NetBackup102 WebUIGuide CloudAdmin
NetBackup102 WebUIGuide CloudAdmin
Administrator's Guide
Release 10.2
Last updated: 2023-03-17
Legal Notice
Copyright © 2023 Veritas Technologies LLC. All rights reserved.
Veritas, the Veritas Logo, and NetBackup are trademarks or registered trademarks of Veritas
Technologies LLC or its affiliates in the U.S. and other countries. Other names may be
trademarks of their respective owners.
This product may contain third-party software for which Veritas is required to provide attribution
to the third party (“Third-party Programs”). Some of the Third-party Programs are available
under open source or free software licenses. The License Agreement accompanying the
Software does not alter any rights or obligations you may have under those open source or
free software licenses. Refer to the Third-party Legal Notices document accompanying this
Veritas product or available at:
https://www.veritas.com/about/legal/license-agreements
The product described in this document is distributed under licenses restricting its use, copying,
distribution, and decompilation/reverse engineering. No part of this document may be
reproduced in any form by any means without prior written authorization of Veritas Technologies
LLC and its licensors, if any.
The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq.
"Commercial Computer Software and Commercial Computer Software Documentation," as
applicable, and any successor regulations, whether delivered by Veritas as on premises or
hosted services. Any use, modification, reproduction release, performance, display or disclosure
of the Licensed Software and Documentation by the U.S. Government shall be solely in
accordance with the terms of this Agreement.
http://www.veritas.com
Technical Support
Technical Support maintains support centers globally. All support services will be delivered
in accordance with your support agreement and the then-current enterprise technical support
policies. For information about our support offerings and how to contact Technical Support,
visit our website:
https://www.veritas.com/support
You can manage your Veritas account information at the following URL:
https://my.veritas.com
If you have questions regarding an existing support agreement, please email the support
agreement administration team for your region as follows:
Japan [email protected]
Documentation
Make sure that you have the current version of the documentation. Each document displays
the date of the last update on page 2. The latest documentation is available on the Veritas
website:
https://sort.veritas.com/documents
Documentation feedback
Your feedback is important to us. Suggest improvements or report errors or omissions to the
documentation. Include the document title, document version, chapter title, and section title
of the text on which you are reporting. Send feedback to:
You can also see documentation information or ask a question on the Veritas community site:
http://www.veritas.com/community/
https://sort.veritas.com/data/support/SORT_Data_Sheet.pdf
Contents
■ Snapshot replication
Task Description
Before you begin ensure that To manage and protect cloud assets in the web UI you
you have the appropriate must have the workload administrator role or similar
permissions. permissions. The NetBackup security administrator can
manage your role permissions at an individual asset level
or at the account or subscription level, or at a cloud
provider level.
Task Description
Add a configuration All the supported cloud providers are displayed in the web
UI.
Choose to protect a virtual For each cloud provider, a list of discovered assets is
machine, application, or volume displayed. Add the assets to a protection plan.
Task Description
Recover cloud assets ■ You can recover the assets using the recovery points.
See “Recovering cloud assets” on page 74.
See “Recovering cloud assets” on page 74.
See “Perform rollback recovery of cloud assets ”
on page 80.
■ You can also restore the assets using the
nbcloudrestore CLI utility.
Note: Do not use the bprestore CLI for restores
See the NetBackup Commands Reference Guide.
■ If you deploy Snapshot Manager using the CloudFormation template, when you
register the on-host agent with the Snapshot Manager node using the command,
the IP address used must be private IP and not public IP.
Task Description
Task Description
Discover assets on Snapshot Manager You can discover assets on the Snapshot
Manager.See “Discover assets on Snapshot
Manager” on page 18.
Note: Following should be the order in which the certificates are uploaded:
Leaf > Intermediate > Root. If the certificates are not uploaded in the correct
order, Snapshot Manager might not work.
The host name or IP address must be the same as the one you have
provided at the time of Snapshot Manager configuration during Snapshot
Manager installation.
■ If the DNS server is configured, enter the FDQN of the Snapshot Manager.
5 In Port field, enter the port number for the Snapshot Manager.
The default port value is 443.
6 Click Validate.
7 In the Validate certificate dialog box, click Accept.
8 Enter the Snapshot Manager credentials that have provided at the time of
Snapshot Manager installation.
9 Click Save.
Note: If NetBackup security level is set to VERY HIGH, an additional field Token
is shown where you can provide a Standard Host Token. This is required for
NetBackup certificates generation on Snapshot Manager. You may need to contact
the security administrator or a backup administrator for requesting the additional
security permissions required for generating the token.
Following parameters are applicable for all the above credential type's
Microsoft Azure Stack Hub Using AAD: The endpoint URL in the following
format, that allows Snapshot Manager
Azure Stack Hub Resource Manager
to connect with your Azure resources.
endpoint URL
https://management.<location>.<FQDN>
Amazon AWS Access Key The access key ID, when specified
with the secret access key, authorizes
Note: If the Snapshot Manager is
Snapshot Manager to interact with the
configured with IAM Config, the
AWS APIs.
Access Key and Secret Key options
are not available. Secret Key The secret key of the application.
Google Cloud Platform Project ID The ID of the project from which the
resources are managed. Listed as in
the project_id JSON file.
■ After you upgrade NetBackup and Snapshot Manager to the latest version, you
need to update the credentials. Run the following command:
tpconfig -update -snapshot_manager <snapshot manager host>
-snapshot_manager_user_id <snapshot manager user ID>
-manage_workload <workload type> -security_token <security token>
Note: Post upgrade, credentials are updated to support only IAM role.
Managing and protecting cloud assets 18
Configure Snapshot Manager's in NetBackup
one hour. If you disable a Snapshot Manager, all the assets associated with that
server are no longer protected or synced with NetBackup.
You can also manually trigger the cloud asset discovery if required, using the
Discover option for individual cloud provider configurations, or you can trigger a
discovery on a Snapshot Manager to fetch the assets data available on the Snapshot
Manager.
After the first full discovery, NetBackup subsequently performs periodic incremental
discovery of assets for the configured Snapshot Manager. It only detects the
changes, such as addition, removal, or modification of assets, that occurred between
the last and current discovery.
Note: For the accurate incremental discovery, ensure that the time is set correctly
on the NetBackup master server and the Snapshot Manager, according to the
time-zones they are located in, to avoid any issues with the discovery.
Note: If the discovery on cloud provider configurations takes more than 30 minutes,
the discovery operation times out. But the subsequent operation continues which
syncs the NetBackup assets with the Snapshot Manager assets.
Note: After disabling a Snapshot Manager protection for the associated assets will
start failing for that server. In that case, unsubscribe the assets from the protection
plans or cancel any pending SLP operations to avoid seeing job failures during the
time it is disabled.
