NetBackup102 SnapshotManager InstallGuide
NetBackup102 SnapshotManager InstallGuide
Release 10.2
March 2023
Veritas NetBackup™ Snapshot Manager Install and
Upgrade Guide
Last updated: 2023-03-17
Legal Notice
Copyright © 2023 Veritas Technologies LLC. All rights reserved.
Veritas, the Veritas Logo, and NetBackup are trademarks or registered trademarks of Veritas
Technologies LLC or its affiliates in the U.S. and other countries. Other names may be
trademarks of their respective owners.
This product may contain third-party software for which Veritas is required to provide attribution
to the third party (“Third-party Programs”). Some of the Third-party Programs are available
under open source or free software licenses. The License Agreement accompanying the
Software does not alter any rights or obligations you may have under those open source or
free software licenses. Refer to the Third-party Legal Notices document accompanying this
Veritas product or available at:
https://www.veritas.com/about/legal/license-agreements
The product described in this document is distributed under licenses restricting its use, copying,
distribution, and decompilation/reverse engineering. No part of this document may be
reproduced in any form by any means without prior written authorization of Veritas Technologies
LLC and its licensors, if any.
The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq.
"Commercial Computer Software and Commercial Computer Software Documentation," as
applicable, and any successor regulations, whether delivered by Veritas as on premises or
hosted services. Any use, modification, reproduction release, performance, display or disclosure
of the Licensed Software and Documentation by the U.S. Government shall be solely in
accordance with the terms of this Agreement.
Technical Support
Technical Support maintains support centers globally. All support services will be delivered
in accordance with your support agreement and the then-current enterprise technical support
policies. For information about our support offerings and how to contact Technical Support,
visit our website:
https://www.veritas.com/support
You can manage your Veritas account information at the following URL:
https://my.veritas.com
If you have questions regarding an existing support agreement, please email the support
agreement administration team for your region as follows:
Japan [email protected]
Documentation
Make sure that you have the current version of the documentation. Each document displays
the date of the last update on page 2. The latest documentation is available on the Veritas
website:
https://sort.veritas.com/documents
Documentation feedback
Your feedback is important to us. Suggest improvements or report errors or omissions to the
documentation. Include the document title, document version, chapter title, and section title
of the text on which you are reporting. Send feedback to:
You can also see documentation information or ask a question on the Veritas community site:
http://www.veritas.com/community/
https://sort.veritas.com/data/support/SORT_Data_Sheet.pdf
Contents
■ Verifying that specific ports are open on the instance or physical host
Category Requirement
Note: The single hostname or FQDN for NetBackup Snapshot Manager has limit
of 64 characters which is required at the time of installation.
Table 2-2 System requirements for the NetBackup Snapshot Manager host
Amazon Web Services (AWS) ■ Elastic Compute Cloud (EC2) instance type: t3.large
instance ■ vCPUs: 2
■ RAM: 16 GB
■ Root disk: 64 GB with a solid-state drive (GP2)
■ Data volume: 50 GB Elastic Block Store (EBS) volume of
type GP2 with encryption for the snapshot asset database;
use this as a starting value and expand your storage as
needed.
Preparing for NetBackup Snapshot Manager installation 16
Meeting system requirements
Table 2-2 System requirements for the NetBackup Snapshot Manager host
(continued)
■ Register the RHEL instance with Red Hat using Red Hat
Subscription Manager
■ Extend the default LVM partitions on the RHEL instance
so that they fulfil the minimum disk space requirement
■ Register the RHEL instance with Red Hat using Red Hat
Subscription Manager
■ Extend the default LVM partitions on the RHEL instance
so that they fulfil the minimum disk space requirement
Preparing for NetBackup Snapshot Manager installation 17
Meeting system requirements
Table 2-2 System requirements for the NetBackup Snapshot Manager host
(continued)
■ /var
Preparing for NetBackup Snapshot Manager installation 18
Meeting system requirements
The /var file system is further used for container runtimes. Ensure that the host
on which you install or upgrade NetBackup Snapshot Manager has sufficient space
for the following components.
NetBackup Snapshot Manager agents 350 MB free space, for every NetBackup Snapshot
and plug-ins Manager plug-in and agent configured
/cloudpoint 50 GB or more
Category Support
Operating systems on ■ Red Hat Enterprise Linux (RHEL) 9, 8.6 and 8.4
supported assets ■ Windows Server 2012 R2, 2016, 2019 and 2022
Category Support
Cloud platforms
Preparing for NetBackup Snapshot Manager installation 21
Meeting system requirements
Category Support
Category Support
Make sure you keep this information ready; you are required to provide these details
during NetBackup Snapshot Manager installation.
Memory: 16 GB
Memory: 32 GB or more
■ In cases where the number of concurrent operations is higher than what the
NetBackup Snapshot Manager host configuration capacity can handle,
NetBackup Snapshot Manager automatically puts the operations in a job queue.
The queued jobs are picked up only after the running operations are completed.
Note: For NetBackup Snapshot Manager 10.0, the VM based extensions are
supported on Azure Stack hub and Kubernetes based extension are supported on
Azure, AWS and GCP.
Memory: 16 GB
Memory: 32 GB or more
Platform Description
For detailed instructions on installing the Docker on Ubuntu, see Install Docker Engine on Ubuntu.
■ (If NetBackup Snapshot Manager is being deployed in AWS cloud) Ensure that you enable
the extra repos:
# sudo yum-config-manager --enable rhui-REGION-rhel-server-extras
■ (If NetBackup Snapshot Manager is being deployed on-premise) Enable your subscriptions:
# sudo subscription-manager register --auto-attach
--username=<username> --password=<password>
# subscription-manager repos --enable=rhel-7-server-extras-rpms
# subscription-manager repos --enable=rhel-7-server-optional-rpms
■ Install Docker using the following command:
# sudo yum -y install docker
■ Reload the system manager configuration using the following command:
# sudo systemctl daemon-reload
■ Enable and then restart the docker service using the following commands:
# sudo systemctl enable docker
# sudo systemctl restart docker
■ If SELinux is enabled, change the mode to permissive mode.
Edit the /etc/selinux/config configuration file and modify the SELINUX parameter value
to SELINUX=permissive.
■ Reboot the system for the changes to take effect.
■ Verify that the SELinux mode change is in effect using the following command:
# sudo sestatus
The Current Mode parameter value in the command output should appear as permissive.
For detailed instructions on installing Docker on RHEL, see Getting Docker in RHEL 7.
If the docker is using default storage driver (overlay2 or overlay) on XFS backed file system, then
ensure that XFS FS has ftype option set to 1. Use xfs_info to verify. For details, see Use
the OverlayFS storage driver. Otherwise, you can use different storage driver. For details, see
Docker storage drivers.
Preparing for NetBackup Snapshot Manager installation 30
Creating and mounting a volume to store NetBackup Snapshot Manager data
Platform Description
■ (If NetBackup Snapshot Manager is being deployed in AWS cloud) Ensure that you enable
the extra repos:
# sudo yum-config-manager --enable rhui-REGION-rhel-server-extras
■ (If NetBackup Snapshot Manager is being deployed on-premise) Enable your subscriptions:
# sudo subscription-manager register --auto-attach
--username=<username> --password=<password>
■ If SELinux is enabled, change the mode to permissive mode.
Edit the /etc/selinux/config configuration file and modify the SELINUX parameter value
to SELINUX=permissive.
■ Reboot the system for the changes to take effect.
■ Verify that the SELinux mode change is in effect using the following command:
# getenforce
The Current Mode parameter value in the command output should appear as permissive.
Note: If you ever boot your instance without this volume attached (for example,
after moving the volume to another instance), the nofail mount option enables
the instance to boot even if there are errors mounting the volume.
Table 2-11 Volume creation steps for each supported cloud vendor
Vendor Procedure
Amazon Web 1 On the EC2 dashboard, click Volumes > Create Volumes.
Services (AWS)
2 Follow the instructions on the screen and specify the following:
■ Volume type: General Purpose SSD
■ Size: 50 GB
Google Cloud ◆ Create the disk for the virtual machine, initialize it, and mount it to
Platform /cloudpoint.
Microsoft Azure 1 Create a new disk and attach it to the virtual machine. For more
information, see Use the portal to attach a data disk to a Linux
VM.
You should choose the managed disk option. For more information,
see Use the portal to attach a data disk to a Linux VM.
Microsoft Azure 1 Create a new disk and attach it to the virtual machine. For more
Stack Hub information, see Create VM disk storage in Azure Stack Hub.
Port Description
443 The NetBackup Snapshot Manager user interface uses this port as the default
HTTPS port.
5671 The NetBackup Snapshot Manager RabbitMQ server uses this port for
communications. This port must be open to support multiple agents,
extensions, backup from snapshot, and restore from backup jobs.
Note: (For AKS only) To enable swap space on Azure Kubernetes cluster for
NetBackup installation and NetBackup Snapshot Manager deployment on kubernetes
based extensions, follow the steps mentioned in Customize node configuration for
Azure Kubernetes Service (AKS) node pools.
Required ports:
■ Port required on NetBackup primary server: 1556 and 443
■ Ports required on NetBackup media server for client side deduplication: 10082
and 10102
Preparing for NetBackup Snapshot Manager installation 33
Preparing NetBackup Snapshot Manager for backup from snapshot jobs
If you use private names for installing certificates and communicating with
NetBackup, which have to be resolved using /etc/hosts follow these steps:
■ Add entries similar to /etc/hosts file in the /cloudpoint/openv/etc/hosts file.
■ Ensure that you use the private name during NetBackup Snapshot Manager
installation, as well as NetBackup Snapshot Manager registration.
Chapter 3
Deploying NetBackup
Snapshot Manager using
container images
This chapter includes the following topics:
Note: RedHat 8.x has replaced the Docker ecosystem with the Podman ecosystem.
For RHEL 7.x hosts See “Installing NetBackup Snapshot Manager in the
Docker/Podman environment” on page 35.
From the Products drop-down, select NetBackup and select the required
version from the Version drop-down. Click Explore. Click Base and upgrade
installers.
The NetBackup Snapshot Manager image name resembles the following format
for Docker and Podman environment:
NetBackup_SnapshotManager_<version>.tar.gz
Note: The actual file name may vary depending on the release version.
# ls
NetBackup_SnapshotManager_10.2.x.x.xxxx.tar.gz
netbackup-flexsnap-10.2.x.x.xxxx.tar.gz
flexsnap_preinstall.sh
3 Run the following command to prepare the NetBackup Snapshot Manager host
for installation:
# sudo ./flexsnap_preinstall.sh
Note: The command mentioned in the above step is a single command. Ensure
that you enter the command without any line breaks.
If the NetBackup Snapshot Manager host is behind a proxy server, use the
following command instead:
■ (For Docker environment)
Parameter Description
Following parameters are required only if the instance uses a proxy server
<http_proxy_value> Represents the value to be used as the HTTP proxy for all
connections.
<https_proxy_value> Represents the value to be used as the HTTPS proxy for all
connections.
<no_proxy_value> Represents the addresses that are allowed to bypass the proxy
server. You can specify host names, IP addresses, and domain
names in this parameter.
Note:
Example
■ (For Docker environment) If the NetBackup Snapshot Manager version is
10.2.xxxx, the command syntax is as follows:
If using a proxy server, then using the examples provided in the table earlier,
the command syntax is as follows:
Deploying NetBackup Snapshot Manager using container images 39
Installing NetBackup Snapshot Manager in the Docker/Podman environment
separated):10.244.79.36
Port (default:443):
Parameter Description
Admin username Specify a user name for the NetBackup Snapshot Manager
administrator user account.
Host name for Specify the IP address or the Fully Qualified Domain Name (FQDN)
TLS certificate of the NetBackup Snapshot Manager host.
Port Specify the port through which the NetBackup Snapshot Manager
can communicate. Default is port 443.
Note: After the deployment of NetBackup Snapshot Manager, ensure that the
IPv6 interface on the system is not disabled.
Deploying NetBackup Snapshot Manager using container images 43
Verifying that NetBackup Snapshot Manager is installed successfully
Note: If you ever need to restart NetBackup Snapshot Manager, use the docker
run command so that your environmental data is preserved.
■ Run the following command and verify that the NetBackup Snapshot Manager
services are running and the status is displayed as UP:
For Docker environment: # sudo docker ps -a
For Podman environment: # podman ps -a
The command output resembles the following:
Warning: Do not use commands such as docker restart or docker stop and
docker start to restart NetBackup Snapshot Manager. Use the docker run
command described below.
Note: Ensure that you enter the command without any line breaks.
Deploying NetBackup Snapshot Manager using container images 46
Restarting NetBackup Snapshot Manager
Note: Ensure that you enter the commands without any line breaks.
Chapter 4
Deploying NetBackup
Snapshot Manager
extensions
This chapter includes the following topics:
to service a large number of jobs, and then scale in as well when the jobs have
completed.
Note: Ensure that you use the same tag as that of NetBackup Snapshot Manager
image version. Custom tag cannot be used.
3 From the desired NetBackup Snapshot Manager row, click the actions icon on
the right and then select Add extension.
Note: For the VM-based extension you do not need to download the extension.
Proceed directly to steps 7 and 8 to copy the token.
Note: The token is valid for 180 seconds only. If you do not use the token within
that time frame, generate a new token.
Note: The actual file name varies depending on the release version.
■ For the VM based extension installed on a RHEL OS the SElinux mode should
be "permissive".
■ Network Security Groups used by the host that is being protected should allow
communication from the host where the extension is installed, on the specified
ports.
-v /var/run/docker.sock:/var/run/docker.sock
veritas/flexsnap-deploy:<version> install_extension
2 Navigate to the NetBackup Web UI and follow the steps 7 and 8 described in
the section Downloading NetBackup Snapshot Manager extension to generate
and copy the validation token.
See “Downloading the NetBackup Snapshot Manager extension” on page 49.
Note: For the VM-based extension you do not need to download the extension.
Proceed directly to steps 7 and 8 to copy the token.
Parameter Description
Note: Veritas does not recommend the registration of kubernetes extensions for
Snapshot Manager in Kubernetes cluster.
Overview
■ Your Azure managed Kubernetes cluster should already be deployed with
appropriate network and configuration settings, and with specific roles. The
cluster must be able to communicate with NetBackup Snapshot Manager.
The required roles are: Azure Kubernetes Service RBAC Writer, AcrPush,
Azure Kubernetes Service Cluster User Role
For supported Kubernetes versions, refer to the NetBackup Snapshot Manager
Hardware Compatibility List (HCL).
■ Use an existing Azure Container Registry or create a new one, and ensure that
the managed Kubernetes cluster has access to pull images from the container
registry
■ A dedicated nodepool for NetBackup Snapshot Manager workloads needs to
be created with manual scaling or 'Autoscaling' enabled in the Azure managed
Kubernetes cluster. The autoscaling feature allows your nodepool to scale
dynamically by provisioning and de-provisioning the nodes as required
automatically.
■ NetBackup Snapshot Manager extension images (flexsnap-deploy,
flexsnap-core, flexsnap-fluentd, flexsnap-datamover) need to be
uploaded to the Azure container registry.
■ The public IP of the virtual machine scale set via which the node pool is
configured has to be allowed to communicate through port 22, on the workloads
being protected.
■ Install a Docker or Podman container platform on the host and start the container
service.
See Table 2-10 on page 29.
■ Prepare the NetBackup Snapshot Manager host to access Kubernetes cluster
within your Azure environment.
■ Install Azure CLI. For more information, refer to the Azure documentation.
■ Install Kubernetes CLI. For more information, refer to the Kubernetes site.
■ Login to the Azure environment to access the Kubernetes cluster by running
this command on Azure CLI:
# az login --identity
# az account set --subscription <subscriptionID>
# az aks get-credentials --resource-group <resource_group_name>
--name <cluster_name>
■ Ensure that you create an Azure Container Registry or use the existing one if
available, to which the NetBackup Snapshot Manager images will be pushed
(uploaded). See Azure documentation.
■ To run the kubectl and container registry commands from the host system,
assign the following role permissions to your VM and cluster. You can assign a
'Contributor', 'Owner', or any custom role that grants full access to manage all
resources.
