity, and full output. Audit reports are available on demand.
Engineer access is granted and revoked from a single management point. When an engineer leaves a team, their access is removed immediately — no SSH key rotation across multiple systems.
The controller host follows CIS benchmark hardening for Enterprise Linux 9. OS patches are applied automatically. The attack surface is minimal: HTTPS inbound, and controlled outbound to the Netezza appliance.
Availability & Pricing
nz_controller access is included for Netezza Support Plus customers. The full host upgrade and legacy containerisation package is available at an all-in fixed price of £5,000+VAT.
Full web GUI access to nz_controller is included for all Netezza Support Plus customers. Smart Associates engineers use it as the standard access method for all managed support activity on your system.
Everything needed to harden and isolate your legacy Netezza appliance — in a single, all-in engagement. Smart Associates supplies and installs the controller host hardware, configures the OS, deploys nz_controller, and isolates the legacy system behind the new hardened boundary.
What's Included
Whether you are an existing Netezza Support Plus customer or are exploring options for a legacy system, we can help. Get in touch and we will assess your setup.
Contact Smart Associates