Note: You can create, update, or delete the intelligent groups only if your role has
the necessary RBAC permissions for the cloud assets that you require to manage.
The NetBackup security administrator can grant you access for an asset type (VM,
PaaS, application, volume, network) associated with a specific account or
subscription, or at a cloud provider level. Refer to the NetBackup Web UI
Administrator's Guide.
Note: If region is not specified, then the cloud intelligent group protects assets
across region.
7 To add a condition, use the drop-downs to select a keyword and operator and
then enter a value.
See the section called “Query options for creating intelligent cloud groups”
on page 24.
To change the effect of the query, click + Condition and click AND or OR,
then select the keyword, operator, and value for the condition. For example:
This example uses AND to narrow the scope of the query: It selects only the
VMs that have cp in their display name and that also have a tag name as eng,
and are in running state.
Note: Special character '<' is not supported in a tag name. If present, asset
group creation will fail.
Note: Known limitation in NetBackup - if you create a query that has the
asset tag names (referenced from your cloud provider) containing spaces or
special characters such as (,), &, \, /, ", [, ], {, }, you cannot later
edit the query for editing any parameters. This does not prevent you from
successfully creating the intelligent group and applying the protection plan to
it. Only the Edit query functionality is affected with this limitation.
To avoid this issue, ensure that the tag names do not contain the specified
special characters and create a new query with the new tag names.
You can also add sub-queries to a condition. Click + Sub-query and click AND
or OR, then select the keyword, operator, and value for the sub-query condition.
Managing and protecting cloud assets 24
Managing intelligent cloud groups
Note: When using queries in Intelligent groups, the NetBackup web UI might
not display an accurate list of assets that match the query if the query condition
has non-English characters.
Using the not equals filter condition on any attribute returns assets including
those that have no value (null) present for the attribute. For multi-value attributes
such as tag, the assets that do not match at least one of the values of the
attribute are not returned
Note: When you click Preview or you save the group, the query options are
treated as case-sensitive when the assets are selected for the group. Under
Virtual machines, if you click on a VM that was not selected for the group,
the Intelligent groups field reads none.
Note: The attribute values may not match exactly with values shown on the cloud
provider's portal. You can refer to the asset details page or the cloud provider's API
response of an individual asset.
Keyword Description
Keyword Description
Operator Description
Note: Once you create an intelligent group, you cannot edit the cloud provider
selection for it, but you can edit the name and description, and modify the query as
required.
Note: If you previously had a protection plan that was applied to assets from different
cloud providers, it is automatically converted to the new provider-specific format.
This conversion happens after an upgrade to NetBackup 9.1. For example, if you
had the assets from Google Cloud and AWS Cloud that are subscribed to one
protection plan, then the protection plan is split. The protection plan is split into two
separate protection plans for each provider.
See the section called “Conversion of protection plans after an upgrade to NetBackup
9.1” on page 27. section.
Note: The RBAC role that is assigned to you must give you access to the assets
that you want to manage and to the protection plans that you want to use.
5 Click Protect.
Managing and protecting cloud assets 27
Protecting cloud assets or intelligent cloud groups
providers are subscribed to them. New plans are named in the following
format <old_plan_name>_<cloud_provider>.
■ Hence you may see more number of plans in your Protection Plans menu
on the web UI than before.
■ Success messages are shown in the notifications as follows:
The protection plan <protectionPlanName> created during conversion to
new format.
Successfully converted the protection plan <protectionPlanName> to the
new format.
Then you can start managing and applying the converted protection plans
as normal.
Failure scenarios
Refer to the following to know how the failure scenarios are handled during or after
the conversion of protection plans. Also check the notifications for any failure alerts
and take the necessary action.
■ Some of the assets might fail to get unsubscribed from the old protection plan.
In that case, the conversion still continues with the assets that are successfully
unsubscribed. The conversion process for the assets that failed, is retried every
4 hours.
■ After the conversion, some of the assets might fail to get automatically
re-subscribed to the new plan. In that case, you need to manually subscribe
those assets to the converted protection plan.
■ Failure might be encountered when the required access permissions are
assigned to the new, converted protection plan. In that case, you need to
manually assign the access permissions.
nbsetconfig>
User can also manually run the POST query using the cleanup-assets named
query with the following request body and then run GET with query ID obtained
from the POST response, as described in the following example:
{
"data":{
"type":"query",
"attributes":{
"queryName":"cleanup-assets",
"workloads":["cloud"],
"parameters": {
"cleanup_age_minutes": 180
},
"filter": "provider eq 'aws'"
}
}
}
Parameter Description
5 To select only the assets that meet specific conditions, create your own query:
Click + condition.
6 To add a condition, use the drop-downs to select a keyword and operator and
then enter a value.
See the section called “Query options for creating intelligent cloud groups”
on page 24.
To change the effect of the query, click + Condition and click AND or OR,
then select the keyword, operator, and value for the condition. For example:
This example uses AND to narrow the scope of the query: It selects only the
assets that have aws in their display name and that also have a Name as
cloudpoint, and are in running state.
You can also add sub-queries to a condition. Click + Sub-query and click AND
or OR, then select the keyword, operator, and value for the sub-query condition.
Note: The attribute values may not match exactly with values shown on the cloud
provider's portal. You can refer to the asset details page or the cloud provider's API
response of an individual asset.
Keyword Description
Keyword Description
Snapshot Manager The instance of Snapshot Manager with which the asset
is registered.
Operator Description
Starts with Matches the value when it occurs at the start of a string.
Ends with Matches the value when it occurs at the end of a string.
Contains Matches the value you enter wherever that value occurs
in the string.
!= Matches any value that is not equal to the value that you
enter.
Managing and protecting cloud assets 33
AWS and Azure government cloud support
For information about configuring AWS and Microsoft Azure, See “Add a cloud
provider for a Snapshot Manager” on page 14.
https://docs.microsoft.com/en-us/azure/azure-resource-manager/
management/manage-resource-groups-portal
Snapshot Manager creates a snapshot and places the snapshot in resource group
to which the resource belongs even under the following conditions:
■ If you don’t provide a prefix for a resource group
■ Peer resource groups are not created
■ You allow the snapshots to get created
You can configure the settings to place the snapshots in different resource group
than the resource group that is associated with the resource. However, note the
following important points:
■ The peer resource group must be in the same region as the region of the
resource group of the resource.
■ If a peer resource group is not found, the configurations determine whether the
snapshots creation succeeds or fails.
To enable this feature, you must create peer resource groups. Snapshot Manager
then appends the prefix of the resource group that is associated with the resource.