■ Navigate to your Virtual Machine > click Identity on the left > under System
assigned tab, turn the Status to 'ON' > click Azure role assignment > click
Add role assignments > select Scope as 'Subscription' or 'Resource Group'
> select Role and assign the following roles : Azure Kubernetes Service
RBAC Writer, AcrPush, Azure Kubernetes Service Cluster User Role, and
Save.
■ Navigate to your Kubernetes cluster > click Access Control (IAM) on the
left > click Add role assignments > select Role as 'Contributor ' > Select
Assign access to as 'Virtual Machines' > select your VM from the drop-down
and Save.
■ While defining StorageClass consider using CSI provisioner for Azure Files
with NFS protocol.
For example,
Deploying NetBackup Snapshot Manager extensions 56
Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (AKS) in Azure
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: test-sc
parameters:
skuName: Premium_LRS
protocol: nfs
provisioner: file.csi.azure.com
reclaimPolicy: Retain
volumeBindingMode: WaitForFirstConsumer
■ Create a namespace for NetBackup Snapshot Manager from the command line
interface on host system:
# kubectl create namespace cloudpoint-system
Note: Do not create the authentication token yet, as it is valid only for 180
seconds.
2 If the host from which you want to install the extension is not the same host
where your NetBackup Snapshot Manager is installed, load the NetBackup
Snapshot Manager container images on the extension host (flexsnap-deploy,
flexsnap-core, flexsnap-fluentd, flexsnap-datamover)
Parameter Description
container_registry_path To obtain the container registry path, go to your container registry in Azure and from
the Overview pane, copy the 'Login server'.
Example: mycontainer.azurecr.io
Example: 10.2.x.xxxx
■ To tag the images, run the following command for each image, depending
on the container platform running on your host:
For Docker: # docker tag source_image:tag target_image:tag
For Podman: # podman tag source_image:tag target_image:tag
Where,
■ the source image tag is: veritas/flexsnap-deploy:tag>
■ the target image tag is:
<container_registry_path>/<source_image_name>:<SnapshotManager_version_tag>
Example:
Deploying NetBackup Snapshot Manager extensions 58
Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (AKS) in Azure
4 Then to push the images to the container registry, run the following command
for each image, depending on the container platform running on your host:
For Docker: # docker push target_image:tag
For Podman: # podman push target_image:tag
Example:
5 Once the images are pushed to the container registry, execute the extension
script cp_extension.sh that was downloaded earlier, from the host where
kubectl is installed. The script can be executed either by providing all the
required input parameters in one command, or in an interactive way where you
will be prompted for input.
Gather the following parameters before running the script:
Parameter Description
snapshotmanager_ip Provide IP address or FQDN of the main NetBackup Snapshot Manager host.
target_image:tag Target image tag created for the flexsnap-deploy image in step 3.
Example:
mycontainer.azurecr.io/veritas/flexsnap-deploy:10.0.1.0.10014
namespace NetBackup Snapshot Manager namespace that was created earlier in the preparation
steps.
Deploying NetBackup Snapshot Manager extensions 59
Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (AKS) in Azure
Parameter Description
storage_class Kubernetes storage class that was created earlier in the preparation steps.
Example: cloudpoint-sc
workflow_token Authentication token created from the NetBackup Web UI - Add extension dialog.
■ Run the installation command with all the input parameters described in
the above table:
./cp_extension.sh install -c <snapshotmanager_ip> -i
<target_image:tag> -n <namespace> -p <tag_key=tag_val> -s
<storage_class> -t <workflow_token> -k <Size (In GiB)>
Example:
./cp_extension.sh install
Snapshot Manager image repository path. Format=<Login-server/image:tag>:
cpautomation.azurecr.io/veritas/flexsnap-deploy:10.2.x.xxxx
Snapshot Manager extension namespace: snapshot-manager
Deploying NetBackup Snapshot Manager extensions 60
Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (AKS) in Azure
■ When the script runs, provide the input parameters as described in the
above table:
./cp_extension.sh install
Snapshot Manager image repository path. Format=<Login-server/image:tag>:
cpautomation.azurecr.io/veritas/flexsnap-deploy:10.2.x.xxxx
Snapshot Manager extension namespace: snapshot-manager
Snapshot Manager IP or fully-qualified domain name: 10.244.79.38
Node group/pool label with format key=value: agentpool=extpool
Storage class name: azurefile
Deploying NetBackup Snapshot Manager extensions 61
Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (AKS) in Azure
Note: The output examples have been formatted to fit the screen.
■ Verify that the port 5671 is open on the main NetBackup Snapshot Manager
host.
See “Verifying that specific ports are open on the instance or physical host”
on page 31.
■ Install a Docker or Podman container platform on the host and start the container
service.
See Table 2-10 on page 29.
■ It is not recommended to change scale settings of the cluster nodegroup when
jobs are running. Disable the extension when jobs are not running, then change
the scale settings and enable the extension for new jobs.
■ Prepare the NetBackup Snapshot Manager host to access Kubernetes cluster
within your AWS environment.
■ Install AWS CLI. For more information, refer to the AWS Command Line
Interface.
■ Install Kubernetes CLI. For more information, refer to the Installing kubectl
documentation.
■ Create an AWS Container Registry or use the existing one if available, to
which the NetBackup Snapshot Manager images will be pushed (uploaded).
Configure the minimum and maximum nodes as per the requirement.
For more information, refer to the AWS documentation Amazon Elastic
Container Registry documentation.
■ Create the OIDC provider for the AWS EKS cluster. For more information,
refer to the Create an IAM OIDC provider for your cluster section of the
Amazon EKS User Guide.
■ Create an IAM service account for the AWS EKS cluster. For more
information, refer to the Amazon EKS User Guide.
■ If an IAM role needs an access to the EKS cluster, run the following command
from the system that already has access to the EKS cluster:
kubectl edit -n kube-system configmap/aws-auth
For more information, refer to the Enabling IAM user and role access to your
cluster section of the Amazon EKS User Guide.
■ Install Amazon EFS driver. For more information, refer to the Amazon EFS
CSI driver section of the Amazon EKS User Guide.
■ Login to the AWS environment to access the Kubernetes cluster by running
this command on AWS CLI:
# aws eks --region <region_name> update-kubeconfig --name
<cluster_name>
Deploying NetBackup Snapshot Manager extensions 64
Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (EKS) in AWS
■ Create a storage class. For more information, refer to the Storage classes section
of the Amazon EKS User Guide.
■ Create a namespace for NetBackup Snapshot Manager from the command line
on host system:
# kubectl create namespace cloudpoint-system
■ Then create a new or use an existing managed Kubernetes cluster in AWS, and
add a new node pool dedicated for NetBackup Snapshot Manager use. Configure
Autoscaling as per your requirement.
■ While defining StorageClass, set uid/gid to the root.
Following is an example for StorageClass:
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: efs-sc1
parameters:
basePath: /dynamic_provisioning_bhakti
directoryPerms: "700"
fileSystemId: fs-03e18dc283779991e
gid: "0"
provisioningMode: efs-ap
uid: "0"
provisioner: efs.csi.aws.com
reclaimPolicy: Delete
volumeBindingMode: Immediate
Note: Do not create the authentication token yet, as it is valid only for 180
seconds.
2 If the host from which you want to install the extension is not the same host
where your NetBackup Snapshot Manager is installed, load the NetBackup
Snapshot Manager container images on the extension host (flexsnap-deploy,
flexsnap-core, flexsnap-fluentd, flexsnap-datamover)
Parameter Description
container_registry_path To obtain the container registry path, go to your Amazon ECR and
copy the URI of each repo.
Example:
<accoint_id>.dkr.ecr.us-east-2.amazonaws.com/veritas/flexsnap-datamover
Example: 10.2.x.xxxx
■ To tag the images, run the following command for each image, depending
on the container platform running on your host:
For Docker: # docker tag source_image:tag target_image:tag
For Podman: # podman tag source_image:tag target_image:tag
Where,
■ the source image tag is: veritas/flexsnap-deploy:tag>
■ the target image tag is:
<container_registry_path>/<source_image_name>:<SnapshotManager_version_tag>
Deploying NetBackup Snapshot Manager extensions 66
Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (EKS) in AWS
Example:
4 Then to push the images to the container registry, run the following command
for each image, depending on the container platform running on your host:
For Docker: # docker push target_image:tag
For Podman: # podman push target_image:tag
Example:
5 Once the images are pushed to the container registry, you can install the
extension using one of the following methods:
■ Kustomization and custom resource YAML files: Create and apply the
kustomization.yaml and cloudpoint_crd.yaml files based on the samples
provided.
See “Install extension using the Kustomize and CR YAMLs” on page 79.
■ Extension script: Execute the extension script cp_extension.sh that is
packaged within the 'tar' file that was downloaded earlier. The script can
be executed either by providing all the required input parameters in one
command, or in an interactive way where you will be prompted for input.
See “Install extension using the extension script” on page 67.
Deploying NetBackup Snapshot Manager extensions 67
Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (EKS) in AWS
After following the above instructions, you can verify if the extension was installed
successfully.
To verify that the extension is installed successfully:
■ Verify that the success message is displayed at the command prompt.
■ Verify that the extension is listed on the NetBackup Web UI.
Navigate to Cloud > NetBackup Snapshot Manager tab > click Advanced
settings > go to NetBackup Snapshot Manager extensions tab and verify.
■ Run the following command and verify that there are five pods, namely,
flexsnap-cloudpoint-xxx, flexsnap-fluentd-xxx,
flexsnap-listener-xxx, flexsnap-fluentd-collector-xxx and
flexsnap-datamover-xxxx are in Running state:
# kubectl get pods -n <namespace>
Example: # kubectl get pods -n cloudpoint-system
Parameter Description
Example:
<account_id>.dkr.ecr.us-east-2.amazonaws.com/veritas/flexsnap-deploy:10.2.0.9129
namespace The namespace that was created earlier in the preparation steps, in
which to deploy NetBackup Snapshot Manager.
tag_key=tag_val tag_key and tag_val are the label key and value pair defined for the
node on which you want to install the extension. The label key-value pair
can be retrieved by using the command kubectl describe node
<node_name> -n <namespace>
Example: eks.amazonaws.com/nodegroup=Demo-NG
storage_class Kubernetes storage class that was created earlier in the preparation
steps.
Example: cloudpoint-sc
Parameter Description
workflow_token Authentication token created from the NetBackup Web UI - Add extension
dialog.
■ Run the installation command with all the input parameters described in the
above table:
./cp_extension.sh install -c <snapshotmanager_ip> -i
<target_image:tag> -n <namespace> -p <tag_key=tag_val> -f
<storage_class> -t <workflow_token>
Example:
-n cloudpoint-system -p eks.amazonaws.com/nodegroup=td-nodepool-dnd
-s efs-sc -k 50
-t <workflow_token>
clusterrole.rbac.authorization.k8s.io/cloudpoint-cloudpoint-system
unchanged
clusterrolebinding.rbac.authorization.k8s.io/cloudpoint-rolebinding-cloudpoint-system
unchanged
customresourcedefinition.apiextensions.k8s.io/cloudpoint-servers.veritas.com
created
Deploying NetBackup Snapshot Manager extensions 69
Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (EKS) in AWS
customresourcedefinition.apiextensions.k8s.io/cloudpoint-servers.veritas.com
condition
met
Generating Snapshot Manager Custom Resource Definition object
cloudpointrule.veritas.com/cloudpoint-config-rule created
Snapshot Manager extension installation ...done
■ When the script runs, provide the input parameters as described in the above
table.
Example:
./cp_extension.sh install
deployment.apps/flexsnap-deploy created
serviceaccount/cloudpoint-acc created
clusterrole.rbac.authorization.k8s.io/cloudpoint-cloudpoint-system
unchanged
clusterrolebinding.rbac.authorization.k8s.io/cloudpoint-rolebinding-cloudpoint-system
unchanged
customresourcedefinition.apiextensions.k8s.io/cloudpoint-servers.veritas.com
created
Note: The output examples may be formatted or truncated to fit the screen.
Note: The NetBackup Snapshot Manager and all the cluster nodepools must
be in the same zone.
apiVersion: v1
kind: PersistentVolume
metadata:
name: <name of the pv>
spec:
capacity:
storage: <size in GB>
accessModes:
- ReadWriteMany
nfs:
path: <path to the dir created above>
server: <ip of the filestore>
Note: Do not create the authentication token yet, as it is valid only for 180
seconds.
2 If the host from which you want to install the extension is not the same host
where your NetBackup Snapshot Manager is installed, load the NetBackup
Snapshot Manager container images on the extension host (flexsnap-deploy,
flexsnap-core, flexsnap-fluentd, flexsnap-datamover)
Parameter Description
Example: gcr.io/<project-name>/<dir>
Example: 10.2.x.xxxx
■ To tag the images, run the following command for each image, depending
on the container platform running on your host:
For Docker: # docker tag source_image:tag target_image:tag
For Podman: # podman tag source_image:tag target_image:tag
Where,
■ the source image tag is: veritas/flexsnap-deploy:tag>
■ the target image tag is:
<container_registry_path>/<source_image_name>:<SnapshotManager_version_tag>
Example:
veritas/flexsnap-deploy:10.2.x.xxxx
# docker tag veritas/flexsnap-core:10.2.x.xxxx
gcr.io/<project-name>/
veritas/flexsnap-listener:10.2.x.xxxx
# docker tag veritas/flexsnap-fluentd:10.2.x.xxxx
gcr.io/<project-name>/
veritas/flexsnap-fluentd:10.2.x.xxxx
# docker tag veritas/flexsnap-datamover:10.2.x.xxxx
gcr.io/<project-name>/
veritas/flexsnap-datamover:10.2.x.xxxx
4 To push the images to the container registry, run the following command for
each image, depending on the container platform running on your host:
For Docker: # docker push target_image:tag
For Podman: # podman push target_image:tag
Example:
# docker push
gcr.io/<project-name>/veritas/flexsnap-deploy:10.2.x.xxxx
# docker push
gcr.io/<project-name>/veritas/flexsnap-core:10.2.x.xxxx
# docker push
gcr.io/<project-name>/veritas/flexsnap-fluentd:10.2.x.xxxx
# docker push
gcr.io/<project-name>/veritas/flexsnap-datamover:10.2.x.xxxx
Parameter Description
Example:
gcr.io/<project-name>/veritas/flexsnap-deploy:10.2.x.xxxx
Deploying NetBackup Snapshot Manager extensions 76
Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (GKE) in GCP
Parameter Description
■ Run the installation command with all the input parameters described in
the above table:
./cp_extension.sh install -c <snapshotmanager-ip> -i
<target-image:tag> -n <namespace> -p
cloud.google.com/gke-nodepool=<nodepool-name> -v
<persistent-volume-name> -k <size-in-GiB> -t <token>
Example:
# ./cp_extension.sh install
Snapshot Manager image repository path.
Format=<Login-server/image:tag>:
gcr.io/cloudpoint-development/test/veritas/flexsnap-deploy:10.2.1.0.xxxxx
Snapshot Manager extension namespace: test-ns
Snapshot Manager IP or fully-qualified domain name:
10.247.30.142
Deploying NetBackup Snapshot Manager extensions 77
Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (GKE) in GCP
unchanged
deployment.apps/flexsnap-operator created
Snapshot Manager service deployment ...done
customresourcedefinition.apiextensions.k8s.io/cloudpoint-servers.veritas.com
condition met
Generating Snapshot Manager Custom Resource Definition object
Waiting for deployment "flexsnap-operator" rollout to finish:
0 of 1 updated
replicas are available...
deployment "flexsnap-operator" successfully rolled out
cloudpointrule.veritas.com/cloudpoint-config-rule created
Snapshot Manager extension installation ...
Operator operations passed
Waiting for all components to come up ...Done
[root@xxxx]# kubectl get pods
NAME READY STATUS
RESTARTS AGE
flexsnap-fluentd-collector-79f4dd8447-5lgrf 1/1 Running
0 34s
Deploying NetBackup Snapshot Manager extensions 78
Installing the NetBackup Snapshot Manager extension on a managed Kubernetes cluster (GKE) in GCP
■ When the script runs, provide the input parameters as described in the
above table:
./cp_extension.sh install
Snapshot Manager image repository path.
Format=<Login-server/image:tag>: cpautomation.gcr.io/
<project-name>/veritas/flexsnap-deploy:10.2.x.xxxx
Snapshot Manager extension namespace: snapshot-manager
Snapshot Manager IP or fully-qualified domain name: xx.xxx.xx.xx
Node group/pool label with format key=value: agentpool=extpool
Persistent volume name:
Size in GiB (minimum 30 GiB,
Please refer NetBackup Snapshot Manager Install and Upgrade Guide
for PV size): 50
Snapshot Manager extension token:
This is a fresh NetBackup Snapshot Manager Extension Installation
cloudpointrule.veritas.com/cloudpoint-config-rule created
Snapshot Manager extension installation ...
Operator operations passed
Waiting for all components to come up ...Done
Waiting for all components to come up ...Done
Note: The output examples have been formatted to fit the screen.
Parameter Description
Example:
<account_id>.dkr.ecr.us-east-2.amazonaws.com/veritas/flexsnap-deploy
Example: 10.2.x.xxxx
namespace The namespace that was created earlier in the preparation steps,
in which to deploy NetBackup Snapshot Manager.
Example:
apiVersion: kustomize.config.k8s.io/v1beta1
kind: Kustomization
resources:
- cloudpoint_service.yaml
patchesStrategicMerge:
- node_select.yaml
namespace: demo-cloudpoint-ns
images:
- name: CLOUDPOINT_IMAGE
newName:
<account_id>.dkr.ecr.us-east-2.amazonaws.com/veritas/flexsnap-deploy
newTag: 10.2.x.xxxx
vars:
- name: ServiceAccount.cloudpoint-acc.metadata.namespace
objref:
kind: ServiceAccount
name: cloudpoint-acc
apiVersion: v1
fieldref:
fieldpath: metadata.namespace
configurations:
- cloudpoint_kustomize.yaml
cloudpoint_service.yaml
If deploying the extension on GCP platform, then in cloudpoint_service.yaml,
replace the storageClassName with volumeName.
Deploying NetBackup Snapshot Manager extensions 81
Install extension using the Kustomize and CR YAMLs
cloudpoint_crd.yaml
Edit the cloudpoint_crd.yaml manifest file as follows:
■ For GCP platform: Delete the line with storageClassName word in it.
■ For Non-GCP platform: Delete the line with volumeName word in it.
Now update the parameters in the Spec section with relevant values as described
in the following table.
Parameter Description
Example: efs-sc-new-root
Note: Not required for GCP platform.
Example:
apiVersion: veritas.com/v1
kind: CloudpointRule
metadata:
name: cloudpoint-config-rule
namespace: demo-cloudpoint-ns
spec:
CLOUDPOINT_HOST: 3.17.**.*** .
CLOUDPOINT_EXTENSION_TOKEN:
workflow-3s3tlpwpy62dyoingxqmfeojlky7bub9rbzx8srh8kdgmsqo6f-q85lflg8a5i72hqarl7icb9xl0ydzfociziedicxlflesd4z4mljn8tfqs70vvzhzrt7z3gbqyv765s7nuivrzl0d0vg6bstjpge9xbft2ox92kdkmje8ysm3l276eu0fvgolnkeu5fdesfdnl845p9psbpw9nei67c2rn0bc71gf1a7yx5ua74rmc40on0c27h8zt
Deploying NetBackup Snapshot Manager extensions 82
Install extension using the Kustomize and CR YAMLs
RENEW: false
LOG_STORAGE:
STORAGE_CLASS_NAME: efs-sc-new-root
SIZE: 100
Then run the following commands from the folder where the YAML files are located.
■ To apply the Kustomization YAML: kubectl apply -k <location of the
kustomization.yaml file>
node_select.yaml
Navigate to nodeSelector under the Spec section and replace the values of
NODE_AFFINITY_KEY and NODE_AFFINITY_VALUE in the node_select.yaml
file. User can obtain these details using the following commands:
■ Use the following command to obtain the name of any node from the dedicated
node-pool for our extension:
# kubectl get nodes
■ Depending on the specific cloud provider, use the following respective commands
based on the the tag key=value label:
■ For Azure: # kubectl describe node <node_name> | grep -i labels
Output example: agentpool=cpuserpool
■ For AWS: # kubectl describe node <node_name> | grep -i
<node_group_name>
Output example: eks.amazonaws.com/nodegroup=Demo-NG
■ For GCP: # kubectl describe node <node_name> | grep -i
<node_pool_name>
Output example: cloud.google.com/gke-nodepool=manik-node-pool
Parameter Description
Parameter Description
Option Procedure
Disable or enable the You can disable or enable the extensions from the NetBackup Web
extension: UI
Option Procedure
Stop, start, or restart Execute the following commands on the extension host VM to
the VM-based stop/start/restart the extension:
extension
For Docker:
To stop the
extension: # sudo docker run -it --rm -u 0
-v
/<full_path_to_volume_name>:/<full_path_to_volume_name>
-v /var/run/docker.sock:/var/run/docker.sock
veritas/flexsnap-deploy:<version> stop
For Podman
veritas/flexsnap-deploy:<version> stop
For Podman
veritas/flexsnap-deploy:<version> start
Deploying NetBackup Snapshot Manager extensions 85
Managing the extensions
Option Procedure
-v /var/run/docker.sock:/var/run/docker.sock
veritas/flexsnap-deploy:<version> restart
For Podman
-v /run/podman/podman.sock:/run/podman/podman.sock
veritas/flexsnap-deploy:<version> restart
Renew certificate for 1 Run the following command on the extension host:
a VM-based
extension # sudo docker run -it --rm -u 0
-v
/<full_path_to_volume_name>:/<full_path_to_volume_name>
-v /var/run/docker.sock:/var/run/docker.sock
veritas/flexsnap-deploy:<version>
renew_extension
Option Procedure
# ./cp_extension.sh renew
Note: Before you configure the AWS plug-in, make sure that you have configured
the proper permissions so NetBackup Snapshot Manager can work with your AWS
assets.
Access key The access key ID, when specified with the secret
access key, authorizes NetBackup Snapshot Manager
to interact with the AWS APIs.
Role Name The IAM role that is attached to the other AWS account
(cross account).
■ You cannot delete automated snapshots of RDS instances and Aurora clusters
through NetBackup Snapshot Manager.
■ The application consistency of AWS RDS applications depend on the behavior
of AWS. (AWS suspends I/O while backing up the DB instance).
This is a limitation from AWS and is currently outside the scope of NetBackup
Snapshot Manager.
■ All automated snapshot names start with the pattern rds:.
■ If you are configuring the plug-in to discover and protect AWS Nitro-based
Windows instances that use NVMe EBS volumes, you must ensure that the
AWS NVMe tool executable file, ebsnvme-id.exe, is present in any of the
following locations on the AWS instance:
■ %PROGRAMDATA%\Amazon\Tools
This is the default location for most AWS instances.
■ %PROGRAMFILES%\Veritas\Cloudpoint
Manually download and copy the executable file to this location.
■ System PATH environment variable
Add or update the executable file path in the system's PATH environment
variable.
NetBackup Snapshot Manager cloud providers 92
AWS plug-in configuration notes
If the NVMe tool is not present in one of the mentioned locations, NetBackup
Snapshot Manager may fail to discover the file systems on such instances. You
may see the following error in the logs:
"ebsnvme-id.exe" not found in expected paths!"
This is required for AWS Nitro-based Windows instances only. Also, if the
instance is launched using the community AMI or custom AMI, you might need
to install the tool manually.
■ NetBackup Snapshot Manager does not support cross-account replication for
AWS RDS instances or clusters, if the snapshots are encrypted using the default
RDS encryption key (aws/rds). You cannot share such encrypted snapshots
between AWS accounts.
If you try to replicate such snapshots between AWS accounts, the operation
fails with the following error:
Replication failed The source snapshot KMS key [<key>] does not exist,
is not enabled or you do not have permissions to access it.
This is a limitation from AWS and is currently outside the scope of NetBackup
Snapshot Manager.
■ If a region is removed from the AWS plug-in configuration, then all the discovered
assets from that region are also removed from the NetBackup Snapshot Manager
assets database. If there are any active snapshots that are associated with the
assets that get removed, then you may not be able perform any operations on
those snapshots.
Once you add that region back into the plug-in configuration, NetBackup
Snapshot Manager discovers all the assets again and you can resume operations
on the associated snapshots. However, you cannot perform restore operations
on the associated snapshots.
■ NetBackup Snapshot Manager supports commercial as well as GovCloud (US)
regions. During AWS plug-in configuration, even though you can select a
combination of AWS commercial and GovCloud (US) regions, the configuration
will eventually fail.
■ NetBackup Snapshot Manager does not support IPv6 addresses for AWS RDS
instances. This is a limitation of Amazon RDS itself and is not related to
NetBackup Snapshot Manager.
For more information, refer to the AWS documentation.
■ NetBackup Snapshot Manager does not support application consistent snapshots
and granular file restores for Windows systems with virtual disks or storage
spaces that are created from a storage pool. If a Microsoft SQL server snapshot
job uses disks from a storage pool, the job fails with an error. But if a snapshot
job for virtual machine which is in a connected state is triggered, the job might
NetBackup Snapshot Manager cloud providers 93
AWS plug-in configuration notes
be successful. In this case, the file system quiescing and indexing is skipped.
The restore job for such an individual disk to original location also fails. In this
condition, the host might move to an unrecoverable state and requires a manual
recovery.
■ For cross account configuration, from the AWS IAM console (IAM Console >
Roles), edit the IAM roles such that:
■ A new IAM role is created and assigned to the other AWS account (target
account). Also, assign that role a policy that has the required permissions
to access the assets in the target AWS account.
■ The IAM role of the other AWS account should trust the Source Account IAM
role (Roles > Trust relationships tab).
■ The Source Account IAM role is assigned an inline policy (Roles >
Permissions tab) that allows the source role to assume the role
("sts:AssumeRole") of the other AWS account.
■ The validity of the temporary security credentials that the Source Account
IAM role gets when it assumes the Cross Account IAM role is set to 1 hour,
at a minimum (Maximum CLI/API session duration field).
See “Before you create a cross account configuration” on page 101.
■ If the assets in the AWS cloud are encrypted using AWS KMS Customer
Managed Keys (CMK), then you must ensure the following:
NetBackup Snapshot Manager cloud providers 94
AWS plug-in configuration notes
3 To configure the AWS plug-in for the created or edited user, refer to the plug-in
configuration notes.
See “AWS plug-in configuration notes” on page 88.
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "EC2AutoScaling",
"Effect": "Allow",
"Action": [
"autoscaling:UpdateAutoScalingGroup",
"autoscaling:AttachInstances",
"autoscaling:DescribeScalingActivities",
"autoscaling:TerminateInstanceInAutoScalingGroup"
],
"Resource": [
NetBackup Snapshot Manager cloud providers 96
AWS plug-in configuration notes
"*"
]
},
{
"Sid": "KMS",
"Effect": "Allow",
"Action": [
"kms:ListKeys",
"kms:Encrypt",
"kms:Decrypt",
"kms:ReEncryptTo",
"kms:DescribeKey",
"kms:ListAliases",
"kms:GenerateDataKey",
"kms:GenerateDataKeyWithoutPlaintext",
"kms:ReEncryptFrom",
"kms:CreateGrant"
],
"Resource": [
"*"
]
},
{
"Sid": "RDSBackup",
"Effect": "Allow",
"Action": [
"rds:DescribeDBSnapshots",
"rds:DescribeDBClusters",
"rds:DescribeDBClusterSnapshots",
"rds:DeleteDBSnapshot",
"rds:CreateDBSnapshot",
"rds:CreateDBClusterSnapshot",
"rds:ModifyDBSnapshotAttribute",
"rds:DescribeDBSubnetGroups",
"rds:DescribeDBInstances",
"rds:CopyDBSnapshot",
"rds:CopyDBClusterSnapshot",
"rds:DescribeDBSnapshotAttributes",
"rds:DeleteDBClusterSnapshot",
"rds:ListTagsForResource",
"rds:AddTagsToResource"
],
"Resource": [
NetBackup Snapshot Manager cloud providers 97
AWS plug-in configuration notes
"*"
]
},
{
"Sid": "RDSRecovery",
"Effect": "Allow",
"Action": [
"rds:ModifyDBInstance",
"rds:ModifyDBClusterSnapshotAttribute",
"rds:RestoreDBInstanceFromDBSnapshot",
"rds:ModifyDBCluster",
"rds:RestoreDBClusterFromSnapshot",
"rds:CreateDBInstance",
"rds:RestoreDBClusterToPointInTime",
"rds:CreateDBSecurityGroup",
"rds:CreateDBCluster",
"rds:RestoreDBInstanceToPointInTime",
"rds:DescribeDBClusterParameterGroups"
],
"Resource": [
"*"
]
},
{
"Sid": "EC2Backup",
"Effect": "Allow",
"Action": [
"sts:GetCallerIdentity",
"ec2:CreateSnapshot",
"ec2:CreateSnapshots",
"ec2:DescribeInstances",
"ec2:DescribeInstanceStatus",
"ec2:ModifySnapshotAttribute",
"ec2:CreateImage",
"ec2:CopyImage",
"ec2:CopySnapshot",
"ec2:DescribeSnapshots",
"ec2:DescribeVolumeStatus",
"ec2:DescribeVolumes",
"ec2:RegisterImage",
"ec2:DescribeVolumeAttribute",
"ec2:DescribeSubnets",
"ec2:DescribeVpcs",
NetBackup Snapshot Manager cloud providers 98
AWS plug-in configuration notes
"ec2:DeregisterImage",
"ec2:DeleteSnapshot",
"ec2:DescribeInstanceAttribute",
"ec2:DescribeRegions",
"ec2:ModifyImageAttribute",
"ec2:DescribeAvailabilityZones",
"ec2:ResetSnapshotAttribute",
"ec2:DescribeHosts",
"ec2:DescribeImages",
"ec2:DescribeSecurityGroups" ,
"ec2:DescribeNetworkInterfaces"
],
"Resource": [
"*"
]
},
{
"Sid": "EC2Recovery",
"Effect": "Allow",
"Action": [
"ec2:RunInstances",
"ec2:AttachNetworkInterface",
"ec2:DetachVolume",
"ec2:AttachVolume",
"ec2:DeleteTags",
"ec2:CreateTags",
"ec2:StartInstances",
"ec2:StopInstances",
"ec2:TerminateInstances",
"ec2:CreateVolume",
"ec2:DeleteVolume",
"ec2:DescribeIamInstanceProfileAssociations",
"ec2:AssociateIamInstanceProfile",
"ec2:AssociateAddress",
"ec2:DescribeKeyPairs",
"ec2:AuthorizeSecurityGroupEgress",
"ec2:AuthorizeSecurityGroupIngress",
"ec2:DescribeInstanceTypeOfferings",
"ec2:GetEbsEncryptionByDefault"
],
"Resource": [
"*"
]
NetBackup Snapshot Manager cloud providers 99
AWS plug-in configuration notes
},
{
"Sid": "EBS",
"Effect": "Allow",
"Action": [
"ebs:ListSnapshotBlocks",
"ebs:GetSnapshotBlock",
"ebs:CompleteSnapshot",
"ebs:PutSnapshotBlock",
"ebs:ListChangedBlocks"
"ebs:StartSnapshot"
],
"Resource": [
"*"
]
},
{
"Sid": "EKS",
"Effect": "Allow",
"Action": [
"eks:DescribeNodegroup",
"eks:DescribeUpdate",
"eks:UpdateNodegroupConfig",
"eks:ListClusters"
"eks:DescribeCluster"
],
"Resource": [
"*"
]
},
{
"Sid": "IAM",
"Effect": "Allow",
"Action": [
"iam:ListAccountAliases",
"iam:SimulatePrincipalPolicy"
],
"Resource": [
"*"
]
}
]
}
NetBackup Snapshot Manager cloud providers 100
AWS plug-in configuration notes
AmazonEKSClusterPolicy
AmazonEKSWorkerNodePolicy
AmazonEC2ContainerRegistryReadOnly
AmazonEKS_CNI_Policy
AmazonEKSServicePolicy
{
"Sid": "AWSMarketplacePermissions",
"Effect": "Allow",
"Action": [
"autoscaling:UpdateAutoScalingGroup",
"autoscaling:AttachInstances",
"sns:Publish",
"sns:GetTopicAttributes",
"secretsmanager:GetResourcePolicy",
"secretsmanager:GetSecretValue",
"secretsmanager:DescribeSecret",
"secretsmanager:RestoreSecret",
"secretsmanager:PutSecretValue",
"secretsmanager:DeleteSecret",
"secretsmanager:UpdateSecret"
],
"Resource": [
"*"
]
}
{
"Sid": "DynamoDB",
"Effect": "Allow",
"Action": [
"dynamodb:ListTables",
"dynamodb:DescribeTable",
"dynamodb:CreateTable",
"dynamodb:BatchWriteItem",
"dynamodb:DescribeContinuousBackups",
"dynamodb:ExportTableToPointInTime",
NetBackup Snapshot Manager cloud providers 101
AWS plug-in configuration notes
"dynamodb:DescribeExport",
"dynamodb:DeleteTable",
"dynamodb:UpdateTable",
"dynamodb:UpdateContinuousBackups"
],
"Resource": [
"*"
]
},
{
"Sid": "S3Permissions",
"Effect": "Allow",
"Action": [
"s3:PutObject",
"s3:GetObject",
"s3:ListBucket",
"s3:CreateBucket",
"s3:DeleteObject"
],
"Resource": [
"*"
]
}
3 Set up a trust relationship between the source and target AWS accounts.
In the target AWS account, edit the trust relationship and specify source account
number and source account role.