When a snapshot is created, the peer resource group name is derived based on
the prefix and the resource group to which the resource is associated.
Note: You can now directly associate a snapshot to an existing peer resource
group, at the time of creating a protection plan. However the functionality of defining
a peer resource group by specifying a prefix which is described in this section, still
exists.
Refer to information on creating protection plans in the NetBackup Web UI
Administrator’s Guide for the complete procedure.
■ You cannot use characters that Azure configuration does not allow for resource
group naming conventions.
■ OS and all disks are in the ■ Resource Group Prefix Snapshots are created in the
same resource group. value is provided. peer resource group.
■ Peer resource group is ■ The Protect assets even
named correctly. if prefixed Resource
■ Peer resource is located Groups are not found
in the same region as check box is selected.
resource group of
resource.
■ OS and all disks are in ■ Resource Group Prefix Snapshots are created in the
separate resource groups. value is provided. peer resource group.
■ Peer resource groups are ■ The Protect assets even
named correctly. if prefixed Resource
■ Peer resources are Groups are not found
located in the same region check box is selected.
as resource groups of
resources.
■ OS and all disks are in the ■ Resource Group Prefix The snapshots are created in
same resource group. value is provided. original resource group not
■ Peer resource group is ■ The Protect assets even the peer resource group.
created in a different if prefixed Resource
region from the resource Groups are not found
group of the resource. check box is selected.
■ OS and all disks are in the ■ Resource Group Prefix The snapshots are created in
same resource group. value is provided. original resource group not
■ Peer resource group is not ■ The Protect assets even the peer resource group.
created. if prefixed Resource
Groups are not found
check box is selected.
Managing and protecting cloud assets 37
About protecting Microsoft Azure resources using resource groups
■ OS and all disks are in ■ Resource Group Prefix Snapshots are created in the
separate resource groups, value is provided. peer resource group of RG1
RG1 and RG2. ■ The Protect assets even and original resource group
■ Peer resource groups if prefixed Resource RG2.
RG1 is named correctly Groups are not found
and located in the same check box is selected.
region as the resources.
■ Peer resources group
RG2 is not created.
■ OS and all disks are in ■ Resource Group Prefix Snapshots are not created
same resource group. value is provided. and the job fails.
■ Peer resource groups are ■ The Protect assets even
named correctly. if prefixed Resource
■ Peer resources group is Groups are not found
located different region check box is not selected.
than the resource group
of resources.
■ OS and all disks are in the ■ Resource Group Prefix Snapshots are not created
same resource group. value is provided. and the job fails.
■ Peer resource group is not ■ The Protect assets even
created. if prefixed Resource
Groups are not found
check box is not selected.
■ OS and all disks are in ■ Resource Group Prefix Snapshots are not created
separate resource groups, value is provided. and the job fails.
RG1 and RG2. ■ The Protect assets even
■ Peer resource groups of if prefixed Resource
RG1 and RG2 that is, Groups are not found
snapRG1 and snapRG2 check box is not selected.
are in different regions.
■ Peer resource group
snapRG1 is located in the
same region as the
resource group RG1.
■ The peer resource group
snapRG2 is located in a
different region than
resource group RG2.
Managing and protecting cloud assets 38
About the NetBackup Accelerator for cloud workloads
Note: Accelerator is most appropriate for virtual machine data that does not
experience a high rate of change.
You can obtain the policy name from web UI from the relevant protection plan.
..
When subsequent backups of the virtual machine use Accelerator, the following
messages appear in the job details log:
..
This message is a key trace for Accelerator. In this example Accelerator was
successful at reducing the backup data by 99.7%.
4 (For Azure SQL PaaS assets only.) If you have selected Protect PaaS assets
only for the protection plan, select Backup type as Incremental backup or
Full. For incremental backup type, NetBackup taken an initial full backup, and
all subsequent backups capture only incremental changes in the database.
This feature increases backup performance to a great extent. In case of a
schema change, goes back to full backup from incremental backup, and notifies
this activity in the activity monitor.
Assign a longer retention period to full backups than to incremental backups
within a policy. A complete restore requires the previous full backup plus all
subsequent incremental backups. It may not be possible to restore all the files
if the full backup expires before the incremental backups. See “About
incremental backup for PaaS workloads” on page 62.
5 From the Recurrence drop-down, specify the frequency of the backup.
6 In the Snapshot and backup options, do any of the following:
■ Select Keep snapshot along with backup option to retain both the
snapshot and the backup. Specify retention period for both the snapshot
and the backup, using the Keep snapshot for and the Keep backup for
drop-downs. Select Full from the Backup type drop-down. Select Initiate
backup only when the snapshot is about to expire option, to start the
backup job just before the retained snapshot expires.
■ Select Keep snapshot only option, to retain only the snapshot. Specify
retention period for the snapshot using the Keep snapshot for drop-down.
■ (Optional) If you have selected provider as Amazon AWS, and selected
to retain the snapshot by selecting any of the above two options, you
can configure snapshot replication at this point. For more information
about cloud snapshot replication, See “Configure AWS snapshot
replication” on page 47.
■ Select Enable Snapshot replication.
■ In the table, select Region, AWS Account, and Retention period for
the replicated snapshots.
■ Select Keep backup only option, to retain only the backup. The snapshot
expires immediately after the backup. Specify retention period for the backup
using the Keep backup for drop-down. Select Full from the Backup type
drop-down.
Managing and protecting cloud assets 43
Configuring backup schedule for cloud workloads
7 Continue creating the schedule in the Start window tab, as described in the
Managing protection plans section of the NetBackup Web UI Administrator’s
Guide.
Note: If the VM is not in connected state, then the VM backup continues and the
backup job is marked as partially successful. In this case, you cannot restore
individual files or folders as the indexing is not available when the VM is not
connected.
Managing and protecting cloud assets 44
Backup options for cloud workloads
If you have selected the cloud provider as Microsoft Azure or Azure Stack Hub
while creating a protection plan, you can select Specify snapshot destination
resource group to associate snapshots to a particular peer resource group within
the same region in which the asset exists. Then select a configuration, subscription,
and a resource group for a snapshot destination.
The snapshot is stored in one of the destination resource groups, in the following
preference:
■ A destination resource group specified in the protection plan
■ A pre-fixed resource group specified in the plugin configuration (for Azure only)
■ A resource group in which the asset exists, if no destination or pre-fixed resource
group is specified in NetBackup.
exclude either all the non-boot disks, or the disks that have specific tags associated
with them in the corresponding cloud provider account.
Note: A protection plan that has disk exclusion option enabled can be applied only
to the cloud VM type assets and VM intelligent groups.
Then while restoring the VMs from the Recovery Points tab, refer to the Includes
disks column to view the list of disks that are included or excluded in the backup
image.
Refer to the information on creating a protection plan in the NetBackup Web UI
Administrator’s Guide for the complete procedure.
Notes:
■ In case of LVM, if disks are excluded partially then system might not boot up
properly.
■ In case there is a non supported file system configured on a disk and user wants
to exclude that disk from snapshot, the snapshot would continue to be crash
consistent snapshot as the disk containing non supported file system is excluded.
■ If the user wants to exclude the disk, he/she should have the nofail flag attached
to the data disk prior to taking a snapshot in the /etc/fstab file. This is required
if the user reboot the instance without this volume attached (for example, after
moving the volume to another instance), the nofail mount option enables the
instance to boot even if there are errors mounting the volume. For more
information, refer to the following example entry in the /etc/fstab file:
For example,UUID=aebf131c-6957-451e-8d34-ec978d9581ae /data xfs
defaults,nofail 0 2
■ The user should ensure that assets are properly discovered once there has
been any change in their tags from the cloud provider. Once the policy run is
scheduled for an asset, the disks are excluded as per the discovered data only.
Managing and protecting cloud assets 47
Snapshot replication
If, the user attaches a tag while the snapshot is in progress, that tag would not
be considered as a part of exclusion. Once discovery is completed, it will be
considered during next protection cycle.
■ In case of OS with non-English locale, if user opts tag based exclusion in
protection plan and disk tag has non-English character, even then disk exclusion
works as expected. But in some cases tag with non-English character is not
correctly captured in job(try) logs and audit logs although there is no functionality
impact as disk exclusion is considered correctly.
Snapshot replication
Replicating a snapshot means saving a copy of the snapshot to another location.
In AWS, another location can be one of the following:
■ different region within the same account.
■ same region in a different account.
■ different region within different account.
For example, an AWS cloud administrator have their assets in the region X. The
snapshots of those assets will also be stored in X region. However, you can also
replicate the snapshots to the Y region within same account or X/Y region in a
different account, for an added level of protection. In NBU Snapshot Manager
terminology, the original location (X) is the replication source, and the location where
snapshots are replicated (Y) is the replication destination.
Replication is performed in three steps. This mechanism is handled internally and
the entire process is completely transparent to the user.
■ Share the snapshot, only if replicating to a cross account. For more information,
see the Share a snapshot section of the AWS documentation.
■ Copy the snapshot. For more information, see the CopySnapshot section of the
AWS documentation.
■ Unshare the snapshot, only if replicating to a cross account.
■ DescribeKey and ReEncrypt on the KMS key that is used to encrypt the
original snapshot.
For cross-account replication, the AWS IAM user or role associated with the
snapshot replication target region's AWS account (target AWS account) must
have the following permissions:
■ CreateGrant, DescribeKey, and Decrypt on the KMS key that is used to
encrypt the original snapshot.
■ CreateGrant, Encrypt, Decrypt, DescribeKey, and
GenerateDataKeyWithoutPlainText on the KMS encryption key used while
performing the CopySnapshot operation on the original snapshot.
You can choose to replicate snapshots for AWS cloud assets from the primary
location to a remote or a secondary location. The Snapshot Manager's support
cross-region and cross account replication. With snapshot replication you can
achieve the following:
■ Maintain a copy of cloud assets at a different destination for long-term retention
and auditing requirements.
■ Recover cloud assets from the replicated copies from another region in case
there is a region outage.
■ Recover cloud assets from the replicated copies from another account in case
the user account is compromised.
Managing and protecting cloud assets 49
Configure AWS snapshot replication
Configuration
Review the following information to configure snapshot replication:
■ You can configure snapshot replication when you create a protection plan. See
the NetBackup™ Web UI Administrator's Guide.
■ For cross account replication, you need to establish a trust relationship between
the source and the target account. For more details, refer to the Across AWS
Accounts Using IAM Roles related information in the Amazon Web Services
documentation.
Considerations
Consider the following when you configure cloud snapshot replication:
■ Even if multiple schedules are configured, the replication destination region that
is configured is applied to all the schedules.
■ Cloud snapshot replication is supported only for Amazon cloud providers.
snapshot replications to a single destination region. For example, RDS has a limit
for 5, EBS has a limit for 5, and EC2 has a limit for 50. For more details refer to
Copy Snapshot related information in the Amazon Web Services documentation.
In NetBackup this limit is defined using the following parameter in the bp.conf file:
MAX_CLOUD_SNAPSHOT_REPLICATION_JOBS_PER_DESTINATION
Note: You cannot restore single files or folders from a replica that was discovered
by an alternate Snapshot Manager in a failed over region.
Managing and protecting cloud assets 51
Using AWS snapshot replication
5 Add appropriate security group to the restored VMs to enable remote access.
6 Uninstall and reinstall the Snapshot Manager agent from the restored VMs,
and then register the Snapshot Manager agents with the new CP2 server.
7 Run a deep discovery from the AWS provider console.
8 Create new protection plan to protect the restored VMs. Trigger a
snapshot-based backup.
8 Uninstall and reinstall the Snapshot Manager agents from the restored VMs,
and then register Snapshot Manager agents with the CP1 server.
9 Run a deep discovery from the AWS console.
10 Use the existing protection plan to protect newly restored VMs.
Table 1-10 Support matrix for different account same region replication
Table 1-11 Support matrix for different account different region replication
Table 1-11 Support matrix for different account different region replication
(continued)
2 Select the virtual machine where the application is hosted. On the top right,
click Configure application.
3 After the process is complete, the application status is updated to configured.
4 The applications are displayed under the Applications tab after the next
discovery.
5 Apply the protection plan. See the NetBackup Web UI Administrator's Guide.
To edit or update virtual machine credentials
1 Go to the Virtual Machines tab.
2 Select the virtual machines for which you want to update credentials. On the
top right, click Manage credentials.
3 Update the credentials.
To edit or update application configuration
1 Go to the Applications tab.
2 Select the application for which you want to update. On the top right, click Edit
configuration
3 Update the credentials and click Configure.
Applications tab displays the RDS assets, whereas the PaaS tab displays the
non-RDS assets. You can view, protect, and recover PaaS assets from these two
tabs.
Microsoft Azure PostgreSQL, SQL Managed Instance, SQL, MariaDB, and MySQL.
AWS RDS SQL, RDS PostgreSQL, RDS MySQL, RDS MariaDB, RDS
Aurora MySQL, RDS Aurora PostgreSQL, and DynamoDB.
GCP Cloud SQL for PostgreSQL and Cloud SQL for MySQL
Supported platforms
This section details the supported platforms for primary and media servers.
Managing and protecting cloud assets 57
Protecting PaaS assets
Media RHEL
Supported ports
Here are the supported ports for different PaaS databases.