This action allows only the NetBackup Snapshot Manager instance hosted in
source AWS account to assume the target role using the credentials associated
with source account's IAM role. No other entities can assume this role.
NetBackup Snapshot Manager cloud providers 104
Google Cloud Platform plug-in configuration notes
5 From the target account's Summary page, edit the Maximum CLI/API session
duration field and set the duration to 1 hour, at a minimum.
This setting determines the amount of time for which the temporary security
credentials that the source account IAM role gets when it assumes target
account IAM role remain valid.
■ The node pool provided while configuring Kubernetes cluster extension must
have all nodes from same region, that is, the node-pool should be single zonal.
NetBackup Snapshot Manager cloud providers 105
Google Cloud Platform plug-in configuration notes
■ The region of the NetBackup Snapshot Manager host and node-pool should be
same.
■ For backup from snapshot use case, NetBackup Snapshot Manager should be
installed in cloud only. A provider must be configured for the region in which
NetBackup Snapshot Manager is installed. If NetBackup Snapshot Manager is
installed in us-west1-b zone then a provider for us-west1 region must be
configured.
■ For manual installation (non marketplace) of NetBackup Snapshot Manager,
disable auto-activation of LVM’s LV. This can be achieved by setting
auto_activation_volume_list parameter to empty list or list of specific volume
group names which must be auto activated. The auto_activation_volume_list
parameter can be set in lvm.conf configuration file.
Project ID The ID of the project from which the resources are managed.
Listed as project_id in the JSON file.
Client Email The email address of the Client ID. Listed as client_email
in the JSON file.
Private Key The private key. Listed as private_key in the JSON file.
Note: You must enter this key without quotes (neither single
quotes nor double quotes). Do not enter any spaces or return
characters at the beginning or end of the key.
GCP regions
■ asia-east1
■ asia-east2
■ asia-northeast1
■ asia-northeast2
■ asia-south1
■ asia-southeast1
■ australia-southeast1
■ europe-north1
■ europe-west1
■ europe-west2
■ europe-west3
■ europe-west4
■ europe-west6
■ northamerica-northeast1
■ southamerica-east1
■ us-central1
■ us-east1
■ us-east4
■ us-west1
■ us-west2
■ us-west3- Utah
■ us-west4 Nevada
■ us-east5 (Columbus)
■ us-south1(Dallas)
■ asia-south
■ australia-southeast2
■ europe-central2
■ northamerica-northeast2
■ southamerica-west1
■ me-west1 (Tel Aviv)
■ When multiple accounts are all managed with a single NetBackup Snapshot
Manager, the number of assets being managed by a single NetBackup Snapshot
Manager instance might get too large and it would be better to space them out.
■ To achieve application consistent snapshots, we would require agent/agentless
network connections between the remote VM instance and NetBackup Snapshot
Manager. This would require setting up cross account/subscription/project
networking.
■ The maximum number of labels that can be attached to GCP instances are 64
and NetBackup Snapshot Manager uses 2 labels. If any instance has more than
62 labels, backup/restore may fail
See “Google Cloud Platform permissions required by NetBackup Snapshot Manager”
on page 108.
See “Configuring a GCP service account for NetBackup Snapshot Manager”
on page 109.
See “Preparing the GCP service account for plug-in configuration” on page 110.
NetBackup Snapshot Manager cloud providers 108
Google Cloud Platform plug-in configuration notes
compute.diskTypes.get
compute.diskTypes.list
compute.disks.create
compute.disks.createSnapshot
compute.disks.delete
compute.disks.get
compute.disks.list
compute.disks.setLabels
compute.disks.use
compute.globalOperations.get
compute.globalOperations.list
compute.images.get
compute.images.list
compute.instances.attachDisk
compute.instances.create
compute.instances.delete
compute.instances.detachDisk
compute.instances.get
compute.instances.list
compute.instances.setMetadata
compute.instances.setServiceAccount
compute.instances.setLabels
compute.instances.setTags
compute.instances.start
compute.instances.stop
compute.instances.use
compute.machineTypes.get
compute.machineTypes.list
compute.networks.get
compute.networks.list
compute.projects.get
compute.regionOperations.get
compute.regionOperations.list
compute.regions.get
compute.regions.list
compute.snapshots.create
compute.snapshots.delete
NetBackup Snapshot Manager cloud providers 109
Google Cloud Platform plug-in configuration notes
compute.snapshots.get
compute.snapshots.list
compute.snapshots.setLabels
compute.snapshots.useReadOnly
compute.subnetworks.get
compute.subnetworks.list
compute.subnetworks.use
compute.subnetworks.useExternalIp
compute.zoneOperations.get
compute.zoneOperations.list
compute.zones.get
compute.zones.list
iam.serviceAccounts.actAs
resourcemanager.projects.get
cloudkms.cryptoKeys.get
cloudkms.cryptoKeyVersions.get
cloudsql.databases.list
cloudsql.instances.list
■ The custom IAM role that you created in the earlier step. This is the role
that has all the permissions that NetBackup Snapshot Manager requires
to access GCP resources.
■ The iam.serviceAccountUser role. This enables the service account to
connect to the GCP using the service account context.
For more information on creating and managing service accounts, see Creating
and managing service accounts section of Google documentation.
Note: To use Shared VPC at GCP, additional Compute Network User named
role assignment is required for the service account used to configure GCP
plugin.
{
"type": "service_account",
"project_id": "some-product",
"private_key": "-----BEGIN PRIVATE KEY-----\n
N11EvA18ADAN89kq4k199w08AQEFAA5C8KYw9951A9EAAo18AQCnvpuJ3oK974z4\n
.
.
.
weT9odE4ryl81tNU\nV3q1XNX4fK55QTpd6CNu+f7QjEw5x8+5ft05DU8ayQcNkX\n
NetBackup Snapshot Manager cloud providers 111
Google Cloud Platform plug-in configuration notes
4pXJoDol54N52+T4qV4WkoFD5uL4NLPz5wxf1y\nNWcNfru8K8a2q1/9o0U+99==\n
-----END PRIVATE KEY-----\n",
"client_email": "[email protected]",
"auth_uri": "https://accounts.google.com/o/oauth2/auth",
"token_uri": "https://accounts.google.com/o/oauth2/token",
"auth_provider_x509_cert_url": "https://www.googleapis.com
\
/oauth2/v1/certs",
"client_x509_cert_url": "https://www.googleapis.com/robot/v1
\
/metadata/x509/ email%40xyz-product.iam.gserviceaccount.com"
}
3 When you configure the plug-in from the NetBackup user interface, copy and
paste the reformatted private key into the Private Key field. The reformatted
private_key should look similar to the following:
Note: The zone of NetBackup Snapshot Manager and node-pools of the extension
must be same.
■ compute.disks.create
No need to connect and ■ For Linux: By default the snapshots would be filesystem
configure the VM's consistent in Azure.
■ For Oracle on Linux:
■ The VM must be in a connected state
Or
■ Pre-scipts or post-scripts for application consistency must
be configured for the Linux VM as mentioned in the
Application-consistent backup of Azure Linux VMs
documentation.
Note: From Snapshot Manager version 10.2, while creating and restoring snapshots,
restore points would be created instead of snapshots being created in Azure.
Create snapshot
■ In Snapshot Manager version 10.2, a Restore Point Collection is created with
a VM restore point when the first snapshot is taken for a VM.
■ Each VM restore point contains the disk restore points of all disks whose
snapshots have been taken in the VM snapshot operation.
■ Each subsequent snapshot taken on the VM is saved in Azure under the same
Restore Point Collection that was created when the first snapshot was taken.
■ The subsequent restore points are incremental backups.
Restore snapshot
■ Snapshots would be restored from snapshots in Azure, for snapshots taken in
versions prior to Snapshot Manager version 10.2.
■ Snapshots would be restored from Restore Points, for snapshots taken in
Snapshot Manager version 10.2.
Note the following:
■ Locate the restore point:
Obtain the Snapshot ID in the job details of the created snapshot in NetBackup
as follows:
■ Windows:
C:\WindowsAzure\Logs\Plugins\Microsoft.Azure.RecoveryServices.VMSnapshot\<version>
Prerequisites
Before you configure the Azure plug-in, complete the following preparatory steps:
■ (Applicable only if user proceeds with application service principal route) Use
the Microsoft Azure Portal to create an Azure Active Directory (AAD) application
for the Azure plug-in.
■ Assign the required permissions to a role to access resources.
For more information on Azure plug-in permissions required by NetBackup
Snapshot Manager, See “Configuring permissions on Microsoft Azure”
on page 118.
In Azure you can assign permissions to the resources by one of the following
methods:
■ Service principal: This permission can be assigned to user, group or an
application.
■ Managed identity: Managed identities provide an automatically managed
identity in Azure Active Directory for applications to use when connecting to
resources that support Azure Active Directory (Azure AD) authentication.
There are two types of managed identities:
■ System-assigned
■ User-assigned
For more details, follow the steps mentioned in the Azure documentation.
Credential type:
Credential type:
Credential type:
Following parameters are applicable for all the above credential type's
Resource Group prefix The prefix used to store the snapshots created for the assets
in a different resource group other than the one in which the
assets exist.
Protect assets even if prefixed Resource Groups On selecting this check box, NetBackup Snapshot Manager
are not found would not fail the snapshot operation if resource group does
not exists. It tries to store the snapshot in the original resource
group.
Note: The prefixed resource group region must be same as
the original resource group region.
NetBackup Snapshot Manager cloud providers 116
Microsoft Azure plug-in configuration notes
■ If you are creating multiple configurations for the same plug-in, ensure that they
manage assets from different Tenant IDs. Two or more plug-in configurations
should not manage the same set of cloud assets simultaneously.
■ When you create snapshots, the Azure plug-in creates an Azure-specific lock
object on each of the snapshots. The snapshots are locked to prevent unintended
deletion either from the Azure console or from an Azure CLI or API call. The
lock object has the same name as that of the snapshot. The lock object also
includes a field named "notes" that contains the ID of the corresponding VM or
asset that the snapshot belongs to.
Ensure that the notes field in the snapshot lock objects is not modified or deleted.
Doing so will disassociate the snapshot from its corresponding original asset.
The Azure plug-in uses the ID from the notes fields of the lock objects to
associate the snapshots with the instances whose source disks are either
NetBackup Snapshot Manager cloud providers 117
Microsoft Azure plug-in configuration notes
■ NetBackup Snapshot Manager Azure plug-in does not support the following
Azure regions:
Location Region
US ■ US DoD Central
■ US DoD East
■ US Sec West
condition, the host might move to an unrecoverable state and requires a manual
recovery.
■ If the disk of the VM are encrypted with disk encryption sets, then while restoring
the VM in same or a different subscription, same resource_group_name must
be present with same disk-encryption-set-name as that of source which was
there while taking backup/snapshot. Else during pre-recovery check, restore of
VM fails with the following error:
The {disk-encryption-set-name} disk encryption set does not exist
or it's key is deleted or disabled. Recovery can proceed with key:
EncryptionAtRestWithPlatformKey
{
"properties": {
"roleName": "snapshot-manager-role",
"description": "Necessary permissions for Azure plug-in
operations in CloudPoint",
"assignableScopes": [
"/subscriptions/<SusbcriptionName>"
],
"permissions": [
{
"actions": [
"Microsoft.Storage/*/read",
"Microsoft.Compute/*/read",
"Microsoft.Sql/*/read",
"Microsoft.Compute/disks/write",
NetBackup Snapshot Manager cloud providers 119
Microsoft Azure plug-in configuration notes
"Microsoft.Compute/disks/delete",
"Microsoft.Compute/disks/beginGetAccess/action",
"Microsoft.Compute/disks/endGetAccess/action",
"Microsoft.Compute/snapshots/delete",
"Microsoft.Compute/snapshots/write",
"Microsoft.Compute/snapshots/beginGetAccess/action",
"Microsoft.Compute/snapshots/endGetAccess/action",
"Microsoft.Compute/virtualMachines/write",
"Microsoft.Compute/virtualMachines/delete",
"Microsoft.Compute/virtualMachines/start/action",
"Microsoft.Compute/virtualMachines/vmSizes/read",
"Microsoft.Compute/virtualMachines/powerOff/action",
"Microsoft.Network/*/read",
"Microsoft.Network/networkInterfaces/delete",
"Microsoft.Network/networkInterfaces/effectiveNetworkSecurityGroups/action",
"Microsoft.Network/networkInterfaces/join/action",
"Microsoft.Network/networkInterfaces/write",
"Microsoft.Network/networkSecurityGroups/join/action",
"Microsoft.Network/networkSecurityGroups/write",
"Microsoft.Network/publicIPAddresses/delete",
"Microsoft.Network/publicIPAddresses/join/action",
"Microsoft.Network/publicIPAddresses/write",
"Microsoft.Network/virtualNetworks/subnets/join/action",
"Microsoft.Resources/*/read",
"Microsoft.Resources/subscriptions/tagNames/tagValues/write",
"Microsoft.Resources/subscriptions/tagNames/write",
"Microsoft.Subscription/*/read",
"Microsoft.Authorization/locks/*",
NetBackup Snapshot Manager cloud providers 120
Microsoft Azure plug-in configuration notes
"Microsoft.Authorization/*/read",
"Microsoft.ContainerService/managedClusters/agentPools/read",
"Microsoft.ContainerService/managedClusters/read",
"Microsoft.Compute/virtualMachineScaleSets/write",
"Microsoft.Compute/virtualMachineScaleSets/delete/action",
"Microsoft.Compute/restorePointCollections/read",
"Microsoft.Compute/restorePointCollections/write",
"Microsoft.Compute/restorePointCollections/delete",
"Microsoft.Compute/restorePointCollections/restorePoints/read",
"Microsoft.Compute/restorePointCollections/restorePoints/write",
"Microsoft.Compute/restorePointCollections/restorePoints/delete",
"Microsoft.Compute/restorePointCollections/restorePoints/retrieveSasUris/action",
"Microsoft.Compute/restorePointCollections/restorePoints/diskRestorePoints/read",
"Microsoft.Compute/restorePointCollections/restorePoints/diskRestorePoints/beginGetAccess/action",
"Microsoft.Compute/restorePointCollections/restorePoints/diskRestorePoints/endGetAccess/action"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
]
}
}
NetBackup Snapshot Manager cloud providers 121
Microsoft Azure plug-in configuration notes
The following set of permissions are required to use managed identity for discovery,
create, delete, database authentication and point in time restore(applicable only
for Azure SQL and Managed Instance databases) for supported PaaS databases:
actions": [
"Microsoft.Authorization/*/read",
"Microsoft.Subscription/*/read",
"Microsoft.Resources/*/read",
"Microsoft.ManagedIdentity/*/read",
"Microsoft.Sql/*/read",
"Microsoft.Sql/servers/databases/write",
"Microsoft.Sql/servers/databases/delete",
"Microsoft.Sql/managedInstances/databases/write",
"Microsoft.Sql/managedInstances/databases/delete",
"Microsoft.DBforMySQL/servers/read",
"Microsoft.DBforMySQL/servers/databases/read",
"Microsoft.DBforMySQL/flexibleServers/read",
"Microsoft.DBforMySQL/flexibleServers/databases/read",
"Microsoft.DBforMySQL/servers/databases/write",
"Microsoft.DBforMySQL/flexibleServers/databases/write",
"Microsoft.DBforMySQL/servers/databases/delete",
"Microsoft.DBforMySQL/flexibleServers/databases/delete",
"Microsoft.DBforPostgreSQL/servers/databases/delete",
"Microsoft.DBforPostgreSQL/flexibleServers/databases/delete",
"Microsoft.DBforPostgreSQL/servers/databases/write",
"Microsoft.DBforPostgreSQL/flexibleServers/databases/write",
"Microsoft.DBforPostgreSQL/servers/read",
"Microsoft.DBforPostgreSQL/servers/databases/read",
"Microsoft.DBforPostgreSQL/flexibleServers/read",
"Microsoft.DBforPostgreSQL/flexibleServers/databases/read"
],
"Microsoft.ContainerService/managedClusters/agentPools/read",
"Microsoft.ContainerService/managedClusters/read",
"Microsoft.Compute/virtualMachineScaleSets/write",
"Microsoft.Compute/virtualMachineScaleSets/delete/action"
"Microsoft.DBforMySQL/servers/read",
"Microsoft.DBforMySQL/servers/databases/read",
"Microsoft.DBforMySQL/flexibleServers/read",
"Microsoft.DBforMySQL/flexibleServers/databases/read",
"Microsoft.DBforPostgreSQL/servers/read",
"Microsoft.DBforPostgreSQL/servers/databases/read",
"Microsoft.DBforPostgreSQL/flexibleServers/read",
"Microsoft.DBforPostgreSQL/flexibleServers/databases/read",
"Microsoft.Sql/*/write",
"Microsoft.Sql/*/delete"
If you use system managed identity for the PaaS Azure SQL and Managed Instance,
apply the same set of permissions/rules to the media server(s) and snapshot
manager. If you use user managed identity, attach the same user managed identity
to the media server(s) and snapshot manager.