AWS DynamoDB NA
Note: If any of these packages are already installed in the media server(s), remove
the packages to avoid conflict with the newer versions of the packages that you
install.
Managing and protecting cloud assets 59
Protecting PaaS assets
Note: Avoid using MySQL client utility 8.0.32 version as there is bug reported by
MySQL.
Download https://docs.microsoft.com/en-us/sql/tools/
locations /sqlpackage-download?view=sql-server-ver15
https://packages.microsoft.com/rhel/7/prod/msodbcsql17-17.10.2.1-1.x86_64.rpm
https://packages.microsoft.com/rhel/7/
prod/unixODBC-2.3.7-1.rh.x86_64.rpm
2 mkdir sqlpackage
6 source ~/.bashrc
7 sqlpackage
■ If the Defaultvers is nfs4, mount the backup and restore ushare path
without the nolock option.
■ If the Defaultvers value is nfs3, then mount the backup and restore ushare
path with the option nolock For example: mount <ushare mount path>
<ushare export path> -o nolock
■ If the Defaultvers value is nfs4, then mount the v4 version of backup and
restore ushare path without the nolock option.
RHEL 9 https://download.postgresql.org/pub/repos/yum/14/redhat/rhel-9-x86_64/
■ setsebool -P httpd_can_network_connect 1
Managing and protecting cloud assets 62
Protecting PaaS assets
4 Ensure that any mount points does not directly mount the /mnt folder on the
storage server. Mount the mount points to its subfolders only.
5 Enable the logrotate permission in selinux using the following command:
semanage permissive -a logrotate_t
■ Supports only default the ports for all the databases across providers. Workload
instances configured with the custom ports are not supported.
■ Database names containing the characters '#' and '/' are not supported for
backup and restore operations. Also, the database name should adhere to
naming conventions suggested by the cloud vendors.
■ Backup and restore of a database with multi-byte or non-English characters are
not supported for a primary server running Windows and having back-level
media server with a version less than 10.1.1.
■ You can duplicate the PaaS backup image to a supported storage server. But
before you start a restore, you need to duplicate the image, back to an MSDP
server with universal share enabled. See “Recovering duplicate images from
AdvancedDisk” on page 86.
■ With NetBackup 10.2, you can perform backup and restore of supported Azure
PaaS databases with Managed Identity based database authentication. This is
not supported for Azure Database for MariaDB server. This feature requires at
least one media server of version 10.2 or higher.
■ For authentication of Azure database, It is recommended to use User Assigned
managed identity to work across all media servers. Using a database user
created with a system-assigned managed identity, associated with the media
server or vm-scale-set (AKS/EKS), does not work with any other media server
or media in any other vm-scale set (AKS/EKS).
For PostgreSQL
■ Restore of security privileges is not supported.
■ During restore you can use –no-owner and –no-privileges option. After restore,
the metadata captured at the time of backup, are shown as owner/ACL in the
progress log restore activity on web UI.
■ Restore does not fail, if the owner/role does not exist on the destination.
■ Post restore, the database has the role associated according to the credentials
provided in NetBackup against the destination instance.
■ Users need to modify the ownership of databases post restore.
■ Backup and restore are not supported if the only SSL (Secure Sockets Layer)
connection is enforced at the server level for GCP PostgreSQL workload.
■ Azure Postgres database restore from single to flexible server or vice versa is
not supported because of the cloud provider limitations.
■ Following characters are not supported in database name in restore workflow:
&, (, ), <, >, \, |, /, ;, `, ‘, and “.
Managing and protecting cloud assets 64
Protecting PaaS assets
■ Uppercase username is not supported for new users added after PostgreSQL
server creation.
For MySQL
■ Restore operation require superuser privileges if the dump file contains CREATE
DEFINER statement for backups taken on version lower than 10.2.
■ Backup taken on version 10.2 or higher cannot be restored using version lower
than 10.2.
■ Backup and restore are not supported if the only SSL connection is enforced at
the server level for GCP MySQL workload.
■ You can restore MySQL database to an alternate instance with another MySQL
version than the backup instance, depending on MySQL's version compatibility.
Note: If you change the Snapshot Manager cloud plug-in configuration from Azure
service principal to Azure managed identity, the status of the previously discovered
PaaS assets are displayed deleted. NetBackup Snapshot Manager removes the
deleted assets every 24 hours, if you want to perform backup or recovery before
the scheduled cleanup, contact Veritas Technical Support.
Note: When you create and delete a PaaS asset with same name in intervals, and
if the PaaS asset is deleted after discovery, web UI shows old data until the next
periodic discovery runs.
Managing and protecting cloud assets 67
Protecting PaaS assets
You can add existing credentials or create new credentials for the database:
■ To select an exiting credential for the account, select the Select from
existing credentials option, select the required credential from the table
below, and click Next.
■ To add a new credential for the account, select Add credentials, and click
Next. Enter a Credential name, Tag, and Description for the new
credential. Under Service credentials:
■ Select Role based database authentication (Applicable for supported
database service) to use AWS IAM, Azure System Managed and User
Managed authentication.
■ Select IAM database authentication (Applicable for Amazon RDS
only) for Amazon RDS assets only, and specify a Database user
name.
See “Creating an IAM database username” on page 69.
■ Add a role that you want to have access to the credential. To add new
permissions to a role:
■ Click Add.
■ Select a role.
Managing and protecting cloud assets 69
Protecting PaaS assets
■ Select the credential permissions that you want the role to have.
■ Click Save.
3 Attach the RDS policy to the IAM role attached to the NetBackup media server.
■ Go to Settings > Azure Active Directory > Set admin. Search and set
system-assigned or user-assigned managed identity, and save.
■ Provide login permission for that user on the SQL Server, run
Note: You must create users for all media servers communicating with the
database using the system-assigned managed identity.
Note: To restore database, you must configure the managed identity user as
AAD admin on the target server.
For MySQL
■ To configure the AAD admin for MySQL server to create user, go to Settings >
Active Directory admin > Set admin. Pick the active directory user, and save.
■ Get the client ID for managed identity using Azure CLI, run
■ Login using the AAD admin user and access token, run:
Managing and protecting cloud assets 71
Protecting PaaS assets
■ Create the manage identity user and grant the permissions, run:
For PostgreSQL
■ To configure the AAD admin for PostgreSQL server to create user, go to Settings
> Active Directory admin > Set admin. Pick the active directory user, and save.
■ Get client ID for the managed identity:
# export PGPASSWORD=<token>
■ Login using the AAD admin user and the access token, run:
Note: Only user managed identity is supported for MySQL Flexible Server. Managed
Identity support is not available for PostgreSQL Flexible Server.
Note: You can see and protect the user-created databases. The system
databases are not shown and protected, as these databases need the cloud
provider's superuser privilege to perform backup and restore.
Note: For incremental backup of Azure SQL databases, NetBackup performs a full
backup even if the asset is protected by a protection plan with backup type a
differential incremental.
Chapter 2
Recovering cloud assets
This chapter includes the following topics:
Table 2-1 Supported parameters for Azure, Azure Stack, GCP, and AWS
snapshot and backup copies
Change VM Y Y Y Y Y Y
display name
Change power Y Y Y Y Y Y
state of the VM
Remove tag Y Y Y Y Y Y
associations
Restore to a Y Y Y Y Y Y
different
network
Subscription Y Y Y
ID
Change Y Y Y Y
resource
group
Change region Y Y Y
of the VM
Change Y Y
provider
configuration
Recovering cloud assets 76
Recovering cloud assets
Table 2-1 Supported parameters for Azure, Azure Stack, GCP, and AWS
snapshot and backup copies (continued)
Change Y Y Y Y
resource
group for
disks
Zone Y Y Y Y
Security Y Y Y Y Y Y
group/Firewall
rule/Network
security group
Note: Except in AWS workloads, the following special characters are not
allowed in the display name: ` ~ ! @ # $ % ^ & * ( ) = + _ [ ] { } \\ | ; : ' \" , <
> / ?."
If you restore a snapshot copy, specify only the Resource group and the
Display name.
8 Click Next.
9 In the Recovery options page:
■ If you restore a backup copy, to restore to a different zone, select a Zone.
To select a network available in that zone, click the search icon near
Network configuration, and select a target network for recovery.
User can also select Security group / Network security group / Firewall
rule for AWS, Azure, and GCP cloud providers respectively.
■ (Only for GCP) If you restore a snapshot copy, to restore to a different
region, select a Region. To select a network available in that zone, click
the search icon in Network configuration, and select a target network for
recovery. The list shows networks available in that zone.
■ If you restore a snapshot copy, to restore to a different zone, select a Zone.
To select a network available in that zone, click the search icon in Network
configuration, and select a target network for recovery. The list shows
networks available in that zone.
User can also select Security group / Network security group / Firewall
rule for AWS, Azure, and GCP cloud providers respectively.
Note: If you do not select the Remove tag associations option, any tag
value for assets should not have spaces, before and after a comma. After
the restoration of an asset, the spaces before and after any comma in the
tag values are removed. For example, the value for the tag
name:created_on: Fri, 02-Apr-2021 07:54:59 PM , EDT, is converted to:
Fri,02-Apr-2021 07:54:59 PM,EDT. You can manually edit the tag values
to reinstate the spaces.
Note: Selection of None for zone means VM will not be placed in any zone
and selection of None for Network security group/Security group/Firewall
rule means that no security rules are applied to the restored VM.
10 Click Next. The pre-recovery check begins. This stage validates all the recovery
parameters and displays errors, if any. You can fix the errors before starting
the recovery.
11 Click Start recovery.
The Restore activity tab shows the job progress.
For information on the recovery status codes, see the NetBackup administrator or
the NetBackup Status Codes Reference Guide, available here:
http://www.veritas.com/docs/000003214
Scenario Handling
Restoring a volume from the During restore, the disk is attached in the read/write
snapshot of an attached read-only mode to the original or alternate location.
disk, from the Volumes tab under
Cloud workload.
Recovering cloud assets 80
Perform rollback recovery of cloud assets
Scenario Handling
Restoring a VM, with a read-only During restore of such a VM to its original or alternate
disk, from a crash-consistent location, a read-only disk is restored in a read/write
snapshot, from the Virtual mode.
machines tab under Cloud
workloads.
Restoring a VM with a read-only You can attach a read-only disk to multiple VMs, but
disk, from an app-consistent NetBackup discovers it under only one VM.
snapshot, from the Virtual
For a Windows VM, the snapshot fails with a VSS error,
machine tab under Cloud
similar to the following:
workload.
Failure: flexsnap.GenericError: Failed to take
snapshot (error: Failed to create VSS snapshot of
the selected volumes.)"
Note: Snapshot replicas do not support rollback. Also, Azure Stack and GCP
workloads does not support rollback restore.
Recovering cloud assets 81
Recovering PaaS assets
Note: For MySQL restore, if you do not have admin or root user privileges, then
you must have view permission, along with the restore permissions.
Before proceeding make sure that you have the required permissions to restore
PaaS assets.
To recover point in time backup assets:
1 On the left, click Cloud.
2 Click the PaaS tab.
All the discovered PaaS assets are displayed.
3 Under Recovery points type, select Provider protected.
4 Click Restore in the row of the protected Azure SQL database and Azure SQL
managed database asset that you want to recover.
5 In the Recovery points tab, under Point in time backup, click Restore.
6 Select a date and time under Restore point (UTC). You can select any restore
point, between the earliest restore point, and the:
■ Latest backup time for online databases.
■ Database deletion time for deleted databases.
Microsoft Azure may round off the selected time to the nearest available
recovery point, using UTC time.
The default restore date and time displayed in web UI may differ based on the
selected PaaS asset. For example, for Azure SQL databases, the default
restore time is the current time, and for Azure SQL managed database, the
default restore time is 6 minutes earlier than the current time.
7 Optionally, for Azure SQL databases, enter a name for the restored database
in the Database name field. Database names cannot have special characters
like < > * % & : \ / and ? or control characters. Do not end the name with a
period or space. For more information about Azure resource naming rules, see
https://docs.microsoft.com/en-us/azure/azure-resource-manager
/management/resource-name-rules#microsoftsql
If you do not enter a name, NetBackup automatically assigns a name in the
<dbName>_<Restored time in UTC> format.
Recovering cloud assets 85
Recovering PaaS assets
8 Optionally, for Azure SQL managed databases, enter the instance name in the
Managed instance field. By default, the instance name of the recovery point
is displayed. You can also search for the managed instance name using the
search option. You can restore to the same region to which your subscription
belongs.
If you cannot see the desired managed instance in the search results, perform
a manual discovery. Also, ensure that you have RBAC access to the managed
instance.
9 Click Next. Once the Pre-recovery check is complete, click Start recovery.
You can check the status of the job in the activity monitor.
To recover long-term retention backup assets:
1 On the left, click Cloud.
2 Click the PaaS tab.
All the discovered PaaS assets are displayed.
3 Click Restore in the row of the protected asset that you want recover.
4 In the Recovery points tab, under Long term retention backup, click Restore
against the image that you want to restore.