To create a custom role using powershell, follow the steps mentioned in the Azure
documentation.
For example:
To create a custom role using Azure CLI, follow the steps mentioned in the Azure
documentation.
For example:
Note: Before creating a role, you must copy the role definition given earlier (text in
JSON format) in a .json file and then use that file as the input file. In the sample
command displayed earlier, ReaderSupportRole.json is used as the input file that
contains the role definition text.
■ In NetBackup Snapshot Manager, configure the Azure off-host plug-in with the
application's credentials.
See “Microsoft Azure plug-in configuration notes” on page 112.
Table 5-7 Azure Stack Hub plug-in configuration parameters using AAD
Azure Stack Hub Resource The endpoint URL in the following format, that allows
Manager endpoint URL NetBackup Snapshot Manager to connect with your Azure
resources.
https://management.<location>.<FQDN>
NetBackup Snapshot Manager cloud providers 124
Microsoft Azure Stack Hub plug-in configuration notes
Table 5-7 Azure Stack Hub plug-in configuration parameters using AAD
(continued)
Azure Stack Hub Resource The endpoint URL in the following format, that allows
Manager endpoint URL NetBackup Snapshot Manager to connect with your Azure
resources.
https://management.<location>.<FQDN>
Authentication Resource URL The URL where the authentication token is sent to.
(optional)
■ Disk encryption is not possible with the NetBackup Snapshot Manager Azure
Stack Hub plug-in, because Azure Stack Hub 2008 does not support disk
encryption.
■ NetBackup Snapshot Manager does not support disk-based protection for
applications that store data on virtual disks or storage spaces that are created
from a storage pool. While taking snapshots of such applications, the disk-based
option is not available.
■ NetBackup Snapshot Manager does not support snapshot operations for Ultra
SSD disk types in an Azure Stack environment.
{
"properties": {
"roleName": "snapshot-manager-role",
"description": "Necessary permissions for Azure plug-in
operations in CloudPoint",
"assignableScopes": [
"/subscriptions/<SusbcriptionName>"
],
"permissions": [
{
"actions": [
"Microsoft.Storage/*/read",
"Microsoft.Compute/*/read",
"Microsoft.Sql/*/read",
"Microsoft.Compute/disks/write",
"Microsoft.Compute/disks/delete",
"Microsoft.Compute/disks/beginGetAccess/action",
"Microsoft.Compute/disks/endGetAccess/action",
"Microsoft.Compute/snapshots/delete",
"Microsoft.Compute/snapshots/write",
"Microsoft.Compute/snapshots/beginGetAccess/action",
"Microsoft.Compute/snapshots/endGetAccess/action",
"Microsoft.Compute/virtualMachines/write",
"Microsoft.Compute/virtualMachines/delete",
"Microsoft.Compute/virtualMachines/start/action",
"Microsoft.Compute/virtualMachines/vmSizes/read",
"Microsoft.Compute/virtualMachines/powerOff/action",
"Microsoft.Network/*/read",
"Microsoft.Network/networkInterfaces/delete",
"Microsoft.Network/networkInterfaces/effectiveNetworkSecurityGroups/action",
"Microsoft.Network/networkInterfaces/join/action",
"Microsoft.Network/networkInterfaces/write",
"Microsoft.Network/networkSecurityGroups/join/action",
NetBackup Snapshot Manager cloud providers 127
Microsoft Azure Stack Hub plug-in configuration notes
"Microsoft.Network/networkSecurityGroups/write",
"Microsoft.Network/publicIPAddresses/delete",
"Microsoft.Network/publicIPAddresses/join/action",
"Microsoft.Network/publicIPAddresses/write",
"Microsoft.Network/virtualNetworks/subnets/join/action",
"Microsoft.Resources/*/read",
"Microsoft.Resources/subscriptions/tagNames/tagValues/write",
"Microsoft.Resources/subscriptions/tagNames/write",
"Microsoft.Subscription/*/read",
"Microsoft.Authorization/locks/*",
"Microsoft.Authorization/*/read",
"Microsoft.ContainerService/managedClusters/agentPools/read",
"Microsoft.ContainerService/managedClusters/read",
"Microsoft.Compute/virtualMachineScaleSets/write",
"Microsoft.Compute/virtualMachineScaleSets/delete/action",
"Microsoft.Compute/restorePointCollections/read",
"Microsoft.Compute/restorePointCollections/write",
"Microsoft.Compute/restorePointCollections/delete",
"Microsoft.Compute/restorePointCollections/restorePoints/read",
"Microsoft.Compute/restorePointCollections/restorePoints/write",
"Microsoft.Compute/restorePointCollections/restorePoints/delete",
"Microsoft.Compute/restorePointCollections/restorePoints/retrieveSasUris/action",
"Microsoft.Compute/restorePointCollections/restorePoints/diskRestorePoints/read",
NetBackup Snapshot Manager cloud providers 128
Microsoft Azure Stack Hub plug-in configuration notes
"Microsoft.Compute/restorePointCollections/restorePoints/diskRestorePoints/beginGetAccess/action",
"Microsoft.Compute/restorePointCollections/restorePoints/diskRestorePoints/endGetAccess/action"
],
"notActions": [],
"dataActions": [],
"notDataActions": []
}
]
}
}
To create a custom role using Powershell, follow the steps mentioned in the Azure
Stack documentation.
For example:
To create a custom role using Azure CLI, follow the steps mentioned in the Azure
documentation.
For example:
Note: Before creating a role, you must copy the role definition (text in JSON format)
in a .json file and then use that file as the input file. In the sample command
displayed earlier, registrationrole.json is used as the input file that contains
the role definition text.
Note: The staging location is specific to the subscription ID, you must create one
staging location for each subscription that you are using to restore VMs.
For example:
/resourceGroup/Harsha_RG/storageaccount/harshastorageacc
3 Repeat step 2, for each subscription ID that you are using. Save and close the
file.
Chapter 6
Configuration for
protecting assets on cloud
hosts/VM
This chapter includes the following topics:
No need to connect and ■ For Linux: By default the snapshots would be filesystem
configure the VM's consistent in Azure.
■ For Oracle on Linux:
■ The VM must be in a connected state
Or
■ Pre or post scripts for application consistency must be
configured for the Linux VM as mentioned in the
Application-consistent backup of Azure Linux VMs
documentation.
The agent installs necessary plugins for performing the required operations for
protecting the assets on the host.
One of the following approach can be used to install agents on their hosts that must
be protected:
■ On-host agent
See “Protecting assets with NetBackup Snapshot Manager's on-host agent
feature” on page 132.
■ Agentless
See “Protecting assets with NetBackup Snapshot Manager's agentless feature”
on page 154.
In both the above approaches, the same plug-ins are installed on the host to perform
the operations. However the difference in the above two approaches are as follows:
User must manually install the agent on the The agent can be installed on the host using
host and register it to the Snapshot Manager the NetBackup Web UI, by
host connecting/configuring the VM.
User must not share the Host credentials to The Host/VM credentials must be stored in
the Snapshot Manager, as the user would NetBackup credential manager, so that
install it manually on the host. Snapshot Manager can connect to the host
and install the agent and necessary plugins.
Configuration for protecting assets on cloud hosts/VM 132
Protecting assets with NetBackup Snapshot Manager's on-host agent feature
Connection is permanently setup over Each time when an operation (as follows)
RabbitMQ port 5671 to the host VM from the must be performed on the host, then the
Snapshot Manager to collect and send data. Snapshot Manager temporarily connects to
the VM using SSH port for Linux, WMI and
SMB port for windows and installs the agent:
The agent once installed manually always As the agent is not always present on the host
remains on the host unless it is uninstalled, hence, the name agentless feature.
hence the name on-host agent feature.
If a non-admin user attempts the installation, the installer displays the Windows
UAC prompt where the user must specify the credentials of an admin user.
■ Complete the preparatory steps and install all the dependencies for the respective
agent.
See “Preparing to install the Linux-based agent” on page 136.
See “Preparing to install the Windows-based agent” on page 140.
To download and install the agent
1 Sign in to the NetBackup Web UI.
2 From the left navigation pane, click Cloud and then select the NetBackup
Snapshot Managers tab.
All the NetBackup Snapshot Manager servers that are registered with the
primary server are displayed in this pane.
3 From the desired NetBackup Snapshot Manager server row, click the actions
icon on the right and then select Add agent.
■ For the Windows-based agent, run the agent package file and follow the
installation wizard workflow to install the agent on the Windows application
host.
Note: To allow the installation, admin users will have to click Yes on the
Windows UAC prompt. Non-admin users will have to specify admin user
credentials on the UAC prompt.
8 This completes the agent installation. You can now proceed to register the
agent.
See “Registering the Linux-based agent” on page 136.
See “Registering the Windows-based agent” on page 140.
Linux-based agent
This section describes the procedures for preparing and registering the Linux-based
agent.
Configuration for protecting assets on cloud hosts/VM 136
Protecting assets with NetBackup Snapshot Manager's on-host agent feature
If you do not perform these steps, then the on-host agent registration may fail
with the following error:
Note: The token is valid for 180 seconds only. If you do not copy the token
within that time frame, generate a new token again.
Configuration for protecting assets on cloud hosts/VM 139
Protecting assets with NetBackup Snapshot Manager's on-host agent feature
3 Connect to the Linux host and register the agent using the following command:
# sudo flexsnap-agent --ip <snapshotmanager_host_FQDN_or_IP>
--token <authtoken>
Note: You can use flexsnap-agent --help to see the command help.
NetBackup Snapshot Manager performs the following actions when you run
this command:
4 Return to the NetBackup Web UI, close the Add agent dialog box, and then
from the NetBackup Snapshot Manager server row, click the actions button on
the right and then click Discover.
This triggers a manual discovery of all the assets that are registered with the
NetBackup Snapshot Manager server.
5 Click on the Virtual machines tab.
The Linux host where you installed the agent should appear in the discovered
assets list.
Click to select the Linux host. If the host status is displayed as VM Connected
and a Configure Application button appears, it confirms that the agent
registration is successful.
6 This completes the agent registration. You can now proceed to configure the
application plug-in.
See “Configuring an application plug-in” on page 143.
Windows-based agent
This section describes the procedures for preparing and registering the
Windows-based agent.
Configuration for protecting assets on cloud hosts/VM 140
Protecting assets with NetBackup Snapshot Manager's on-host agent feature
Note: The token is valid for 180 seconds only. If you do not copy the token
within that time frame, generate a new token again.
Note: You can use flexsnap-agent.exe --help to see the command help.
NetBackup performs the following actions when you run this command:
■ registers the Windows-based agent
■ creates a <System
Drive>\ProgramData\Veritas\CloudPoint\etc\flexsnap.conf
configuration file on the Windows instance and updates the file with
NetBackup host information
■ enables and then starts the agent service on the Windows host
Note: If you intend to automate the agent registration process using a script
or a 3rd-party deployment tool, then consider the following:
Even if the agent has been registered successfully, the Windows agent
registration command may sometimes return error code 1 (which generally
indicates a failure) instead of error code 0.
An incorrect return code might lead your automation tool to incorrectly indicate
that the registration has failed. In such cases, you must verify the agent
registration status either by looking in to the flexsnap-agent-onhost logs or from
the NetBackup Web UI.
4 Return to the NetBackup Web UI, close the Add agent dialog box, and then
from the NetBackup Snapshot Manager server row, click the actions button on
the right and then click Discover.
This triggers a manual discovery of all the assets that are registered with the
NetBackup Snapshot Manager server.
Configuration for protecting assets on cloud hosts/VM 143
Protecting assets with NetBackup Snapshot Manager's on-host agent feature
■ NetBackup Snapshot Manager uses the Microsoft Volume Shadow Copy Service
(VSS).
Ensure that you configure VSS to store shadow copies on the same drive (the
originating drive) where the database resides.
See “Configuring VSS to store shadow copies on the originating drive”
on page 161.
■ NetBackup Snapshot Manager does not support discovery, snapshot, and restore
operations for SQL databases that contain leading or trailing spaces or
non-printable characters. This is because the VSS writer goes into an error state
for such databases.
Refer to the following for more details:
Microsoft SQL Server database documentation
■ Before you restore a SQL Availability Group (AG) database, perform the
pre-restore steps manually.
See “Steps required before restoring SQL AG databases” on page 146.
■ New location restore of system database is not supported.
■ If destination instance has AG configured, restore is not supported.
Configuration for protecting assets on cloud hosts/VM 146
Protecting assets with NetBackup Snapshot Manager's on-host agent feature
■ If database exists on new location destination and the overwrite existing option
is not selected, the restore job will fail.
■ If the overwrite existing option is selected for database that is a part of an AG,
the restore job will fail.
■ For system database restore, the SQL Server version must be same. For user
databases, restore from a higher SQL version to a lower version is not allowed.
■ Default timeout of 6 hours is not allowing restore of larger database (size more
than 300 GB). Configurable timeout parameter value can be set to restore larger
database.
See “Troubleshooting NetBackup Snapshot Manager” on page 228.
Note: If you are restoring the AG database to multiple replicas, perform the entire
restore process on the primary replica first, and then repeat the steps for each
secondary replica.
1. For the database that you want to restore, suspend data movement from the
replica.
From the SQL Server Management Studio, right-click on the database and
select Suspend Data Movement.
2. Remove the database from the AG on the replica.
From the SQL Server Management Studio, right-click on the database and
select Remove Database from Availability Group.
Confirm that the database is no longer part of the AG. Observe that the
database on the primary replica is no longer in synchronized mode, and the
status of the corresponding database on the secondary replica appears as
(Restoring...).
Note: If you are restoring the AG database to multiple replicas, perform the entire
restore process on the primary replica first, and then repeat the steps for each
secondary replica.
The snapshot creation and snapshot restore operations will fail if the file is
present on the selected drives.
Perform the following steps to revert the shadow copy
1 Connect to the Windows host where the SQL Server instance is running.
Ensure that you use an account that has administrator privileges on the host.
2 Stop the SQL Server service on the Windows host.
3 Open a command prompt window. If Windows UAC is enabled on the host,
open the command prompt in the Run as administrator mode.
4 Navigate to
%programdata%\Veritas\CloudPoint\tmp\tools\windows\tools\ directory,
and then run the following command from there:
vss_snapshot.exe --revertSnapshot
The command displays a json output with Status = 0 that confirms that the
operation is successful.