5 Optionally, for Azure SQL databases, enter a name for the restored database
in the Database name field. Database names cannot have special characters
like < > * %& : \ / and ? or control characters. Do not end the name with a period
or space. For more information about Azure resource naming rules, see
https://docs.microsoft.com/en-us/azure/azure-resource-manager
/management/resource-name-rules#microsoftsql
If you do not enter a name, NetBackup automatically assigns a name in the
restore_<dbName> format.
6 Optionally, for Azure SQL managed databases, enter the instance name in the
Managed instance field. By default, the instance name of the recovery point
is displayed. You can also search for the managed instance name using the
search option. You can restore to the same region to which your subscription
belongs.
7 Click Next. Once the Pre-recovery check is complete, click Start recovery.
You can check the status of the job in the activity monitor.
Note: Tags from portal as well as Snapshot Manager are not restored. However,
the "createdby: cloudpoint" tag is created while restoring through NetBackup.
Recovering cloud assets 86
Recovering PaaS assets
Note: For provider protected recovery jobs, any intermittent failures keep the
recovery job running until the next schedule job cleanup runs.
Note: To duplicate from a second copy, click search again after selecting
duplicate option in catalog view.
2 Once the duplication job completes, ensure that the new recovery point is
visible for the given asset in web UI.
To start a restore job, See “Recovering PaaS assets” on page 81.
To restore using REST API, see section:
recovery/workloads/cloud/scenarios/asset/recover. Refer to NetBackup API
documentation.
Note: For RDS instance recovery, NetBackup does not display any error or warning
messages, if you initiate the restore from a backup image residing on AdvancedDisk
storage.
Chapter 3
Performing granular
restore
This chapter includes the following topics:
■ Troubleshooting
The following table helps you understand the flow of enabling granular restore of
volumes, files, and folders:
Task Description
Connect virtual machines Connect the virtual machines that you want
to use to perform granular restore.
Subscribe discovered assets to the protection Add the assets on the VMs connected in the
plan previous step to the protection plan that has
the indexable attribute enabled granular
restore.
Execute protection plan Schedule backup job and indexing or use the
Backup now option. The backup job starts
immediately.
Application Version
NetBackup 10.2
Application Version
Snapshot Manager agent host to be protected ■ Linux OS: RHEL 7.x and RHEL 8.2, 8.4
and 8.5
■ Windows OS Version: 2012 R2, 2016,
2019 and 2022
Note: Application consistent snapshot is not supported for ext2 file system version.
■ The host must be in a connected state and must have required supported
configuration.
■ The host must have the fsConsistent and indexable flags enabled when
connected. The indexable flag is applicable for a snapshot-only protection plan
schedule.
■ Protection plan must have the Enable Granular restore for files and folders
check box enabled.
Performing granular restore 91
Before you begin
■ Apart from the boot disk and disk that is mounted on "/cloudpoint", no extra disk
should be attached to Snapshot Manager instance explicitly.
■ File systems on the host must be supported.
See “List of supported file systems” on page 89.
■ Configure port 5671 and 443 for open Snapshot Manager host.
■ For agentless restore, in Linux systems, configure the port 22 on the indexable
virtual machines. For Windows platform, configure the ports 135, 445 and the
dynamic/fixed WMI-IN port on the indexable virtual machines.
■ Ensure that the following points are addressed before you perform the single
file restore from backup of snapshot:
■ Supported NetBackup and Snapshot Manager version 10.2 onwards.
■ Granular restore will work only if backup image is restored from MSDP
storage server (version must be 10.2 onwards) with instant access enabled.
■ Target host agent must be upgraded to the latest version.
■ On Windows target host, administrator must have attach and detach policy
enabled for disks. For more information, refer to AttachVirtualDisk function.
■ (For Windows) To restore symlink, agent must be configured using the
required access.
■ Backup must be taken with Granular File and Restore option selected.
■ Target virtual machine must have access to MSDP storage server over the
access to NFS/SMB.
■ Windows target must have the following:
■ ( For restoring window image content with Restoring Access Control list)
Samba user credentials must be stored in windows credential manager
for a MSDP storage server (which is exporting the Instant access share):
On MSDP server, run the smbpasswd -a <username> command to
generate the Samba credentials.
Add DNS name or IP of MSDP server, with above username and
generated password to windows credential manager.
The smbpasswd command will fail if user is not present on MSDP server.
Hence first add user using the useradd <username> command and then
use the smbpasswd command.
■ (For restoring Linux image content) NFS client must be installed.
For more information on how to enable SMB/IA on MSDP, refer to the
NetBackup™ Deduplication Guide.
Performing granular restore 92
Limitations and considerations
Note: For Microsoft Azure, Google Cloud Platform, and Amazon AWS NetBackup
supports snapshot and recovery of cloud assets that are encrypted using the keys
that the manager provides.
Troubleshooting
Troubleshooting snapshot restore process for Microsoft
Azure cloud
When you trigger a subsequent (twice) restore operation on the same VM, an error
occurs during restore operation. This error causes the following issues:
■ The tags from original OS disk are not copied to newly created restored OS
disk.
■ User login might fail after the VM restore due to ssh failure.
Workaround:
Performing granular restore 99
Troubleshooting
Check if the ssh daemon is running on the system. If not, then perform the steps
that are mentioned in the
https://docs.microsoft.com/en-us/azure/virtual-machines/troubleshooting/troubleshoot-ssh-connection
topic.
Workaround:
If you want to avoid listing files or folder while browsing for single file restore, which
are not supported by Snapshot Manager, then enable CP DISKMAP check by
setting below flag in bp.conf file of NetBackup master server.
CP_DISKMAP_CHECK = true/yes
ip-10-239-185-241:/mnt/vpfs_shares/vmfiles/8fcc/8fcc132b-a202-49a8-b654-81ff242a718a/livemount
For backup from restore if live mount is created successfully then even though there
is other error reported apart from ASSET_NOT_FOUND, its considered as partial
success. If there is no network devices/filesystem mounted on target location and
disk is full then below messages can be seen in job details:
In this case other network devices/file system must have been mounted on the
target path, hence Snapshot Manager agent considers the free space on device/file
system. But once it tries to copy the file it fails with space error logged into summary
report. For example,
Workaround:
■ Check the summary report on target host location. For example,
/var/log/flexsnap/restore/granular-restore-09b4d44d
[root@ip-10-239-187-148 granular-restore-09b4d44d]# cat root-error.log
Dec 29 09:27:44: ERROR - FILE: /disk1/dl380g9-149-vm15_package.zip
[Error 28] IOError: No space left on device
■ If the file copy operation failed due to disk space, then create some space and
copy the file from live mount.
The live mount path details can be found in the job details as follows:
Dec 29, 2022 2:57:51 PM - Warning bprd (pid=1977) Granular Restore from bac
Copy the files manually from live access mount:
ip-10-239-185-241:/mnt/vpfs_shares/vmfiles/8fcc/8fcc132b-a202-49a8-b654-81f
■ Using the following mount command, mount the Instant access on target Linux
host:
$ mkdir -p /mnt/restore
■ Instant access path can be retrieved from activity manager logs which is in the
following format:
<InstantAccessServer>:/mnt/vpfs_shares/vmfiles/<id>/<InstantAccessId>/livemount
■ Linux must have the cifs package. Obtain the packages using the # yum install
cifs-utils command.
Pre-recovery When restoring files and folders to Ensure that the target virtual
check fails disconnected target virtual machine, machine is in connected state
the pre-recovery check fails with the with agent configured for
following error: successful restore.
Partial recovery When restoring files and folders from Install NFS client on window
for source Linux source Linux VM to target Windows VM target machine before you
VM to target without installing NFS client on perform restore from Linux VM to
Windows VM Windows target machine, then the Windows VM.
(no NFS client) recovery is partially successful with the
following error displayed:
Restore job fails Restore job fails with the following error Select a different target VM.
for deleted when restoring files and folders on
target VM target VM which is deleted from cloud
environment:
Create Instant Creation of Instant access fails during Verify if Instant access is
access fails restore job if Instant access is not supported on MSDP media server
enabled on MSDP storage server. by using the following pre-check
script:
/usr/openv/pdde/vpfs/bin/ia_byo_precheck.sh
Target VM does If the number of volumes containing the Restore files and folders from less
not have free selected files are more than the number number of volumes.
drives to attach of free available drives on target host
Virtual Disk then the operation fails.
Not enough If media server where MSDP is Disable FIPS on the media server
space: configured has FIPS enabled. where MSDP is installed or add
'*\\driverMapping.json domain user samba credentials
to target VM.
Performing granular restore 104
Troubleshooting
Libguestfs is a third party tool used by Instant access to retrieve files from VM
backup. If a disk is not initialized, libguestfs will not be able to handle it.
Workaround:
Initialize the disk, backup the VM and try to download or restore VM files using
Instant access again.
Chapter 4
Troubleshooting protection
and recovery of cloud
assets
This chapter includes the following topics:
Process Logs
tpconfig Windows
tpconfig command is one way for registering NetBackup install path/volmgr/debug/tpcommand
Snapshot Manager in NetBackup.
UNIX
/usr/openv/volmgr/debug/tpcommand
nbwebservice Windows
/usr/openv/wmc/webserver/logs
/usr/openv/logs/nbwebservices
nbemm Windows
nbemm stores the Snapshot Manager and plug-in NetBackup install path/path/logs/nbemm
information in EMM database.
UNIX
/usr/openv/logs/nbemm
Process Logs
ncfnbcs Windows
UNIX
/usr/openv/netbackup/bin/vxlogview -o 366
Picloud Windows
UNIX
/usr/openv/netbackup/bin/vxlogview -i 497
Troubleshooting protection and recovery of cloud assets 107
Troubleshoot cloud workload protection issues
Process Logs
nbwebservice Windows
Process Logs
nbpem Windows
nbpem PID for given job is available in the NetBackup install path/bin/vxlogview –o 116
NetBackup activity monitor.
UNIX
/usr/openv/netbackup/bin/vxlogview -o 116
nbjm Windows
nbjm PID for given job is available in the NetBackup install path/bin/vxlogview –o 117
NetBackup activity monitor.
UNIX
/usr/openv/netbackup/bin/vxlogview -o 117
nbcs Windows
nbcs PID for given job is available in the NetBackup install path/bin/vxlogview –i 366 -P
NetBackup activity monitor. nbcs_process_id
UNIX
/usr/openv/netbackup/bin/vxlogview -i 366 -P
nbcs_process_id
Windows
UNIX
/usr/openv/logs/ncfnbcs
Troubleshooting protection and recovery of cloud assets 108
Troubleshoot cloud workload protection issues
Process Logs
nbrb Windows
nbrb is requested to provide a media server for NetBackup install path/bin/vxlogview –o 118
a given job. For Cloud, a particular media server
UNIX
is picked up from the associated list of media
servers for a Snapshot Manager. /usr/openv/netbackup/bin/vxlogview -i 118
Table 4-4
Process Logs
nbwebservice Windows
/usr/openv/wmc/webserver/logs
/usr/openv/logs/nbwebservices
bprd Windows
/usr/openv/netbackup/logs/bprd
ncfnbcs Windows
nbcs PID for given job is available in the NetBackup install path/bin/vxlogview –i 366 -P
NetBackup activity monitor. nbcs_process_id
UNIX
/usr/openv/netbackup/bin/vxlogview -i 366 -P
nbcs_process_id
Process Logs
bpdm Windows
The snapshot delete or clean-up operation is NetBackup install path/netbackup/logs
triggered by bpdm.
UNIX
/usr/openv/netbackup/logs/bpdm
ncfnbcs Windows
nbcs PID for given job is available in the NetBackup install path/bin/vxlogview –i 366 -P
NetBackup activity monitor. nbcs_process_id
UNIX
/usr/openv/netbackup/bin/vxlogview -i 366 -P
nbcs_process_id
After restarting the containers, the restore jobs are updated with the latest status
in the activity monitor.
Workaround:Rename the database such that the client name fits within the length
of 255 characters.
ca3+nbux-qa-bidi-rg+eastus+az-sql-mi-bidinet01+testdb_bidinet02\1
656000000\tmp\catstore\BACKUPNOW+141a73e7-cdc4-4371-823a-f170447d
ba2d_1656349831_FULL.f_imgUserGroupNames0
Workaround: Rename the database such that the file path length fits within the
length of 256 characters.
Occurs when you try to backup a database which has multiple tables with different
roles. If tables have at least one different owner, other than the database owner,
and it is not a member the database owner role, then the backup may fail.
Recommended action: You must have a role that has access to all tables inside
the database which you want to backup or restore.
For example, say that we wanted to backup the School database which has two
tables.
■ student, owner is postgres
CREATE ROLE
To make this new role a member of postgres and schooladmin role, run:
postgres=> GRANT postgres TO NBUbackupadmin;
Troubleshooting protection and recovery of cloud assets 113
Troubleshoot PaaS workload protection and recovery issues
GRANT ROLE
GRANT ROLE
Note: You must have a role who is either owner or member of the owner of the
table, for all tables inside database.
Note: Do not enable CDC manually. Provide the permissions to NetBackup for
enable or disable CDC.
Troubleshooting protection and recovery of cloud assets 114
Troubleshoot PaaS workload protection and recovery issues