This command reverts the shadow copies for all the drives, except the system
drive. The SQL Server service is stopped before the snapshot is reverted and
automatically started after the revert operation is successful.
5 Start the SQL Server service on the Windows host.
Note: These steps are applicable only in case of a SQL Server instance snapshot
restore to a new location. These are not applicable for a SQL Server database
snapshot restore.
Configuration for protecting assets on cloud hosts/VM 149
Protecting assets with NetBackup Snapshot Manager's on-host agent feature
4 View the list of disks on the new host using the following command:
list disk
Identify the new disk that is attached due to the snapshot restore operation
and make a note of the disk number. You will use it in the next step.
5 Select the desired disk using the following command:
select disk <disknumber>
Here, <disknumber> represents the disk that you noted in the earlier step.
6 View the attributes of the selected disk using the following command:
attributes disk
The output displays a list of attributes for the disk. One of the attributes is
read-only, which we will modify in the next step.
7 Modify the read-only attribute for the selected disk using the following command:
attributes disk clear readonly
From the list of volumes displayed, identify the volume for which you want
to assign, modify, or remove a drive letter.
■ Select the desired volume using the following command:
select volume <volnumber>
Here, <volnumber> represents the volume that you noted in the earlier step.
■ Assign a drive letter to the selected volume using the following command:
assign letter=<driveletter>
Here, <driveletter> is the drive letter that you wish to assign to the volume.
Ensure that the specified drive letter is not already in use by another volume.
■ Repeat these steps to assign a drive letter to all the SQL Server volumes
on the disk.
Do not close the command prompt yet; you can use the same window to perform
the remaining steps described in the next section.
2 View the list of all the shadow copies that exist on the new host. Type the
following command:
list shadows all
Identify the shadow copy that you want to use for the revert operation and
make a note of the shadow copy ID. You will use the shadow ID in the next
step.
3 Revert the volume to the desired shadow copy using the following command:
revert <shadowcopyID>
Here, <shadowcopyID> is the shadow copy ID that you noted in the earlier
step.
4 Exit the DiskShadow utility using the following command:
exit
Configuration for protecting assets on cloud hosts/VM 151
Protecting assets with NetBackup Snapshot Manager's on-host agent feature
Oracle plug-in
You can configure the Oracle plug-in to discover and protect your Oracle database
applications with disk-level snapshots.
■ Disk-level restore to a new location fails if the NetBackup plug-in for Oracle is
not configured on the target host.
In such a case, to complete the Oracle snapshot restore to a new location
successfully, you must perform the restore in the following order:
Configuration for protecting assets on cloud hosts/VM 153
Protecting assets with NetBackup Snapshot Manager's on-host agent feature
5 Open the Oracle database for normal usage using the following command:
# ALTER DATABASE OPEN
6 Add an entry of the newly created database in the Oracle listerner.ora and
tnsnames.ora files.
Note: The following steps are provided as a general guideline. Refer to the operating
system or the distribution-specific documentation for detailed instructions on how
to grant password-less sudo access to a user account.
1. Perform the following steps on a host where you want to configure the agentless
feature
2. Verify that the host user name that you provide to NetBackup Snapshot
Manager is part of the wheel group.
Log on as a root user and run the following command:
# usermod -aG wheel hostuserID
Here, hostuserID is the host user name that you provide to NetBackup Snapshot
Manager.
3. Log out and log in again for the changes to take effect.
Configuration for protecting assets on cloud hosts/VM 156
Protecting assets with NetBackup Snapshot Manager's agentless feature
6. In the /etc/sudoers file, edit the entries for the wheel group as follows:
■ Comment out (add a # character at the start of the line) the following line
entry:
# %wheel ALL=(ALL) ALL
■ Uncomment (remove the # character at the start of the line) the following
line entry:
%wheel ALL=(ALL) NOPASSWD: ALL
The changes should appear as follows:
If you do not see any prompt requesting for a password, then the user account
has been granted password-less sudo access.
You can now proceed to configure the NetBackup Snapshot Manager agentless
feature.
■ Enable inbound rules in the firewall for the ports 135, 445 and the dynamic
or fixed WMI-IN ports on Windows hosts.
■ You can use fixed or dynamic WMI-IN ports. If you want to configure a fixed
WMI-IN port, see Setting Up a Fixed Port for WMI.
■ Disable User Account Control for the users groups accessing the agentless
feature.
■ For protecting SQL applications, the user account used for connecting to the
cloud host, must have the required admin privileges to access the SQL server.
Limitation
The NetBackup Snapshot Manager agentless connection fails if FIPS is enabled
on the host where NetBackup Snapshot Manager is installed.
3 Click to select the host and then click Connect in the top bar.
Note: If you have not assigned any credential to the VM, a message prompts you
to assign the credentials before you can connect the VM. See the Managing
Credentials section, in the Web UI Administrator’s Guide.
Note: If instance level SQL server backup is selected, only the databases that
are online are included in the snapshot. The snapshot does not include
databases that are offline or in an erroneous state.
4 On the Choose a protection plan panel, search and select the appropriate
protection plan and then click Protect.
Verify that on the Applications tab, the Protected by column for the selected
asset displays the protection plan that you just assigned. This indicates that
the asset is now being protected by the configured protection plan.
The backup jobs should automatically get triggered as per the schedule defined
in the plan. You can monitor the backup jobs from the Activity monitor pane.
(Applicable only for EKS) Time taken to complete the backup jobs on EKS is
more due to network modulators/snoopers that add delays in the
communication.
Before subscribing a PaaS asset, you need to associate credentials to the database.
For information, refer to the NetBackup Web UI Cloud Administrator's Guide.
For more detailed information on how to subscribe assets to a protection plan, refer
to the NetBackup Web UI Backup Administrator's Guide.
NetBackup Snapshot Manager assets protection 161
Configuring VSS to store shadow copies on the originating drive
Here, maxsize represents the maximum free space usage allowed on the
shadow storage drive. The caret (^) character in the command represents the
Windows command line continuation character.
For example, if the VSS shadow copies of the D: drive are to be stored on the
D: drive and allowed to use up to 80% of the free disk space on D:, the
command syntax is as follows:
NetBackup Snapshot Manager assets protection 162
Additional steps required after restoring an AWS RDS database instance
6 On the Modify DB panel, check for the following properties and ensure that the
attribute values match with those of the original instance:
■ Under Network & Security, verify that the Security group attribute has the
correct security group name assigned.
■ Under Backup, verify that the Copy tags to snapshots option is set as per
the original instance.
■ Under Deletion protection, verify that the Enable deletion protection option
is set as per the original instance.
■ If required, verify all the other parameter values and set them as per your
preference.
7 Once you have modified the desired RDS instance properties, click Continue.
8 Under Scheduling of modifications, choose an appropriate option depending
on when you wish to apply the modifications to the instance and then click
Modify DB instance.
9 Verify the RDS instance properties and ensure that the changes have taken
effect.
Chapter 8
Volume Encryption in
NetBackup Snapshot
Manager
This chapter includes the following topics:
Platform Managed Key (PMK) Same PMK is used as the source disk.
Customer Managed Key (CMK) Same CMK is used as the source disk.
Note: With this release disks would be restored with CMK if the same DES name
is present in target subscription.
Platform Managed Key (PMK) Same PMK is used as the source disk.
Volume Encryption in NetBackup Snapshot Manager 166
Volume encryption for AWS
Note: For successful restoration, the target restore location must be inside the
scope of the key during restoration.
Platform Managed Key (PMK) Same PMK is used as the source disk.
For Azure Stack, you must specify the file path of the root certificates using the
ECA_TRUST_STORE_PATH parameter in the
/cloudpoint/openv/netbackup/bp.conf file in the NetBackup Snapshot Manager.
The value of ECA_TRUST_STORE_PATH must be in the
/cloudpoint/eca/trusted/cacerts.pem file.
Note: If NetBackup is upgraded from version 9.1 to 10.2, then user can delete
the VIRTUALIZATION_CRL_CHECK flag which was enabled for CRL check
between NetBackup and NetBackup Snapshot Manager.
■ Manually append the Azure Stack appliance root public certificates in the
same file.
■ The file must now contain NetBackup and Azure Stack appliance public
root certificates.
■ 0 (disabled): No CRL/OCSP is
performed during validation
■ 1 (leaf): CRL/OSCP validation is
performed only for leaf
■ 2 (chain): CRL/OSCP validation is
performed for the whole chain
NetBackup Snapshot Manager security 172
Securing the connection to NetBackup Snapshot Manager
Note: Cache is invalidated if any of ECA tuneable are added or modified manually
inside the /cloudpoint/flexsnap.conf .
■ Agentless logs
Steps to configure log file rotate and log size command options
1 In /cloudpoint/flexsnap.conf file, enter the log_rotate_age and
log_rotate_size values under logging section and then restart
flexsnap-fluentd container for changes to take effect.
[logging]
log_rotate_age = 7
log_rotate_size = 20000
```
■ log_rotate_age: Specifies the generations to keep rotated log files (the total
number of files that can be accumulated before rotation), the default value
is 30.
■ log_rotate_size: Specifies the log file size (in bytes) after which a single log
file will be rotated, the default value is 100000000 bytes.
STDOUT: This is used to send the NetBackup Snapshot Manager log messages to
/cloudpoint/logs/flexsnap.log.
Note that the changes take effect immediately and are applicable only to the newer
log messages that get generated after the change. The file changes do not apply
to the older logs that were generated before the configuration file was updated.
Log Description
■ bpbkar, bpcd, bpclntcmd, nbcert, vnetd, vxms and all other services logs
can be found inside netbackup directory
To increase logging verbosity, bp.conf and nblog.conf files can be updated on
NetBackup Snapshot Manager at /cloudpoint/openv/netbackup. See NetBackup
Logging Reference Guide
Changes to the bp.conf and nblog.conf files come to effect when the next
backup from snapshot or restore job runs.
Log retention
The default configuration for datamover logs is as follows:
■ Log retention maximum period is 30 days. Logs older than 30 days are deleted.
■ The default configuration for high and low water marks for datamover logs is
70% and 30% of the size of "/cloudpoint" mount point. For example, if the usable
size of the /cloudpoint folder is 30 GB, then the high water mark is 21 GB
(70%) and low water mark is 9GB (30%). In case, the logs directory
(/cloudpoint/openv/dm/) size reaches to high water mark, older logs for which
the datamover containers are cleaned up and no longer running are considered
for deletion. The logs are deleted for such datamover containers until low water
NetBackup Snapshot Manager logging 179
Agentless logs
mark is reached or no logs are remaining for the datamover containers cleaned
up or no longer running.
Modifying the default configuration:
You can modify the default configuration for log retention by adding such a section
in the flexsnap.conf on the primary NetBackup Snapshot Manager. Open the
flexsnap.conf file from the path /cloudpoint/flexsnap.conf and add the
following section:
[datamover]
high_water_mark = 50
low_water_mark = 20
log_retention_in_days = 60
Agentless logs
Logs for agentless connection to cloud instance(s) are present on the cloud instance
at following locations based on the platform:
■ Linux: /tmp/ directory
■ Windows: C:\ProgramData\Veritas\CloudPoint\logs\
NetBackup Snapshot Manager logging 180
Troubleshooting NetBackup Snapshot Manager logging
■ Upgrade scenarios
■ Post-upgrade tasks
■ Post-migration tasks
9.1/9.1.0.1 10.2
10.0/10.1/10.1.1 10.2
Notes:
■ Direct upgrade from older versions to 10.2 is not supported. We need to first
upgrade to 9.1 before upgrading to 10.2 for any upgrade path.
■ Upgrading NetBackup Snapshot Manager across the OS versions is not
supported. If you are using NetBackup Snapshot Manager on a RHEL7.x host,
then you can only migrate it to a RHEL 8.6 or 8.4 host. Then follow the upgrade
paths mentioned in the above table for upgrading NetBackup Snapshot Manager
on a RHEL 8.6 or 8.4 host.
See “Migrating and upgrading NetBackup Snapshot Manager” on page 192., for
more information on migrating and upgrading NetBackup Snapshot Manager
on RHEL.
■ See “Upgrade scenarios” on page 182., for more information on upgrading
NetBackup 8.3.x to NetBackup 10.2.
Upgrade scenarios
The following table lists the NetBackup Snapshot Manager upgrade scenarios.
Note: For the NetBackup version 10.2, NetBackup (primary, media) server and
NetBackup Snapshot Manager version should be at the same level. During upgrade,
first upgrade NetBackup Snapshot Manager and then upgrade NetBackup server.
Upgrading NetBackup Snapshot Manager 183
Upgrade scenarios
Full upgrade from If you plan to upgrade ■ Disable NetBackup Snapshot Manager servers
NetBackup 8.3 or 9.0 NetBackup to 9.1 or later that ■ Upgrade NetBackup Snapshot Manager servers
to NetBackup 9.1 or includes upgrading all ■ Upgrade NetBackup primary server
later NetBackup Snapshot Manager
■ Then enable NetBackup Snapshot Manager servers
servers.
See “Upgrading NetBackup Snapshot Manager” on page 185.
Note: If you do not plan to upgrade one or more NetBackup
Snapshot Manager servers, then you must disable them
using the NetBackup Web UI. In that case, any assets
associated with the disabled NetBackup Snapshot Manager
servers cannot be protected by NetBackup.
Only NetBackup If you plan to upgrade only the ■ Contact Veritas Technical Support to obtain an
Snapshot Manager NetBackup Snapshot Manager Emergency Engineering Binary (EEB) to support the
upgrades to version servers to 9.1 or later, but do not incompatibility between the NetBackup Snapshot
9.1 or later plan to upgrade NetBackup to Manager and NetBackup versions.
9.1 or later. ■ Disable NetBackup Snapshot Manager servers
■ Apply the EEB patch on the NetBackup primary server
and associated media servers.
■ Upgrade NetBackup Snapshot Manager servers
■ Then enable NetBackup Snapshot Manager servers
Upgrading to If your NetBackup 8.3.x server The process for this upgrade is:
NetBackup version has NetBackup Snapshot
■ Disable the NetBackup Snapshot Manager server for
10.2 Manager, you must first upgrade
maintenance in the NetBackup web UI.
NetBackup Snapshot Manager
■ Upgrade the NetBackup Snapshot Manager server from
to NetBackup 9.1.x before you
NetBackup 8.3.x to NetBackup 9.1.x.
upgrade to NetBackup 10.2.
■ Upgrade the NetBackup Snapshot Manager server from
Then you can proceed to
NetBackup 9.1.x to NetBackup 10.2.
upgrade NetBackup 8.3.x to
NetBackup 10.2. ■ Enable the NetBackup Snapshot Manager server in the
NetBackup web UI.
■ Upgrade the NetBackup server from 8.3.x directly to 10.2.
■ Upgrade the media server to 10.2 if it has been configured
with storage units.
Upgrading NetBackup Snapshot Manager 184
Preparing to upgrade NetBackup Snapshot Manager
Migrating VM based If you plan to migrate your VM For the the complete procedure, refer to the "Migration and
NetBackup Snapshot based NetBackup Snapshot upgrade of NetBackup Snapshot Manager" section of
Manager to Manager to a managed NetBackup™ Deployment Guide for Azure Kubernetes
Kubernetes Kubernetes cluster. Services (AKS) Cluster.
deployment
Migrating and If you plan to migrate and See “Migrating and upgrading NetBackup Snapshot
upgrading the upgrade NetBackup Snapshot Manager” on page 192.
NetBackup Snapshot Manager on RHEL 8.6 or 8.4
Manager on RHEL
■ To cancel the pending SLP operation for a specific image, use nbstlutil
cancel -backupid <value>
■ To cancel the pending SLP operation for images that belong to specific
lifecycle, use nbstlutil cancel -lifecycle <name>
■ On the NetBackup primary server, run the following command to stop all
NetBackup processes:
■ UNIX: /usr/openv/netbackup/bin/bp.kill_all
■ Windows: install_path\NetBackup\bin\bpdown -f
■ After you upgrade NetBackup Snapshot Manager, if required you can upgrade
the NetBackup primary server. Also, you must enable the NetBackup Snapshot
Manager server from NetBackup Web UI.
■ After upgrading, all the NetBackup Snapshot Manager that you want to use for
backup from snapshot or restore from backup jobs, must be re-edited by
providing a token so that NetBackup certificates are generated in the NetBackup
Snapshot Manager. See Edit a NetBackup Snapshot Manager section, in the
NetBackup Web UI Cloud Administrator's Guide.
Note: The actual file name may vary depending on the release version.
2 Copy the downloaded compressed image file to the computer on which you
want to deploy NetBackup Snapshot Manager.
Upgrading NetBackup Snapshot Manager 186
Upgrading NetBackup Snapshot Manager
# ls
NetBackup_SnapshotManager_10.2.x.x.xxxx.tar.gz
netbackup-flexsnap-10.2.x.x.xxxx.tar.gz
flexsnap_preinstall.sh
4 Run the following command to prepare the NetBackup Snapshot Manager host
for installation:
# sudo ./flexsnap_preinstall.sh
For Docker
Note: Ensure that you enter the command without any line breaks.
Wait for all the NetBackup Snapshot Manager containers to be stopped and
then proceed to the next step.
6 Depending on the environment, upgrade NetBackup Snapshot Manager by
running the following command:
■ For Podman
■ For Docker
Note: Ensure that you enter the command without any line breaks.
Upgrading NetBackup Snapshot Manager 189
Upgrading NetBackup Snapshot Manager
7 The installer first loads the individual service images and then launches them
in their respective containers.
The output resembles the following (Below is an example of the Podman
environment output:
8 (Optional) Run the following command to remove the previous version images.
(For Podman) # podman rmi -f <imagename>:<oldimage_tagid>
(For Docker) # docker rmi -f <imagename>:<oldimage_tagid>
Upgrading NetBackup Snapshot Manager 190
Upgrading NetBackup Snapshot Manager using patch or hotfix
# ls
NetBackup_SnapshotManager_10.2.x.x.xxxx.tar.gz
netbackup-flexsnap-10.2.x.x.xxxx.tar.gz
flexsnap_preinstall.sh
Upgrading NetBackup Snapshot Manager 191
Upgrading NetBackup Snapshot Manager using patch or hotfix
3 Run the following command to prepare the NetBackup Snapshot Manager host
for installation:
# sudo ./flexsnap_preinstall.sh
For Docker
■ For Docker
Note: Ensure that you enter the command without any line breaks.
The installer first loads the individual service images and then launches them
in their respective containers.
6 (Optional) Run the following command to remove the previous version images.
(For Podman) # podman rmi -f <imagename>:<oldimage_tagid>
(For Docker) # docker rmi -f <imagename>:<oldimage_tagid>
7 To verify that the new NetBackup Snapshot Manager version is installed
successfully:
See “Verifying that NetBackup Snapshot Manager is installed successfully”
on page 43.
8 This concludes the NetBackup Snapshot Manager upgrade process using a
patch or a hotfix . Verify that your NetBackup Snapshot Manager configuration
settings and data are preserved as is.
■ Run the following commands to install the required packages (lvm2, udev and
dnsmaq) on the hosts:
#yum install -y lvm2-<version>
#yum install -y lvm2-libs-<version>
#yum install -y systemd-udev-<version>
#yum install -y podman-plugins
■ Run the following commands to lock the Podman and Conmon versions to the
supported versions, so that they do not get updated with the yum update:
sudo yum install -y podman-4.0.2-7.module+el8.3.1+9857+68fb1526
Upgrading NetBackup Snapshot Manager 194
Migrating and upgrading NetBackup Snapshot Manager
■ Verify that specific ports are open on the instance or physical host.
See “Verifying that specific ports are open on the instance or physical host”
on page 31.
Next, you migrate NetBackup Snapshot Manager from the RHEL 7.x host to the
newly prepared RHEL 8.6 or 8.4 host.
See “Migrate and upgrade NetBackup Snapshot Manager on RHEL 8.6 or 8.4”
on page 194.
# ls
NetBackup_SnapshotManager_10.2.x.x.xxxx.tar.gz
netbackup-flexsnap-10.2.x.x.xxxx.tar.gz
flexsnap_preinstall.sh
3 Run the following command to prepare the NetBackup Snapshot Manager host
for installation:
# sudo ./flexsnap_preinstall.sh
Upgrading NetBackup Snapshot Manager 195
Migrating and upgrading NetBackup Snapshot Manager
Note: Ensure that you enter the command without any line breaks.
The installer first loads the individual service images and then launches them
in their respective containers.
5 (Optional) Run the following command to remove the previous version images.
# docker rmi -f <imagename>:<oldimage_tagid>
1 On the RHEL 7.x host, verify that there are no protection policy snapshots or
other operations in progress and then stop NetBackup Snapshot Manager by
running the following command:
Note: This is a single command. Ensure that you enter the command without
any line breaks.
Wait for all the NetBackup Snapshot Manager containers to be stopped and
then proceed to the next step.
2 Migrate the NetBackup Snapshot Manager configuration data to the RHEL 8.6
or 8.4 host:
■ If you have created a new system with RHEL 8.6 or 8.4:
■ Run the following command to unmount /cloudpoint from the current
host.
# umount /cloudpoint
Note: For detailed instructions to detach or attach the data disks, follow
the documentation provided by your cloud or storage vendor.
Upgrading NetBackup Snapshot Manager 199
Migrating and upgrading NetBackup Snapshot Manager
■ On the RHEL8.6 or 8.4 host, run the following commands to create and
mount the disk:
# mkdir /cloudpoint
# mount /dev/<diskname> /cloudpoint
For vendor-specific details
See “Creating and mounting a volume to store NetBackup Snapshot
Manager data” on page 30.
■ If you have upgraded from RHEL 7.x to RHEL 8.6 or 8.4, copy the
/cloudpoint mountpoint data from RHEL 7.x system and move it to the
RHEL8.6 or 8.4 system under /cloudpoint folder.
This concludes the NetBackup Snapshot Manager migration process.
After migration, install the new_version on the new host by following the steps
mentioned in the To upgrade NetBackup Snapshot Manager in docker
environment.
3 During migration process, if NetBackup Snapshot Manager is migrated to
another system or IP address is changed, then regenerate the certificates as
follows:
■ Stop the NetBackup Snapshot Manager services using the following
command:
# podman run -it --rm -u 0 -v /cloudpoint:/cloudpoint -v
/run/podman/podman.sock:/run/podman/podman.sock
veritas/flexsnap-deploy:10.2.x.x.xxxx stop
■ Example 2:
For GCP1: us-east1 and us-west1
For GCP2: us-east1
User can remove us-east1 from GCP2 by using delete_plugin option from
tpconfig command.
■ Example 3:
For GCP1: us-east1
For GCP2: us-east1
User can remove any one provider configuration by using delete_plugin option
from tpconfig command.
Post-upgrade tasks
You may need to perform the following tasks after a successful upgrade of the
NetBackup Snapshot Manager server.
Post-upgrade tasks
1 Upgrade the NetBackup Snapshot Manager agents on the Linux and Windows
application hosts.
Note: If you are upgrading from NetBackup Snapshot Manager 8.3 to 9.0 or
9.1, then you must manually upgrade the on-host agents. If you are upgrading
from NetBackup Snapshot Manager 9.0 to 9.1, upgrading the on-host agents
is optional.
Upgrading NetBackup Snapshot Manager 203
Post-upgrade tasks
■ Repeat these steps on all the Linux hosts where you wish to upgrade the
Linux-based agent.
Note the following:
When upgrading from CloudPoint agent to Flexsnap agent, uninstall CloudPoint
agent first and then install the Flexsnap agent using the following recommended
uninstallation and installation commands:
■ Uninstallation: sudo yum -y remove cloudpoint_agent_rpm_name
■ Installation: sudo yum -y install flexnsap_agent_rpm_name
■ Connect to the Linux host and re-register the agent using the following
command:
sudo flexsnap-agent --ip <snapshotmanager_host_FQDN_or_IP>
--token <authtoken>
■ Run the newer version of the agent package file and follow the installation
wizard workflow to upgrade the on-host agent on the Windows host.
The installer detects the existing installation and upgrades the package to
the new version automatically.
■ Generate the token for agent configuration. Navigate to NetBackup Web
UI > Cloud > NetBackup Snapshot Managers > Actions > Add agent >
Create Token.
■ Repeat these steps on all the Windows hosts where you wish to upgrade
the Windows-based agent.
For details on how to download the agent installation package from the
NetBackup UI, refer to the following:
See “Downloading and installing the NetBackup Snapshot Manager agent”
on page 133.
2 If you want to run backup from snapshot and restore from backup jobs after
upgrade, you must update the NetBackup configuration so that the upgraded
NetBackup Snapshot Manager configuration details are available with
NetBackup. After upgrading, all the NetBackup Snapshot Manager that you
want to use for backup from snapshot or restore from backup jobs, must be
re-edited by providing a token so that NetBackup certificates are generated.
See Edit a NetBackup Snapshot Manager section, in the NetBackup Web UI
Cloud Administrator's Guide.
Perform one of the following actions:
■ From the NetBackup Web UI, edit the NetBackup Snapshot Manager server
information.
■ In the Web UI, click Workloads > Cloud from the left navigation pane
and then click the NetBackup Snapshot Manager servers tab.
■ Select the NetBackup Snapshot Manager server that you just upgraded,
and then click Edit from the ellipsis action button on the right.
■ In the Edit NetBackup Snapshot Manager server dialog, specify all the
requested details.
■ Click Validate to validate the NetBackup Snapshot Manager server
certificate.
■ In the Token field enter the Standard Host Token.
■ Click Save to update the NetBackup Snapshot Manager server
configuration.
actions": [
"Microsoft.Compute/restorePointCollections/read",
"Microsoft.Compute/restorePointCollections/write",
"Microsoft.Compute/restorePointCollections/delete",
"Microsoft.Compute/restorePointCollections/restorePoints/read",
"Microsoft.Compute/restorePointCollections/restorePoints/write",
"Microsoft.Compute/restorePointCollections/restorePoints/delete",
"Microsoft.Compute/restorePointCollections/restorePoints/
retrieveSasUris/action",
"Microsoft.Compute/restorePointCollections/restorePoints/
diskRestorePoints/read",
"Microsoft.Compute/restorePointCollections/restorePoints/
diskRestorePoints/beginGetAccess/action",
"Microsoft.Compute/restorePointCollections/restorePoints/
diskRestorePoints/endGetAccess/action"
],"
Upgrading NetBackup Snapshot Manager 206
Post-upgrade tasks
customresourcedefinition.apiextensions.k8s.io/cloudpoint-servers.veritas.com
condition met
Generating Snapshot Manager Custom Resource Definition object
deployment "flexsnap-deploy" successfully rolled out
cloudpointrule.veritas.com/cloudpoint-config-rule configured
Snapshot Manager extension installation ...done
Upgrading NetBackup Snapshot Manager 207
Post-upgrade tasks
Executable way
■ Permit the script to run as an executable:
# chmod +x cp_extension_start.sh
# ls
NetBackup_SnapshotManager_10.2.x.x.xxxx.tar.gz
netbackup-flexsnap-10.2.x.x.xxxx.tar.gz
flexsnap_preinstall.sh
3 Run the following command to prepare the Snapshot Manager host for
installation:
# ./flexsnap_preinstall.sh
Post-migration tasks
After migration, if the name is changed to NetBackup Snapshot Manager, then
perform the following steps for Linux and Windows on-host agent renews and then
perform the plugin level discovery:
For Linux:
Upgrading NetBackup Snapshot Manager 209
Post-migration tasks
■ Edit the /etc/flexsnap.conf file and update the targeted field with new IP/host
of NetBackup Snapshot Manager.
For example,
[agent]
id = agent.c2ec74c967e043aaae5818e50a939556
■ Perform the Linux on-host agent renew using the following command:
/opt/VRTScloudpoint/bin/flexsnap-agent --renew --token <auth_token>
For Windows:
■ Edit the \etc\flexsnap.conf and update the targeted field with new IP/host
of NetBackup Snapshot Manager.
For example,
[global]
target = nbuxqa-alphaqa-10-250-172-172.vxindia.veritas.com
hostid = azure-vm-427a67a0-6f91-4a35-abb0-635e099fe9ad
[agent]
id = agent.3e2de0bf17d54ed0b54d4b33530594d8
■ Perform the Windows on-host agent renew using the following command:
"c:\ProgramFiles\Veritas\CloudPoint\flexsnap-agent.exe" --renew
--token <auth_token>
Chapter 12
Uninstalling NetBackup
Snapshot Manager
This chapter includes the following topics:
■ Ensure that you remove the NetBackup Snapshot Manager agents that are
installed on the application hosts. The application hosts are the systems where
the applications that are being protected by NetBackup Snapshot Manager are
running.
See “Removing the NetBackup Snapshot Manager agents” on page 217.
■ Ensure that you disable the NetBackup Snapshot Manager server from
NetBackup. Depending on how you have set up your NetBackup Snapshot
Manager server, whether on-premise or in the cloud, you can disable NetBackup
Snapshot Manager server from the NetBackup Web UI .
Refer to the NetBackup Snapshot Manager for Data Center Administrator’s
Guide for instructions.
■ All the snapshot data and configuration data from your existing installation is
maintained in the external /cloudpoint data volume. This information is external
to the NetBackup Snapshot Manager containers and images and is deleted after
the uninstallation.
You can take a backup of all the data in the /cloudpoint volume, if desired.
See “Backing up NetBackup Snapshot Manager” on page 212.
Uninstalling NetBackup Snapshot Manager 212
Backing up NetBackup Snapshot Manager
Note: This is a single command. Ensure that you enter the command without
any line breaks.
2 Ensure that all NetBackup Snapshot Manager containers are stopped. This
step is important because all activity and connections to and from NetBackup
Snapshot Manager must be stopped to get a consistent NetBackup Snapshot
Manager backup.
Enter the following:
(For Docker) # sudo docker ps | grep veritas
(For Podman) # sudo podman ps | grep veritas
This command should not return any actively running NetBackup Snapshot
Manager containers.
Uninstalling NetBackup Snapshot Manager 213
Backing up NetBackup Snapshot Manager
3 (Optional) If you still see any active containers, repeat step 2. If that does not
work, run the following command on each active container:
(For Docker) # sudo docker kill container_name
(For Podman) # sudo podman kill container_name
As an example following is the command for docker environment:
# sudo docker kill flexsnap-api
4 After all the containers are stopped, take a snapshot of the volume on which
you installed NetBackup Snapshot Manager. Use the cloud provider's snapshot
tools.
5 After the snapshot completes, restart NetBackup Snapshot Manager services.
Use the following command:
(For Docker) # sudo docker run -it --rm -u 0 -v
/full_path_to_volume_name:/full_path_to_volume_name-v
/var/run/docker.sock:/var/run/docker.sock
veritas/flexsnap-deploy:version start
Note: This is a single command. Ensure that you enter the command without
any line breaks.
Uninstalling NetBackup Snapshot Manager 214
Backing up NetBackup Snapshot Manager
Note: This is a single command. Ensure that you enter the command without
any line breaks.
2 Ensure that all NetBackup Snapshot Manager containers are stopped. This
step is important because all activity and connections to and from NetBackup
Snapshot Manager must be stopped to get a consistent NetBackup Snapshot
Manager backup.
Enter the following:
(For Docker) # sudo docker ps | grep veritas
(For Podman) # sudo podman ps | grep veritas
This command should not return any actively running NetBackup Snapshot
Manager containers.
Uninstalling NetBackup Snapshot Manager 215
Unconfiguring NetBackup Snapshot Manager plug-ins
3 (Optional) If you still see any active containers, repeat step 2. If that does not
work, run the following command on each active container:
(For Docker) # sudo docker kill container_name
(For Podman) # sudo podman kill container_name
As an example following is the command for docker environment:
# sudo docker kill flexsnap-api
4 Back up the folder /cloudpoint. Use any backup method you prefer.
For example:
# tar -czvf cloudpoint_dr.tar.gz /cloudpoint
3 From the menu on the left, click Workloads > Cloud and then click the Virtual
machines tab.
4 On the Virtual machines tab, select the host where you want unconfigure the
agent and then from the menu bar that appears at the top, click Unconfigure.
NetBackup Snapshot Manager unconfigures the plug-in from the host. Observe
that the Unconfigure button now changes to Configure. This indicates that
the plug-in unconfiguration is successful on the host.
To unconfigure the agent entry from the NetBackup Snapshot Manager server
1 Sign in to the NetBackup UI.
2 Remove NetBackup Snapshot Manager plug-in configuration from the host
that you wish to disconnect.
See “Unconfiguring NetBackup Snapshot Manager plug-ins” on page 215.
3 From the menu on the left, click Workloads > Cloud and then click the Virtual
machines tab.
4 On the Virtual machines tab, select the host where you want unconfigure the
agent and then from the menu bar that appears at the top, click Disconnect.
NetBackup Snapshot Manager begins to unconfigure the agent. Observe that
the Disconnect button now changes to Connect. This indicates that the
disconnect operation is successful and the agent has been unconfigured
successfully.
The agent registration and all the assets information about that host is
completely removed from the database.
5 The next step is to manually uninstall the agent from the host on which you
performed the disconnect operation. This is required if you wish to protect this
host and its assets using NetBackup Snapshot Manager at a later time.
See “Removing the NetBackup Snapshot Manager agents” on page 217.
Note: To allow the uninstallation, admin users will have to click Yes on the
Windows UAC prompt. Non-admin users will have to specify admin user
credentials on the UAC prompt.
During uninstallation, the installer performs the following tasks on the NetBackup
Snapshot Manager host:
■ Stops all the NetBackup Snapshot Manager containers that are running
■ Removes the NetBackup Snapshot Manager containers
■ Unloads and removes the NetBackup Snapshot Manager images
(For Podman)
Parameter Description
If using a proxy server, then using the examples provided in the table earlier,
the command syntax for docker is as follows:
# sudo docker run -it --rm -u 0 -v /cloudpoint:/cloudpoint -e
VX_HTTP_PROXY="http://proxy.mycompany.com:8080/" -e
VX_HTTPS_PROXY="http://proxy.mycompany.com:8080/" -e
VX_NO_PROXY="localhost,mycompany.com,192.168.0.10:80" -v
/var/run/docker.sock:/var/run/docker.sock
veritas/flexsnap-deploy:10.2.x.x.xxxx uninstall
Note: This is a single command. Ensure that you enter the command without
any line breaks.
Use the following docker command to view the docker images that are loaded
on the host:
■ (For Docker) # sudo docker images -a
■ (For Podman) # sudo podman images -a
Use the following respective commands to remove the NetBackup Snapshot
Manager container images from the host:
■ (For Docker) # sudo docker rmi <image ID>
■ (For Podman) # sudo podman rmi <image ID>
Example:
Example:
Parameter Description
Parameter Description
For example:
# mkdir /cloudpoint
6 Mount the attached volume to the installation directory you just created.
Use the following command:
# mount /dev/device-name
/full_path_to_cloudpoint_installation_directory
For example:
# mount /dev/xvdb /cloudpoint
7 Verify that all NetBackup Snapshot Manager related configuration data and
files are in the directory.
Enter the following command:
# ls -l /cloudpoint
(For Podman)
Note: This is a single command. Ensure that you enter the command without
any line breaks.
(For Podman)
Note: This is a single command. Ensure that you enter the command without
any line breaks.
4 When the installation completes, you can resume working with NetBackup
Snapshot Manager using your existing credentials.
Chapter 13
Troubleshooting
NetBackup Snapshot
Manager
This chapter includes the following topics:
■ SQL snapshot or restore and granular restore operations fail if the Windows
instance loses connectivity with the NetBackup Snapshot Manager host
■ Disk-level snapshot restore fails if the original disk is detached from the instance
■ Discovery is not working even after assigning system managed identity to the
control node pool
■ On Windows hosts:
Restart the Veritas NetBackup Snapshot Manager™ Agent service from
the Windows Services console.
■ Execute the following command on the primary server to get the NBU UUID:
/usr/openv/netbackup/bin/admincmd/nbhostmgmt -list -host
<primary server host name> | grep "Host ID"
■ The snapshot job is successful but backup job fails with error "The
NetBackup Snapshot Managers certificate is not valid or doesn't
exist.(9866)" when ECA_CRL_CHECK disabled on master server.
If ECA_CRL_CHECK is configured on master server and is disabled then it
must be configured in bp.conf on NetBackup Snapshot Manager setup with
same value.
For example, considering a scenario of backup from snapshot where NetBackup
is configured with external certificate and certificate is revoked. In this case, if
ECA_CRL_CHECK is set as DISABLE on master then set the same value in
bp.conf of NetBackup Snapshot Manager setup, otherwise snapshot operation
will be successful and backup operation will fail with the certificate error.
See “Configuring security for Azure Stack ” on page 168.
■ NetBackup Snapshot Manager fails to establish connection using agentless
to the Windows cloud instance
Error 1: <Instance_name>: network connection timed out.
Case 1: NetBackup Snapshot Manager server log message:
Workaround:
To resolve this issue, try the following steps:
■ Verify if the SMB port 445 is added in the Network security group and is
accessible from the NetBackup Snapshot Manager.
■ Verify if the SMB port 445 is allowed through cloud instance firewall.
Case 2: NetBackup Snapshot Manager log message:
Workaround:
Troubleshooting NetBackup Snapshot Manager 232
Troubleshooting NetBackup Snapshot Manager
Error: Cannot connect to the remote host. <IP address> Access denied.
Workaround::
To resolve this issue, try the following steps:
■ Verify if the user is having administrative rights.
■ Verify if the UAC is disabled for the user.
■ Restart Docker
# systemctl restart docker
■ Backup from Snapshot job and Indexing job fails with the errors
and/or
This can happen when the inbound access to NetBackup Snapshot Manager
on port 5671 and 443 port gets blocked at the OS firewall level (firewalld). Hence,
Troubleshooting NetBackup Snapshot Manager 234
Troubleshooting NetBackup Snapshot Manager
from the datamover container (used for the Backup from Snapshot and Indexing
jobs), communication to NetBackup Snapshot Manager gets blocked. This
results in the datamover container not being able to start the backup or indexing.
Workaround:
Modify the rules in OS firewall to allow the inbound connection from 5671 and
443 port.
■ Agentless connection fails for a VM with an error message.
Agentless connection fails for a VM with the following error message when user
changes the authentication type from SSH Key based to password based for a
VM through the portal:
This issue occurs when the permissions are not defined correctly for the user
in the sudoers file as mentioned in the above error message.
Workaround:
Resolve the sudoers file issue for the user by providing the required permissions
to perform the passwordless sudo operations.
■ When NetBackup Snapshot Manager is deployed in private subnet (without
internet) NetBackup Snapshot Manager function fails
This issue occurs when NetBackup Snapshot Manager is deployed in private
network where firewall is enabled or public IP which is disabled. The customer’s
information security team would not allow full internet access to the virtual
machine's.
Workaround:
Enable the ports from the firewall command line using the following commands:
firewall-cmd --add-port=22/tcp
firewall-cmd --add-port=5671/tcp
firewall-cmd --add-port=443/tcp
■ SEQ is over the upper bound (over the window of the receiver)
If nf_conntrack_tcp_be_liberal = 0 then those are also rejected as invalid.
Workaround:
To resolve the issue of restore from backup copy, use the
nf_conntrack_tcp_be_liberal = 1 option and set this value on node where
datamover container is running.
Use the following command for setting the value of
nf_conntrack_tcp_be_liberal:
sysctl -w net.netfilter.nf_conntrack_tcp_be_liberal=1
Workaround:
Check if there is a file with IP address entry mapping to the container that could
not be started at/var/lib/cni/networks/flexsnap-network/ file system
location.
[ec2-user@ip-172-31-44-163 ~]$ ls -latr
/var/lib/cni/networks/flexsnap-network/ total 16 -rwxr-x---. 1
root root 0 Jan 22 12:30 lock drwxr-xr-x. 4 root root 44 Jan 22
12:30 .. -rw-r--r--. 1 root root 70 Feb 4 14:47 10.89.0.150
-rw-r--r--. 1 root root 70 Feb 4 14:47 10.89.0.151 -rw-r--r--. 1
root root 70 Feb 4 14:47 10.89.0.152 -rw-r--r--. 1 root root 11
Troubleshooting NetBackup Snapshot Manager 236
Troubleshooting NetBackup Snapshot Manager
Workaround:
Run the following #podman CLI(s) command:
flexsnap-mongodb
{"Status":"healthy","FailingStreak":0,"Log":[{"Start":"2022-02-14T07:32:13.051150432Z","End":"2022-02-14T07:32:13.444636429Z","ExitCode":0,"Output":""}]}
{"Status":"healthy","FailingStreak":0,"Log":[{"Start":"2022-02-14T07:32:46.537804403Z","End":"2022-02-14T07:32:47.293695744Z","ExitCode":0,"Output":""}]}
[ec2-user@ip-172-31-23-60 log]$
■ Agentless connection and granular restore to restored host fails when the
VM restored from backup has 50 tags attached to it
Workaround:
(For AWS) If a Windows VM restored from backup has 50 tags and platform tag
does not exists, user can remove any tag that is not required and add the
Platform: windows tag.
■ For few GKE versions, failed pod issues are observed in namespace
Following few failed pods in namespace is observed with failure status as
NodeAffinity:
0 4d14h
flexsnap-fluentd-collector-c88f8449c-5jkqh 0/1 NodeAffinity
0 3d15h
flexsnap-fluentd-collector-c88f8449c-ph8mx 0/1 NodeAffinity
0 39h
flexsnap-fluentd-collector-c88f8449c-rqw7w 1/1 Running
0 10h
flexsnap-fluentd-collector-c88f8449c-sswzr 0/1 NodeAffinity
0 5d18h
flexsnap-fluentd-ftlnv 1/1 Running
3 (10h ago)10h
flexsnap-listener-84c66dd4b8-6l4zj 1/1 Running
0 10h
flexsnap-listener-84c66dd4b8-ls4nb 0/1 NodeAffinity
0 17h
flexsnap-listener-84c66dd4b8-x84q8 0/1 NodeAffinity
0 3d15h
flexsnap-listener-84c66dd4b8-z7d5m 0/1 NodeAffinity
0 5d18h
flexsnap-operator-6b7dd6c56c-cf4pc 1/1 Running
0 10h
flexsnap-operator-6b7dd6c56c-qjsbs 0/1 NodeAffinity
0 5d18h
flexsnap-operator-6b7dd6c56c-xcsgj 0/1 NodeAffinity
0 3d15h
flexsnap-operator-6b7dd6c56c-z86tc 0/1 NodeAffinity
0 39h
{
"CPServer1": [
{
"Plugin_ID": "test",
"Plugin_Type": "aws",
"Config_ID": "aws.8dda1bf5-5ead-4d05-912a-71bdc13f55c4",
"Plugin_Category": "Cloud",
"Disabled": false
}
]
},
{
"CPServer2": [
{
"Plugin_ID": "gcp.2080179d-c149-498a-bf1f-4c9d9a76d4dd",
"Plugin_Type": "gcp",
"Config_ID": "gcp.2080179d-c149-498a-bf1f-4c9d9a76d4dd",
"Plugin_Category": "Cloud",
"Disabled": false
},
{
"Plugin_ID": "gcp.2080179d-c149-498a-bf1f-4c9d9a76d4dd",
"Plugin_Type": "gcp",
"Config_ID": "gcp.2080179d-c149-498a-bf1f-4c9d9a76d4dd",
"Plugin_Category": "Cloud",
"Disabled": false
}
]
}
Manually edit and delete the duplicated plugin information from the
CloudPoint_plugin.conf file.
For example, consider the following example where the duplicate entry for Azure
plugin config is visible (in bold) in CloudPoint_plugin.conf file:
{
"CPServer1": [
{
"Plugin_ID": "config10",
"Plugin_Type": "azure",
"Config_ID": "azure.327ec7fc-7a2d-4e94-90a4-02769a2ba521",
"Plugin_Category": "Cloud",
"Disabled": false
}
]
},
{
"CPServer2": [
{
"Plugin_ID": "azure.327ec7fc-7a2d-4e94-90a4-02769a2ba521",
"Plugin_Type": "azure",
"Config_ID": "azure.327ec7fc-7a2d-4e94-90a4-02769a2ba521",
"Plugin_Category": "Cloud",
"Disabled": false
},
{
"cpserver101.yogesh.joshi2-dns-zone": [
{
"Plugin_ID": "azure.327ec7fc-7a2d-4e94-90a4-02769a2ba521",
"Plugin_Type": "azure",
"Config_ID": "azure.327ec7fc-7a2d-4e94-90a4-02769a2ba521",
"Plugin_Category": "Cloud",
"Disabled": false
},
{
"Plugin_ID": "AZURE_PLUGIN",
"Plugin_Type": "azure",
"Config_ID": "azure.4400a00a-8d2b-4985-854a-74f48cd4567e",
Troubleshooting NetBackup Snapshot Manager 242
SQL snapshot or restore and granular restore operations fail if the Windows instance loses connectivity with
the NetBackup Snapshot Manager host
"Plugin_Category": "Cloud",
"Disabled": false
}
]
}
]
}
Workaround:
To resolve this issue, restart the Veritas NetBackup Snapshot Manager Agent
service on the Windows instance.
Workaround:
If the restore has already failed in the environment, you may have to manually
perform a disk cleanup first and then trigger the restore job again.
Troubleshooting NetBackup Snapshot Manager 244
Discovery is not working even after assigning system managed identity to the control node pool
3 From the NetBackup UI, trigger the disk-level restore operation again.
In general, if you want to detach the original application disks from the instance,
use the following process for restore:
1. First take a disk-level snapshot of the instance.
2. After the snapshot is created successfully, manually detach the disk from the
instance.
For example, if the instance is in the AWS cloud, use the AWS Management
Console and edit the instance to detach the data disk. Ensure that you save
the changes to the instance.
3. Log on to the instance using an administrative user account and then run the
following command:
# sudo umount /<application_diskmount>
If you see a "device is busy" message, wait for some time and then try the
umount command again.
But it could not discover the assets if there are insufficient permissions added in
System managed identity. Discovery and NetBackup Snapshot Manager related
operations would not work even if System managed identity is enabled and
required permission/role is added to System managed identity later on. Because
it will always use User managed identity at the backend of NetBackup Snapshot
Manager.
To resolve this issue, perform the following steps
1 Update the required permission/role and then add the permissions to User
managed identity and run the required operations again.
2 Edit the corresponding Azure provider configuration in NetBackup Web UI and
run the required operations again.
The following table lists the scenarios and expected outcomes of different Azure
plug-in configurations:
Reader CP-Permissions No
Reader Reader No
CP-Permissions Reader No
Reader Reader No
Note: In the above table, CP-Permissions is a role that has permission to take
snapshot andReader is a role that does not have permission to take the snapshot.
max_backup_jobs = 4
flexsnap-workflow-general-1665398188-4d03f27e-fblxb
0/1 ContainerCreating 0
142m
flexsnap-workflow-general-1665398188-538a8846-zrgtl
0/1 ContainerCreating 0
142m
flexsnap-workflow-general-1665398188-87cb301a-5bqss
Troubleshooting NetBackup Snapshot Manager 249
Upgrade of extension on AWS (EKS) fails when upgrading through script
0/1 ContainerCreating 0
142m
flexsnap-workflow-general-1665398188-f61f5f42-g2rhv
0/1 ContainerCreating 0
142m
To resolve this issue, refer to the AWS troubleshooting section and implement the
solution. Contact the AWS support for further troubleshooting.
# ./cp_extension.sh install
error: error executing jsonpath "{.items[0].spec.providerID}[0]":
Error executing template: array index out of bounds: index 0, length
0. Printing more
Troubleshooting NetBackup Snapshot Manager 250
Backup from snapshot job fails with timeout error
Note: The above issue is observed when upgrading the extension on AWS (EKS)
from NetBackup version 10.1 to 10.2.
Workaround:
To resolve this issue, uninstall the extension on AWS (EKS) version 10.1 and
reinstall the latest version 10.2 extension on AWS (EKS). For more information on
uninstalling and reinstalling extension on AWS (EKS), refer to the following sections:
See “Removing NetBackup Snapshot Manager extensions - VM-based or managed
Kubernetes cluster-based” on page 221.
See “Installing the extension on AWS (EKS)” on page 64.
where, <num> is the maximum number of backup jobs that can run at a time.
In case of multiple backup from snapshot jobs running in parallel, if any service fails
due to non availability of resources then reduce the number of parallel backup from
snapshot jobs that can be performed on the provided node type.